Wireless N450 Home Router
DNS
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any
resource connected to the Internet or a private network. It associates various information with domain
names assigned to each of the participating entities. A Domain Name Service resolves queries for these
names into IP addresses for the purpose of locating computer services and devices worldwide. An
often‐used analogy to explain the Domain Name System is that it serves as the phone book for the Internet
by translating human‐friendly computer hostnames into IP addresses.
WDS
A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in
an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without
the traditional requirement for a wired backbone to link them. All base stations in a wireless distribution
system must be configured to use the same radio channel, method of encryption (none, WEP, or WPA) and
the same encryption keys. They may be configured to different service set identifiers. WDS also requires
every base station to be configured to forward to others in the system. WDS may also be considered a
repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional
bridging).WDS may be incompatible between different products (even occasionally from the same vendor)
since it is not certified by the Wi‐Fi Alliance. WDS may provide two modes of wireless AP‐to‐AP connectivity:
Wireless bridging, in which WDS APs communicate only with each other and don't allow wireless clients or
stations (STA) to access them.
Wireless repeating, in which APs communicate with each other and with wireless STAs.
DMZ
In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical
subnetwork that contains and exposes an organization's external‐facing services to a larger untrusted
network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an
organization's local area network (LAN); an external attacker only has access to equipment in the DMZ,
rather than any other part of the network. Hosts in the DMZ have limited connectivity to specific hosts in
the internal network, although communication with other hosts in the DMZ and to the external network is
allowed. This allows hosts in the DMZ to provide services to both the internal and external network, while
an intervening firewall controls the traffic between the DMZ servers and the internal network clients. Any
services such as Web servers, Mail servers, FTP servers and VoIP servers, etc. that are being provided to
users on the external network can be placed in the DMZ.
72