User manual

69
RAM
RandomAccessMemory.Agroupofmemorylocationsthatarenumericallyidentiedtoallow
high speed access by a CPU. In random access, any memory location can be accessed at any
timebyreferringtoitsnumericalidentierascomparedtosequentialaccess,wherememory
location 6 can only be accessed after accessing memory locations 1-5.
Reboot
A user activity where the user starts a computing device without interrupting its source of
electrical power.
Router
A device that determines the next network point to which a packet should be forwarded to on
itswaytoitsnaldestination.Aroutercreatesand/ormaintainsaspecialroutingtablethat
stores information on how best to reach certain destinations. A router is sometimes included
as part of a network Switch.
Server
In general, a server is a computer program that provides services to other computer programs
within the same or other computers. A computer running a server program is also frequently
referred to as a server. In practice, the server may contain any number of server and client
programs. A web server is the computer program that supplies the requested HTML pages or
lestotheclient(browser).
SHA
A Secure Hash Algorithm produces a 160-bit (20-byte) hash value typically rendered as a
hexadecimal number, 40 digits long.
Static IP
An IP address that is unchanging. It is more reliable when dealing with VoIP, online gaming,
and VPNs.
SSID
AServiceSetIdentierisasetconsistingofallthedevicesassociatedwithaWLAN.
Subnet Mask
A representation of a user’s Internet address where all of the bit positions corresponding to
the user’s network and subnetwork id are 1’s and the bit corresponding to the user’s host id
are 0’s.
Throughput
Rate of information arriving at, and possibly passing through, a particular point in a network
system.
Time-Out
Event that occurs when one network device expects to hear from another network device
withinaspeciedperiodoftime,butdoesnot.Theresultingtime-outusuallyresultsinare-
transmission of information or the dissolving of the session between the two devices.
TKIP
TemporalKeyIntegrityProtocolisastopgapsecurityprotocolusedinIEEE802.11wireless
networking standards used to replace WEP.
UID
AUniqueIdentierisauniquereferencenumberusedasanidentier.
Upload
Theactivityoftransferringalefromauser’scomputersystemtoaremotesystem.
UPnP
Universal Plug n Play is a protocol that permits networked devices to seamlessly discover
each other’s presence on the network.