Specifications
Table Of Contents
- About This Document
- Understanding Networking and IP Addressing
- Introduction to Networking
- Networking using IP
- Niagara Considerations
- Additional Information
- Configuration and Troubleshooting Tools
- Connecting on a LAN
- Connecting with Direct Dial
- Connecting to an ISP
- Using Security Technologies
- Configuration Files Used for Communication
- Glossary
- Index

Niagara Release 2.3
Niagara Networking & Connectivity Guide
Glossary
GL-7
ABCDE
FGHIJKLMNOPQRSTUVWXYZ
leased line A leased line is a high-speed data line leased from a telecommunications carrier. It
provides a point-to-point connection between geographically dispersed sites. Data on
a leased line is private; it does not travel on a public network. Typically, they are used
to connect offices of a company into a WAN, or to connect a company to the Internet.
Also referred to as T-1 (max speed 1.544 Mbps) or T-3 (43 Mbps) lines.
localhost The friendly name for the IP address 127.0.0.1, which is the loopback address. The
loopback address is the logical network used by the local machine to address itself.
For instance, when connecting to a Niagara station running on your PC, you can open
the station using the assigned IP address for the network, or the loopback address
127.0.0.1, or the name “localhost”.
M
MAC address Media access control address. A unique address assigned to each NIC used to pass
data to and from the computing device.
N
NAT Network address translation. The use of private IP addresses is commonly teamed
with a technique called Network Address Translation (NAT) to provide access to the
Internet by hosts that require it. Typically, some device (such as a router, firewall, or
proxy server) has a supply of legitimate addresses and translates between a private
address and a public one for a host that needs access to or from the Internet.
network architecture A description of the design of the network. In this document, an architecture typically
includes both a text description and an illustration of the primary hardware and
software pieces that make up the network.
network mask The network mask is used to define the network portion of the IP address and indicate
whether the network is subnetted. For example, 255.255.255.0 is the network mask
for a class C network that has not been subnetted. The mask 255.255.192.0 is an
example of a valid mask for a subnetted class B network. Each host on a TCP/IP
network requires a subnet mask even on a single-segment network.
Niagara daemon See daemon.
Niagara Console See Console or Console window.
NIC Network interface card. These devices act as the physical interface or connection
between the computing devices (such as a printer or computer) and the network
cable. NICs can be installed in an expansion slot in each computing device, or can be
built onto the motherboard as is the case on a JACE-4/5.