Page 61 / 67 Scroll up to view Page 56 - 60
57
Appendix B
Glossary
ADSL
Asymmetric digital subscriber line (ADSL) is a new modem technology that
converts existing twisted-pair telephone lines into access paths for high-speed
communication of various sorts.
Auto-MDI/MDIX
On a network hub or switch, an auto-MDI/MDIX port automatically senses if it
needs to act as a MDI or MDIX port. The auto- MDI/MDIX capability eliminates
the need for crossover cables.
Auto-negotiate
To automatically determine the correct setting. The term is often used with
communications and networking
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for
automating the configuration of computers that use TCP/IP. DHCP can be used
to automatically assign IP addresses, to deliver TCP/IP stack configuration
parameters such as the subnet mask and default router, and to provide other
configuration information such as the addresses for printer, time and news
servers.
DMZ
In computer networks, a DMZ (demilitarized zone) is a computer host or small
network inserted as a "neutral zone" between a company's private network and
the outside public network. It prevents outside users from getting direct access
to a server that stores company data. Typically, the DMZ contains devices
accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP
(e-mail) servers and DNS servers.
DNS
The Domain Name System (DNS) is a distributed Internet directory service.
DNS is used mostly to translate between domain names and IP addresses, and
to control Internet email delivery. Most Internet services rely on DNS to work. If
DNS fails, web sites cannot be located and email delivery service will be
suspended.
Dynamic IP Address
An IP address is automatically assigned to a user’s AP in a TCP/IP network
typically by a DHCP server.
Page 62 / 67
58
Firewall
A system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in both hardware and software, or a combination
of both. Firewalls are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified
security criteria.
Gateway
A device, usually a Router, that connects hosts on a local network to other
networks.
IP Address
Every PC on the Internet has a unique identifying number, called an IP Address.
A typical IP address looks like this: 216.27.61.137
IPSec
IPSec stands for IP Security. It provides authentication and encryption over the
Internet. It functions at Layer 3 and thus secures everything on the network. It
has become a standard protocol used for virtual private networks (VPNs).
MAC Address
On a local area network (LAN) or other network, the MAC (Media Access
Control) address is your computer's unique hardware number. Usually written
as: 01:23:45:67:89:ab
MTU
The size in bytes of the largest packet that can be sent or received.
NAT
A technique by which several hosts share a single IP address for accessing the
Internet.
Ping (Packet Internet Groper)
A utility to determine whether a specific IP address is accessible. It works by
sending a packet to the specified address and waiting for a reply. PING is used
primarily to troubleshoot Internet connections.
SSID
SSID is the name representing the Router in WLAN.
Page 63 / 67
59
PPPoE
Point-to-Point over Ethernet is a protocol for connecting remote hosts to the
Internet over an always-on connection by simulating a dial-up connection.
Router
A device that forwards data packets along networks. A router is connected to at
least two networks, commonly two LANs or WANs or a LAN and its ISP
network. Routers are located at gateways, the places where two or more
networks connect.
Subnet Mask
A mask used to determine which subnet an IP address belongs to. An IP
address has two components, the network address and the host address.
Subnetting enables the network administrator to further divide the host part of
the address into two or more subnets.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of
communications protocols used to connect hosts on the Internet.
VPN
Virtual private networks are secured private network connections, built on top of
publicly accessible infrastructure, such as the Internet or the public telephone
network. VPNs typically employ some combination of encryption, digital
certificates, strong user authentication and access control to provide security to
the traffic they carry. They usually provide connectivity to many machines
behind a gateway or firewall.
WAN
Wide Area Network, a communication network that covers a relatively broad
geographic area, consisting of two or more LANs. Broadband communication
over the WAN is often through public networks such as the ADSL or Cable
systems, or through leased lines or satellites. To simplify it, please image
network as a WAN.
WEP
WEP (Wired Equivalent Privacy) is a data privacy mechanism based on a
64/128-bit shared key algorithm, as described in the IEEE 802.11 standard.
Page 64 / 67
60
Appendix C
Regulatory
CE Mark Warning:
This is a Class B product. In a domestic environment, this product may cause
radio interference, in which case the user may be required to take adequate measures.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection
against harmful interference in a residential installation.
This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
GIGABYTE
declares that
GN-BR01G
(FCC ID:JCK-GN-BR01G) is limited in CH1~CH11 for 2.4 GHz
by specified firmware controlled in U.S.A.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with minimum distance 20cm between the radiator &
your body.
To maintain compliance with FCC RF exposure compliance requirements, please avoid direct contact
to the transmitting antenna during transmitting.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
Europe - Declaration of Conformity
This device is a 2.4 GHz low power RF device intended for home and office use in
EU and EFTA member states. In some EU / EFTA member states some restrictions
may apply. Please contact local spectrum management authorities for further
details before putting this device into operation.
GIGA-BYTE Technology, Inc. declares that the product:
Wireless Broadband Router Model Number:
GN-BR01G
is in conformity with and in accordance with the European Directive of EMC, 89/336 EEC
for the following sections:
EN 61000-3-2, EN 61000-3-3, EN 55024, and EN 55022 Disturbances and Immunities
GIGA-BYTE Technology, Inc. also declares the conformity of above mentioned product with the actual
required safety standards in accordance with LVD Directive 73/23 EEC:
Page 65 / 67
61
EN 60950 Safety
In accordance with R&TTE Directive 1995/5/EC, Part 17: Requirements for Operation in the European
Community, GIGA-BYTE Technology, Inc declares the conformity of the above mentioned products
for:
EN 300 328-2 V1.4.1 (2003), ETSI EN 300 328-1
V1.3.1, EN 301 489-1, and EN 301 489-17
Technical Requirements for Radio Equipment
Countries of Operation and Conditions of Use in the European Community
The user should run the configuration utility program provided with this product to check the current
channel of operation and confirm that the device is operating in conformance with the spectrum usage
rules for European Community countries as described in this section. European standards dictate a
maximum radiated transmit power of 100mW EIRP and a frequency range of 2.400 - 2.4835 GHz.
Trademarks:
GIGABYTE is a registered trademark of GIGA-BYTE Technology, Inc. Other trademarks
or registered trademarks are the property of their respective manufacturers or owners.
Copyright Statement:
No part of this publication or documentation accompanying this Product may
be reproduced in any form or by any means or used to make any derivative such as translation,
transformation, or adaptation without permission from GIGABYTE/GIGA-BYTE Technology, Inc., as
stipulated by the United States Copyright Act of 1976. Contents are subject to change without prior
notice.
Copyright© 2005 by GIGA-BYTE Technology, Inc.
All rights reserved.

Rate

3.5 / 5 based on 2 votes.

Popular Gigabyte Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top