User's Manual

C1_Configuration_Manual_-_fm_1.0.0.1.doc
Commercially Confidential
46
NAT Network Address Translation: An algorithm instrumental in minimizing the requirement
for globally unique IP addresses, permitting an organization whose addresses are not all globally
unique to connect to the Internet, regardless, by translating those addresses into globally routable
address space.
NLOS Non Line Of Sight. Also known as obstructed path or pathway.
noise Undesirable communications channel signals.
NTP Network Time Protocol: Protocol built on top of TCP that ensures accurate local
time-keeping with reference to radio and atomic clocks located on the Internet. This protocol is
capable of synchronizing distributed clocks within milliseconds over long time periods.
OFDM Orthogonal Frequency Division Multiplexing: A technique that splits a wide
frequency band into a number of narrow frequency bands and sends data across the subchannels.
The wireless networking standards 802.11a and 802.11g are based on OFDM.
open system authentication The sender and the recipient do not share a secret key. Each
party generates its own key-pair and asks the receiver to accept the (usually randomly) generated
key. Once accepted, this key is used for a short time only, then a new key is generated and
agreed upon. So, it is a two-step authentication method, in which sender first sends its identity
and in response of that it gets the authentication results.
ping Packet Internet Groper: ICMP echo message and its reply. Often used in IP networks to
test the reach ability of a network device.
PoE Power over Ethernet: A technology, defined in the developing IEEE 802.3af standard, to
deliver dc power over twisted-pair Ethernet data cables rather than power cords. The electrical
current, which enters the data cable at the power-supply end and comes out at the device end, is
kept separate from the data signal so neither interferes with the other.
Remote Bridge A bridge located on a network system separate from the host system.
RF Radio Frequency: Any frequency within the electromagnetic spectrum associated with
radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic
field is created that then is able to propagate through space. Many wireless technologies are
based on RF field propagation.
RFC Request For Comments: Document series used as the primary means for communicating
information about the Internet. Some RFCs are designated by the IAB as Internet standards.
Most RFCs document protocol specifications, such as Telnet and FTP, but some are humorous
or historical. RFCs are available online from numerous sources.
shared key authentication Shared key authentication supports authentication of STAs as
either a member of those who know a shared secret key or a member of those who do not.
Shared key authentication accomplishes this with the use of the WEP privacy mechanism.
Therefore, this authentication scheme is only available if the WEP option is implemented. The
required secret, shared key is presumed to have been delivered to participating STAs via a
secure channel that is independent of IEEE 802.11. During the shared key authentication
exchange, both the challenge and the encrypted challenge are transmitted. This facilitates
unauthorized discovery of the pseudorandom number (PRN) sequence for the key/IV pair used
for the exchange. Implementations should therefore avoid using the same key/IV pair for
subsequent frames.