Reference Manual for the 54 Mbps Wireless Router WGR614 v4
10 Glossary
December 2003
The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by
using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Universal Plug and Play
UPnP. A networking architecture that provides compatibility among networking technology. UPnP
compliant routers provide broadband users at home and small businesses with a seamless way to participate
in online games, videoconferencing and other peer-to-peer services.
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
VCI
Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used
by ATM switching equipment to route data through the network.
VPI
Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by
ATM switching equipment to route data through the network.
VPN
Virtual Private Network. A method for securely transporting data between two private networks by using a
public network such as the Internet as a connection.
WAN
A long distance link used to extend or connect remotely located local area networks. The Internet is a large
WAN.
WEB Proxy Server
A web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a
firewall.
The proxy server listens for requests from clients within the firewall and forwards these requests to remote
Internet servers outside the firewall. The proxy server reads responses from the external servers and then
sends them to internal client clients.
WEP
Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks.
All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for
data encryption.