Page 176 / 185 Scroll up to view Page 171 - 175
178
Glossary
network in wireless or wired mode. Wireless SIP phones (WLAN handsets) can likewise
be used via the local network for Internet telephony.
SMTP
Simple Mail Transfer Protocol
The SMTP
Protocol
is part of the
TCP/IP
protocol family. It governs the exchange of elec-
tronic mail on the
Internet
. Your
Internet service provider
provides you with access to an
SMTP server.
SNMP
Simple Network Management Protocol
The SNMP
Protocol
is part of the
TCP/IP
protocol family. It provides a simple procedure
for administering the network based on a system of shared information for manage-
ment data and network management messages (known as traps) and reports the occur-
rence of events within the monitored network (e.g. an alarm message or notification of
configuration changes).
SSID
Service Set Identifier
The SSID is used to identify the stations in a wireless network (
WLAN
). All wireless net-
work components with the same SSID form a common network. The SSID can be
assigned by the network operator.
Static IP address
A static
IP address
is assigned to a network component manually during network con-
figuration. Unlike the
Dynamic IP address
, a static (fixed) IP address never changes.
Subnet
A subnet divides a network into smaller units.
Subnet mask
The subnet mask determines how parts of
IP addresses
of a network represent the net-
work number and how many the computer number.
If the subnet mask is in a network that is administered by the Giga762SX WLAN dsl, for
example 255.255.255.0, that means the first three parts of the IP address form the net-
work number and only the final part can be used for assigning host numbers. The first
three parts of the IP address of all network components are therefore always the same
in this case.
Super G
Super G is an extension of the IEEE 802.11g mode. Channel bundling can be used to
double the maximum transfer rate to 108 Mbps.
Page 177 / 185
179
Glossary
Switch
A switch, like a
Hub
, is an element used to link different network segments or compo-
nents. Unlike a hub however, the switch has its own intelligence that enables it to for-
ward packets to only the subnet or network component they are meant for.
See also:
Bridge
,
Hub
,
Router
,
Gateway
TCP
Transmission Control Protocol
The TCP
Protocol
is part of the
TCP/IP
protocol family. TCP handles data transport
between communication partners (applications). TCP is a session-based transfer proto-
col, i.e. it sets up, monitors and terminates a connection for transferring data.
See also:
UDP
TCP/IP
Protocol
family on which the
Internet
is based.
IP
forms the basis for every computer-to-
computer connection.
TCP
provides applications with a reliable transmission link in the
form of a continuous data stream. TCP/IP is the basis on which services such as WWW,
Mail and News are built. There are other protocols as well.
UDP
User Datagram Protocol
UDP is a
Protocol
of the
TCP/IP
protocol family that handles data transport between two
communication partners (applications). Unlike
TCP
, UDP is a non-session based proto-
col. It does not establish a fixed connection. The recipient is responsible for making sure
the data is received. The sender is not notified about whether it is received or not.
UPnP
Universal Plug and Play
UPnP technology is used for the spontaneous linking of home or small office networks.
Devices that support UPnP carry out their network configuration automatically once
they are connected to a network. They also provide their own services or use services of
other devices in the network automatically.
URL
Universal Resource Locator
Globally unique address of a domain on the
Internet
.
Vanity
The term vanity comes from the United States. Alphanumeric key-
pads on phones and other phone terminals allow you to represent
phone numbers as words so that they can be remembered more eas-
ily. Instead of a combination of digits, you select a combination of
letters.
Page 178 / 185
180
Glossary
VCI
Virtual Channel Identifier
Part of an address in an ATM network.
Virtual server
A virtual
Server
provides a service on the
Internet
that runs not on itself, but on another
network component. The Giga762SX WLAN dsl can be configured as a virtual server. It
will then direct incoming calls for a service via
Port forwarding
directly to the appropri-
ate
Port
of the network component in question.
VLAN
Virtual Local Area Network
A VLAN is a virtual local network within a physical network. A widely disseminated tech-
nical implementation of VLANs is defined partially in the Standard IEEE 802.1Q. VLAN
allows preferred forwarding of voice data, for example. This functionality is important
for VoIP (IP telephony). This also means that phone calls can be made without interrup-
tion with a restricted bandwidth.
VoIP
Voice over IP
See
Internet telephony
VPI
Virtual Path Identifier
Part of an address in an ATM network.
WAN
Wide Area Network
A WAN is a wide area network that is not restricted physically to a particular area, for
example the
Internet
. A WAN is run by one or more public providers to enable private
access. You access the Internet via an
Internet service provider
.
WDS
Wireless Distribution System
WDS describes the wireless connection between a number of access points.
Web server
See
Server
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the
IEEE 802.11
standard. It is used to protect wire-
less transmissions in a
WLAN
against unauthorised access through
Encryption
of the
data transmitted.
Page 179 / 185
181
Glossary
WLAN
Wireless LAN
Wireless LANs enable network components to communicate with a network using radio
waves as the transport medium. A wireless LAN can be connected as an extension to a
wired LAN or it can form the basis for a new network. The basic element of a wireless
network is the cell. This is the area where the wireless communication takes place. A
WLAN can be operated in
Ad-hoc mode
or
Infrastructure mode
.
WLAN is currently specified in Standard
IEEE 802.11
. The Giga762SX WLAN dsl complies
with Standard 802.11g.
WPA
WPA is a new standard-conformant solution for greater security in wireless networks.
WPA is meant to replace the existing WEP standard (Wired Equivalent Privacy) and offers
more reliable encryption and authentication methods.
WPA-PSK
WPA Pre-shared Key
Variant of
WPA
data encryption in which new keys are automatically generated at regu-
lar intervals by means of a keyword (pre-shared key). The key is updated after defined
periods (
Rekey interval
).
WPS
Wi-Fi Protected Setup
WPS simplifies the setup of wireless networks.
WPS automatically sets up secure wireless networks.
Access points
(or clients with
included registrar or external registrar) can automatically generate a network ID (
SSID
)
and
WPA-PSK Encryption
if this was not performed previously. Clients can be connected
either by entering a PIN or using special registration buttons on the access point and cli-
ent.
XR
eXtended Range
XR technology extends the range in a WLAN and in so doing allows improved coverage
of the desired range in home or small office networks. Activating this function at the
access point can extend the range to the network adapters considerably, though the
data transfer rate is reduced as a result.
Page 180 / 185
182
Index
Index
Numerics
10/100 Mbps switch port
. . . . . . . . . .
26
128-bit encryption
. . . . . . . . . . . . . . .
93
128-bit key
. . . . . . . . . . . . . . . . .
56
,
92
64-bit key
. . . . . . . . . . . . . . . . . .
56
,
92
A
Access control
. . . . . . . . . . . .
58
,
71
,
95
local area network
. . . . . . . . . . . . .
95
Access point
. . . . . . . . . . . .
11
,
85
,
168
Address block for
IP addresses
. . . . . . . . . . . . . . . .
83
Ad-hoc mode
. . . . . . . . . . . . . . .
11
,
168
Ad-hoc network
. . . . . . . . . . . . . . . . .
11
ADSL interface
. . . . . . . . . . . . . . . . . .
12
ADSL modem
integrated
. . . . . . . . . . . . . . . . . . . .
7
ADSL port
. . . . . . . . . . . . . . . . . . . . .
26
ADSL/ADSL2+
. . . . . . . . . . . . . . . . . . .
7
Advanced Settings
features
. . . . . . . . . . . . . . . . . . . . .
60
Advanced setup
. . . . . . . . . . . . . . . . .
39
AES
. . . . . . . . . . . . . . . . . . . . . .
54
,
168
Annex A
. . . . . . . . . . . . . . . . . . . . .
157
Annex B
. . . . . . . . . . . . . . . . . . . . . .
157
Antenna
. . . . . . . . . . . . . . . . . . . . . .
24
Anti-DoS firewall
. . . . . . . . . . . . . . . .
70
Area code
Internet telephony
. . . . . . . . . . . .
106
ASCII key
. . . . . . . . . . . . . . . . . . .
56
,
93
Attack detection
. . . . . . . . . . . . . . . .
70
Authentication server
. . . . . . . . . . . .
90
Authorisation
. . . . . . . . . . . . . . . . .
166
Auto connect
. . . . . . . . . . . . . . . . . .
168
B
Backing up configuration data
. . . . .
126
Backup
. . . . . . . . . . . . . . . . . . . . . .
126
Base station see Access point
Baseline
. . . . . . . . . . . . . . . . . . . .
8
,
157
Basic settings
. . . . . . . . . . . . . . . . . . .
39
configuration
. . . . . . . . . . . . . . . . .
42
summary
. . . . . . . . . . . . . . . . . . . .
50
Bridge
. . . . . . . . . . . . . . . . . . . . . . .
168
Broadcast
. . . . . . . . . . . . . . . . . .
86
,
168
Browser
. . . . . . . . . . . . . . . . . . . . . . .
37
BSSID
. . . . . . . . . . . . . . . . . . . . . . . .
169
Buttons
. . . . . . . . . . . . . . . . . . . . . . .
41
C
Call forwarding
. . . . . . . . . . . . . . . .
104
Call waiting
. . . . . . . . . . . . . . . . . . .
104
Calling line identification restriction
.
105
Client
. . . . . . . . . . . . . . . . . . . . . . . .
169
CLIR
. . . . . . . . . . . . . . . . . . . . . . . . .
105
Command
net share
. . . . . . . . . . . . . . . . . . .
154
Computerbrowser
. . . . . . . . . . . . . .
154
Configuration
resetting to factory setting
. . . . . .
127
restoring
. . . . . . . . . . . . . . . . . . . .
126
security
. . . . . . . . . . . . . . . . . . . . . .
50
Configuration file
. . . . . . . . . . . . . . .
126
Configuring popup blocker
. . . . . . . .
164
Connection duration
. . . . . . . . . . . . .
45
Connection mode
. . . . . . . . . . . . .
45
,
65
Connection on request
. . . . . . . . .
45
,
65
Connection type
. . . . . . . . . . . . . . . . .
62
ADSL
. . . . . . . . . . . . . . . . . . . . . . . .
62
Country settings
. . . . . . . . . . . . . . . .
121
D
Data encryption
. . . . . . . . . . . . . . . . .
92
Deactivating the HTTP proxy
. . . . . . .
163
Device (Annex A or B version)
. . . . .
157
DHCP
. . . . . . . . . . . . . . . . . . . . . . . .
169
DHCP server
. . . . . . . . . . . . . . . .
83
,
169
Dialling plans
. . . . . . . . . . . . . . . . . .
106
Digital Subscriber Line see DSL
Displaying the operating state
. . .
22
,
34
DMZ
. . . . . . . . . . . . . . . . . . . . . .
19
,
169
DNS
. . . . . . . . . . . . . . . . . . . . . . . . .
170
DNS server
. . . . . . . . . . . . . . . . . . . .
170
defining
. . . . . . . . . . . . . . . . . . . . .
67
Domain name
. . . . . . . . . . . . . . . . .
170
Domain Name Service see DNS
DoS attack
. . . . . . . . . . . . . . . . .
70
,
170

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top