Shireen Octopus 5800A User Manual Page 28

  • Download
  • Add to my manuals
  • Print
  • Page
    / 35
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 27
Page | 28
Demilitarized zone
DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local
Network, but that is not protected by the same security as the Local Network.
DHCP
Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or
devices that request them
Digital certificate:
An electronic method of providing credentials to a server in order to have access to it or a network
Direct Sequence Spread Spectrum
DSSS: Modulation technique used by 802.11b wireless devices
DMZ
"Demilitarized Zone". A computer that logically sits in a "no-mans land" between the LAN and the WAN. The DMZ computer trades
some of the protection of the Access Point's security mechanisms for the convenience of being directly addressable from the Internet.
DNS
Domain Name System: Translates Domain Names to IP addresses
Domain name
A name that is associated with an IP address
Download
To send a request from one computer to another and have the file transmitted back to the requesting computer
DSL
Digital Subscriber Line. High bandwidth Internet connection over telephone lines
Duplex
Sending and Receiving data transmissions at the sane time
Dynamic DNS service
Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked
to their changing IP address. The IP address is updated by either client software running on a computer or by a Access Point that
supports Dynamic DNS, whenever the IP address changes
Dynamic IP address
IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP
addresses to their customers.
E
EAP
Extensible Authentication Protocol
Email
Electronic Mail is a computer-stored message that is transmitted over the Internet
Encryption
Converting data into cyphertext so that it cannot be easily read
Ethernet
The most widely used technology for Local Area Networks.
F
Fiber optic
A way of sending data through light impulses over glass or plastic wire or fiber
File server
A computer on a network that stores data so that the other computers on the network can all access it
File sharing
Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights
Firewall
A device that protects resources of the Local Area Network from unauthorized users outside of the local network
Firmware
Programming that is inserted into a hardware device that tells it how to function
Fragmentation
Page view 27
1 2 ... 23 24 25 26 27 28 29 30 31 32 33 34 35

Comments to this Manuals

No comments