Beacon ― A beacon is a packet broadcast by the Access Point to keep the network
synchronized. Included in a beacon are information such as wireless LAN service
area, the AP address, the Broadcast destination addresses, time stamp, Delivery
icator Message (TIM).
Bit ― A binary digit, which is either -0 or -1 for value, is the smallest unit for data.
networking function that incorporates the lowest 2 layers of the
SI network protocol model.
gram that enables one to read the content and interact
the World Wide Web or Intranet.
SMA/CA ― In local area networking, this is the CSMA technique that combines
ision
having collisions occur a second time. This works
best if f
situatio
CSMA/C N
access me ,
it checks
random a g. If the network is quiet and two devices
access t
detected,
DHCP ― nfiguration Protocol, which is a protocol that lets
etwork administrators manage and allocate Internet Protocol (IP) addresses in a
must be entered in manually the IP address. DHCP enables the network
dministrators to assign the IP from a central location and each computer receives an
t Sequence Spread Spectrum. DSSS generates a redundant bit pattern
be transmitted. This bit pattern is called a chip (or chipping code). The
nger the chip, the greater the probability that the original data can be recovered.
al
he original data without the need for
Traffic Indicator Maps, and the Traffic Ind
Bridge ― An inter
O
Browser ― An application pro
in
BSS ― BSS stands for “Basic Service Set”. It is an Access Point and all the LAN
PCs that associated with it.
Channel ― The bandwidth which wireless Radio operates is divided into several
segments, which we call them “Channels”. AP and the client stations that it
associated work in one of the channels.
C
slotted time-division multiplexing with carrier sense multiple access/coll
detection (CSMA/CD) to avoid
the time allocated is short compared to packet length and if the number o
ns is small.
D ― Carrier Sense Multiple Access/Collision Detection, which is a LA
thod used in Ethernet. When a device wants to gain access to the network
to see if the network is quiet (senses the carrier). If it is not, it waits a
mount of time before retryin
he line at exactly the same time, their signals collide. When the collision is
they both back off and wait a random amount of time before retrying.
Dynamic Host Co
n
network. Every computer has to have an IP address in order to communicate with
each other in a TCP/IP based infrastructure network. Without DHCP, each computer
a
IP address upon plugged with the Ethernet cable everywhere on the network.
DSSS ― Direc
for each bit to
lo
Even if one or more bits in the chip are damaged during transmission, statistic
techniques embedded in the radio can recover t
83