Huawei Aolynk DR814Q ADSL2+ User Manual page 80

Adsl2+ broadband router
Table of Contents

Advertisement

User Manual
Aolynk DR814Q ADSL2+ Broadband Router
V
II. DHCP
Dynami
c host configuration protocol. DHCP automates IP address assignment and
management. Whe
shared address pool, and after a specified period, DHCP returns the address to the
pool.
VIII. DHC
P server
Dynamic host configuration protocol server. A DHCP server is a computer responsible
for assigning IP addresses to the computers in a LAN.
IX
. DNS
Domain name system. The DNS translates domain names into IP addresses. DNS
information is distributed hierarchically throughout the Internet among the computers
called DNS servers. For example, www.yahoo.com is the domain name associated
with the IP address 216.115.108.243. When you start to acce
server looks up th
address. If the DNS server cannot find the IP address, it communicates with
higher-level DNS servers to determine the IP address.
X
. Domain name
A domain name is a user-f
name m
ust be unique and is controlled by the Internet Corporation for Assigned Names
and Numbers (ICANN).A domain name is a key element of a URL which identifies a
specific file at a website.
XI. DSL
Digital subscriber line. A technology that allows both digital data and analog voice
signals to travel over the existing copper telephone lines.
XII. Ethernet
The most commonly installed computer network technology, usually using the twisted
pair cables. The Ethernet data rates are 10 Mbps and 100 Mbps.
X
III. Firewall
A firewall can protect your computer or LAN from malicious attacks and other
unexpected accesses. Unauthorized users may attempt to attack your network in order
to prevent you or others on your LAN from the services.
Using the firewall, you can block
protect your network. You can also restrict the types of IP traffic sent from your network
to the outside. Some firewall protection can be provided by packet filtering and network
address translation services.
n a PC connects to the LAN, DHCP assigns it an IP address from a
e requested domain name and searches for its corresponding IP
riendly name in place of its associated IP address. A domain
certain types of IP traffic commonly used by hackers to
75
11 Appendix – Glossary
ss a website, a DNS

Advertisement

Table of Contents
loading

Table of Contents