Appendix c – glossary – EnGenius Technologies EOA7530 User Manual

Page 78

Advertising
background image

77 

Appendix C – Glossary 

 

 
 
Access Point   

A base station in a WLAN that act as a central transmitter and receiver of WLAN radio signals.

Ad Hoc Network 

Ad hoc network refers to a short-term WLAN framework created between two or more WLAN

adapters, without going through an Access Point. An ad hoc network allows computers to "talk"

(send data) directly to and from one another. For an ad hoc network to work, each computer on the

network needs a WLAN card installed configured for Ad Hoc mode.

Antenna   

A device that transmits and receives radio-frequency (RF) signals. Often camouflaged on existing

buildings, trees, water towers or other tall structures, the size and shape of antennas are generally

determined by the frequency of the signal they manage.

Authentication   

A process that verifies the identity of a wireless device or end-user. One of the most common

forms of authentication is to verify identities by checking a user name and password to allow

network access.

Backbone   
A high‐speed line or series of connections forming a major pathway within a network.   

Bandwidth 
The portion of the frequency spectrum required to transmit desired information. Each radio 
channel has a center frequency and additional frequencies above and below this carrier 
frequency which is used to carry the transmitted information. The range of frequencies from the 

lowest to the highest used is called the bandwidth. 

Bridge 

A wireless device that connects multiple networks that are physically separate or use different

media, but which use similar standards.

Bridge Mode   

An Access Pointy in bridge mode can operate as a WLAN bridge that connects two wired network 
segments. The peer device also must be in bridge mode. This wireless bridge connection is 
equivalent to a Wireless Distribution System (WDS). 

CHAP   

Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending 

passwords over the wire by using a challenge/response technique.   

 

Collision 

Interference that occurs when two network devices transmit data at the same time. The network

detects the collision of the two transmitted packets and discards both of them.

Advertising