91
Glossary
Gigaset C450 IP / Greek eng / A31008-M1713-T151-3-8U19 / glossary.fm / 24.9.07
Ver
si
on 4, 16.
09.20
05
M
MAC address
Media Access Control Address
Hardware address by means of which
each network device (e.g. network
card, switch, phone) can be uniquely
identified worldwide. It is composed of
six parts (hexadecimal numbers), sepa-
rated by a "-" (e.g. 00-90-65-44-00-3A).
The MAC address is assigned by the
manufacturer and cannot be changed.
Mbps
Million bits per second
Unit of the transmission speed in a net-
work.
MRU
Maximum Receive Unit
Defines the maximum user data vol-
ume within a data packet.
MTU
Maximum Transmission Unit
Defines the maximum length of a data
packet that can be carried over the net-
work at a time.
N
NAT
Network Address Translation
Method for converting (private)
to one or more (public)
IP addresses. NAT enables the IP
(e.g. VoIP telephones) in a
to be
concealed behind a shared IP address
.
VoIP telephones behind a NAT router
cannot be reached by VoIP servers (on
account of the private IP address). In
order to "get around" NAT, it is possible
to use (alternatively)
in the router,
in the VoIP telephone, or for the
VoIP provider to use an
If an outbound proxy is made available
you must allow for this in the VoIP set-
tings for your phone.
Network
Group of devices. Devices can be con-
nected in either wired or wireless
mode.
Networks can also differ in range and
structure:
– Range: local networks (
) or
wide-area networks (
– Structure:
or Ad-hoc network
Network subscribers
Devices and computers that are con-
nected to each other in a network, e.g.
servers, PCs and phones.
O
Outbound proxy
Alternative NAT control mechanism to
STUN and ALG.
Outbound proxies are implemented by
the VoIP provider in Firewall/NAT envi-
ronments as an alternative to
. They control data traffic
through the firewall.
Outbound proxy and STUN servers
should not be used simultaneously.
See also:
and
P
PIN
Personal Identification Number
Protects against unauthorised use.
When the PIN is activated a number
combination has to be entered in order
to access a protected area.
You can protect your base station con-
figuration data with a system PIN (4-
digit number combination).
Port
Data is exchanged between two appli-
cations in a
across a port.