Page 186 / 196 Scroll up to view Page 181 - 185
186
Glossary
TCP
Transmission Control Protocol
The TCP
Protocol
is part of the
TCP/IP
protocol family. TCP handles data transport
between communication partners (applications). TCP is a session-based transfer proto-
col, i.e. it sets up, monitors and terminates a connection for transferring data.
See also:
UDP
TCP/IP
Protocol
family on which the
Internet
is based.
IP
forms the basis for every computer-to-
computer connection.
TCP
provides applications with a reliable transmission link in the
form of a continuous data stream. TCP/IP is the basis on which services such as WWW,
Mail and News are built. There are other protocols as well.
UDP
User Datagram Protocol
UDP is a
Protocol
of the
TCP/IP
protocol family that handles data transport between two
communication partners (applications). Unlike
TCP
, UDP is a non-session based proto-
col. It does not establish a fixed connection. The recipient is responsible for making sure
the data is received. The sender is not notified about whether it is received or not.
UPnP
Universal Plug and Play
UPnP technology is used for the spontaneous linking of home or small office networks.
Devices that support UPnP carry out their network configuration automatically once
they are connected to a network. They also provide their own services or use services of
other devices in the network automatically.
URL
Universal Resource Locator
Globally unique address of a domain on the
Internet
.
Vanity
The term vanity comes from the United States. Alphanumeric keypads on phones and
other phone terminals allow you to represent phone numbers as words so that they can
be remembered more easily. Instead of a combination of digits, you select a combina-
tion of letters.
VCI
Virtual Channel Identifier
Part of an address in an ATM network.
Page 187 / 196
187
Glossary
Virtual server
A virtual
Server
provides a service on the
Internet
that runs not on itself, but on another
network component. The Gigaset SX763 WLAN dsl can be configured as a virtual server.
It will then direct incoming calls for a service via
Port forwarding
directly to the appro-
priate
Port
of the network component in question.
VLAN
Virtual Local Area Network
A VLAN is a virtual local network within a physical network. A widely disseminated tech-
nical implementation of VLANs is defined partially in the Standard IEEE 802.1Q. VLAN
allows preferred forwarding of voice data, for example. This functionality is important
for VoIP (IP telephony). This also means that phone calls can be made without interrup-
tion with a restricted bandwidth.
VoIP
Voice over IP
See
Internet telephony
VPI
Virtual Path Identifier
Part of an address in an ATM network.
WAN
Wide Area Network
A WAN is a wide area network that is not restricted physically to a particular area, for
example the
Internet
. A WAN is run by one or more public providers to enable private
access. You access the Internet via an
Internet service provider
.
WDS
Wireless Distribution System
WDS describes the wireless connection between a number of access points.
Web server
See
Server
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the
IEEE 802.11
standard. It is used to protect wire-
less transmissions in a
WLAN
against unauthorised access through
Encryption
of the
data transmitted.
Page 188 / 196
188
Glossary
WLAN
Wireless LAN
Wireless LANs enable network components to communicate with a network using radio
waves as the transport medium. A wireless LAN can be connected as an extension to a
wired LAN or it can form the basis for a new network. The basic element of a wireless
network is the cell. This is the area where the wireless communication takes place. A
WLAN can be operated in
Ad-hoc mode
or
Infrastructure mode
.
WLAN is currently specified in Standard
IEEE 802.11
. The Gigaset SX763 WLAN dsl com-
plies with Standard 802.11g.
WPA
WPA is a new standard-conformant solution for greater security in wireless networks.
WPA is meant to replace the existing WEP standard (Wired Equivalent Privacy) and offers
more reliable encryption and authentication methods.
WPA-PSK
WPA Pre-shared Key
Variant of
WPA
data encryption in which new keys are automatically generated at regu-
lar intervals by means of a keyword (pre-shared key). The key is updated after defined
periods (
Rekey interval
).
WPS
Wi-Fi Protected Setup
WPS simplifies the setup of wireless networks.
WPS automatically sets up secure wireless networks.
Access points
(or clients with
included registrar or external registrar) can automatically generate a network ID (
SSID
)
and
WPA-PSK Encryption
if this was not performed previously. Clients can be connected
either by entering a PIN or using special registration buttons on the access point and cli-
ent.
XR
eXtended Range
XR technology extends the range in a WLAN and in so doing allows improved coverage
of the desired range in home or small office networks. Activating this function at the
access point can extend the range to the network adapters considerably, though the
data transfer rate is reduced as a result.
Page 189 / 196
189
Index
Index
Numerics
10/100 Mbps switch port
. . . . . . . . . .
26
128-bit encryption
. . . . . . . . . . . . . . .
96
128-bit key
. . . . . . . . . . . . . . . . .
57
,
96
64-bit key
. . . . . . . . . . . . . . . . . .
57
,
96
A
Access control
. . . . . . . . . . . .
59
,
74
,
98
local area network
. . . . . . . . . . . . .
98
Access point
. . . . . . . . . . . .
11
,
87
,
175
Address block for
IP addresses
. . . . . . . . . . . . . . . .
85
Ad-hoc mode
. . . . . . . . . . . . . . .
11
,
175
Ad-hoc network
. . . . . . . . . . . . . . . . .
11
ADSL interface
. . . . . . . . . . . . . . . . . .
12
ADSL modem
integrated
. . . . . . . . . . . . . . . . . . . .
7
ADSL port
. . . . . . . . . . . . . . . . . . . . .
26
ADSL/ADSL2+
. . . . . . . . . . . . . . . . . . .
7
Advanced Settings
features
. . . . . . . . . . . . . . . . . . . . .
62
Advanced setup
. . . . . . . . . . . . . . . . .
41
AES
. . . . . . . . . . . . . . . . . . . . . .
56
,
175
Annex A
. . . . . . . . . . . . . . . . . . . . .
164
Annex B
. . . . . . . . . . . . . . . . . . . . . .
164
Antenna
. . . . . . . . . . . . . . . . . . . . . .
25
Anti-DoS firewall
. . . . . . . . . . . . . . . .
73
Area code
Internet telephony
. . . . . . . . . . . .
109
ASCII key
. . . . . . . . . . . . . . . . . . .
58
,
96
Attack detection
. . . . . . . . . . . . . . . .
73
Authentication server
. . . . . . . . . . . .
94
Authorisation
. . . . . . . . . . . . . . . . .
172
Auto connect
. . . . . . . . . . . . . . . . . .
175
B
Backing up configuration data
. . . . .
131
Backup
. . . . . . . . . . . . . . . . . . . . . .
131
Bandwidth for VoIP
. . . . . . . . . . . . .
103
Base station see Access point
Baseline
. . . . . . . . . . . . . . . . . . . .
8
,
164
Basic settings
. . . . . . . . . . . . . . . . . . .
41
configuration
. . . . . . . . . . . . . . . . .
44
summary
. . . . . . . . . . . . . . . . . . . .
51
Bridge
. . . . . . . . . . . . . . . . . . . . . . .
175
Broadcast
. . . . . . . . . . . . . . . . . .
88
,
175
Browser
. . . . . . . . . . . . . . . . . . . . . . .
39
BSSID
. . . . . . . . . . . . . . . . . . . . . . . .
176
Buttons
. . . . . . . . . . . . . . . . . . . . . . .
43
C
Call forwarding
. . . . . . . . . . . . . . . .
108
Call waiting
. . . . . . . . . . . . . . . . . . .
108
Calling line identification restriction
.
108
Client
. . . . . . . . . . . . . . . . . . . . . . . .
176
CLIR
. . . . . . . . . . . . . . . . . . . . . . . . .
108
Command
net share
. . . . . . . . . . . . . . . . . . .
161
Computerbrowser
. . . . . . . . . . . . . .
162
Configuration
resetting to factory setting
. . . . . .
132
restoring
. . . . . . . . . . . . . . . . . . . .
132
security
. . . . . . . . . . . . . . . . . . . . . .
52
Configuration file
. . . . . . . . . . . . . . .
131
Configuring popup blocker
. . . . . . . .
170
Confirmation tone
negative
. . . . . . . . . . . . . . . . . . . .
124
positive
. . . . . . . . . . . . . . . . . . . . .
124
Connection duration
. . . . . . . . . . . . .
47
Connection mode
. . . . . . . . . . . . .
47
,
67
Connection on request
. . . . . . . . .
47
,
67
Connection type
. . . . . . . . . . . . . . . . .
64
ADSL
. . . . . . . . . . . . . . . . . . . . . . . .
64
Country settings
. . . . . . . . . . . . . . . .
126
D
Data encryption
. . . . . . . . . . . . . . . . .
95
Deactivating the HTTP proxy
. . . . . . .
170
Device (Annex A or B version)
. . . . .
164
DHCP
. . . . . . . . . . . . . . . . . . . . . . . .
176
DHCP server
. . . . . . . . . . . . . . . .
85
,
176
Dialling plans
. . . . . . . . . . . . . . . . . .
109
Digital Subscriber Line see DSL
Displaying the operating state
. . .
23
,
36
DMZ
. . . . . . . . . . . . . . . . . . . . . .
19
,
176
Page 190 / 196
190
Index
DNS
. . . . . . . . . . . . . . . . . . . . . . . . .
176
DNS server
. . . . . . . . . . . . . . . . . . .
177
defining
. . . . . . . . . . . . . . . . . . . . .
70
Domain name
. . . . . . . . . . . . . . . . .
177
Domain Name Service see DNS
DoS attack
. . . . . . . . . . . . . . . . .
73
,
177
DSL
. . . . . . . . . . . . . . . . . . . . . . . . .
177
DSL interface
configuring
. . . . . . . . . . . . . . . . . .
44
Dynamic DNS see DynDNS
Dynamic Host Configuration Protocol,
see DHCP
Dynamic IP address
. . . . . . . . . . . . .
177
DynDNS
. . . . . . . . . . . . . . . . . . .
81
,
177
DynDNS service, see DynDNS
DynDNS.org
. . . . . . . . . . . . . . . . .
81
,
82
E
ECO
. . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Encryption
. . . . . . . . . . . . . .
92
,
96
,
177
WEP
. . . . . . . . . . . . . . . . . . . . . . . .
57
WPA
. . . . . . . . . . . . . . . . . . . . . . . .
56
Ethernet
. . . . . . . . . . . .
10
,
11
,
18
,
178
transmission speed
. . . . . . . . . . . . .
18
Ethernet network
linking with a wireless network
. . .
13
Exposed host
. . . . . . . . . . . . . . . . . . .
80
Extending wireless coverage
. . . . . . .
14
Extensions
. . . . . . . . . . . . . . . . . . . .
105
F
Features
. . . . . . . . . . . . . . . . . . . . . .
18
File and Printer Sharing
. . . . . . . . . .
159
File server
. . . . . . . . . . . . . . . . . . . .
113
partition list
. . . . . . . . . . . . . . . . .
114
sharing directories
. . . . . . . . . . . .
114
Firewall
. . . . . . . . . . . . . . . . . . .
19
,
178
activating/deactivating
. . . . . . . . . .
72
attack detection
. . . . . . . . . . . . . . .
73
configuring
. . . . . . . . . . . . . . . . . .
72
security level
. . . . . . . . . . . . . . . . .
73
Windows
. . . . . . . . . . . . . . . . . . .
163
Firmware
current version
. . . . . . . . . . .
133
,
135
updating
. . . . . . . . . . . . . . . . . . .
133
Flat rate
. . . . . . . . . . . . . . . . . . . . . .
178
Full duplex
. . . . . . . . . . . . . . . . . . . .
178
G
Games on the Internet
. . . . . . . . . . . .
77
Gateway
. . . . . . . . . . . . . . . . . . . . . .
178
Gigaset SX76x
Annex A
. . . . . . . . . . . . . . . . . . . .
164
Annex B
. . . . . . . . . . . . . . . . . . . .
164
device version
. . . . . . . . . . . . . . . .
164
Ethernet network setup
. . . . . . . . .
10
IP address
. . . . . . . . . . . . . . . . . . . .
39
password protected
. . . . . . . . . . . . .
53
Gigaset SX76x WLAN dsl
configuring
. . . . . . . . . . . . . . . . . . .
39
default settings
. . . . . . . . . . . . . . . .
21
installation
. . . . . . . . . . . . . . . . . . .
22
possibilities for network setup
. . . . . .
9
rear panel
. . . . . . . . . . . . . . . . . . . .
26
setting up
. . . . . . . . . . . . . . . . . . . .
23
Global IP address see Public IP address
GNU General Public License
. . . . . . .
173
GNU Lesser General Public License
. .
173
GPL
. . . . . . . . . . . . . . . . . . . . . . . . .
173
H
Hacker attack
. . . . . . . . . . . . . . . . . . .
19
Hacker attacks
. . . . . . . . . . . . . . . . .
177
Hacker protection
. . . . . . . . . . . . . . . .
73
Half duplex
. . . . . . . . . . . . . . . . . . .
178
Help
. . . . . . . . . . . . . . . . . . . . . . . . . .
43
Hexadecimal key
. . . . . . . . . . . . .
58
,
96
HTTP proxy
. . . . . . . . . . . . . . . . . . . .
178
Hub
. . . . . . . . . . . . . . . . . . . . . . . . .
179
I
Idle time
. . . . . . . . . . . . . . . . . . . . . .
128
IEEE
. . . . . . . . . . . . . . . . . . . . . . . . .
179
Infrastructure mode
. . . . . . . . . .
11
,
179
Installation
. . . . . . . . . . . . . . . . . . . . .
22
Installing printer driver
Windows XP/2000
. . . . . . . . . . . . .
157
Institute of Electrical and Electronic
Engineers see IEEE
Inter Process Communication see IPC
Internet
. . . . . . . . . . . . . . .
63
,
179
,
180
connection mode
. . . . . . . . . . .
47
,
67
connection on request
. . . . . . . . . .
67
connection type
. . . . . . . . . . . . . . .
64
manual connection
. . . . . . . . . . . . .
68

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top