Page 81 / 92 Scroll up to view Page 76 - 80
X5668 / X5668U
User’s Guide
76
LED
Light Emitting Diode
An electronic light-emitting device. The indicator lights
on the front of the device are LEDs.
MAC address
Media Access Control address
The permanent hardware address of a device, assigned
by its manufacturer. MAC addresses are expressed as
six pairs of hex characters, with each pair separated by
colons. For example; NN:NN:NN:NN:NN:NN.
Mask
See network mask.
Mbps
Abbreviation for Megabits per second, or one million bits
per second. Network data rates are often expressed in
Mbps.
NAT
Network Address Translation
A service performed by many routers that translates
your network’s publicly known IP address into a private
IP address for each computer on your LAN. Only your
router and your LAN know these addresses; the outside
world sees only the public IP address when talking to a
computer on your LAN.
Network
A group of computers that are connected together,
allowing them to communicate with each other and
share resources, such as software, files, etc. A network
can be small, such as a LAN, or very large, such as the
Internet.
Network keys
(Also known as encryption keys.) 64-bit and 128-bit
encryption keys used in WEP wireless security
schemes. The keys encrypt data over the WLAN, and
only wireless PCs configured with WEP keys that
correspond to the keys configured on the device can
send/receive encrypted data.
Network mask
A network mask is a sequence of bits applied to an IP
address to select the network ID while ignoring the host
ID. Bits set to 1 mean “select this bit” while bits set to 0
mean “ignore this bit.” For example, if the network mask
255.255.255.0 is applied to the IP address 100.10.50.1,
the network ID is 100.10.50, and the host ID is 1. See
binary, IP address, subnet.
NIC
Network Interface Card
An adapter card that plugs into your computer and
provides the physical interface to your network cabling.
For Ethernet NICs this is typically an RJ-45 connector.
See Ethernet, RJ-45.
Packet
Data transmitted on a network consists of units called
packets. Each packet contains a payload (the data),
plus overhead information such as where it came from
(source address) and where it should go (destination
address).
Ping
Packet Internet (or Inter-Network) Groper
A program used to verify whether the host associated
with an IP address is online. It can also be used to
reveal the IP address for a given domain name.
Port
A physical access point to a device such as a computer
or router, through which data flows into and out of the
device.
PPP
Point-to-Point Protocol
A protocol for serial data transmission that is used to
carry IP (and other protocol) data between your ISP and
your computer. The WAN interface on the device uses
two forms of PPP called PPPoA and PPPoE. See
PPPoA, PPPoE.
Page 82 / 92
X5668 / X5668U
User’s Guide
77
PPPoA
Point-to-Point Protocol over ATM
One of the two types of PPP interfaces you can define
for a Virtual Circuit (VC), the other type being PPPoE.
You can define only one PPPoA interface per VC.
PPPoE
Point-to-Point Protocol over Ethernet
One of the two types of PPP interfaces you can define
for a Virtual Circuit (VC), the other type being PPPoA.
You can define one or more PPPoE interfaces per VC.
Protocol
A set of rules governing the transmission of data. In
order for a data transmission to work, both ends of the
connection have to follow the rules of the protocol.
Remote
In a physically separate location. For example, an
employee away on travel who logs in to the company’s
intranet is a remote user.
RIP
Routing Information Protocol
The original TCP/IP routing protocol. There are two
versions of RIP: version I and version II.
RJ-11
Registered Jack Standard-11
The standard plug used to connect telephones, fax
machines, modems, etc. to a telephone port. It is a 6-pin
connector usually containing four wires.
RJ-45
Registered Jack Standard-45
The 8-pin plug used in transmitting data over phone
lines. Ethernet cabling usually uses this type of
connector.
Routing
Forwarding data between your network and the Internet
on the most efficient route, based on the data’s
destination IP address and current network conditions.
A device that performs routing is called a router.
SDNS
Secondary Domain Name System (server)
A DNS server that can be used if the primary DSN
server is not available. See DNS.
Subnet
A subnet is a portion of a network. The subnet is
distinguished from the larger network by a subnet mask
that selects some of the computers of the network and
excludes all others. The subnet’s computers remain
physically connected to the rest of the parent network,
but they are treated as though they were on a separate
network. See network mask.
Subnet mask
A mask that defines a subnet. See network mask.
TCP
See TCP/IP.
TCP/IP
Transmission Control Protocol/Internet Protocol
The basic protocols used on the Internet. TCP is
responsible for dividing data up into packets for delivery
and reassembling them at the destination, while IP is
responsible for delivering the packets from source to
destination. When TCP and IP are bundled with
higher-level applications such as HTTP, FTP, Telnet,
etc., TCP/IP refers to this whole suite of protocols.
Telnet
An interactive, character-based program used to access
a remote computer. While HTTP (the web protocol) and
FTP only allow you to download files from a remote
computer, Telnet allows you to log into and use a
computer from a remote location.
Page 83 / 92
X5668 / X5668U
User’s Guide
78
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than
File Transfer Protocol (FTP) but not as capable or
secure.
TKIP
Temporal Key Integrity Protocol (TKIP) provides WPA
with a data encryption function. It ensures that a unique
master key is generated for each packet, supports
message integrity and sequencing rules and supports
re-keying mechanisms.
Triggers
Triggers are used to deal with application protocols that
create separate sessions. Some applications, such as
NetMeeting, open secondary connections during normal
operations, for example, a connection to a server is
established using one port, but data transfers are
performed on a separate connection. A trigger tells the
device to expect these secondary sessions and how to
handle them.
Once you set a trigger, the embedded IP address of
each incoming packet is replaced by the correct host
address so that NAT can translate packets to the correct
destination. You can specify whether you want to carry
out address replacement, and if so, whether to replace
addresses on TCP packets only, UDP packets only, or
both.
Twisted pair
The ordinary copper telephone wiring used by telephone
companies. It contains one or more wire pairs twisted
together to reduce inductance and noise. Each
telephone line uses one pair. In homes, it is most often
installed with two pairs. For Ethernet LANs, a higher
grade called Category 3 (CAT 3) is used for 10BASE-T
networks, and an even higher grade called Category 5
(CAT 5) is used for 100BASE-T networks. See
10BASE-T, 100BASE-T, Ethernet.
Unnumbered interfaces
An unnumbered interface is an IP interface that does not
have a local subnet associated with it. Instead, it uses a
router-id that serves as the source and destination
address of packets sent to and from the router. Unlike
the IP address of a normal interface, the router-id of an
unnumbered interface is allowed to be the same as the
IP address of another interface. For example, the WAN
unnumbered interface of your device uses the same IP
address of the LAN interface (192.168.1.1).
The unnumbered interface is temporary – PPP or DHCP
will assign a ‘real’ IP address automatically.
Upstream
The direction of data transmission from the user to the
Internet.
VC
Virtual Circuit
A connection from your DSL router to your ISP.
VCI
Virtual Circuit Identifier
Together with the Virtual Path Identifier (VPI), the VCI
uniquely identifies a VC. Your ISP will tell you the VCI
for each VC they provide. See VC.
VDSL
Very High Speed Digital Subscriber Line
It provides faster transmission rate and is capable of
supporting high bandwidth applications like IPTV and
bandwidth consumed applications.
VPI
Virtual Path Identifier
Together with the Virtual Circuit Identifier (VCI), the VPI
uniquely identifies a VC. Your ISP will tell you the VPI
for each VC they provide. See VC.
Page 84 / 92
X5668 / X5668U
User’s Guide
79
WAN
Wide Area Network
Any network spread over a large geographical area,
such as a country or continent. With respect to the
device, WAN refers to the Internet.
Web browser
A software program that uses Hyper-Text Transfer
Protocol (HTTP) to download information from (and
upload to) web sites, and displays the information, which
may consist of text, graphic images, audio, or video, to
the user. Web browsers use Hyper-Text Transfer
Protocol (HTTP). Popular web browsers include
Netscape Navigator and Microsoft Internet Explorer.
See HTTP, web site, WWW.
Web page
A web site file typically containing text, graphics and
hyperlinks (cross-references) to the other pages on that
web site, as well as to pages on other web sites. When a
user accesses a web site, the first page that is displayed
is called the home page. See hyperlink, web site.
Web site
A computer on the Internet that distributes information to
(and gets information from) remote users through web
browsers. A web site typically consists of web pages
that contain text, graphics, and hyperlinks. See
hyperlink, web page.
WEP
Wired Equivalent Privacy (WEP) encrypts data over
WLANs. Data is encrypted into blocks of either 64 bits
length or 128 bits length. The encrypted data can only
be sent and received by users with access to a private
network key. Each PC on your wireless network must be
manually configured with the same key as your device in
order to allow wireless encrypted data transmissions.
Eavesdroppers cannot access your network if they do
not know your private key. WEP is considered to be a
low security option.
Wireless
Wireless is a term used to describe telecommunications
in which electromagnetic waves (rather than some form
of wire) carry the signal over part or the entire
communication path. See wireless LAN.
Wireless LAN
A wireless LAN (WLAN) is one in which a mobile user
can connect to a local area network (LAN) through a
wireless (radio) connection. A standard, IEEE 802.11,
specifies the technologies for wireless LANs.
WPA
Wi-Fi Protected Access
WPA is an initiative by the IEEE and Wi-Fi Alliance to
address the security limitations of WEP. WPA provides
a stronger data encryption method (called Temporal Key
Integrity Protocol (TKIP)). It runs in a special,
easy-to-set-up home mode called Pre-Shared Key
(PSK) that allows you to manually enter a pass phrase
on all the devices in your wireless network. WPA data
encryption is based on a WPA master key. The master
key is derived from the pass phrase and the network
name (SSID) of the device.
It provides improved data encryption and stronger user
authentication. The mode of WPA supported on your
device is called Pre-Shared Key (PSK), which allows
you to manually enter a type of key called a pass
phrase.
WWW
World Wide Web
Also called (the) Web. Collective term for all web sites
anywhere in the world that can be accessed via the
Internet.
Page 85 / 92
X5668 / X5668U
User’s Guide
80
Appendix D - Specification
A1.
Hardware Specifications
Local Interface
Four port 10/100BaseT Ethernet Switch (4 * RJ-45 connectors), IEEE 802.3u
with MDI/MDIX auto-detection
One USB 2.0 Host Port (X5668U only)
Integrated 802.11b/g WLAN Access Point
WAN ADSL Line Interface
Compliant with ITU-T G.992.1, G.992.2, G.992.3, G.992.5 and ANSI T1.413
Issue 2
Line Impedance: 100
Ω
Connection Loops: One (pair wire)
Connector: RJ-11
Indicators
PWR – Green LED indicates power and operation. Orange LED indicates failure.
WAN – Green LED indicates broadband connection
Internet – Green LED indicates PPP connection and Orange indicates PPP
failure or device in BRIDGE mode.
LAN – Green LED indicates LAN connection
WLAN – Green LED indicates wireless AP enabled
OAM&P
Local: Telnet and Web management
Remote: Telnet and Web Management
Environment
Operation Temperature: 0
°
C ~ 40
°
C
Operation Humidity: 5% ~ 95%
Storage Temperature: -20 ~ +85
°
C
Storage Humidity: 5%~95%
Power
DC Adapter: Input 100~240VAC, 50/60Hz; Output 12VDC 1A
Certificates
CE, CB (TBD)
A2.
Software Specifications
Bridging
Transparent Bridging and spanning(IEEE 802.1D) with at least 32 MAC
addresses
RFC2684 (RFC 1483) Bridged
Bridge filtering with per-port extensions
Routing
IP routing and PPP supported
PAP and CHAP for user authentication in PPP connection
RFC2684 (RFC1483) Routed
MAC Encapsulated Routing (MER)
DHCP client, server and relay agent
DNS relay
Wireless LAN
Supports 802.1x; WEP; WEP2; WPA; WPA2; TKIP; AES; 802.11i
Hidden SSID
WMM for advanced Quality of Service
Hardware based AES
125 High Speed Mode: Standards-plus performance enhancement delivers best

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top