Netgear WG511U WG511U User Manual - Page 92
higher-level protocols, such as the TLS Handshake Protocol.
UPC - 606449037333
View all Netgear WG511U manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 92 highlights
User's Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U Routing Information Protocol RIP. A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations. router A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses. SSID A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID. Subnet Mask A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator to further divide an IP address into two or more subnets. TCP/IP The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with the Transfer Control Protocol (TCP) form TCP/IP. TLS Short for Transport Layer Security, a protocol that guarantees privacy and data integrity between client/ server applications communicating over the Internet. The TLS protocol is made up of two layers: • The TLS Record Protocol -- layered on top of a reliable transport protocol, such as TCP, it ensures that the connection is private by using symmetric data encryption and it ensures that the connection is reliable. The TLS Record Protocol also is used for encapsulation of higher-level protocols, such as the TLS Handshake Protocol. • The TLS Handshake Protocol -- allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic keys before the application protocol transmits or receives any data. TLS is application protocol-independent. Higher-level protocols can layer on top of the TLS protocol transparently. Based on Netscape's SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable. WAN A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. 6 Glossary August 2004