107
Glossary
Gigaset SE366 WLAN / englisch / A31008-M1063-R101-4x-7619 / glossary.fm / 13.11.2008
Sc
hablone 200
4_12
_27
Client
A client is an application that requests a service from a
server
. For example, an HTTP
client on a PC in a local network requests data, i.e. Web pages, from an HTTP server
on the
. Frequently the network component (e.g. the PC) on which the client
application is running is also called a client.
Connect on demand
Connect on demand means that applications such as a Web browser, Messenger and E-
mail automatically open an
connection when they are launched. This can lead
to high charges if you are not using a
. This function can be deactivated at the
Gigaset SE366 WLAN to save call charges.
DHCP
Dynamic Host Configuration Protocol
DHCP handles the automatic assignment of
to network components. It was
developed due to the fact that in large networks – especially the
– defining
IP addresses is very complex as participants frequently move, drop out or new ones join.
A DHCP server automatically assigns the connected network components
(DHCP
from a defined
, thus saving a great
deal of configuration work. In addition, it also allows address blocks to be used more
effectively: Since not all participants are in the network at the same time, the same
IP address can be assigned to different network components in succession as and when
required.
The Gigaset SE366 WLAN includes a DHCP server and can automatically assign
IP addresses to PCs in the local network. You can specify that the IP addresses for certain
PCs are never changed.
DHCP server
See
DMZ
Demilitarized Zone, see also
DMZ describes a part of a network that is outside the
. A DMZ is set up, as it
were, between a network you want to protect (e.g. a
) and a non-secure network
(e.g. the
). A DMZ is useful if you want to offer
services on the Internet
which, for security reasons, will not run behind the firewall, or if Internet applications
do not function correctly behind a firewall. A DMZ permits unrestricted access from the
Internet to only one or a few network components, while the other network compo-
nents remain secure behind the firewall.