Owner's Manual

>Network Connections->View available wireless networks.
In Windows Vista, this can be viewed at Control panel->Network and sharing
center->Connect to a network.
T
TKIP Temporal Key Integrity Protocol An enhanced wireless security protocol that is
part of the
IEEE 802.11i encryption standard for wireless LANs. TKIP provides per-
packet key mixing, a message integrity check (MIC), and a rekeying mechanism.
TLS Transport Layer Security The successor to Secure Sockets Layer (SSL) protocol
for ensuring privacy and data integrity between two communicating applications.
TTLS Tunneled Transport Layer Security These settings define the protocol and the
credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to
validate the server and create a TLS-encrypted channel between the client and
server. The client can use another authentication protocol (typically password-
based protocols, such as MD5 Challenge) over this encrypted channel to enable
server validation. The challenge and response packets are sent over a nonexposed
TLS encrypted channel.
U
UAPSD Unscheduled Automatic Power Save Delivery An enhanced power-save mode
for
IEEE 802.11e networks.
W
WEP Wired Equivalent Privacy A form of data encryption. WEP is defined by the IEEE
802.11 standard and is intended to provide a level of data confidentiality and
integrity that is equivalent to a wired network. Wireless networks that use WEP are
more vulnerable to various types of attacks than those that use WPA.
wireless client A personal computer equipped with a wireless LAN network adapter such as the
Dell Wireless WLAN Card.
wireless router/AP A stand-alone wireless hub that allows any computer that has a wireless network
adapter to communicate with another computer and to connect to the Internet.
The wireless router/AP has at least one interface that connects it to an existing
wired network. See also
access point.
WLAN wireless local area network A local area network (LAN) that sends and receives
data by way of radio.
WMM™ Wi-Fi Multimedia WMM™ improves user experience for audio, video, and voice
applications over a wireless network by prioritizing streams of content and
optimizing the way the network allocates bandwidth among competing applications.
WPA™ Wi-Fi Protected Access Wi-Fi Protected Access™ (WPA2™) is a specification of
standards-based, interoperable security enhancements that strongly increase the
level of data protection and access control for existing and future wireless LAN
systems. Designed to run on existing hardware as a software upgrade, Wi-Fi
Protected Access is based on the final
IEEE 802.11i amendment to the IEEE 802.11
standard. WPA2 provides government grade security by implementing the National
Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption
algorithm. WPA2 is backward compatible with WPA.
WPA-PSK Wi-Fi Protected Access Preshared Key. A network authentication mode that
does not use an authentication server. It can be used with WEP or TKIP data
encryption types. WPA-Personal (PSK) requires configuration of a preshared key
(PSK). You must type a text phrase from 8 to 63 characters long, or a hexadecimal
key 64 characters long for a preshared key 256 bits in length. The data encryption
key is derived from the PSK. WPA2-PSK is a more recent version of this
authentication mode based on IEEE 802.11i.
WZC Wireless Zero Configuration Service The Windows service for connecting to a
wireless network.
Back to Contents Page