background image

55 

SOHO

 (Small Office/Home Office) – Market segment of professionals who work 

at home or in small offices. 

 

Static IP Address

  - A permanent IP address that is assigned to a node in a 

TCP/IP network. 

 

Static Routing

 - Forwarding data in a network via a fixed path.  Static routing 

cannot adjust to changing line conditions as can dynamic routing. 

Subnet Mask

  - The method used for splitting IP networks into a series of 

subgroups, or subnets.  The mask is a binary pattern that is matched up with 
the IP address to form part of the host ID address field into a field for subnets. 

 

Switch

  – 1. A data switch connects computing devices to host computers, 

allowing a large number of devices to share a limited number of ports.  
2. A device for making, breaking, or changing the connections in an electrical 
circuit. 

 

TCP

 (Transmission Control Protocol) – A method (protocol) used along with the 

Internet Protocol (IP) to send data in the form of message units between 
computers over the Internet.  While IP takes care of handling the actual delivery 
of the data, TCP keeps track of the individual units of data (called packets) that 
a message is divided into for efficient routing through the Internet. 

 

TCP/IP

 (Transmission Control Protocol/Internet Protocol)  - The basic 

communication language or protocol of the Internet.  It can also be used as a 
communication protocol in a private network (either an intranet or an extranet).  
When you are set up with access to the Internet, your computer is uses the 
TCP/IP protocol. 

 

TFTP

 (Trivial File Transfer Protocol) – A version of the TCP/IP FTP protocol that 

has no directory or password capability. 

 

Throughput

  - The amount of data moved successfully from one place to 

another in a given time period. 
 

Topology

 - A network’s topology is a logical characterization of how the devices 

on the network are connected and the distances between them.  The most 
common network devices include hubs, switches, routers, and gateways.   
Most large networks contain several levels of interconnection, the most 
important of which include edge connections, backbone connections, and wide-
area connections. 

 

 

 

 

56 

UDP

 (User Datagram Protocol)  – A communications method (protocol) that 

offers a limited amount of service when messages are exchanged between 
computers in a network that uses the Internet Protocol (IP).  UDP is an 
alternative to the Transmission Control Protocol (TCP) and, together with IP, is 
sometimes referred to as UDP/IP.  Like the Transmission Control Protocol, UDP 
uses the Internet Protocol to actually get a data unit (called a datagram) from 
one computer to another.  Unlike TCP, however, UDP does not provide  the 
service of dividing a message into packets (datagrams) and reassembling it at 
the other end.  Specifically, UDP doesn’t provide sequencing of the packets that 
the data arrives in.  This means that the application program that uses UDP 
must be able to make sure that the entire message has arrived and is in the 
right order.  Network applications that want to save processing time because 
they have very small data units to exchange (and therefore very little message 
reassembling to do) may prefer UDP to TCP. 

 

Upgrade

 – To replace existing software of firmware with a newer version. 

 

Upload

  – To send a file transmitted over a network.  In a communications 

session, upload means transmit, and download means receive. 

 

URL

 (Uniform Resource Locator) – The address that defines the route to a file 

on the Web or any other Internet facility.  URLs are typed into the browser to 
access Web pages, and URLs are embedded within the pages themselves to 
provide the hypertext links to other pages. 

 

VLAN

 (Virtual LAN) – A logical association that allows users to communicate as 

if they were physically connected to a single LAN, independent of the actual 
physical configuration of the network. 

 

WAN

 (Wide-Area Network)  - A communications network that covers a wide 

geographic area, such as a state or country. 

 

WEP

 (Wired Equivalent Privacy)  – A data privacy mechanism based on 64-bit 

and 128-bit shared key algorithms, as described in the IEEE802.11 standard. 

 

WINIPCFG

  - Configuration utility based on the Win32 API for querying, 

defining, and managing IP addresses within a network.  A commonly used utility 
for configuring networks with static IP addresses. 

 

Workgroup

 - Two or more individuals that share files and databases. 

 
 
 

Summary of Contents for WNP1000

Page 1: ...ation Interface 9 Logging In 9 General Information 11 Wireless Statistics 13 Password Setup 14 Saving the Configuration 15 Access Point Configuration 16 LAN Setup 16 Reset Button 18 WLAN Setup 19 WEP...

Page 2: ...32 wireless clients WEP 64 128 bit data encryption for security Layer 2 Roaming capability Remote management via SNMP protocol Supports MIB II and IEEE802 11b MIBs Remote management via web browser Fi...

Page 3: ...the power and Ethernet cables Powering the AP Plug the power adapter into an AC power outlet and connect the output of the power supply to the power jack on the rear of the WNP1000 Wireless AP The pow...

Page 4: ...ty WEP change the IP Address or other configuration options If you want to change the default configurations you will need to access the browser based utility of the WNP1000 Wireless AP you need a com...

Page 5: ...browser on your computer configured for TCP IP networking Make sure that the computer and the WNP1000 Wireless AP are on the same local area network with similar IP addresses If you are having troubl...

Page 6: ...ll a software upgrade Time since last boot Displays the time that has elapsed since the WNP1000 Wireless AP was last started 12 LAN MAC Address Displays the Ethernet MAC address of the LAN Ethernet in...

Page 7: ...ings of the WNP1000 Wireless AP If you wish to change the User Name or Password fill in the appropriate fields and click the Apply button Please note that the Password and Confirm Password fields must...

Page 8: ...P by clicking the Reboot button on the left manual page Each time you make a change the WNP100 Wireless AP will remind you by displaying a page such as the one shown below 16 Access Point Configuratio...

Page 9: ...ding the Reset Button for three seconds restores all settings to the factory default settings Subnet Mask In this field you enter the Subnet Mask of the local network to which the WNP1000 Wireless AP...

Page 10: ...network and to prevent conflicts with other wireless networks that may be nearby The WNP1000 Wireless AP is configured with a default SSID of UNIDEN Note All clients on the same wireless LAN must have...

Page 11: ...y Configuration WEP keys either can be entered manually or can be generated by using a simple to type passphrase Passphrase Method When you enter a passphrase the WNP1000 Wireless AP generates four WE...

Page 12: ...A Z and 0 9 e g MyKey in the WEP Key 1 entry field Alternatively you may enter 10 digit hexadecimal values in the range of A F and 0 9 as shown in the example below You can also enter WEP keys in the...

Page 13: ...25 A sample WEP configuration using manual key entry is shown in the following figure 26 WLAN Access Control When you click WLAN Access Control the following page will appear...

Page 14: ...up page as shown in the following figure 28 Uniden s client MAC Address can be found listed on the product label For 802 11b clients you can find the MAC Address listed on the package of the client n...

Page 15: ...the firmware file to be uploaded into WNP1000 Wireless AP 30 When you receive the warning shown below click OK to dismiss the warning Once the warning is dismissed and you have entered the file name o...

Page 16: ...31 32...

Page 17: ...to reboot and display the General Information page again The upgrade process is complete Please remember that configuration changes that you make through the user interface including firmware upgrades...

Page 18: ...ck on Start Settings Control Panel Double click on Network 2 In The following network components are installed box select the TCP IP associated with your network adapter If you only have one network a...

Page 19: ...ask 255 255 255 0 6 Click the OK button in the Internet Protocol TCP IP Properties window and click the OK button in the Local Area Connection Properties window 7 Restart the computer if asked 38 For...

Page 20: ...ess that is not used by any other computer connected to the network You can only use an IP address in the range of 192 168 1 2 to 192 168 1 254 Make sure that each IP address is unique for each PC or...

Page 21: ...ications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference 42 will not occur in a particular installation If...

Page 22: ...ing to rest on it and do not locate this product where the cable will be damaged by persons walking on it 44 7 Do not overload wall outlets and extension cords as this can result in the risk of fire o...

Page 23: ...tained as reasonable or necessary B modified altered or used as part of any conversion kits subassemblies or any configurations not sold by Uniden C improperly installed D serviced or repaired by some...

Page 24: ...nd receivers to communicate directly with each other eliminating the need for an access point Adapter A printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC In a n...

Page 25: ...n A sub network comprised of a group of clients and servers under the control of one security database Dividing LANs into domains improves performance and security 50 Download To receive a file transm...

Page 26: ...dress that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e mail address you re sending a note to At the other end the recipient can see the IP addre...

Page 27: ...personal computers to a broadband modem for Internet access It is similar to how a dial up connection works but at higher 54 PPTP Point to Point Tunneling Protocol A protocol set of communication rule...

Page 28: ...ckbone connections and wide area connections 56 UDP User Datagram Protocol A communications method protocol that offers a limited amount of service when messages are exchanged between computers in a n...

Page 29: ...57 MEMO 58...

Reviews: