Cables to Go DOCSIS Cable Modem User Manual

Page 29

Advertising
background image

DOCSIS 1.0/ 1.1 Equivalent Cable Modem

DHCP
Protocol used to automatically assign various network settings, most notably IP
addresses

DHCP Client Capabilities
The Dynamic Host Configuration Protocol (DHCP) provides centralized management
of the Transmission Control Protocol/Internet Protocol (TCP/IP) client configurations,
including the IP address, gateway address, Domain Name Server (DNS) address and
more. The DHCP Client enables the Office Cable Modem to acquire TCP/IP settings
(such as the IP address, gateway address, and DNS address) from the ISP. This is ideal
when one TCP/IP address is provided by the ISP and this address may change from
time to time, as is the case with many cable modem Internet accounts.

DNS
Domain Name System. Automated system used to translate computer names into IP
addresses. A DNS server is used to look up a name and provide its address to the
requesting computer.

DOCSIS
Data Over Cable Service Interface Specification. A standard that defines interface
requirements for cable modems involved in high-speed data distribution over cable
television networks.

Downstream
Indicates the direction of flow of a data stream from the cable headend to the user’s
computer.

Duplex Tuner
A tuner that processes both upstream and downstream signals.

Encryption
The scrambling of a signal by means of an algorithm, to prevent unauthorised
monitoring of the message.

Ethernet
A network technology that employs a bus topology in which all computers attach to a
single cable similar to the stops on a bus line. The Ethernet technology is an accepted
worldwide standard whose characteristics are defined by the IEEE 802.3 standards
committee.

F connector
A type of coaxial connector, labeled RF on the rear of the cable modem that connects
the modem to the cable system.

Firewall
A software or hardware system that prevents unauthorized outside access, theft,
deletion, or modification of information stored on a local network. Typically, this
unauthorized access would be via an organization's Internet connection.

25

Advertising