Motorola SBG-940 User Guide - Page 138

switch, symbol rate, SYSLOG, TCP/IP, transparent, bridging, transport layer, trunk, tunnel, two-way

Page 138 highlights

Overview Installation Troubleshooting Contact FAQ Specifications Glossary License Configuration: Basic Gateway TCP/IP Wireless USB switch symbol rate SYSLOG On an Ethernet network, a switch filters frames based on the MAC address, in a manner similar to a bridge. A switch is more advanced because it can connect more than two segments. Also known as baud rate, is a measure of the number of times per second a signal in a communications channel varies, or makes a transition between states (states being frequencies, voltage levels or phase angles). Usually measured in symbols per second (sps). A de-facto UNIX standard for logging system events. T TBCP Tagged Binary Communication Protocol TCP Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, checks error in incoming packets, and retransmits packets if requested. TCP/IP The Transmission Control Protocol/Internet Protocol suite provides standards and rules for data communication between networks on the Internet. It is the worldwide internetworking standard and the basic communications protocol of the Internet. TFTP Trivial File Transfer Protocol is a very simple protocol used to transfer files. TKIP Temporal Key Integrity Protocol transparent bridging A method to enable all hosts on the wired Ethernet LAN, WLAN, and USB connection to communicate as if they were all connected to the same physical network. transport layer Layer of the OSI concerned with protocols for error recognition and recovery. This layer also regulates information flow. trunk Electronic path over which data is transmitted. TTL The time to live is the number of routers (or hops) a packet can traverse before being discarded. When a router processes a packet, it decreases the TTL by 1. When the TTL reaches zero, the packet is discarded. tunnel To place packets inside other packets to send over a network. The protocol of the enclosing packet is understood by each endpoint, or tunnel interface, where the packet enters and exits the network. VPNs rely on tunneling to create a secure network. Tunneling requires the following protocol types: • A carrier protocol, such as TCP, used by the network that the data travels over • An encapsulating protocol, such as IPSec, L2F, L2TP, or PPTP, that is wrapped around the original data • A passenger protocol, such as IP, for the original data two-way A cable system that can transmit signals in both directions to and from the headend and the subscriber. SBG940 User Guide 130

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141

Overview
Installation
Troubleshooting
Contact
FAQ
Specifications
Glossary
License
Configuration:
Basic
Gateway
TCP/IP
Wireless
USB
SBG940 User Guide
130
T
switch
On an Ethernet network, a switch filters frames based on the MAC address, in a manner similar to a
bridge. A switch is more advanced because it can connect more than two segments.
symbol rate
Also known as baud rate, is a measure of the number of times per second a signal in a
communications channel varies, or makes a transition between states (states being frequencies,
voltage levels or phase angles). Usually measured in symbols per second (sps).
SYSLOG
A de-facto UNIX standard for logging system events.
TBCP
Tagged Binary Communication Protocol
TCP
Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network
for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and
procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track
outstanding packets, checks error in incoming packets, and retransmits packets if requested.
TCP/IP
The Transmission Control Protocol/Internet Protocol suite provides standards and rules for data
communication between networks on the Internet. It is the worldwide internetworking standard and the
basic communications protocol of the Internet.
TFTP
Trivial File Transfer Protocol is a very simple protocol used to transfer files.
TKIP
Temporal Key Integrity Protocol
transparent
bridging
A method to enable all hosts on the wired Ethernet LAN, WLAN, and USB connection to communicate
as if they were all connected to the same physical network.
transport layer
Layer of the OSI concerned with protocols for error recognition and recovery. This layer also regulates
information flow.
trunk
Electronic path over which data is transmitted.
TTL
The time to live is the number of routers (or hops) a packet can traverse before being discarded. When
a router processes a packet, it decreases the TTL by 1. When the TTL reaches zero, the packet is
discarded.
tunnel
To place packets inside other packets to send over a network. The protocol of the enclosing packet is
understood by each endpoint, or tunnel interface, where the packet enters and exits the network.
VPNs rely on tunneling to create a secure network.
Tunneling requires the following protocol types:
A carrier protocol, such as TCP, used by the network that the data travels over
An encapsulating protocol, such as IPSec, L2F, L2TP, or PPTP, that is wrapped around the original
data
A passenger protocol, such as IP, for the original data
two-way
A cable system that can transmit signals in both directions to and from the headend and the
subscriber.