Help Glossary for the Vonage VDV21-VDRouter Sceenshot

Back to the Vonage VDV21-VD



Screenshots from PortForward.com


Vonage --> Connect to the Internet : Vonage Home Basic Setup Advanced Setup Help Log Out Glossary FAQ Tips and Troubleshooting Contact Information status refresh Glossary A B C D F G I J K L M P S T U V W ActiveX Control A simple computer program that runs within your Internet browser. It is used to add functionality to HTML web pages. An example of this functionality is animation. Broadband Broadband comes from the words "broad bandwidth" and is used to describe a high-capacity, two-way link between an end user and the Internet. Transfer rates are faster than standard dial-up. Examples of broadband include DSL and cable Internet. Cookies Cookies refer to HTTP cookies. HTTP cookies are packages of text sent by a website to the Internet browser on your computer each time you access the website. They are used for authenticating, tracking, and maintaining specific information about you, such as site preferences and online purchase history. CPE C ustomer P remises E quipment refers to telephones, modems (DSL and Cable), PCs and other equipment located at the customer’s physical location (e.g. your home or office). DDNS D ynamic D omain N ame S ervice. DDNS allows users to address any website or FTP server by a public name (i.e. www.vonage.com) and avoid the need to use the IP address. It maps Internet domain names to dynamic IP addresses. DHCP D ynamic H ost C onfiguration P rotocol. A protocol that lets one device, known as the DHCP server, on a network dynamically assign temporary IP addresses to the other devices on the network. These other devices are typically computers. This eliminates the need to manually assign Static or permanent IP addresses. DMZ D e m ilitarized Z one. DMZ is a computer that is located between a trusted internal network such as a secure LAN and an untrusted external network, such as the public Internet. Typically, the DMZ removes the firewall protection and allows the computer to have unrestricted access to the Internet. Removing the firewall protection also allows the computer to be visible to and accessed by other devices on the Internet. DNS D omain N ame S ervice. Similar to DDNS, DNS translates domain names to IP addresses and IP addresses to domain names for machines with static IP addresses. Filter Filters define which network devices can transmit and receive data to/from the Internet. Filters can be used to block Internet traffic to specific network devices on the LAN or to block a specific type of Internet traffic. IP addresses are used to identify which devices are restricted. Firewall A firewall protects the resources of a private network from unauthorized access by users from other networks. Firewalls also control what outside resources your users have access to. Each network packet, traveling both to and from a device on your network, is examined to determine whether or not to allow it to be forwarded to its destination. FQDN F ully Q ualified D omain N ame. A FQDN is that portion of the URL (Uniform Resource Locator) that fully identifies the node that an Internet request is addressed to. For example, www.vonage.com is a Fully Qualified Domain Name. www is the host, vonage is the second level domain name and .com is the top-level domain name. Gateway A gateway is a network node (computer) that serves as an entrance to another network. The gateway enables networks that use different protocols to exchange information. IP I nternet P rotocol. IP is the protocol or method by which data is sent from one computer to another on the Internet. IP Address The IP address is a unique address that is used to identify and communicate with devices on a network. The address is written as four sets of numbers separated by periods. An example of an IP address is 192.168.15.1. In very simple terms you can think of your IP address like your street address. Every residence has a street address so the post office knows where to deliver your mail. Every device on the Internet needs an IP address so the data for a particular device can be delivered appropriately. IPSec IP Sec urity. IPSec is a suite of protocols for securing IP communications. IPSec supports secure exchange of packets at the IP layer. Packets in the data stream are authenticated and encrypted. ISP I nternet S ervice P rovider. An ISP is a company that provides you access to the Internet and other related services. Java Applet A computer program written in the Java programming language that runs within another program. For example, Java Applets can run within your web browser. When used in this context, Java Applets are used to provide interactive features that cannot be provided by HTML. Keep Alive The Keep Alive Period specifies how long the Vonage device should wait for a response from the ISP server before sending another PPPoE discover packet. When a PPPoE discover packet is sent to the ISP server, the ISP server responds with an authentication message. This keeps the PPPoE session active. LAN L ocal A rea N etwork. A LAN is a group of computers and related devices that share a common communications line or wireless link. The connected devices are typically within a small geographic area such as office building or a home. A LAN is what makes it possible for your V-Portal, computer and perhaps other devices to share your Internet connection. Lease Time The amount of time that a network user/client will be allowed to remain connected to the router using their current IP Address. MAC address In a network, the MAC address is a unique number that identifies a specific hardware interface. It is a 12-digit hexadecimal number. MAC Clone This is a process where the MAC address of the device connected to your V-Portal gets copied on to the V-Portal. This is useful if your ISP requires you to register the MAC address of the device you will be using with your Internet Service. Modem A piece of network equipment that you use to gain access to the Internet – typically either DSL through your phone line or Cable service. MTU M aximum T ransmission U nit. This indicates the largest packet that can be transmitted across your network. Multicast Multicast is the communication of information to a group of destinations simultaneously. Multicast communication is between a single sender and multiple receivers on a network. Ping P acket In ternet G roper. Ping is a utility that is used to determine if a particular IP address is present on line and accessible. It works by sending a packet to the IP address in question and waiting for a reply. Popup Window A pop up window is a term used for a secondary window that appears ("pops up") in your web browser. They are usually generated using JavaScript and are often used as a form of online advertising. Port A port is an interface or connection. There are two types of ports - physical and logical. Physical ports allow you to connect network devices. For example, your V-Portal has 4 ports on it. One Ethernet port, an Internet port where you can connect a modem and 2 phone ports where you can connect your telephones or fax machine. In TCP/IP networks, ports are logical connections. Every IP address is divided into ports. This allows one IP address to be used by multiple programs to send and receive data at the same time. Logical ports are assigned numbers that identify the type of port it is. For example, port 80 is used for HTTP traffic and port 110 is used for email. PPPoE P oint to P oint P rotocol o ver E thernet. PPPoE is a protocol for connecting users on an Ethernet LAN to the Internet through a DSL broadband connection. In addition to data transport, the DSL connection provides authentication through the use of a user name and password that you or your ISP has selected. Your V-Portal (or your current home networking equipment) stores this information and sends to your ISP. Your ISP then checks this information and lets you connect to the Internet through them. PPTP P oint to P oint T unneling P rotocol. PPTP is used to extend VPNs (Virtual Private Networks). A VPN is a private network of computers that uses the Internet to connect some nodes. PPTP allows companies to extend their VPNs by using private "tunnels" over the Internet. PPTP is used to ensure that messages are secure when they are transmitted through the tunnels from one VPN to another. Protocol A set of rules that, when followed, allows two devices to communicate in an orderly fashion. An agreed-upon standard format used for transmitting data between two network devices. Proxy A computer that acts as a bridge between two other computers that use different standards, formats, or protocols. Router A network device that lets you connect more than one piece of equipment (like computers) to your DSL or cable modem to share one Internet connection. Some ISPs supply combination modem/routers. SMTP S imple M ail T ransfer P rotocol. SMTP is a protocol used for sending and receiving email on a TCP/IP network. Spoofing In general, spoofing is a term used in networking to describe the ways in which software and hardware can be fooled. An example of this would be spoofing a MAC address. Spoofing a MAC address will alter the header of a packet to make it appear as if a message was sent from an authorized computer. Subnet Mask A subnet mask is used determine whether traffic generated by network devices will be directed internally within the LAN or externally over the Internet connection based upon the ultimate destination address (i.e. IP address) of that traffic. TCP T ransmission C ontrol P rotocol. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. Traceroute Traceroute is a utility used to determine the route a packet has taken from your computer, across the Internet, to its specified destination. UDP U ser D atagram P rotocol. UDP enables programs on networked computers to send short messages, known as datagrams, to one another. UPnP U niversal P lug a nd P lay. UPnP is a standard that enables devices to be plugged into a network and automatically know about each other. VPN V irtual P rivate N etwork. A VPN is a private network used to communicate over the public Internet. It is often used by companies to connect remote sites or users together. WAN W ide A rea N etwork. A WAN is a network that covers a relatively broad geographic area. Home Basic Setup Advanced Setup Help © Vonage 2007-2008. All Rights Reserved.
Home > Screenshots > Vonage > VDV21-VD > Help Glossary