Gigaset SE366 User Manual page 117

Sony modem user manual
Hide thumbs Also See for SE366:
Table of Contents

Advertisement

Glossary
UPnP
Universal Plug & Play
UPnP technology is used to spontaneously link home or small office networks. Devices
that support UPnP carry out their network configuration automatically once they are
connected to a network. They also provide their own services or use services of other
devices on the network automatically.
URL
Universal Resource Locator
Globally unique address of a domain on the Internet.
Virtual server
A virtual
Server
provides a service on the
Internet
that runs on another network compo-
nent, not on the server itself. The Gigaset SE366 WLAN can be configured as a virtual
server. It will then direct incoming calls for a service via
Port Forwarding
directly to the
appropriate
Port
of the network component in the local network.
WAN
Wide Area Network
A WAN is a wide area network, which is not restricted to one particular area. The Internet
is the most frequently used WAN. A WAN is run by one or more public providers to ena-
ble private access. You access the Internet via an
Internet
Provider.
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the
IEEE 802.11
standard. It is used to protect wire-
less transmissions in a
WLAN
against unauthorised access with
Encryption
of the data
transmitted.
WLAN
Wireless LAN
Wireless LANs enable network components to communicate with a network using radio
waves as the transport medium. A wireless LAN can be connected as an extension to an
existing wired LAN or it can form the basis for a new network. The basic element of a
wireless network is the radio cell. This is the area in which wireless communication takes
place. A WLAN can be operated in
Ad-hoc mode
or
Infrastructure
mode.
WLAN is currently specified in the
IEEE 802.11
standard. The Gigaset SE366 WLAN hard-
ware complies with standard 802.11n (draft). A software update will be provided when
the standard is passed.
WPA
WPA was developed to improve the security provided by WEP. WPA uses more complex
procedures to generate keys, e.g. TKIP (Temporal Key Integrity Protocol). In addition,
WPA can use an authentication server (e.g. a RADIUS server) to improve security.
117

Advertisement

Table of Contents
loading

Table of Contents