Specifications
A31003-M2000-M100-1-76A9, 11/2012
OpenStage WL 3 / WL 3 Plus, Administration Manual G-1
For internal use only Abbreviations/Glossary
Abbreviations/Glossary
This table shows some important abbreviations and glossary.
Abbreviation Definition
802.11a IEEE 802.11 standard for transmission rate of up to 54Mbps, operates in the 5GHz spec-
trum.
802.11b IEEE 802.11 standard for transmission rate of up to 11Mbps, operates in the 2.4GHz spec-
trum.
802.11g IEEE 802.11 standard for transmission rate of up to 54Mbps, operates in the 2.4GHz spec-
trum.
802.11d IEEE 802.11 standard for regulatory domains.
802.11e IEEE 802.11 standard that defines Quality of Service (QoS) for WLAN.
802.11i Standard for security improvements for 802.11.
802.11n IEEE 802.11 standard for transmission rate of up to 100 Mbps, operates in the 2.4GHz and
5GHz bands.
802.11D IEEE MAC Bridges standard (interworking for 802.11 among others).
802.11X IEEE standard for port-based Network Access Control (authentication).
Ad-hoc WLAN A WLAN between two wireless capable devices (normally PCs), where no AP is involved.
AES Advanced Encryption Standard.
ALS Acoustic Location Signal
AP Access Point
BSS Basic Service Set. A WLAN with at least one AP that is configured for it.
BSSID Basic Service Set Identifier. Hard coded name of an ad-hoc WLAN, usually the MAC ad-
dress of the radio. One type of SSID (the other being ESSID).
CCX Cisco Compatible eXtension
Centralized Man-
agement
Centralized Management makes it possible to configure handsets without the administrator
needs to collect them.
Device Manager Application for management of portables, editing of parameters and updating the portables
with new software, running on WSG.
DHCP Dynamic Host Configuration Protocol. Used to send config parameters to TCP/IP clients.
DNS Domain Name System
DSCP Differentiated Services Code Point. QoS on the Network Layer. Used both for WLANS and
LANs.
DTIM Delivery Traffic Indication Message
EAP Extensible Authentication Protocol.
EAP-FAST Flexible Authentication via secure tunneling.










