• Total long preamble transfer time is a constant at 192 usec
• Compatible with legacy IEEE 802.11 systems running at 1 and 2 Mbps
Short preamble:
• Preamble is transmitted at 1 Mbps and header at 2 Mbps
• Total short preamble transfer time is a constant at 96 usec
• Not compatible with legacy IEEE 802.11 systems operating at 1 and
2 Mbps
Protocol Field Compression
is a method to negotiate the compression of the
Protocol field. By
default, all implementations MUST transmit packets with two octet PPP
Protocol fields.
Remote Procedure Call
is a protocol that one program can use to request a service from a
program located in another computer in a network without having to
understand network details. (A procedure call is also sometimes known
as a function call or a subroutine call.) RPC uses the client/server model.
The requesting program is a client and the service-providing program
is the server. Like a regular or local procedure call, an RPC is a
synchronous operation requiring the requesting program to be
suspended until the results of the remote procedure are returned.
Service Set Identifier
is a sequence of characters that uniquely names a wireless local area
network (WLAN). An SSID is sometimes referred to as a "network name".
This name allows stations to connect to the desired network when
multiple independent networks operate in the same physical area.
Shared key
is a mode by which a computer can gain access to a wireless network
that uses the Wired Equivalent Privacy protocol. With Shared Key, a
computer equipped with a wireless modem can fully access any WEP
network and exchange encrypted or unencrypted data.
Simple Network
Management Protocol
is an Internet-standard protocol for collecting and organizing
information about managed devices on IP networks and for modifying
that information to change device behavior. Devices that typically
support SNMP include routers, switches, servers, workstations, printers,
modem racks and more.
Transmission Control
Protocol
is a core protocol of the
suite. TCP provides reliable,
ordered, and error-checked delivery of a stream of octets between
applications running on hosts communicating over an IP network.
Tunnel Setup Protocol
is a networking control protocol used to negotiate IP tunnel setup
parameters between a tunnel client host and a tunnel broker server,
the tunnel end-points.
User Datagram Protocol
is a core protocol of the
suite. UDP uses a simple
connectionless transmission model with a minimum of protocol
mechanism. It has no handshaking dialogues, and thus exposes the
user's program to any unreliability of the underlying network protocol.
There is no guarantee of delivery, ordering, or duplicate protection.
Keenetic Extra (KN-1710) — Command Reference Guide
329
Glossary
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...