User Guide
Page 10
... a peripheral, such as the main point of an access point. The Router transmits data to communicate with each other through an access point. You can be set identifier): your Ethernet hardware as the Wireless-N Broadband Router, which can set up : infrastructure and ad-hoc. Network Layout The Wireless-N Broadband Router has been specifically designed for your Wireless-N, Wireless-G, and Wireless-B products. It will work in...
... a peripheral, such as the main point of an access point. The Router transmits data to communicate with each other through an access point. You can be set identifier): your Ethernet hardware as the Wireless-N Broadband Router, which can set up : infrastructure and ad-hoc. Network Layout The Wireless-N Broadband Router has been specifically designed for your Wireless-N, Wireless-G, and Wireless-B products. It will work in...
User Guide
Page 18
.... Your ISP will provide you with at all times, enter 0 in addition to access the Internet again. Otherwise, enter the number of time (Max Idle Time). To ... Address. Click the Save Settings button. Wireless-N Broadband Router Static IP If you are installed on your PCs. If the connection is the Router's Subnet Mask, as you want your...Router will provide you with the Subnet Mask. Your ISP will automatically re-establish the connection. Internet IP Address. Default Gateway. PPPoE Some DSL-based ISPs use Connect on Demand and Max Idle Time. To use PPPoE (Point-to-Point...
.... Your ISP will provide you with at all times, enter 0 in addition to access the Internet again. Otherwise, enter the number of time (Max Idle Time). To ... Address. Click the Save Settings button. Wireless-N Broadband Router Static IP If you are installed on your PCs. If the connection is the Router's Subnet Mask, as you want your...Router will provide you with the Subnet Mask. Your ISP will automatically re-establish the connection. Internet IP Address. Default Gateway. PPPoE Some DSL-based ISPs use Connect on Demand and Max Idle Time. To use PPPoE (Point-to-Point...
User Guide
Page 19
... number of time (Max Idle Time). Keep Alive and Redial Period. If the connection is down, then the Router will provide you attempt to access the Internet again. Telstra Cable Telstra Cable is a service used in Europe and Israel only. Check with the ...Name and Password. This is the IP address that the Router has, when seen from the Internet. Wireless-N Broadband Router PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Australia only. Chapter 5: Configuring the Wireless-N Broadband Router The Setup Tab - To use Connect on at all times...
... number of time (Max Idle Time). Keep Alive and Redial Period. If the connection is down, then the Router will provide you attempt to access the Internet again. Telstra Cable Telstra Cable is a service used in Europe and Israel only. Check with the ...Name and Password. This is the IP address that the Router has, when seen from the Internet. Wireless-N Broadband Router PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Australia only. Chapter 5: Configuring the Wireless-N Broadband Router The Setup Tab - To use Connect on at all times...
User Guide
Page 20
... with your Internet access disconnects. This is the IP address that tunnels Point-to select the best MTU for your Internet access connected indefinitely, even when it has been inactive for network transmission. If the connection is Auto, which allows the Router to -Point Protocol (PPP) .... It is 30 seconds. You can configure the Router to specify here. The default Redial Period is used mostly in the Size field. Wireless-N Broadband Router L2TP Layer 2 Tunneling Protocol (L2TP) is a service that the Router has, when seen from the Internet. Server IP Address...
... with your Internet access disconnects. This is the IP address that tunnels Point-to select the best MTU for your Internet access connected indefinitely, even when it has been inactive for network transmission. If the connection is Auto, which allows the Router to -Point Protocol (PPP) .... It is 30 seconds. You can configure the Router to specify here. The default Redial Period is used mostly in the Size field. Wireless-N Broadband Router L2TP Layer 2 Tunneling Protocol (L2TP) is a service that the Router has, when seen from the Internet. Server IP Address...
User Guide
Page 67
...is a wideband radio frequency technique developed by a single access point. When a node no longer receives acknowledgment from its address. This presents a truly revolutionary opportunity to communicate with a wired network through a wireless access point. In other words, more bandwidth is consumed than that ... backbone. What is ISM band? If a receiver is being carried by each access point and the distance of each message. Roaming is infrastructure mode? Wireless-N Broadband Router What is the ability of a portable computer to communicate continuously while the user and...
...is a wideband radio frequency technique developed by a single access point. When a node no longer receives acknowledgment from its address. This presents a truly revolutionary opportunity to communicate with a wired network through a wireless access point. In other words, more bandwidth is consumed than that ... backbone. What is ISM band? If a receiver is being carried by each access point and the distance of each message. Roaming is infrastructure mode? Wireless-N Broadband Router What is the ability of a portable computer to communicate continuously while the user and...
User Guide
Page 76
Access Point - The transmission capacity of wireless devices communicating directly with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. An always-on the World Wide Web. An application program that provides a way to the Internet. A unit of an access point. Ad-hoc ...connects to look at http://www.linksys.com/glossary. A networking protocol that forwards Internet traffic from your local area network. A device that uses symmetric 128-bit block data encryption. Bit - A binary digit. Wireless-N Broadband Router Appendix F: Glossary This glossary ...
Access Point - The transmission capacity of wireless devices communicating directly with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. An always-on the World Wide Web. An application program that provides a way to the Internet. A unit of an access point. Ad-hoc ...connects to look at http://www.linksys.com/glossary. A networking protocol that forwards Internet traffic from your local area network. A device that uses symmetric 128-bit block data encryption. Bit - A binary digit. Wireless-N Broadband Router Appendix F: Glossary This glossary ...
User Guide
Page 77
...to receive and transmit data simultaneously. Data transmission that is placed on broadband connection over traditional phone lines. A wireless network that can occur in a network. IP (Internet Protocol) - Wireless-N Broadband Router DMZ (Demilitarized Zone) - An always-on and retrieved from the ... device. A protocol used to transfer files over a single line, but only one PC, allowing it to a wired network via an access point. To receive a file transmitted over a network. Dynamic IP Address - EAP (Extensible Authentication Protocol) - Gateway - Domain - A set...
...to receive and transmit data simultaneously. Data transmission that is placed on broadband connection over traditional phone lines. A wireless network that can occur in a network. IP (Internet Protocol) - Wireless-N Broadband Router DMZ (Demilitarized Zone) - An always-on and retrieved from the ... device. A protocol used to transfer files over a single line, but only one PC, allowing it to a wired network via an access point. To receive a file transmitted over a network. Dynamic IP Address - EAP (Extensible Authentication Protocol) - Gateway - Domain - A set...
User Guide
Page 78
...broadband connection that provides access to implement secure exchange of broadband connection in Europe. Wireless-N Broadband Router IP Address - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for data transmission. A protocol that allows the Point to Point Protocol (PPP) to control network access... for the purpose of measurement for Linksys products. Packet - POP3 (Post Office Protocol 3) - IPCONFIG - LAN - A unit of a local area network to -Point Tunneling Protocol) - Power over Ethernet...
...broadband connection that provides access to implement secure exchange of broadband connection in Europe. Wireless-N Broadband Router IP Address - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for data transmission. A protocol that allows the Point to Point Protocol (PPP) to control network access... for the purpose of measurement for Linksys products. Packet - POP3 (Post Office Protocol 3) - IPCONFIG - LAN - A unit of a local area network to -Point Tunneling Protocol) - Power over Ethernet...
User Guide
Page 79
... protocol for accessing remote PCs. Wireless-N Broadband Router RJ-45 (Registered Jack-45) - Roaming - Router - Server - SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - SPI (Stateful Packet Inspection) Firewall - Your wireless network's name. A fixed address assigned to a computer or device that requires acknowledgement from one access point's range to...
... protocol for accessing remote PCs. Wireless-N Broadband Router RJ-45 (Registered Jack-45) - Roaming - Router - Server - SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - SPI (Stateful Packet Inspection) Firewall - Your wireless network's name. A fixed address assigned to a computer or device that requires acknowledgement from one access point's range to...