Home > SMC Networks > Router > SMC Networks Router SMCWBR14-N User Manual

SMC Networks Router SMCWBR14-N User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual SMC Networks Router SMCWBR14-N User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10 SMC Networks manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							78 
    Status_Statistics 
    The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. 
     
     
    Sent  
    The number of packets sent from the router.   
    Received  
    The number of packets received by the router.   
    TX Packets Dropped   
    The number of packets that were dropped while being sent, due to errors, collisions, or router 
    resource limitations.   
    RX Packets Dropped   
    The number of packets that were dropped while being received, due to errors, collisions, or 
    router resource limitations.   
    Collisions  
    The number of packets that were dropped due to Ethernet collisions (two or more devices 
    attempting to use an Ethernet circuit at the same time).   
     
    Errors  
    The number of transmission failures that cause loss of a packet. A noisy radio-frequency 
    environment can cause a high error rate on the wireless LAN.    
    						
    							79 
    Status_Active Sessions 
    The Active Sessions page displays full details of active sessions through your router. A session is a 
    conversation between a progam or application on a LAN-side computer and a program or application 
    on a WAN-side computer. 
     
     
    Internal  
    The IP address and port number of the LAN-side application.   
    Protocol  
    The communications protocol used for the conversation.   
    External  
    The IP address and port number of the WAN-side application.   
    NAT  
    The port number of the LAN-side application as viewed by the WAN-side application.   
    Priority  
    The preference given to outbound packets of this conversation by the StreamEngine logic. 
    Smaller numbers represent higher priority.   
    State  
    State for sessions that use the TCP protocol.   
    • NO: None -- This entry is used as a placeholder for a future connection that may occur.    
    						
    							80 
    • SS: SYN Sent -- One of the systems is attempting to start a connection.   
    • EST: Established -- the connection is passing data.   
    • FW: FIN Wait -- The client system has requested that the connection be stopped.   
    • CW: Close Wait -- the server system has requested that the connection be stopped.   
    • TW: Time Wait -- Waiting for a short time while a connection that was in FIN Wait is 
    fully closed.   
    • LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is 
    fully closed.   
    • CL: Closed -- The connection is no longer active but the session is being tracked in 
    case there are any retransmitted packets still pending.   
    Dir  
    The direction of initiation of the conversation:   
    Out  
    Initiated from LAN to WAN.   
    In  
    Initiated from WAN to LAN.   
    Time Out   
    The number of seconds of idle time until the router considers the session terminated. The initial 
    value of Time Out depends on the type and state of the connection.   
    300 seconds   
    UDP connections.   
    20 seconds   
    Reset or closed TCP connections. The connection does not close instantly so that 
    lingering packets can pass or the connection can be re-established.   
    120 seconds   
    Opening or closing TCP connections.   
    7800 seconds   
    Established TCP connections.   
     
    Status_WISH Sessions 
    The WISH Sessions page displays full details of active local wireless sessions through your router 
    when WISH has been enabled. A WISH session is a conversation between a program or application 
    on a wirelessly connected LAN-side computer and another computer, however connected.
       
    						
    							81 
     
     
    Originator 
    The IP address and, where appropriate, port number of the computer that originated a network 
    connection.  
    Target 
    The IP address and, where appropriate, port number of the computer to which a network 
    connection has been made.   
    Protocol 
    The communications protocol used for the conversation.   
    State 
    State for sessions that use the TCP protocol.   
    • NO: None -- This entry is used as a placeholder for a future connection that may occur. 
    • SS: SYN Sent -- One of the systems is attempting to start a connection. 
    • EST: Established -- the connection is passing data. 
    • FW: FIN Wait -- The client system has requested that the connection be stopped. 
    • CW: Close Wait -- the server system has requested that the connection be stopped. 
    • TW: Time Wait -- Waiting for a short time while a connection that was in FIN Wait is fully 
    closed. 
    • LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully 
    closed. 
    • CL: Closed -- The connection is no longer active but the session is being tracked in case 
    there are any retransmitted packets still pending. 
      
    						
    							82 
    Priority 
    The priority given to packets sent wirelessly over this conversation by the WISH logic. The 
    priorities are:   
    • BK: Background (least urgent). 
    • BE: Best Effort. 
    • VI: Video. 
    • VO: Voice (most urgent). 
    Time Out 
    The number of seconds of idle time until the router considers the session terminated. The initial 
    value of Time Out depends on the type and state of the connection.   
    300 seconds 
    UDP connections. 
    240 seconds 
    Reset or closed TCP connections. The connection does not close instantly so that 
    lingering packets can pass or the connection can be re-established. 
    7800 seconds 
    Established or closing TCP connections. 
    .   
    						
    							83 
    Glossary 
    A 
    Access Control List   
    ACL. This is a database of network devices that are allowed to access resources on the 
    network.  
    Access Point   
    AP. Device that allows wireless clients to connect to it and access the network   
    ActiveX  
    A Microsoft specification for the interaction of software components.   
    Ad-hoc network   
    Peer-to-Peer network between wireless clients   
    Address Resolution Protocol   
    ARP. Used to map MAC addresses to IP addresses so that conversions can be made in both 
    directions.  
    ADSL  
    Asymmetric Digital Subscriber Line   
    Advanced Encryption Standard   
    AES. Government encryption standard   
    Alphanumeric  
    Characters A-Z and 0-9   
    Antenna  
    Used to transmit and receive RF signals.   
    AppleTalk  
    A set of Local Area Network protocols developed by Apple for their computer systems   
    AppleTalk Address Resolution Protocol   
    AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network 
    addresses, so that conversions can be made in both directions.   
    Application layer   
    7th Layer of the OSI model. Provides services to applications to ensure that they can 
    communicate properly with other applications on a network.   
    ASCII   
    						
    							84 
    American Standard Code for Information Interchange. This system of characters is most 
    commonly used for text files   
    Attenuation  
    The loss in strength of digital and analog signals. The loss is greater when the signal is being 
    transmitted over long distances.   
    Authentication  
    To provide credentials, like a Password, in order to verify that the person or device is really 
    who they are claiming to be   
    Automatic Private IP Addressing   
    APIPA. An IP address that that a Windows computer will assign itself when it is configured to 
    obtain an IP address automatically but no DHCP server is available on the network   
    B 
    Backward Compatible   
    The ability for new devices to communicate and interact with older legacy devices to guarantee 
    interoperability  
    Bandwidth  
    The maximum amount of bytes or bits per second that can be transmitted to and from a 
    network device   
    Basic Input/Output System   
    BIOS. A program that the processor of a computer uses to startup the system once it is turned 
    on  
    Baud  
    Data transmission speed   
    Beacon  
    A data frame by which one of the stations in a Wi-Fi network periodically broadcasts network 
    control data to other wireless stations.   
    Bit rate   
    The amount of bits that pass in given amount of time   
    Bit/sec  
    Bits per second   
    BOOTP  
    Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user 
    intervention  
    Bottleneck   
    						
    							85 
    A time during processes when something causes the process to slowdown or stop all together   
    Broadband  
    A wide band of frequencies available for transmitting data   
    Broadcast  
    Transmitting data in all directions at once   
    Browser  
    A program that allows you to access resources on the web and provides them to you 
    graphically  
    C 
    Cable modem   
    A device that allows you to connect a computer up to a coaxial cable and receive Internet 
    access from your Cable provider   
    CardBus  
    A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and 
    consumes less voltage   
    CAT 5   
    Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections   
    Client  
    A program or user that requests data from a server   
    Collision  
    When do two devices on the same Ethernet network try and transmit data at the exact same 
    time.  
    Cookie  
    Information that is stored on the hard drive of your computer that holds your preferences to the 
    site that gave your computer the cookie   
    D 
    Data  
    Information that has been translated into binary so that it can be processed or moved to 
    another device   
    Data Encryption Standard   
    Uses a randomly selected 56-bit key that must be known by both the sender and the receiver 
    when information is exchanged   
    Data-Link layer    
    						
    							86 
    The second layer of the OSI model. Controls the movement of data on the physical link of a 
    network  
    Database  
    Organizes information so that it can be managed updated, as well as easily accessed by users 
    or applications.   
    DB-25  
    A 25 ping male connector for attaching External modems or RS-232 serial devices   
    DB-9  
    A 9 pin connector for RS-232 connections   
    dBd  
    Decibels related to dipole antenna   
    dBi  
    Decibels relative to isotropic radiator   
    dBm  
    Decibels relative to one milliwatt   
    Decrypt  
    To unscramble an encrypted message back into plain text   
    Default  
    A predetermined value or setting that is used by a program when no user input has been 
    entered for this value or setting   
    Demilitarized zone   
    DMZ: A single computer or group of computers that can be accessed by both users on the 
    Internet as well as users on the Local Network, but that is not protected by the same security 
    as the Local Network.   
    DHCP  
    Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a 
    predefined pool of addresses to computers or devices that request them   
    Digital certificate:   
    An electronic method of providing credentials to a server in order to have access to it or a 
    network  
    Direct Sequence Spread Spectrum   
    DSSS: Modulation technique used by 802.11b wireless devices   
    DMZ   
    						
    							87 
    Demilitarized Zone. A computer that logically sits in a no-mans land between the LAN and 
    the WAN. The DMZ computer trades some of the protection of the routers security 
    mechanisms for the convenience of being directly addressable from the Internet.   
    DNS  
    Domain Name System: Translates Domain Names to IP addresses   
    Domain name   
    A name that is associated with an IP address   
    Download  
    To send a request from one computer to another and have the file transmitted back to the 
    requesting computer   
    DSL  
    Digital Subscriber Line. High bandwidth Internet connection over telephone lines   
    Duplex  
    Sending and Receiving data transmissions at the sane time   
    Dynamic DNS service   
    Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a 
    Domain Name that will always by linked to their changing IP address. The IP address is 
    updated by either client software running on a computer or by a router that supports Dynamic 
    DNS, whenever the IP address changes   
    Dynamic IP address   
    IP address that is assigned by a DHCP server and that may change. Cable Internet providers 
    usually use this method to assign IP addresses to their customers.   
    E 
    EAP  
    Extensible Authentication Protocol   
    Email  
    Electronic Mail is a computer-stored message that is transmitted over the Internet   
    Encryption  
    Converting data into cyphertext so that it cannot be easily read   
    Ethernet  
    The most widely used technology for Local Area Networks.   
    F 
    Fiber optic    
    						
    All SMC Networks manuals Comments (0)

    Related Manuals for SMC Networks Router SMCWBR14-N User Manual