498638
32
Zoom out
Zoom in
Vorherige Seite
1/39
Nächste Seite
29
Explanation of terms
A
AES (Advanced Encryption Standard)
This is a next generation standard encryption
method replacing the current DES and 3DES, and
because of its high security it is expected to be
applied widely to wireless LANs in the future. It
uses the “Rijndael” algorithm developed by two
Belgian cryptographers to divide the data into
blocks of fixed lengths and encrypt each block.
It supports data lengths of 128, 192 and 256 bits
and key lengths of 128, 192 and 256 bits as well,
offering extremely high encryption security.
AirPlay
AirPlay sends (plays) contents recorded in iTunes
or on an iPhone/iPod touch/iPad to a compatible
device via the network.
App Store
App Store is a site that sells application software
for such devices as the iPhone or iPod Touch, and
is operated by Apple Inc.
B
Bit rate
This expresses the read amount per 1 second of
video/audio data recorded in a disc. A larger number
means higher sound quality, but also means a larger
file size.
D
DLNA
DLNA and DLNA CERTIFIED are trademarks and/
or service marks of Digital Living Network Alliance.
Some contents may not be compatible with other
DLNA CERTIFIED™ products.
F
FLAC
FLAC stands for Free lossless Audio Codec, and is a
lossless free audio file format. Lossless means that
the audio is compressed without any loss in quality.
The FLAC license is as shown below.
Copyright (C) 2000,2001,2002,2003,2004,2005,200
6,2007,2008,2009 Josh Coalson
Redistribution and use in source and binary forms,
with or without modification, are permitted provided
that the following conditions are met:
•Redistributions of source code must retain the
above copyright notice, this list of conditions and
the following disclaimer.
•Redistributions in binary form must reproduce the
above copyright notice, this list of conditions and
the following disclaimer in the documentation and/
or other materials provided with the distribution.
•Neither the name of the Xiph.org Foundation nor
the names of its contributors may be used to
endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND CONTRIBUTORS “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE
FOUNDATION OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
I
IEEE 802.11b
This is one wireless LAN standard set by the 802
working group that establishes LAN technology
standards at the IEEE (Institute of Electrical and
Electronics Engineers) of the United States. It
uses the 2.4 GHz band usable freely without
a radio frequency license (ISM band), enabling
communications at a maximum speed of 11 Mbps.
•The value indicated above is the maximum
theoretical value for the wireless LAN standard,
and does not indicate the actual data transfer rate.
IEEE 802.11g
This is another wireless LAN standard set by the
802 working group that establishes LAN technology
standards at the IEEE (Institute of Electrical and
Electronics Engineers) of the United States, and
is compatible with IEEE 802.11b. It also uses the
2.4 GHz band, but enables communications at a
maximum speed of 54 Mbps.
•The value indicated above is the maximum
theoretical value for the wireless LAN standard,
and does not indicate the actual data transfer rate.
iTunes
iTunes is the name of the multimedia player
provided by Apple Inc. It enables management
and playback of multimedia contents including
music and movies. iTunes supports many main file
formats including AAC, WAV, and MP3.
M
MP3 (MPEG Audio Layer-3)
This is an internationally standardized audio data
compression scheme, using the “MPEG-1” video
compression standard. It compresses the data
volume to about one eleventh its original size while
maintaining sound quality equivalent to a music CD.
MPEG (Moving Picture Experts Group),
MPEG-2, MPEG-4
These are the names for digital compression format
standards used for the encoding of video and audio.
Video standards include “MPEG-1 Video”, “MPEG-
2 Video”, “MPEG-4 Visual”, “MPEG-4 AVC”. Audio
standards include “MPEG-1 Audio”, “MPEG-2
Audio”, “MPEG-4 AAC”.
N
Network Names
(SSID: Security Set Identifier)
When forming wireless LAN networks, groups are
formed to prevent interference, data theft, etc.
This grouping is done by “SSID” or “Security Set
Identifiers”. For further security, a WEP key is set
and signal transfer is not possible unless the SSID
and WEP key match.
P
Protection Circuit
This is a function to prevent damage to devices
within the power supply when an abnormality
such as an overload, excess voltage occurs or
temperature for any reason.
In this unit, the power indicator blinks and the unit
enters standby mode when an abnormality occurs.
S
Sampling frequency
Sampling involves taking a reading of a sound wave
(analog signal) at regular intervals and expressing
the height of the wave at each reading in digitized
format (producing a digital signal).
The number of readings taken in one second is
called the “sampling frequency”. The larger the
value, the closer the reproduced sound is to the
original.
T
TKIP (Temporal Key Integrity Protocol)
This is a network key used for WPA. The encryption
algorithm is RC4, the same as for WEP, but the
security level is increased by changing the network
key used for encryption for each packet.
Preparations
Operations
InformationsInformations
32

Brauchen Sie Hilfe? Stellen Sie Ihre Frage.

Forenregeln

Missbrauch melden von Frage und/oder Antwort

Libble nimmt den Missbrauch seiner Dienste sehr ernst. Wir setzen uns dafür ein, derartige Missbrauchsfälle gemäß den Gesetzen Ihres Heimatlandes zu behandeln. Wenn Sie eine Meldung übermitteln, überprüfen wir Ihre Informationen und ergreifen entsprechende Maßnahmen. Wir melden uns nur dann wieder bei Ihnen, wenn wir weitere Einzelheiten wissen müssen oder weitere Informationen für Sie haben.

Art des Missbrauchs:

Zum Beispiel antisemitische Inhalte, rassistische Inhalte oder Material, das zu einer Gewalttat führen könnte.

Beispielsweise eine Kreditkartennummer, persönliche Identifikationsnummer oder unveröffentlichte Privatadresse. Beachten Sie, dass E-Mail-Adressen und der vollständige Name nicht als private Informationen angesehen werden.

Forenregeln

Um zu sinnvolle Fragen zu kommen halten Sie sich bitte an folgende Spielregeln:

Neu registrieren

Registrieren auf E - Mails für Denon DSD-300 Cocoon portable wenn:


Sie erhalten eine E-Mail, um sich für eine oder beide Optionen anzumelden.


Andere Handbücher von Denon DSD-300 Cocoon portable

Denon DSD-300 Cocoon portable Bedienungsanleitung - Deutsch - 39 seiten

Denon DSD-300 Cocoon portable Bedienungsanleitung - Holländisch - 39 seiten


Das Handbuch wird per E-Mail gesendet. Überprüfen Sie ihre E-Mail.

Wenn Sie innerhalb von 15 Minuten keine E-Mail mit dem Handbuch erhalten haben, kann es sein, dass Sie eine falsche E-Mail-Adresse eingegeben haben oder dass Ihr ISP eine maximale Größe eingestellt hat, um E-Mails zu erhalten, die kleiner als die Größe des Handbuchs sind.

Ihre Frage wurde zu diesem Forum hinzugefügt

Möchten Sie eine E-Mail erhalten, wenn neue Antworten und Fragen veröffentlicht werden? Geben Sie bitte Ihre Email-Adresse ein.



Info