Owner's Manual

distinguished names through signed certificates, managing certificate serial
numbers, and revoking certificates.
CCK complimentary code keying The modulation technique for high and medium
transmit rates.
certificate A digital document that is commonly used for authentication and secure exchange
of information on open networks, such as the Internet, extranets, and intranets. A
certificate securely binds a public key to the entity that holds the corresponding
private key. Certificates are digitally signed by the issuing certification authority
and can be issued for a user, a computer, or a service. The most widely accepted
format for certificates is defined by the
ITU-T X.509 version 3 international
standard. See also intermediate certificate and root certificate.
certificate store The storage area on your computer where requested certificates are stored.
The user store is the Personal folder in the certificate store.
The root store is in the Trusted Root Certification Authorities folder in the
certificate store.
The machine store is on the authentication server of the certification
authority.
CHAP Challenge Handshake Authentication Protocol An authentication scheme used
by Point-to-Point-Protocol servers to validate the identity of the originator of a
connection, upon connection or any time later.
CSP cryptographic service provider A cryptographic service provider contains
implementations of cryptographic standards and algorithms. A
smart card is an
example of a hardware-based CSP.
CSMA/CA carrier sense multiple access with collision avoidance An IEEE 802.11
protocol that ensures that the number of collisions within a domain are kept to a
minimum.
D
dBm A unit of expression of power level in decibels with reference to a power of 1
milliwatt.
DBPSK differential binary phase shift keying The modulation technique used for low
transmit rate.
DHCP Dynamic Host Configuration Protocol A mechanism for allocating IP addresses
dynamically so that addresses can be reused when hosts no longer need them.
DQPSK differential quadrature phase shift keying The modulation technique used for
standard transmit rate.
DSSS direct sequence spread spectrum A spreading technique in which various data,
voice, and/or video signals are transmitted over a specific set of frequencies in a
sequential manner from lowest to highest frequency, or highest to lowest
frequency.
E
EAP Extensible Authentication Protocol EAP ensures mutual authentication
between a wireless client and a server that resides at the network operations
center.
EIRP effective isotropic radiated power Expresses the performance of a transmitting
system in a given direction. EIRP is the sum of the power at the antenna input plus
antenna gain.
F
file and printer sharing A capability that allows a number of people to view, modify, and print the same
file(s) from different computers.
fragmentation threshold The threshold at which the Dell Wireless WLAN Card breaks the packet into multiple
frames. This determines the packet size and affects the throughput of the
transmission.