Shireen Octopus 5800 Скачать руководство пользователя страница 28

Page | 28

 

 

Demilitarized zone  

DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local 

Network, but that is not protected by the same security as the Local Network.  

DHCP  

Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or 

devices that request them  

Digital certificate:  

An electronic method of providing credentials to a server in order to have access to it or a network  

Direct Sequence Spread Spectrum  

DSSS: Modulation technique used by 802.11b wireless devices  

DMZ  

"Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades 

some of the protection of the Access Point's security mechanisms for the convenience of being directly addressable from the Internet.  

DNS  

Domain Name System: Translates Domain Names to IP addresses  

Domain name  

A name that is associated with an IP address  

Download  

To send a request from one computer to another and have the file transmitted back to the requesting computer  

DSL  

Digital Subscriber Line. High bandwidth Internet connection over telephone lines  

Duplex  

Sending and Receiving data transmissions at the sane time  

Dynamic DNS service  

Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked 

to their changing IP address. The IP address is updated by either client software running on a computer or by a Access Point that 

supports Dynamic DNS, whenever the IP address changes  

Dynamic IP address  

IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP 

addresses to their customers.  

EAP  

Extensible Authentication Protocol  

Email  

Electronic Mail is a computer-stored message that is transmitted over the Internet  

Encryption  

Converting data into cyphertext so that it cannot be easily read  

Ethernet  

The most widely used technology for Local Area Networks.  

Fiber optic  

A way of sending data through light impulses over glass or plastic wire or fiber  

File server  

A computer on a network that stores data so that the other computers on the network can all access it  

File sharing  

Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights  

Firewall  

A device that protects resources of the Local Area Network from unauthorized users outside of the local network  

Firmware  

Programming that is inserted into a hardware device that tells it how to function  

Fragmentation  

Содержание Octopus 5800

Страница 1: ...Octopus 5800 Series User Manual www shireeninc com Page 1...

Страница 2: ...ecifications Page 5 Power Specifications Page 6 Status Definition Page 6 Firmware Specifications Page 6 Package Contents Page 7 System Requirements Page 7 Installation Preparing for Installation Page...

Страница 3: ...it is intended RMA Policy IN NO EVENT SHALL SHIREEN INC BE LIABLE FOR ANY SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR BREACH OF THIS OR ANY OTHER WARRANTY EXPRESSED OR IMPLIED WHATSOEVER Some sta...

Страница 4: ...powered over Ethernet i Octopus 5826 5826A The octopus 5826 is the client version of the octopus 5800 Series which includes a fully integrated Panel Antenna Octopus 5826A is the amplified variant of...

Страница 5: ...rocessing Unit 250MHz Memory 32 MB SD Ram 4 MB Flash Embedded OS ipOS from Ubicom Network Standard IEEE 802 11a IEEE 802 3 Ethernet Type 10 100BaseT Ethernet Auto MDI MDI X Network Architecture Infras...

Страница 6: ...en Connected Transmitting LAN ON Green Connected Off No Connection Blinking Green Connected Transmitting RSSI Blinking from LED 1 to LED 5 Searching for AP ON Connected Showing Signal Strength Note th...

Страница 7: ...utdoor Unit with Integrated Antenna 1 Mounting Hardware 1 POE Injector 1 48V DC Power Supply 1 Quick Setup Guide 1 vii System Requirements A PC Laptop with Ethernet Interface Ethernet Cable A Web Brow...

Страница 8: ...r the device has associated itself to an AP 5 To access the web manager of the device we need to configure the Windows IP Address Setting so that we are on the same subnet as the device is and are eas...

Страница 9: ...ies 2 Set the IP Address of the Windows PC as shown in the figure below Fig 4 2 IP Properties 3 Power up the device as shown in the hardware installation section Now you will be able to access the Web...

Страница 10: ...a For Octopus 5826 Client the Default IP address of the web manager is 192 168 0 232 b For Octopus 5800S AP the Default IP address of the web manager is 192 168 0 231 c Pressing enter would open the W...

Страница 11: ...sername in factory mode for AP Client Web Manager Configuration is Admin and the Password textbox is left empty e Pressing the Log In button will take you to the main Control panel of the Web Manager...

Страница 12: ...Fig 5 4 the Main Control Panel of the Web Manager GUI in Client Mode Page 12...

Страница 13: ...e wireless AP according to your own requirement The Settings are of two types Static and Dynamic DHCP These can be changed using the Get LAN IP from drop down box The IP Address field is used to give...

Страница 14: ...users to connect to the AP Auto Channel Select is a feature that chooses the best channel available in terms of interference and signal strength level It is also known as DFS Dynamic Frequency Select...

Страница 15: ...reless LAN performance The throughput transmission speed limit when using Super G is claimed to be up to 40Mbit s 60Mbit s at a 108Mbit s signaling rate which is achieved through the bonding of two 54...

Страница 16: ...tion can be used to set the type of filter i e only allow listed machines or deny listed machines Filter Wireless Clients feature can be used to filter clients which are connected wirelessly with the...

Страница 17: ...MAC address to which you want to restrict the bandwidth in the MAC Address field and assign a particular name to the computer Upload rate Kbits sec is given in the Uplink field and Download rate Kbits...

Страница 18: ...DTIM Interval determines the updation of the distributed traffic indication map within the AP Propagation Distance is responsible for setting the distance as a fixed parameter and to tell the AP that...

Страница 19: ...a Admin Page 19...

Страница 20: ...b Time Page 20...

Страница 21: ...c System d Firmware Page 21...

Страница 22: ...iv Status a Device Info Page 22...

Страница 23: ...b Wireless c Logs Page 23...

Страница 24: ...d Statistics v Help Page 24...

Страница 25: ...Page 25 FAQs Troubleshooting Guide...

Страница 26: ...to ensure that they can communicate properly with other applications on a network ASCII American Standard Code for Information Interchange This system of characters is most commonly used for text file...

Страница 27: ...ame Ethernet network try and transmit data at the exact same time Cookie Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer t...

Страница 28: ...eceiving data transmissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to the...

Страница 29: ...ng with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one Access Point to another Host Computer on a network HTTP Hypertext Transfer Prot...

Страница 30: ...king about Internet Protocol Version 4 that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networ...

Страница 31: ...I NetBIOS Extended User Interface is a Local Area Network communication protocol This is an updated version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an I...

Страница 32: ...oint to Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of...

Страница 33: ...g traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part...

Страница 34: ...ess clients including PCs and other devices WDS Wireless Distribution System A system that enables the interconnection of access points wirelessly Web browser A utility that allows you to view content...

Страница 35: ...as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location Z 1 802 11 A family of specifications for wireless local area networks WLA...

Отзывы: