User's Manual

A SIM card is a special smart card that is used by Global System for Mobile Communications
(GSM) based digital cellular networks. The SIM card is used to validate your credentials with the
network
EAP-TLS A type of authentication method that uses EAP and a security protocol called the Transport
Layer Security (TLS). EAP-TLS uses certificates that use passwords. EAP-TLS authentication
supports dynamic WEP key management.
EAP-TTLS A type of authentication method that uses EAP and Tunneled Transport Layer Security (TTLS).
EAP-TTLS uses a combination of certificates and another security method such as passwords.
Encryption Scrambling data so that only the authorized recipient can read it. Usually a key is needed to
interpret the data.
FHSS Frequency-Hop Spread Spectrum. Technology used in radio transmission. Incompatible with
DSSS.
File and printer
sharing
A capability that allows a number of people to view, modify, and print the same file(s) from
different computers.
Fragmentation
threshold
The threshold at which the wireless adapter breaks the packet into multiple frames. This
determines the packet size and affects the throughput of the transmission.
GHz
(Gigahertz)
A unit of frequency equal to 1,000,000,000 cycles per second.
Host computer The computer that is directly connected to the Internet via a modem or network adapter.
Infrastructure
network
A wireless network centered around an access point. In this environment, the access point not
only provides communication with the wired network, but also mediates wireless network traffic
in the immediate neighborhood.
IEEE Institute of Electrical and Electronics Engineers (IEEE) is an organization involved in defining
computing and communications standards.
Internet
Protocol (IP)
address
The address of a computer that is attached to a network. Part of the address designates which
network the computer is on, and the other part represents the host identification.
LAN (Local Area
Network)
A high-speed, low-error data network covering a relatively small geographic area.
LEAP (Light
Extensible
Authentication
Protocol)
A version of Extensible Authentication Protocol (EAP). LEAP is a proprietary extensible
authentication protocol developed by Cisco that provides a challenge-response authentication
mechanism and dynamic key assignment.
MAC (Media
Access Control)
Address
A hardwired address applied at the factory. It uniquely identifies network hardware, such as a
wireless adapter, on a LAN or WAN.
Mbps
(Megabits-per-
second)
Transmission speed of 1,000,000 bits per second.
MHz
(Megahertz)
A unit of frequency equal to 1,000,000 cycles per second.
MIC (Michael) Message Integrity Check (commonly called Michael).
MS-CHAP An EAP mechanism used by the client. Microsoft Challenge Authentication Protocol (MS-CHAP)
Version 2, is used over an encrypted channel to enable server validation. The challenge and
response packets are sent over a non-exposed TLS encrypted channel.
ns(Nanosecond) 1 billionth (1/1,000,000,000) of a second.
OFDM Orthogonal Frequency Division Multiplexing.
Open
authentication
Allows any device network access. If encryption is not enabled on the network, any device that
knows the Service Set Identifier (SSID) of the access point can gain access to the network.
PEAP Protected Extensible Authentication Protocol (PEAP) is an Internet Engineering Task Force (IETF)
draft protocol sponsored by Microsoft, Cisco, and RSA Security. PEAP creates an encrypted
tunnel similar to the tunnel used in secure web pages (SSL). Inside the encrypted tunnel, a