User's Manual

PMP 450 Planning Guide
Glossary
pmp-0047 (June 2013)
XI
Term
Definition
telnet
Utility that allows a client computer to update a server. A firewall can prevent the use
of the telnet utility to breach the security of the server. See
http://www.faqs.org/rfcs/rfc818.html, http://www.faqs.org/rfcs/rfc854.html and
http://www.faqs.org/rfcs/rfc855.html.
Textual
Conventions MIB
Management Information Base file that defines system-specific textual conventions.
See also Management Information Base.
Tokens
Theoretical amounts of data. See also Buckets.
TOS
8-bit field in that prioritizes data in a IP transmission. See
http://www.faqs.org/rfcs/rfc1349.html.
TxUnderrun Field
This field displays how many transmission-underrun errors occurred on the Ethernet
controller.
UDP
User Datagram Protocol. A set of Network, Transport, and Session Layer protocols that
RFC 768 defines. These protocols include checksum and address information but does
not retransmit data or process any errors. See http://www.faqs.org/rfcs/rfc768.html.
udp
User-defined type of port.
U-NII
Unlicensed National Information Infrastructure radio frequency band, in the 5.1-GHz
through 5.8-GHz ranges.
VID
VLAN identifier. See also VLAN.
VLAN
Virtual local area network. An association of devices through software that contains
broadcast traffic, as routers would, but in the switch-level protocol.
VPN
Virtual private network for communication over a public network. One typical use is to
connect remote employees, who are at home or in a different city, to their corporate
network over the Internet. Any of several VPN implementation schemes is possible.
SMs support L2TP over IPSec (Level 2 Tunneling Protocol over IP Security) VPNs
and PPTP (Point to Point Tunneling Protocol) VPNs, regardless of whether the
Network Address Translation (NAT) feature enabled.