User's Manual

Table Of Contents
254 BreezeMAX Modular Base Station System Manual
Glossary
IEEE 802.3 A Local Area Network protocol suite commonly known as Ethernet.
Ethernet uses Carrier Sense Multiple Access bus with Collision
Detection CSMA/CD. This method allows users to share the network
cable. However, only one station can use the cable at a time. A
variety of physical medium dependent protocols are supported.
IEEE 802.11b The IEEE 802.11b (also referred to as 802.11 High Rate or Wi-Fi). An
extension to 802.11 standard for wireless Ethernet networks, that
applies to wireless LANS and provides 11 Mbps transmission (with a
fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band.
IEEE 802.11g An extension to 802.11 standard for wireless Ethernet networks,
that applies to wireless LANs and provides 20+ Mbps in the 2.4 GHz
band.
IETF Internet Engineering Task Force. One of the task forces of the IAB
(Internet Architecture Board), formally called the Internet Activities
Board, which is the technical body that oversees the development of
the Internet suite of protocols (commonly referred to as
"TCP/IP").The IETF is responsible for solving short-term engineering
needs of the Internet.
IF Intermediate Frequency. Radio communications systems modulate a
carrier frequency with a baseband signal in order to achieve radio
transmission. In many cases, the carrier is not modulated directly.
Instead, a lower IF signal is modulated and processed. At a later
circuit stage, the IF signal is converted up to the transmission
frequency band.
IP Internet Protocol. The standard that defines how data is transmitted
over the Internet. IP bundles data, including e-mail, faxes, voice
calls and messages, and other types, into "packets", in order to
transmit it over public and private networks.
IPsec Security Architecture for IP Network. IP Control Protocol (IPCP) and
IPv6 Control Protocol IPsec provides security services at the IP layer
by enabling a system to select required security protocols, determine
the algorithm(s) to use for the service(s), and put in place any
cryptographic keys required to provide the requested services. IPsec
can be used to protect one or more "paths" between a pair of hosts,
between a pair of security gateways, or between a security gateway
and a host.
ISP Internet Service Provider