Loading ...
Loading ...
Loading ...
The proxy port is the highway on the network which must be used to connect to the
proxy server.
Range – 0 to 65535
A piece of software running on a
base station or on a server. The devices on the
network ask the proxy server (host) to allow access to certain parts on the Internet.
The request is given via the defined highway (port).
A type of connector used to connect audio and video cables with a device.
See
base station.
A type of connector used to connect video cables with a device.
The security code (often called encryption key) defines the code that protects a
wireless
network. For maximum security, a random string of characters, numbers
and symbols should be used. No examples are given, define your personal string for
maximum security. Change it often.
The security type (often called encryption type) is the type of security applied to the
wireless
network.
From best to no security:
WPA AES
WPA TKIP
WEP (Either 64 bit, or 128 bit)
None.
On the
base station (router) subtypes (length, number of bits used) can be defined.
Example – WPA AES
Example – WEP 64 bit.
A server is similar to a
PC. Except that it is used for professional purposes.
Example – Web server (e.g. www.philips.com
)
Example – DNS server
A method used to input text with the remote control.
Similar text entry methods are most often possible on mobile phones.
Example – The digit key 2 cycles through 2abcABC.
Application running on a device or on a
PC.
Software can often be upgraded to provide new functionality.
Example – Philips Media Manager.
Example – Windows.
See
network name.
Abbreviation – Service Set Identifier
Sometimes used by experienced users.
A method of assigning
product identification numbers to devices. If static IP is
enabled, the
product identification numbers must be assigned manually.
The group of actions needed by devices to transport content from one location to
the other.
Example – Reading music from a hard disk, sharing it on the network, decoding (see
codec) it on the SLA5520 and listening to the music via the audio system.
The identification of the possible product identification number (IP addresses) that
can be used in a network.
It consists of a series of numbers (0 to 255) and dots: xxx.xxx.xxx.xxx.
Example – 255.255.255.0
EN
35
Proxy port
Proxy server
RCA
Router
SCART
Security code
Security type
Server
SMS text style entry
Software
SSID
Static IP
Streaming
Subnet mask
Loading ...
Loading ...
Loading ...