Page 141 / 149 Scroll up to view Page 136 - 140
Glossary
zzAlvarion_ page
Page 142 / 149
Chapter
- Glossary
BreezeMAX Si 4000 CPE
128
Operator Manual
100BASE-TX
IEEE 802.3u specification for 100 Mbps Fast Ethernet over two
pairs of Category 5 or better UTP cable.
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over two pairs
of Category 3 or better UTP cable
Advanced Encryption
Standard (AES)
An strong encryption algorithm that implements symmetric
key cryptography.
Access List (ACL)
A list of MAC addresses which are allowed to access the device
Automatic Gain Control
(AGC)
Automatic electronic regulation by recording devices of video
and audio signals at a predetermined rate (by electronic
control).
Authentication
The process to verify the identity of a client requesting network
access. IEEE 802.11 specifies two forms of authentication:
open system and shared key.
Auto-negotiation
Signalling method allowing each node to select its optimum
operational mode (speed and duplex mode) based on the
capabilities of the node to which it is connected.
Best Effort (BE)
One of the five QoS service types defined in the IEEE 802.16
WiMAX.
Base Station
A WIMAX service provider’s equipment that is installed at a
fixed location to provide network connectivity for subscriber
stations within a defined service area.
Broadcast Key
Broadcast keys are sent to stations using 802.1X dynamic
keying. Dynamic broadcast key rotation is often used to allow
the access point to generate a random group key and
periodically update all key-management capable wireless
clients.
Channel Allocation
Priority Level (CAPL)
CAPL scan list is defined by the customer provisioned list.
There are some parameters with CAPL scan: NAPID, priority
and RefID.
NAPID is used to filter some BS if the NAPID is not matched.
Priority is the customer defined priority scan order. Higher
priority will be scanned first.
RefID is a result of mapping from IDs into a scan list from the
channel plan.
Page 143 / 149
Chapter
- Glossary
BreezeMAX Si 4000 CPE
129
Operator Manual
CINR
Carrier to Interference-plus-Noise Ratio (CINR), expressed in
decibels (dBs), is a measurement of signal effectiveness. The
carrier is the desired signal, and the interference can either be
noise or co-channel interference or both. In order for the signal
receiver to be able to decode the signal, the signal must fall
into an acceptable CINR range, which differs with the
technology used (i.e., CDMA, GSM, etc.).
Clear to Send (CTS)
Signal that gives a modem permission to send data.
Customer Premise
Equipment (CPE)
Customer Premise Equipment: Communications equipment
that resides on the customer's premises.
Dynamic Host
Configuration Protocol
(
DHCP)
A protocol used to assign IP addresses to computers on a
Microsoft NT local area network
Domain Name System
(DNS)
A mechanism used for translating host names for network
nodes into IP addresses.
Dynamic Domain Name
System (DDNS)
A method, protocol, or network service that provides the
capability for a networked device to notify a domain name
server to change the active DNS configuration of its configured
hostnames, addresses or other information stored in DNS, in
real-time.
Dynamic Host Control
Protocol (DHCP)
Dynamic Host Configuration Protocol:
Provides a framework for
passing configuration information to hosts on a TCP/IP
network. DHCP is based on the Bootstrap Protocol (BOOTP),
adding the capability of automatic allocation of reusable
network addresses and additional configuration options.
(“Demilitarized Zone”)
DMZ
A server that acts as "neutral zone" and separates an internal
network from a public one (in order to prevent outside access
to a company's private data.
Data/Digital Signal
Processor (DSP)
A system that controls voice quality
Differentiated Services
Code Point (DSCP)
A field in the header of IP packets for packet classification
purposes.
Dual Tone Multi
Frequency (DTMF)
Allocation of a unique tone to each button on an appliance
(made up of two frequencies - high and low) that allows a
computer to recognize the tone.
Extended Real-time
POLLING SERVICE (ertPS)
One of the five QoS service types defined in the IEEE 802.16
WiMAX.
Page 144 / 149
Chapter
- Glossary
BreezeMAX Si 4000 CPE
130
Operator Manual
Ethernet
A popular local area data communications network, which
accepts transmission from computers and terminals.
Ethernet Conversion
Sublayer (ETH CS)
A mode in which transmitted packets contain an 802.3 header
Encryption
Data passing between the SU-A-EZ and clients can use
encryption to protect from interception and evesdropping.
Extended Service Set
(ESS)
Extended Service Set:
More than one wireless cell can be
configured with the same Service Set Identifier to allow mobile
users can roam between different cells with the Extended
Service Set.
Extensible Authentication
Protocol (EAP)
An authentication protocol used to authenticate network
clients. EAP is combined with IEEE 802.1X port authentication
and a RADIUS authentication server to provide “mutual
authentication” between a client, the access point, and the a
RADIUS server
EAP-Tunneled Transport
Layer Security (EAP-TTLS)
An EAP protocol that extends TLS. (see
“Transport Layer
Security (TLS)” on page 134
)
File Transfer Protocol
(FTP)
File Transfer Protocol:
A TCP/IP protocol used for file transfer.
Hypertext Transfer
Protocol (HTTP)
Hypertext Transfer Protocol:
HTTP is a standard used to
transmit and receive all data over the World Wide Web.
IDENT
An Internet protocol that helps identify the user of a particular
TCP connection.
IEEE 802.16e
A standard that provides mobile broadband wireless access
using Scalable Orthogonal Frequency Division Multiple Access
(SOFDMA).
Internet Low Bitrate
Codec (iLBC)
A free speech codec suitable for robust voice communication
over IP. The codec is designed for narrow band speech and
results in a payload bit rate of 13.33 kbit/s with an encoding
frame length of 30 ms and 15.20 kbps with an encoding length
of 20 ms. The iLBC codec enables graceful speech quality
degradation in the case of lost frames, which occurs in
connection with lost or delayed IP packets.
IP Conversion Sublayer
(IP-CS)
A mode in which transmitted packets contain an 802.3 header
Itsy Package Management
System (IPKG, ipkg)
Itsy Package Management System - a lightweight package
management system designed for embedded devices.
Page 145 / 149
Chapter
- Glossary
BreezeMAX Si 4000 CPE
131
Operator Manual
Internet Protocol Security
(IPsec)
A protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP
packet of a data stream.
Jitter Buffer (JB)
A shared data area where voice packets can be collected,
stored, and sent to the voice processor in evenly spaced
intervals. Variations in packet arrival time, called jitter, can
occur because of network congestion, timing drift, or route
changes. The jitter buffer, which is located at the receiving end
of the voice connection, intentionally delays the arriving
packets so that the end user experiences a clear connection
with very little sound distortion.
Local Area Network (LAN)
Local Area Network:
A group of interconnected computer and
support devices.
Layer 2 Tunneling
Protocol (L2TP)
A tunneling protocol used to support virtual private networks
(VPNs).
Media Access Control
(MAC)
Media Access Control: The lower of the two sub-layers of the
data link layer defined by the IEEE. The MAC sub-layer
handles access to shared media, such as whether token
passing or contention will be used.
MAC Address
Standardized data link layer address that is required for every
port or device that connects to a LAN. Other devices in the
network use these addresses to locate specific ports in the
network and to create and update routing tables and data
structures. MAC addresses are 6bytes long and are controlled
by the IEEE.
Maximum Transmission
Unit (MTU)
Largest size of a data packet or frame that can be sent in one
complete unit over a packet-based computer network
Multiple Input Multiple
Output (MIMO)
Using multiple antennas in a Wi-Fi device to improve
performance and throughput.
MSCHAPV2 (MS-CHAP. v2)
Microsoft version of the Challenge-handshake authentication
protocol, version 2. MS-CHAPv2 provides mutual
authentication between peers by adding a peer challenge upon
the Response packet and an authenticator response on the
Success packet.

Rate

4 / 5 based on 1 vote.

Popular Alvarion Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top