|
| Using |
|
|
|
| (Continued) |
|
|
|
|
| Term | Definition |
|
|
|
| Encryption | An alphanumeric (letters and/or numbers) |
|
| conversion process of data primarily used for |
|
| protection against any unauthorized |
|
| person(s). |
|
|
|
| Hotspots | Public or private areas where you can |
|
| access |
|
| connections can be located, for example, at |
|
| a library, cyber cafe, hotel, airport lounge, |
|
| or convention center. This service can be free |
|
| or sometimes requires a fee. |
|
|
|
| Infrastructure | This connection mode uses wireless access |
|
| points to connect to networks. |
|
|
|
| Internet Protocol (IP) | A |
| Address | or receiver of information that is sent in |
|
| packets across the Internet. For example, |
|
| when you request an HTML page or send |
|
| |
|
| includes your IP address in the message. In |
|
| this example, this information identifies your |
|
| computer as the sender and/or receiver of |
|
| information. |
|
|
|
| Media Access Control | A computer’s unique hardware number in a |
| (MAC) Address | network, which also can provide security for |
|
| wireless networks. When a network uses a |
|
| MAC table, only the 802.11 radios (wireless |
|
| devices) that have had their MAC addresses |
|
| added to that network’s MAC table can |
|
| access the network. |
|
|
|
|
| (Continued) |
User’s Guide |