GIGA-BYTE TECHNOLOGY CO. LTD. GN-BR32V-RH Manual Do Utilizador

Página de 91
GN-BR32V-RH 2.4GHz AirCruiser Ultra N Wireless Router 
 
72 
Appendix E 
Glossary
 
 
ADSL
 
Asymmetric digital subscriber line (ADSL) is a new modem technology that 
converts existing twisted-pair telephone lines into access paths for high-speed 
communication of various sorts.
 
 
Auto-MDI/MDIX
 
On a network hub or switch, an auto-MDI/MDIX port automatically senses if it 
needs to act as a MDI or MDIX port. The auto- MDI/MDIX capability eliminates 
the need for crossover cables. 
 
Auto-negotiate
 
To automatically determine the correct setting. The term is often used with 
communications and networking 
 
DHCP
 
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for 
automating the configuration of computers that use TCP/IP. DHCP can be used 
to automatically assign IP addresses, to deliver TCP/IP stack configuration 
parameters such as the subnet mask and default router, and to provide other 
configuration information such as the addresses for printer, time and news 
servers. 
 
DMZ
 
In computer networks, a DMZ (demilitarized zone) is a computer host or small 
network inserted as a "neutral zone" between a company's private network and 
the outside public network. It prevents outside users from getting direct access 
to a server that stores company data. Typically, the DMZ contains devices 
accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP 
(e-mail) servers and DNS servers.
 
 
DNS
 
The Domain Name System (DNS) is a distributed Internet directory service. 
DNS is used mostly to translate between domain names and IP addresses, and 
to control Internet email delivery. Most Internet services rely on DNS to work. If 
DNS fails, web sites cannot be located and email delivery service will be 
suspended.
 
 
Dynamic IP Address
 
An IP address is automatically assigned to a user’s AP in a TCP/IP network 
typically by a DHCP server.
 
 
Firewall
 
A system designed to prevent unauthorized access to or from a private network. 
Firewalls can be implemented in both hardware and software, or a combination