
Appendix A
A.1 Glossary of Terms
SCALANCE W1750D CLI
728
Function Manual, 03/2019, C79000-G8976-C452-04
ACE
Access Control Entry. ACE is an element in an ACL that includes access
control information.
ACI
Adjacent Channel Interference. ACI refers to interference or interruptions
detected on a broadcasting channel, caused by too much power on an adja-
cent channel in the spectrum.
ACL
Access Control List. ACL is a common way of restricting certain types of traf-
fic on a physical port.
Active Directo-
ry
Microsoft Active Directory. The directory server that stores information about
a variety of things, such as organizations, sites, systems, users, shares, and
other network objects or components. It also provides authentication and
authorization mechanisms, and a framework within which related services
can be deployed.
ActiveSync
Mobile data synchronization app developed by Microsoft that allows a mobile
device to be synchronized with either a desktop or a server running compati-
ble software products.
ad hoc network An ad hoc network is a network composed of individual devices communi-
cating with each other directly. Many ad hoc networks are Local Area Net-
works (LANs) where computers or other devices are enabled to send data
directly to one another rather than going through a centralized access point.
ADO
Active X Data Objects is a part of Microsoft Data Access Components
(MDACs) that enables client applications to access data sources through an
(Object Linking and Embedding Database) OLE DB provider. ADO supports
key features for building client-server and Web-based applications.
ADP
Aruba Discovery Protocol. ADP is an Aruba proprietary Layer 2 protocol. It is
used by the APs to obtain the IP address of the TFTP server from which it
downloads the AP boot image.
AES
Advanced Encryption Standard. AES is an encryption standard used for en-
crypting and protecting electronic data. The AES encrypts and decrypts data
in blocks of 128 bits (16 bytes), and can use keys of 128 bits, 192 bits, and
256 bits.
AIFSN
Arbitrary Inter-frame Space Number. AIFSN is set by the AP in beacon
frames and probe responses. AIFS is a method of prioritizing a particular
category of traffic over the other, for example prioritizing voice or video mes-
sages over email.
AirGroup
The application that allows the end users to register their personal mobile
devices on a local network and define a group of friends or associates who
are allowed to share them. AirGroup is primarily designed for colleges and
other institutions. AirGroup uses zero configuration networking to allow Apple
mobile devices, such as the AirPrint wireless printer service and the AirPlay
mirroring service, to communicate over a complex access network topology.
AirWave Man-
agement Client
AirWave Management Client is a Windows software utility that enables client
devices (such as a laptop) to act as passive RF sensors and augments the
AirWave RAPIDS module.