Installation Manual

Table Of Contents
Glossary
98-169085-B 143
I
ICMP Internet Control Message Protocol. An Internet protocol mostly used for diagnostics.
IMEI International Mobile Equipment Identity. A unique number identifying your terminal.
IMSI International Mobile Subscriber Identity. A unique number used to identify a mobile
subscriber on a wireless network.
IMSO International Maritime Satellite Organisation. An intergovernmental body established to
ensure that Inmarsat continues to meet its public service obligations, including
obligations relating to the GMDSS.
IP Internet Protocol.
IPsec Internet Protocol Security. A protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a communication
session.
L
LTE LTE stands for Long-term Evolution, and is the path followed to achieve 4G speeds in
wireless broadband networks. LTE applies more generally to the idea of improving wireless
broadband speeds to meet increasing demand.
M
M2M Machine-to-Machine
MAC Media Access Control address. A hardware address that uniquely identifies each node of
a network.
N
NAT Network Address Translation. An Internet standard that enables a local-area network to
use one set of IP addresses for internal traffic and a second set of addresses for external
traffic. A NAT module makes all necessary address translations.
P
PIN Personal Identification Number. A code number used to provide access to a system that
has restricted access.
PUK PIN Unblocking Key. An eight-digit code used to unblock a SIM card after three incorrect
PINs have been entered. The PUK code is supplied with the SIM card.
S
SIP Session Initiation Protocol. An application-layer control (signaling) protocol for creating,
modifying, and terminating sessions with one or more participants. Used e.g. for Internet
telephony.
SPI Security Parameter Index. An identification tag added to the header while using IPsec for
tunneling the IP traffic.
SSL Secure Sockets Layer. The standard technology for keeping an internet connection secure
and safeguarding any sensitive data that is being sent between two systems, preventing
criminals from reading and modifying any information transferred, including potential