User's Manual
is one million Hertz. One GigaHertz (GHz) is one billion Hertz. For
reference: the standard US electrical power frequency is 60 Hz, the AM
broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio
frequency band is 88-108 MHz, and microwave ovens typically operate
at 2.45GHz.
Roaming
Movement of a wireless node between two micro cells. Roaming usually
occurs in infrastructure networks built around multiple access points.
Current wireless network roaming is only supported in the same subnet
of a network.
RTS threshold
The number of frames in the data packet at or above which an RTS/CTS
(request to send/clear to send) handshake is turned on before the packet is
sent. The default value is 2347.
Shared key
An encryption key known only to the receiver and sender of data. This is
also referred to as a pre-shared key.
SIM (Subscriber
Identity Module)
A SIM card is used to validate credentials with the network. A SIM card
is a special smart card used by GSM-based digital cellular networks.
Silent mode
Silent Mode Access Points or Wireless Routers have been configured to
not broadcast the SSID for the wireless network. This makes it necessary
to know the SSID in order to configure the wireless profile to connect to
the access point or wireless router.
Single Sign On
Single Sign On feature set allows the 802.1X credentials to match your
Windows log on user name and password credentials for wireless
network connections.
SSID (Service Set
Identifier)
SSID or network name is a value that controls access to a wireless
network. The SSID for your wireless network card must match the SSID
for any access point that you want to connect with. If the value does not
match, you are not granted access to the network. Each SSID may be up
to 32 alphanumeric characters long and is case-sensitive.
stealth
A stealth access point is one that has the capability and is configured to
not broadcast its SSID. This is the WiFi network name that appears when
a DMU (Device Management Utility, such as IntelĀ® PROSet/Wireless
WiFi Connection Utility) scans for available wireless networks. Although
this can enhance wireless network security, it is commonly considered a
weak security feature. To connect to a stealth access point, a user must
specifically know the SSID and configure their DMU accordingly. The
feature is not a part of the 802.11 specification, and is known by differing
names by various vendors: closed mode, private network, SSID
broadcasting.
TKIP (Temporal Key
Integrity Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi
Protected Access* uses its TKIP. TKIP provides important data
encryption enhancements including a re-keying method. TKIP is part of
the IEEE 802.11i encryption standard for wireless networks. TKIP is the
next generation of WEP, the Wired Equivalency Protocol, which is used
to secure 802.11 wireless networks. TKIP provides per packet key