Appendix A
A.1 Glossary of Terms
SCALANCE W1750D CLI
738 Function Manual, 03/2019, C79000-G8976-C452-04
Hotspot 2.0 Query Protocol.
Wireless access area created by multiple hotspots that are located in close
proximity to one another. Hot zones usually combine public
safety APs with
Hotspot refers to a WLAN node that provides Internet connection and virtual
private network (VPN) access from a given location. A business traveler, for
example, with a laptop equipped for Wi
-Fi can look up a local hotspot, con-
tact it, and get connected through its network to reach the Internet.
High-Speed Packet Access.
High Throughput. IEEE 802.11n is an HT WLAN standard that aims to
achieve physical data rates of close to 600 Mbps on the 2.4 GHz and 5
GHz
Hypertext Transfer Protocol. The HTTP is an application protocol to transfer
data over the web. The HTTP protocol defines how messages are formatted
and transmitted, and the actions that the w servers and browsers should take
in response to various commands.
Hypertext Transfer Protocol Secure. HTTPS is a variant of the HTTP that
adds a layer of security on the data in transit through a secure socket layer or
transport layer security protocol connection.
Internet Authentication S
ervice. IAS is a component of Windows Server op-
erating systems that provides centralized user authentication, authorization,
and accounting.
Internet Control Message Protocol. ICMP is an error reporting protocol. It is
used by network devices such as
routers, to send error messages and opera-
tional information to the source IP address when network problems prevent
delivery of IP packets.
Intrusion Detection System. IDS monitors a network or systems for malicious
activity or policy violations and reports its findings to the management system
deployed in the network.
Institute of Electrical and Electronics Engineers.
Internet Group Management Protocol. Communications protocol used by
hosts and adjacent routers on IP networks to establish
multicast group mem-
IGMP snooping prevents multicast flooding on Layer 2 network by treating
multicast traffic as broadcast traffic. Without IGMP snooping, all streams
could be flooded to all ports on that VLAN. When
multicast flooding occurs,
-
hosts that happen to be in the same VLAN would receive all the streams
only to be discarded without snooping.
Interior Gateway Protocol. IGP is used for exchanging routing information
between gateways within an autonomou
s system (for example, a system of
corporate local area networks).
Interior Gateway Routing Protocol. IGRP is a distance vector interior routing
protocol used by routers to exchange routing data within an autonomous
system.
. IKE is a key management protocol used with IPsec
protocol to establish a secure communication channel. IKE provides addi-
tional feature, flexibility, and ease of configuration for IPsec standard.