
Page | 28
Demilitarized zone
DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local
Network, but that is not protected by the same security as the Local Network.
DHCP
Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or
devices that request them
Digital certificate:
An electronic method of providing credentials to a server in order to have access to it or a network
Direct Sequence Spread Spectrum
DSSS: Modulation technique used by 802.11b wireless devices
DMZ
"Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades
some of the protection of the Access Point's security mechanisms for the convenience of being directly addressable from the Internet.
DNS
Domain Name System: Translates Domain Names to IP addresses
Domain name
A name that is associated with an IP address
Download
To send a request from one computer to another and have the file transmitted back to the requesting computer
DSL
Digital Subscriber Line. High bandwidth Internet connection over telephone lines
Duplex
Sending and Receiving data transmissions at the sane time
Dynamic DNS service
Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked
to their changing IP address. The IP address is updated by either client software running on a computer or by a Access Point that
supports Dynamic DNS, whenever the IP address changes
Dynamic IP address
IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP
addresses to their customers.
E
EAP
Extensible Authentication Protocol
Electronic Mail is a computer-stored message that is transmitted over the Internet
Encryption
Converting data into cyphertext so that it cannot be easily read
Ethernet
The most widely used technology for Local Area Networks.
F
Fiber optic
A way of sending data through light impulses over glass or plastic wire or fiber
File server
A computer on a network that stores data so that the other computers on the network can all access it
File sharing
Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights
Firewall
A device that protects resources of the Local Area Network from unauthorized users outside of the local network
Firmware
Programming that is inserted into a hardware device that tells it how to function
Fragmentation
Summary of Contents for Octopus 5800
Page 1: ...Octopus 5800 Series User Manual www shireeninc com Page 1...
Page 12: ...Fig 5 4 the Main Control Panel of the Web Manager GUI in Client Mode Page 12...
Page 19: ...a Admin Page 19...
Page 20: ...b Time Page 20...
Page 21: ...c System d Firmware Page 21...
Page 22: ...iv Status a Device Info Page 22...
Page 23: ...b Wireless c Logs Page 23...
Page 24: ...d Statistics v Help Page 24...