Glossary
Address and Control Field
Compression
configuration option that provides a method to negotiate the
compression of the Data Link Layer Address and Control fields.
Address Resolution Protocol
is a protocol for mapping an Internet Protocol address (IP address) to
a physical machine address that is recognized in the local network. For
example, in IP Version 4, the most common level of IP in use today, an
address is 32 bits long. In an Ethernet local area network, however,
addresses for attached devices are 48 bits long. (The physical machine
address is also known as a Media Access Control or MAC address.) A
table, usually called the ARP cache, is used to maintain a correlation
between each MAC address and its corresponding IP address. ARP
provides the protocol rules for making this correlation and providing
address conversion in both directions.
Band Steering
is a feature that encourages dual-band capable wireless clients to
connect to the less crowded 5GHz network, and leave the 2.4GHz
network available for those clients who support 2.4GHz only; thus,
Wi-Fi performance can be improved for all clients.
Challenge-Handshake
Authentication Protocol
widely used algorithm for authentication, which provides the transfer
of indirect information about user password. CHAP provides better
security than
Password Authentication Protocol
.
Command Line Interface
is a user interface to a computer's operating system or an application in
which the user responds to a visual prompt by typing in a command
on a specified line, receives a response back from the system, and then
enters another command, and so forth.
Common Internet File
System
is a protocol that lets programs make requests for files and services
on remote computers on the Internet. CIFS uses the client/server
programming model. A client program makes a request of a server
program (usually in another computer) for access to a file or to pass a
message to a program that runs in the server computer. The server
takes the requested action and returns a response.
Compression Control
Protocol
is used for establishing and configuring data compression algorithms
over
Dead Peer Detection
is a method that network devices use to verify the current existence
and availability of other peer devices.
DHCP
is a network protocol that is used to configure network devices so that
they can communicate on an IP network. A DHCP client uses the DHCP
protocol to acquire configuration information, such as an IP address,
a default route, and one or more DNS server addresses from a DHCP
server. The DHCP client then uses this information to configure its host.
Keenetic Extra (KN-1710) — Command Reference Guide
323
Glossary
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...