Siemens GIGASET 54 User Manual

Page 43

Advertising
background image

43

Glossary

Gigaset PC Card 54 / englisch / A31008-E505-B101-3x-7619 / glossary.fm / 14.11.2008

Sc

hablone 200

4_08

_26

Subnet
A subnet divides a network into smaller units.

Subnet mask
The subnet mask determines how many parts of the IP addresses of a network represent
the network address and how many parts represent the computer address.
The subnet mask administered by the Gigaset SE505 dsl/cable is always 255.255.255.0.
That means the first three parts of the IP address form the network address and the final
part is used for assigning PC addresses. The first three parts of the IP address of all net-
work components are always the same in this case.

Switch
A Switch, like a Hub, is an element for linking different network segments or compo-
nents. Unlike a Hub however, the Switch has its own intelligence that enables it to for-
ward packets to only that subnet or network component they are meant for.
See also Bridge, Gateway, Hub, Router

TKIP
Temporal Key Integrity Protocol
TKIP is a further development of WEP encryption. Like WEP, TKIP encryption is based on
the RC4 encryption algorithm. TKIP however generates new keys after every 10-Kbyte
packet, thus meeting higher security requirements.

UDP
User Datagram Protocol
UDP is a protocol in the TCP/IP family that handles data transport between communica-
tion partners (applications.) Unlike TCP, UDP is a non-session based protocol. It does not
establish a fixed connection. The data packets, so-called datagrams, are sent as a broad-
cast. The recipient is responsible for making sure the data is received. The sender is not
notified about whether it is received or not.

WAN
Wide Area Network
A WAN is a network that is not restricted to one particular area, such as the LAN. The
Internet is the most frequently used WAN. A WAN is run by one or more public providers
to enable private access. You access the Internet via an Internet provider.

WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the IEEE 802.11 standard. In a WLAN, WEP encryp-
tion protects data against unauthorised access. WEP encryption uses the RC4 encryption
algorithm.

Wireless network
See WLAN

Advertising