User Manual
Aolynk DR814Q ADSL2+ Broadband Router
11 Appendix – Glossary
75
V
c host configuration protocol. DHCP automates IP address assignment and
n a PC connects to the LAN, DHCP assigns it an IP address from a
P server
IX
ss a website, a DNS
e requested domain name and searches for its corresponding IP
X
riendly name in place of its associated IP address. A domain
ust be unique and is controlled by the Internet Corporation for Assigned Names
X
certain types of IP traffic commonly used by hackers to
protect your network. You can also restrict the types of IP traffic sent from your network
to the outside. Some firewall protection can be provided by packet filtering and network
address translation services.
II. DHCP
Dynami
management. Whe
shared address pool, and after a specified period, DHCP returns the address to the
pool.
VIII. DHC
Dynamic host configuration protocol server. A DHCP server is a computer responsible
for assigning IP addresses to the computers in a LAN.
. DNS
Domain name system. The DNS translates domain names into IP addresses. DNS
information is distributed hierarchically throughout the Internet among the computers
called DNS servers. For example, www.yahoo.com is the domain name associated
with the IP address 216.115.108.243. When you start to acce
server looks up th
address. If the DNS server cannot find the IP address, it communicates with
higher-level DNS servers to determine the IP address.
. Domain name
A domain name is a user-f
name m
and Numbers (ICANN).A domain name is a key element of a URL which identifies a
specific file at a website.
XI. DSL
Digital subscriber line. A technology that allows both digital data and analog voice
signals to travel over the existing copper telephone lines.
XII. Ethernet
The most commonly installed computer network technology, usually using the twisted
pair cables. The Ethernet data rates are 10 Mbps and 100 Mbps.
III. Firewall
A firewall can protect your computer or LAN from malicious attacks and other
unexpected accesses. Unauthorized users may attempt to attack your network in order
to prevent you or others on your LAN from the services.
Using the firewall, you can block