User's Manual

Table Of Contents
282 BreezeMAX Modular Base Station System Manual
Glossary
IEEE 802.1p A QoS method - A three-bit value that can be placed inside an
802.1Q frame tag.
IEEE 802.1Q The IEEE 802.1Q standard defines the operation of VLAN Bridges
that permit the definition, operation and administration of Virtual
LAN topologies within a Bridged LAN infrastructure. The 802.1Q
specification establishes a standard method for inserting VLAN
membership information into Ethernet frames. A tag field containing
VLAN (and/or 802.1p priority) information can be inserted into an
Ethernet frame, carrying VLAN membership information.
IEEE 802.3 A Local Area Network protocol suite commonly known as Ethernet.
Ethernet uses Carrier Sense Multiple Access bus with Collision
Detection CSMA/CD. This method allows users to share the network
cable. However, only one station can use the cable at a time. A
variety of physical medium dependent protocols are supported.
IETF Internet Engineering Task Force. One of the task forces of the IAB
(Internet Architecture Board), formally called the Internet Activities
Board, which is the technical body that oversees the development of
the Internet suite of protocols (commonly referred to as
"TCP/IP").The IETF is responsible for solving short-term engineering
needs of the Internet.
IF Intermediate Frequency. Radio communications systems modulate a
carrier frequency with a baseband signal in order to achieve radio
transmission. In many cases, the carrier is not modulated directly.
Instead, a lower IF signal is modulated and processed. At a later
circuit stage, the IF signal is converted up to the transmission
frequency band.
IP Internet Protocol. The standard that defines how data is transmitted
over the Internet. IP bundles data, including e-mail, faxes, voice
calls and messages, and other types, into "packets", in order to
transmit it over public and private networks.
IPsec Security Architecture for IP Network. IP Control Protocol (IPCP) and
IPv6 Control Protocol IPsec provides security services at the IP layer
by enabling a system to select required security protocols, determine
the algorithm(s) to use for the service(s), and put in place any
cryptographic keys required to provide the requested services. IPsec
can be used to protect one or more "paths" between a pair of hosts,
between a pair of security gateways, or between a security gateway
and a host.
ISP Internet Service Provider