User's Manual
C1_Configuration_Manual_-_fm_1.0.0.1.doc
Commercially Confidential
47
SNMP Simple Network Management Protocol: SNMP forms part of the Internet Protocol
suite, as defined by the Internet Engineering Task Force (IETF). It is a Network management
protocol used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and
control network devices, and to manage configurations, statistics collection, performance, and
security.
SNMP2 Simple Network Management Protocol Version 2: Version 2 of the popular network
management protocol. SNMP2 supports centralized as well as distributed network
management strategies, and includes improvements in the SMI, protocol operations,
management architecture, and security.
SSID Service Set Identifier: A 32-character (maximum) unique identifier attached to the
header of packets sent over a WLAN that acts as a password when a mobile device tries to
connect to the Basic Service Set.
STP Spanning-Tree Protocol: Bridge protocol that uses the spanning-tree algorithm, enabling
a learning bridge to dynamically work around loops in a network topology by creating a
spanning tree. Bridges exchange BPDU messages with other bridges to detect loops, and then
remove the loops by shutting down selected bridge interfaces. Refers to both the IEEE 802.1
Spanning-Tree Protocol standard and the earlier Digital Equipment Corporation Spanning-Tree
Protocol upon which it is based. The IEEE version supports bridge domains and allows the
bridge to construct a loop-free topology across an extended LAN. The IEEE version generally
is preferred over the Digital version.
subnet mask A 32-bit address mask used in IP to identify the bits of an IP address that are
used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only
those selected by the mask.
telnet The standard terminal emulation protocol within the TCP/IP protocol stack. Defined
in RFC 854, it is a method of remote terminal connection, enabling users to log in to remote
networks and use those resources as if they were locally connected.
throughput Rate of information arriving at, and possibly passing through, a particular point in
a network system.
VAP Virtual Access Point: It is a logical entity that exists within a physical Access Point (AP).
When a single physical AP supports multiple “Virtual APs”, each Virtual AP appears to stations
(STAs) to be an independent physical AP, even though only a single physical AP is present.
VLAN Virtual LAN: Group of devices on one or more LANs that are configured (using
management software) so that they can communicate as if they were attached to the same wire,
when in fact they are located on a number of different LAN segments. Because VLANs are
based on logical instead of physical connections, they are extremely flexible.
VLAN tag It works by tagging each frame, i.e. an Ethernet header extension that enlarges the
header from 14 to 18 bytes. The VLAN tag contains the VLAN ID and priority.
WEP Wired Equivalent Privacy: A security protocol for wireless local area networks
(WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of
security as that of a wired LAN. LANs are inherently more secure than WLANs because
LANs are somewhat protected by the physicalities of their structure, having some or all part of
the network inside a building that can be protected from unauthorized access. WLANs, which