Glossary-E - Industrial Ethernet switches|Ethernet|USB|RS485|RS232|media converter|optic fiber modem|protocol converters|video converters
  • TEL:400-880-4496
  • CN|EN
Location:Home Support Glossary

Glossary:  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 



This is the European basic multiplex rate which packs 30 voice channels into a 256 bit frame and transmits at 2.048 Mbps.


EAP (Extensible Authentication Protocol)

An enhanced security framework designed to improve an existing security protocol, such as WPA-PSK or WPA2-PSK.


EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol)

A mutual authentication method that uses a combination of digital certificates and another systems, such as passwords.



Extended Authentication Protocol-Subscriber Identity Module (EAP-SIM) is an authentication protocol used to authenticate wireless clients with SIM cards. See also SIM.



EAP-TLS (Extensible Authentication Protocol -Transport Layer Security) authentication uses digital certifications for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a certificate to the server. The exchange of certificates is done in the open before a secured tunnel is created. See also EAP and EAP-TTLS.



EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Service) authentication is a type of mutual authentication where just the server sends a digital certificate to identify itself to the clients. See also EAP and EAP-TLS.


Echo Cancellation

Echo Cancellation minimizes the delays associated with digital networks. Delays are encountered as signals are processed through various routes within the networks, including copper wire, fiber optic lines, microwave connections, international gateways and satellite transmissions.


ED2K Link (eMule)

"ED2K stands for ""eDonkey2000"" and is the public URL format (ed2k://) used within the eMule network to indicate the location of files that are available for download."


Egress port

Egress is the act of going out of something. An egress port is an outgoing port, a port through which a data packet leaves. An egress router is a router through which a data packet leaves a network from another network.



This is the burst capability of the connection, for instance, the maximum allowable data transfer rate.


E-mail Blacklist

An e-mail blacklist identifies e-mail that you do not want to accept.


E-mail Forwarding

E-mail forwarding allows a networking device to forward and retrieve e-mail messages using an alternative e-mail server when the e-mail user's default email server is down or behind a firewall.


E-mail Whitelist

An e-mail whitelist identifies e-mail that you want to accept.



Interference by electromagnetic signals that can cause reduced data integrity and increased error rates on transmission channels.



An EMS is used to manage one or more Network Elements (NE) of a specific type.



These are programs that use peer-to-peer file sharing applications.



Encapsulation is the inclusion of one data structure within another structure so that the first data structure is hidden for the time being.



A means of combining clock and data information into a self-synchronizing stream of signals.



The process of taking data and encoding it, usually using a mathematical formula, so that it becomes unreadable unless you know the code. See also Decryption, Cipher, Plaintext, Ciphertext.


Encryption Algorithm

An Encryption Algorithm describes the use of encryption techniques such as DES (Data Encryption Standard) and Triple DES algorithms.


Endpoint Security

Endpoint Security (EPS) checking, also known as endpoint control, makes sure userscomputers comply with defined corporate policies before they can access the network. EPS is usually used to make sure users computers meet particular security requirements such as having firewall and anti-virus software installed.


Entertainment Optimized Networking

Technology that prioritizes network traffic so that time-sensitive applications like HD video stream smoothly. Also known as Media Optimized Networking.


In satellite navigation, an ephemeris is information about a satellite's orbital position at a given time.


Equivalent INP histogram

In INM, the Equivalent INP histogram shows the level of INP required to prevent data errors.



The ESN (Electronic Serial Number) is the serial number of a CDMA mobile device. It is similar to the IMEI on a GSM or UMTS mobile device. See also CDMA and IMEI.



Encapsulating Security Payload (RFC 2406) is a protocol that IPSec uses to encrypt data to ensure confidentiality.



See Infrastructure.



An Extended Service Set (ESS) is a group of access points connected to a wired LAN on the same subnet. An ESS ID uniquely identifies each group. All access points and their associated wireless stations in the same group must have the same ESSID.



A very common method of networking computers in a LAN (Local Area Network). There are a number of adaptations to the IEEE 802.3 Ethernet standard, including adaptations with data rates of 10 Mbps and 100 Mbps over coaxial cable, twisted-pair cable and fiber-optic cable. See also Gigabit Ethernet.



In VLAN translation, an ETI (Ethernet Type Identifier) is the protocol number in hexadecimal notation. For example the IP protocol in hexadecimal notation is 0800, and Novell IPX protocol is 8137.



ETSI is a non-profit organization that establishes telecommunications standards (defining coding standards and signaling schemes) for Europe. ETSI guidelines are voluntary and almost always comply with standards produced by international bodies.



This is a VDSL mode that operates in a specific frequency band allocation with associated upstream and downstream speeds.



The EUI-64 (64-bit Extended Unique Identifier) defined by IEEE (Institute of Electrical and Electronics Engineers) is an IPv6 interface ID format. It is derived from the 48-bit (6-byte) Ethernet MAC address. EUI-64 inserts the hex digits between the third and fourth bytes of the MAC address and complements the seventh bit of the first byte of the MAC address.



These are network activities. Some activities are direct attacks on your system, while others might be depending on the circumstances. Therefore, any activity, regardless of severity is called an event. An event may or may not be a direct attack on your system.



This is an HTML-based configurator that allows easy setup and management.