Netgear GSM7224 GSM7224 User Manual - Page 226

U, V, Telnet, Traffic prioritization, Trivial File Transfer Protocol, Trunking

Page 226 highlights

User Manual for the NETGEAR 7200 Series Layer 2 Managed Switch Software TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape's SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable. Telnet A TCP/IP application protocol that provides a virtual terminal service, allowing a user to log into another computer system and access a device as if the user were connected directly to the device. Traffic prioritization Giving time-critical data traffic a higher quality of service over other, non-critical data traffic. Trivial File Transfer Protocol TFTP is a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP, a direct protocol used to communicate datagrams over a network with little error recovery) and provides no security features. It is often used by servers to boot diskless workstations, X-terminals, and routers. Trunking The process of combing a set of trunks that are traffic-engineered as a unit for the establishment of connections between switching systems in which all of the communications paths are interchangeable. U UTP Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks. V Virtual Local Area Network Operating at the Data Link Layer (Layer 2 of the OSI model), the VLAN is a means of parsing a single network into logical user groups or organizations, as if they physically resided on a dedicated LAN segment of their own. In reality, this virtually defined community may have individual members peppered across a large, extended LAN. The VLAN identifier is part of the 802.1Q tag, which is added to an Ethernet frame by an 802.1Q-compliant switch or router. Devices recognizing 802.1Q-tagged frames maintain appropriate tables to track VLANs. The first three bits of the 802.1Q tag are used by 802.1P to establish priority for the packet. VLAN See "Virtual Local Area Network" on page 18. C-18 202-10009-01_060204 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228

User Manual for the NETGEAR 7200 Series Layer 2 Managed Switch Software
C-18
Glossary
202-10009-01_060204
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Telnet
A TCP/IP application protocol that provides a virtual terminal service, allowing a user to log into another
computer system and access a device as if the user were connected directly to the device.
Traffic prioritization
Giving time-critical data traffic a higher quality of service over other, non-critical data traffic.
Trivial File Transfer Protocol
TFTP is a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP, a
direct protocol used to communicate datagrams over a network with little error recovery) and provides no
security features. It is often used by servers to boot diskless workstations, X-terminals, and routers.
Trunking
The process of combing a set of trunks that are traffic-engineered as a unit for the establishment of
connections between switching systems in which all of the communications paths are interchangeable.
U
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
V
Virtual Local Area Network
Operating at the Data Link Layer (Layer 2 of the OSI model), the VLAN is a means of parsing a single
network into logical user groups or organizations, as if they physically resided on a dedicated LAN segment
of their own. In reality, this virtually defined community may have individual members peppered across a
large, extended LAN. The VLAN identifier is part of the 802.1Q tag, which is added to an Ethernet frame by
an 802.1Q-compliant switch or router. Devices recognizing 802.1Q-tagged frames maintain appropriate
tables to track VLANs. The first three bits of the 802.1Q tag are used by 802.1P to establish priority for the
packet.
VLAN
See “Virtual Local Area Network” on page 18.