Wireless N450 Home Router
72
DNS
The
Domain
Name
System
(DNS)
is
a
hierarchical
distributed
naming
system
for
computers,
services,
or
any
resource
connected
to
the
Internet
or
a
private
network.
It
associates
various
information
with
domain
names
assigned
to
each
of
the
participating
entities.
A
Domain
Name
Service
resolves
queries
for
these
names
into
IP
addresses
for
the
purpose
of
locating
computer
services
and
devices
worldwide.
An
often
‐
used
analogy
to
explain
the
Domain
Name
System
is
that
it
serves
as
the
phone
book
for
the
Internet
by
translating
human
‐
friendly
computer
hostnames
into
IP
addresses.
WDS
A
wireless
distribution
system
(WDS)
is
a
system
enabling
the
wireless
interconnection
of
access
points
in
an
IEEE
802.11
network.
It
allows
a
wireless
network
to
be
expanded
using
multiple
access
points
without
the
traditional
requirement
for
a
wired
backbone
to
link
them.
All
base
stations
in
a
wireless
distribution
system
must
be
configured
to
use
the
same
radio
channel,
method
of
encryption
(none,
WEP,
or
WPA)
and
the
same
encryption
keys.
They
may
be
configured
to
different
service
set
identifiers.
WDS
also
requires
every
base
station
to
be
configured
to
forward
to
others
in
the
system.
WDS
may
also
be
considered
a
repeater
mode
because
it
appears
to
bridge
and
accept
wireless
clients
at
the
same
time
(unlike
traditional
bridging).WDS
may
be
incompatible
between
different
products
(even
occasionally
from
the
same
vendor)
since
it
is
not
certified
by
the
Wi
‐
Fi
Alliance.
WDS
may
provide
two
modes
of
wireless
AP
‐
to
‐
AP
connectivity:
Wireless
bridging,
in
which
WDS
APs
communicate
only
with
each
other
and
don't
allow
wireless
clients
or
stations
(STA)
to
access
them.
Wireless
repeating,
in
which
APs
communicate
with
each
other
and
with
wireless
STAs.
DMZ
In
computer
security,
a
DMZ
(sometimes
referred
to
as
a
perimeter
networking)
is
a
physical
or
logical
subnetwork
that
contains
and
exposes
an
organization's
external
‐
facing
services
to
a
larger
untrusted
network,
usually
the
Internet.
The
purpose
of
a
DMZ
is
to
add
an
additional
layer
of
security
to
an
organization's
local
area
network
(LAN);
an
external
attacker
only
has
access
to
equipment
in
the
DMZ,
rather
than
any
other
part
of
the
network.
Hosts
in
the
DMZ
have
limited
connectivity
to
specific
hosts
in
the
internal
network,
although
communication
with
other
hosts
in
the
DMZ
and
to
the
external
network
is
allowed.
This
allows
hosts
in
the
DMZ
to
provide
services
to
both
the
internal
and
external
network,
while
an
intervening
firewall
controls
the
traffic
between
the
DMZ
servers
and
the
internal
network
clients.
Any
services
such
as
Web
servers,
servers,
FTP
servers
and
VoIP
servers,
etc.
that
are
being
provided
to
users
on
the
external
network
can
be
placed
in
the
DMZ.