Copyright © 2004-2005, Vivato, Inc.
168
PPtP
Point-to-Point Tunneling Protocol
(PPtP) is a technology for creating a
Virtual Private Network
(
)
within the
Point-to-Point Protocol
(
). It is used to ensure that data transmitted from one VPN node to
another are secure.
Proxy
A
proxy
is server located between a client application and a real server. It intercepts requests, attempting
to fulfill them itself. If it cannot, it forwards them to the real server. Proxy servers have two main purposes:
improve performance by spreading requests over several machines and filter requests to prevent access
to specific servers or services.
PSK
Pre-Shared Key
(PSK), see
Public Key
A
public key
is used in public key cryptography to encrypt a message which can only be decrypted with the
recipient's private or secret key. Public key encryption is also called asymmetric encryption, because it
uses two keys, or Diffie-Hellman encryption. Also see
.
QoS
Quality of Service (QoS) defines the performance properties of a network service, including guaranteed
throughput, transit delay, and priority queues. QoS is designed to minimize
,
,
and network congestion, and provide a way of allocating dedicated bandwidth for high priority network
traffic.
The
standard for implementing QoS on wireless networks is currently in-work by the
task
group. A subset of
specification.
RADIUS
The
Remote Authentication Dial-In User Service
(RADIUS) provides an authentication and accounting
system. It is a popular authentication mechanism for many
RC4
A symmetric stream cipher provided by
. It is a variable key-size stream cipher with byte-
oriented operations. It allows keys up to 2048 bits in length.
Router
A
router
is a network device which forwards packets between networks. It is connected to at least two
networks, commonly between two local area networks (
s) or between a
and a wide-area network
(
), for example, the Internet. Routers are located at gateways—places where two or more networks
connect.
A router uses the content of headers and its tables to determine the best path for forwarding a packet. It
uses protocols such as the Internet Control Message Protocol (ICMP), Routing Information Protocol (RIP),
and Internet Router Discovery Protocol (IRDP) to communicate with other routers to configure the best
route between any two hosts. The router performs little filtering of data it passes.