Canon 802.11g 54M WLAN user manual Dhcp Dynamic Host Configuration Protocol, Encryption, Firewall

Models: 802.11g 54M WLAN

1 72
Download 72 pages 25.29 Kb
Page 65
Image 65

802.11g 4-Port Wireless LAN Broadband Router

4.Glossary Ad-Hoc Mode

An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation.

BSS ID

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID.

DHCP (Dynamic Host Configuration Protocol)

DHCP is a protocol for dynamically assigning IP addresses to networked computers. With DHCP, a computer can automatically be given a unique IP address each time it connects to a network—making IP address management an easier task for network administrators. When a computer logs on to the network, the DHCP server selects an IP address from a master list and assigns it to the system.

DMZ Host (De-Militarized Zone Host)

DMZ is the portion of a private network that is visible through the network’s firewalls. DMZ Host allows a local computer exposed to the Internet. Therefore, an incoming packet will be checked by Firewall and NAT algorithms in the router then pass to the DMZ host when packet is not sent by hacker and is not limited by Virtual Server list. Besides, there are some IP protocols that do not have port number information. There is no way to use Virtual Server setting to forward incoming packet. Thus, DMZ host is the way to forward such kind of packets. If you try to enable DMZ host and setup Virtual Server, the precedence is Virtual Server and then DMZ. For example, the incoming packet will be checked with Firewall rules, Virtual Server rules and

then DMZ host.

DSSS (Direct-Sequencing Spread-Spectrum)

DSSS operate over the radio airwaves in the unlicensed ISM band (industrial, scientific, medical). DSSS uses a radio transmitter to spread data packets over a fixed range of frequency band.

Encryption

It’s a security method that applies a specific algorithm to data in order to alter the data appearance and prevent other devices from reading the information.

Firewall

A firewall is a device that sits between your computer and the Internet that prevents unauthorized access to or from your network. A firewall can be a computer using firewall

65

Page 65
Image 65
Canon 802.11g 54M WLAN Dhcp Dynamic Host Configuration Protocol, DMZ Host De-Militarized Zone Host, Encryption, Firewall