background image

7.  Glossary 

 

Traveler3G M 

User‟s Manual

 

 

 

 

Infrastructure Mode

 

A wireless network that is built around one or more access points to provide wireless 

clients access to wired LAN / Internet service. The opposite of Infrastructure mode is 

Ad-hoc mode. 

 

 

IP address

 

IP (Internet Protocol) is a layer-3 network protocol that is the basis of all Internet 

communication. An IP address is 32-bit number that identifies each sender or 

receiver of information that is sent across the Internet. An IP address has two parts: 

an identifier of a particular network on the Internet and an identifier of the particular 

device (which can be a server or a workstation) within that network. The new IPv6 

specification supports 128-bit IP address format. 

 

 

IPsec

 

IP Security. A set of protocols developed by the IETF to support secure exchange of 

packets at the IP layer.    IPsec has been deployed widely to implement Virtual 

Private Networks (VPNs). IPsec supports two encryption modes: Transport and 

Tunnel. Transport mode encrypts only the data of each packet, but leaves the 

header untouched. The more secure Tunnel mode encrypts both the header and the 

payload. On the receiving side, an IPSec-compliant device decrypts each packet. 

 

 

LACP (802.3ad) Trunking

 

The 802.3ad Link Aggregation standard defines how to combine the several 

Ethernet ports into one high-bandwidth port to increase the transmission speed. It is 

also known as port trunking. Both device must set the trunking feature to work. 

 

 

MAC

 

(Media Access Control) 

 

MAC address provides layer-2 identification for Networking Devices. Each Ethernet 

device has its own unique address. The first 6 digits are unique for each 

manufacturer. When a network device have MAC access control feature, only the 

devices with the approved MAC address can connect with the network. 

 

Содержание Traveler3G M

Страница 1: ...Table of Contents Traveler3G M 11n 3G Mobile Router with Build in Sim Card Slot User s Manual ...

Страница 2: ... desktop or a laptop computer It s mandatory to connect both of two USB connectors at one end of USB supplied power cable to computer at one time Power supply is not sufficient for the device to operate normally if only one USB connector is inserted into the computer In this scenario it might cause temporary malfunction on the computer ...

Страница 3: ...slated into any language or transmitted in any form or by any means mechanical magnetic electronic optical photocopying manual or otherwise without the prior written permission Trademarks All products company brand names are trademarks or registered trademarks of their respective companies They are used for identification purpose only Specifications are subject to be changed without prior notice ...

Страница 4: ...nt can generate use and radiate radio frequency energy and if not installed and used in accordance with the instructions in this manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause interference in which case the user at his own expense will be required to take whatever measures are necessary to correct the interference ...

Страница 5: ... Setup Utility 16 2 2 The Modem Mode Easy Setup Utility 29 2 3 The Router mode Easy Setup by Configuring Web Pages 32 3 Making Configuration 44 3 1 Advanced 44 3 1 1 Basic Setting 44 3 1 2 Forwarding Rules 57 3 1 3 Security Setting 63 3 1 4 Advanced Settings 74 3 1 5 TOOL BOX 83 4 Troubleshooting 89 5 Appendix A Spec Summary Table 94 6 Appendix B Licensing information 96 7 Glossary 104 ...

Страница 6: ...cally designed for mobile user who needs to have the Internet access beyond his home and office It provides a complete solution for Internet surfing and broadband sharing Instructions for installing and configuring this product can be found in this manual Before you install and use this product please read this manual carefully for fully exploiting the functions of this product ...

Страница 7: ...1 Introduction Traveler3G M User s Manual 1 1 Package List Items Description Contents Quantity 1 WiFi Mobi HSPA Router 1 2 USB Cable 1 3 Power adapter 1 4 Li ion Battery 1 5 CD 1 ...

Страница 8: ...1 Introduction Traveler3G M User s Manual 1 2 Hardware Installation Hardware Configuration ...

Страница 9: ...necting Amber EDGE or GPRS connection Amber in flash Data access in EDGE or GPRS Green UMTS HSDPA HSUPA connection Green in fast flash Data access in UMTS HSDPA HSUPA 3G Signal Roaming Alert Red Weak Level Red in quick flash Weak Level and roaming alert Amber Middle Level Amber in quick flash Middle Level and roaming alert Green Strong Level Green in quick flash Strong Level and roaming alert Wi F...

Страница 10: ...er and Battery Status Green Modem mode is active 3G Connection Status N A N A 3G Signal Roaming Alert N A N A Wi Fi N A N A Installation Steps DO NOT switch on WiFi Mobi HSPA Router before performing the installation steps below 1 Router Mode Steps Step 1 Turn off the Slide Switch ...

Страница 11: ...ual Step2 Insert SIM USIM The WiFi Mobi HSPA Router builds in a HSUPA 3G modem card Please refer to your service provider for detailed feature information Notice a 3G SIM USIM Card with data services is MUST Step 3 Attach the Li ion battery ...

Страница 12: ... Introduction Traveler3G M User s Manual Step 4 Insert Mini USB Power Jack and connect with the power adapter to the receptor on it Step 5 Then plug the other end of the power adapter into a wall outlet ...

Страница 13: ...ntroduction Traveler3G M User s Manual Step 6 Turn the Slide Switch to Router Mode The Power LED will turn ON to indicate that the power has been applied 2 Modem Mode Steps Step 1 Turn off the Slide Switch ...

Страница 14: ...anual Step2 Insert SIM USIM The WiFi Mobi HSPA Router builds in a HSUPA 3G modem card Please refer to your service provider for detailed feature information Notice a 3G SIM USIM Card with data services is MUST Step 3 Insert Mini USB cable ...

Страница 15: ...1 Introduction Traveler3G M User s Manual Step 4 Then plug the other end of the Mini USB cable into a PC Step 5 Turn the Slide Switch to Modem Mode ...

Страница 16: ...ble you to set up the WiFi Mobi HSPA Router quickly and easily Check the steps below before running the section 1 Press WPS button more than 6 seconds on the Router The Router will reset to default 2 Connect to the Router by Wi Fi The default SSID is the same as Mac Address You can find the Mac Address at Machine Label 3 Insert CD to CDROM Click the Easy Setup Utility from CD or Auto Run ...

Страница 17: ...2 Getting Start Traveler3G M User s Manual Step 1 You can start to configure the device via the Install Driver Utility Step 2 Select Language then click Next to continue ...

Страница 18: ...etting Start Traveler3G M User s Manual Step 3 1 Please select Wizard mode to run the setup step by step to diagnose the network settings of the Router 2 Click the Wizard button and click NEXT to continue ...

Страница 19: ... Step 4 1 Make sure to insert your SIM USIM with data service in the router 2 Make sure the Router is powered on 3 Make sure your computer has connected to the Router via WLAN 4 Make sure your computer has an IP address 5 Click Next to continue ...

Страница 20: ...Traveler3G M User s Manual Step 5 1 Key in the SSID Channel and Security options for example SSID 12 34 56 78 90 12 Security WEP Key 1234567890 Default SSID is the same as Mac Address 2 And then click Next to continue ...

Страница 21: ...elect Auto Detection and the Utility will try to detect and configure the required 3G service settings automatically 2 Click Next to continue Default PIN Code is empty if you have PIN Code you must enter it For example 0000 If no just click Next to continue ...

Страница 22: ...2 Getting Start Traveler3G M User s Manual Step 6 2 1 Or you can select Manual and manually fill in the required 3G service settings provided by your ISP 2 Click Next to continue ...

Страница 23: ...2 Getting Start Traveler3G M User s Manual Step 7 Check the settings and then click the Next if the settings are correct ...

Страница 24: ...2 Getting Start Traveler3G M User s Manual Step 8 The Wi Fi Mobi HSPA Router is rebooting to make your entire configuration activated ...

Страница 25: ...2 Getting Start Traveler3G M User s Manual Step 9 Please reconnect to Router before click Next ...

Страница 26: ...2 Getting Start Traveler3G M User s Manual Step 10 1 Click Next to test the Internet connection or you can skip test and then click Next to continue ...

Страница 27: ...2 Getting Start Traveler3G M User s Manual Step 10 2 Test the Internet connection ...

Страница 28: ...2 Getting Start Traveler3G M User s Manual Step 11 Congratulations Setup is completed Now you have already connected to Internet successfully ...

Страница 29: ...Mode Easy Setup Utility Check the steps below before running the section 1 Reference the section Hardware Installation Modem Mode first When you use Modem Mode at first time the utility will auto install to your computer Step 1 Install the Connection Manager ...

Страница 30: ...2 Getting Start Traveler3G M User s Manual Step 2 Congratulations Setup is completed Now you can run the utility connected to Internet ...

Страница 31: ...2 Getting Start Traveler3G M User s Manual Step 3 The UI of Connection Manager ...

Страница 32: ...outer mode Easy Setup by Configuring Web Pages You can also browse web UI to configure the device Browse to Activate the Setup Wizard Step 1 Please type in the IP Address http 192 168 1 1 Step 2 Please type airlive in the Password and click login button ...

Страница 33: ...2 Getting Start Traveler3G M User s Manual Step 3 Select your language ...

Страница 34: ...2 Getting Start Traveler3G M User s Manual Step 4 Select Wizard for basic settings with simple way ...

Страница 35: ...2 Getting Start Traveler3G M User s Manual Step 5 Press Next to start the Setup Wizard ...

Страница 36: ...2 Getting Start Traveler3G M User s Manual Configure with the Setup Wizard Step 1 Change System Password Set up your system password Default admin ...

Страница 37: ...2 Getting Start Traveler3G M User s Manual Step 2 Select Time Zone ...

Страница 38: ...2 Getting Start Traveler3G M User s Manual Step 3 Select LAN IP Address and Wan Type You can select 3G and Wi Fi HotSpot as the WAN type ...

Страница 39: ...tion Dial up Profile and the Utility will try to detect and configure the required 3G service settings automatically Or you can select Manual and manually fill in the required 3G service settings provided by your ISP Default PIN Code is empty if you have PIN Code you must enter it ...

Страница 40: ...2 Getting Start Traveler3G M User s Manual Step 5 Set up your Wireless Network Set up your SSID ...

Страница 41: ...2 Getting Start Traveler3G M User s Manual Step 6 Set up Wireless Security Set up your Authentication and Encryption ...

Страница 42: ...2 Getting Start Traveler3G M User s Manual Step 7 Apply your Setting Then click Apply Setting ...

Страница 43: ...2 Getting Start Traveler3G M User s Manual Step 8 Click Finish to complete it ...

Страница 44: ...3 Making Configuration Traveler3G M User s Manual 3 3 Making Configuration 3 1 Advanced 3 1 1 Basic Setting Network Setup LAN Setup ...

Страница 45: ... computers on your network must use the LAN IP address of your product as their Default Router You can change it if necessary 2 Subnet Mask insert 255 255 255 0 Internet Setup This device supports different WAN types of connection for users to connect to remote wireless ISP such as HSPA 3G or Wi Fi Hotspot ...

Страница 46: ... the required 3G service settings provided by your ISP 2 Country select your country 3 Telecom select your telecom 4 3G Network select the 3G Network 5 APN Enter the APN for your PC card here Optional 6 Pin Code Enter the Pin Code for your SIM card Optional 7 Dial Number This field should not be altered except when required by your service provider 8 Account Enter the new User Name for your PC car...

Страница 47: ...meone clicks the Connect button in the Status page 14 Keep Alive you can diagnose your connection by it Wi Fi HotSpot Types This WAN type allows you to share one Wi Fi Hotspot account with your friends or colleagues Local clients connect to this device via Wi Fi connection and surfing Internet by connecting to remote Wi Fi Hotspot Just follow a few steps below to connect to remote Wi Fi HotSpot No...

Страница 48: ...t Search button to search any available Wi Fi Hotspot or Wi Fi AP Access Point in your environment Step 2 After finish searching it will list all available Wi Fi APs in your environment You can select one of the lists to start to connect or press Refresh button to search again ...

Страница 49: ...Manual Step 3 Click Save button to save settings after selecting There will be a field here for you to input encryption key if remote Wi Fi Hotspot or Wi Fi AP requires Step 4 Click Reboot button to restart device to take new settings effective ...

Страница 50: ...puter You must specify the starting ending address of the IP address pool 4 Domain Name Optional this information will be passed to the client 5 Primary DNS Secondary DNS Optional This feature allows you to assign a DNS Servers 6 Primary WINS Secondary WINS Optional this feature allows you to assign a WINS Servers 7 Router Optional Router Address would be the IP address of an alternate Router This...

Страница 51: ...3 Making Configuration Traveler3G M User s Manual DHCP Clients List The list of DHCP clients shows here DHCP Fixed Mapping The DHCP Server will reserve the special IP for special MAC address shows below ...

Страница 52: ... can roam freely over this product and other Access Points that have the same Network ID The factory setting is default 3 SSID Broadcast The router will broadcast beacons that have some information including SSID so that wireless clients can know how many AP devices by scanning function in the network Therefore this function is disabled the wireless clients can not find the device from beacons 4 C...

Страница 53: ...tation ID typically the MAC address This is followed by an authentication response from the AP router containing a success or failure message An example of when a failure may occur is if the client s MAC address is explicitly excluded in the AP router configuration Shared Shared key authentication relies on the fact that both stations taking part in the authentication process have the same shared ...

Страница 54: ... in 64 hexadecimal 0 1 2 8 9 A B F digits If you select ASCII the length of pre share key is from 8 to 63 Fill in the key Ex 12345678 WPA PSK2 WPA PSK2 user AES and TKIP for Same the encryption the others are same the WPA PSK WPA PSK WPA PSK2 Another encryption options for WPA PSK TKIP and WPA PSK2 AES the others are same the WPA PSK ...

Страница 55: ...raveler3G M User s Manual WPS Wi Fi Protection Setup WPS is Wi Fi Protection Setup which is similar to WCN NET and offers safe and easy way in Wireless Connection Wireless Client List The list of wireless client is shows here ...

Страница 56: ...figuration Traveler3G M User s Manual Change Password You can change Password here We strongly recommend you to change the system password for security reason Click on Save to store your setting or Undo to give up ...

Страница 57: ...3 Making Configuration Traveler3G M User s Manual 3 1 2 Forwarding Rules ...

Страница 58: ...visible to the outside world If you wish you can make some of them accessible by enabling the Virtual Server Mapping A virtual server is defined as a Service Port and all requests to this port will be redirected to the computer specified by the Server IP Virtual Server can work with Scheduling Rules and give user more flexibility on Access control For Detail please refer to Scheduling Rule ...

Страница 59: ...2 168 123 1 a Web server port 80 at 192 168 123 2 and a VPN server at 192 168 123 6 then you need to specify the following virtual server mapping table Service Port Server IP Enable 21 192 168 123 1 V 80 192 168 123 2 V 1723 192 168 123 6 V Click on Save to store what you just select or Undo to give up ...

Страница 60: ...a pure NAT router The Special Applications feature allows some of these applications to work with this product If the mechanism of Special Applications fails to make an application work try setting your computer as the DMZ host instead Trigger the outbound port number issued by the application Incoming Ports when the trigger packet is detected the inbound packets sent to the specified port numbers...

Страница 61: ...y given time only one PC can use each Special Application tunnel Click on Save to store what you just select or Undo to give up Miscellaneous 1 IP Address of DMZ Host DMZ Demilitarized Zone Host is a host without the protection of firewall It allows a computer to be exposed to unrestricted 2 way communication for Internet games Video conferencing Internet telephony and other special applications ...

Страница 62: ... Manual 2 UPnP Setting The device also supports this function If the OS supports this function enable it like Windows XP When the user gets IP from Device and will see icon as below Click on Save to store what you just select or Undo to give up ...

Страница 63: ...3 Making Configuration Traveler3G M User s Manual 3 1 3 Security Setting ...

Страница 64: ...er enables you to control what packets are allowed to pass the router Outbound filter applies on all outbound packets However inbound filter applies on packets that destined to Virtual Servers or DMZ host only You can select one of the two filtering policies 1 Allow all to pass except those match the specified rules 2 Deny all to pass except those match the specified rules ...

Страница 65: ...addresses 4 3 2 1 4 3 2 254 An empty implies all IP addresses For source or destination port you can define a single port 80 or a range of ports 1000 1999 Add prefix T or U to specify TCP or UDP protocol For example T80 U53 U2000 2999 No prefix indicates both TCP and UDP are defined An empty implies all port addresses Packet Filter can work with Scheduling Rules and give user more flexibility on A...

Страница 66: ...anual Domain Filters Let you prevent users under this device from accessing specific URLs 1 Domain Filter Enable Check if you want to enable Domain Filter 2 Log DNS Query Check if you want to log the action when someone accesses the specific URLs ...

Страница 67: ...k without restriction 4 Domain Suffix A suffix of URL can be restricted for example com xxx com 5 Action When someone is accessing the URL met the domain suffix what kind of action you want Check drop to block the access Check log to log these access 6 Enable Check to enable each rule Click on Save to store what you just select or Undo to give up ...

Страница 68: ...define Websites The major difference between Domain filter and URL Blocking is Domain filter require user to input suffix like com or org etc while URL Blocking require user to input a keyword only In other words Domain filter can block specific website while URL Blocking can block hundreds of websites by simply a keyword ...

Страница 69: ...locking 2 URL If any part of the Website s URL matches the pre defined word the connection will be blocked For example you can use pre defined word sex to block all websites if their URLs contain pre defined word sex 3 Enable Check to enable each rule Click on Save to store your setting or Undo to give up ...

Страница 70: ...ntrol allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address 1 MAC Address Control Check Enable to enable the MAC Address Control All of the settings in this page will take effect only when Enable is checked ...

Страница 71: ...ients whose MAC addresses are not in the Control table please see below to connect with this device 3 Association control Check Association control to enable the controlling of which wireless client can associate to the wireless LAN If a client is denied to associate to the wireless LAN it means the client can t send or receive any data via this device Choose allow or deny to allow or deny the cli...

Страница 72: ...his feature enables you to perform administration task from remote host If this feature is enabled only the specified IP address can perform remote administration If the specified IP address is 0 0 0 0 any host can connect with this product to perform administration task You can use subnet mask bits nn notation to specified a group of trusted IP addresses for example 10 1 2 0 24 NOTE When Remote A...

Страница 73: ...e WAN cannot ping this product 4 DoS Attack Detection When this feature is enabled the router will detect and log the DoS attack comes from the Internet Currently the router can detect the following DoS attack SYN Attack WinNuke Port Scan Ping of Death Land Attack etc Click on Save to store your setting or Undo to give up ...

Страница 74: ...3 Making Configuration Traveler3G M User s Manual 3 1 4 Advanced Settings ...

Страница 75: ...3 Making Configuration Traveler3G M User s Manual Status System Log ...

Страница 76: ...to enable Email alert send syslog via email Check Enable to enable this function SMTP Server IP and Port Input the SMTP server IP and port which are connected with If you do not specify port number the default value is 25 For example mail your_url com or 192 168 1 100 26 SMTP Username and password Input a user account and password for the SMTP server E mail address The recipients who will receive ...

Страница 77: ...omain name service DDNS So that anyone wishing to reach your host only needs to know the name of it Dynamic DNS will map the name of your host to your current IP address which changes each time you connect your Internet service provider Before you enable Dynamic DNS you need to register an account on one of these Dynamic DNS servers that we list in provider field To enable Dynamic DNS click the ch...

Страница 78: ...the appropriate information about your Dynamic DNS Server You have to define Provider Host Name Username E mail Password Key You will get this information when you register an account on a Dynamic DNS server Click on Save to store what you just select or Undo to give up ...

Страница 79: ...de different priority to different users or data flows or guarantee a certain level of performance 1 Enable This Item enables QoS function or not 2 Bandwidth of Upstream Set the limitation of upstream speed 3 Local IP Define the Local IP address of packets here ...

Страница 80: ...QoS Priority This defines the priority level of the current Policy Configuration Packets associated with this policy will be serviced based upon the priority level set For critical applications High or Normal levels are recommended For non critical applications select a Low level 8 User Rule The QoS item can work with Scheduling Rule number Please reference the section schedule Click on Save to st...

Страница 81: ...ronization Select the Enable item to enable this function Time Server Select a NTP time server to consult UTC time Sync with Time Server Select if you want to set Date and Time by NTP Protocol Sync with my PC Select if you want to set Date and Time using PC s Date and Time Click on Save to store your setting or Undo to give up ...

Страница 82: ... decide which service will be turned on or off Select the Enable item Press Add New Rule You can write a rule name and set which day and what time to schedule from Start Time to End Time The following example configure ftp time as everyday 14 10 to 16 20 Click on Save to store what you just select ...

Страница 83: ...3 Making Configuration Traveler3G M User s Manual 3 1 5 TOOL BOX ...

Страница 84: ...3 Making Configuration Traveler3G M User s Manual System Info You can view the System Information and System log and download clear the System log in this page ...

Страница 85: ...3 Making Configuration Traveler3G M User s Manual Firmware Upgrade You can upgrade firmware by clicking Upgrade button ...

Страница 86: ...G M User s Manual Backup Setting You can backup your settings by clicking the Backup Setting button and save it as a bin file Once you want to restore these settings please click Firmware Upgrade button and use the bin file you saved ...

Страница 87: ...onfiguration Traveler3G M User s Manual Reset to Default You can also reset this product to factory default by clicking the Reset to default button Reboot You can also reboot this it by clicking the Reboot button ...

Страница 88: ...laneous Domain Name or IP address for Ping Test Allow you to configure an IP and ping the device You can ping a specific IP to test whether it is alive Power Saving in Battery Mode Allow you to enable or disable the power saving mode when you use the Battery ...

Страница 89: ... t I configure the router even the WiFi is connecting Do a Ping test to make sure that the WiFi Mobi HSPA Router is responding Note It is recommended that you use an Ethernet connection to configure it Go to Start Run 1 Type cmd 2 Press OK 3 Type ipconfig to get the IP of default Router 4 Type ping 192 168 1 1 Assure that you ping the correct IP Address assigned to the WiFi Mobi HSPA Router It wil...

Страница 90: ... on Network Adapters 5 Right click on Wireless Card bus Adapter or your specific network adapter 6 Select Properties to ensure that all drivers are installed properly 7 Look under Device Status to see if the device is working properly 8 Click OK 2 Problems with 3G connection A What can I do if the 3G connection is failed by Auto detection Maybe the device can t recognize your ISP automatically Ple...

Страница 91: ... certain 3G cards Please check the latest compatibility list to see if your 3G card is already supported E What should I insert in APN PIN Code Account Password Primary DNS and Secondary DNS The device will show this information after you choose country and Telcom You can also check these values with your ISP F Which 3G network should I select It depends on what service your ISP provide Please che...

Страница 92: ...electric motors B What can I do if my wireless client cannot access the Internet I Out of range Put the router closer to your client II Wrong SSID or Encryption Key Check the SSID or Encryption setting III Connect with wrong AP Ensure that the client is connected with the correct Access Point i Right click on the Local Area Connection icon in the taskbar ii Select View Available Wireless Networks ...

Страница 93: ... encryption key 1 Go back to advanced setting to set up your Encryption key again 2 Reset the WiFi Mobi HSPA Router to default setting 5 How to reset to default 1 Ensure the WiFi Mobi HSPA Router is powered on 2 Find the Reset button on the right side 3 Press the Reset button for 8 seconds and then release 4 After the WiFi Mobi HSPA Router reboots it has back to the factory default settings ...

Страница 94: ...ode 1 Power Jack mini usb Power Jack DC 5V 1 2A 1 Wireless LAN WiFi Standard IEEE 802 11b g n 1x1 compliance SSID SSID broadcast or in stealth mode Channel Auto selection manually Security WEP WPA PSK WPA2 PSK WPS WPS Wi Fi Protected Setup Functionality Wireless WAN PPP for HSUPA Wi Fi HotSpot Modem Mode The device can be a mini usb 3G dongle WAN Connection Auto reconnect dial on demand manually S...

Страница 95: ...ion Device dimension mm 103 78 21 Package dimension mm 213 140 67 Package weight g 470 Operation Temp Temp 0 40oC Humidity 10 90 non condensing Storage Temp Temp 10 70oC Humidity 0 95 non condensing EMI Certification CE FCC RoHS RoHS compliance Specifications are subject to change without prior notice ...

Страница 96: ...hose software packages are copyright by their respective authors Linux 2 6 21 system kernel busybox V1 3 2 BridgeUtil bridge utils 1 1 tar gz DHCP20175 svn busybox net trunk udhcp Revision 20175 DNRD V2 17 IPTables142 V1 4 2 L2TP rp l2tp 0 4 tar gz PPP ppp 2 4 4 tar gz PPPoE rp pppoe 3 8 tar gz PPTP pptp 1 7 1 tar gz SNMP ucd snmp Version 4 1 2 IPRoute2 http developer osdl org dev iproute2 iproute...

Страница 97: ... speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To pro...

Страница 98: ...placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another languag...

Страница 99: ...t or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Progr...

Страница 100: ... received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and in...

Страница 101: ...t contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those...

Страница 102: ...ter version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditi...

Страница 103: ...R OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH...

Страница 104: ...12 non overlapping channels comparing to 802 11b g s 3 non overlapping channels This means the possibility to build larger non interfering networks However the 802 11a deliver shorter distance at the same output power when comparing to 802 11g 802 11b International standard for wireless networking that operates in the 2 4GHz frequency band 2 4 GHz to 2 4835 GHz and provides a throughput up to 11 M...

Страница 105: ... amendment which improves upon the previous 802 11 standards by adding multiple input multiple output MIMO and many other newer features The IEEE has approved the amendment and it was published in October 2009 Enterprises however have already begun migrating to 802 11n networks based on the Wi Fi Alliance s certification of products conforming to a 2007 draft of the 802 11n proposal 802 11n provid...

Страница 106: ... can only view in frames of 256 ID at a time 802 1x 802 1x is a security standard for wired and wireless LANs In the 802 1x parlance there are usually supplicants client authenticator switch or AP and authentication server radius server in the network When a supplicants request a service the authenticator will pass the request and wait for the authentication server to grant access and register acc...

Страница 107: ...ing for the ACK Window to timeout on lost packets If the ACK setting is too low then the ACK window will have expired and the returning packet will be dropped greatly lowering throughput By having the ability to adjust the ACK setting we can effectively optimize the throughput over long distance links This is especially true for 802 11a and 802 11g networks Setting the correct ACK timeout value ne...

Страница 108: ...e loss Cable loss should be subtracted from the total output power during distance calculation For example if the cable and connector loss is 3dBm and the output power is 20dBm the output power at the cable end is only 17dBm Client Client means a network device or utility that receives service from host or server A client device means end user device such as wireless cards or wireless CPE CPE Devi...

Страница 109: ...gn IP addresses When DHCP is used whenever a computer logs onto the network it automatically gets an IP address assigned to it by DHCP server A DHCP server can either be a designated PC on the network or another network device such as a router DMZ Demilitarized Zone When a router opens a DMZ port to an internal network device it opens all the TCP UDP service ports to this particular device The fea...

Страница 110: ... to distinguish one network from the other Wireless clients must know the SSID in order to associate with a WLAN network Hide SSID feature disable SSID broadcast so users must know the correct SSID in order to join a wireless network Firewall A system that secures a network and prevents access by unauthorized users Firewalls can be software router or gateway Firewalls can prevent unrestricted acce...

Страница 111: ...environment gateway typically is a multi function device that integrates NAT firewall bandwidth management and other security functions Hotspot A place where you can access Wi Fi service The term hotspot has two meanings in wireless deployment One is the wireless infrastructure deployment the other is the Internet access billing system In a hotspot system a service provider typically need an authe...

Страница 112: ...port secure exchange of packets at the IP layer IPsec has been deployed widely to implement Virtual Private Networks VPNs IPsec supports two encryption modes Transport and Tunnel Transport mode encrypts only the data of each packet but leaves the header untouched The more secure Tunnel mode encrypts both the header and the payload On the receiving side an IPSec compliant device decrypts each packe...

Страница 113: ...ase the coverage and performance of a WLAN network In a MIMO device 2 or more antennas are used to increase the receiver sensitivity and to focus available power at intended Rx NAT Network Address Translation A network algorithm used by Routers to enables several PCs to share single IP address provided by the ISP The IP that a router gets from the ISP side is called Real IP the IP assigned to PC u...

Страница 114: ... networking device used for plugging in a cable or an adapter The virtual connection point through which a computer uses a specific application on a server PPPoE Point to Point Protocol over Ethernet PPPoE relies on two widely accepted standards PPP and Ethernet PPPoE is a specification for connecting the users on an Ethernet to the Internet through a common broadband medium such as a single DSL l...

Страница 115: ...he ISP you must enter your username and password This information is passed to a RADIUS server which checks that the information is correct and then authorizes access to the ISP system Radius typically uses port 1812 and port 1813 for authentication and accounting port Though not an official standard the RADIUS specification is maintained by a working group of the IETF Receiver Sensitivity Receive...

Страница 116: ... sent when a computer has data to transmit The computer will wait for a CTS Clear To Send message before sending data RTS Threshold RTS Request to Send The RTS CTS clear to send packet will be send before a frame if the packet frame is larger than this value Lower this value can improve the performance if there are many clients in your network You can try 1500 1000 or 500 when there are many clien...

Страница 117: ...nown as Web VPN The HTTPS and SSH management interface use SSL for data encryption Subnet Mask An address code mask that determines the size of the network An IP subnet are determined by performing a BIT wise AND operation between the IP address and the subnet mask By changing the subnet mask you can change the scope and size of a network Subnetwork or Subnet Found in larger networks these smaller...

Страница 118: ...ynamic Turbo the channel binding will be used only if necessary In Static Turbo the channel binding is always on This protocol may be combined with Super A model to increase the performance even more The used of channel binding might be prohibited in EU countries TX Output Power Transmit Output Power The TX output power means the transmission output power of the radio Normally the TX output power ...

Страница 119: ...rnet a walled garden refers to a browsing environment that controls the information and Web sites the user is able to access This is a popular method used by ISPs in order to keep the user navigating only specific areas of the Web WAN Wide Area Network A communication system of connecting PCs and other computing devices across a large local regional national or international geographic area A WAN ...

Страница 120: ... Wi Fi is called Wi Fi Alliance also known as WECA WiMAX Worldwide Interoperability for Microwave Access A Wireless Metropolitan Network technology that complies with IEEE 802 16 and ETSI Hiperman standards The orginal 802 16 standard call for operating frequency of 10 to 66Ghz spectrum The 802 16a amendment extends the original standard into spectrum between 2 and 11 Ghz 802 16d increase data rat...

Страница 121: ...etween nodes The most popular standard for WLAN is the 802 11 standards WMM Wi Fi Multimedia WMM is a standard to prioritize traffic for multimedia applications The WMM prioritize traffic on Voice over IP VoIP audio video and streaming media as well as traditional IP data over the AP WMS Wireless Management System An utility program to manage multiple wireless AP Bridges ...

Отзывы: