TRENDnet TEW-692GR User Manual

TRENDnet TEW-692GR User Manual

450mbps concurrent dual band wireless n router
Hide thumbs Also See for TEW-692GR:

Advertisement

450Mbps Concurrent Dual Band Wireless N
Router
TEW-692GR
Rev 0.1

User Manual

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-692GR

  • Page 1: User Manual

    450Mbps Concurrent Dual Band Wireless N Router TEW-692GR Rev 0.1 User Manual...
  • Page 2 Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3: Europe - Eu Declaration Of Conformity

    Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: +A11: 2009 EN60950-1:2006 Safety of Information Technology Equipment...
  • Page 4 Česky [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se [Czech] základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. Deutsch Hiermit erklärt [Name des Herstellers], dass sich das Gerät [Gerätetyp] in [German]...
  • Page 5: European Union Notice

    Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in Nederlands overeenstemming is met de essentiële eisen en de andere relevante bepalingen [Dutch] van richtlijn 1999/5/EG. Malti Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] [Maltese] jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
  • Page 6: Trademark Recognition

    Compliance with these directives implies conformity to the following European Norms: EN 60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489-1/-17 General EMC requirements for radio equipment Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged.
  • Page 7 Getting Started with the TEW-692GR Congratulations on purchasing the TEW-692GR! This manual provides information for setting up and configuring the TEW-692GR. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 8: Package Contents

    Package Contents TEW-692GR 450Mbps Concurrent Dual Band Wireless N Router CAT-5 Ethernet Cable (All the TEW-692GR’s Ethernet ports are Auto-MDIX) Power Adapter (12V, 1A) CD-ROM with Software and Manual Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 9: Wireless Lan Networking

    BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The TEW-692GR provides various transmission (data) rate options for you to select. In most networking scenarios, the factory default Best (automatic) setting proves the most efficient. This setting allows your TEW-692GR to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the TEW-692GR automatically switches to a lower transmission (data) rate.
  • Page 11 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 12 connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 13: Hardware Overview

    Unlike most routers, the TEW-692GR provides data transfers at up to 450Mbps when using 11n connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
  • Page 14: Installation Considerations

    RF (radio frequency) noise in your home or business. The key to maximizing wireless range is to follow these basic guidelines: Keep the number of walls and ceilings between the TEW-692GR and other network devices to a minimum - each wall or ceiling can reduce your wireless product’s range from 3-90 feet...
  • Page 15: Getting Started

    Consult with your Cable or DSL provider for proper installation of the modem. Connect the Cable or DSL modem to the TEW-692GR Router (WAN port). Ethernet LAN ports of the TEW-692GR are Auto MDI/MDIX and will work with both Straight-Through and Cross-Over cable.
  • Page 16 At the Password prompt, the User name is 'admin' and password is admin. Enter default username and password and press “ok” Setup Wizard is an easy way to set up the TEW-692GR step by step. The Wizard will teach user to set up the TEW-692GR just few steps.
  • Page 17 You could click ‘Launch Internet ConnectionSetup Wizard’ and follow Wizard to complete your setting. [example]:...
  • Page 18 If you choice “Static IP Address Connection” than press “Next”...
  • Page 19 Then press” Apply”...
  • Page 20 You also could click “ Launch Wireless Security Setup Wizard” and follow Wizard to complete your setting...
  • Page 21 [example]: Select the 2.4G & 5G security mode...
  • Page 22 Enter your password...
  • Page 23 Press” Apply”...
  • Page 25 Network Network: WAN Setting WAN Connection Type There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and Russia PPTP. If you are unsure of your connection method, please contact your Internet Service Provider. Static Used when your ISP provides you a set IP address that does not change. The IP information is manually entered in your IP configuration settings.
  • Page 26 A method of connection where the ISP assigns your IP address when your router requests one from the ISP's server. Host Name: Some ISP's may check your computer's Host Name. The Host Name identifies your system to the ISP's server. PPPoE Select this option if your ISP requires you to use a PPPoE (Point to Point Protocol over Ethernet) connection.
  • Page 27 On demand: A connection to the Internet is made as needed. Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected.
  • Page 28 Reconnect Mode: Typically PPPoE connections are not always on. The router allows you to set the reconnection mode. The settings are: Always on: A connection to the Internet is always maintained. On demand: A connection to the Internet is made as needed. Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet.
  • Page 29 service. The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address. This router has a different MAC address than the computer or router that initially connected to the ISP. If you need to change the MAC address of the rounter's WAN-side Ethernet interface, either type in an alternate MAC address (for example, the MAC address of the router initially connected to the ISP) or copy the MAC address of a PC.
  • Page 30: Network: Lan Setting

    Network: LAN Setting...
  • Page 31 IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. Subnet Mask The subnet mask of the local area network. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol.
  • Page 32 therefore, be used for manually configured devices or devices that cannot use DHCP to obtain network address details automatically. It is possible for a computer or device that is manually configured to have an address that does reside within this range. In this case the address should be reserved, so that the DHCP Server knows that this specific address can only be used by a specific computer or device.
  • Page 33 To input the MAC address of your system, enter it in manually or connect to the router's Web-Management interface from the system and click the Copy Your PC's MAC Address button. A MAC address is usually located on a sticker on the bottom of a network device. The MAC address is comprised of twelve digits.
  • Page 34 Network: QoS...
  • Page 36: Network: Dhcp Client List

    Network: DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses.
  • Page 37 Wireless Wireless 2.4GHz: Basic...
  • Page 38 2.4 GHz 802.11b/g/n mixed mode - This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless g client devices to connect and access the TEW-692GR at 11Mbps for wireless b, 54Mbps for wireless g and up to 450Mbps* for wireless n and share access at the same time.
  • Page 39 Enable the security seeing in security page, each WDS APs need to use same security setting. (Note: WDS supports wireless g/n modes. The use multiple Access Point will reduces the overall network throughput to ½ the TEW-692GR. HT Physical Mode In HT (High Throughput) Physical mode setting allow for control of the 802.11n wireless...
  • Page 40 Mixed Mode: In this mode packets are transmitted with a preamble compatible with the legacy 802.11a/g, the rest of the packet has a new format. In this mode the receiver shall be able to decode both the Mixed Mode packets and legacy packets. Green Field: In this mode high throughput packets are transmitted without a legacy compatible part.
  • Page 41 Wireless 2.4GHz: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 42 its default value of 2346 bytes. Setting the Fragmentation value too low may result in poor performance. RTS Threshold When an excessive number of wireless packet collisions are occurring, wireless performance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for CTS) when data frame size in bytes is greater than the RTS Threshold.
  • Page 43 Wireless 2.4GHz: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network.
  • Page 44 HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. WPA-Personal and WPA-Enterprise Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by the Wi-Fi Alliance.
  • Page 45 RADIUS Server Port: The port number used to connect to the authentication server. RADIUS Server Shared Secret: A pass-phrase that must match with the authentication server. Wireless MAC Filtering Choose the type of MAC filtering needed. Turn MAC Filtering Disable: When "Disable" is selected, MAC addresses are not used to control network access.
  • Page 46 Wireless 2.4GHz: WPS...
  • Page 47 Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network.
  • Page 48 Wireless 2.4GHz: Station List All the wireless clients connecting to the router will be shown here, you could monitor your network and prevent any unauthorized wireless connection easily.
  • Page 49 Wireless 5GHz: Basic Radio On/Off This indicates the wireless operating status. The wireless can be turned on or off by the slide switch. When the radio is on, the following parameters are in effect.
  • Page 50 5GHz 802.11a only mode - This wireless mode works in the 5GHz frequency range and will allow wireless a client to connect and access the TEW-692GR 450Mbps Concurrent Wireless N Gigabit Router at 54Mbps for wireless a only mode. Although the wireless a operates in the 5GHz frequency, this mode will only permit wireless a client devices to work and will exclude any other wireless mode and devices that are not wireless a only.
  • Page 51 Enable the security seeing in security page, each WDS APs need to use same security setting. (Note: WDS supports wireless g/n modes. The use multiple Access Point will reduces the overall network throughput to ½ the TEW-692GR. HT Physical Mode In HT (High Throughput) Physical mode setting allow for control of the 802.11n wireless...
  • Page 52 20/40 20 Channel Width = 20 MHz 20/40 Channel Width = 20/40 MHz Guard Interval: Support Short/Long GI, the purpose of the guard interval is to introduce immunity to propagation delays, echoes and reflections, to which digital data is normally very sensitive. Long Auto Long Guard Interval, 800 nsec...
  • Page 53 Wireless 5GHz: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 54 When an excessive number of wireless packet collisions are occurring, wireless performance can be improved by using the RTS/CTS (Request to Send/Clear to Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for CTS) when data frame size in bytes is greater than the RTS Threshold.
  • Page 55 Wireless 5GHz: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network.
  • Page 56 entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network.
  • Page 57 through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. Authentication Timeout: Amount of time before a client will be required to re-authenticate. RADIUS Server IP Address: The IP address of the authentication server. RADIUS Server Port: The port number used to connect to the authentication server.
  • Page 58 Wireless 5GHz: WPS...
  • Page 59 Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS. PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network.
  • Page 60 Wireless 5GHz: Station List All the wireless clients connecting to the router will be shown here, you could monitor your network and prevent any unauthorized wireless connection easily.
  • Page 61 Advanced Advanced: DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
  • Page 62 to the DMZ host. (The DMZ policy resembles a default port forwarding rule that forwards every port that is not specifically sent anywhere else.) The router provides only limited firewall protection for the DMZ host. The router does not forward a TCP packet that does not match an active DMZ session, unless it is a connection establishment packet (SYN).
  • Page 63 Enable DMZ Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. DMZ IP Address Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication.
  • Page 64: Advanced: Virtual Server

    Advanced: Virtual Server Enable Specifies whether the entry will be active or inactive. Name Assign a meaningful name to the virtual server, for example Web Server. Several well-known types of virtual server are available from the "Application Name" drop-down list. Selecting one of these entries fills some of the remaining parameters with standard values for that type of server.
  • Page 65 Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu. To specify any other protocol, select "Other" from the list, then enter the corresponding protocol number (as assigned by the IANA) in the Protocol box.
  • Page 66: Advanced Routing

    Advanced: Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Destination IP The IP address of packets that will take this route. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN.
  • Page 67 Metric The route metric is a value from 1 to 16 that indicates the cost of using this route. A value of 1 is the lowest cost, and 15 is the highest cost. A value of 16 indicates that the route is not reachable from this router.
  • Page 68: Advanced: Access Control

    Advanced: Access Control Enable By default, the Access Control feature is disabled. If you need Access Control, check this option. Note: When Access Control is disabled, every device on the LAN has unrestricted access to the Internet. However, if you enable Access Control, Internet access is restricted for those devices that have an Access Control Policy configured for them.
  • Page 69: Advanced: Special Applications

    Application Level Gatwway(ALG) By default, the ALG feature is enabled. ALG configuration allows users to disable some application service. Advanced: Special Applications...
  • Page 70 Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications.
  • Page 71 Trigger Port Enter the outgoing port range used by your application (for example 6500-6700). Schedule Select a schedule for when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made. Port Trigger Rule List This is a list of the defined application rules.
  • Page 72 Advanced: Gaming Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list. Rule Enable Specifies whether the entry will be active or inactive. Rule Name Give the rule a name that is meaningful to you, for example Game Server.
  • Page 73 Enter the local network IP address of the system hosting the server, for example 192.168.10.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer. TCP Ports to Open Enter the TCP ports to open (for example 6159-6180, 99).
  • Page 74: Advanced: Inbound Filter

    Advanced: Inbound Filter Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 75 Inbound Filter Rules List The section lists the current Inbound Filter Rules. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Inbound Filter Rule"...
  • Page 76: Advanced: Schedule

    Advanced: Schedule Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week.
  • Page 77 The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not normally used for email events.
  • Page 78: Advanced: Advanced Network

    Advanced: Advanced Network UPnP By default, the UPnP feature is enabled. Universal Plug and Play (UPnP) is a set of networking protocols for primarily residential networks without enterprise class devices that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.
  • Page 79: Administrator: Management

    Administrator Administrator: Management Admin Password Enter a password for the user "admin", who will have full access to the Web-based management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS...
  • Page 80 Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. The following parameters are displayed when the option is enabled. Dynamic DNS Provider Select a dynamic DNS service provider from the pull-down list. Host Name Enter your host name, fully qualified;...
  • Page 81 Administrator: Upload Firmware Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
  • Page 82 Administrator: Setting Management Export Settings This option allows you to export and then save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory.
  • Page 83 Administrator: Time Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over...
  • Page 84 If you do not have the NTP Server option in effect, you can either manually set the time for your router here.
  • Page 85 Administrator: Status The device status.
  • Page 86 Help Help section provides web-based explanations on each configurable field.
  • Page 88 Glossary 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network.
  • Page 89 AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions. Application layer 7th Layer of the OSI model.
  • Page 90 BIOS. A program that the processor of a computer uses to startup the system once it is turned Baud Data transmission speed Beacon A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network control data to other wireless stations. Bit rate The amount of bits that pass in given amount of time Bit/sec...
  • Page 91 CardBus A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time.
  • Page 92 DB-9 A 9 pin connector for RS-232 connections Decibels related to dipole antenna Decibels relative to isotropic radiator Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ: A single computer or group of computers that can be accessed by both users on the...
  • Page 93 Domain Name System: Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer Digital Subscriber Line.
  • Page 94 The most widely used technology for Local Area Networks. Fiber optic A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network...
  • Page 95 Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second Graphical user interface H.323 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal...
  • Page 96 ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers Internet Information Server is a WEB server and FTP server provided by Microsoft Internet Key Exchange is used to ensure security for VPN connections Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access...
  • Page 97 A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security...
  • Page 98 Layer 2 Tunneling Protocol Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD...
  • Page 99 Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals for your computer MPPE Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections...
  • Page 100 The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network...
  • Page 101 Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response. Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiving email...
  • Page 102 Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage. Rendezvous Apple's version of UPnP, which allows for devices on a network to discover each other and be connected without the need to configure any settings...
  • Page 103 Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices Session Initiation Protocol.
  • Page 104 Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows.
  • Page 105 A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play...
  • Page 106 Wake on LAN Allows you to power up a computer though it's Network Interface Card Wide Area Network Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. Wireless Distribution System.
  • Page 107 WISP Wireless Internet Service Provider WLAN Wireless Local Area Network Wi-Fi Protected Access. A Wi-Fi security enhancement that provides improved data encryption, relative to WEP. xDSL A generic term for the family of digital subscriber line (DSL) technologies, such as ADSL, HDSL, RADSL, and SDSL.

Table of Contents