User guide
Glossary March 2005
Through Software Release 6.1
Issue 1 Page 413 of 425
Canopy System User Guide
Canopy
A trademark of Motorola, Inc.
canopy.xml
File that stores specifications for the Bandwidth and Authentication
Manager (BAM) GUI.
Carrier-to-interference
Ratio
Ratio of intended reception to unintended reception.
CarSenseLost Field
This field displays how many carrier sense lost errors occurred on the
Ethernet controller.
CAT5 Cable
Cable that delivers Ethernet communications from module to module.
Later modules auto-sense whether this cable is wired in a straight-
through or crossover scheme.
cdf
Canopy Data Formatter tool that creates an initial ESN Data Table.
Inputs for this tool include a list of SM ESNs and default values of
sustained data rates and burst allocations for each listed ESN.
chkconfig
A command that the Linux
®
operating system accepts to enable
MySQL
®
and Apache™ Server software for various run levels of the
mysqld and httpd utilities.
Cluster Management
Module
Module that provides power, GPS timing, and networking connections
for an AP cluster. Also known as CMM. If this CMM is connected to a
Backhaul Module, then this CMM is the central point of connectivity for
the entire site.
CMM
Cluster Management Module. A module that provides power, GPS
timing, and networking connections for an Access Point cluster. If this
CMM is connected to a Backhaul Module (BH), then this CMM is the
central point of connectivity for the entire site.
Color Code Field
Module parameter that identifies the other modules with which
communication is allowed. The range of values is 0 to 255. When set
at 0, the Color Code does not restrict communications with any other
module.
Community String
Field
Control string that allows a network management station to access
MIB information about the module.
CPE
Customer premises equipment.
CRCError Field
This field displays how many CRC errors occurred on the Ethernet
controller.
Data Encryption
Standard
Over-the-air link option that uses secret 56-bit keys and 8 parity bits.
Data Encryption Standard (DES) performs a series of bit permutations,
substitutions, and recombination operations on blocks of data.