Publication date: August, 2012
Revision 1.0
Welltech Technology Co., Ltd.
266
synchronizing the clocks of computer systems. SNTP uses UDP (datagrams) as transport
layer.
SSID
Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to
which a user wants to attach. A client device will receive broadcast messages from all
access points within range advertising their SSIDs, and can choose one to connect to
based on pre-configuration, or by displaying a list of SSIDs in range and asking the user
to select one (wikipedia).
SSH
SSH is an acronym for Secure SHell. It is a network protocol that allows data to be
exchanged using a secure channel between two networked devices. The encryption used
by SSH provides confidentiality and integrity of data over an insecure network. The goal
of SSH was to replace the earlier rlogin, TELNET and ssh protocols, which did not
provide strong authentication or guarantee confidentiality (Wikipedia).
SSM
SSM In SyncE this is an abbreviation for Synchronization Status Message and is
containing a QL indication.
STP
Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for
any bridged LAN. The original STP protocol is now obsolete by RSTP.
SyncE
SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a
network 'clock frequency' synchronized. Not to be confused with real time clock
synchronized (IEEE 1588).
T
is an acronym for Terminal Access Controller Access Control System Plus. It is
a networking protocol which provides access control for routers, network access servers
and other networked computing devices via one or more centralized servers.
provides separate authentication, authorization and accounting services.
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
TCP
TCP is an acronym for Transmission Control Protocol. It is a communications protocol
that uses the Internet Protocol (IP) to exchange the messages between computers.
The TCP protocol guarantees reliable and in-order delivery of data from sender to
receiver and distinguishes data for multiple connections by concurrent applications (for
example, Web server and e-mail server) running on the same host.
The applications on networked hosts can use TCP to create connections to one another.
It is known as a connection-oriented protocol, which means that a connection is
established and maintained until such time as the message or messages to be
exchanged by the application programs at each end have been exchanged. TCP is
responsible for ensuring that a message is divided into the packets that IP manages and
for reassembling the packets back into the complete message at the other end.
Common network applications that use TCP include the World Wide Web (WWW), e-mail,
and File Transfer Protocol (FTP).