13
Encryption
This provides wireless data transmissions with a level of security. This option
allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains
10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26
hexadecimal digits or 13 ASCII characters.
64-bit and 40-bit WEP keys use the same encryption method and can
interoperate on wireless networks. This lower level of WEP encryption uses
a 40-bit (10 hexadecimal digits assigned by the user) secret key and a 24-bit
Initialization Vector assigned by the device. 104-bit and 128-bit WEP keys use
the same encryption method.
All wireless clients in a network must have identical WEP keys with the access
point to establish connection. Keep a record of the WEP encryption keys.
Extended Service Set (ESS)
A set of one or more interconnected basic service set (BSSs) and integrated
local area networks (LANs) can be configured as an Extended Service Set.
ESSID (Extended Service Set Identifier)
You must have the same ESSID entered into the gateway and each of its
wireless clients. The ESSID is a unique identifier for your wireless network.
Ethernet
The most widely used LAN access method, which is defined by the IEEE 802.3
standard. Ethernet is normally a shared media LAN meaning all devices on the
network segment share total bandwidth. Ethernet networks operate at 10Mbps
using CSMA/CD to run over 10-BaseT cables.
Firewall
A firewall determines which information passes in and out of a network. NAT
can create a natural firewall by hiding a local network’s IP addresses from the
Internet. A Firewall prevents anyone outside of your network from accessing
your computer and possibly damaging or viewing your files.
Gateway
A network point that manages all the data traffic of your network, as well as to
the Internet and connects one network to another.
ICS
ICS is used to share one computer’s Internet connection with the rest of the
computers on your network. When this computer is connected to the Internet,
all the communications to and from the Internet on your network are sent
through this computer which is called the host computer. The rest of the
computers can send and receive e-mail messages and access the web as if it
were connected directly to the Internet.
Summary of Contents for USB-AC51
Page 1: ...User Manual USB N14 Dual band Wireless AC600 USB Adapter ...
Page 26: ...26 ...