Acer AT3705 Panduan Pengguna - Halaman 20

Jelajahi secara online atau unduh pdf Panduan Pengguna untuk TV LCD Acer AT3705. Acer AT3705 20 halaman. Acer at3705: user manual

Networking glossary

802.11b/g:
Wireless networking standards that support data encryption
and data transfer rates of 11 and 54 megabytes per second
(Mb/s), respectively. 802.11g is backwards-compatible with
the 802.11b standard.
Ad hoc wireless network:
A network where two PCs communicate on a peer-to-peer
basis, without an access point or router.
DHCP (Dynamic Host Configuration Protocol):
Used by network devices to automatically obtain network
address information (IP address, subnet mask, gateway,
and DNS address.) Any PC with Internet Connection Sharing
Software running can act as a DHCP server; alternatively you
can use a router or an ISP server. If your network does not
have a DHCP enabled device, then you will need to assign an
IP address for your Acer LDC TV.
DNS (Domain Name System):
A system used by DNS servers to translate computer names
into IP addresses. For example, www.acer.com translates into
211.79.203.2
Ethernet:
A commonly used wired network technology, ranging in
speed from 10 up to 1000 Mb/s.
Gateway:
The gateway is the IP address of a device, such as a router,
that connects you to another network. The router acts as the
gateway between your Local Area Network (LAN) and the
Internet.
Access point wireless network:
A network that uses a router, hub or an access point.
IP address (Internet Protocol address):
An IP address consists of four groups of digits separated by
periods. Each group of digits contains an 8-bit value as a
number ranging from 0 to 255. Each computer must have
its own unique IP address. The IP addresses on your network
must be within the same range and must be sequential.
For example, if one device has an IP address of 192.168.1.2,
the IP addresses for the other devices in the network should
be 192.168.1.3 and 192.168.1.4.
Encryption key:
Encryption keys allow you to easily change wireless
encryption settings to maintain a secure network. The MGW
supports 64-bit and 128-bit keys.
Netmask:
Also known as a subnet mask, this is used to determine which
subnet an IP address belongs to.
SSID (Service Set Identifier):
Each Wireless Local Area Network (WLAN) has a designated
SSID. This can easily be changed to connect to an existing
wireless network.
Static IP:
As opposed to an automatically configured IP address, a static
IP address is configured manually. A static IP address must be
unique and remains the same.
WEP (Wired Equivalent Privacy):
A security protocol that provides the equivalent level of
wired security for wireless local area networks (WLAN). WEP
encrypts data sent through WLANs.
20

Network encryption

WEP (Wired Equivalent Privacy): An industry-standard
wireless device encryption technology. When using WEP, it is
important to determine the level of encryption.
The type of encryption determines the key length. 128-bit
encryption uses a longer key than 64-bit encryption.
Keys are defined by entering a string in either HEX
(hexadecimal - using characters 0-9, A-F) or ASCII (American
Standard Code for Information Interchange – alphanumeric
characters) formats.
ASCII format is designed to make strings that are easier to
remember. The ASCII string is converted to HEX for use. Up to
four keys can be defined to make key changes easy. A default
key is selected for use on the network.
There are five options configurable under the configuration
setting: Disable, 64-bit HEX, 128-bit HEX, 64-bit ASCII, and
128-bit ASCII.
Key Index: Select a number between 1 and 4.
Key: To connect to an encrypted wireless device, the key you
enter must match the device key exactly.
Key Types and Examples:
64-bit HEX: Keys are 10 characters in length.
Example: 01234567RH is a valid string of 10 characters for
64-bit encryption.
128-bit HEX: Keys are 26 characters in length.
Example: 789ABCDE123444100005271730 is a valid string of
26 characters for 128-bit encryption.
64-bit ASCII: Keys are 5 characters in length.
Example: ACERG is a valid string of 5 characters for 64-bit
encryption.
128-bit ASCII: Keys are 13 characters in length.
Example: 2005GALEDWIN9 is a valid string of 13 characters
for 128-bit encryption.