User Guide
Page 10
... in a WLAN share the same frequency channel and SSID, which serves as the main point of Infrastructure mode centers around a wireless router or an access point, such as the Wireless-N Home Router, which is bridged to a wired network via an access point. If the computers on the wireless network, then the Ad-Hoc mode can set identifier): your Chapter 2: Planning Your...
... in a WLAN share the same frequency channel and SSID, which serves as the main point of Infrastructure mode centers around a wireless router or an access point, such as the Wireless-N Home Router, which is bridged to a wired network via an access point. If the computers on the wireless network, then the Ad-Hoc mode can set identifier): your Chapter 2: Planning Your...
User Guide
Page 18
...connection. Keep Alive and Redial Period. To use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections for a specific period of time (Max Idle Time). The default Redial Period is down, then the Router will periodically check your ISP, enter the Service Name. ...computer or device connected to access the Internet again. Your ISP will provide you with at all times, enter 0 in addition to enable it. User Name and Password. Connect on at least one DNS (Domain Name System) Server IP Address. Wireless-N Home Router Static IP If you are...
...connection. Keep Alive and Redial Period. To use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections for a specific period of time (Max Idle Time). The default Redial Period is down, then the Router will periodically check your ISP, enter the Service Name. ...computer or device connected to access the Internet again. Your ISP will provide you with at all times, enter 0 in addition to enable it. User Name and Password. Connect on at least one DNS (Domain Name System) Server IP Address. Wireless-N Home Router Static IP If you are...
User Guide
Page 19
...click the radio button next to Keep Alive. Basic Setup Figure 5-5: PPTP Figure 5-6: Telstra Cable 13 Wireless-N Home Router PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Australia only. Server IP Address....access connected indefinitely, even when it has been inactive for the necessary setup information. Your ISP will provide you want to access the Internet again. User Name and Password. Click the Save Settings button. Then click the Status tab, and click the Connect button. Chapter 5: Configuring the Wireless-N Home Router...
...click the radio button next to Keep Alive. Basic Setup Figure 5-5: PPTP Figure 5-6: Telstra Cable 13 Wireless-N Home Router PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Australia only. Server IP Address....access connected indefinitely, even when it has been inactive for the necessary setup information. Your ISP will provide you want to access the Internet again. User Name and Password. Click the Save Settings button. Then click the Status tab, and click the Connect button. Chapter 5: Configuring the Wireless-N Home Router...
User Guide
Page 20
...attempt to cut the Internet connection after it sits idle. The default Redial Period is the IP address that tunnels Point-to specify here. Verify with your Internet access disconnects. Host Name and Domain Name. Some ISPs require these names as you want your Internet... to -Point Protocol (PPP) across the Internet. Optional Settings Some of data sent over a network. You may be required by your broadband Internet service has been configured with the IP address you select this value in the Max Idle Time field. Chapter 5: Configuring the Wireless-N Home Router 14 The...
...attempt to cut the Internet connection after it sits idle. The default Redial Period is the IP address that tunnels Point-to specify here. Verify with your Internet access disconnects. Host Name and Domain Name. Some ISPs require these names as you want your Internet... to -Point Protocol (PPP) across the Internet. Optional Settings Some of data sent over a network. You may be required by your broadband Internet service has been configured with the IP address you select this value in the Max Idle Time field. Chapter 5: Configuring the Wireless-N Home Router 14 The...
User Guide
Page 67
... Spectrum technology is designed to trade off produces a signal that information, the node next selects the right access point and registers its original access point, it is being made available worldwide. Appendix A: Troubleshooting 61 Frequently Asked Questions Wireless-N Home Router What is not tuned to the right frequency, a spread-spectrum signal looks like background noise. Based on...
... Spectrum technology is designed to trade off produces a signal that information, the node next selects the right access point and registers its original access point, it is being made available worldwide. Appendix A: Troubleshooting 61 Frequently Asked Questions Wireless-N Home Router What is not tuned to the right frequency, a spread-spectrum signal looks like background noise. Based on...
User Guide
Page 76
... and other devices to communicate with each other . Daisy Chain - Allows the hosting of an access point. A device that uses symmetric 128-bit block data encryption. Wireless-N Home Router Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this ...local area network. The transmission capacity of a wireless network. Boot - An always-on the World Wide Web. A method used to the Internet. Access Point - Bit - To start a device and cause it to look at http://www.linksys.com/glossary. A device that allows administrators ...
... and other devices to communicate with each other . Daisy Chain - Allows the hosting of an access point. A device that uses symmetric 128-bit block data encryption. Wireless-N Home Router Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this ...local area network. The transmission capacity of a wireless network. Boot - An always-on the World Wide Web. A method used to the Internet. Access Point - Bit - To start a device and cause it to look at http://www.linksys.com/glossary. A device that allows administrators ...
User Guide
Page 77
... simultaneously. Download - Dynamic IP Address - A general authentication protocol used to a wired network via an access point. Many specific authentication methods work within this framework. IEEE standard network protocol that interconnects networks with different, incompatible... on and retrieved from the Internet. IP (Internet Protocol) - A protocol used to connect to transfer files over a network. Wireless-N Home Router DMZ (Demilitarized Zone) - A temporary IP address assigned by a DHCP server. Gateway - EAP (Extensible Authentication Protocol) - FTP...
... simultaneously. Download - Dynamic IP Address - A general authentication protocol used to a wired network via an access point. Many specific authentication methods work within this framework. IEEE standard network protocol that interconnects networks with different, incompatible... on and retrieved from the Internet. IP (Internet Protocol) - A protocol used to connect to transfer files over a network. Wireless-N Home Router DMZ (Demilitarized Zone) - A temporary IP address assigned by a DHCP server. Gateway - EAP (Extensible Authentication Protocol) - FTP...
User Guide
Page 78
Wireless-N Home Router IP Address - A VPN protocol used to implement secure ...In User Service) - IPSec (Internet Protocol Security) - ISP (Internet Service Provider) - The unique address that provides access to -Point Tunneling Protocol) - Network - A unit of broadband connection in cables or adapters. Ping (Packet INternet Groper) - ...of data sent over Ethernet (PoE) - A technology enabling an Ethernet network cable to a different IP address for Linksys products. A VPN protocol that uses an authentication server to be tunneled through an IP network. POP3 (Post Office Protocol...
Wireless-N Home Router IP Address - A VPN protocol used to implement secure ...In User Service) - IPSec (Internet Protocol Security) - ISP (Internet Service Provider) - The unique address that provides access to -Point Tunneling Protocol) - Network - A unit of broadband connection in cables or adapters. Ping (Packet INternet Groper) - ...of data sent over Ethernet (PoE) - A technology enabling an Ethernet network cable to a different IP address for Linksys products. A VPN protocol that uses an authentication server to be tunneled through an IP network. POP3 (Post Office Protocol...
User Guide
Page 79
...Protocol) - A technology that connects computing devices to host computers, allowing a large number of data moved successfully from one access point's range to another without losing the connection. Forwarding data in a network is connected to eight wires. TFTP (Trivial File... making, breaking, or changing the connections in a given time period. The amount of devices to communicate over a network. Switch - 1. Wireless-N Home Router RJ-45 (Registered Jack-45) - Appendix F: Glossary 73 A device for transmitting data that has no directory or password capability. The ability...
...Protocol) - A technology that connects computing devices to host computers, allowing a large number of data moved successfully from one access point's range to another without losing the connection. Forwarding data in a network is connected to eight wires. TFTP (Trivial File... making, breaking, or changing the connections in a given time period. The amount of devices to communicate over a network. Switch - 1. Wireless-N Home Router RJ-45 (Registered Jack-45) - Appendix F: Glossary 73 A device for transmitting data that has no directory or password capability. The ability...