
905U-E Wireless Ethernet Bridge
User Manual
Man_905U-E Rev 1.0
Page
36
TCP. Together, therefore, IPX-SPX provides connection services similar to
TCP/IP.
ISA
A type of internal computer bus that allows the addition of card-based
components like modems and network adapters. ISA has been replaced by
PCI and is not very common anymore.
ISDN
A type of broadband Internet connection that provides digital service from
the customer's premises to the dial-up telephone network. ISDN uses
standard POTS copper wiring to deliver voice, data or video.
ISO Network
Model
A network model developed by the International Standards Organization
(ISO) that consists of seven different levels, or layers. By standardizing these
layers, and the interfaces in between, different portions of a given protocol
can be modified or changed as technologies advance or systems
requirements are altered. The seven layers are: Physical , Data Link,
Network, Transport, Session, Presentation, Application.
LAN
A system of connecting PCs and other devices within the same physical
proximity for sharing resources such as an Internet connections, printers,
files and drives.
Receive
Sensitivity
The minimum signal strength required to pick up a signal. Higher
bandwidth connections have less receive sensitivity than lower bandwidth
connections.
Router
A device that forwards data from one WLAN or wired local area network to
another.
SNR
Signal to Noise Ratio. The number of decibels difference between the signal
strength and background noise.
Transmit
Power
The power usually expressed in mW or db that the wireless device transmits
at.
MAC Address A MAC address, short for Media Access Control address, is a unique code
assigned to most forms of networking hardware. The address is
permanently assigned to the hardware, so limiting a wireless network's
access to hardware -- such as wireless cards -- is a security feature employed
by closed wireless networks. But an experienced hacker -- armed with the
proper tools -- can still figure out an authorized MAC address, masquerade
as a legitimate address and access a closed network.
Every wireless 802.11 device has its own specific MAC address hard-coded
into it. This unique identifier can be used to provide security for wireless
networks. When a network uses a MAC table, only the 802.11 radios that
have had their MAC addresses added to that network's MAC table will be
able to get onto the network.