beautypg.com

Compex Technologies NP25G 6C User Manual

Page 107

background image

Page 102

Ping

Packet Internet Groper is a utility used to determine whether a

particular network device (IP address) is available online. It works by
sending out a packet to the device and waiting for its response.

PPPoE

Point-to-Point Protocol over Ethernet is a method for the

encapsulation of PPP packets over Ethernet frames.

PPTP

PPTP stands for Point-to-Point Tunneling Protocol. It is a protocol that
allows authorized users to extend their own networks through private

“tunnels” over the ISP or online service. This kind of interconnection is

known as VPN ( Virtual Private Network)

RJ-45

A connector used for Ethernet devices that holds up to eight wires.

Router

A router is a device that interconnects networks.

Subnet Mask

Subnet masking is a method of splitting IP networks into subgroups.

TCP

Transmission Control Protocol enables two hosts to establish a

connection and exchange streams of data, guaranteeing delivery of

data and that packets will be delivered in the same order in which

they were sent.

Throughput

It is the measurable amount of data moved from one place to

another within a given time period.

UDP

User Datagram Protocol is a connectionless protocol that, like TCP,

runs on top of IP networks. Unlike TCP/IP, UDP provides a direct way to
send and receive datagrams over an IP network and is used primarily

for broadcasting messages over a network.

URL

Uniform Resource Locator is the address that defines the location of a

file on the World Wide Web.

UTP

Unshielded Twisted Pair is the most common kind of copper wiring

designed to reduce crosstalk between copper wires.

VPN

Virtual Private Network is a secure means to join remote networks

using comprehensive authentication and encryption. They may be

“virtually” joined even across a public network like the Internet by
means of employing IPSec amongst others.

WAN

Wide Area Network. It is a communication network that extends over

a large geographical area. For example, the Internet.

WEP

Wired Equivalent Privacy is a wireless data privacy encryption

protocol based on a 64-bit or 128-bit shared key algorithm.

WLAN

Wireless Local Area Network is a group of computers and associated

devices that communicate with each other wirelessly.

WPA-PSK

WPA-PSK is a special mode for home users without authentication

server and yet provides the same strong encryption protection.