
8520-R1 4-Port Wireless N Gateway
111
12.
What is IEEE 802.11n standard?
Ans.
IEEE 802.11n is an extension standard to 802.11 that applies to Wireless LAN and provides
54Mbps transmission speed in the 2.4 GHz band.
13.
What
is NAT (Network Address Translation) and what is it used for?
Ans.
NAT translates multiple IP Address on the private LAN to one public IP Address (in WAN) that is
sent out to the Internet. NAT adds a level security since the IP address of a PC connected to the
private LAN is never transmitted on the Internet.
14.
What
can I do when I am not able to get the web configuration screen for this 4-port
Wireless N Gateway?
Ans.
Remove the proxy settings on your Internet Browsers or remove the dial-up settings on your
browser.
15.
What
is DMZ (DeMilitarized zone)?
Ans.
DMZ allows one IP Address (computer) to be exposed to the Internet. Some applications require
multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if
you want to use DMZ features.
16.
What is BSS ID?
Ans.
A specific Ad-Hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be
configured with the same BSS ID.
17.
What is SSID?
Ans.
Short for Service Set Identifier. SSID is a 32 character unique identifier attached to the header of
packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS.
The SSID differentiates one WLAN from another, so all Access Point and all devices attempting to
connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS
unless it can provide the unique SSID.
18.
What is WEP?
Ans.
Short for Wired Equivalent Privacy. WEP is a security protocol for wireless local area networks defined
in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN.
WEP aims to provide security by encrypting data over radio waves so that it is protected as it is
transmitted from one end point to another.