beautypg.com

Siemens 54 User Manual

Page 42

background image

40

Glossary

Gigaset USB Adapter 54 / englisch / A31008-M1071-R101-1-7619 / glossary.fm / 01.12.2006

Subnet mask
The subnet mask determines how many parts of the IP addresses of a network represent
the network address and how many parts represent the computer address.
The subnet mask administered by a Gigaset router is always 255.255.255.0. That means
the first three parts of the IP address form the network address and the final part is used
for assigning computer addresses. The first three parts of the IP address of all network
components are in this case always the same.
Switch
A Switch, like a Hub, is an element for linking different network segments or
components. Unlike a Hub however, the Switch has its own intelligence that enables it
to forward packets to only that subnet or network component they are meant for.
See also Bridge, Gateway, Hub, Router
TKIP
Temporal Key Integrity Protocol
TKIP is a further development of WEP encryption. Like WEP, TKIP encryption is based on
the RC4 encryption algorithm. TKIP however generates new keys after every 10-Kbyte
packet, thus meeting higher security requirements.
UDP
User Datagram Protocol
UDP is a protocol of the TCP/IP protocol family that handles data transport between two
communication partners (applications). Unlike TCP, UDP is a non-session based
protocol. It does not establish a fixed connection. The data packets, called datagrams,
are sent as a broadcast. The recipient is responsible for making sure the data is received.
The sender is not notified about whether it is received or not.
WAN
Wide Area Network
A WAN is a network that is not restricted to one particular area, such as the LAN. The
Internet is the most frequently used WAN. A WAN is run by one or more public providers
to enable private access. You access the Internet via an Internet provider.
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the IEEE 802.11 standard. In a WLAN, WEP
encryption protects data against unauthorised access. WEP encryption uses the RC4
encryption algorithm.
Wireless network
See WLAN