Arescom Inc. AG2560 ユーザーズマニュアル

ページ / 52
48
June, 2002
AG2500Series Software User’s Guide
Encapsulation
The encapsulating or enclosing data within a particular IP header. Sometimes 
the entire frame from one network is placed in the header used by the data link 
layer protocol of another network.
Encryption
A specific algorithm used to encrypt or encode the data so that it becomes 
unreadable to unauthorized users that do not know the decryption key. A good 
example of encryption technology is WEP (Wired Equivalent Private).
Ethernet
Most popular LAN (Local Area Network) technology that uses CSMA/CD 
(Collision Detection) and transfers data between workstations over a variety of 
cable types at 10Mbps, also called 10BaseT. Most Ethernet LANs use twisted 
pair 10BaseT cables and support both Ethernet as well as Fast Ethernet at 
100Mbps (100BaseT).
Firewall
A security device (either hardware, software, or a combination of both) that 
selectively blocks out or filters unwanted IP traffic from a public network. 
Firewall allows the private LAN network to be invisible to the public network 
outside, preventing intrusion from unauthorized users.
Hub
A hardware device that repeats all data traffic to all CPE (Customer Premises 
Equipment) ports. A hub functions as the center of a LAN and all other 
network devices on the LAN, including PCs, printers, DSL modem or 
Gateways, are connected to the hub through cabling.
Infrastructure Mode
A client setting providing connectivity to an AP. As compared to Ad-Hoc 
Mode, where PCs communicate directly with each other, clients set in 
Infrastructure Mode all pass data through a central AP. The AP not only 
mediates wireless network traffic in the immediate neighborhood, but it also 
provides communication with the wired network (see also Ad-Hoc Mode and 
Access Point).
Internet
A massive worldwide network of computer networks interconnecting 
thousands of computers and networks around the world and readily accessible 
from any computer with a modem or router connection and the corresponding 
software. 
IP (Internet Protocol) A protocol standard for the Internet. A kind of Internet software that keeps 
track of all the addresses on the Internet for different nodes, forwards outgoing 
IP traffic, and recognizes incoming IP traffic.
IP Address
Numeric address assigned to each machine on the Internet. Consists of four 
sets of one, two, or three octal digits separated by periods.
ISP (Internet 
Service Provider)
The telecommunication company that provides Internet service for the 
subscriber. The ISP can be a telephone company, a CLEC or ILEC, or any 
other company that provides Internet access to the end user such as AOL, 
Earthlink or MSN.
LAN (Local 
Area Network)
A collection of privately-owned, interconnected computers within a confined 
service area.
WEP (Wired 
Equivalent Privacy)
WEP data encryption is defined by the 802.11 standard to prevent (i) access to 
the network by “intruders” using similar wireless LAN equipment and (ii) 
capture of wireless LAN traffic through eavesdropping. WEP allows the 
administrator to define a set of respective “Keys” for each wireless network 
user based on a “Key String” passed through the WEP encryption algorithm. 
Access is denied by anyone who does not have an assigned key.