User manual
69
RAM
RandomAccessMemory.Agroupofmemorylocationsthatarenumericallyidentiedtoallow
high speed access by a CPU. In random access, any memory location can be accessed at any
timebyreferringtoitsnumericalidentierascomparedtosequentialaccess,wherememory
location 6 can only be accessed after accessing memory locations 1-5.
Reboot
A user activity where the user starts a computing device without interrupting its source of
electrical power.
Router
A device that determines the next network point to which a packet should be forwarded to on
itswaytoitsnaldestination.Aroutercreatesand/ormaintainsaspecialroutingtablethat
stores information on how best to reach certain destinations. A router is sometimes included
as part of a network Switch.
Server
In general, a server is a computer program that provides services to other computer programs
within the same or other computers. A computer running a server program is also frequently
referred to as a server. In practice, the server may contain any number of server and client
programs. A web server is the computer program that supplies the requested HTML pages or
lestotheclient(browser).
SHA
A Secure Hash Algorithm produces a 160-bit (20-byte) hash value typically rendered as a
hexadecimal number, 40 digits long.
Static IP
An IP address that is unchanging. It is more reliable when dealing with VoIP, online gaming,
and VPNs.
SSID
AServiceSetIdentierisasetconsistingofallthedevicesassociatedwithaWLAN.
Subnet Mask
A representation of a user’s Internet address where all of the bit positions corresponding to
the user’s network and subnetwork id are 1’s and the bit corresponding to the user’s host id
are 0’s.
Throughput
Rate of information arriving at, and possibly passing through, a particular point in a network
system.
Time-Out
Event that occurs when one network device expects to hear from another network device
withinaspeciedperiodoftime,butdoesnot.Theresultingtime-outusuallyresultsinare-
transmission of information or the dissolving of the session between the two devices.
TKIP
TemporalKeyIntegrityProtocolisastopgapsecurityprotocolusedinIEEE802.11wireless
networking standards used to replace WEP.
UID
AUniqueIdentierisauniquereferencenumberusedasanidentier.
Upload
Theactivityoftransferringalefromauser’scomputersystemtoaremotesystem.
UPnP
Universal Plug n Play is a protocol that permits networked devices to seamlessly discover
each other’s presence on the network.