Page 171 / 182 Scroll up to view Page 166 - 170
G
LOSSARY
169
IPSec
IP Security. Provides IP network-layer encryption. IPSec can support large
encryption networks (such as the Internet) by using digital certificates for
device authentication. When setting up an IPSec connection between
two devices, make sure that they support the same encryption method.
ISP
Internet Service Provider. An ISP is a business that provides connectivity to
the Internet for individuals and other businesses or organizations.
LAN
Local Area Network. A network of end stations (such as PCs, printers,
servers) and network devices (hubs and switches) that cover a relatively
small geographic area (usually not larger than a floor or building). LANs
are characterized by high transmission speeds over short distances (up to
1000 metres).
MAC
Media Access Control. A protocol specified by the IEEE for determining
which devices have access to a network at any one time.
MAC Address
Media Access Control Address.
Also called the hardware or physical
address. A Layer 2 address associated with a particular network device.
Most devices that connect to a LAN have a MAC address assigned to
them as they are used to identify other devices in a network. MAC
addresses are 6 bytes long.
NAT
Network Address Translation. NAT enables all the computers on your
network to share one IP address. The NAT capability of the Router allows
you to access the Internet from any computer on your home network
without having to purchase more IP addresses from your ISP.
Network
A network is a collection of computers and other computer equipment
that is connected for the purpose of exchanging information or sharing
resources. Networks vary in size, some are within a single room, others
span continents.
Network Interface
Card (NIC)
A circuit board installed into a piece of computing equipment, for
example, a computer, that enables you to connect it to the network. A
NIC is also known as an adapter or adapter card.
Protocol
A set of rules for communication between devices on a network. The
rules dictate format, timing, sequencing and error control.
Downloaded from
www.Manualslib.com
manuals search engine
Page 172 / 182
170
G
LOSSARY
PPPoE
Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a method
of data transmission originally created for dial-up connections; PPPoE is
for Ethernet connections.
PPTP
Point-to-Point Tunneling Protocol is a method of secure data transmission
between two remote sites over the Internet.
RJ-45
A standard connector used to connect Ethernet networks. The “RJ”
stands for “registered jack”.
Router
A device that acts as a central hub by connecting to each computer's
network interface card and managing the data traffic between the local
network and the Internet.
Server
A computer in a network that is shared by multiple end stations. Servers
provide end stations with access to shared network services such as
computer files and printer queues.
SSID
Service Set Identifier. Some vendors of wireless products use SSID
interchangeably with ESSID.
Subnet Address
An extension of the IP addressing scheme that allows a site to use a single
IP network address for multiple physical networks.
Subnet Mask
A subnet mask, which may be a part of the TCP/IP information provided
by your ISP, is a set of four numbers configured like an IP address. It is
used to create IP address numbers used only within a particular network
(as opposed to valid IP address numbers recognized by the Internet,
which must assigned by InterNIC).
Subnets
A network that is a component of a larger network.
Switch
A device that interconnects several LANs to form a single logical LAN that
comprises of several LAN segments. Switches are similar to bridges, in
that they connect LANs of a different type; however they connect more
LANs than a bridge and are generally more sophisticated.
Downloaded from
www.Manualslib.com
manuals search engine
Page 173 / 182
G
LOSSARY
171
TCP/IP
Transmission Control Protocol/Internet Protocol. This is the name for two
of the most well-known protocols developed for the interconnection of
networks. Originally a UNIX standard, TCP/IP is now supported on almost
all platforms, and is the protocol of the Internet.
TCP relates to the content of the data travelling through a network —
ensuring that the information sent arrives in one piece when it reaches its
destination. IP relates to the address of the end station to which data is
being sent, as well as the address of the destination network.
Traffic
The movement of data packets on a network.
Universal Plug and
Play
Universal Plug and Play is a system which allows compatible applications
to read some of their settings from the Router. This allows them to
automatically configure some, or all, of their settings and need less user
configuration.
URL Filter
A URL Filter is a feature of a firewall that allows it to stop its clients form
browsing inappropriate Web sites.
WAN
Wide Area Network. A network that connects computers located in
geographically separate areas (for example, different buildings, cities, or
countries). The Internet is an example of a wide area network.
WDS
Wireless Distribution System. WDS enables one or more access points to
rebroadcast received signals to extend range and reach, though this can
affect the overall throughput of data.
WECA
Wireless Ethernet Compatibility Alliance. An industry group formed to
certify cross vendor interoperability and compatibility of 802.11b and
802.11g wireless networking products and to promote the standard for
enterprise, small business and home environments. (see 802.11b,
802.11g, Wi-Fi)
WEP
Wired Equivalent Privacy. A shared key encryption mechanism for wireless
networking. Encryption strength is 40/64 bit or 128 bit.
Wi-Fi
Wireless Fidelity. This is the certification granted by WECA to products
that meet their interoperability criteria. (see also 802.11b, WECA)
Downloaded from
www.Manualslib.com
manuals search engine
Page 174 / 182
172
G
LOSSARY
Wireless Client
The term used to describe a desktop or mobile PC that is wirelessly
connected to your wireless network.
Wireless LAN Service
Area
Another term for ESSID (Extended Service Set Identifier).
Wizard
A Windows application that automates a procedure such as installation
or configuration.
WLAN
Wireless Local Area Network. A WLAN is a group of computers and
devices connected together by wireless in a relatively small area (such as a
house or office).
WPA
Wi-Fi Protected Access. A dynamically changing encryption mechanism
for wireless networking. Encryption strength is 256 bit.
Downloaded from
www.Manualslib.com
manuals search engine
Page 175 / 182
173
R
EGULATORY
N
OTICES
For 3Com Wireless 11n ADSL Firewall Router
G
ENERAL
S
TATEMENTS
The 3Com Wireless 11n ADSL Firewall Router (WL-603) must be installed and used in strict accordance with
the manufacturer's instructions as described in the user documentation that comes with the product.
This product contains encryption. It is unlawful to export out of the U.S. without obtaining a U.S. Export
License.
This product does not contain any user serviceable components. Any unauthorized product changes or
modifications will invalidate 3Com's warranty and all applicable regulatory certifications and approvals.
This product can only be used with the supplied antenna(s).
E
XPOSURE
TO
R
ADIO
F
REQUENCY
R
ADIATION
This device generates and radiates radio-frequency energy. In order to comply with FCC radio-frequency
exposure guidelines for an uncontrolled environment, this equipment must be installed and operated while
maintaining a minimum body to antenna distance of 20 cm (approximately 8 in.).
The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not
emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable
from Health Canada's website www.hc-sc.gc.ca/rpb.
This product must maintain a minimum body to antenna distance of 20 cm. Under these conditions this
product will meet the Basic Restriction limits of 1999/519/EC [Council Recommendation of 12 July 1999 on
the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz)].
US - R
ADIO
F
REQUENCY
R
EQUIREMENTS
This device must not be co-located or operated in conjunction with any other antenna or transmitter.
US F
EDERAL
C
OMMUNICATIONS
C
OMMISSION
(FCC) EMC
C
OMPLIANCE
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection against harmful
interference in a residential installation.
This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications.
However, there is no guarantee that interference will not occur in a particular
installation.
If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC Caution:
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your
body.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
2.4GHz operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
The user may find the following booklet prepared by the Federal Communications Commission helpful:
The Interference Handbook
This booklet is available from the U.S. Government Printing Office, Washington, D.C. 20402.
Stock No. 004-000-0034504.
3Com is not responsible for any radio or television interference caused by unauthorized modification of the
devices included with this 3Com Wireless 11n ADSL Firewall Router (WL-603), or the substitution or
attachment of connecting cables and equipment other than specified by 3Com.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top