Glossary
Tunneling
Tunneling is a procedure in which the data traffic of one Protocol is transmitted with the help of a different protocol. For example, data packets of a private network can be packed into IP packets and sent over the Internet as if through a tunnel. Tunneling procedures are used nowadays for the secure transmission of data in a Virtual Private Network (VPN). The IP packets from the local network are encrypted using a tunneling protocol (e. g. PPTP) before being sent over the Internet.
UDP
User Datagram Protocol
UDP is a Protocol of the TCP/IP protocol family that handles data transport between communication partners (applications). Unlike TCP, UDP is a
UPnP
Universal Plug and Play
UPnP technology is used for the spontaneous linking of home or small office networks. Devices that support UPnP carry out their network configuration automatically once they are connected to a network. They also provide their own services or use services of other devices on the network automatically.
URL
Universal Resource Locator
Globally unique address of a Domain on the Internet.
Virtual server
A virtual Server provides a service on the Internet that runs not on itself but on another network component. The Gigaset SE505 dsl/cable can be configured as a virtual server. It will then direct incoming calls for a service via Port Forwarding directly to the appropriate Port of the network component in question.
VPN
Virtual Private Network
A VPN is a network connection in which the data are transmitted over the Internet using special Tunneling protocols (e.g. PPTP, L2TP, IPSec) securely, i.e. encrypted. VPNs are used to connect private networks at different locations with each other without having to lease a transmission line. The Internet is used instead.
WAN
Wide Area Network
A WAN is a network that is not restricted to one particular area, such as the Internet. A WAN is run by one or more public providers to enable private access. You access the Internet via an Internet Service Provider.
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the IEEE 802.11 standard. It is used to protect wireless transmissions in a WLAN against unauthorised access through Encryption of the data transmitted.
132