SHA1 Secure Hash Algorithm version 1 (SHA1) is a hash function that
generates a 160 bit hash value (checksum). See also Hash.
SHDSL Symmetrical High-bit-rate Digital Subscriber Line. See DSL.
Shell The shell is an input interface (e. g. command line or graphic user
interface) between computer and user.
Short hold The short hold is the defined amount of time after which a network
connection is automatically cleared if no more data is transmitted.
SIF With a Stateful Inspection Firewall (SIF), the routing of a data packet
is not determined only by source and destination addresses but also
using dynamic packet filtering based on the connection status.
Single phone num-
ber (VoIP)
Single phone number access is a VoIP connection that is also
known as a point-to-multipoint connection. It is used to connect VoIP
terminals. Multiple subscriber numbers (MSNs) are provided. See
also Direct dial-in (VoIP)
SIP The Session Initiation Protocol is a network protocol for setting up a
communication session between two or more subscribers. The pro-
tocol is used for IP telephony (VoIP).
SIP provider A SIP provider does the switching between a SIP connection and
other analogue, ISDN and VoIP connections.
SNMP The Simple Network Management Protocol (SNMP) is used to con-
figure, control and monitor different network components (e. g.
routers, servers, etc.) from a single, central system. The network
component settings that can be changed are stored in a database –
the Management Information Base (MIB). SNMP uses UDP. The
network component receives requests to port 161 while the man-
aging system receives confirmation messages (TRAPs) at port 162.
Spatial streams Spatial streams are data streams that are sent out at the same time
on the same frequency in the wireless LAN. The transmission rate is
multiplied as a result.
SPD All the parameters that are set while configuring IPSec are stored in
the router in the form of databases. These are the Security Policy
Database (SPD) and the Security Association Database (SAD). The
Security Policy Database lists the forms of data traffic that are to be
secured. Factors such as the source and destination address of the
data packet are used to do this.
SRTP The Secure Real-Time Transport Protocol (SRTP) is the variant of
bintec elmeg GmbH
Glossary
bintec RS Series 547