| ZyAIR 100 Wireless PC Card |
|
|
Cryptoanalysis | The act of analyzing (or breaking into) secure documents or systems that are protected with |
| encryption. |
DCE | Data Communications Equipment is typically a modem or other type of communication |
| device. The DCE sits between the DTE (data terminal equipment) and a transmission circuit |
| such as a phone line. |
Decryption | The act of restoring an encrypted file to its original state. |
Directional | An antenna that concentrates transmission power into a direction thereby increasing coverage |
Antennae | distance at the expense of coverage angle. Directional antenna types include yagi, patch and |
| parabolic dish. |
Direct | A type of spread spectrum radio transmission that spreads its signal continuously over a wide |
Sequence | frequency band. |
Spread |
|
Spectrum |
|
(DSSS) |
|
DRAM | Dynamic RAM that stores information in capacitors that must be refreshed periodically. |
DTE | Originally, the DTE (data terminal equipment) meant a dumb terminal or printer, but today it |
| is a computer, or a bridge or router that interconnects local area networks. |
EMI | ElectroMagnetic Interference. The interference by electromagnetic signals that can cause |
| reduced data integrity and increased error rates on transmission channels. |
Encryption | The act of substituting numbers and characters in a file so that the file is unreadable until it is |
| decrypted. Encryption is usually done using a mathematical formula that determines how the |
| file is decrypted. |
ESSID | (Extended Service Set IDentification) The ESSID identifies the Service Set the station is to |
| connect to. Wireless clients associating to the Access Point must have the same ESSID. |
Ethernet | A very common method of networking computers in a LAN. There are a number of |
| adaptations to the IEEE 802.3 Ethernet standard, including adaptations with data rates of 10 |
| Mbits/sec and 100 Mbits/sec over coaxial cable, |
| latest version of Ethernet, Gigabit Ethernet, has a data rate of 1 Gbit/sec. |
Events | These are network activities. Some activities are direct attacks on your system, while others |
| might be depending on the circumstances. Therefore, any activity, regardless of severity is |
| called an event. An event may or may not be a direct attack on your system. |
FAQ | (Frequently Asked Questions) – FAQs are documents that list and answer the most common |
| questions on a particular subject. |
FCC | The FCC (Federal Communications Commission) is in charge of allocating the |
| electromagnetic spectrum and thus the bandwidth of various communication systems. |
Flash Memory | The nonvolatile storage that can be electrically erased and reprogrammed so that data can be |
| stored, booted and rewritten as necessary. |
Gateway | A gateway is a computer system or other device that acts as a translator between two systems |
| that do not use the same communication protocols, data formatting structures, languages |
| and/or architecture. |
Glossary | G |