tainy hmod-v3-io, tainy hmod-l3-io - Dr. Neuhaus ...
tainy hmod-v3-io, tainy hmod-l3-io - Dr. Neuhaus ...
tainy hmod-v3-io, tainy hmod-l3-io - Dr. Neuhaus ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Protocol, Transfer<br />
protocol<br />
Small lexicon of routers<br />
Devices that communicate with each other must use the same rules. They<br />
have to "speak the same language". Such rules and standards are called<br />
protocols or transfer protocols. Frequently used protocols include IP, TCP,<br />
PPP, HTTP and SMTP. TCP/IP is the umbrella term for all protocols that are<br />
based on IP.<br />
Service provider Supplier, company or institut<strong>io</strong>n that gives users access to the Internet or to<br />
an online service.<br />
Spoofing, Anti-<br />
Spoofing<br />
SNMP<br />
In Internet terminology, spoofing means to specify a forged address. The<br />
forged Internet address is used to pose as an authorised user.<br />
Anti-spoofing means mechanisms to reveal or prevent spoofing.<br />
SNMP (Simple Network Management Protocol) is a widespread mechanism<br />
for the central control of network components such as servers, routers,<br />
switches, printers, computers etc.<br />
SNMP defines the communicat<strong>io</strong>n process and the structure of the data<br />
packages. UDP via IP is used for the transport.<br />
SNMP does not define the values which can be read or changed.<br />
This is done in an MIB (Management Informat<strong>io</strong>n Base). The MIB is a<br />
descript<strong>io</strong>n file in which the individual values are listed in a table. The MIB is<br />
for specific network components or for a class of components, such as<br />
switches.<br />
SNMP Trap SNMP trap is a message which is sent unprompted by the SNMP agent<br />
(Simple Network Management Protocol) from a network component.<br />
SSH<br />
Symmetric<br />
encrypt<strong>io</strong>n<br />
SSH (Secure SHell) is a protocol that enables secure, encrypted data<br />
exchange between computers. Secure SHell is used for remote access to<br />
the input console from LINUX-based machines.<br />
With symmetric encrypt<strong>io</strong>n, data is encrypted and decrypted with the same<br />
key. DES and AES are two examples of symmetric encrypt<strong>io</strong>n algorithms.<br />
They are fast, but time-consuming to administer as the number of users<br />
increases.<br />
TAINY xMOD Page 103 of 111