User manual TRENDNET TEW-611BRP

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual TRENDNET TEW-611BRP. We hope that this TRENDNET TEW-611BRP user guide will be useful to you.


TRENDNET TEW-611BRP : Download the complete user guide (3950 Ko)

You may also download the following manuals related to this product:

   TRENDNET TEW-611BRP DATA SHEET (588 ko)
   TRENDNET TEW-611BRP DATA SHEET (577 ko)
   TRENDNET TEW-611BRP DATA SHEET (567 ko)
   TRENDNET TEW-611BRP DATA SHEET (566 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (1304 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (4613 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (2379 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (2356 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (2357 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (2358 ko)
   TRENDNET TEW-611BRP DATA SHEET (573 ko)
   TRENDNET TEW-611BRP QUICK INSTALLATION GUIDE (2355 ko)

Manual abstract: user guide TRENDNET TEW-611BRP

Detailed instructions for use are in the User's Guide.

[. . . ] 1 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. [. . . ] Measured Uplink Speed This is the uplink speed measured when the WAN interface was last re-established. The value may be lower than that reported by your ISP as it does not include all of the network protocol overheads associated with your ISP's network. Typically, this figure will be between 87% and 91% of the stated uplink speed for xDSL connections and around 5 kbps lower for cable network connections. Uplink Speed If Automatic Uplink Speed is disabled, this options allows you to set the uplink speed manually. Uplink speed is the speed at which data can be transferred from the router to your ISP. ISPs often specify speed as a downlink/uplink pair; for example, 1. 5Mbits/284Kbits. Alternatively you can test your uplink speed with a service such as www. dslreports. com. Note however that sites such as DSL Reports, because they do not consider as many network protocol overheads, will generally note speeds slightly lower than the Measured Uplink Speed or the ISP rated speed. Connection Type By default, the router automatically determines whether the underlying connection is an xDSL/Frame-relay network or some other connection type (such as cable modem or Ethernet), and it displays the result as Detected xDSL or Frame Relay Network. If you have an unusual network connection in which you are actually connected via xDSL but for which you configure either "Static" or "DHCP" in the WAN settings, setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize that it needs to shape traffic slightly differently in order to give the best performance. Choosing xDSL or Other Frame Relay Network causes the measured uplink speed to be reported slightly lower than before on such connections, but gives much better results. Detected xDSL or Frame Relay Network When Connection Type is set to Auto-detect, the automatically detected connection type is 33 displayed here. Add/Edit Traffic Shaping Rule Automatic classification will be adequate for most applications, and specific Traffic Shaping Rules will not be required. A Traffic Shaping Rule identifies a specific message flow and assigns a priority to that flow. Enable Each entry in Traffic Shaping Rules List can be active (enabled) or inactive (disabled) Name Create a name for the rule that is meaningful to you. 0 receives the highest priority (most urgent) and 255 receives the lowest priority (least urgent). Source IP Range The rule applies to a flow of messages whose LAN-side IP address falls within the range set here. Source Port Range The rule applies to a flow of messages whose LAN-side port number is within the range set here. Destination IP Range The rule applies to a flow of messages whose WAN-side IP address falls within the range set here. Destination Port Range The rule applies to a flow of messages whose WAN-side port number is within the range set here. Save Saves the new or edited Traffic Shaping Rule in the following list. When finished updating the Traffic Shaping rules, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. [. . . ] PPP Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like a phone line PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage. Rendezvous Apple's version of UPnP, which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it's coverage RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones 76 RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol. A standard protocol for initiating a user session that involves multimedia content, such as voice or chat. SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office/Home Office SPI Stateful Packet Inspection SSH 77 Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a distributed logging interface for collecting in one place the logs from different sources. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE TRENDNET TEW-611BRP




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual TRENDNET TEW-611BRP will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.