02/ 11/ 2016
Z-end (IPSec) This is the end of a VPN tunnel opposite the A-end (see also A-end). Zero Configuration Internet Access This feature allows a modem to automatically detect the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes. Zero Configuration Mode […]
02/ 11/ 2016
02/ 11/ 2016
X-Auth X-Auth (Extended Authentication) provides added security for VPN by requiring each VPN client to use a username and password. X.509 X.509 is a recommendation that defines formats for certificates and CRLs. It was issued by the ITU-T. Xbox This is Microsoft’s gaming console. Xbox Live This is Microsoft’s gaming service that […]
02/ 11/ 2016
WAN A Wide Area Network (WAN) links geographically dispersed locations to other networks or the Internet. A WAN configuration can include switched and permanent telephone circuits, terrestrial radio systems and satellite systems. Also: a group of networked computers in a large geographical area. The best example of a WAN is the Internet. WAN IP […]
02/ 11/ 2016
Vantage Access Vantage Access is a web-based management tool that allows you to remotely manage, control and monitor multiple compatible devices. A compatible device is any device that supports the TR-069, TR-098, TR-104 or TR-106 protocols. Varifocal Lens Many so-called “zoom” lenses, particularly in the case of fixed lens cameras, are actually varifocal lenses, […]
02/ 11/ 2016
UBR Unspecified Bit Rate is an ATM service category that does not appropriate fixed bandwidth or guarantee throughput and is best used for non-time-critical applications, such as e-mail. UCD UCD (Uplink Channel Description) is a WiMAX medium access control layer (MAC) message which describes the physical layer (PHY) characteristics of a uplink (UL) channel. […]
02/ 11/ 2016
T-Flash card A T-Flash card -also known as a TransFlash or MicroSD card- is a removable flash memory card (15 x 11 x 0.77 mm in size) commonly used in mobile devices such as cellphones for storing data. T.38 Fax Relay T.38 is an ITU-T standard that VoIP devices use to send fax messages […]
02/ 11/ 2016
S.M.A.R.T. The Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T. or SMART) monitoring system detects and reports on hard drive reliability indicators to help anticipate failures. This feature can be useful for troubleshooting. SA The set of information about user authentication and data encryption between two network devices is known as a “security association”(SA). A Security […]
02/ 11/ 2016
RADIUS A RADIUS (Remote Authentication Dial-In User Service), (RFC2138, 2139) server performs authentication, authorization and accounting for a network. RAID Is an acronym for “Redundant Array of Inexpensive Disks” or “Redundant Array of Independent Disks”, is a technology of storing data on multiple disks to provide a combination of large capacity for storing data, data […]
02/ 11/ 2016
Quality of Service (QoS) In the field of computer networking and other packet-switched telecommunication networks, the traffic engineering term “Quality of Service” (QoS) refers to resource reservation control mechanisms rather than the achieved service quality. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee […]