Toshiba IK-WB11A User Manual
Page 97
Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

DC IN(Power input terminal) .BUG15
DDNS............................................. 78
(Dynamic Domain Name System)
This is the technique to overwrite
the information of DNS(Domain
Name System)server dynamically
and forward only different
informations between DNS servers.
Because of this, it enables to
reduce forwarding data which are
needed to renew information of
DNS server, and reduce overhead
of the network. If this combines
with DHCP (Dynamic Host
Configuration Protocol), it is
possible to assign IP address and
host name right away as the host
on the LAN changes.
Default gateway..............................45
Network devices cannot
communicate directly with devices
in other networks. In this case,
communication becomes possible
by using devices like router.
Generally, when communicating
with other networks, you set the
sending destination to that router.
DHCP..............................................43
(Dynamic Host Configuration
Protocol)
This is the protocol to assign IP
address dynamically to each client
on TCP/IP network. DHCP server
controls information of IP address,
gateway address, domain name
and subnet mask and can assign
these to client.
DNS................................................ 75
(Domain Name System)
IP address is composed of list of
numbers, and is hard to manage.
Thus we use domain name which
consists of alphabet and some
symbols as alias to operate
computers. This system, to
correspond the IP address and the
domain name, is called DNS.
Download........................................89
Taking and saving data from a device
in remote place by using network.
Encryption(WEP)............................48
Adopted encryption method by
IEEE802.1 1b as standard
technique. There are 2 methods
using 64-bit and 128-bit data.
ESS-ID........................................... 47
(Extended Service Set Identifier)
This is the ID to discriminate all PC
and wireless routers which make up
the wireless LAN. You need to set
the same ESS-ID to all the devices
on the same network.
Ethernet............................BUG14, 15
LAN communication method
developed by Xerox and other
companies.
External Alarm................................46
Filtering Settings............................ 79
Firmware........................................ 89
Program to run this product. It is
installed in the flash memory, and
can overwrite the program from PC
by using PC upload function of the
WEB.
Frame rate......................................70
Barometer for renewing displayed
images per second.
Freeze activity................................
66
F-value........................................ 116
The value to indicate brightness.
The smaller the value, the light is
brighter.
m
0
)
Hub................................................. 43
Wire gathering device used
in10Base-T/100Base-TX network.
Build up a network by connecting
devices around a hub radially. There
are various ports, like
8
port, 4port.