Glossary

Client

A client is an application that requests a service from a server. For example, an HTTP client on a PC in a local network requests data, i.e. Web pages, from an HTTP server on the Internet. Frequently the network component (e.g. the PC) on which the client application is running is also called a client.

Connect on demand

Connect on demand means that applications such as a Web browser, Messenger and E- mail automatically open an Internet connection when they are launched. This can lead to high charges if you are not using a Flat rate. This function can be deactivated at the Gigaset SE366 WLAN to save call charges.

DHCP

Dynamic Host Configuration Protocol

DHCP handles the automatic assignment of IP addresses to network components. It was developed due to the fact that in large networks – especially the Internet – defining IP addresses is very complex as participants frequently move, drop out or new ones join. A DHCP server automatically assigns the connected network components

(DHCP Clients) Dynamic IP addresses from a defined IP pool range, thus saving a great deal of configuration work. In addition, it also allows address blocks to be used more effectively: Since not all participants are in the network at the same time, the same IP address can be assigned to different network components in succession as and when required.

The Gigaset SE366 WLAN includes a DHCP server and can automatically assign

IP addresses to PCs in the local network. You can specify that the IP addresses for certain PCs are never changed.

DHCP server

See DHCP

DMZ

Demilitarized Zone, see also Exposed Host

DMZ describes a part of a network that is outside the Firewall. A DMZ is set up, as it were, between a network you want to protect (e.g. a LAN) and a non-secure network (e.g. the Internet). A DMZ is useful if you want to offer Server services on the Internet which, for security reasons, will not run behind the firewall, or if Internet applications do not function correctly behind a firewall. A DMZ permits unrestricted access from the Internet to only one or a few network components, while the other network components remain secure behind the firewall.

107