Page 166 / 172 Scroll up to view Page 161 - 165
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
8
Glossary
June 2004 202-10036-01
SSID
A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless
local area network. For the wireless devices in a network to communicate with each other, all devices must
be configured with the same SSID.
This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the
wireless Access Point and to the wireless network name.
See also
Wireless Network Name and ESSID.
Subnet Mask
A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator
to further divide an IP address into two or more subnets.
An IP address has two components, the network address and the host address. For example, consider the IP
address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215)
represent the Class B network address, and the second two numbers (017.009) identify a particular host on
this network.
Subnetting enables the network administrator to further divide the host part of the address into two or more
subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to
see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001
The Class B network part is: 10010110.11010111
and the host address is 00010001.00001001
If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are
reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By
convention, the bits for the network address are all set to 1, though it would also work if the bits were set
exactly as in the network address.) In this case, therefore, the subnet mask would be
11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to
which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The
result is the subnetwork address: Subnet Mask 255.255.240.000
11111111.11111111.11110000.00000000
IP Address 150.215.017.009
10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000
10010110.11010111.00010000.00000000
The subnet address, therefore, is 150.215.016.000.
TCP/IP
The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with
the Transfer Control Protocol (TCP) form TCP/IP.
TLS
Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between
client/server applications communicating over the Internet.
The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by
using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
Page 167 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Glossary
9
June 2004 202-10036-01
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Universal Plug and Play
UPnP. A networking architecture that provides compatibility among networking technology. UPnP
compliant routers provide broadband users at home and small businesses with a seamless way to participate
in online games, videoconferencing and other peer-to-peer services.
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
WAN
Wide Area Network. A long distance link used to extend or connect remotely located local area networks.
The Internet is a large WAN.
WEB Proxy Server
A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a
firewall.
The proxy server listens for requests from clients within the firewall and forwards these requests to remote
Internet servers outside the firewall. The proxy server reads responses from the external servers and then
sends them to internal client clients.
WEP
Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks.
All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for
data encryption.
wide area network
WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a
large WAN.
Wi-Fi
A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility
Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among
802.11b devices.
Windows Internet Naming Service
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
If a remote network contains a WINS server, your Windows PCs can gather information from that WINS
server about its local hosts. This allows your PCs to browse that remote network using the Windows
Network Neighborhood feature.
Page 168 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
10
Glossary
June 2004 202-10036-01
WINS
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
Wireless Network Name (SSID)
Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or
ESSID configuration parameter.
WPA
Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security enhancements
that increase the level of data protection and access control for existing and future wireless LAN systems.
Page 169 / 172
Index
1
Numerics
802.11b
D-1
A
Account Name
3-14, 6-2
Address Resolution Protocol
B-8
ad-hoc mode
D-2
Auto MDI/MDI-X
B-15, G-2
Auto Uplink
2-3, B-15, G-2
B
backup configuration
6-6
Basic Wireless Connectivity
4-7
Basic Wireless Settings
4-11
BSSID
D-2
C
Cabling
B-11
Cat5 cable
B-12, C-1, G-2
configuration
automatic by DHCP
2-4
backup
6-6
erasing
6-7
restore
6-8
router, initial
3-1
content filtering
2-2, 5-1
conventions
typography
1-1
crossover cable
2-3, 8-2, B-14, B-15, G-2
customer support
1-iii
D
date and time
8-8
Daylight Savings Time
8-8
daylight savings time
5-8
Default DMZ Server
7-8
Denial of Service (DoS) protection
2-2
denial of service attack
B-11
DHCP
B-10
DHCP Client ID
C-18
DMZ
2-3, 7-4, 7-8
DMZ Server
7-8
DNS Proxy
2-4
DNS server
C-22
DNS, dynamic
7-13
domain
C-22
Domain Name
3-14
domain name server (DNS)
B-9
DoS attack
B-11
Dynamic DNS
7-13
E
EnterNet
C-20
erase configuration
6-7
ESSID
4-8, D-2
Ethernet
2-3
Ethernet cable
B-11
F
factory settings, restoring
6-7
firewall features
2-2
Flash memory, for firmware upgrade
2-2
Index
Page 170 / 172
2
Index
front panel
2-6, 2-7
fully qualified domain name (FQDN)
4-5
G
gateway address
C-22
H
Half Life
7-6
host name
3-14
I
IANA
contacting
B-2
IETF
B-1
Web site address
B-7
infrastructure mode
D-2
installation
2-4
Internet account
address information
C-20
establishing
C-20
IP addresses
C-21, C-22
and NAT
B-7
and the Internet
B-2
assigning
B-2, B-9
auto-generated
8-3
private
B-7
translating
B-9
IP configuration by DHCP
B-10
IP networking
for Macintosh
C-18
for Windows
C-4, C-9
K
KALI
7-6
L
LAN IP Setup Menu
7-10
LEDs
troubleshooting
8-2
log
sending
5-7
log entries
5-6
Logout
3-11, 3-12
M
MAC address
8-7, B-8
spoofing
3-14, 8-5
Macintosh
C-21
configuring for IP networking
C-18
DHCP Client ID
C-18
Obtaining ISP Configuration Information
C-22
masquerading
C-20
MDI/MDI-X
B-15, G-2
MDI/MDI-X wiring
B-14, G-5
metric
7-15
N
NAT
C-20
NAT.
See
Network Address Translation
netmask
translation table
B-6
Network Address Translation
2-4, B-7, C-20
Network Time Protocol
5-8, 8-8
NTP
5-8, 8-8
O
Open System authentication
D-4
P
package contents
2-5
Passphrase
4-4, 4-6, 4-10, 4-11
passphrase
2-2
password
restoring
8-7
PC, using to configure
C-23
ping
7-8
placement
4-1
port filtering
5-3

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top