Page 81 / 89 Scroll up to view Page 76 - 80
81
Glossary
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / glossary.fm / 12.12.2007
Schablone 2004_08_26
Subnet mask
The subnet mask determines how many parts of
IP addresses
of a network represent the
network number and how many parts the computer number.
If the subnet mask is in a network that is administered by the Gigaset SE587 WLAN dsl,
for example 255.255.255.0, the first three parts of the IP address form the network
number and only the final part can be used for assigning host numbers. The first three
parts of the IP address of all network components are therefore always the same in this
case.
Switch
A switch, like a
Hub
, is an element used to link different network segments or compo-
nents. Unlike a hub however, the switch has its own intelligence that enables it to for-
ward packets to only the subnet or network component for which they are intended.
See also:
Bridge
,
Hub
,
Router
,
Gateway
TCP
Transmission Control Protocol
The TCP
Protocol
is part of the
TCP/IP
protocol family. TCP handles data transport
between communication partners (applications). TCP is a session-based transfer proto-
col, i.e. it sets up, monitors and terminates a connection for transferring data.
See also:
UDP
TCP/IP
Protocol
family on which the
Internet
is based.
IP
forms the basis for every computer-to-
computer connection.
TCP
provides applications with a reliable transmission link in the
form of a continuous data stream. TCP/IP is the basis on which services such as WWW,
Mail and News are built. There are other protocols as well.
TKIP
Temporal Key Integrity Protocol
TKIP is a security protocol used for data
Encryption
in wireless networks. It is used for
WPA
encryption. It was designed to correct deficiencies in the older Wired Equivalent
Privacy (
WEP
) standard. For this reason TKIP provides per-packet key mixing, a message
integrity check, and a rekeying mechanism. TKIP ensures that every data packet is sent
with its own unique encryption key.
UDP
User Datagram Protocol
UDP is a
Protocol
of the
TCP/IP
protocol family that handles data transport between two
communication partners (applications). Unlike
TCP
, UDP is a non-session based proto-
col. It does not establish a fixed connection. The recipient is responsible for making sure
the data is received. The sender is not notified about whether it is received or not.
Page 82 / 89
82
Glossary
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / glossary.fm / 12.12.2007
Schablone 2004_08_26
UPnP
Universal Plug and Play
UPnP technology is used for the spontaneous linking of home or small office networks.
Devices that support UPnP carry out their network configuration automatically once
they are connected to a network. They also provide their own services or use services of
other devices in the network automatically.
URL
Universal Resource Locator
Globally unique address of a domain on the
Internet
.
VCI
Virtual Channel Identifier
Part of an address in an ATM network.
Virtual server
A virtual
Server
provides a service on the
Internet
that does not run on itself, but on
another network component. The Gigaset SE587 WLAN dsl can be configured as a vir-
tual server. It will then direct incoming calls for a service via
Port forwarding
directly to
the appropriate
Port
of the network component in question.
VLAN
Virtual Local Area Network
A VLAN is a virtual local network within a physical network. A widely disseminated tech-
nical implementation of VLANs is defined partially in the Standard IEEE 802.1Q. VLAN
allows preferred forwarding of voice data, for example. This functionality is important
for VoIP (IP telephony). This also means that phone calls can be made without interrup-
tion within a restricted bandwidth.
VPI
Virtual Path Identifier
Part of an address in an ATM network.
WAN
Wide Area Network
A WAN is a wide area network that is not restricted physically to a particular area, for
example the
Internet
. A WAN is run by one or more public providers to enable private
access. You access the Internet via an
Internet service provider
.
Web server
See
Server
Page 83 / 89
83
Glossary
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / glossary.fm / 12.12.2007
Schablone 2004_08_26
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the
IEEE 802.11
standard. It is used to protect wire-
less transmissions in a
WLAN
against unauthorised access through
Encryption
of the
data transmitted.
WLAN
Wireless LAN
Wireless LANs enable network components to communicate with a network using radio
waves as the transport medium. A wireless LAN can be connected as an extension to a
wired LAN or it can form the basis for a new network. The basic element of a wireless
network is the cell. This is the area where the wireless communication takes place. A
WLAN can be operated in
Ad-hoc mode
or
Infrastructure mode
.
WLAN is currently specified in Standard
IEEE 802.11
. The Gigaset SE587 WLAN dsl com-
plies with Standard 802.11g.
WPA
WPA is a new standard-conformant solution for greater security in wireless networks.
WPA is meant to replace the existing WEP standard (Wired Equivalent Privacy) and offers
more reliable encryption and authentication methods.
WPA-PSK
WPA Pre-shared Key
Variant of
WPA
data encryption in which new keys are automatically generated at regu-
lar intervals by means of a keyword (pre-shared key). The key is updated after defined
periods (
Rekey interval
).
Page 84 / 89
84
Index
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / SE587_SIX.fm / 12.12.2007
Schablone 2004_08_26
Index
Numerics
10/100 Mbps switch port
. . . . . . . . . . .
5
128-bit key
. . . . . . . . . . . . . . . . . . . .
23
64-bit key
. . . . . . . . . . . . . . . . . . . . .
23
802.11b
. . . . . . . . . . . . . . . . . . . . . .
38
802.11g
. . . . . . . . . . . . . . . . . . . . . .
38
A
Access point
. . . . . . . . . . . . . . . . . . .
71
Access restriction
. . . . . . . . . . . . . . . .
25
Address block for IP addresses
. . .
18
,
37
Ad-hoc mode
. . . . . . . . . . . . . . . . . . .
71
Administration
. . . . . . . . . . . . . . . . . .
30
ADSL
. . . . . . . . . . . . . . . . . . . . . . .
4
,
71
port
. . . . . . . . . . . . . . . . . . . . . . . . .
5
status
. . . . . . . . . . . . . . . . . . . . . . .
12
ADSL modem, integrated
. . . . . . . . . . .
4
AES
. . . . . . . . . . . . . . . . . . . . . . .
22
,
71
Authentication
. . . . . . . . . . . . . . . . .
31
Authorisation
. . . . . . . . . . . . . . . . . .
70
Auto connect
. . . . . . . . . . . . . . . . . . .
71
B
Back panel
. . . . . . . . . . . . . . . . . . . . . .
5
Backing up configuration data
. . . . . .
34
Backup
. . . . . . . . . . . . . . . . . . . . . . .
34
Basic Setup
. . . . . . . . . . . . . . . . . . . .
15
Bridge
. . . . . . . . . . . . . . . . . . . . . . . .
71
Broadcast
. . . . . . . . . . . . . . . . . .
21
,
71
Browser see Internet browser
BSSID
. . . . . . . . . . . . . . . . . . . . . . . . .
72
Buttons
. . . . . . . . . . . . . . . . . . . . . . .
12
C
Channel
. . . . . . . . . . . . . . . . . . . . . . .
21
Client
. . . . . . . . . . . . . . . . . . . . . . . .
72
Command
ipconfig
. . . . . . . . . . . . . . . . . . . . .
60
ping
. . . . . . . . . . . . . . . . . . . . . . . .
63
Computer name
. . . . . . . . . . . . . . . .
37
Configuration
. . . . . . . . . . . . . . . . . .
10
Configuration data
backing up
. . . . . . . . . . . . . . . . . . .
34
restoring
. . . . . . . . . . . . . . . . . . . . .
35
Configuration file
. . . . . . . . . . . . . . . .
34
Connection
checking the connection to the
router/access point
. . . . . . . . . . .
63
statistics
. . . . . . . . . . . . . . . . . . . . .
64
virtual
. . . . . . . . . . . . . . . . . . . . . . .
16
D
data IPoEoA
. . . . . . . . . . . . . . . . . . . .
16
data PPPoA
. . . . . . . . . . . . . . . . . . . . .
16
Default settings
. . . . . . . . . . . . . . . . . .
9
Defining a computer name
Mac OS X
. . . . . . . . . . . . . . . . . . . .
60
Windows 2000
. . . . . . . . . . . . . . . .
52
Windows 98
. . . . . . . . . . . . . . . . . .
53
Windows Vista
. . . . . . . . . . . . . . . .
45
Windows XP
. . . . . . . . . . . . . . . . . .
49
Defining a workgroup
Windows 2000
. . . . . . . . . . . . . . . .
52
Windows 98
. . . . . . . . . . . . . . . . . .
53
Windows Vista
. . . . . . . . . . . . . . . .
45
Windows XP
. . . . . . . . . . . . . . . . . .
49
Device, status
. . . . . . . . . . . . . . . . . . .
15
DHCP
. . . . . . . . . . . . . . . . . . . . . .
36
,
72
DHCP server
. . . . . . . . . . . . . .
17
,
36
,
72
configuring
. . . . . . . . . . . . . . . . . . .
18
Digital Subscriber Line see DSL
Displaying wireless networks
Mac OS X
. . . . . . . . . . . . . . . . . . . .
41
Windows Vista
. . . . . . . . . . . . . . . .
39
Windows XP
. . . . . . . . . . . . . . . . . .
38
DMZ
. . . . . . . . . . . . . . . . . . . . .
8
,
29
,
72
DNS
. . . . . . . . . . . . . . . . . . . . . . . . . .
73
DNS configuration
Windows 2000
. . . . . . . . . . . . . . . .
51
Windows 98
. . . . . . . . . . . . . . . . . .
56
Windows Vista
. . . . . . . . . . . . . . . .
44
Windows XP
. . . . . . . . . . . . . . . . . .
48
DNS server
. . . . . . . . . . . . . . . . . . . . .
73
Domain blocking
. . . . . . . . . . . . . . . . .
8
Domain name
. . . . . . . . . . . . . . . . . .
73
Page 85 / 89
85
Index
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / SE587_SIX.fm / 12.12.2007
Schablone 2004_08_26
Domain Name Service see DNS
DoS attack
. . . . . . . . . . . . . . . . . . . . .
73
DSL
. . . . . . . . . . . . . . . . . . . . . . . . . .
73
status
. . . . . . . . . . . . . . . . . . . . . . .
12
Dynamic DNS see DynDNS
Dynamic Host Configuration Protocol,
see DHCP
Dynamic IP address
. . . . . . . . . . . . . .
73
DynDNS
. . . . . . . . . . . . . . . . . . . . . . .
74
E
Encryption
. . . . . . . . . . . . . . . .
8
,
21
,
74
preset
. . . . . . . . . . . . . . . . . . . . . . . .
9
WEP
. . . . . . . . . . . . . . . . . . . . . . . .
23
WPA-PSK/WPA2-PSK
. . . . . . . . .
22
,
23
Entering the gateway
Mac OS X
. . . . . . . . . . . . . . . . . . . .
60
Windows 2000
. . . . . . . . . . . . . . . .
51
Windows 98
. . . . . . . . . . . . . . . . . .
57
Windows Vista
. . . . . . . . . . . . . . . .
44
Windows XP
. . . . . . . . . . . . . . . . . .
48
Entering the subnet mask
Mac OS X
. . . . . . . . . . . . . . . . . . . .
60
Windows 2000
. . . . . . . . . . . . . . . .
51
Windows 98
. . . . . . . . . . . . . . . . . .
57
Windows Vista
. . . . . . . . . . . . . . . .
44
Windows XP
. . . . . . . . . . . . . . . . . .
48
Ethernet
. . . . . . . . . . . . . . . . .
7
,
36
,
74
transmission speed
. . . . . . . . . . . . . .
7
F
Features
. . . . . . . . . . . . . . . . . . . . . . .
7
Filter
IP
. . . . . . . . . . . . . . . . . . . . . . . . . .
26
port
. . . . . . . . . . . . . . . . . . . . . . . .
26
ULR
. . . . . . . . . . . . . . . . . . . . . . . .
27
Firewall
. . . . . . . . . . . . . . . . . . . . .
8
,
74
enabling or disabling
. . . . . . . . . . .
24
Firmware
upgrade
. . . . . . . . . . . . . . . . . . . . .
33
Flat rate
. . . . . . . . . . . . . . . . . . . . . . .
74
Front panel
. . . . . . . . . . . . . . . . . . . . .
5
FTP, port number
. . . . . . . . . . . . . . . .
26
Full duplex
. . . . . . . . . . . . . . . . . . . . .
74
G
Gateway
. . . . . . . . . . . . . . . . . . .
56
,
74
Global IP address see Public IP address
H
H.323, port number
. . . . . . . . . . . . . .
26
Hacker attack
. . . . . . . . . . . . . . . . .
8
,
73
Half duplex
. . . . . . . . . . . . . . . . . . . .
75
Hexadecimal key
. . . . . . . . . . . . . . . .
23
HTTP proxy
. . . . . . . . . . . . . . . . . . . . .
75
HTTP, port number
. . . . . . . . . . . . . . .
26
HTTPS, port number
. . . . . . . . . . . . . .
26
Hub
. . . . . . . . . . . . . . . . . . . . . . . . . .
75
I
Idle time
. . . . . . . . . . . . . . . . . . . . . . .
11
IEEE
. . . . . . . . . . . . . . . . . . . . . . . . . .
75
Infrastructure mode
. . . . . . . . . . . . . .
75
Installing TCP/IP protocol
Windows 98
. . . . . . . . . . . . . . . . . .
54
Institute of Electrical and Electronic
Engineers see IEEE
Internet
. . . . . . . . . . . . . . . . . . . . . . .
76
access
. . . . . . . . . . . . . . . . . . . . . . . .
4
access restriction
. . . . . . . . . . . . . .
25
configuring access
. . . . . . . . . . . . .
15
status
. . . . . . . . . . . . . . . . . . . . . . .
13
Internet access
. . . . . . . . . . . . . . . . . . .
4
Internet browser
. . . . . . . . . . . . . . . . .
8
Internet connection
changing configuration
. . . . . . . . . .
15
setting up
. . . . . . . . . . . . . . . . . . . .
15
Internet Explorer
. . . . . . . . . . . . . . . .
10
Internet protocol see IP protocol
Internet service provider
. . . . . . . . . .
76
IP address
. . . . . . . . . . . . . . . .
10
,
36
,
76
address block
. . . . . . . . . . . . . .
18
,
37
assigning automatically
. . . . . .
17
,
36
assigning static
. . . . . . . . . . . . . . . .
19
assigning statically
. . . . . . . . . .
18
,
36
defining
. . . . . . . . . . . . . . . . . .
17
,
64
defining for the router
. . . . . . . . . .
18
dynamic
. . . . . . . . . . . . . . . . . . . . .
73
private
. . . . . . . . . . . . . . . . . . .
37
,
79
public
. . . . . . . . . . . . . . . . . . . . . . .
78
static
. . . . . . . . . . . . . . . . . . . . . . .
80
IP address block for DHCP
. . . . . . . . . .
19
IP address pool
. . . . . . . . . . . . . . . . . .
76

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top