Page 41 / 53 Scroll up to view Page 36 - 40
Prestige 964 Cable Router
Safety Instructions
C
Appendix B
Important Safety Instructions
The following safety instructions apply to the Prestige:
Be sure to read and follow all warning notices and instructions.
The maximum recommended ambient temperature for the Prestige is 40º(104º). Care must be taken to allow
sufficient air circulation or space between units when the Prestige is installed inside a closed rack assembly.
The operating ambient temperature of the rack environment might be greater than room temperature.
Installation in a rack without sufficient airflow can be unsafe.
Racks should safely support the combined weight of all equipment.
The connections and equipment that supply power to the Prestige should be capable of operating safely with
the maximum power requirements of the Prestige. In case of a power overload, the supply circuits and supply
wiring should not become hazardous. The input rating of the Prestige is printed on the nameplate.
The AC adapter must plug in to the right supply voltage, i.e. 120VAC adapter for North America and 230VAC
adapter for Europe. Make sure that the supplied AC voltage is correct and stable. If the input AC voltage is
over 10% lower than the standard may cause the Prestige to malfunction.
Installation in restricted access areas must comply with Articles 110-16, 110-17, and 110-18 of the National
Electrical Code, ANSI/NFPA 70.
Do not allow anything to rest on the power cord of the AC adapter, and do not locate the product where
anyone can walk on the power cord.
Do not service the product by yourself. Opening or removing covers can expose you to dangerous high voltage
points or other risks. Refer all servicing to qualified service personnel.
Generally, when installed after the final configuration, the product must comply with the applicable safety
standards and regulatory requirements of the country in which it is installed. If necessary, consult the
appropriate regulatory agencies and inspection authorities to ensure compliance.
1.
A rare condition can create a voltage potential between the earth grounds of two or more buildings. If
products installed in separate building are interconnected, the voltage potential can cause a hazardous
condition. Consult a qualified electrical consultant to determine whether or not this phenomenon exists and,
if necessary, implement corrective action before interconnecting the products. If the equipment is to be used
with telecommunications circuit, take the following precautions:
Never install wiring during a lightning storm.
Never install jacks in wet location unless the jack is specially designed for wet location.
Never touch uninsulated wires or terminals unless the line has been disconnected at the network interface.
Use caution when installing or modifying lines during an electrical storm. There is a remote risk of electric
shock from lightning.
Downloaded from
www.Manualslib.com
manuals search engine
Page 42 / 53
Downloaded from
www.Manualslib.com
manuals search engine
Page 43 / 53
Prestige 964 Cable Router
Glossary
E
Glossary of Terms
10BaseT
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling
(Category 3 or 5): one pair for transmitting data and the other for receiving data.
ARP
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to
a physical machine address that is recognized in the local network.
Authenticity
Proof that the information came from the person or location that reportedly sent it. One example
of authenticating software is through digital signatures.
Back Door
A deliberately planned security breach in a program. Back doors allow special access to a
computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized
access to data.
Backbone
A high-speed line or series of connections that forms a major pathway within a network.
BackOrifice
BackOrifice is a remote administration tool which allows a user to control a
computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is
a potentially disastrous Trojan horse since it can provide the user unlimited access to a system.
Bandwidth
This is the capacity on a link usually measured in bits-per-second (bps).
Bit
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The
smallest unit of computerized data.
Brute Force Hacking
A technique used to find passwords or encryption keys. Force Hacking involves trying every
possible combination of letters, numbers, etc. until the code is broken.
Byte
A set of bits that represent a single character. There are 8 bits in a Byte.
Cable Modem (CM)
A cable modem is a device that enables you to hook up your computer to a local cable TV line
and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56
Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to
subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to
or integrated with a set top box that turns your TV set into an Internet channel. For computer
attachment, the cable line must be split so that part of the line goes to the TV set and the other
part goes to the cable modem and the computer.
A cable modem is more like a network interface card (NIC) than a computer modem. All of the
cable modems attached to a cable TV company coaxial cable line communicate with a Cable
Modem Termination System (CMTS) at the local cable TV company office. All cable modems
can receive only from and send signals to the CMTS, but not to other cable modems on the line.
Camping Out
Staying in a "safe" place once a hacker has broken into a system. The term
can be used with a physical location, electronic reference, or an entry point for future attacks.
CATV
Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based.
CDR
Call Detail Record. This is a name used by telephone companies for call related information.
Channel
A specific frequency and bandwidth combination. In the present context, it means TV channels
for television services and downstream data for cable modems.
CHAP
Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending
passwords over the wire by using a challenge/response technique.
Downloaded from
www.Manualslib.com
manuals search engine
Page 44 / 53
Prestige 944S Cable Sharing Gateway with 4-port Switch
F
Glossary
Cipher Text
Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See
Encryption
Client
A software program that is used to contact and obtain data from a Server software program on
another computer. Each Client program is designed to work with one or more specific kinds of
Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific
kind of Client.
CMTS
Cable Modem Termination System. A central device for connecting the cable TV network to a
data network like the Internet. Normally it is placed in the headend of the cable TV system.
Cookie
A string of characters saved by a web browser on the user's hard disk. Many web pages send
cookies to track specific user information. Cookies can be used to retain information as the user
browses a web site. For example, cookies are used to 'remember' the items a shopper may have in
a shopping cart.
Countermeasures
Techniques, programs, or other tools that can protect your computer against threats.
CPE
Customer Premises Equipment. Used to describe the computer and/or other equipment that the
customer may want to connect to the cable modem.
Cracker
Another term for hackers. Generally, the term cracker refers specifically to a person who
maliciously attempts to break encryption, software locks, or network security.
Cracker Tools
Programs used to break into computers. Cracker tools are widely
distributed on the Internet. They include password crackers, Trojans, viruses, war-dialers, and
worms.
Cracking
The act of breaking into computers or cracking encryptions.
Crossover Ethernet
cable
A cable that wires a pin to its opposite pin, for example, RX+ is wired to TX+. This cable
connects two similar devices, for example, two data terminal equipment (DTE) or data
communications equipment (DCE) devices.
Cryptoanalysis
The act of analyzing (or breaking into) secure documents or systems that are protected with
encryption.
CSU/DSU
Channel Service Unit/Data Service Unit. CSUs (channel service units) and DSUs (data service
units) are actually two separate devices, but they are used in conjunction and often combined into
the same box. The devices are part of the hardware you need to connect computer equipment to
digital transmission lines. The Channel Service Unit device connects with the digital
communication line and provides a termination for the digital signal. The Data Service Unit
device, sometimes called a digital service unit, is the hardware component you need to transmit
digital data over the hardware channel. The device converts signals from bridges, routers, and
multiplexors into the bipolar digital signals used by the digital lines. Multiplexors mix voice
signals and data on the same line.
DCE
Data Communications Equipment is typically a modem or other type of communication device.
The DCE sits between the DTE (data terminal equipment) and a transmission circuit such as a
phone line.
Decryption
The act of restoring an encrypted file to its original state.
Denial of Service
Act of preventing customers, users, clients or other machines from
accessing data on a computer. This is usually accomplished by interrupting or overwhelming the
computer with bad or excessive information requests.
DHCP
Dynamic Host Configuration Protocol automatically assigns IP addresses to clients when they
Downloaded from
www.Manualslib.com
manuals search engine
Page 45 / 53
Prestige 964 Cable Router
Glossary
G
log on. DHCP centralizes IP address management on central computers that run the DHCP server
program. DHCP leases addresses for a period of time which means that addresses are made
available to assign to other systems.
Digital Signature
Digital code that authenticates whomever signed the document or software. Software, messages,
Email, and other electronic documents can be signed electronically so that they cannot be altered
by anyone else. If someone alters a signed document, the signature is no longer valid. Digital
signatures are created when someone generates a hash from a message, then encrypts and sends
both the hash and the message to the intended recipient. The recipient decrypts the hash and
original message, makes a new hash on the message itself, and compares the new hash with the
old one. If the hashes are the same, the recipient knows that the message has not been changed.
Also see Public-key encryption.
DNS
Domain Name System. A database of domain names and their IP addresses. DNS is the primary
naming system for many distributed networks, including the Internet.
DOCSIS
Data over Cable Service Interface Specification. It is the dominating cable modem standard,
which defines technical specifications for both cable modem and CMTS.
Domain Name
The unique name that identifies an Internet site. Domain Names always have 2 or more parts,
separated by dots. The part on the left is the most specific, and the part on the right is the most
general.
Downstream
The data flowing from the CMTS to the cable modem.
Downstream
Frequency
The frequency used for transmitting data from the CMTS to the cable modem. Normally in the
42/65-850 MHz range depending on the actual cable plant capabilities.
DRAM
Dynamic RAM that stores information in capacitors that must be refreshed periodically.
DTE
Originally, the DTE (data terminal equipment) meant a dumb terminal or printer, but today it is a
computer, or a bridge or router that interconnects local area networks.
EMI
ElectroMagnetic Interference. The interference by electromagnetic signals that can cause reduced
data integrity and increased error rates on transmission channels.
Encryption
The act of substituting numbers and characters in a file so that the file is unreadable until it is
decrypted. Encryption is usually done using a mathematical formula that determines how the file
is decrypted.
Ethernet
A very common method of networking computers in a LAN. There are a number of adaptations
to the IEEE 802.3 Ethernet standard, including adaptations with data rates of 10 Mbits/sec and
100 Mbits/sec over coaxial cable, twisted-pair cable, and fiber-optic cable. The latest version of
Ethernet, Gigabit Ethernet, has a data rate of 1 Gbit/sec.
Events
These are network activities. Some activities are direct attacks on your system, while others
might be depending on the circumstances. Therefore, any activity, regardless of severity is called
an event. An event may or may not be a direct attack on your system.
FAQ
(Frequently Asked Questions) -- FAQs are documents that list and answer the most common
questions on a particular subject.
FCC
The FCC (Federal Communications Commission) is in charge of allocating the electromagnetic
spectrum and thus the bandwidth of various communication systems.
Firewall
A hardware or software "wall" that restricts access in and out of a network. Firewalls are most
often used to separate an internal LAN or WAN from the Internet.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top