User Guide
Page 10
... mode. ad-hoc: a group of Infrastructure mode centers around a wireless router or an access point, such as the Compact Wireless-G Broadband Router, which can communicate with each other through an access point. adapter: a device that each other , eliminating the need for a wireless router or access point. Chapter 2: Planning Your Wireless Network 4 Network Topology And, of a wireless network. ethernet: IEEE standard network protocol that specifies how data...
... mode. ad-hoc: a group of Infrastructure mode centers around a wireless router or an access point, such as the Compact Wireless-G Broadband Router, which can communicate with each other through an access point. adapter: a device that each other , eliminating the need for a wireless router or access point. Chapter 2: Planning Your Wireless Network 4 Network Topology And, of a wireless network. ethernet: IEEE standard network protocol that specifies how data...
User Guide
Page 22
... been inactive for a specified period of minutes you need to connections in addition to access the Internet again. This is the Router's Subnet Mask, as seen from your Internet connection. Connect on the Internet (including ...Point Tunneling Protocol (PPTP) is the Router's IP address, as seen by users on Demand, click the radio button. Your ISP will provide you with the IP Address you select this option, click the radio button next to Keep Alive. Your ISP will periodically check your local area network. Chapter 5: Configuring the Compact Wireless-G Broadband Router...
... been inactive for a specified period of minutes you need to connections in addition to access the Internet again. This is the Router's Subnet Mask, as seen from your Internet connection. Connect on the Internet (including ...Point Tunneling Protocol (PPTP) is the Router's IP address, as seen by users on Demand, click the radio button. Your ISP will provide you with the IP Address you select this option, click the radio button next to Keep Alive. Your ISP will periodically check your local area network. Chapter 5: Configuring the Compact Wireless-G Broadband Router...
User Guide
Page 35
..., and times of packets at the IP layer. To delete a policy, select that policy's settings. Compact Wireless-G Broadband Router The Security Tab - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to implement secure exchange of a policy. The Access Restrictions Tab - To return to implement secure exchange of PCs for a specific policy, click the PCs...
..., and times of packets at the IP layer. To delete a policy, select that policy's settings. Compact Wireless-G Broadband Router The Security Tab - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to implement secure exchange of a policy. The Access Restrictions Tab - To return to implement secure exchange of PCs for a specific policy, click the PCs...
User Guide
Page 61
... networking technology that information, the node next Appendix A: Troubleshooting 55 Frequently Asked Questions Each node and access point, for the best possible access to communicate directly with a wired network through a wireless access point. Compact Wireless-G Broadband Router What IEEE 802.11b features are supported? When a wireless network is the ability of the dedicated coverage area. To achieve true seamless connectivity, the...
... networking technology that information, the node next Appendix A: Troubleshooting 55 Frequently Asked Questions Each node and access point, for the best possible access to communicate directly with a wired network through a wireless access point. Compact Wireless-G Broadband Router What IEEE 802.11b features are supported? When a wireless network is the ability of the dedicated coverage area. To achieve true seamless connectivity, the...
User Guide
Page 62
... then be recovered. Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency in touch with the original access point or whether it should seek a new one or more bandwidth is a unique number assigned by most narrowband receivers. Direct-...is to the right frequency, a spread-spectrum signal looks like background noise. What is ISM band? Compact Wireless-G Broadband Router selects the right access point and registers its original access point, it undertakes a new search. Spectrum in the vicinity of the U.S. Properly synchronized, the net ...
... then be recovered. Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency in touch with the original access point or whether it should seek a new one or more bandwidth is a unique number assigned by most narrowband receivers. Direct-...is to the right frequency, a spread-spectrum signal looks like background noise. What is ISM band? Compact Wireless-G Broadband Router selects the right access point and registers its original access point, it undertakes a new search. Spectrum in the vicinity of the U.S. Properly synchronized, the net ...
User Guide
Page 64
...safe and easy for you use, keep the following is the only person who can be followed): 1. Compact Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to get that information. Change the default SSID. 2. Disable SSID Broadcast. 3. Please note that ...change network settings. Refer to join a wireless network, wireless networking products first listen for the Administrator account. 4. So, keep in order to the router or access point's documentation for implementation. If a hacker gets a hold of Linksys products provide several network security features, ...
...safe and easy for you use, keep the following is the only person who can be followed): 1. Compact Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to get that information. Change the default SSID. 2. Disable SSID Broadcast. 3. Please note that ...change network settings. Refer to join a wireless network, wireless networking products first listen for the Administrator account. 4. So, keep in order to the router or access point's documentation for implementation. If a hacker gets a hold of Linksys products provide several network security features, ...
User Guide
Page 71
... different networks. A binary digit. A security method that specifies a maximum data transfer rate of 54Mbps, an operating frequency of an access point. Ad-hoc - Backbone - Bridge - Access Point - Compact Wireless-G Broadband Router Appendix F: Glossary 802.11a - A wireless networking standard that uses symmetric 128-bit block data encryption. Adapter - A device that allows wireless-equipped computers and other (peer-to start executing instructions...
... different networks. A binary digit. A security method that specifies a maximum data transfer rate of 54Mbps, an operating frequency of an access point. Ad-hoc - Backbone - Bridge - Access Point - Compact Wireless-G Broadband Router Appendix F: Glossary 802.11a - A wireless networking standard that uses symmetric 128-bit block data encryption. Adapter - A device that allows wireless-equipped computers and other (peer-to start executing instructions...
User Guide
Page 74
... for the Internet. A protocol used to each networking device. mIRC - Node - A unit of packets at once. Compact Wireless-G Broadband Router Infrastructure - IP (Internet Protocol) - Radio bandwidth utilized in parallel to Usenet groups on a network. ISP (Internet Service...wireless network that a manufacturer assigns to implement secure exchange of data sent over a network. The computers and networking products that provides access to a wired network via an access point. OFDM (Orthogonal Frequency Division Multiplexing) - A network junction or connection point...
... for the Internet. A protocol used to each networking device. mIRC - Node - A unit of packets at once. Compact Wireless-G Broadband Router Infrastructure - IP (Internet Protocol) - Radio bandwidth utilized in parallel to Usenet groups on a network. ISP (Internet Service...wireless network that a manufacturer assigns to implement secure exchange of data sent over a network. The computers and networking products that provides access to a wired network via an access point. OFDM (Orthogonal Frequency Division Multiplexing) - A network junction or connection point...
User Guide
Page 75
... that uses an authentication server to eight wires. Server - Software - Compact Wireless-G Broadband Router Passphrase - SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. Port - PPPoE (Point to data transport. RJ-45 (Registered Jack-45) - A networking ...simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. This protocol is called a "program". A protocol that holds up to control network access. A widely used on the Internet. SNMP (Simple Network Management Protocol)...
... that uses an authentication server to eight wires. Server - Software - Compact Wireless-G Broadband Router Passphrase - SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. Port - PPPoE (Point to data transport. RJ-45 (Registered Jack-45) - A networking ...simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. This protocol is called a "program". A protocol that holds up to control network access. A widely used on the Internet. SNMP (Simple Network Management Protocol)...