Linksys WET11 manual Wireless-B Ethernet Bridge

Page 41

Wireless-B Ethernet Bridge

Dynamic IP Address - A temporary IP address assigned by a DHCP server.

Encryption - Encoding data to prevent it from being read by unauthorized people.

Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium.

Finger - A program that tells you the name associated with an e-mail address.

Firewall - Security measures that protect the resources of a local network from intruders.

Firmware - 1. In network devices, the programming that runs the device. 2. Programming loaded into read-only memory (ROM) or programmable read-only memory (PROM) that cannot be altered by end-users.

Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet.

FTP (File Transfer Protocol) - A standard protocol for sending files between computers over a TCP/IP network and the Internet.

Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A system that interconnects networks.

Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time.

Hardware - The physical aspect of computers, telecommunications, and other information technology devices.

HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web.

IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking standards.

Infrastructure - Currently installed computing and networking equipment.

Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access point.

IP (Internet Protocol) - A protocol used to send data over a network.

IP Address - The address used to identify a computer or device on a network.

Appendix E: Glossary

36

Image 41
Contents 802 GHz .11b Wireless- B Copyright and Trademarks How to Use this GuideTable of Contents Wireless-B Ethernet Bridge Ad-Hoc Mode Infrastructure ModeIntroduction IntroductionWhat’s in this Guide? Wireless-B Ethernet Bridge Network Topology Ad-Hoc versus Infrastructure ModeAd-Hoc Mode LAN Getting to Know the Wireless-B Ethernet BridgePWR Connect the Ethernet Network Cable Connecting the Wireless-B Ethernet Bridge for SetupOverview Setting Up the Wireless-B Ethernet BridgeSetup Wizard List of Bridges Wireless Settings WEP Key Connecting the Wireless-B Ethernet Bridge for Network Use Starting the Web-based Utility Using the Wireless-B Ethernet Bridge Web-based UtilityWireless SetupSite Survey Password Tab MAC Address AdvancedWireless Settings LAN SettingsStatus LAN StatisticsHelp Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility doesn’t detect the Bridge Frequently Asked QuestionsWhat is ad-hoc mode? What is Spread Spectrum? What Are the Risks? Appendix B Wireless SecurityBrief Overview Jamming Attacks Passive AttacksActive Attacks Maximizing Wireless SecurityDictionary-Building or Table Attacks Man-in-the-Middle AttacksWireless-B Ethernet Bridge Ssid Wireless-B Ethernet Bridge Figure B-2 WEP Encryption WEP EncryptionAppendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Model Appendix F SpecificationsStandards Ieee 802.11b, Ieee Ports ButtonsStorage Humidity Warranty Year LimitedOperating Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada Wireless-B Ethernet Bridge Appendix I Contact Information