Installation guide

G
LOSSARY
– 138 –
SSH Secure Shell is a secure replacement for remote access functions, including
Telnet. SSH can authenticate users with a cryptographic key, and encrypt
data connections between management clients and the switch.
STA Spanning Tree Algorithm is a technology that checks your network for any
loops. A loop can often occur in complicated or backup linked network
systems. Spanning Tree detects and directs data along the shortest
available path, maximizing the performance and efficiency of the network.
TCP/IP Transmission Control Protocol/Internet Protocol. Protocol suite that
includes TCP as the primary transport protocol, and IP as the network layer
protocol.
TELNET Defines a remote communication facility for interfacing to a terminal device
over TCP/IP.
TFTP Trivial File Transfer Protocol. A TCP/IP protocol commonly used for software
downloads.
UDP User Datagram Protocol. UDP provides a datagram mode for packet-
switched communications. It uses IP as the underlying transport
mechanism to provide access to IP-like services. UDP packets are delivered
just like IP packets – connection-less datagrams that may be discarded
before reaching their targets. UDP is useful when TCP would be too
complex, too slow, or just unnecessary.
UTC Universal Time Coordinate. UTC is a time scale that couples Greenwich
Mean Time (based solely on the Earth’s rotation rate) with highly accurate
atomic time. The UTC does not have daylight saving time.
VLAN Virtual LAN. A Virtual LAN is a collection of network nodes that share the
same collision domain regardless of their physical location or connection
point in the network. A VLAN serves as a logical workgroup with no
physical barriers, and allows users to share information and resources as
though located on the same LAN.