ZyXEL B-400 User Guide - Page 29

MAC Address Media Access Control Address, TCP/IP Transmission Control Protocol/Internet Protocol,

Page 29 highlights

11Mbps Wireless Ethernet Adapter User's Manual within a single building. The LAN baud rate varies from 10 Mbps to 100 Mbps. MAC Address (Media Access Control Address) The MAC address is a physical address specific to each network card. The MAC address is configured from a total of six bytes as follows: A vendor code comprising the lead three bytes and a 3-byte user code. The vendor code is managed and assigned by IEEE. The user code is managed using a unique (unduplicated) number from the network card manufacturer. That is, the MAC address is assigned as a physical address unique throughout the world. In an Ethernet LAN, the MAC address is used as a base to create a frame for sending and receiving. TCP/IP (Transmission Control Protocol/Internet Protocol) TCP/IP is a protocol equivalent to the network and transport levels of the OSI reference model, and it is defined using RFC. Consequently, different terminals can communicate with each other using TCP/IP. • Normally, TCP/IP includes the application protocols TELNET and FTP. • TCP/IP is the standard Internet protocol. WEP (Encryption) By setting an encryption key in the Access Point, you can prevent wireless packets from being decrypted externally. Firmware Firmware is the name given to the software (programs) built into hardware such as the router, modem, and terminal adapter. This software is built into the hardware, so it can be said to be in-between hardware and software. Protocol Protocols are the procedures and regulations for sending and receiving data between the network terminals. For example, if two computers are communicating, you can send the correct information according to the regulations by formatting all required information. The protocol such as which terminal sends first, what type of message, what type of message the receiving terminal should send in reply, the data format, and responses to communications errors are same of examples. Roaming Function Using the roaming function and moving from one room to another room, you can switch the Access Point automatically. With the roaming function, you can easily move from the office 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31

11Mbps Wireless Ethernet Adapter User's Manual
29
within a single building. The LAN baud rate varies from 10 Mbps to 100 Mbps.
MAC Address (Media Access Control Address)
The MAC address is a physical address specific to each network card. The MAC address is
configured from a total of six bytes as follows: A vendor code comprising the lead three
bytes and a 3-byte user code. The vendor code is managed and assigned by IEEE. The
user code is managed using a unique (unduplicated) number from the network card
manufacturer. That is, the MAC address is assigned as a physical address unique
throughout the world. In an Ethernet LAN, the MAC address is used as a base to create a
frame for sending and receiving.
TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP/IP is a protocol equivalent to the network and transport levels of the OSI reference
model, and it is defined using RFC. Consequently, different terminals can communicate with
each other using TCP/IP.
• Normally, TCP/IP includes the application protocols TELNET and FTP.
• TCP/IP is the standard Internet protocol.
WEP (Encryption)
By setting an encryption key in the Access Point, you can prevent wireless packets from
being decrypted externally.
Firmware
Firmware is the name given to the software (programs) built into hardware such as the
router, modem, and terminal adapter. This software is built into the hardware, so it can be
said to be in-between hardware and software.
Protocol
Protocols are the procedures and regulations for sending and receiving data between the
network terminals. For example, if two computers are communicating, you can send the
correct information according to the regulations by formatting all required information. The
protocol such as which terminal sends first, what type of message, what type of message
the receiving terminal should send in reply, the data format, and responses to
communications errors are same of examples.
Roaming Function
Using the roaming function and moving from one room to another room, you can switch the
Access Point automatically. With the roaming function, you can easily move from the office