The IEEE standard that specifies carrier sense media access control and physical layer specifications for 1- and 2-megabit-per-second (Mbps) wireless LANs.
The IEEE standard that specifies carrier sense media access control and physical layer specifications for 5.5- and 11-Mbps wireless LANs.
A wireless LAN data transceiver that uses radio waves to connect a wired network with wireless stations.
A Microsoft program that enables desktop-to-Windows CE device connection in order to transfer files.
Ad Hoc Network
A wireless network composed of stations without access points.
A set of characters that contains both letters and numbers.
A station is configured properly to allow it to wirelessly communicate with an access point.
Specifies the amount of the frequency spectrum that is usable for data transfer. It identifies the maximum data rate that a signal can attain on the medium without encountering significant power loss.
A modulation technique used by IEEE 802.11-compliant wireless LANs for transmission at 1 Mbps.
Broadcast key rotation
A security feature for use with dynamic WEP keys. If your client adapter uses LEAP or EAP-TLS authentication and you enable this feature, the access point changes the dynamic broadcast WEP key that it provides at the interval you select.
A self-contained file with a .cab extension used for application installation and setup. In a cabinet file, multiple files are compressed into one file. Cabinet files are commonly found on software distribution disks.
Complementary code keying. A modulation technique used by IEEE 802.11-compliant wireless LANs for transmission at 5.5 and 11 Mbps.
Windows CE Application Manager. The desktop Windows CE Services component that provides a desktop-to-device application management tool. It is responsible for adding and removing applications on the Windows CE device and for deleting the application files from the desktop computer. CeAppMgr is included with every installation of Windows CE Services.
A radio device that uses the services of an access point to communicate wirelessly with other devices on a local area network.
Carrier sense multiple access. A wireless LAN media access method specified by the IEEE 802.11 specification.
Cyclic Redundancy Check (CRC)
A method of checking for errors in a received packet.
The range of data transmission rates supported by a device. Data rates are measured in megabits per second (Mbps).
A ratio of decibels to an isotropic antenna that is commonly used to measure antenna gain. The greater the dBi value, the higher the gain and the more acute the angle of coverage.
Dynamic Host Configuration Protocol. A protocol available with many operating systems that automatically issues IP addresses within a specified range to devices on the network. The device retains the assigned address for a specific administrator-defined period.
A type of low-gain (2.2-dBi) antenna consisting of two (often internal) elements.
Domain Name Server
A network server that translates text names to IP addresses.
Domain Name System (DNS)
Provides names for computers using alphanumeric characters instead of numbers like IP addresses use. Maintains a database of the host alphanumeric names and their corresponding IP addresses.
Direct-sequence spread spectrum. A type of spread spectrum radio transmission that spreads its signal continuously over a wide frequency band.
Packets that were received twice because an acknowledgement got lost and the sender retransmitted the packet.
Extensible Authentication Protocol. EAP is the protocol for the optional IEEE 802.1X wireless LAN security feature. An access point that supports 802.1X and EAP acts as the interface between a wireless client and an authentication server, such as a Remote Authentication Dial-In User Service (RADIUS) server, to which the access point communicates over the wired network.
The most widely used wired local area network. Ethernet uses carrier sense multiple access (CSMA) to allow computers to share a network and operates at 10, 100, or 1000 megabits per second (Mbps), depending on the physical layer used.
A repository for files so that a local area network can share files, mail, and programs.
Software that is programmed on a memory chip and kept in a computer's semi-permanent memory.
The size at which packets will be fragmented and transmitted a piece at a time instead of all at once. The setting must be within the range of 64 to 2312 bytes.
A device that connects two otherwise incompatible networks together.
Gigahertz. One billion cycles per second. A unit of measure for frequency.
A set of characters consisting of ten numbers and six letters (0-9, A-F, and a-f).
Handheld Personal Computer. One of the three defined types of Windows CE devices.
Institute of Electrical and Electronic Engineers. A professional society serving electrical engineers through its publications, conferences, and standards development activities. The body responsible for the Ethernet 802.3 and wireless LAN 802.11 specifications.
The wired Ethernet network.
A device that connects client adapters to a wired LAN, such as an access point, bridge, or base station.
The Internet Protocol (IP) address of a station.
IP Subnet Mask
The number used to identify the IP subnetwork, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
An antenna that radiates its signal 360 degrees both vertically and horizontally in a perfect sphere.
LEAP, or EAP-Cisco Wireless, is the 802.1X authentication type that is available on Windows CE devices. Support for LEAP is provided in the client adapter's firmware and the Cisco software that supports it, rather than in the operating system. With LEAP, a username and password are used by the client adapter to perform mutual authentication with the RADIUS server through an access point.
The Media Access Control (MAC) address is a unique serial number assigned to a networking device by the manufacturer.
Message integrity check. MIC prevents bit-flip attacks on encrypted packets. During a bit-flip attack, an intruder intercepts an encrypted message, alters it slightly, and retransmits it, and the receiver accepts the retransmitted message as legitimate. The client adapter's driver and firmware must support MIC functionality, and MIC must be enabled on the access point.
Any of several techniques for combining user information with a transmitter's carrier signal.
Packets transmitted to multiple stations.
The echoes created as a radio signal bounces off of physical objects.
Packets that were discarded because the access point had a temporary overload of packets to handle.
A basic message unit for communication across a network. A packet usually includes routing information, data, and sometimes error detection information.
Pocket-sized Personal Computer. One of the three defined types of Windows CE devices.
Quadruple Phase Shift Keying
A modulation technique used by IEEE 802.11-compliant wireless LANs for transmission at 2 Mbps.
The frequency at which a radio operates.
A linear measure of the distance that a transmitter can send a signal.
A measurement of the weakest signal a receiver can receive and still correctly translate it into data.
Radio frequency. A generic term for radio-based technology.
A feature of some access points that allows users to move through a facility while maintaining an unbroken connection to the LAN.
The packet size at which an access point will issue a request to send (RTS) before sending the packet.
A radio transmission technology that spreads the user information over a much wider bandwidth than otherwise required in order to gain benefits such as improved interference tolerance and unlicensed operation.
Service set identifier. A unique identifier that stations must use to be able to communicate with an access point. The SSID can be any alphanumeric entry up to a maximum of 32 characters.
Temporal Key Integrity Protocol. Also referred to as WEP key hashing. A security feature that defends against an attack on WEP in which the intruder uses the initialization vector (IV) in encrypted packets to calculate the WEP key. TKIP removes the predictability that an intruder relies on to determine the WEP key by exploiting IVs.
The power level of radio transmission.
Packets transmitted in point-to-point communication.
A Windows CE tool that unpacks a Windows CE .cab file to install an application on a device. It is included with most Windows CE devices.
Wired equivalent privacy. An optional security mechanism defined within the 802.11 standard designed to protect your data as it is transmitted through your wireless network by encrypting it through the use of encryption keys.
A computing device with an installed client adapter.