Technical data

L-2 Glossary 90362-01
ARA
A
pple
R
emote
A
ccess. With ARA, Apple Macintoshes using modems
can send AppleTalk protocols over serial connections, such as RS-232.
A modem-equipped Macintosh, including the PowerBook, that has
ARA software can dial into a NetBlazer and become a node on an
AppleTalk network. Users who want to do this need ARA software from
Apple Computer. A Macintosh does not have to be dedicated for each
user.
The remote Macintosh becomes a part of the network and can use
network services. A remote ARA user can log in to TCP hosts as well
as AppleTalk servers when the remote user runs both ARA and TCP
stacks simultaneously.
ARP
A
ddress
R
esolution
P
rotocol for TCP/IP. ARP is a means of mapping
network-layer addresses onto media-specific addresses. It is the Inter-
net protocol used to dynamically bind a high-level Internet address to a
low-level physical-hardware address. ARP is used only across single
physical networks and is limited to networks that support hardware
broadcast.
async The NetBlazer’s abbreviation for asynchronous.
asynchronous Data transmission with a random time between characters. Each
character, word, or block is individually timed, usually by start and stop
bits. See also synchronous.
b-channel A “bearer” channel that carries voice or data at 56 or 64 Kbps in either
direction and is circuit-switched. See also BRI.
BRI
B
asic-
R
ate
I
nterface. ISDN standard that specifies how a user’s
desk-top terminals and telephones can connect to the ISDN switch. It
specifies two B-channels that allow 64-Kbps simultaneous voice and
data service, and one D-channel that carries call information and cus-
tomer data at 16 Kbps.
bri
XXX
The name of the BRI channels (lines) in the NetBlazer Setup Utility.
CHAP See PAP/CHAP.
command-line interface The NetBlazer’s command-line interface gives users the means to
carry out text-based configuration. The extensive command set gives
users flexibility when they set up their NetBlazers. See the
NetBlazer
Commands Reference Manual
for descriptions of the commands.
crypto key Similar to a password, a crypto key is used to authenticate a user.