Siemens EF 711 Series Betriebsanweisung Seite 476

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 492
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 475
Glossary
SCALANCE WLC711
A-6 C79000-G8976-C260-03, 07/2012, User Guide, V8.11
IP Internet Protocol is the method or protocol by which data is sent from one computer to
another on the Internet. Each computer (host) on the Internet has at least one IP address
that uniquely identifies it. Internet Protocol specifies the format of packets, also called
datagrams, and the addressing scheme. Most networks combine IP with a higher-level
protocol called Transmission Control Protocol (TCP), which establishes a virtual connection
between a destination and a source.
IPC Interprocess Communication. A capability supported by some operating systems that allows
one process to communicate with another process. The processes can be running on the
same computer or on different computers connected through a network.
IPsec
IPsec-ESP
IPsec-AH
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-ESP). The encapsulating
security payload (ESP) encapsulates its data, enabling it to protect data that follows in the
datagram.Internet Protocol security Authentication Header (IPsec-AH). AH protects the
parts of the IP datagram that can be predicted by the sender as it will be received by the
receiver.IPsec is a set of protocols developed by the IETF to support secure exchange of
packets at the IP layer. IPsec has been deployed widely to implement Virtual Private
Networks (VPNs). IPsec supports two encryption modes: Transport and Tunnel. Transport
mode encrypts only the data portion (payload) of each packet, but leaves the header
untouched. The more secure Tunnel mode encrypts both the header and the payload. On
the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the
sending and receiving devices must share a public key. This is accomplished through a
protocol known as Internet Security Association and Key Management Protocol/Oakley
(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the
sender using digital certificates.
isochronous Isochronous data is data (such as voice or video) that requires a constant transmission rate,
where data must be delivered within certain time constraints. For example, multimedia
streams require an isochronous transport mechanism to ensure that data is delivered as fast
as it is displayed and to ensure that the audio is synchronized with the video. Compare:
asynchronous processes in which data streams can be broken by random intervals, and
synchronous processes, in which data streams can be delivered only at specific intervals.
ISP Internet Service Provider.
IV IV (Initialization Vector), part of the standard WEP encryption mechanism that concatenates
a shared secret key with a randomly generated 24-bit initialization vector. WPA with TKIP
uses 48-bit IVs, an enhancement that significantly increases the difficulty in cracking the
encryption. (See WPA and TKIP)
LAN Local Area Network.
LSA Link State Advertisements received by the currently running OSPF process. The LSAs
describe the local state of a router or network, including the state of the router's interfaces
and adjacencies. See also OSPF.
MAC Media Access Control layer. One of two sublayers that make up the Data Link Layer of the
OSI model. The MAC layer is responsible for moving data packets to and from one Network
Interface Card (NIC) to another across a shared channel.
MAC address Media Access Control address. A hardware address that uniquely identifies each node of a
network.
Table A-1 Networking Terms and Abbreviations (continued)
Term Explanation
Seitenansicht 475
1 2 ... 471 472 473 474 475 476 477 478 479 480 481 ... 491 492

Kommentare zu diesen Handbüchern

Keine Kommentare