Linksys WET54G V3 manual Wireless-G Ethernet Bridge

Page 45

Wireless-G Ethernet Bridge

Dynamic IP Address - A temporary IP address assigned by a DHCP server.

Encryption - Encoding data to prevent it from being read by unauthorized people.

Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium.

Finger - A program that tells you the name associated with an e-mail address.

Firewall - Security measures that protect the resources of a local network from intruders.

Firmware - 1. In network devices, the programming that runs the device. 2. Programming loaded into read-only memory (ROM) or programmable read-only memory (PROM) that cannot be altered by end-users.

Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet.

FTP (File Transfer Protocol) - A standard protocol for sending files between computers over a TCP/IP network and the Internet.

Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A system that interconnects networks.

Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time.

Hardware - The physical aspect of computers, telecommunications, and other information technology devices.

HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web.

IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking standards.

Infrastructure - Currently installed computing and networking equipment.

Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access point.

IP (Internet Protocol) - A protocol used to send data over a network.

IP Address - The address used to identify a computer or device on a network.

Appendix E: Glossary

39

Image 45
Contents Wireless- G Copyright and Trademarks How to Use this GuideTable of Contents Wireless-G Ethernet Bridge Ad-Hoc Network Infrastructure Network10 RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Ad-Hoc Network Network LayoutLAN GettingtoKnowtheWireless-GEthernetBridgeFront Panel Connect the Power Connecting the Wireless-G Ethernet Bridge for SetupWelcome Setting Up the Wireless-G Ethernet BridgeList of Bridges Wireless Settings Security Settings-WEP 10 Confirmation Placement Options Connecting the Wireless-G Ethernet Bridge for Network UseConnection to a Network Device Wall Mount OptionStand Option Vertical PlacementUsing the Wireless-G Ethernet Bridge Web-based Utility OverviewStarting the Web-based Utility Wireless SetupSite Survey WEP WEPWPA Pre-Shared Key MD5 RadiusRADIUS-TLS TLS10 RADIUS-TTLS Ttls11 Password Tab Advanced SettingsMAC Address Wireless Settings LAN SettingsStatus LAN Statistics14 Help Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility won’t open Frequently Asked QuestionsWhat is ad-hoc mode? What is ISM band? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Ethernet Bridge Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Appendix F Specifications Storage Temp Warranty Year LimitedOperating Humidity Storage HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada EC Declaration of Conformity EuropeFrance Safety NoticesAppendix I Contact Information