Napco Security Systems Inc ALNET1 ユーザーズマニュアル
Trilogy Networx™ Wireless Setup & DL-Windows Configuration Instructions 7
Te r m i n o l o g y
access to the virtual locks by the various Users in the Ac-
count.
count.
Real - Same as "Physical". Tangible, not virtual. See Virtual.
Subnet (SUBNETwork) - To improve security and processing
performance, network administrators often divide their
corporate Intranets into interconnected but separate seg-
ments called "subnets". Subnets also allow multiple us-
ers to access the Intranet with the same subnet address.
A router is typically used to allow network traffic to pass
between subnets.
corporate Intranets into interconnected but separate seg-
ments called "subnets". Subnets also allow multiple us-
ers to access the Intranet with the same subnet address.
A router is typically used to allow network traffic to pass
between subnets.
Subnet Mask - The IP protocol makes use of a Subnet
Mask to more efficiently route packets to their correct
network destinations. When a Gateway receives a data
packet, the Subnet Mask indicates how many bits of the
packet's destination address are to be used for routing
and which bits are to be "masked" (ignored). The Sub-
net Mask can be thought of as a "filter" that allows the
system to ignore unnecessary information, thus increas-
ing efficiency. This information must be obtained from
your network administrator.
network destinations. When a Gateway receives a data
packet, the Subnet Mask indicates how many bits of the
packet's destination address are to be used for routing
and which bits are to be "masked" (ignored). The Sub-
net Mask can be thought of as a "filter" that allows the
system to ignore unnecessary information, thus increas-
ing efficiency. This information must be obtained from
your network administrator.
Upload - See Communicate.
Virtual - Simulated on a computer. DL-Windows allows you to
create a lock "Profile" that can be thought of as a "virtual"
lock, created within DL-Windows, that contains all of the
data that a "real" (physical) lock uses to perform its various
functions. When creating these "virtual" lock Profiles, you
are also designing the entire "virtual" system--
conceptualizing which doors will have which locks, adding
User Names and allowing or restricting access to the virtual
locks by the various Users in the Account. Later, you will
"Link" these lock Profiles with the real locks installed on the
lock, created within DL-Windows, that contains all of the
data that a "real" (physical) lock uses to perform its various
functions. When creating these "virtual" lock Profiles, you
are also designing the entire "virtual" system--
conceptualizing which doors will have which locks, adding
User Names and allowing or restricting access to the virtual
locks by the various Users in the Account. Later, you will
"Link" these lock Profiles with the real locks installed on the
doors.