XENTISSIMO
P
RODUCT
M
ANUAL
TV infrastructure. We suggest that these transactions are secured, from terminal to
host, using SSL (Secure Socket Layer).
Figure 7 – Wireless LAN configuration with access point
TC
P
/IP
o
ve
r w
LA
N
Computer
Computer
TCP/IP over Ethernet
Data
network
Software download &
Terminal Management Server
Transaction
host
TCP/IP
TCP/IP
TCP/IP
ADSL or cable TV
modem
TCP/IP
SSL
Access point
TC
P/I
P
ov
er
w
LAN
Computer
Computer
ADSL or Cable TV
Modem
Ethernet
Computer
Computer
Data
network
Software download &
Terminal Management Server
Transaction
host
TCP/IP
TCP/IP
TCP/IP
SSL
Router with
access point
TCP/IP
Figure 8 – Wireless LAN configuration with router
TECHNICAL SPECIFICATIONS - 21
Summary of Contents for Xentissimo
Page 1: ......
Page 2: ......
Page 4: ......
Page 10: ...XENTISSIMO PRODUCT MANUAL...
Page 32: ...XENTISSIMO PRODUCT MANUAL...
Page 38: ...XENTISSIMO PRODUCT MANUAL...
Page 48: ...XENTISSIMO PRODUCT MANUAL...
Page 50: ...XENTISSIMO PRODUCT MANUAL...
Page 52: ......