background image

53 

NIC

 (Network Interface Card) – A board installed in a computer system, usually 

a PC, to provide network communication capabilities to and from that computer 
system.  Also called an adapter. 

 

Packet Filtering

 - Discarding unwanted network traffic based on its originating 

address or range of addresses or its type (e-mail, file transfer, etc.). 

 

PCI

 (Peripheral Component Interconnect) – A peripheral bus commonly used in 

PCs, Macintoshes and workstations.  It was designed primarily by Intel and first 
appeared on PCs in late 1993.  PCI provides a high-speed data path between 
the CPU and peripheral devices (video, disk, network, etc.).  There are typically 
three of four PCI slots on the motherboard.  In a Pentium PC, there is generally 
a mix of PCI and ISA slots or PCI and EISA slots.  Early on, the PCI bus was 
known as a “local bus.”  PCI allows IRQs to be shared, which helps to solve the 
problem of limited IRQs available on a PC.  For example, if there were only one 
IRQ left over after ISA devices were given their required IRQs, all PCI devices 
could share it.  In a PCI-only machine, there cannot be insufficient IRQs, as all 
can be shared. 

 

PCMCIA

  - The PCMCIA (Personal Computer Memory Card International 

Association) is an industry group organized in 1989 to promote standards for a 
credit card-size memory or I/O device that would fit into a personal computer, 
usually a notebook or laptop computer. 

 

Peer-to-Peer Networking

  – Allows users to share local resources between 

PCs without needing an access point or router. 

 

Ping

 (Packet Internet Groper) – An Internet utility used to determine whether a 

particular IP address is online.  It is used to test and debug a network by 
sending out a packet and waiting for a response. 

 

Plug-and-Play

  – The ability of a computer system to configure expansion 

boards and other devices automatically without requiring the user to turn off the 
system during installation. 
 

Port

 – A pathway into and out of the computer of a network device such as a 

switch or router.  For example, the serial and parallel ports on a personal 
computer are external sockets for plugging in communications lines, modems, 
and printers. 
 

PPPoE

 (Point to Point Protocol over Ethernet) – A method used mostly by DSL 

providers for connecting personal computers  to a broadband modem for 
Internet access.  It is similar to how a dial-up connection works but at higher  

 

 

54 

PPTP

 (Point-to-Point Tunneling Protocol)  – A protocol (set of communication 

rules) that allows corporations to extend their own corporate network through 
private “tunnels” over the public Internet.  Effectively, a corporation uses a wide-
area network as a single large local area network.  A company no longer needs 
to lease its own lines for wide-area communication but can securely use the 
public networks.  This kind of interconnection is known as a virtual private 
network (VPN).   

Print Server

 - A hardware device that enables a printer to be located anywhere 

in the network. 

 

RIP

 (Routing Information Protocol) – A simple routing protocol that is part of the 

TCP/IP protocol suite.  It determines a route based on the smallest hop count 
between source and destination.  RIP is a distance vector protocol that routinely 
broadcasts routing information to its neighboring routers and is known to waste 
bandwidth.  AppleTalk, DECnet, TCP/IP, NetWare, and VINES all use 
incompatible versions of RIP. 

 

RJ-11

 (Registered Jack-11) – A telephone connector that holds up to six wires.  

The RJ-11 is the common connector used to plug a telephone into a wall. 

 

RJ-45

  - A connector similar to a telephone connector that holds up to eight 

wires, used for connecting Ethernet devices. 

 

Router

  - Protocol-dependent device that connects sub networks together.  

Routers are useful in breaking down a very large network into smaller sub 
networks; they introduce longer delays and typically have much lower 
throughput rates than bridges. 

 

Server

 - Any computer whose function in a network is to provide user access to 

files, printing, communications, and other services. 

 

Signal Strength

  – The amount of electromagnetic energy is present.  A 

receiver (such as the one in your access point determines the strength of the 
signal for each wireless channel. 

 

Software

 – Instructions for the computer.  A series of instructions that performs 

a particular task  is called a “program.”  The two major categories of software 
are “system software” and “application software.”  System software is made up 
of control programs such as the operating system and database management 
system (DBMS).  Application software is any  program that processes data for 
the user.  A common misconception is that software is data.  It is not, software 
tells the hardware how to process the data. 

 

Summary of Contents for WNP1000

Page 1: ...ation Interface 9 Logging In 9 General Information 11 Wireless Statistics 13 Password Setup 14 Saving the Configuration 15 Access Point Configuration 16 LAN Setup 16 Reset Button 18 WLAN Setup 19 WEP...

Page 2: ...32 wireless clients WEP 64 128 bit data encryption for security Layer 2 Roaming capability Remote management via SNMP protocol Supports MIB II and IEEE802 11b MIBs Remote management via web browser Fi...

Page 3: ...the power and Ethernet cables Powering the AP Plug the power adapter into an AC power outlet and connect the output of the power supply to the power jack on the rear of the WNP1000 Wireless AP The pow...

Page 4: ...ty WEP change the IP Address or other configuration options If you want to change the default configurations you will need to access the browser based utility of the WNP1000 Wireless AP you need a com...

Page 5: ...browser on your computer configured for TCP IP networking Make sure that the computer and the WNP1000 Wireless AP are on the same local area network with similar IP addresses If you are having troubl...

Page 6: ...ll a software upgrade Time since last boot Displays the time that has elapsed since the WNP1000 Wireless AP was last started 12 LAN MAC Address Displays the Ethernet MAC address of the LAN Ethernet in...

Page 7: ...ings of the WNP1000 Wireless AP If you wish to change the User Name or Password fill in the appropriate fields and click the Apply button Please note that the Password and Confirm Password fields must...

Page 8: ...P by clicking the Reboot button on the left manual page Each time you make a change the WNP100 Wireless AP will remind you by displaying a page such as the one shown below 16 Access Point Configuratio...

Page 9: ...ding the Reset Button for three seconds restores all settings to the factory default settings Subnet Mask In this field you enter the Subnet Mask of the local network to which the WNP1000 Wireless AP...

Page 10: ...network and to prevent conflicts with other wireless networks that may be nearby The WNP1000 Wireless AP is configured with a default SSID of UNIDEN Note All clients on the same wireless LAN must have...

Page 11: ...y Configuration WEP keys either can be entered manually or can be generated by using a simple to type passphrase Passphrase Method When you enter a passphrase the WNP1000 Wireless AP generates four WE...

Page 12: ...A Z and 0 9 e g MyKey in the WEP Key 1 entry field Alternatively you may enter 10 digit hexadecimal values in the range of A F and 0 9 as shown in the example below You can also enter WEP keys in the...

Page 13: ...25 A sample WEP configuration using manual key entry is shown in the following figure 26 WLAN Access Control When you click WLAN Access Control the following page will appear...

Page 14: ...up page as shown in the following figure 28 Uniden s client MAC Address can be found listed on the product label For 802 11b clients you can find the MAC Address listed on the package of the client n...

Page 15: ...the firmware file to be uploaded into WNP1000 Wireless AP 30 When you receive the warning shown below click OK to dismiss the warning Once the warning is dismissed and you have entered the file name o...

Page 16: ...31 32...

Page 17: ...to reboot and display the General Information page again The upgrade process is complete Please remember that configuration changes that you make through the user interface including firmware upgrades...

Page 18: ...ck on Start Settings Control Panel Double click on Network 2 In The following network components are installed box select the TCP IP associated with your network adapter If you only have one network a...

Page 19: ...ask 255 255 255 0 6 Click the OK button in the Internet Protocol TCP IP Properties window and click the OK button in the Local Area Connection Properties window 7 Restart the computer if asked 38 For...

Page 20: ...ess that is not used by any other computer connected to the network You can only use an IP address in the range of 192 168 1 2 to 192 168 1 254 Make sure that each IP address is unique for each PC or...

Page 21: ...ications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference 42 will not occur in a particular installation If...

Page 22: ...ing to rest on it and do not locate this product where the cable will be damaged by persons walking on it 44 7 Do not overload wall outlets and extension cords as this can result in the risk of fire o...

Page 23: ...tained as reasonable or necessary B modified altered or used as part of any conversion kits subassemblies or any configurations not sold by Uniden C improperly installed D serviced or repaired by some...

Page 24: ...nd receivers to communicate directly with each other eliminating the need for an access point Adapter A printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC In a n...

Page 25: ...n A sub network comprised of a group of clients and servers under the control of one security database Dividing LANs into domains improves performance and security 50 Download To receive a file transm...

Page 26: ...dress that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e mail address you re sending a note to At the other end the recipient can see the IP addre...

Page 27: ...personal computers to a broadband modem for Internet access It is similar to how a dial up connection works but at higher 54 PPTP Point to Point Tunneling Protocol A protocol set of communication rule...

Page 28: ...ckbone connections and wide area connections 56 UDP User Datagram Protocol A communications method protocol that offers a limited amount of service when messages are exchanged between computers in a n...

Page 29: ...57 MEMO 58...

Reviews: