Boutique Promos

Cart  

(empty)

New products

No new product at this time

Viewed products

Belkin Wi-Fi router optimized N (new design) (F6D4230ed4) Wireless Router


Belkin Wi-Fi router optimized N (new design) (F6D4230ed4) Wireless Router

Belkin Wi-Fi router optimized N (new design) (F6D4230ed4) Wireless Router - 54 Mbps, Pre-802.11n, WAN: 1 10 Base-T/100 Base-TX, LAN: 10 Base-T, WEP: 40 bit (= 64 bit), 256 bits, 128 bits, Wireless Router / theoretical maximum throughput: 150 Mbps / 4 port Ethernet / button WPS security

More details


40,90 €

84121893



MPN

MPN: F6D4230ed4

Key Features

Connectivity: Wireless
Antenna type: Internal antennas are built into the device. They can not be changed or directed.
External antennas can be oriented in different directions. They are usually used to increase the range of the device.
The detachable antennas are screwed to the device. They can easily be replaced by models puissants.1 external antenna
WLAN Standards: IEEE 802.11b
IEEE 802.11n
IEEE 802.11g
Security: All access points are wireless to guarantee a certain level of security to protect access to data you transmit. These are safety standards that the device is conforme.WEP
WPA2

Interfaces

Integrated: Integrated Switch 4-port
Interfaces LAN: 10 Base-T
WAN interfaces: When you buy a router for a long-distance network, remember that this type of network covers a large number of different devices and services. You must therefore choose the interface based on the type of service and the nature and amount of traffic that the network will transmettre.1 10 Base-T/100 Base-TX
Console port: RJ-45 Ethernet

Standards and Protocols

LAN standards: IEEE 802.11b 2.4 Ghz 11 Mbps Wi-Fi
IEEE 802.11g
IEEE 802.11n
Protocols: The protocols are standard formats for converting data between devices. They determine many aspects of data: error checking, compression types and names of the procedures for sending and retrieving data from the devices. Programmers can choose from a wide variety of standard protocols, each with their advantages and disadvantages. Some are easier than others, some are more reliable and more faster. The key for the user that the device uses the correct protocol to communicate with other ordinateurs.PPTP
Management Protocol: A network protocol is a set of rules, conventions and formal data structures that govern how computers exchange information over a network. Fruit of years of evolution and development, network protocols are defined by many standards organizations and vendors technologiques.HTTP

Firewall / VPN

VPN Protocols: IPSec Pass-Thru
PPTP
Authentication: Radio Service Set ID (SSID)
VPN Encryption: The standard DES (Data Encryption Standard) is the standard method of data encryption. She uses the key DES56 bits to encrypt and decrypt data.
3DES 168-bit encryption (sometimes called "Triple ") is an algorithm that guarantees a higher level of security because it encrypts each data block three times with each time a key unique.WPA
WPA2

Wireless

802.11b data rates: 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
802.11g data rates: 54 Mbps, 48 ​​Mbps, 36 Mbps, 24 Mbps, 28 Mbps, 12 Mbps, 9 Mbps, 6 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
Modulation: There are many standards of modulation. The most commonly used are:

DSSS
The standard DSSS (Direct-Sequence Spread Spectrum) is a transmission technology that combines the data signal to a sequence of data bits higher technique called "chipping." This ensures an increased resistance to noise and better data integrity.

OFDM
The standard OFDM (Orthogonal Frequency Division Multiplexing) is to transmit digital data by radio wave by dividing a radio signal into multiple sub-signals. These signals are then transmitted simultaneously at different frequencies. This modulation technique has the advantage of reducing the crosstalk noise.

CCK
CCK (Complementary Code Keying) uses a sequence of 64 code words 8 bits to encode data. This results in speeds of 5.5 and 11 Mb / s in the 2.4 GHz band of laOFDM
CCK
QPSK
BPSK
DBPSK
DQPSK
16QAM
64QAM
DSSS
WEP Encryption Length: WEP data encryption, as defined by the 802.11 standard, is used to build a network of two main security features: the first is to prevent unauthorized persons can access the network using a similar wireless LAN equipment. The second is to prevent unauthorized traffic on the LAN. WEP works on the following principle: the administrator can define "key" for each user of the wireless network and access is denied to all persons who have no clé.40 bits (= 64 bits)
256 bit
128 bit

Other Features

LEDs: WAN

Various

UPC: 722868711958
Product No.: 84121893
Comparateur de prix
Site présent sur le comparateur prix le moins cher.fr