Glossary

Access Control List

The ACL is used for security inside of programs and

(ACL)

operating systems. For example, Windows NT uses ACLs for

 

directory and file access; Lotus Domino uses ACLs for

 

database access.

 

An ACL contains both users and groups and what level of

 

access each has. For example, you may give a regular user

 

"Read" access, while a different user you could give manager

 

or full access.

Authentication

The process by which a user’s identity is checked within the

 

network to ensure that the user has access to the requested

 

resources.

ARP

Address Resolution Protocol. An ARP protocol in which a

 

router masks its identity and sends routing packets to the

 

requesting host. A proxy ARP can minimize the bandwidth

 

on slower WAN links.

Basic In/Out System

Chips on the motherboard of a computer contain read only

(BIOS)

memory instructions that are used to start up a computer. The

 

operating system of a PC also makes use of BIOS

 

instructions and settings to access hardware components such

 

as a disk drive. Some BIOS/CMOS settings can be set to scan

 

for viruses, causing problems for some installation programs.

Baud Rate

The baud rate is a measure of the number of symbols

 

(characters) transmitted per unit of time. Each symbol will

 

normally consist of a number of bits, so the baud rate will

 

only be the same as the bit rate when there is one bit per

 

symbol. The term originated as a measure for the

 

transmission of telegraph characters. It has little application

 

today except in terms of modem operation. It is

 

recommended that all data rates are referred to in bps, rather

 

than baud (which is easy to misunderstand). Additionally,

Glossary-1

AlterPath Manager E2000 Manual

Page 187
Image 187
Cyclades AlterPath BladeManager user manual Access Control List, Acl, Authentication, Basic In/Out System, Bios, Baud Rate