Infrastructure Mode—Networks that function in infrastructure mode consist of devices that communicate with each other through an access point.Wireless devices can communicate with wired networks or other wireless devices by going through an access point. Infrastructure mode is also called a Basic Service Set (BSS), if it consists of wireless devices and a wired network. Networks that function in infrastructure mode are most useful when a WLAN requires access to a wired LAN for services such as file sharing and printing.

IP Address—An Internet Protocol (IP) address is an identifier for a device or computer on a TCP/IP network. An IP address is a 32-bit numeric address written as four numbers separated by decimal points. 0 to 255 is the available range for each number.

1.225.37.123 is an example of a valid IP address.

LAN—A local-area network (LAN) is a computer network that spans a relatively small area, such as one building or a small group of buildings. Each node in a LAN can access data and devices anywhere on the LAN. However, each node must have a separate CPU to execute programs.

MAC Address—A Media Access Control (MAC) address is an identifier for each node of a network. MAC addresses are unique hardware numbers assigned to each computer or device. A MAC address consists of twelve numbers written as six pairs separated by colons or dashes. 11:22:33:44:55:66 is an example of a valid MAC address.

Node—A node is any device or computer on a network.

SSID—A Service Set Identifier (SSID) is an alphanumeric identifier that acts as a password for devices on a WLAN. SSIDs are case-sensitive and consist of a minimum of two characters and a maximum of 32 characters. SSIDs can function as rudimentary security and can also be used for network segmenting. SSIDs differentiate between WLANs, so all access points and devices attempting to connect to a specific WLAN must use identical SSIDs. myssid is an example of a valid SSID.

TCP/IP—Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communications protocols for connecting hosts to the Internet.TCP/IP is the industry standard for transmitting data over networks.

WEP—Wired Equivalent Privacy (WEP) is a security measure available for WLANs to help them be as secure as wired LANs.WEP provides security by encrypting data so it is protected as it is transmitted over radio waves.To read encrypted files you must have access to the password, or key, that decrypts the files.

WEP key—A WEP key is a decryption key, or password, that is required to access any WEP-encrypted data.To effectively enable WEP encryption, you must enter your WEP key.

Wi-Fi—Wireless Fidelity (Wi-Fi) refers to any wireless networking equipment that adheres to 802.11 standards.

Wireless Notebook Adapter—A wireless notebook adapter is a 32-bit wireless connection device that fits in the PC card slot of a notebook computer. Wireless Zero Configuration Service—Windows XP offers the Wireless Zero Configuration Service to support 802.11b and 802.11g wireless networking.This service automatically polls the area for available wireless access points. If an available wireless access point is found,Windows attempts to connect to the access point. If no available wireless access points are found, you must manually add the access points.

WLAN—A wireless local-area network (WLAN) is a local-area network that uses high- frequency radio waves to communicate between nodes.

23 24

Page 13
Image 13
Buffalo Technology WLI-PCI-G54 user manual Node-A node is any device or computer on a network