Gigabyte GN-AP03G User Manual - Page 26

Client devices, Dynamic IP Address, Encryption, Ethernet, Firewall, Firmware, Gateway - wpa

Page 26 highlights

GN-AP03G AirCruiser G Range Extender Client devices Wi-Fi client devices include PC Cards that slide into laptop computers, mini-PCI modules embedded in laptop computers and mobile computing devices, as well as USB radios and PCI/ISA bus Wi-Fi radios. Client devices usually communicate with hub devices like access points and gateways. DHCP The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers. DSSS Also known as "Direct Sequence Spread Spectrum," this is a variety of radio transmission methods that continuously change frequencies or signal patterns. Direct Sequence Spread Spectrum (DSSS), which is used in CDMA technology,. multiplied the data bits by a very fast, pseudo-random bet pattern (PN sequence) that "spreads" the data into a large coded stream that takes the full bandwidth of the channel. DNS The Domain Name System (DNS) is a distributed Internet directory service.DNS is used mostly to translate between domain names and IP addresses, and to control Internet email delivery. Most Internet services rely on DNS to work, and if DNS fails, web sites cannot be located and email delivery stalls. Dynamic IP Address An IP address is automatically assigned to a user's AP in a TCP/IP network typically by a DHCP server. EAP Extensible Authentication Protocol. A protocol provides an authentication framework for both wireless and wired Ethernet enterprise networks. It is typically used with a RADIUS server to authenticate users on large networks. EAP protocol types are used in the 802.1X-based authentication in WPA-Enterprise and WPA2-Enterprise. Encryption A mechanism used for confidential data exchange. Ethernet The most popular international standard technology for wired Local Area Networks (LANs). It provides from 10 Mbps transmission speeds on basic 10BastT Ethernet networks to 100 Mbps transmission speeds on Fast Ethernet networks, 1000 Mbps on Gigabit Ethernet, and 10,000 Mbps on 10 Gigabit Ethernet. Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firmware Software routines that are embedded as read-only memory (ROM) in a computer chip or hardware device to prevent modification of the routines. Unlike random access memory (RAM), read-only memory stays intact in the absence of electrical power. Startup routines and low-level input/output instructions are stored in firmware. Gateway A device, usually a Router, that connects hosts on a local network to other networks. 22

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36

GN-AP03G AirCruiser G Range Extender
Client devices
Wi-Fi client devices include PC Cards that slide into laptop computers, mini-PCI modules embedded in
laptop computers and mobile computing devices, as well as USB radios and PCI/ISA bus Wi-Fi radios.
Client devices usually communicate with hub devices like access points and gateways.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the configuration of
computers that use TCP/IP. DHCP can be used to automatically assign IP addresses, to deliver TCP/IP
stack configuration parameters such as the subnet mask and default router, and to provide other
configuration information such as the addresses for printer, time and news servers.
DSSS
Also known as “Direct Sequence Spread Spectrum,” this is a variety of radio transmission methods that
continuously change frequencies or signal patterns. Direct Sequence Spread Spectrum (DSSS), which is
used in CDMA technology,. multiplied the data bits by a very fast, pseudo-random bet pattern (PN
sequence) that “spreads” the data into a large coded stream that takes the full bandwidth of the channel.
DNS
The Domain Name System (DNS) is a distributed Internet directory service.DNS is used mostly to translate
between domain names and IP addresses, and to control Internet email delivery. Most Internet services rely
on DNS to work, and if DNS fails, web sites cannot be located and email delivery stalls.
Dynamic IP Address
An IP address is automatically assigned to a user’s AP in a TCP/IP network typically by a DHCP server.
EAP
Extensible Authentication Protocol. A protocol provides an authentication framework for both wireless and
wired Ethernet enterprise networks. It is typically used with a RADIUS server to authenticate users on large
networks. EAP protocol types are used in the 802.1X-based authentication in WPA-Enterprise and
WPA2-Enterprise.
Encryption
A mechanism used for confidential data exchange.
Ethernet
The most popular international standard technology for wired Local Area Networks (LANs). It provides from
10 Mbps transmission speeds on basic 10BastT Ethernet networks to 100 Mbps transmission speeds on
Fast Ethernet networks, 1000 Mbps on Gigabit Ethernet, and 10,000 Mbps on 10 Gigabit Ethernet.
Firewall
A system designed to prevent unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both.Firewalls are frequently used to
prevent unauthorized Internet users from accessing private networks connected to the Internet, especially
intranets.All messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
Firmware
Software routines that are embedded as read-only memory (ROM) in a computer chip or hardware device
to prevent modification of the routines. Unlike random access memory (RAM), read-only memory stays
intact in the absence of electrical power. Startup routines and low-level input/output instructions are stored
in firmware.
Gateway
A device, usually a Router, that connects hosts on a local network to other networks.
22