User Manual |
|
|
|
Aolynk DR811/DR814 ADSL2+Broadband Router | 9 Appendix - Glossary | ||
DHCP | Dynamic | DHCP automates address assignment and management. When | |
| Host | a computer connects to the LAN, DHCP assigns it an IP address | |
| Configuratio | from a shared pool of IP addresses; after a specified time limit, | |
| n Protocol | DHCP returns the address to the pool. |
|
DHCP server | Dynamic | A DHCP server is a computer that is responsible for assigning IP | |
| Host | addresses to the computers on a LAN. See DHCP. | |
| Configuratio |
|
|
| n Protocol |
|
|
| server |
|
|
DNS | Domain | The DNS maps domain names into IP addresses. DNS | |
| Name | information is distributed hierarchically throughout the Internet | |
| System | among computers called DNS servers. For example, | |
|
| www.yahoo.com is the domain name associated with IP | |
|
| address 216.115.108.243. When you start to access a web site, | |
|
| a DNS server looks up the requested domain name to find its | |
|
| corresponding IP address. If the DNS server cannot find the IP | |
|
| address, it communicates with | |
|
| determine the IP address. See also domain name. | |
domain |
| A domain name is a | |
name |
| associated IP address. Domain names must be unique; their | |
|
| assignment is controlled by the Internet Corporation for | |
|
| Assigned Names and Numbers (ICANN). A domain name is a | |
|
| key element of a URL, which identifies a specific file at a web | |
|
| site. See also DNS. |
|
download |
| To transfer data in the downstream direction, i.e. from the | |
|
| Internet to the user. |
|
DSL | Digital | A technology that allows both digital data and analog voice | |
| Subscriber | signals to travel over existing copper telephone lines. | |
| Line |
|
|
Ethernet |
| The most commonly installed computer network technology, | |
|
| usually using twisted pair wiring. Ethernet data rates are 10 | |
|
| Mbps and 100 Mbps. See also | |
|
| twisted pair. |
|
firewall |
| A firewall is a method for protecting your computer or LAN from | |
|
| attacks and other unwelcome or malicious accesses from the | |
|
| outside (i.e. the Internet). Unauthorized users may attempt to | |
|
| attack your network in order to prevent you or others on your | |
|
| LAN from using. |
|
|
| You can protect your network by blocking certain types of IP | |
|
| traffic commonly used by ‘hackers’ to transport attacks from the | |
|
| Internet to your LAN (incoming traffic). Similarly, you can restrict | |
|
| the types of IP traffic sent from your network to the Internet | |
|
| (outgoing traffic). Some firewall protection can be provided by | |
|
| packet filtering and Network Address Translation services. | |
FTP | File Transfer | A program used to transfer files between computers connected | |
| Protocol | to the Internet. Common uses include uploading new or updated | |
|
| files to a web server, and downloading files from a web server. | |
Gbps |
| Abbreviation for Gigabits | |
|
| billion bits per second. Internet data rates are often expressed in | |
|
| Gbps. |
|
70