B Series.book Page 99 Friday, May 19, 2006 3:00 PM

W I r e l e s s L A N U s e r ’ s G u i d e

Wireless LAN Glossary

GLOSSARY

Ad Hoc Mode

Ad Hoc Mode refers to a wireless network architecture where wireless network connectivity between multiple computers is established without a central wireless network device, typically known as Access Points. Connectivity is accomplished using only client devices in a peer-to-peer fashion. For details, refer to “Ad hoc connection” on page 92.

Channel

Range of narrow-band frequencies used by the WLAN device to transmit data. IEEE802.11b/g - 11 channels, 22 MHz wide channels.

DHCP (Dynamic Host Configuration Protocol)

A protocol that provides a means to dynamically allocate IP addresses to computers on a local area network.

DNS (Domain Name System)

A data query service that provides a mechanism with which to translate host names into Internet addresses.

IEEE802.11a

Wireless LAN standard that supports a maximum data rate of 54 Mbps. 802.11a devices operate in the 5 GHz lower and middle UNII bands.

IEEE802.11b

Wireless LAN standard that supports a maximum data rate of 11 Mbps. 802.11b devices operate in the 2.4 GHz ISM band.

Access point

Wireless network device used to bridge wireless and wired network traffic.

IP address

The logical 32-bit host address defined by the Internet Protocol that uniquely identifies a computer on a network. The IP address is usually expressed in dotted decimal notation.

LAN (Local Area Network)

A LAN or Local Area Network is a computer network (or data communications network) which is confined to a limited geographical area.

MAC address (Media Access Control Address)

A MAC address (also called an Ethernet address or IEEE MAC address) is the 48-bit address (typically written as twelve hexadecimal digits, 0 through 9 and A through F, or as six hexadecimal numbers separated by periods or colons, e.g., 0080002012ef, 0:80:0:2:20:ef) which uniquely identifies a computer that has an Ethernet interface.

MTU (Maximum Transmission Unit)

The maximum size of data which can be transmitted at one time in networks including the Internet. In an envi- ronment whose maximum size of data is too large to correctly receive data, normal communications can be restored by setting the size of MTU to a smaller value.

Network key

Data that is used for encrypting data in data communi- cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication.

Network name (SSID: Service Set Identifier)

When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with “Network name (SSID)”. In order to improve security, the network key is set allowing no communication unless “Network name (SSID)” coincides with the network key.

Open system authentication

Null authentication method specified in the 802.11 stan- dard that performs no authentication checks on a wire- less client before allowing it to associate.

PPPoE (Point to Point Protocol over Ethernet)

A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet.

Protocol

A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into proce- dures.

Shared key authentication

99

Page 107
Image 107
Fujitsu Siemens Computers B6210 manual Wireless LAN Glossary

B6210 specifications

Fujitsu Siemens Computers B6210 is a remarkable mobile computing device that was geared towards business professionals who seek a balance of performance, portability, and reliability. This laptop, which emerged in the mid-2000s, is often remembered for its robust design and efficient functionality, making it an appealing option for those who needed a dependable machine for work on the go.

One of the key features of the B6210 is its compact design. Weighing in at just around 1.5 kilograms, this laptop is lightweight and easily portable, allowing users to carry it effortlessly between meetings, presentations, or any business engagements. Its sleek chassis not only enhances its aesthetic appeal but also emphasizes durability, ensuring it can withstand the rigors of daily use.

The B6210 is powered by Intel's processors of the time, which provided a solid performance for multitasking and running various applications. The device typically features the Intel Core Duo or Core 2 Duo processors, enabling users to handle demanding tasks with relative ease. Complementing the processing power is a memory capacity that can accommodate up to 4 GB of RAM, ensuring smooth performance even when running several applications simultaneously.

In terms of connectivity, the Fujitsu Siemens Computers B6210 is equipped with a variety of ports, including USB 2.0 ports, a VGA port, and a card reader, which facilitate easy connections to other devices and peripherals. Additionally, built-in Wi-Fi capabilities allow for seamless internet access, keeping professionals connected wherever they are.

The laptop boasts a 12.1-inch display, which strikes a good balance between visibility and portability. The screen supports resolutions up to 1280x800 pixels, providing crisp visuals for presentations and documents, while the anti-glare coating minimizes reflections, contributing to a comfortable viewing experience in various lighting conditions.

Security features are also a notable characteristic of the B6210. It often includes a fingerprint scanner, ensuring that sensitive data remains protected. Moreover, the laptop can come with a Trusted Platform Module (TPM) for enhanced data encryption and security.

Overall, the Fujitsu Siemens Computers B6210 embodies the essence of a reliable business laptop, providing essential features and technologies tailored for professionals. Its combination of portability, performance, and security makes it a noteworthy contender in the realm of mobile computing.