I/O
Input/output. The term used to describe any operation, program, or device that transfers data to or
from a computer.
IP
Internet Protocol. A set of rules used to send and receive messages across local networks and the
Internet.
IP address
A 32-bit number that identifies each sender or receiver of information that is sent across the
Internet. An IP address has two parts: an identifier of a particular network on the Internet and an
identifier of the particular device (which can be a server or a workstation) within that network.
IPX-SPX
Internetwork Packet Exchange, is a networking protocol used by the Novell NetWare
®
operating
systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-
level protocols, such as Sequenced Packet Exchange (SPX) and NCP, are used for additional
error recovery services. SPX is a transport layer protocol (layer 4 of the OSI Model) used in Novell
Netware networks. The SPX layer sits on top of the IPX layer (layer 3) and provides connection-
oriented services between two nodes on the network. SPX is used primarily by client/server
applications.
ISDN
A type of broadband Internet connection that provides digital service from the
customer’s premises
to the dial-up telephone network. ISDN uses standard POTS copper wiring to deliver voice, data, or
video.
LAN
Local Area Network (LAN) is a system of connecting PCs and other devices within the same
physical proximity for sharing resources such as an Internet connections, printers, files, and drives.
Receive Sensitivity
The minimum signal strength required to pick up a signal. Higher bandwidth connections usually
have less receive sensitivity than lower bandwidth connections.
Router
A device that forwards data from one WLAN or wired local area network to another.
Transmit Power
The power at which the wireless devices transmits, usually expressed in mW or dBm.
MAC Address
Media Access Control (MAC) address is a unique code assigned to most forms of networking
hardware. The address is permanently assigned to the hardware, so limiting a wireless
network’s
access to hardware (such as wireless cards) is a security feature employed by closed wireless
networks. But an experienced hacker armed with the proper tools can still figure out an authorized
MAC address, masquerade as a legitimate address, and access a closed network.
Every wireless 802.11 device has its own specific MAC address hard-coded into it. This unique
identifier can be used to provide security for wireless networks. When a network uses a MAC table,
only the 802.11 radios that have had their MAC addresses added to that
network’s MAC table will
be able to get onto the network.
Proxy Server
Used in larger companies and organizations to improve network operations and security, a proxy
server is able to prevent direct communication between two or more networks. The proxy server
forwards allowable data requests to remote servers and/or responds to data requests directly from
stored remote server data.
RJ-45
Standard connectors used in Ethernet networks. RJ-45 connectors are similar to standard RJ-11
telephone connectors, but RJ-45 connectors can have up to eight wires, whereas telephone
connectors have four.
Server
A computer that provides its resources to other computers and devices on a network. These
include print servers, Internet servers and data servers. A server can also be combined with a hub
or router.
Site survey
The process whereby a wireless network installer inspects a location prior to installing a wireless
network. Site surveys are used to identify the radio- and client-use properties of a facility so that
access points can be optimally placed.
Sub network or
Subnet
Found in larger networks, these smaller networks are used to simplify addressing between
numerous computers. Subnets connect together through a router.
Switch
A type of hub that efficiently controls the way multiple devices use the same network so that each
can operate at optimal performance. A switch acts as a networks traffic cop: rather than
transmitting all the packets it receives to all ports as a hub does, a switch transmits packets to only
the receiving port.
Rev Version 1.4.1