User's Manual
Table Of Contents
- Reference Manual for the Model DG834GT 108 Mbps Super Wireless ADSL Router
- Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- What You Need Before You Begin
- Connecting the DG834GT to Your LAN
- Auto-Detecting Your Internet Connection Type
- Testing Your Internet Connection
- Manually Configuring Your Internet Connection
- Chapter 4 Wireless Configuration
- Chapter 5 Protecting Your Network
- Chapter 6 Managing Your Network
- Chapter 7 Advanced Configuration
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network and Routing Basics
- Appendix C Preparing Your Network
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Appendix D Wireless Networking Basics
- Glossary
Glossary -1
August 2004
Glossary
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
802.11b
IEEE specification for wireless networking at 11 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
802.11g
IEEE specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
802.11x
802.1x defines port-based, network access control used to provide
authenticated network access and automated data encryption key
management.
The IEEE 802.1x draft standard offers an effective framework for
authenticating and controlling user traffic to a protected network, as well as
dynamically varying encryption keys. 802.1x uses a protocol called EAP
(Extensible Authentication Protocol) and supports multiple authentication
methods, such as token cards, Kerberos, one-time passwords, certificates, and
public key authentication. For details on EAP specifically, refer to IETF's
RFC 2284.
Access Control List
(ACL)
An ACL is a database that an Operating System uses to track each user’s
access rights to system objects (such as file directories and/or files).
Ad-hoc Mode
An 802.11 networking framework in which devices or stations communicate
directly with each other, without the use of an access point (AP). Ad-hoc
mode is also referred to as peer-to-peer mode or an Independent Basic Service
Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless
infrastructure does not exist or where services are not required.
ADSL
See Asymmetric Digital Subscriber Line
Asymmetric Digital
Subscriber Line
A technology for sending data over regular telephone lines. ADSL allows data
rates up to 8 Mbps downstream and 640 Kbps upstream.