network and other users through an access point; this is the typical way corporate WLANs work. An alternative is ad-
hoc mode, but users would have to switch to infrastructure mode to access a network's printers and servers.
ISP -
An ISP is an organization providing Internet access service via modems, ISDN (Integrated Services Digital
Network), and private lines.
LAN(Local Area Network): A group of computers and peripheral devices connected to share resources.
MAC (Medium Access Control) Address: A unique number that distinguishes network cards.
MTU
- MTU (Maximum Transmission/Transfer Unit) is the largest packet size that can be sent over a network.
Messages larger than the MTU are divided into smaller packets.
NAT
- NAT (Network Address Translation - also known as IP masquerading) enables an organization to present itself to
the Internet with one address. NAT converts the address of each LAN node into one IP address for the Internet (and
vice versa). NAT also provides a certain amount of security by acting as a firewall by keeping individual IP addresses
hidden from the WAN.
Preamble
- Preamble refers to the length of a CRC (Cyclic Redundancy Check) block that monitors’ communications
between roaming wireless enabled devices and access points.
Protocol -
A standard way of exchanging information between computers.
RADIUS (Remote Authentication Dial In User Service): A server that issues authentication key to clients.
RAM (Random Access Memory): Non-permanent memory.
RIP
- RIP (Routing Information Protocol) is a routing protocol that is integrated in the TCP/IP protocol. RIP finds a route
that is based on the smallest number of hops between the source of a packet and its destination.
Router
- A router is a device that forwards data packets along networks. The device is connected to at least two
networks, commonly two LANs or WANs or a LAN and an ISP. Routers are located at gateways, the places where two
or more networks connect and use headers and forwarding tables to determine the best path for forwarding the
packets. And they use protocols such as ICMP to communicate with each other and configure the best route between
any two hosts. Very little filtering of data is done through routers.
Roaming
- The ability to use a wireless device while moving from one access point to another without losing the
connection.
RTS
- RTS (Request To Send) is a signal sent from the transmitting station to the receiving station requesting
permission to transmit data.
Server
- Servers are typically powerful and fast machines that store programs and data. The programs and data are
shared by client machines (workstations) on the network.
Static IP Address
- A permanent IP address is assigned to a node in a TCP/IP network. Also known as global IP.
Subnet Mask
- Subnet Masks (SUBNET work masks) are used by IP protocol to direct messages into a specified
network segment (i.e., subnet). A subnet mask is stored in the client machine, server or router and is compared with an
incoming IP ad-dress to determine whether to accept or reject the packet.
SSID
- SSID (Service Set Identifier) is a security measure used in WLANs. The SSID is a unique identifier attached to
packets sent over WLANs. This identifier emulates a password when a wireless device attempts communication on the
WLAN. Because an SSID distinguishes WLANS from each other, access points and wireless devices trying to connect
to a WLAN must use the same SSID.
TCP/IP
- TCP/IP (Transmission Control Protocol/Internet Protocol) is the main Internet communications protocol. The
TCP part ensures that data is completely sent and received at the other end. Another part of the TCP/IP protocol set is
UDP, which is used to send data when accuracy and guaranteed packet delivery are not as important (for example, in
real-time video and audio transmission).
TFTP (Trivial File Transfer Protocol)
- Simple form of FTP (File Transfer Protocol), which Uses UDP (User Datagram
Protocol), rather than TCP/IP for data transport and provides no security features.
TKIP (Temporal Key Integrity Protocol): An encryption method replacing WEP.TKIP uses random IV and frequent key
exchanges.
Summary of Contents for EzBridge 5800
Page 1: ...EzBridge 5800 User Manual 500mW ...
Page 18: ...Configuration ...
Page 22: ...Administration ...