8520-C1 User Manual
81
(CAT 3) is used for 10BASE-T networks, and an
even higher grade called Category 5 (CAT 5) is
used for 100BASE-T networks. See 10BASE-T,
100BASE-T, Ethernet.
Unnumbered
interfaces
An unnumbered interface is an IP interface that
does not have a local subnet associated with it.
Instead, it uses a router-id that serves as the
source and destination address of packets sent to
and from the router. Unlike the IP address of a
normal interface, the router-id of an unnumbered
interface is allowed to be the same as the IP
address of another interface. For example, the
WAN unnumbered interface of your device uses
the same IP address of the LAN interface
(192.168.1.1).
The unnumbered interface is temporary – PPP or
DHCP will assign a ‘real’ IP address automatically.
Upstream
The direction of data transmission from the user to
the Internet.
VC Virtual
Circuit
A connection from your DSL router to your ISP.
VCI
Virtual Circuit Identifier
Together with the Virtual Path Identifier (VPI), the
VCI uniquely identifies a VC. Your ISP will tell you
the VCI for each VC they provide. See VC.
VPI
Virtual Path Identifier
Together with the Virtual Circuit Identifier (VCI), the
VPI uniquely identifies a VC. Your ISP will tell you
the VPI for each VC they provide. See VC.
WAN Wide
Area
Network
Any network spread over a large geographical
area, such as a country or continent. With respect
to the device, WAN refers to the Internet.
Web browser
A software program that uses Hyper-Text Transfer
Protocol (HTTP) to download information from
(and upload to) web sites, and displays the
information, which may consist of text, graphic
images, audio, or video, to the user. Web browsers
use Hyper-Text Transfer Protocol (HTTP). Popular
web browsers include Netscape Navigator and
Microsoft Internet Explorer. See HTTP, web site,
WWW.
WEP
Wired Equivalent Privacy (WEP) encrypts data
over WLANs. Data is encrypted into blocks of
either 64 bits length or 128 bits length. The
encrypted data can only be sent and received by
users with access to a private network key. Each
PC on your wireless network must be manually
configured with the same key as your device in
order to allow wireless encrypted data
transmissions. Eavesdroppers cannot access your
network if they do not know your private key. WEP
is considered to be a low security option.
Содержание 8520-C1
Страница 6: ...8520 C1 User Manual VI 18 Appendix G Regulation 87 19 Appendix H Contact Information 90...
Страница 59: ...8520 C1 User Manual 53 Advanced Figure 58 View Advanced Raw Ethernet Port Parameters...
Страница 61: ...8520 C1 User Manual 55 Advanced Figure 60 View Advanced DSL Port Parameters...
Страница 63: ...8520 C1 User Manual 57 Advanced Figure 62 View Advanced Wireless Port Parameters...