Installation manual
Chapter 7: Glossary
Page 83
RJ-11 Registered Jack Standard-11
The standard plug used to connect telephones, fax machines, modems,
etc. to a telephone port. It is a 6-pin connector usually containing four
wires.
RJ-45 Registered Jack Standard-45
The 8-pin plug used in transmitting data over phone lines. Ethernet cabling
usually uses this type of connector.
routing Forwarding data between your network and the Internet on the most
efficient route, based on the data’s destination IP address and current
network conditions. A device that performs routing is called a router.
SDNS Secondary Domain Name System (server)
A DNS server that can be used if the primary DSN server is not available.
See DNS.
SSID Service Set Identifier (also known as the Extended Service Set Identifier
(ESSID)) is a unique identifier that differentiates one wireless device from
another. Wireless PCs configured with the same SSID can access that
device.
subnet A subnet is a portion of a network. The subnet is distinguished from the
larger network by a subnet mask that selects some of the computers of the
network and excludes all others. The subnet's computers remain physically
connected to the rest of the parent network, but they are treated as
though they were on a separate network. See network mask.
subnet mask A mask that defines a subnet. See network mask.
TCP See TCP/IP.
TCP/IP Transmission Control Protocol/Internet Protocol
The basic protocols used on the Internet. TCP is responsible for dividing
data up into packets for delivery and reassembling them at the destination,
while IP is responsible for delivering the packets from source to
destination. When TCP and IP are bundled with higher-level applications
such as HTTP, FTP, Telnet, etc., TCP/IP refers to this whole suite of
protocols.
Telnet An interactive, character-based program used to access a remote
computer. While HTTP (the web protocol) and FTP only allow you to
download files from a remote computer, Telnet allows you to log into and
use a computer from a remote location.
TFTP Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File Transfer
Protocol (FTP) but not as capable or secure.
triggers Triggers are used to deal with application protocols that create separate
sessions. Some applications, such as NetMeeting, open secondary
connections during normal operations, for example, a connection to a
server is established using one port, but data transfers are performed on a
separate connection. A trigger tells the device to expect these secondary
sessions and how to handle them.
Once you set a trigger, the embedded IP address of each incoming packet
is replaced by the correct host address so that NAT can translate packets
to the correct destination. You can specify whether you want to carry out
address replacement, and if so, whether to replace addresses on TCP
packets only, UDP packets only, or both.