Specifications

Glossary - 8 MC17/MC17A/MC17T/MC17U Product Reference Guide
TFTP. (Trivial File Transfer Protocol) A version of the TCP/IP FTP (File Transfer Protocol) protocol that has no directory
or password capability. It is the protocol used for upgrading firmware, downloading software and remote booting of
diskless devices.
TKIP. (Temporal Key Integrity Protocol) A wireless encryption protocol that periodically changes the encryption key,
making it harder to decode.
Transmission Control Protocol/Internet Protocol. See TCP/IP.
TLS. (Transport Layer Security) TLS is a protocol that ensures privacy between communicating applications and their
users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or
tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
Trivial File Transfer Protocol. See TFTP.
U
UDP. (User Datagram Protocol) A protocol within the IP protocol suite that is used in place of TCP when a reliable
delivery is not required. For example, UDP is used for real-time audio and video traffic where lost packets are simply
ignored, because there is no time to retransmit. If UDP is used and a reliable delivery is required, packet sequence
checking and error notification must be written into the applications.
W
Warm Boot. A warm boot restarts the mobile computer by closing all running programs. All data that is not saved to
flash memory is lost.
WAP. (Wireless Application Protocol) A set of specifications, developed by the WAP Forum, that lets developers using
Wireless Markup Language build networked applications designed for handheld wireless devices. WAP was
designed to work within the constraints of these devices: a limited memory and CPU size, small, monochrome
screens, low bandwidth and erratic connections.
WEP. Wired-Equivalent Privacy protocol was specified in the IEEE 802.11 standard to provide a WLAN with a minimal
level of security and privacy comparable to a typical wired LAN, using data encryption.
WPA. Wi-Fi Protected Access is a data encryption specification for 802.11 wireless networks that replaces the weaker
WEP. It improves on WEP by using dynamic keys, Extensible Authentication Protocol to secure network access,
and an encryption method called Temporal Key Integrity Protocol (TKIP) to secure data transmissions.
WPA2. Wi-Fi Protected Access 2 is an enhanced version of WPA. It uses Advanced Encryption Standard instead of
TKIP.
WLAN. Wireless local-area networks use radio waves instead of a cable to connect a user device, such as a mobile
computer, to a LAN. They provide Ethernet connections over the air and operate under the 802.11 family of
specifications developed by the IEEE.