background image

13 

Introduction 

The TEW-812DRU 

802.11ac(draft 2.0)3x3 Gigabit Wireless Router

 is an high-performance, 

wireless router that supports high-speed wireless networking at home, at work or in public 
places.  
 

Unlike most routers, the TEW-812DRU provides data transfers at up to 1.3Gbps when using 11AC   
connection. This router is also back compatible with 802.11n or 802.11g or 11b devices. This means 
that you do not need to change your entire network to maintain connectivity. You may sacrifice some of 
11ac’s   speed when you mix 11ac /11n   and 11b/g devices, but you will not lose the ability to 
communicate when you incorporate the 11ac      standard into your 11a/b/g/n network. You may choose 
to slowly change your network by gradually replacing the 11a/b/g/n devices with 11ac      devices.   

 

Features

 



4 x 10/100/1000Mbps Auto-MDIX LAN ports   



1 x 10/100/1000Mbps WAN port (Internet) 



1 x USB 2.0 port for USB share (storage or printing) 



1 x Wi-Fi Protected Setup (WPS) button 



On/off power switch (EU version) 



Simultaneously transmit both 2.4GHz and 5GHz wireless networks 



Compliant with the latest draft 802.11ac wireless technology 



Backwards compatible with IEEE 802.11n/b/g/a wireless standards 



High-speed data rates of up to 1.3Gbps with 802.11ac and 450Mbps with 802.11n on both 

2.4GHz and 5GHz band* 



IPv6 (Internet Protocol v6) support 



FTP and Samba USB storage support 



Share USB peripheral devices over the network including; flash drives, external hard drives 
or printers 



Control Center utility supports Windows 8 (32/64-bit) / 7 (32/64-bit) / Vista (32/64-bit) / 
Windows XP(32/64-bit) and Mac OS X 10.6/10.7/10.8 operating systems   



Compatible with most popular cable/DSL Internet Service Providers using Dynamic/Static IP, 

PPPoE, L2TP, and PPTP connection 



Advanced firewall protection with Network Address Translation (NAT) 



Wireless Distribution System (WDS) support for wireless network bridging 



Advance wireless security of up to WPA2-RADIUS 



Wi-Fi Multimedia (WMM) and configurable WAN Quality of Service (QoS) support 



Guest network support (3x per wireless band) with access restriction and time limit 



Internet Access Control with MAC, URL, Service Type, and IP Range filtering 

Internet Access Control Rule Scheduling: schedule access to websites, online video 
games, Internet cameras and more for specific times through the week   



One touch wireless connection using the WPS button 



Easy setup via Web browser using the latest versions of Internet Explorer, FireFox, Safari 

and Chrome 



Virtual server and Application Level Gateway (ALG) services for special Internet applications   

Содержание TEW-800MB

Страница 1: ...802 11ac draft 2 0 3x3 Gigabit Wireless Router TEW 812DRU TEW 800MB Rev 0 1 User Manual ...

Страница 2: ...rent from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may ...

Страница 3: ...armonized EN covering essential requirements under article 3 2 of the R TTE Directive EN 301 489 1 V1 8 1 2008 04 Electromagnetic compatibility and Radio Spectrum Matters ERM ElectroMagnetic Compatibility EMC standard for radio equipment and services Part 1 Common technical requirements EN 301 489 17 V2 1 1 2009 05 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compat...

Страница 4: ...3 output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France ...

Страница 5: ... 5 EC Español Spanish Por medio de la presente nombre del fabricante declara que el clase de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩ ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΙΑΤΑΞΕΙΣ ΤΗΣ Ο ΗΓΙΑΣ 1999 5 ΕΚ ...

Страница 6: ...rme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensk o Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensk y Slovak Meno výrobcu týmto vyhlasuje že typ zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999 5 ES Suomi Finnish Valmistaja manu...

Страница 7: ...N 60950 Product Safety EN 300 328 Technical requirement for radio equipment EN 301 489 1 17 General EMC requirements for radio equipment EN 301 893 V1 5 1 2008 12 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged ...

Страница 8: ...wing conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE YOUR NETWORKING EXPERIENCE OR COMPROMISE LIKE NOTES AND TIPS THE IMPORTANT SYMBOL INDICATES INFORMATION THAT CAN IMPROVE NETWORKING THIS I...

Страница 9: ...uick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product Minimum System Requirements Ethernet Based Cable or DSL Modem Computers with Windows Macintosh or Linux based operating systems with an installed Ethernet adapter and CD ROM Drive Internet Explorer Version 6 0 or higher Mozilla or Sa...

Страница 10: ...on data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infra structure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ESS is two or more BSSs ...

Страница 11: ...10 ...

Страница 12: ...am below communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network In an ESS environment users are able to move from one access point to another without losing the ...

Страница 13: ...12 connection In the diagram below when the user moves from BSS 1 to BSS 2 the WLAN client devices automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...

Страница 14: ...dards High speed data rates of up to 1 3Gbps with 802 11ac and 450Mbps with 802 11n on both 2 4GHz and 5GHz band IPv6 Internet Protocol v6 support FTP and Samba USB storage support Share USB peripheral devices over the network including flash drives external hard drives or printers Control Center utility supports Windows 8 32 64 bit 7 32 64 bit Vista 32 64 bit Windows XP 32 64 bit and Mac OS X 10 ...

Страница 15: ...vary depending on interference network traffic building materials and other conditions Control Center utility installation required for each computer in order to access the print server For maximum performance of up to 1 3Gbps use with a 3x3 802 11ac wireless adapter Hardware Overview LED Indications from bottom to top PWR WAN LAN1 LAN2 LAN3 LAN4 Wireless WPS USB Rear panel from bottom to top DC I...

Страница 16: ...45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception 3 Building Materials can impede the wireless signal a solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices...

Страница 17: ...Ds are light 3 To configure the router open your browser type http 192 168 10 1 into the address bar and click Go to get to the setup wizard page 4 At the Password prompt the User name is admin and password is admin Enter default username and password and press ok ...

Страница 18: ... easy way to set up the TEW 812DRU step by step The Wizard will teach user to set up the TEW 812DRU just few steps 5 You could click Launch Internet ConnectionSetup Wizard and follow Wizard to complete your setting example ...

Страница 19: ...18 If you choice Static IP Address Connection than press Next ...

Страница 20: ...19 Then press Apply ...

Страница 21: ...20 6 You also could click Launch Wireless Security Setup Wizard and follow Wizard to complete your setting example ...

Страница 22: ...21 Select the 2 4G 5G security mode ...

Страница 23: ...22 Enter your password ...

Страница 24: ...23 Press Apply ...

Страница 25: ... your connection method please contact your Internet Service Provider Static Used when your ISP provides you a set IP address that does not change The IP information is manually entered in your IP configuration settings You must enter the IP address Subnet Mask Gateway Primary DNS Server and Secondary DNS Server Your ISP provides you with all of this information DHCP ...

Страница 26: ...rovided by your Internet Service Provider to gain access to the Internet Reconnect Mode Typically PPPoE connections are not always on The router allows you to set the reconnection mode The settings are Always on A connection to the Internet is always maintained On demand A connection to the Internet is made as needed Manual You have to open up the Web based management interface and click the Conne...

Страница 27: ...vides the values for the following fields for WAN Interface IP Setting IP Address Subnet Mask Default Gateway Dynamic If the ISP s servers assign the router s IP addressing upon establishing a connection select this option PPTP PPTP Point to Point Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection is primarily used in Europe This method of connection...

Страница 28: ...mputer or router used to initially connect to their service The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address This router has a different MAC address than the computer or router that initially connected to the ISP If you need to change the MAC address of the rounter s WAN side Ethernet interface either type in an alternate MAC addre...

Страница 29: ...able for the LAN Subnet Mask The subnet mask of the local area network Enable DHCP Server Once your router is properly configured and this option is enabled the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network There is no need for you to do this yourself ...

Страница 30: ... available for allocation by the DHCP Server Subnet Mask The subnet mask of the local area network Gateway The IP address of the router on the local area network For example 192 168 10 1 DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease The lease functions just as a lease on an apartment would The initial lease designates the amount ...

Страница 31: ...30 router from the computer and click the Copy Your PC s MAC Address button to enter the MAC address ...

Страница 32: ... 6to4 6to4 is provided as a transition for migrating from IPv4 to IPv6 It allows IPv6 packets to be transmitted over an IPv4 network through the automatic tunneling technology and routes traffic between 6to4 and IPv6 networks ...

Страница 33: ...32 Network QoS QoS Setup ...

Страница 34: ...re are several Maximum upload bandwidth to choose or user defined QoS Group There are several group of QoS rate and ceil upload bandwidth to setup QoS List You can setup QoS per different protocol Application ...

Страница 35: ...34 Network DHCP Client List In this section you can see the connected LAN devices are currently receiving an IP addresses ...

Страница 36: ...35 Wireless Wireless Basic ...

Страница 37: ...eless networks from one wireless Router Access Point device Add Additional Wireless Network Name SSID To add additional wireless Network Names simply add the name to the Multiple SSID field and click on apply at the bottom of the page When finished go to the Security section in this Users Guide for wireless security configuration Frequency Channel A wireless network uses specific channels in the w...

Страница 38: ... apply your setting changes Enable the security seeing in security page each WDS APs need to use same security setting Note WDS supports wireless g n modes The use multiple Access Point will reduces the overall network throughput to the TEW 812DRU ...

Страница 39: ... messages The default value is 1 Valid settings are between 1 and 255 Fragmentation Threshold Wireless frames can be divided into smaller units fragments to improve performance in the presence of RF interference and at the limits of RF coverage Fragmentation will occur when frame size in bytes is greater than the Fragmentation Threshold This setting should remain at its default value of 2346 bytes...

Страница 40: ...ault value of 2346 bytes Short Preamble and Slot Using a short 400ns guard interval can increase throughput However it can also increase error rate in some installations due to increased sensitivity to radio frequency reflections Select the option that works best for your installation ...

Страница 41: ...e variant of Wi Fi Protected Access WPA security standards published by the Wi Fi Alliance The WPA Mode further refines the variant that the router should employ WPA Mode WPA is the older standard select this option if the clients that will be used with the router only support the older standard WPA2 is the newer implementation of the stronger IEEE 802 11i security standard With the WPA2 option th...

Страница 42: ...nection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Wireless MAC Filtering Choose the type of MAC filtering needed Turn MAC Filtering Disable When Disable is selected MAC addresses are not used to control network ...

Страница 43: ...manner without needing to expose private Wi Fi access codes or other personal data A guest network is a small section of an organization s computer network designed for use by temporary visitors Besides helping to keep an organization s internal information private guest networks also help avoid spreading any computer worms that visitors may have on their systems ...

Страница 44: ...43 Wireless WPS ...

Страница 45: ...extra security a new PIN can be generated You can restore the default PIN at any time Only the Administrator admin account can change or reset the PIN Current PIN Shows the current value of the router s PIN Reset To WPS Default Restore the default PIN of the router Generate New PIN Create a random number that is a valid PIN This becomes the router s PIN You can then copy this PIN to the user inter...

Страница 46: ...45 Wireless Station List All the wireless clients connecting to the router will be shown here you could monitor your network and prevent any unauthorized wireless connection easily ...

Страница 47: ...place that will be used instead of sending packets to the DMZ host so an active session virtual server active port trigger or port forwarding rule will take priority over sending a packet to the DMZ host The DMZ policy resembles a default port forwarding rule that forwards every port that is not specifically sent anywhere else The router provides only limited firewall protection for the DMZ host T...

Страница 48: ... incoming sessions bound for a specific application and also allow port redirection and the use of ALGs Port forwarding is rather like a selective DMZ where incoming traffic targeted at one or more ports is forwarded to a specific LAN host thereby not exposing as many ports as a DMZ host Port triggering is a special form of port forwarding which is activated by outgoing traffic and for which ports...

Страница 49: ...l network that will provide the virtual service for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer Protocol Select the protocol used by the service The common choices UDP TCP can be selected from the drop down menu ...

Страница 50: ...t will be used on your internal network Public Port The port that will be accessed from the Internet Schedule Select a schedule for when the service will be enabled If you do not see the schedule you need in the list of schedules ...

Страница 51: ...g route Destination IP The IP address of packets that will take this route Gateway Specifies the next hop to be taken if this route is used A gateway of 0 0 0 0 implies there is no next hop and the IP address matched is directly connected to the router on the interface specified LAN or WAN Metric ...

Страница 52: ...r WAN that the IP packet must use to transit out of the router when this route is used Clear Re initialize this area of the screen discarding any changes you have made Routes List The section shows the current routing table entries Certain required routes are predefined and cannot be changed Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon ...

Страница 53: ...52 Advanced Access Control Enable By default the Access Control feature is disabled If you need Access Control check this option ...

Страница 54: ...ce on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet ...

Страница 55: ...54 ALG Application Level Gatwway ALG By default the ALG feature is enabled ALG configuration allows users to disable some application service ...

Страница 56: ...e Specifies whether the entry will be active or inactive Name Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future Alternatively you can select from the Application list of common applications Protocol ...

Страница 57: ...ample 6500 6700 Schedule Select a schedule for when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made Port Trigger Rule List This is a list of the defined application rules Click the Enable checkbox at the left to directly activate or de activate the entry An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delet...

Страница 58: ... Rule Enable Specifies whether the entry will be active or inactive IP Address Enter the local network IP address of the system hosting the server for example 192 168 10 50 You can select a computer from the list of DHCP clients in the Computer Name drop down menu or you can manually enter the IP address of the server computer TCP Ports to Open ...

Страница 59: ...ample 6159 6180 99 UDP Ports to Open Enter the UDP ports to open for example 6159 6180 99 Schedule Select a schedule for the times when this rule is in effect Clear Re initialize this area of the screen discarding any changes you have made ...

Страница 60: ...es List The section lists the current Inbound Filter Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is highlighted and the Edit Filter Rule section is activated for editing In addition to the filters listed here two predefined filters are available wherever filters can be applied Allow All ...

Страница 61: ...60 Permit any WAN user to access the related capability Deny All Prevent all WAN users from accessing the related capability LAN users are not affected by Filter Rules ...

Страница 62: ...g entries Name Give the schedule a name that is meaningful to you such as Weekday rule Day s Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week All Day 24 hrs Select this option if you want this schedule in effect all day for the selected day s Start Time ...

Страница 63: ...d in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not normally used for email events Schedule Rules List This section shows the currently defined Schedule Rules An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon When you click the Edit icon the item is high...

Страница 64: ... permits networked devices such as personal computers printers Internet gateways Wi Fi access points and mobile devices to seamlessly discover each other s presence on the network and establish functional network services for data sharing communications and entertainment WAN Ping By default the WAN Ping Respond feature is disabled Enable WAN Ping Respond will reply information of router to outside...

Страница 65: ...64 Administrator Administrator Management Admin Password ...

Страница 66: ...wing parameters are displayed when the option is enabled Dynamic DNS Provider Select a dynamic DNS service provider from the pull down list Host Name Enter your host name fully qualified for example myhost mydomain net Account Enter the account provided by your service provider If the Dynamic DNS provider supplies only a key enter that key in all three fields Password Enter the password provided b...

Страница 67: ...66 Administrator Upload Firmware Once you have a firmware update on your computer use this option to browse for the file and then upload the information into the router ...

Страница 68: ...restore previously saved router configuration settings Load Factory Defaults This option restores all configuration settings back to the settings that were in effect at the time the router was shipped from the factory Any settings that have not been saved will be lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router ...

Страница 69: ...68 Administrator file sharing User Account List Enter username password and setting permission to limit user account could read file only or could read write file ...

Страница 70: ...onize the router s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate Note that even when NTP Server is enabled you must still choose a time zone and set the daylight saving parameters NTP Server Used Select a Network Time Server for synchronization You can type in the address of a time se...

Страница 71: ...70 Set the Date and Time Manually If you do not have the NTP Server option in effect you can either manually set the time for your router here ...

Страница 72: ...71 Administrator System log This page can be used to set remote log server and show the system log ...

Страница 73: ...72 Administrator Status The device status ...

Страница 74: ...rk ActiveX A Microsoft specification for the interaction of software components Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Ad hoc network Peer to Peer network between wireless clients ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z an...

Страница 75: ...n order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guar...

Страница 76: ...rections at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface It supports a 32 bit data path DMA and consumes less voltage CAT 5 Category 5 Used for...

Страница 77: ...managed updated as well as easily accessed by users or applications Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm...

Страница 78: ...he DMZ computer trades some of the protection of the router s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital ...

Страница 79: ...es over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of t...

Страница 80: ... standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data packets being transmitted from one router to another Host Compute...

Страница 81: ...o ensure security for VPN connections Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of ...

Страница 82: ...mputer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L L2TP Layer 2 Tun...

Страница 83: ...he manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog si...

Страница 84: ...k communication protocol This is an updated version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which ha...

Страница 85: ...ection of networking devices within a range of 10 meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages The utility sends a control packet to the given address and waits for a response PoE Power over Ethernet is the mea...

Страница 86: ... and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s cove...

Страница 87: ...h coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transf...

Страница 88: ...g in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol TCP Raw A TCP IP protocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use t...

Страница 89: ...smitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information...

Страница 90: ...cy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A c...

Страница 91: ... provides improved data encryption relative to WEP X xDSL A generic term for the family of digital subscriber line DSL technologies such as ADSL HDSL RADSL and SDSL Y Yagi antenna A directional antenna used to concentrate wireless signals on a specific location ...

Отзывы: