ActionTec 802UIG-1 User Manual page 24

802.11g wlan usb adapter
Table of Contents

Advertisement

802.11g WLAN USB Adapter
LAN - A local area network (LAN) is a group of computers and associated devices that
share a common communications line and typically share the resources of a single
processor or server within a small geographic area (for example, within an office building).
M
MAC Address - 12-digit hexadecimal number that identifies a networking product on the
network.
Mbps (Megabits per second) - One million bits per second; unit of measurement for data
transmission.
N
Network - A system that transmits any combination of voice, video and/or data between
users.
Node - A network junction or connection point, typically a computer or work station.
O
Open System - Is when the sender and the recipient do not share a secret key. Each party
generates its own key-pair and asks the receiver to accept the (usually randomly) generated
key. Once accepted, this key is used for a short time only; then a new key is generated and
agreed upon.
P
Packet - A unit of data routed between an origin and a destination in a network.
PCMCIA - Personal Computer Memory Card International Association
Plug and Play - The ability of a computer system to configure expansion boards and other
devices automatically without requiring the user to turn off the system during installation.
R
Roaming - The ability to use a wireless device and be able to move from one access point's
range to another without losing the connection.
RTS/CTS Threshold Value - Should remain at its default setting of 2,347. A preamble is a
signal used to synchronize the transmission timing between two or more systems. A series
of transmission pulses is sent before the data to indicate that "someone is about transmit
data." This ensures that systems receiving the information correctly when the data
transmission starts.
S
Shared Key - Is when both the sender and recipient share a secret key. Both units use this
key for an extended length of time, sometimes indefinitely. Any eavesdropper that discovers
the key may decipher all packets until the key is changed.
19

Advertisement

Table of Contents
loading

Table of Contents