
Appendix A
A.1 Glossary of Terms
SCALANCE W1750D CLI
730
Function Manual, 03/2019, C79000-G8976-C452-04
BGP
Border Gateway Protocol. BGP is a routing protocol for exchanging data and
information between different host gateways or autonomous systems on the
Internet.
BLE
Bluetooth Low Energy. The BLE functionality is offered by Bluetooth® to en-
able devices to run for long durations with low power consumption.
BMC
Beacon Management Console. BMC manages and monitors beacons from
the BLE devices. The BLE devices are used for location tracking and proximi-
ty detection.
BPDU
Bridge Protocol Data Unit. A BPDU is a data message transmitted across a
local area network to detect loops in network topologies.
B-RAS
Broadband Remote Access Server. A B-RAS is a server that facilitates and
converges traffic from multiple Internet traffic resources such as cable, DSL,
Ethernet, or Broadband wireless.
BRE
Basic Regular Expression. The BRE syntax standards designed by the IEEE
provides extension to the traditional Simple Regular Expressions syntax and
allows consistency between utility programs such as grep, sed, and awk.
BSS
Basic Service Set. A BSS is a set of interconnected stations that can com-
municate with each other. BSS can be an independent BSS or infrastructure
BSS. An independent BSS is an ad hoc network that does not include APs,
whereas the infrastructure BSS consists of an AP and all its associated cli-
ents.
BSSID
Basic Service Set Identifier. The BSSID identifies a particular BSS within an
area. In infrastructure BSS networks, the BSSID is the MAC address of the
AP. In independent BSS or ad hoc networks, the BSSID is generated ran-
domly.
BYOD
Bring Your Own Device. BYOD refers to the use of personal mobile devices
within an enterprise network infrastructure.
CA
Certificate Authority or Certification Authority. Entity in a public key infrastruc-
ture system that issues certificates to clients. A certificate signing request
received by the CA is converted into a certificate when the CA adds a signa-
ture generated with a private key. See digital certificate.
CAC
Call Admission Control. CAC regulates traffic volume in voice communica-
tions. CAC can also be used to ensure or maintain a certain level of audio
quality in voice communications networks.
CALEA
Communications Assistance for Law Enforcement Act. To comply with the
CALEA specifications and to allow lawful interception of Internet traffic by the
law enforcement and intelligence agencies, the telecommunications carriers
and manufacturers of telecommunications equipment are required to modify
and design their equipment, facilities, and services to ensure that they have
built-in surveillance capabilities.
Campus AP Campus APs are used in private networks where APs connect over private
links (LAN, WLAN, WAN or MPLS) and terminate directly on controllers.
Campus APs are deployed as part of the indoor campus solution in enter-
prise office buildings, warehouses, hospitals, universities, and so on.
captive portal A captive portal is a web page that allows the users to authenticate and sign
in before connecting to a public- access network. Captive portals are typically
used by business centers, airports, hotel lobbies, coffee shops, and other
venues that offer free Wi-Fi hotspots for the guest users.