Linksys WET200 manual Appendix B

Models: WET200

1 39
Download 39 pages 1.12 Kb
Page 30
Image 30

Appendix B

Glossary

TCP(TransmissionControlProtocol)  Anetworkprotocol for transmitting data that requires acknowledgement from the recipient of data sent.

TCP/IP (Transmission Control Protocol/Internet Protocol)  A set of instructions PCs use to communicate over a network.

Telnet  A user command and TCP/IP protocol used for accessing remote PCs.

TFTP (Trivial File Transfer Protocol)  A version of the TCP/IP FTP protocol that has no directory or password capability.

Throughput  The amount of data moved successfully from one node to another in a given time period.

Trunking  Link Aggregation. Optimizes port usage by linking a group of ports together to form a single trunk (aggregated groups).

TX Rate  Transmission Rate.

UDP (User Data Protocol)  Communication protocol that transmits packets but does not guarantee their delivery.

Upgrade  To replace existing software or firmware with a newer version.

Upload  To transmit a file over a network.

URL (Uniform Resource Locator)  The address of a file located on the Internet.

VLAN (Virtual Local Area Networks)  Logical subgroups that constitute a Local Area Network (LAN). This is done in software rather than defining a hardware solution.

WAN (Wide Area Network)  Networks that cover a large geographical area.

Wildcard Mask  Specifies which IP address bits are used, and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important.

For example, if the destination IP address is 149.36.184.198 and the wildcard mask is 255.36.184.00, the first two bits of the IP address are used, while the last two bits are ignored.

Wireless-G Business Ethernet Bridge

26

Page 30
Image 30
Linksys WET200 manual Appendix B

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.