Key Terms


Don't let unfamiliar terms discourage you from learning all you can about wireless home networking. If you don't completely understand what one of these words means, flip to the indicated page, read the full definition there, and find techniques related to that term.

Access point

A hardware device that acts as the central connecting point for wireless-enabled devices.

Page 4



Ad Hoc mode

A computer-to-computer wireless connection mode that allows WiFi-enabled computers to connect directly without communicating through an intermediary device such as a WiFi access point.

109



Adapter

A device that allows a computer to participate in the network. The adapter takes the data from the computer and prepares it for transmission over a network medium such as network cabling or WiFi radio signals.

10



Authentication key

A hexadecimal character string used to validate a user or device as the intended connection point or recipient of a data stream.

284



DHCP client

A computer that has been configured for the TCP/IP protocol so that the IP address (and subnet mask) is automatically assigned to the computer by a device that can act as a DHCP server such as your WiFi router.

145



Driver

Software for a device such as a WiFi network adapter that allows the operating system and the device to communicate correctly.

103



Dynamic Host Configuration Protocol (DHCP)

A protocol used by DHCP servers and clients to negotiate the dynamic assignment of IP addresses over a network. The DHCP server (such as a WiFi router) provides the DHCP client with the IP address.

145



Encryption

The translation of a message into a secret code. After a message is encrypted, a key or other identification method (such as a password) is needed to decipher the message.

285



Firewall

Software, hardware, or both software and hardware designed to prevent unauthorized access to a private network. A firewall can be used to block both incoming and outgoing data traffic.

269



Flash drive

A portable flash memory drive that can be attached to a computer through a USB port. They provide an excellent way to transfer limited amounts of data between computers.

232



Gateway

A device that serves as an intermediary between two different types of networks. In the case of wireless networks, the WiFi router is the gateway.

150



Hotspot

A connection point to the Internet provided by a business or other establishment. The connection point is typically a WiFi router or access point provided by a particular business such as a coffee shop or hotel.

Page 212



Hub

A connectivity device that provides multiple LAN ports. Computers can be connected to these LAN ports using network cabling.

68



IP address

A dotted-decimal representation of a binary address that is uniquely assigned to each computer and device running on an IP network.

126



Limited user

A user account without administrative abilities. This user can change desktop settings and change the password and user account picture.

43



MAC (Media Access Control) hardware address

A 48-bit hexadecimal number burned onto a ROM chip on a network adapter (for a computer on the network) or network interface card (for a router).

295



Malware

Malicious software such as viruses, worms, and spyware.

306



Mapped drive

A shared folder or drive that is given a drive letter on your computer. Mapping a remote shared folder to a drive letter makes the shared folder accessible from My Computer.

170



.NET Passport

A user account that provides access to personalized and special Microsoft web content.

55



Network adapter

A device that allows a computer to participate in the network. The network adapter takes the data from the computer and prepares it for transmission over a network medium such as network cabling or WiFi radio signals.

10



Normal backup

A backup method that backs up all selected files to the backup archive file and flags the files as having been backed up.

240



Passphrase

A text string similar to a password used to configure a WiFi device for WEP or WPA security. Because the passphrase is generated by the WiFi router, the passphrase is used in the WiFi adapters' settings to configure the device with the correct encryption key.

288



Phishing

The process of trying to fool people into giving up personal information, including credit card numbers, by directing them to a website using an official-looking email that purports to be from a egitimate website or web service.

328



Port

A numbered communication channel or end point used by an Internet application as the avenue or doorway for negotiating data transfers between two computers.

Page 188



Port forwarding

A method of opening ports on the WiFi router that allows outside requests for services to reach computers on the internal network supplying those services, such as a web server.

191



Port triggering

A way to temporarily open a port on the WiFi router when an external request for that port is received by the router. Port triggering does not leave ports open (as port forwarding does) and does not allow the IP address of the internal computer supplying the service to be known.

191



Profile

A set of configuration options for your WiFi network adapter that have been saved under a profile name. Saving the profile allows you to quickly recall these settings at any time from the WiFi adapter's configuration software.

118



Protocol

A set of software rules that dictate how computers and other devices communicate over a network architecture such as Ethernet.

6



Restore point

A snapshot of your computer's settings and installed software that can be restored to your system. Restore points can be used to correct problems on your system by restoring the computer to an earlier time when it was operating properly.

257



Router

A device that provides a connection for a home network to a high-speed Internet connection (which is, in turn, provided by a device such as a cable modem). The WiFi router is an intelligent device in that it can be configured to make decisions about the type of access that can be made to the high-speed Internet connection and what type of data traffic can be allowed through the router onto the local area network.

10



Share

A drive or folder that is shared on the network.

156



Spyware

Malware that infects your computer through free software and downloads from websites. Spyware gathers information related to the user, such as browsing preferences and information used in web transactions such as passwords and credit card numbers.

319



SSID (service set identifier)

A unique identifier (32 characters maximum) used to differentiate one WLAN from another. Devices attempting to connect to a particular WLAN must use the SSID configured for that WLAN.

77



Stateful Packet Inspection (SPI)

Data packets are inspected by the firewall and analyzed to determine their association with current network connections and service requests.

270



Subnet mask

A dotted decimal representation of a binary mask that is used by computers to determine the portion of an IP address that provides network information and the portion of the IP address that supplies computer address information.

Page 126



Switch

A more intelligent connectivity device than a hub that allows computers to connect to the network using network cabling.

68



TCP/IP (Transmission Control Protocol/Internet Protocol)

The protocol suite (or stack) that serves as the foundation for the mega-network known as the Internet. Nearly all computer operating systems embrace TCP/IP as their default networking protocol.

6



Trojan horse

Malware that appears to be a normal program but, when executed, causes harm to your system. The fact that the malicious program is masquerading as a "normal" program is why this particular type of malware is referred to as a Trojan horse.

309



Trusted computer

A computer that is specified in the router's configuration settings by its IP address as being exempt from the blocking of web content.

187



UPnP (Universal Plug and Play

A networking architecture that aids in the communication between UPnP-compliant devices such as computers on networks and the Internet.

203



Virus

Malicious, self-replicating software code that can infect computers and damage system and other files.

307



Wardriving

The process of driving around town with the purpose of identifying and mapping unsecured WiFi hotspots.

225



WEP (Wired Equivalent Privacy)

A WiFi security protocol that encrypts data and uses shared keys that allow for the encryption and decryption of the data at the sending and receiving ends of the data transfer. WEP was originally created for use with 802.11b networks.

284



WiFi router

See router.



WLAN (wireless local area network)

A network that is limited to one localized site (thus the "local" in the name).

4



Worm

Self-spreading and self-activating malware software code that typically exploits a particular weakness in an operating system.

309



WPA (WiFi Protected Access)

A WiFi security protocol that encrypts data and scrambles shared keys sent over the WiFi network. WPA also requires user authentication, providing greater security than WEP, which does not require user authentication.

286





Home Wireless Networking in a Snap
Home Wireless Networking in a Snap
ISBN: 0672327023
EAN: 2147483647
Year: 2007
Pages: 158
Authors: Joe Habraken

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net