92
L i f e B o o k N 6 4 0 0 S e r i e s U s e r ’ s G u i d e
Wireless LAN Glossary
GLOSSARY
Ad Hoc Mode
Ad Hoc Mode refers to a wireless network architecture
where wireless network connectivity between multiple
computers is established without a central wireless
network device, typically known as Access Points.
Connectivity is accomplished using only client devices in
a peer-to-peer fashion.
Channel
Range of narrow-band frequencies used by the WLAN
device to transmit data. IEEE802.11b/g - 11 channels, 22
MHz wide channels.
DHCP (Dynamic Host Configuration Protocol)
A protocol that provides a means to dynamically allocate
IP addresses to computers on a local area network.
DNS (Domain Name System)
A data query service that provides a mechanism with
which to translate host names into Internet addresses.
IEEE802.11a
Wireless LAN standard that supports a maximum data
rate of 54 Mbps. 802.11a devices operate in the 5 GHz
lower and middle UNII bands.
IEEE802.11b
Wireless LAN standard that supports a maximum data
rate of 11 Mbps. 802.11b devices operate in the 2.4 GHz
ISM band.
Access point
Wireless network device used to bridge wireless and
wired network traffic.
IP address
The logical 32-bit host address defined by the Internet
Protocol that uniquely identifies a computer on a
network. The IP address is usually expressed in dotted
decimal notation.
LAN (Local Area Network)
A LAN or Local Area Network is a computer network (or
data communications network) which is confined to a
limited geographical area.
MAC address (Media Access Control Address)
A MAC address (also called an Ethernet address or IEEE
MAC address) is the 48-bit address (typically written as
twelve hexadecimal digits, 0 through 9 and A through F,
or as six hexadecimal numbers separated by periods or
colons, e.g., 0080002012ef, 0:80:0:2:20:ef) which
uniquely identifies a computer that has an Ethernet
interface.
MTU (Maximum Transmission Unit)
The maximum size of data which can be transmitted at
one time in networks including the Internet. In an envi-
ronment whose maximum size of data is too large to
correctly receive data, normal communications can be
restored by setting the size of MTU to a smaller value.
Network key
Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network
key both for data encryption and decryption, therefore,
it is necessary to set the same network key as the other
side of communication.
Network name (SSID: Service Set Identifier)
When a wireless LAN network is configured, grouping is
performed to avoid interference or data theft. This
grouping is performed with “Network name (SSID)”. In
order to improve security, the network key is set
allowing no communication unless “Network name
(SSID)” coincides with the network key.
Open system authentication
Null authentication method specified in the 802.11 stan-
dard that performs no authentication checks on a wire-
less client before allowing it to associate.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol
adopted in telephone line connection (PPP) to be used
over an Ethernet.
Protocol
A procedure or rule of delivering data among
computers. Ordered data communication is allowed by
making all conditions required for communication
including the method of data transmission/reception
and actions upon communication errors into proce-
dures.
Shared key authentication
N6460-Baikal.book Page 92 Friday, June 1, 2007 2:50 PM
Summary of Contents for N6460 - LifeBook
Page 1: ...C o p y r i g h t Fujitsu LifeBook N6460 Notebook User s Guide ...
Page 2: ...C o p y r i g h t ...
Page 8: ...L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 9: ...1 1 Preface ...
Page 10: ...2 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 12: ...4 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 13: ...5 2 Getting to Know Your LifeBook Notebook ...
Page 14: ...6 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 31: ...23 3 Getting Started ...
Page 32: ...24 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 40: ...32 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 41: ...33 4 User Installable Features ...
Page 42: ...34 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 58: ...50 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 59: ...51 5 Troubleshooting ...
Page 60: ...52 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 73: ...65 6 Care and Maintenance ...
Page 74: ...66 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 78: ...70 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 79: ...71 7 System Specifications ...
Page 80: ...72 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 85: ...77 8 Glossary ...
Page 86: ...78 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 93: ...85 Appendix A Integrated Wireless LAN User s Guide Optional Device ...
Page 94: ...86 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 104: ...96 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 105: ...97 Appendix B Using the Fingerprint Sensor ...
Page 106: ...98 L i f e B o o k N 6 4 0 0 N o t e b o o k A p p e n d i x B ...
Page 114: ...106 L i f e B o o k N 6 4 0 0 N o t e b o o k A p p e n d i x B ...
Page 115: ...107 Index ...
Page 116: ...108 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...
Page 120: ...112 L i f e B o o k N 6 4 0 0 S e r i e s U s e r s G u i d e ...