User Manual

Wireless-G PCI Adapter
Server - Any computer whose function in a network is to provide user access
to files, printing, communications, and other services.
Software - Instructions for the computer. A series of instructions that performs
a particular task is called a "program." The two major categories of software are
"system software" and "application software." System software is made up of
control programs such as the operating system and database management sys-
tem (DBMS). Application software is any program that processes data for the
user.
A common misconception is that software is data. It is not. Software tells the
hardware how to process the data.
SOHO (Small Office/Home Office) - Market segment of professionals who
work at home or in small offices.
Spread Spectrum - Spread Spectrum technology is a wideband radio frequen-
cy technique developed by the military for use in reliable, secure, mission-crit-
ical communications systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more bandwidth is con-
sumed than in the case of narrowband transmission, but the trade off produces
a signal that is, in effect, louder and thus easier to detect, provided that the
receiver knows the parameters of the spread-spectrum signal being broadcast.
If a receiver is not tuned to the right frequency, a spread-spectrum signal looks
like background noise. There are two main alternatives, Direct Sequence
Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
SSID (Service Set IDentifier) - A unique name shared among all points in a
wireless network. The SSID must be identical for each point in the wireless net-
work and is case-sensitive.
Storage - The semi-permanent or permanent holding place for digital data.
Subnet Mask - The method used for splitting IP networks into a series of sub-
groups, or subnets. The mask is a binary pattern that is matched up with the IP
address to turn part of the host ID address field into a field for subnets.
Switch - 1. A data switch connects computing devices to host computers,
allowing a large number of devices to share a limited number of ports. 2. A
device for making, breaking, or changing the connections in an electrical cir-
cuit.
35
Instant Wireless
®
Series
Passphrase - Used much like a password, a passphrase simplifies the WEP
encryption process by automatically generating the WEP encryption keys for
Linksys products.
PCI (Peripheral Component Interconnect) - A peripheral bus commonly used
in PCs, Macintoshes and workstations. It was designed primarily by Intel and
first appeared on PCs in late 1993. PCI provides a high-speed data path
between the CPU and peripheral devices (video, disk, network, etc.). There are
typically three or four PCI slots on the motherboard. In a Pentium PC, there is
generally a mix of PCI and ISA slots or PCI and EISA slots. Early on, the PCI
bus was known as a "local bus."
PCI provides "plug and play" capability, automatically configuring the PCI
cards at startup. When PCI is used with the ISA bus, the only thing that is gen-
erally required is to indicate in the CMOS memory which IRQs are already in
use by ISA cards. PCI takes care of the rest.
PCI allows IRQs to be shared, which helps to solve the problem of limited IRQs
available on a PC. For example, if there were only one IRQ left over after ISA
devices were given their required IRQs, all PCI devices could share it. In a PCI-
only machine, there cannot be insufficient IRQs, as all can be shared.
Plug-and-Play - The ability of a computer system to configure expansion
boards and other devices automatically without requiring the user to turn off
the system during installation.
Port - A pathway into and out of the computer or a network device such as a
switch or router. For example, the serial and parallel ports on a personal com-
puter are external sockets for plugging in communications lines, modems and
printers.
Roaming - In an infrastructure mode wireless network, this refers to the abili-
ty to move out of one access point's range and into another and transparently
reassociate and reauthenticate to the new access point. This reassociation and
reauthentication should occur without user intervention and ideally without
interruption to network connectivity. A typical scenario would be a location
with multiple access points, where users can physically relocate from one area
to another and easily maintain connectivity.
RTS (Request To Send) - An RS-232 signal sent from the transmitting station
to the receiving station requesting permission to transmit.
34