User's Manual

Table Of Contents
PMP 450 Operations Guide
Glossary
VI
pmp-0049 (September 2012)
Term
Definition
HTTP
Hypertext Transfer Protocol, used to make the Internet resources available on
the World Wide Web. Defined in RFC 2068. See
http://www.faqs.org/rfcs/rfc2068.html.
ICMP
Internet Control Message Protocols defined in RFC 792, used to identify
Internet Protocol (IP)-level problems and to allow IP links to be tested. See
http://www.faqs.org/rfcs/rfc792.html.
indiscards count
Field
How many inbound packets were discarded without errors that would have
prevented their delivery to a higher-layer protocol. (Some of these packets may
have been discarded to increase buffer space.)
inerrors count Field
How many inbound packets contained errors that prevented their delivery to a
higher-layer protocol.
innucastpkts count
Field
How many inbound non-unicast (subnetwork-broadcast or subnetwork-
multicast) packets were delivered to a higher-layer protocol.
inoctets count
Field
How many octets were received on the interface, including those that deliver
framing information.
Intel
A registered trademark of Intel Corporation.
inucastpkts count
Field
How many inbound subnetwork-unicast packets were delivered to a higher-
layer protocol.
inunknownprotos
count Field
How many inbound packets were discarded because of an unknown or
unsupported protocol.
IP
Internet Protocol defined in RFC 791. The Network Layer in the TCP/IP
protocol stack. This protocol is applied to addressing, routing, and delivering,
and re-assembling data packets into the Data Link layer of the protocol stack.
See http://www.faqs.org/rfcs/rfc791.html.
IP Address
32-bit binary number that identifies a network element by both network and
host. See also Subnet Mask.
IPv4
Traditional version of Internet Protocol, which defines 32-bit fields for data
transmission.
ISM
Industrial, Scientific, and Medical Equipment radio frequency band, in the 900-
MHz, 2.4-GHz, and 5.8-GHz ranges.
L2TP over IPSec
Level 2 Tunneling Protocol over IP Security. One of several virtual private
network (VPN) implementation schemes. Regardless of whether Subscriber
Modules have the Network Address Translation feature (NAT) enabled, they
support VPNs that are based on this protocol.