Appendix B

Glossary

MAC (Media Access Control) Address  The unique address that a manufacturer assigns to each networking device.

Mask  A filter that includes or excludes certain values, for example parts of an IP address.

Mbps (MegaBits Per Second)  One million bits per second; a unit of measurement for data transmission.

MD5 (Message Digest 5)  An algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication and authenticates the origin of the communication.

MDI (Media Dependent Interface)  A cable used for end stations.

MDIX (Media Dependent Interface with Crossover)  A cable used for hubs and switches.

MIB (Management Information Base)  MIBs contain information describing specific aspects of network components.

Multicast  Transmits copies of a single packet to multiple ports.

Network  A series of computers or devices connected for the purpose of data sharing, storage, and/or transmission between users.

NMS (Network Management System)  An interface that provides a method of managing a system.

OID (Object Identifier)  Used by SNMP to identify managed objects. In the SNMP Manager/Agent network management paradigm, each managed object must have an OID to identify it.

Packet  A unit of data sent over a network.

Ping (Packet INternet Groper)  An Internet utility used to determine whether a particular IP address is online.

Policing  Determines if traffic levels are within a specified profile. Policing manages the maximum traffic rate used to send or receive packets on an interface.

Port  The connection point on a computer or networking device used for plugging in cables or adapters.

Port Mirroring  Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.

Power over Ethernet (PoE)  A technology enabling an Ethernet network cable to deliver both data and power.

QoS (Quality of Service)  Provides policies that contain sets of filters (rules). QoS allows network managers to decide how and what network traffic is forwarded according to priorities, application types, and source and destination addresses.

RADIUS (Remote Authentication Dial-In User Service)   A protocol that uses an authentication server to control network access.

RJ-45 (Registered Jack-45)  An Ethernet connector that holds up to eight wires.

RMON (Remote Monitoring)  Provides network information to be collected from a single workstation.

Router  A networking device that connects multiple networks together.

RSTP (Rapid Spanning Tree Protocol)  Detects and uses network topologies that allow a faster convergence of the spanning tree, without creating forwarding loops.

Server  Any computer whose function in a network is to provide user access to files, printing, communications, and other services.

SMTP (Simple Mail Transfer Protocol)  The standard e-

mail protocol on the Internet.

SNMP (Simple Network Management Protocol)  A

widely used network monitoring and control protocol.

SSH  Secure Shell. A utility that uses strong authentication and secure communications to log in to another computer over a network.

SSL (Secure Socket Layer)  Encryption technology for the Internet used to provide secure transactions, such as the transmission of credit card numbers for e-commerce.

Static IP Address  A fixed address assigned to a computer or device that is connected to a network.

STP (Spanning Tree Protocol)  Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP provides one path between end stations on a network, eliminating loops.

Subnet (Sub-network) Subnets are portions of a network that share a common address component. In TCP/IP networks, devices that share a prefix are part of the same subnet. For example, all devices with a prefix of 157.100.100.100 are part of the same subnet.

Subnet Mask  An address code that determines the size of the network.

Switch  Filters and forwards packets between LAN segments. Switches support any packet protocol type.

TACACS+ (Terminal Access Controller Access Control System Plus)  Proprietary Cisco enhancement to Terminal AccessControllerAccessControlSystem(TACACS).Provides additional support for authentication, authorization, and accounting.

Wireless-G Business Ethernet Bridge

25

Page 29
Image 29
Linksys WET200 manual Smtp Simple Mail Transfer Protocol The standard e, Snmp Simple Network Management Protocol a

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.