Specifications
Glossary - 8 MC17/MC17A/MC17T/MC17U Product Reference Guide
TFTP. (Trivial File Transfer Protocol) A version of the TCP/IP FTP (File Transfer Protocol) protocol that has no directory 
or password capability. It is the protocol used for upgrading firmware, downloading software and remote booting of 
diskless devices.
TKIP. (Temporal Key Integrity Protocol) A wireless encryption protocol that periodically changes the encryption key, 
making it harder to decode. 
Transmission Control Protocol/Internet Protocol. See TCP/IP.
TLS. (Transport Layer Security) TLS is a protocol that ensures privacy between communicating applications and their 
users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or 
tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL). 
Trivial File Transfer Protocol. See TFTP.
U
UDP. (User Datagram Protocol) A protocol within the IP protocol suite that is used in place of TCP when a reliable 
delivery is not required. For example, UDP is used for real-time audio and video traffic where lost packets are simply 
ignored, because there is no time to retransmit. If UDP is used and a reliable delivery is required, packet sequence 
checking and error notification must be written into the applications.
W
Warm Boot. A warm boot restarts the mobile computer by closing all running programs. All data that is not saved to 
flash memory is lost.
WAP. (Wireless Application Protocol) A set of specifications, developed by the WAP Forum, that lets developers using 
Wireless Markup Language build networked applications designed for handheld wireless devices. WAP was 
designed to work within the constraints of these devices: a limited memory and CPU size, small, monochrome 
screens, low bandwidth and erratic connections. 
WEP. Wired-Equivalent Privacy protocol was specified in the IEEE 802.11 standard to provide a WLAN with a minimal 
level of security and privacy comparable to a typical wired LAN, using data encryption. 
WPA. Wi-Fi Protected Access is a data encryption specification for 802.11 wireless networks that replaces the weaker 
WEP. It improves on WEP by using dynamic keys, Extensible Authentication Protocol to secure network access, 
and an encryption method called Temporal Key Integrity Protocol (TKIP) to secure data transmissions. 
WPA2. Wi-Fi Protected Access 2 is an enhanced version of WPA. It uses Advanced Encryption Standard instead of 
TKIP.
WLAN. Wireless local-area networks use radio waves instead of a cable to connect a user device, such as a mobile 
computer, to a LAN. They provide Ethernet connections over the air and operate under the 802.11 family of 
specifications developed by the IEEE.










