Page 136 / 138 Scroll up to view Page 131 - 135
BreezeMAX PRO 6000 Product Manual
Glossary
114
Plain Old Telephone Service (POTS)
Standard analog telephone service, regular telephone line without extra
enhancements
Power Over Ethernet (PoE)
Power over Ethernet: A specification for providing both power and data
to low-power network devices using a single Category 5 Ethernet cable.
PoE provides greater flexibility in the locating of Wi²s and network
devices, and significantly decreased installation costs.
Point to Point Tunneling Protocol (PPTP)
This protocol enables the transfer of data packets of TCP / IP through a
foreign network that is not based on these protocols (by marking the
packet with an address suited to the foreign network)
Quadrature Phase Shift Keying (QPSK)
A digital modulation scheme that conveys data by changing, or
modulating, the phase of a reference signal (the carrier wave).
Request for Comments (RFC)
A memorandum published by the Internet Engineering Task Force (IETF)
describing methods, behaviors, research, or innovations applicable to
the working of the Internet and Internet-connected systems.
Received signal strength indication
(RSSI)
A measurement of the power present in a received radio signal.
RSSI is generic radio receiver technology metric, which is usually invisible
to the user of device containing the receiver, but is directly known to
users of wireless networking of
IEEE 802.11 protocol family.
Real-time Transport Protocol (RTP)
The Real-time Transport Protocol (RTP) defines a standardized packet
format for delivering audio and video over the Internet.
Real-time Transport Control Protocol
(RTCP)
Real-time Transport Control Protocol (RTCP) is a sister protocol of the
Real-time Transport Protocol (RTP).
RTCP provides out-of-band control information for an RTP flow. It
partners RTP in the delivery and packaging of multimedia data, but does
not transport any data itself. It is used periodically to transmit control
packets to participants in a streaming multimedia session. The primary
function of RTCP is to provide feedback on the quality of service being
provided by RTP.
RTS Threshold
Transmitters contending for the medium may not be aware of each
other. RTS/CTS mechanism can solve this “Hidden Node Problem”. If the
packet size is smaller than the preset RTS Threshold size, the RTS/CTS
mechanism will NOT be enabled.
Service Set Identifier (SSID)
An identifier that is attached to packets sent over the wireless LAN and
functions as a password for joining a particular radio cell; i.e., Basic
Service Set (BSS).
Session Key
Session keys are unique to each client, and are used to authenticate a
client connection, and correlate traffic passing between a specific client
and the AU-EZ.
Page 137 / 138
BreezeMAX PRO 6000 Product Manual
Glossary
115
Shared Key
A shared key can be used to authenticate each client attached to a
wireless network. Shared Key authentication must be used along with
the 802.11 Wireless Equivalent Privacy algorithm.
Session Initiation Protocol (SIP)
An application-layer control (signaling) protocol for creating, modifying,
and terminating sessions with one or more participants. It can be used to
create two-party, multiparty, or multicast sessions that include Internet
telephone calls, multimedia distribution, and multimedia conferences.
Simple Network Management Protocol
(SNMP)
Simple Network Management Protocol:
The application protocol in the
Internet suite of protocols which offers network management services.
Simple Network Time Protocol (SNTP)
SNTP allows a device to set its internal clock based on periodic updates
from a Network Time Protocol (NTP) server. Updates can be requested
from a specific NTP server, or can be received via broadcasts sent by NTP
servers.
Single Input Single Output (SISO)
A form of antenna technology for wireless communications in which a
single antenna at both the transmitter and at the destination (receiver)
are used.
Subscriber Station
A general term for a customer’s WIMAX terminal equipment that
provides connectivity with a base station.
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol - a security protocol used in Wi-Fi
Protected Access (WPA). Unlike WEP, TKIP provides per-packet key
mixing, a message integrity check and a rekeying mechanism. TKIP
ensures that every data packet is sent with its own unique encryption
key.
TR-069 (Technical Report 069)
A DSL Forum technical specification entitled CPE WAN Management
Protocol (CWMP). It defines an application layer protocol for remote
management of end-user devices.
It provides the communication between CPE and Auto Configuration
Servers (ACS).
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol:
A TCP/IP protocol commonly used for
software downloads.
Transport Layer Security (TLS)
A cryptographic protocol that provides security for communications over
networks such as the Internet. TLS encrypts the segments of network
connections at the Transport Layer end-to-end.
Point to Point Tunneling Protocol (PPTP)
protocol that enables the transfer of data packets of TCP / IP through a
foreign network that is not based on these protocols (by marking the
packet with an address suited to the foreign network)
Unsolicited Grant Service
(UGS)
One of the five QoS service types defined in the IEEE 802.16 WiMAX. It
is designed to support real-time service flows that generate fixed-size
data packets on a periodic basis, such as T1/E1 and Voice over IP without
silence suppression.
Page 138 / 138
BreezeMAX PRO 6000 Product Manual
Glossary
116
User Datagram Protocol (UDP))
Protocol with no connection required between sender and receiver that
allows sending of data packets on the Internet (thought unreliable
because it cannot ensure the packets will arrive undamaged or in the
correct order)
Universal Plug and Play Internet
Gateway Device (UPnP IGD)
A set of networking protocols promulgated by the UPnP Forum. The
goals of UPnP are to allow devices to connect seamlessly and to simplify
the implementation of networks in the home and in corporate
environments for simplified installation of computer components.
UTP
Unshielded twisted-pair cable.
VoicE Activity Detection (VAD
Enables the detection of periods of silence in the audio stream so that it
is not transmitted over the network.
Wide Area Network (WAN)
Communications network intended to connect between remote local
area networks
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy:
WEP is based on the use of security keys and
the popular RC4 encryption algorithm. Wireless devices without a valid
WEP key will be excluded from network traffic.
Wireless Application Protocol (WAP)
Wireless Application Protocol (WAP) is an open international standard
for application-layer network communications in a
wireless-communication environment. Most use of WAP involves
accessing the mobile web from any mobile device
or phone.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA and WPA2) is a certification program
developed to indicate compliance with the security protocol to secure
wireless computer networks. The WPA protocol implements the majority
of the IEEE 802.11i standard. WPA2 implements the mandatory
elements of the 802.11i standard.
WiFi Protected Access, Pre-Shared Key
(WPA PSK)
WPA (see above) utilizes 128-bit encryption keys and dynamic session
keys to ensure the wireless network's privacy and enterprise security.
There are two basic forms of WPA:
• WPA Enterprise (requires a Radius server)
• WPA Personal (also known as WPA-PSK)
Virtual Private Network (VPN)
A private communications network that is based on the public network
and uses information security and channeling protocol in order to
maintain security of information transferred over the general network.

Rate

3.5 / 5 based on 2 votes.

Popular Alvarion Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top