Motorola WU830G manual Tcp/Ip, Udp, Usb

Page 56

SECTION 5

GLOSSARY

 

 

T

TCP

Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, checks error in incoming packets, and retransmits packets if requested.

TCP/IP

The Transmission Control Protocol/Internet Protocol suite provides standards and rules for data communication between networks on the Internet. It is the worldwide Internetworking standard and the basic communications protocol of the Internet.

Tunnel

To place packets inside other packets to send over a network. The protocol of the enclosing packet is understood by each endpoint, or tunnel interface, where the packet enters and exits the network. VPNs rely on tunneling to create a secure network.

Tunneling requires the following protocol types:

!A carrier protocol, such as TCP, used by the network that the data travels over

!An encapsulating protocol, such as IPSec, L2F, L2TP, or PPTP, that is wrapped around the original data

!A passenger protocol, such as IP, for the original data

U

UDP

User Datagram Protocol. A method used along with the IP to send data in the form of message units (datagram) between network devices over a LAN or WAN.

Unicast

Apoint-to-point data transmission sent from one sender to one receiver. This the normal way you access websites. See also multicast.

USB

Universal Serial Bus is a computer interface for add-on devices such as printers, scanners, mice, modems, or keyboards. USB supports data transfer rates of 12 Mbps and plug-and-play installation. You can connect up to 127 devices to a single USB port.

5-12

WU830G

Image 56
Contents User Guide WU830G Wireless USB Adapter FCC Compliance Class B Digital Device Canada Industry Canada IC Contents Contents Overview Features OverviewUnderstanding Your User Guide Box ContentsOverview Section Simple Home Network Diagram Wireless Connections Front of USB Adapter Feature DescriptionUSB Adapter Physical Description Back of USB Adapter Following illustration shows the back of the WU830GBefore You Begin Enterprise Business UsersSecurity Options InstallationSmall Office/Home Office Users Installation Section Network Authentication Data Encryption Option DescriptionSecurity Example Installing Your USB Adapter Device Configuration SetupConfiguration Configuration Understanding the Antenna IconsConfiguration Section Link Status Information Field or Button DescriptionAP MAC Connecting to an Available Wireless Network Column Description Heading Creating a Network Profile Ssid Configuration Configuring Security Settings Setting Security for a Wireless Network or a Profile Select the Authentication Select the Encryption StatusOpen Authentication Encryption Description StatusShared Authentication Encryption Status WPA-PSK Authentication Field DescriptionWPA Authentication Configuration MS Chap PAPChap EAP-GTC Name and Password for userProtocols are MD5 Challenge Removing a Network from the Profile List Viewing Product Information Removing the Wireless USB Adapter Configuration Hardware Solutions Contact Us Register the WU830GTroubleshooting Start button to ProgramsAccessoriesCommand PromptTroubleshooting Section Ascii CPE GlossaryBSS Glossary Section DhcpDMZ DNSDsss EAP-LEAPEAP-PEAP EAP-TLSGUI ESSFTP Hexadecimal HostIcmp IeeeIsdn ISPLAN LeapNIC MTUNAT Pcmcia PingPPP PptpRTS RadiusROM Smtp TCP TCP/IPUDP USBVPN WANWAP WEPWWW WlanWPA Mgbi