Ping

Packet Internet Groper is a utility used to determine whether a

 

particular network device (IP address) is available online. It works by

 

sending out a packet to the device and waiting for its response.

PPPoE

Point-to-Point Protocol over Ethernet is a method for the

 

encapsulation of PPP packets over Ethernet frames.

PPTP

PPTP stands for Point-to-Point Tunneling Protocol. It is a protocol that

 

allows authorized users to extend their own networks through private

 

“tunnels” over the ISP or online service. This kind of interconnection is

 

known as VPN ( Virtual Private Network)

RJ-45

A connector used for Ethernet devices that holds up to eight wires.

Router

A router is a device that interconnects networks.

Subnet Mask

Subnet masking is a method of splitting IP networks into subgroups.

TCP

Transmission Control Protocol enables two hosts to establish a

 

connection and exchange streams of data, guaranteeing delivery of

 

data and that packets will be delivered in the same order in which

 

they were sent.

Throughput

It is the measurable amount of data moved from one place to

 

another within a given time period.

UDP

User Datagram Protocol is a connectionless protocol that, like TCP,

 

runs on top of IP networks. Unlike TCP/IP, UDP provides a direct way to

 

send and receive datagrams over an IP network and is used primarily

 

for broadcasting messages over a network.

URL

Uniform Resource Locator is the address that defines the location of a

 

file on the World Wide Web.

UTP

Unshielded Twisted Pair is the most common kind of copper wiring

 

designed to reduce crosstalk between copper wires.

VPN

Virtual Private Network is a secure means to join remote networks

 

using comprehensive authentication and encryption. They may be

 

“virtually” joined even across a public network like the Internet by

 

means of employing IPSec amongst others.

WAN

Wide Area Network. It is a communication network that extends over

 

a large geographical area. For example, the Internet.

WEP

Wired Equivalent Privacy is a wireless data privacy encryption

 

protocol based on a 64-bit or 128-bit shared key algorithm.

WLAN

Wireless Local Area Network is a group of computers and associated

 

devices that communicate with each other wirelessly.

WPA-PSK

WPA-PSK is a special mode for home users without authentication

 

server and yet provides the same strong encryption protection.

Page 102

Page 107
Image 107
Compex Technologies NP25G 6C manual Pptp