Linksys WPC54GX manual Wireless-G Notebook Adapter with SRX

Page 41

Wireless-G Notebook Adapter with SRX

EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.

EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.

EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) - A mutual authentication method that uses digital certificates.

Encryption - Encoding data transmitted in a network.

Ethernet - A networking protocol that specifies how data is placed on and retrieved from a common transmission medium.

Finger - A program that tells you the name associated with an e-mail address.

Firewall - A set of related programs located at a network gateway server that protects the resources of a network from users from other networks.

Firmware - The programming code that runs a networking device.

Fragmentation -Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet.

FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network.

Full Duplex - The ability of a networking device to receive and transmit data simultaneously.

Gateway - A device that interconnects networks with different, incompatible communications protocols.

Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time.

Hardware - The physical aspect of computers, telecommunications, and other information technology devices.

HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web.

Infrastructure - A wireless network that is bridged to a wired network via an access point.

IP (Internet Protocol) - A protocol used to send data over a network.

IP Address - The address used to identify a computer or device on a network.

Appendix D: Glossary

36

Image 41
Contents Wireless- G Copyright and Trademarks Table of Contents Front Panel List of Figures22 Radius EAP-TLS What’s in this Guide? IntroductionWelcome Introduction What’s in this Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout LED Indicators Getting to Know the Wireless-G Notebook Adapter with SRXOverview Setting up the Wireless-G Notebook Adapter with SRXRunning the Setup Wizard Setup Wizard’s Ssid Wireless Network Name Screen WEP Setup Wizard’s Check Settings Screen Setup Wizard’s Congratulations Screen Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status Wireless Network Statistics Site Information Site SurveyProfile Information ProfilesEnter Profile Name Creating a New Profile10 Wireless Mode for New Profile 12 Wireless Security WEP for New Profile 14 Wireless Security WPA-Personal 16 Wireless Security WPA-Enterprise EAP-TLS EAP-PEAP 22 Radius EAP-TLS 24 Radius EAP-PEAP 26 Congratulations Frequently Asked Questions Appendix a TroubleshootingCommon Problems and Solutions What is the Ieee 802.11b standard? What is roaming? What is WEP? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Notebook Adapter with SRX TCP/IP Appendix C Windows HelpAppendix D Glossary Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX WPC54GX Appendix E SpecificationsLimited Warranty Appendix F Warranty InformationFCC Statement Appendix G Regulatory InformationSafety Notices Appendix H Contact Information
Related manuals
Manual 51 pages 20.95 Kb