User's Manual

Network Time Protocol (NTP) NTP servers are used to synchronize clocks on computers and
other devices. APs have the capability to connect automatically to NTP servers to
set their own clocks on a regular basis.
Packet INternet Groper (PING) A utility that determines whether a specific IP address is
accessible, and the amount of network time (measured in milliseconds) needed
for response. PING is used primarily to troubleshoot Internet connections.
policy-based networking The management of a network with rules (or policies) governing the
priority and availability of bandwidth and resources, based both on the type of
data being transmitted and the privileges assigned to a given user or group of
users. This allows network administrators to control how the network is used in
order to help maximize efficiency.
Power over Ethernet (PoE) Power supplied to a device by way of the Ethernet network data
cable instead of an electrical power cord.
preamble type The preamble defines the length of the cyclic redundancy check (CRC) block for
communication between the access point and a roaming network adapter. All
nodes on a given network should use the same preamble type.
Quality of Service (QoS) QoS is a term encompassing the management of network performance,
based on the notion that transmission speed, signal integrity, and error rates can
be managed, measured, and improved. In a wireless network, QoS is commonly
managed through the use of policies.
Remote Authentication Dial-In User Service (RADIUS) A client/server protocol and software
that enables remote access servers to communicate with a central server in order
to authenticate users and authorize service or system access. RADIUS permits
maintenance of user profiles in a central repository that all remote servers can
share.
radio frequency (RF) The electromagnetic wave frequency radio used for communications
applications.
roaming Analogous to the way cellular phone roaming works, roaming in the wireless
networking environment is the ability to move from one AP coverage area to
another without interruption in service or loss in connectivity.
rogue AP An access point that connects to the wireless network without authorization.
Secure Shell (SSH) Also known as the Secure Socket Shell, SSH is a UNIX-based command
line interface for secure access to remote systems. Both ends of a communication
are secured and authenticated using a digital certificate, and any passwords
exchanged are encrypted.
Service Set Identifier (SSID) The SSID is a unique identifier attached to all packets sent over a
wireless network, identifying one or more wireless network adapters as
"belonging" to a common group. Some access points can support multiple SSIDs,
allowing for varying privileges and capabilities based on user roles.
Secure Sockets Layer (SSL) A common protocol for message transmission security on the
Internet. Existing as a program layer between the Internet's Hypertext Transfer
Installation and User Guide: Wireless LAN Client Page 33 of 36