background image

         

U-MEDIA Communications, Inc. 

                                            Proprietary and Confidential

 

32

Internetwork Packet Exchange is a networking protocol developed by Novel to enable 

their Netware clients and servers to communicate   

ISP  

Internet Service Provider   

Java  

A programming language used to create programs and applets for web pages   

Kbps  

Kilobits per second   

Kbyte  

Kilobyte  

LAN  

Local Area Network   

Latency  

The amount of time that it takes a packet to get from the one point to another on a 

network. Also referred to as delay   

LED  

Light Emitting Diode   

Legacy  

Older devices or technology   

Local Area Network   

A group of computers in a building that usually access files from a server   

LPR/LPD  

"Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting 

streams of printer data.   

L2TP  

Summary of Contents for WST-375L

Page 1: ...U MEDIA Communications Inc Proprietary and Confidential 1 2 4GHz Wireless 802 11n Bridge Model WST 375L User s Guide Version Date Description 01 11 07 2008 Draft rev 01...

Page 2: ...uipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caut...

Page 3: ...g comply with the R TTE Directive 1999 5 EC the EMC Directive 89 336 EEC and the Low Voltage Directive 73 23 EEC issued by the Commission of the European Community Compliance with these directives imp...

Page 4: ...1 LED Indications 8 3 2 Rear Panel 9 3 3 Top View 9 3 4 Bottom View 9 3 3 Installation Considerations 10 3 4 Getting Start 11 4 Using the Configuration Menu 12 4 1 Network 13 4 1 1 LAN Setting 13 4 2...

Page 5: ...U MEDIA Communications Inc Proprietary and Confidential 5 C 26 D 27 E 28 F 28 G 29 H 30 I 30 J 32 K 32 L 32 M 33 N 33 O 34 P 35 Q 36 R 36 S 37 T 38 U 39 V 39 W 40 X 41 Y 41 Z 41 41 1 41...

Page 6: ...DRAFT Bridge CD ROM User s Guide Multi Language Quick Installation Guide CAT 5 Ethernet Cable Power Adapter 12V 0 5A Using a power supply with a different voltage than the one included with your produ...

Page 7: ...11n and 11b g devices but you will not lose the ability to communicate when you incorporate the 11n standard into your 11b g network You may choose to slowly change your network by gradually replacin...

Page 8: ...U MEDIA Communications Inc Proprietary and Confidential 8 3 Hardware Overview 3 1 LED Indications...

Page 9: ...U MEDIA Communications Inc Proprietary and Confidential 9 3 2 Rear Panel 3 3 Top View 3 4 Bottom View...

Page 10: ...g can reduce your wireless product s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized 2 Be aware of the direct line between network devices A...

Page 11: ...or DSL subscriber line into your home or office 2 Consult with your Cable or DSL provider for proper installation of the modem 3 Connect the Cable or DSL modem to the WRT 390L Wireless Broadband Route...

Page 12: ...opening the Web browser and typing in the IP Address of the WST 375L The WST 375L s default IP Address is http 192 168 10 101 Open the Web browser Type in the IP Address of the Bridge http 192 168 10...

Page 13: ...ase you must also configure the following fields IP Address The IP address of the AP on the local area network Assign any unused IP address in the range of IP addresses available for the LAN For examp...

Page 14: ...connection to a specific wireless network Use this option to make custom profiles and store new profile for later use Configure the setting to connect to a wireless network selection option for networ...

Page 15: ...te Survey tool to search for wireless networks in the WST 375L area Click on the Scan button to search for wireless networks to join From this window you can also add your profile to use with theWST 3...

Page 16: ...U MEDIA Communications Inc Proprietary and Confidential 16 4 3 3 Statistics View the current operating status of the WST 375L see the Transmit and Receive data...

Page 17: ...U MEDIA Communications Inc Proprietary and Confidential 17 4 3 4 Advance Use this setting to adjust the wireless environment...

Page 18: ...allows wireless clients such as notebooks or Laptops to save battery life by sending less transmission during idle times Add a check mark to enable this option PS Mode Used for specific application wh...

Page 19: ...U MEDIA Communications Inc Proprietary and Confidential 19 4 3 6 WPS You can setup security easily by choosing PIN or PBC method to do Wi Fi Protected Setup...

Page 20: ...U MEDIA Communications Inc Proprietary and Confidential 20 4 3Administrator 4 3 1 Management At this page you can configure administrator account and password...

Page 21: ...Confidential 21 4 3 2 Upload Firmware By assigning firmware location you can upload firmware at this page Once you have a firmware update on your computer use this option to browse for the file and t...

Page 22: ...ws you to export and then save the router s configuration to a file on your computer Be sure to save the configuration before performing a firmware upgrade Import Settings Use this option to restore p...

Page 23: ...roprietary and Confidential 23 lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router It is useful for restarting when...

Page 24: ...U MEDIA Communications Inc Proprietary and Confidential 24 4 3 4 Status You can check system information and network configurations on this page...

Page 25: ...ess Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Advanced Encryption Standard AES Government encryption standard Alphanumeric Ch...

Page 26: ...t with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one...

Page 27: ...to the site that gave your computer the cookie D Data Information that has been translated into binary so that it can be processed or moved to another device Data Link layer The second layer of the OS...

Page 28: ...System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to t...

Page 29: ...f the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Tr...

Page 30: ...pertext Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking de...

Page 31: ...sferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP p...

Page 32: ...plets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network Also referred...

Page 33: ...ement Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phon...

Page 34: ...d which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of t...

Page 35: ...hysical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exist...

Page 36: ...ice allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware fro...

Page 37: ...that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both...

Page 38: ...firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger a distributed logging interface for collecting in one plac...

Page 39: ...discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to anothe...

Page 40: ...d for configuring and bootstrapping wireless networking hardware access points and wireless clients including PCs and other devices WDS Wireless Distribution System A system that enables the interconn...

Page 41: ...dband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802 11 wireless standards WISP Wireless Internet Service Provider WLAN Wireless Loc...

Page 42: ...munications Inc Proprietary and Confidential 42 802 11 A family of specifications for wireless local area networks WLANs developed by a working group of the Institute of Electrical and Electronics Eng...

Reviews: