R3000w/R3400/R3800 Version 1.1 |
Glossary
100Base-T
Twisted Pair connection, Fast Ethernet. Network connection for 100-Mbps networks.
10Base-2
Thin Ethernet Kabel. Network connection for 10-Mbps networks with BNC connector. T-connectors are used for the connection of equipment with BNC sockets.
10Base-T
Twisted Pair connection. Network connection for 10-Mbps networks RJ45 connector.
3DES (Triple DES)
See DES .
1TR6
D-channel protocol used in the German ISDN. Today the more common protocol is DSS1 .
Access list
A rule that defines a set of packets that should or should not be transmitted by the gateway.
Access Point
An active component of a network that consists of wireless and additionally of wired components if applicable. Several WLAN clients can register at an access point (AP) and can thus exchange data via the AP. If optionally a wired Ethernet is connected, the signals between the two physical media, the wireless interface and the wired interface, are bridged (Bridging).
Accounting
Recording of connection data, e.g. date, time, connection duration, charging information and number of data packets transferred.
Active Probing
Per default access points answer requests of a client. This function is also applied with Active Probing, where clients send probe requests on all channels and wait for a nearby access point to reply. The acces point answers with its SSID of the wireless LAN and if WEP encryption is used.
ADSL
Asymmetric Digital Subscriber Line
The data rate is up to 640 kbps upstream and 1.5 - 9 Mbps downstream over ranges of up to 5.5 km (ITU-T standard G.992.1 ).
The main ADSL applications are: Internet access, video-on-demand (digital and compressed) and high speed data transfer.
AH
Authentication Header
One of the two principal IPSec protocols, used for authentication only, Data encryption is not supported.
ARP
Address Resolution Protocol
ARP belongs to the TCP/IP protocol family . ARP resolves IP addresses into their corresponding MAC addresses .
Asynchronous transmission
A method of data transmission in which the time intervals between transmitted characters can vary in length. This allows computers and peripheral devices to intercommunicate without being synchronized by clock signals. The beginning and end of the transmitted characters must be marked by start and stop bits - in contrast to synchronous transmission .
ATM
Asynchronous Transfer Mode
The ATM technology can be used to implement switched, connection-based LANs and WANs. It permits a theoretically unlimited number of high speed leased lines dedicated to network users for use between users and to servers. ATM is based on fast cell switching, which allows variable bit rates and supports different types of data traffic, such as voice, video and data.
BACP/BAP
Bandwidth Allocation Control Protocols (BACP/BAP according to RFC 2125)
A protocol used for bandwidth management. BACP/BAP manages adding or droppig B-channels. BAP uses three different requests, to manage changes in bandwidth allocation: Call Request, Callback Request and Link Drop Request.
B-channel
A bearer channel of an ISDN Basic Rate Interface or a Primary Rate Interface for the transmission of traffic (voice, data). An ISDN Basic Rate Interface consists of two B-channels and one D-channel . A B-channel has a data transmission rate of 64 kbps.
The data transmission rate of an ISDN Basic Rate Interface with your router can be increased to up to 128 kbps using channel bundling .
Block Cipher Modes
Block ciphers take a fixed-size block of data (usually 64 bits), and transform it to another block of the same size using a function selected by the key.
Blowfish
An algorithm developed by Bruce Schneier. It is a block cipher with a 64-bit block size and variable length keys (up to 448 bits).
BOD
Bandwidth on Demand
Bandwidth on Demand is an extended method of channel bundling , in which it is also possible to connect dialup connections to leased lines or to configure dialup connections as a backup facility for leased lines.
BootP
Bootstrap protocol
Based on UDP or IP protocol . Automatically assigns an IP address . DIME Tools contain a BootP server that you can start on your PC to assign the as yet unconfigured router an IP address.
Bridge
Network components for connecting homogeneous networks. As opposed to a router , bridges operate at layer 2 (data link layer) of the OSI model , are independent of higher-level protocols and transmit data packets using MAC addresses . Data transmission is transparent, which means the information contained in the data packages is not interpreted.
Bridges are used to physically decouple networks and to reduce network data traffic. This is done by using filter functions that allow data packets to pass to certain network segments only.
Some bintec routers can be operated in Bridging Mode.
Broadcast
Broadcasts (data packages) are sent to all stations in a network in order to exchange information. Generally, there is a certain address (broadcast address) in the network that allows all stations to interpret a message as a broadcast.
Bus
A data transmission medium for use by all the devices connected to a network. Data is forwarded over the entire bus and received by all devices on the bus.
CA
Certificate Authority
See Certificate .
Called party number
Number of the terminal called.
Calling party number
Number of the calling terminal.
CAPI
Common ISDN Application Programming Interface
A software interface standardized in 1989 that allows application programs to access ISDN hardware from the PC. Most ISDN-specific software solutions work with the CAPI interface. Such communications applications enable you, for example, to send and receive faxes or transfer data over the ISDN from your PC. See also Remote CAPI .
CAST
A 128-bit encryption algorithm whose operation is similar to DES. See Block Cipher Modes .
CBC
Cipher Block Chaining
A plaintext block is combined with the encryption result of the previous block and the resulting value is encrypted. This procedure requires an Initialization Vector (IV) for the first block. See Block Cipher Modes .
Certificate
A certificate identifies someone or something, an individual, a company, or an application. The certificate associates that identity with a public key. Public-key certificates are data blocks which provide a safe method of distributing public keys. Public-key certificates are certified by an issuing organization called a certification authority (CA).
CCITT
Consultative Committee for International Telegraphy and Telephony
A predecessor organization of the ITU that passed recommendations for the development of communications standards for public telephony and data networks and data transmission interfaces.
Channel bundling
Channel bundling
Function of your router. Channel bundling is a method of increasing the data throughput. The data throughput is doubled by switching in a second B-channel for data transmission. Channel bundling can be either dynamic (= on demand) or static (= always).
CHAP
Challenge Handshake Authentication Protocol
A security mechanism during the establishment of a connection with a WAN partner using PPP . This protocol is used for checking the WAN partner name and the password defined for the WAN partner. If the partner name and password at both ends are not the same, a connection is not set up. The user name and password are encoded in CHAP before they are sent to the partner - as opposed to PAP .
CLID
Calling Line Identification
A security mechanism during the establishment of a connection with a WAN partner . A caller is identified by means of his ISDN extension number before the connection is established. If the extension number is not the same as the extension number you have defined for a WAN partner, a connection is not established.
Client
A client uses the services provided by a server . Clients are usually workstations.
Configuration Manager
Windows application (similar to the Windows Explorer), which uses SNMP commands to request and carry out the settings of your router. The application was called the DIME Browser before BRICKware version 5.1.3.
Data compression
A process for reducing the amount of data transmitted. This enables higher throughput to be achieved in the same transmission time. Examples of this technique include STAC , VJHC and MPPC .
Datagram
A self-contained data packet that is forwarded in the network with minimum protocol overhead and without an acknowledgment mechanism.
Data packet
A data packet is used for information transfer. Each data packet contains a prescribed number of characters (information and control characters).
DCE
Data Circuit-Terminating Equipment
Data Circuit-Terminating Equipment (see V.24 )
D-channel
Control and signaling channel of an ISDN Basic Rate Interface or Primary Rate Interface . The D-channel has a data transmission rate of 16 kbps. In addition to the D-channel, each ISDN BRI has two B-channels .
DCN
Data communications network
Denial-Of-Service Attack
A Denial-of-Service (DoS) attack is an attempt to flood a router or a host in a LAN with forged requests so that it is completely overloaded. This means, the system or a certain service can no longer be used.
DES
Data Encryption Standard
A block cipher with 64-bit block size. It uses 56-bit keys. A safer variant of DES, Triple-DES or 3DES is based on using DES three times (i.e. encrypt-decrypt-encrypt sequence with either two or three different, unrelated keys).
DHCP
Dynamic Host Configuration Protocol
A Microsoft protocol that provides a mechanism for dynamic assignment of IP addresses . A DHCP server allocates each client in a network an IP address from a defined address pool compiled by the system administrator. Prerequisite: TCP/IP must be configured at the clients so that they can request their IP address from the server. Your bintec router can be used as a DHCP server.
Dialup connection
A connection is set up when required by dialing an extension number, in contrast to a leased line .
DIME
Desktop Internetworking Management Environment
DIME Tools are a collection of tools for configuration and monitoring of routers over Windows applications. They are included with all bintec routers free of charge.
DIME Browser
Old name for Configuration Manager .
Direct dialing range
See extension numbers range
DMZ
DeMilitarized Zone
This is a separate network located between the internal LAN and the Internet. The DMZ is more trustworthy than the Internet, but the DMZ computers do not receive the same rights as the computers in the internal LAN. The DMZ is the place for all services that have to make direct contact with the Internet. If a Web or mail server is attacked, this has no effect on the security of your internal network.
DNS
Domain Name System
Each device in a TCP/IP network is usually located by its IP address . Because host names are often used in networks to reach different devices, it is necessary for the associated IP address to be known. This task can be performed by a DNS server. which resolves the host names into IP addresses. Alternatively, name resolution can also take place over the HOSTS file, which is available on all PCs.
DOI
Domain Of Interpretation
The DOI for IPSec specifies all the parameters associated with the ISAKMP/Oakley protocols, and assigns them unique identifiers.
Domain
A domain refers to a group of devices in a network, whose host names share a common suffix, the domain name. Thus, in the Internet , a part of a naming hierarchy (e.g. bintec.net).
Downstream
Data transmission rate from the ISP to the client.
DSA (DSS)
Digital Signature Algorithm (Digital Signature Standard). A signature-only mechanism supported by the United States government. Its design criteria have not been made public. Regarding key generation, DSA is faster than RSA. On the other hand, regarding key computation, DSA is slower than RSA.
DSL/xDSL
Digital Subscriber Line
Data transmission technique that enables high transmission rates to be achieved on normal telephone lines. The data rate is dependent on the distance to be covered and the quality of the line.
xDSL is used as a bookmark for the different DSL variants, such as ADSL , RADSL , VDSL , HDSL , SDSL , U-ADSL , etc., which are part of the family of DSL techniques.
DSS1
Digital Subscriber Signalling System.
A common D-channel protocol used in the Euro ISDN.
DTE
Data Terminal Equipment
Data Terminal Equipment (see V.24 )
DTMF
Dual Tone Multi Frequency (tone dialing system)
Dialing method for telephony systems. In this method, pressing a key on the telephone keypad generates two simultaneous tones, which are correspondingly evaluated by the PABX or exchange.
E1/T1
E1: European variant of the 2.048 Mbps ISDN Primary Rate Interface , which is also called the E1 system.
T1: American variant of the ISDN Primary Rate Interface with 23 basic channels and one D-channel (1.544 Mbps).
EAZ
Terminal Selection Digit
Is only used in the 1TR6 system and designates the last digit of an extension number. It is used for dialing various terminals connected to the ISDN Basic Rate Interface (e.g. fax). This occurs by attaching one digit between 0 and 9 to the actual ISDN telephone number. In Euro ISDN (DSS1), the complete extension number, MSN , is transferred instead of the EAZ.
ECB
Electronic Code Book mode
If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same. See Block Cipher Modes .
Encapsulation
Encapsulation of data packets in a certain protocol for transmitting the packets over a network that the original protocol does not directly support (e.g. NetBIOS over TCP/IP).
Encryption
Refers to the encoding of data, e.g. MPPE .
ESP
Encapsulating Security Payload
One of the two principal IPSec protocols, supporting data encryption as well as authentication.
Ethernet
A local network that connects all devices in the network (PC, printers, etc.) via a twisted pair or coaxial cable.
Extension
An extension is an internal number for a terminal or subsystem. In point-to-point ISDN accesses , the extension is usually a number from the extension numbers range assigned by the telephone provider. In point-to-multipoint connections, it can be the MSN or a part of the MSN.
Extension numbers range
(direct dialing range)
A point-to-point ISDN access includes a PABX number and an extension numbers range. The PABX number is used to reach the PABX. The extension numbers range is a group of numbers used for selecting terminals within the PABX .
Filters
A filter comprises a number of criteria (e.g. protocol, port number, source and destination address). These criteria can be used to reject a packet from the traffic flow. Such a packet can then be handled in a specific way. For this purpose, a certain action is associated with the filter, which creates a filter rule.
Firewall
Designates the whole range of mechanisms to protect the local network against external access. Your router provides protection mechanisms such as NAT , CLID , PAP/CHAP , access lists, etc.
FTP
File Transfer Protocol
A TCP/IP protocol used to transfer files between different hosts.
G.991.1
Data transmission recommendation for HDSL
G.991.2
Data transmission recommendation for SHDSL
G.992.1
Data transmission recommendation for ADSL: ITU-T G.992.1
See also G.992.1 Annex A and G.992.1 Annex B .
G.992.1 Annex A
Data transmission recommendation for ADSL: ITU-T G.992.1 Annex A
Annex A of the recommendation describes the transmission of ADSL data over POTS lines upstream in the frequency range from 25 kHz to 138 kHz and downstream from 138 kHz to 1104 kHz. Annex A is used mainly in countries in which ISDN is not widespread, e.g. France.The bintec X2300 router support this recommendation.
G.992.1 Annex B
Data transmission recommendation for ADSL: ITU-T G.992.1 Annex B
Annex B of the recommendation describes the transmission of ADSL data over ISDN lines upstream in the frequency range from 138 kHz to 276 kHz and downstream from 276 kHz to 1104 kHz.The bintec X2300i and X2300is routers support this recommendation.
Gateway
Entrance and exit, transition point
Component in the local network that offers access to other networks, also offers transitions between different networks, e.g. LAN and WAN .
G.SHDSL
See G.991.2 and SHDSL
hashing
The process of deriving a number, called a hash, from a string of text. A hash is usually much smaller than the text stream from which it originated. The hashing algorithm is designed to generate the hash with a very low probability that hashing a different meaningful text string might generate an identical hash value.
Encryption devices use hashing to ensure that intruders have not modified transmitted messages.
HDSL
High Bit Rate DSL
The upstream and downstream data rates are: for T1 1.554 Mbps and for E1 2.048 Mbps over ranges up to 4 km. Data transfer is performed using one, two or three wire pairs.
Since HDSL occupies the baseband, no baseband services like ISDN or POTS can be offered using the same line. The primary application of HDSL is high speed data transfer over leased lines.
HDSL2
High Bit Rate DSL , version 2
The upstream and downstream data rate is 1.554 Mbps over ranges up to 4 km. Data transfer is performed using a single wire pair.
Since HDSL2 occupies the baseband, no baseband services like ISDN or POTS can be offered using the same line. The primary application of HDSL2 is high speed data transfer over leased lines.
HMAC
Hashed Message Authentication Code
A message authentication mechanism that uses cryptographic hashing functions such as MD5 and SHA-1, in combination with a shared secret key. HMAC allows easy replacement of the underlying hashing function, as when security requirements change or when faster or more secure hashing functions become available.
HMAC-MD5
Hashed Message Authentication Code - using Message Digest version 5 algorithm.
HMAC-SHA1
Hashed Message Authentication Code - using Secure Hash Algorithm version 1
Host name
A name used in IP networks instead of the corresponding IP address . A host name consists of an ASCII string that uniquely identifies the host computer.
Hub
Network component used to connect several network components together to form a local network (star-shaped).
ICMP
Internet Control Message Protocol
An extension to the Internet Protocol ( IP ), which permits IP-based error messages, test packets and information messages. Defined in STD 5, RFC 792.
ICV
Integrity Check Value
Usually an HMAC algorithm using Message Digest 5 (MD5) or SHA-1 hash functions checks if data has been modified.
IETF
Internet Engineering Task Force
Internet
The Internet consists of a range of regional, local and university networks. The IP protocol is used for data transmission in the Internet.
IP
Internet Protocol
One of the TCP/IP suite of protocols used for the connection of Wide Area Networks ( WANs ).
IP address
The first part of the address by which a device is identified in an IP network, e.g. 192.168.1.254. See also netmask .
IPComP
IP payload compression
IPComP is a protocol to reduce the size of IP datagrams. This protocol will increase the overall communication performance between a pair of communicating hosts/gateways ("nodes") by compressing the datagrams, provided the nodes have sufficient computation power, through either CPU capacity or a compression coprocessor, and the communication is over slow or congested links.
IPoA
IP over ATM
IPoA enables IP data packets to be transported directly over an ATM network (RFC 2684).
ISDN
Integrated Services Digital Network
The ISDN is a digital network for the transmission of voice and data. There are two possible subscriber connections for ISDN, the ISDN Basic Rate Interface and the Primary Rate Interface . ISDN is an international standard. For ISDN protocols, however, there is a range of variations.
ISDN Basic Rate Interface
An ISDN subscriber interface. The Basic Rate Interface consists of two B-channels and a D-channel . Compare Primary Rate Interface .
The interface to the subscriber is provided by an S0 bus .
ISDN BRI
ISDN Basic Rate Interface
ISDN Basic Rate Interface , also S0 interface .
ISDN Login
Function of your router. Your router can be configured and administrated remotely using ISDN Login. ISDN Login operates on routers in the ex works state as soon they are connected to an ISDN connection and therefore reachable via an extension number.
ISDN PRI
ISDN Primary Rate Interface
ISDN Primary Rate Interface , also S2M interface .
ISO
International Standardization Organization
An international organization for the development of world-wide standards, e.g. OSI model .
ISP
Internet Service Provider
Allows companies or private individuals access to the Internet.
ITU
International Telecommunication Union
International organization that co-ordinates the construction and operation of telecommunications networks and services.
Key Escrow
Escrowed keys can be accessed by the government. Particularly the US government establishes key escrows to handle the problem that criminals could hide their criminal acts by encrypting their data.
LAN
Local Area Network
A network covering a small geographic area and controlled by its owner. Usually within the confines of a building or corporate center.
Layer 1
Layer 1 of the ISO OSI Model , the bit transfer layer.
LDAP
Lightweight Directory Access Protocol
LDAP is a lightweight version of the X.500 client access Directory Access Protocol (DAP), which specifies how a client accesses a directory server. LDAP was defined by the IETF in order to encourage adoption of X.500 directories. LDAP defines a relatively simple protocol for updating and searching directories running over TCP/IP (default port is 389).
Leased line
Leased line
Fixed connection to a subscriber. In contrast to a dialup connection , neither an extension number nor connection setup or clearing is necessary.
MAC address
Every device in the network is defined by a fixed hardware address (MAC address). The network card of a device defines this internationally unique address.
Man-in-the-Middle Attack
Public key encryption presupposes the exchange of the public encryption keys. During this exchange, the unprotected keys could be easily intercepted and open the possibility of the "man-in-the-middle" attack. The attacker could plant his or her own key early in the process so actually a key known to the "man-in-the-middle" would be used instead of the party’s key you believed to communicate with.
MD5
See HMAC-MD5 .
MIB
Management Information Base
The MIB is a database that describes all the manageable devices and functions connected to a network. All MIBs (including the bintec MIB) contain objects specific to the manufacturer. SNMP is based on MIB.
Modem
Modulator/Demodulator
An electronic device used to convert digital signals to analog tone signals and vice versa, so that data can be transmitted in an analog medium.
MPPC
Microsoft Point-to-Point Compression
data compression procedure for
MPPE
Microsoft Point-to-Point Encryption
Data encryption process.
MSN
Multiple Subscriber Number
Multiple number for an ISDN BRI in Euro ISDN. The MSN is the extension
number that permits a terminal to be addressed specifically on the S
Usually three such MSNs are assigned to each ISDN BRI (point-to-multipoint connection) in Germany.
MSSID
see SSID
Multiprotocol router
A router that can route several protocols, e.g. IP , X.25 , etc.
NAT
Network Address Translation
Security mechanism of your router. Using NAT conceals your complete network to the outside world. The IP addresses of all devices in your own network remain confidential, only one IP address is made known for connections to the outside.
NetBIOS
Network Basic Input Output System
A programming interface that activates network operations on a PC. It is a set of commands for transmitting and receiving data to and from other Windows PCs on the network.
Netmask
The second part of an address in an IP network, used for identification of a device, e.g. 255.255.255.0. See also IP address .
Network address
A network address designates the address of a complete local network.
NT
Network Termination
An NT adapter is the network termination unit of an ISDN
connection. In Germany, this is obtained from Deutsche Telekom AG. It
is used to connect a private network (
S
NTBA
Network Termination for Basic Access.
An NTBA adapter is the network termination unit of an ISDN Basic Rate Interface. In Germany, this is obtained from Deutsche Telekom AG. It is used to connect a private network ( S0 bus ) to the public ISDN network. It is equivalent to the terminal socket used for connecting an analog telephone.
OAM
Operation and Maintenance
Monitor functions for the administrator of the ADSL line.
OSI model
OSI = Open Systems Interconnection
ISO reference model for networks. Defines interface standards between computer manufacturers for software and hardware requirements.
OSPF
Open Shortest Path First
Routing protocol used in networks to exchange information (routing tables) between routers .
PABX
Private Automatic Branch Exchange
An ISDN PABX is a telephone exchange with S0 interface and 1TR6 or other manufacturer-specific D-channel protocols on the subscriber side.
Exchanges allow internal connections between the PABX extensions without the need to connect to the telephone service provider. Not all bintec routers contain an exchange.
An ISDN PABX is used to set up an internal telephone infrastructure. Both analog terminals (e.g. fax, modem) and digital terminals can be connected to a PABX. The internal network provides free telephoning and connection switching. The individual terminals are given different extension numbers.
PABX number
A point-to-point ISDN access includes a PABX number and an extension numbers range . The PABX number is used to reach the PABX. A certain terminal of the PABX is then dialed via one of the numbers of the extension numbers range.
PAP
Password Authentication Protocol
Authentication process for connecting over PPP . Functions like CHAP , except that the user name and password are not encoded before being transmitted to the partner.
PGP
Pretty Good Privacy
A cryptographic authentication scheme typically used by internet e-mail users to authenticate the identity of the sending party, and the integrity of their message.
PKCS
Public-Key Cryptography Standards
The PKCS are a set of standards for public-key cryptography. The PKCS are designed for binary and ASCII data and are also compatible with the ITU-T X.509 standard. The published standards are PKCS #1, #3, #5, #7, #8, #9, #10, #11, #12, and #15. PKCS #10 describes syntax for certification requests.
Ping
Packet Internet Groper
Command that can be used to determine the range to remote network components. Ping is also used for test purposes to determine if the remote device can actually be reached at all.
Point-to-multipoint
Point-to-multipoint
Feature of a connection that is permanently connected between three or more data stations or set up via switching systems.
Point-to-multipoint connection
Point-to-multipoint ( Point-to-multipoint )
Several different terminals can be connected to a point-to-multipoint connection. The individual terminals are addressed via certain extension numbers ( MSN s).
Point-to-point
Point-to-point
Feature of a connection between two data stations only. The connection can be permanently switched or set up via switching systems.
Point-to-point ISDN access
Point-to-point ( point-to-point )
A point-to-point ISDN access is used for the connection of a PABX . The PABX can forward calls to a number of terminals. A point-to-point access includes a PABX number , via which the PABX is reached from outside and a group of numbers ( extension numbers range ), with which the terminals connected to the PABX can be dialed.
Port
Input/output
The port number is used to decide to which service (telnet, WWW) an incoming data packet should be sent.
POTS
Plain Old Telephone System
The traditional analog telephone network.
PPP
Point-to-Point Protocol
A protocol suite for authentication of the connection parameters of a point-to-point connection . PPP is used to connect local networks over the WAN . Multiprotocol packets are encapsulated ( encapsulation ) in a standard format before transmission. Establishing a connection involves a number of other components and subprotocols, such as the authentication mechanisms PAP/CHAP .
PPP authentication
Security mechanism. A method of authentication using passwords in PPP .
PPPoA
Point to Point Protocol over Ethernet ATM
The PPP-over-ATM (PPPoA) protocol enables PPP data packets to be transported directly over an ATM network (RFC 2364).
PPPoE
Point to Point Protocol over Ethernet
The PPP-over-Ethernet (PPPoE) protocol permits Internet access over Ethernet via an xDSL modem or xDSL router (RFC 2516).
Primary Rate Interface (PRI)
An ISDN subscriber interface. The PRI consists of a D-channel and 30 B-channels (in Europe). (In America: 23 B-channels and a D-channel.) Compare ISDN Basic Rate Interface .
Protocol
Protocols are used to define the manner and means of information exchange between two systems. Protocols control and rule the course of data communication at various levels (decoding, addressing, network routing, control procedures, etc.).
Proxy ARP
ARP = Address Resolution Protocol
Process used to determine the associated MAC address for a host whose IP address is known.
RADSL
Rate-Adaptive Digital Subscriber Line
The data rate is up to 640 kbps upstream and 1.5 - 9 Mbps downstream over ranges of up to 18.5 km.
The main RADSL applications are: Internet access, video-on-demand (digital and compressed) and high speed data transfer.
Real Time Clock (RTC)
Hardware clock with buffer battery
Remote
Remote, as opposed to local.
If a far station is not located in your own local network (LAN), but in another LAN, this is referred to as remote.
This LAN must be connected to the local LAN over a WAN connection (over your router).
Remote access
Opposite to local access, see Remote .
Remote CAPI
bintec’s own interface for CAPI .
The Remote CAPI interface enables all subscribers of a network to use CAPI services, but over your router to a single ISDN connection. All subscribers must have the corresponding application software installed to support the CAPI interface. This standard interface is, however, used by most communications applications.
The bintec CAPI interface is implemented as a dual-mode CAPI. CAPI 1.1 and 2.0 applications can access ISDN resources parallel to one another. This means new CAPI 2.0 applications can be used on the network or on the same PC parallel to old applications based on CAPI 1.1.
Rijndael (AES)
Rijndael (AES) has been chosen as AES for its quick key setup, low
memory requirements and for its high security against attacks. For more
information about the AES, see
RipeMD 160
RipeMD 160 is a 160-bit cryptographic hash function. It is intended to be used as a more secure replacement for MD5 and RipeMD.
RIP
Routing Information Protocol
Routing protocol used in networks to exchange information (routing tables) between routers .
RJ45
Plug or socket for maximum eight wires. Connection for digital terminals.
Router
A device that connects different networks at layer 3 of the OSI model and routes information from one network to the other.
Routers are able to recognize blocks of information and evaluate addresses (as opposed to a bridge , which operates with a transparent protocol). The best paths (routes) from one point to another are chosen by using routing tables. In order to keep the routing tables up to date, routers exchange information between themselves via routing protocols (e.g. OSPF , RIP ).
Modern routers like your router are multiprotocol routers and thus capable of routing several protocols (e.g. IP and X.25).
RSA
The RSA (named after its inventors Rivest, Shamir, Adleman) algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time.
RSA Signature provides non-repudiation for authentication, RSA Encryption provides for confidentiality
S
All ISDN sockets and the NTBA
of an ISDN point-to-multipoint connection. All S
S
See ISDN Basic Rate Interface
S
See ISDN Primary Rate Interface
SAD
The Security Association Database contains information about each SA (while an SA is a sort of instance for an SPD entry), such as AH or ESP algorithms and keys, sequence numbers, protocol mode and SA lifetime. For outbound processing, an SPD entry points to an entry in the SAD. That is, the SPD determines which SA is to be used for a given packet. For inbound processing, the SAD is consulted to determine how the packet must be processed.
SDSL
Symmetric Digital Subscriber Line
Symmetric data transmission: Upstream and downstream data rates range from 128 kBit/s to 2.32.M/Bits/s over ranges up to 3.5 km. Data transfer is performed using a single wire pair.
Since SDSL occupies the baseband, no baseband services like ISDN or POTS can be offered using the same line.
Server
A server offers services used by clients . Often refers to a certain computer in the LAN, e.g. DHCP server.
In client-server architecture, a server is the software part that executes functions for its clients, e.g. TFTP server . In such a case, the server is not necessarily a computer server.
Setup Tool
Menu-driven tool for the configuration of your router. The Setup Tool can be used as soon as the router has been accessed (serial, ISDN Login , LAN ).
SHA1
See HMAC-SHA .
SHDSL
Symmetric High Bit Rate Digital Subscriber Line
SHDSL is a DSL variant similar to HDSL . Upstream and downstream data rates range from 192 kBit/s to 2.32.M/Bits/s in 2 Wire Mode and from 384 kBit/s to 4.64 MBit/s in 4 Wire Mode.The bintec gateway supports data rates from 192 kBit/s in 4 wire Mode, also. 4 Wire Mode can thus be used to either increase data transfer rates or the supported line length.
Since SHDSL occupies the baseband, no baseband services like ISDN or POTS can be offered using the same line. The primary application of SHDSL is high speed data transfer.
Short hold
Is the defined amount of time, after which a connection is cleared if no more data is transmitted. Short hold can be set to static (fixed amount of time) or dynamic (according to charging unit).
SNMP
Simple Network Management Protocol
A protocol in the TCP/IP protocol suite that is used to transport management information about network components. Every SNMP management system contains an MIB . SNMP can be used to configure, control and administrate various network components from one system. Such an SNMP tool is included in your router, the Configuration Manager . As SNMP is a standard protocol, you can use any other SNMP managers, e.g. HP OpenView.
SNMP shell
Input level for SNMP commands.
SOHO
Small Offices and Home Offices
Small offices and home offices.
SPD
The Security Policy Database specifies the security services offered to the IP traffic. These security services depend on parameters such as source, destination of the packet, etc.
Spoofing
Technique for reducing data traffic (and thus saving costs), especially in WANs.
The router answers as proxy for remote PCs to cyclically transmitted data packets with monitoring function (e.g. sign of life messages).
SSL
Secure Sockets Layer
A technology developed by Netscape, and now standardized, usually used to secure HTTP traffic between a web browser and a web server.
SSID
The ID of a wireless LAN that is based on IEEE 802.11 is called Service Set Identifier (SSID) or Network Name.
Every wireless LAN has a configurable so-called SSID to clearly identify the specific wireless LAN. It is thus the name of the wireless network.
The SSID can be a string of maximum 32 characters. It is configured at the basic station (access point) of a wireless LAN and at all clients that are to access it. All packets contain this string unencrypted.
In a special case, the SSID ANY can be configured at the client. Thus, in case a client wants to access a wireless LAN, all reachable access points will send an SSID broadcast, so that the desired access can be chosen from a list.
If an access point is to operate as basic station in several wireless LANs, each wireless LAN is assigned an own MSSID (Multi Service Set Identifier).
STAC
Data compression procedure.
Subnet
A network scheme that divides individual logical networks into smaller physical units to simplify routing.
Switch
LAN switches are network components with a similar function to bridges or even routers . They switch data packets between the input and output port. In contrast to bridges, switches have several input and output ports. This increases the bandwidth in the network. Switches can also be used for conversion between networks with different speeds (e.g. 100-Mbps and 10-Mbps networks).
Synchronous
Transmission process in which the transmitter and receiver operate with exactly the same clock signals - in contrast to asynchronous . Spaces are bridged by a stop code.
TAPI
Telephony Application Program Interface
Standard Microsoft software interface used by many telephony programs. Telephony programs enable database-supported telephoning on the PC, such as the Windows utility. TAPI services are only supported by routers with an integrated PABX .
All users of a network can use TAPI services via the bintec Remote TAPI.
TCP
Transmission Control Protocol
One of the TCP/IP suite of protocols used for the connection of Wide Area Networks ( WANs ).
TCP/IP
Transmission Control Protocol/Internet Protocol
A protocol suite for the connection of Wide Area Networks ( WANs ). The two parts of this protocol suite are IP (layer 3 of the OSI model) and TCP (layer 4 of the OSI model).
T-DSL
Product name used by Deutsche Telekom AG for its DSL services and products.
TE
Terminal Equipment
Terminal equipment for subscriber access, e.g. telephone, fax or PC.
TEI
Terminal Endpoint Identifier
The TEI in ISDN is an address field in layer 2 that is used for identifying a certain terminal.
Telematics
Telematics is a combination of telecommunication and computer technology and describes data communication between systems and devices.
Telnet
Protocol from the TCP/IP protocol suite . Telnet enables communication with a remote device in the network.
TFTP
Trivial File Transfer Protocol
Protocol for data transmission.
TFTP server software is a part of DIME Tools . It is used for the transfer of configuration files and software to and from the router.
Tiger 192
Tiger 192 is a fairly new and very fast hash algorithm.
TLS
Transport Layer Security
The TLS protocol provides communications privacy over the internet. The
protocol allows client/server applications to communicate in a way that
is designed to prevent eavesdropping, tampering, or message forgery. It
is based on SSL 3.0 and is intended as successor of that protocol.
Refer to
Twofish
Twofish was one of the final candidates for AES (Advanced Encryption Standard). It can be considered equally secure as Rijndael (AES), but is slower.
U-ADSL
Universal Asymmetric Digital Subscriber Line
This version of ADSL technology allows the parallel use of various communication techniques, e.g. ISDN and POTS . It is designed to serve as a worldwide standard in spite of different communication technologies, line qualities and line lengths.
The use of a splitter is not intended. The data rate is up to 512 kbps upstream and up to 1.5 Mbps downstream over ranges of up to 5.5 km.
UDP
User Datagram Protocol
A transport protocol similar to TCP . UDP offers no control or acknowledgment mechanisms, but is faster than TCP. UDP is connectionless in contrast to TCP.
Upstream
Data transmission rate from the client to the ISP .
URL
Universal/Uniform Resource Locator
Address of a file on the Internet
V.11
ITU-T recommendation for balanced dual-current interface lines (up to 10 Mbps).
V.24
CCITT and ITU-T recommendation that defines the interface between a PC or terminal as Data Terminal Equipment ( DTE ) and a modem as Data Circuit-terminating Equipment ( DCE ).
V.28
ITU-T recommendation for unbalanced dual-current interface line.
V.35
ITU-T recommendation for data transmission at 48 kbps in the range from 60 to 108 kHz.
Depending on the quality and length of cable used, the connector type and the min./max. acceptable speed on the DTE side, appreciably higher data transmission rates are possible. Up to 8 Mbps are possible over a short distance of up to 5 m if shielded twisted-pair cables are used.
Modem for V.35 .
V.42bis
Data compression procedure.
V.90
ITU standard for 56 kbps analog modems. In contrast to older V.34 modems, data is sent in digital form to the client when the V.90 standard is used and does not need to be first converted from digital to analog on one side of the modem (provider), as was the case with V.34 and earlier modems. This makes higher transmission rates possible. A maximum speed of 56 kbps can be achieved only under optimum conditions.
VDSL
Very high bit rate Digital Subscriber Line (also called VADSL or BDSL).
The data rate is 1.5 to 2.3 Mbps upstream and 13 to 52 Mbps downstream over ranges of 300 m to 14 km.
The main VDSL applications are: as for ADSL , but at higher transmission rates and with synchronization over short ranges.
VJHC
Van Jacobson Header Compression
data compression procedure for IP header compression.
VLAN
Virtual LAN
A logical, not physical, group of devices, defined by software. VLANs allow network administrators to resegment their networks without physically rearranging the devices or network connections.
VPN
Virtual Private Network
The use of existing structures such as the Internet structure for connecting private networks (e.g. SOHO exchange). The data can be encrypted between the two endpoints of the VPN to meet increased security requirements.
VSS
Virtual Service Set
Prefix of a wireless LAN interface
WAN
Wide Area Network
Wide Area Network connections, e.g. over ISDN, X.25.
WAN interface
WAN interface
WAN interfaces connect the local network to the ( WAN ). This is usually done by means of analog or digital telephone lines ( switched or leased lines ).
WAN partner
Remote station that is reached over a WAN , e.g. ISDN.
X.21
The X.21 recommendation defines the physical interface between two network components in packet-switched data networks (e.g. Datex-P).
X.21bis
The X.21bis recommendation defines the DTE / DCE interface to V-series synchronous modems.
X.25
An internationally agreed standard protocol that defines the interface between network components and a packet-switched data network.
X.31
ITU-T Recommendation on the integration of X.25-compatible DTEs in ISDN (D-channel).
X.500
The set of ITU-T standards covering electronic directory services, compare: LDAP . For example, white pages is a directory service for locating individuals by name (by analogy with the telephone directory). The internet supports several databases that contain basic information about users, such as electronic mail addresses, telephone numbers and postal addresses. These databases can be searched to get information about particular individuals.
X.509
The set of ITU-T standards defining the format of certificates and certificate requests as well as their use.