Glossary

IP address

The address of a host on the Internet, consisting of four numbers, each from 0 to 255, separated by periods, for example 192.168.1.1. An IP address consists of a network ID that identifies the particular network the host belongs to, and a host ID uniquely identifying the host itself on that network. A network mask is used to define the network ID and the host ID.

LAN

Local Area Network.

A computer network limited to the immediate area, such as a home, office, or small building.

Lease time

The amount of time that an dynamically assigned IP address will be valid for a specific device.

MAC address

Media Access Control address.

The permanent hardware address of a device assigned by its manufacturer. MAC addresses are expressed as six pairs of hexadecimal characters (0-9 and A-F), with each pair separated by colons. For example: 1a:2b:23:5b:66:9a

Mass Storage

Various techniques and devices used to store large amounts of data. An example of a mass storage device is a hard disk.

NAT

Network Address Translation.

A service performed by many routers that translates a network’s IP address into a private IP address for each device on the LAN. Only the router and the LAN know these addresses; the outside world sees only the public IP address when talking to a computer on the LAN.

Network mask

A sequence of bits applied to an IP address to select the network ID while ignoring the host ID. Bits set to 1 mean “select this bit” while bits set to 0 mean “ignore this bit”. For example, if the network mask 255.255.255.0 is applied to the IP address 100.10.50.1, the network ID is 100.10.50, and the host ID is 1. See also subnet mask.

Packet

The units of data transmitted on a network. Each packet contains a payload (the data), plus overhead information such as where it came from (source address) and where it will go (destination address).

Pass Phrase

A secret password used for WPA and WPA2 wireless data encryption. The encryption is based on a WPA master key that is derived from the pass phrase and the network name (SSID).

PC

Personal Computer.

A computer designed for use by one person at a time.

PIN

Personal Identification Number.

A secret code used for individual access to for example computer networks. Generally, a PIN is made up of 4 to 10 digits.

PPP Point-to-Point Protocol.

A protocol for serial data transmission that is used to carry IP (and other protocol) data between the service provider and your computer.

Private IP Address

A private IP Address is typically assigned to a client on a LAN (Local Area Network) and is not used outside the LAN. Private IP addresses are typically used when multiple computers share the same Internet connection.

1/1551-CRH 102 167 Uen Rev A 2006-09-07

57

Page 61
Image 61
Ericsson W20 manual Lan, Nat

W20 specifications

The Ericsson W20 is an innovative wireless communication solution designed to enhance connectivity and support a diverse range of applications across various industries. This device is particularly valuable for businesses seeking to implement secure, reliable, and high-performance wireless networks.

One of the main features of the Ericsson W20 is its support for advanced LTE and 5G connectivity. This allows for greater data transfer speeds, improved network efficiency, and reduced latency. The W20 operates on multiple frequency bands, enabling it to adapt to different network conditions and requirements, making it ideal for both urban and rural deployments.

Another significant feature of the W20 is its robustness and reliability. The device is built to withstand harsh environmental conditions, ensuring uninterrupted service in diverse settings. With IP67-rated protection, it is resistant to dust and water, making it suitable for outdoor installations. This durability is crucial for industries such as transportation, utilities, and public safety, where consistent connectivity is paramount.

The W20 incorporates advanced technologies such as Carrier Aggregation, allowing users to combine multiple frequency bands for enhanced bandwidth. This capability is particularly beneficial in scenarios where high data capacity is essential, such as streaming services and real-time applications. Additionally, the device supports Quality of Service (QoS) features, which prioritize critical data traffic to ensure optimal performance for essential services.

Security is another cornerstone of the Ericsson W20. It is equipped with advanced encryption protocols and security features to protect data transmission from unauthorized access and cyber threats. This is particularly important for business-critical applications that handle sensitive information.

User-friendly management software accompanies the W20, providing IT teams with straightforward tools to monitor network performance, conduct troubleshooting, and manage device configuration. The software's intuitive interface facilitates quick responses to connectivity issues, which can significantly reduce downtime.

In conclusion, the Ericsson W20 stands out for its advanced connectivity capabilities, robustness, and security features. With its support for cutting-edge technologies, the W20 is poised to meet the evolving needs of businesses and industries in an increasingly connected world.