D-Link DWL-8500AP Product Manual - Page 162

Network Address, Packet, Network Interface Card, Network Time Protocol, Coordinated, Universal Time

Page 162 highlights

D-Link Unified Access Point Administrator's Guide a translation table that maps all internal IP addresses in outbound requests to its own address and converts all inbound requests to the correct internal host. NAT serves three main purposes: it provides security by obscurity by hiding internal IP addresses, enables the use of a wide range of internal IP addresses without fear of conflict with the addresses used by other organizations, and it allows the use of a single Internet connection. communication and addressing. For example, protocols such as CSMA/CA and components like MAC addresses, and Frames are all defined and dealt with as a part of the Data-Link layer. • Layer 3, the Network layer, defines the how to determine the best path for information traversing the network. Packets and logical IP Addresses operate on the network layer. Network Address See IP Address. NIC A Network Interface Card is an adapter or expansion board inserted into a computer to provide a physical connection to a network. Most NICs are designed for a particular type of network, protocol, and media, for example, Ethernet or wireless. NTP The Network Time Protocol assures accurate synchronization of the system clocks in a network of computers. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. An NTP client sends periodic time requests to servers, using the returned time stamp to adjust its clock. O OSI The Open Systems Interconnection (OSI) reference model is a framework for network design. The OSI model consists of seven layers: • Layer 4, the Transport layer, defines connection oriented protocols such as TCP and UDP. • Layer 5, the Session layer, defines protocols for initiating, maintaining, and ending communication and transactions across the network. Some common examples of protocols that operate on this layer are network file system (NFS) and structured query language (SQL). Also part of this layer are communication flows like single mode (device sends information bulk), half-duplex mode (devices take turns transmitting information in bulk), and fullduplex mode (interactive, where devices transmit and receive simultaneously). • Layer 6, the Presentation layer, defines how information is presented to the application. It includes meta-information about how to encrypt/ decrypt and compress/decompress the data. JPEG and TIFF file formats are examples of protocols at this layer. • Layer 7, the Application layer, includes protocols like hypertext transfer protocol (HTTP), simple mail transfer protocol (SMTP), and file transfer protocol (FTP). • Layer 1, the Physical layer, identifies the physical medium used for communication between nodes. In the case of wireless networks, the physical medium is air, and radio frequency (RF) waves are a components of the physical layer. • Layer 2, the Data-Link layer, defines how data for transmission will be structured and formatted, along with low-level protocols for P Packet Data and media are transmitted among nodes on a network in the form of packets. Data and multimedia content is divided up and packaged into packets. A packet includes a small chunk of the content to be sent along with its destination address and sender address. Packets are pushed out onto the network and 162 © 2001-2008 D-Link Corporation. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

D-Link Unified Access Point Administrator’s Guide
162
© 2001-2008 D-Link Corporation. All Rights Reserved.
a translation table that maps all internal IP addresses
in outbound requests to its own address and converts
all inbound requests to the correct internal host.
NAT serves three main purposes: it provides security
by obscurity by hiding internal IP addresses, enables
the use of a wide range of internal IP addresses
without fear of conflict with the addresses used by
other organizations, and it allows the use of a single
Internet connection.
Network Address
See
IP Address
.
NIC
A
Network Interface Card
is an adapter or expansion
board inserted into a computer to provide a physical
connection to a network. Most NICs are designed for
a particular type of network, protocol, and media, for
example,
Ethernet
or wireless.
NTP
The
Network Time Protocol
assures accurate
synchronization of the system clocks in a network of
computers. NTP servers transmit
Coordinated
Universal Time
(UTC, also known as
Greenwich
Mean Time
) to their client systems. An NTP client
sends periodic time requests to servers, using the
returned time stamp to adjust its clock.
O
OSI
The
Open Systems Interconnection
(OSI) reference
model is a framework for network design. The OSI
model consists of seven layers:
Layer 1, the Physical layer, identifies the
physical medium used for communication
between nodes. In the case of wireless networks,
the physical medium is air, and radio frequency
(RF) waves are a components of the physical
layer.
Layer 2, the Data-Link layer, defines how data
for transmission will be structured and formatted,
along with low-level protocols for
communication and addressing. For example,
protocols such as
CSMA/CA
and components like
MAC
addresses, and
Frame
s are all defined and dealt
with as a part of the Data-Link layer.
Layer 3, the Network layer, defines the how to
determine the best path for information
traversing the network.
Packet
s and logical
IP
Address
es operate on the network layer.
Layer 4, the Transport layer, defines connection
oriented protocols such as
TCP
and
UDP
.
Layer 5, the Session layer, defines protocols for
initiating, maintaining, and ending
communication and transactions across the
network. Some common examples of protocols
that operate on this layer are network file system
(NFS) and structured query language (SQL).
Also part of this layer are communication flows
like single mode (device sends information
bulk), half-duplex mode (devices take turns
transmitting information in bulk), and full-
duplex mode (interactive, where devices transmit
and receive simultaneously).
Layer 6, the Presentation layer, defines how
information is presented to the application. It
includes meta-information about how to encrypt/
decrypt and compress/decompress the data.
JPEG and TIFF file formats are examples of
protocols at this layer.
Layer 7, the Application layer, includes protocols
like hypertext transfer protocol (
HTTP
), simple
mail transfer protocol (SMTP), and file transfer
protocol (FTP).
P
Packet
Data and media are transmitted among nodes on a
network in the form of
packets
. Data and multimedia
content is divided up and packaged into
packets
. A
packet includes a small chunk of the content to be
sent along with its destination address and sender
address. Packets are pushed out onto the network and