Boutique Promos

Cart  

(empty)

New products

No new product at this time

Viewed products

Trendnet TEW 691GR (TEW691GR) Wireless Router


Trendnet TEW 691GR (TEW691GR) Wireless Router

Trendnet TEW 691GR (TEW691GR) Wireless Router - 54 Mbps, Pre-802.11n, Functionalities: VPN Pass-Thru, WAN: 1 x 10/100/1000M, LAN: 10/100/1000M, Firewall: SPI (Stateful Packet Inspection ), WEP: 40 bit (= 64 bit), 128 bits, TEW-691GR

More details


95,40 €

99567984



MPN

MPN: TEW691GR

Key Features

Features: Sets the main function of routeur.VPN Pass-Thru
Connectivity: Wireless
Antenna type: Internal antennas are built into the device. They can not be changed or directed.
External antennas can be oriented in different directions. They are usually used to increase the range of the device.
The detachable antennas are screwed to the device. They can easily be replaced by models puissants.3 detachable antennas
WLAN Standards: IEEE 802.11b
IEEE 802.11n
IEEE 802.11g
Security: All access points are wireless to guarantee a certain level of security to protect access to data you transmit. These are safety standards that the device is conforme.WEP
WEP 64-bit
128-bit WEP
WPA2-PSK

Interfaces

Integrated: Integrated Switch 4-port
Interfaces LAN: 10/100/1000M
WAN interfaces: When you buy a router for a long-distance network, remember that this type of network covers a large number of different devices and services. You must therefore choose the interface based on the type of service and the nature and amount of traffic that the network will transmettre.1 x 10/100/1000M
Additional Interfaces: 1 RJ-45 Auxiliary Management

Standards and Protocols

LAN standards: IEEE 802.3u 100 Mbps (Fast Ethernet)
IEEE 802.3ab 1000 Mbps (Gigabit Ethernet)
Protocols: The protocols are standard formats for converting data between devices. They determine many aspects of data: error checking, compression types and names of the procedures for sending and retrieving data from the devices. Programmers can choose from a wide variety of standard protocols, each with their advantages and disadvantages. Some are easier than others, some are more reliable and more faster. The key for the user that the device uses the correct protocol to communicate with other ordinateurs.PPPoE
PPTP
L2TP
Routing Protocols: Static Routing
Management Protocol: A network protocol is a set of rules, conventions and formal data structures that govern how computers exchange information over a network. Fruit of years of evolution and development, network protocols are defined by many standards organizations and vendors technologiques.HTTP

Firewall / VPN

Firewall Features: SPI (Stateful Packet Inspection)
VPN Protocols: IPSec
PPTP
L2TP
Authentication: With Radio Servicet ID (SSID)
VPN Encryption: The standard DES (Data Encryption Standard) is the standard method of data encryption. She uses the key DES56 bits to encrypt and decrypt data.
3DES 168-bit encryption (sometimes called "Triple") is an algorithm that guarantees a higher level of security because it encrypts each data block three times with each time a key unique.AES
WPA
WPA-PSK
WPA2
WPA2-PSK

Wireless

802.11b data rates: 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
802.11g data rates: 54 Mbps, 48 ​​Mbps, 36 Mbps, 24 Mbps, 28 Mbps, 12 Mbps, 9 Mbps, 6 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
Modulation: There are many standards of modulation. The most commonly used are:

DSSS
The standard DSSS (Direct-Sequence Spread Spectrum) is a transmission technology that combines the data signal to a sequence of data bits higher technique called "chipping." This ensures an increased resistance to noise and better data integrity.

OFDM
The standard OFDM (Orthogonal Frequency Division Multiplexing) is to transmit digital data by radio wave by dividing a radio signal into multiple sub-signals. These signals are then transmitted simultaneously at different frequencies. This modulation technique has the advantagereduce crosstalk noise.

CCK
CCK (Complementary Code Keying) uses a sequence of 64 code words 8 bits to encode data. This results in speeds of 5.5 and 11 Mb / s in the 2.4 GHz band of laOFDM
CCK
QPSK
BPSK
DBPSK
DQPSK
16QAM
64QAM
DSSS
WEP Encryption Length: WEP data encryption, as defined by the 802.11 standard, is used to build a network of two main security features: the first is to prevent unauthorized persons can access the network using a similar wireless LAN equipment. The second is to prevent unauthorized traffic on the LAN. WEP works on the following principle: the administrator can define "key" for each user of the wireless network and access is denied to all persons who have no clé.40 bits (= 64 bits)
128 bit

Dimension

Width: 18 cm
Depth: 14.7 cm
Height: 3.3 cm
Weight: 0.29 kg

Various

UPC: 710931600759
Product No.: 99567984
Comparateur de prix
Site présent sur le comparateur prix le moins cher.fr