Installing, Troubleshooting, and Repairing Wireless Networks phần 10

pdf
Số trang Installing, Troubleshooting, and Repairing Wireless Networks phần 10 47 Cỡ tệp Installing, Troubleshooting, and Repairing Wireless Networks phần 10 294 KB Lượt tải Installing, Troubleshooting, and Repairing Wireless Networks phần 10 0 Lượt đọc Installing, Troubleshooting, and Repairing Wireless Networks phần 10 0
Đánh giá Installing, Troubleshooting, and Repairing Wireless Networks phần 10
4.8 ( 20 lượt)
Nhấn vào bên dưới để tải tài liệu
Đang xem trước 10 trên tổng 47 trang, để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

354 Glossary keyboard. Under some applications programs, these two keys may have different functions; the numeric keypad Enter key may be used as an “enter data” key, while the alphanumeric keyboard Enter key may be used as a “carriage return.” Environment—An area of memory set up and used by the DOS software to store and retrieve a small amount of information that can be shared or referred to by many programs. Among other information that the DOS environment area can hold are the PATH, current drive, PROMPT, COMSPEC, and any SET variables. Escape sequence—A set of commands or parameters sent between devices to control operations; print text orientation or fonts, screen colors, and displays; or begin file transfer operations between systems. Many printers accept escape sequences to change typeface or between portrait and landscape modes. Screen displays and the DOS prompt may be controlled by ANSI escape sequences through the device driver ANSI.SYS. These sequences are started with the transmission or issuance of the ASCII ESC character (appearing similar to <-) or the ASCII control code Ctrl-Left Bracket (^[ , decimal 27, 1B hex), and follow with lettered or numbered command definitions. A common sequence is ESC-2-j, possibly appearing as ^[2J on your screen, which is the Clear Screen ANSI escape sequence. Executable file—A program file that may be invoked from the operating system. Dynamically linked libraries (DLLs) and overlay files also contain executable program information, but their functions must be invoked from within another program. Execute—The action that a computer takes when it is instructed to run a program. A running program is said to “execute” or “be executing” when it is being used. Expanded memory—This is an additional area of memory created and managed by a device driver program using the Lotus-IntelMicrosoft Expanded Memory Specification, known also as LIMSEMS. There are three common forms of EMS; that conforming to the LIMS-EMS 3.2 standard for software-only access to this memory, LIMS-EMS 4.0 in software, and LIMS-EMS 4.0 in hardware. With the proper hardware, this memory may exist and be used on all PC systems, from PCs to 486 systems. Expanded memory may be made up of extended memory (memory above 1 MB) on 386 and 486 Glossary 355 systems, or it may be simulated in extended memory on 286 systems. LIMS-EMS 3.2, 4.0 (software) and 4.0 (hardware) are commonly used for additional data storage for spreadsheets and databases. Only LIMS-EMS conforming to the 4.0 standard for hardware may be used for multitasking. Expanded memory resides at an upper memory address, occupying one 64 K block between 640 K and 1 MB. The actual amount of memory available depends on your hardware and the amount of memory you can assign to be expanded memory. The 64 K block taken up by expanded memory is only a window or port giving access to the actual amount of EMS available. There may be as little as 64 K or as much as 32 MB of expanded memory. Expanded memory manager (EMM)—The term often given to the software or that refers to expanded memory chips and cards. See also expanded memory. Expanded memory specification (EMS)—The IBM PC-industry standards for software and memory hardware that makes up expanded memory. Extended Industry Standard Architecture (EISA)—The definition of a PC internal bus structure that maintains compatibility with IBM’s original PC, XT, and AT bus designs (known as the ISA, or industry standard architecture), but offering considerably more features and speed between the computer system and adapter cards, including a definition for 32-bit PC systems that do not follow IBM’s MCA (MicroChannel Architecture). Extended memory—This is memory in the address range above 1 MB, available only on 80286 or higher systems. It is commonly used for random access memory (RAM) disks, disk caching, and some applications programs. Using a special driver called HIMEM.SYS, or similar services provided with memory management software, the first 64 K of extended memory may be assigned as a high memory area, which can be loaded into some programs and DOS. Extended memory specification (XMS)—A standard that defines access and control over upper, high, and extended memory on 286 and higher computer systems. XMS support is provided by loading the HIMEM.SYS device driver or other memory management software that provides XMS features. 356 Glossary Extended service set (ESS)—Multiple base service set (BSS) devices forming a network. Extensible authentication protocol (EAP)—An extension of the point-to-point (PPP) protocol that allows different, multiple authentication methods for access control. External command—A program or service provided as part of DOS that exists as separate programs on disk rather than built into the COMMAND.COM program that loads when you boot up your system. These programs have .COM or .EXE extensions. Some of these are FORMAT.COM, DISKCOPY.COM, DEBUG.EXE, LABEL.COM, MORE.COM, and PRINT.COM. FDISK—A special part of the hard disk formatting process required to assign and establish usable areas of the disk as either bootable, active, data-only for DOS, or as non-DOS for other operating system use. The FDISK process is to be performed between the low-level format and the DOS format of a hard disk prior to its use. File—An area of disk space containing a program or data as a single unit, referred to by the DOS file directory. Its beginning location is recorded in the file directory, with reference to all space occupied by the file recorded in the DOS file allocation table (FAT). Files are pieces of data or software that you work with on your computer. They may be copied, moved, erased, or modified, all of which is tracked by DOS for the directory and FAT. File allocation table (FAT)—This is DOS’ index to the disk clusters that files or FAT and directories occupy. It provides a table or pointer to the next disk cluster a file occupies. There are two copies of the FAT on a disk, for reliability. When files are erased, copied, moved, reorganized, or defragmented, the FAT is updated to reflect the new position of files or the availability of empty disk space. Files may occupy many different cluster locations on disk, and the FAT is the only reference to where all of the file pieces are. File attributes—See attributes. File name—The string of characters assigned to a disk file to identify it. A file name must be at least one, and may be up to eight, leading characters as the proper name for DOS-only systems, in which a file name may be followed by a three character extension, separated Glossary 357 from the proper name by a period (.). Windows 95, Windows 98, and Windows NT systems may have long file names of up to 256 characters, including multiple period or ‘dot’ separators. Allowable file name and extension characters are—A-Z, 0-9, !,@,#,$,^,&,_,,{,},(,).’,`,or ~. Also, much of the IBM extended character set may be used. Reserved characters that cannot be used are—%, *, +, =, ;, :,[, ], <, >, ?, /, \, |, “ and spaces. File names must be unique for each file in a directory, but the same name may exist in separate directories. Filenames are assigned to all programs and data files. File name extension—A string of one to three characters used after a file name and a separating period (.), with the same character limitations as the file name, for DOS systems. The extension is often used to identify and associate certain types of files to certain applications. DOS uses BAT, EXE, and COM as files it can load and execute, though this does not preclude the use of these extensions for nonexecutable files. The extensions SYS, DRV, and DVR are commonly used for device driver programs that are loaded and used in the CONFIG.SYS file prior to loading DOS (as COMMAND.COM). Refer to your software documentation for any limitations or preferences it has for file name extensions. Filespec—Also known as the file specification or file specifier, this is a combination of a drive designation, directory path, and file name used to identify a specific file in its exact location on your system’s disk drive. References to filespec may appear in examples or as prompts as—d:\path\filename.ext, where d: indicates that you are supposed to place you disk drive information here, \path\ indicates that you should specify the proper directory and subdirectory information here, and filename.ext indicates that you should specify the file’s exact name and extension. In use, this might actually be C:\DOS\COM\FORMAT.COM. Firewire—Texas Instrument’s name-brand for the Institute of Electrical and Electronics Engineers, Inc. (IEEE)-1394 high-speed serial interconnection standard. Firewire connections are typically used between high-end digital video cameras and peripheral storage devices. Firmware—Software embedded into a device such as a disk drive, video, or network adapter; wireless access point; or PC card, that controls and supports the functions of the device. The PC’s basic 358 Glossary input/output system (BIOS) and the startup code for most computers is firmware specific to the hosting computer board. Firmware resides in either read-only memory chips or in FLASH ROM rewriteable memory chips. The operating system used in personal digital assistants (PDAs) may also be considered firmware. First-in, first-out (FIFO) or FIFO buffering—A small capacity data storage element, memory or register that holds data flowing between a source and a destination. The data flow moves in the order in which it is received and cannot be accessed directly or randomly as with normal memory storage. A FIFO is commonly used in serial communication (COM) ports to retain data while applications software and storage devices catch up to and can store the incoming stream of data. Fixed disk—See hard disk. Flag—A hardware bit or register, or a single data element in memory that is used to contain the status of an operation, much like the flag on a mailbox signals the mail delivery person that you have an item to be picked up. Floppy disk—A slang term. See diskette. Format—The process of preparing a disk,(floppy or hard) with a specific directory and file structure for use by DOS and applications programs. Formatting may consist of making the disk usable for data storage only, providing reserved space to make the disk bootable later on, or making the disk bootable, including the copying of the DOS hidden files and COMMAND.COM. FORMAT is the final process of preparing a hard disk, preceded by a low-level format and FDISK. All disk media require a format. Random access memory (RAM) or virtual disks do not require formatting. Formatting, unless performed with certain types of software, erases all data from a disk. Fragmentation threshold—A parameter available in some access point and client wireless devices. If you experience a high packet error rate, a slight increase in this value to the maximum of 2,432 may help. Too low a value may result in very poor performance. Frame relay—A data communications circuit between two fixed points, a user and a Frame Relay routing service, capable of transfer rates between 64 Kbps up to T-1 rates. May be carried over part of a “Fractional T-1” circuit. Glossary 359 Frequency-hopping spread spectrum (FHSS)—FHSS is one of two types of spread spectrum radio; the other being direct sequence spread spectrum. FHSS is used where the data signal modulates a narrowband carrier that “hops” in a random, but predictable sequence from frequency to frequency. The signal energy is spread in time domain rather than chopping each bit into small pieces across multiple frequencies. FHSS is not as prone to interference because a signal from another system will only affect this signal if both are transmitting at the same frequency at the same time. Gateway—1. The Internet protocol (IP) address of the router, switch, cable, or digital subscriber line (DSL) modem through which your PCs gain access to the Internet or foreign (nonlocal) networks. 2. Network equipment that either bridges, repeats, or otherwise relays network traffic from one connection to another. Gigabyte (GB)—A unit of measure referring to 1,024 MB or 1,073,741,824 bytes of information, storage space, or memory. Devices with this capacity are usually large disk drives and tape backup units with 1.2 to well over 12 GB of storage area. Global system for mobile (GSM) communications—One of the leading digital cellular phone systems, using narrowband time division multiple access (TDMA), which allows eight simultaneous calls on the same radio frequency. It has little to do with wireless networking, but is one of many technologies tossed into the generic wireless arena. Hard disk—A sealed disk drive unit with platters mounted inside on a fixed spindle assembly. The actual platter is a hard aluminum or glass surface coated with magnetic storage media. This definition also suits removable hard disks in which the hard platters are encased in a sealed casing and mate with a spindle similar to the attachment of a floppy diskette to the drive motor. The platters are sealed to keep foreign particles from interfering with and potentially damaging the platters or the read/write heads that normally maintain a small gap between them during operation. Hardware interrupt—A signal from a hardware device connected to a PC system that causes the central processing unit (CPU) and computer program to act on an event that requires software manipulation, such as controlling mouse movements, accepting keyboard 360 Glossary input, or transferring a data file through a serial input/output (I/O) port. Head crash—The undesired, uncontrolled mechanical contact of a disk drive’s read/write heads with the disk surface. A minor crash may be recoverable with minimal data loss. A severe crash can render a disk or the head assembly completely useless. Minor to severe head crashes may be caused by mechanical shock, excessive vibration, or mishandling of a drive while it is operating. Not all disk errors or loss of data are the result of a physical crash and disk surface damage. Actual head crashes with disk damage are very rare, compared with loss of data due to the weakening of magnetic properties of an area of the disk, and program or operational errors. Hexadecimal—A base-16 numbering system made up of four digits or bits of information, where the least significant place equals one and the most significant place equals eight. A hexadecimal, or hex, number is represented as the numbers 0–9 and letters A–F, for the numerical range 0–15 as 0–F. A byte of hex information can represent from 0 to 255 different items, as 00 to FF. Hidden file—See attributes. High memory area (HMA)—A 64 K region of memory above the 1 MB address range created by HIMEM.SYS or a similar memory utility. The HMA can be used by one program for program storage, leaving more space available in the DOS or the low memory area from 0 to 640 K. High performance file system (HPFS)—A secure hard disk file system created for OS/2 and extended into the NT file system for Windows NT. Host adapter—A built-in or add-in card interface between a device, such as a small computer system interface (SCSI) hard disk or CDROM drive, and the input/output (I/O) bus of a computer system. A host adapter typically does not provide control functions, instead acting only as an address and signal conversion and routing circuit. Hub—A network device used to connect several network client devices onto the same network segment. See also switch. IBM PC compatible—A description of a personal computer (PC) system that provides the minimum functions and features of the Glossary 361 original IBM PC system and is capable of running the same software and using the same hardware devices. IEEE-1394—An Institute of Electrical and Electronics Engineers, Inc. (IEEE)-1394 standard for high-speed serial interconnection between computer peripherals—typically cameras and data storage systems. Industrial, scientific, and medical (ISM)—ISM applications are the production of physical, biological, or chemical effects such as heating, ionization of gases, mechanical vibrations, hair removal, and acceleration of charged particles. Uses include ultrasonic devices such as jewelry cleaners and ultrasonic humidifiers, microwave ovens, medical devices such as diathermy equipment and magnetic resonance imaging equipment, and industrial uses such as paint dryers. Radio frequency should be contained within the devices, but other users must accept interference from these devices. These devices can affect 802.11a and 802.11b services at 2.4 and 5 GHz. Industry Standard Architecture (ISA)—The term given to the IBM PC, XT, and AT respective 8- and 16-bit PC bus systems. Non32-bit, non-IBM MicroChannel Architecture systems are generally ISA systems. Infrastructure mode—An integrated wireless and wired LAN is called an infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. Input/output (I/O)—The capability or process of software or hardware to accept or transfer data between computer programs or devices. Insulation displacement connector (IDC)—The type of connector found on flat ribbon cables, used to connect input/output (I/O) cards and disk drives. Integrated drive electronics (IDE)—A standards definition for the interconnection of high-speed disk drives, in which the controller and drive circuits are together on the disk drive and interconnect to the PC input/output (I/O) system through a special adapter card. This standard is an alternative to earlier MFM, ESDI, and SCSI drive interfaces, and it is also part of the ATA standard. 362 Glossary Integrated services digital network (ISDN)—A technique of providing high-speed digital communications over conventional telephone wires, using signaling above and different from voice-range frequencies. ISDN uses three different signal channels over the same pair of wires, one D-channel for digital signaling such as dialing, and several enhanced, but seldom used telephone calling features, and two B-channels, each capable of handling voice or data communications up to 64 Kbps. ISDN lines may be configured as Point-to-Point (both B-channels would connect to the same destination) or multipoint (allowing each B-channel to connect to different locations), and Data+Data (B-channels can be used for data-only) or Data+Voice, where either B-channel may be used for data or voice transmission. Interconnection to an ISDN line requires a special termination/power unit, known as an NT-1 (network termination 1), which may or may not be built into the ISDN modem or router equipment at the subscriber end. An ISDN modem may be used and controlled quite similarly to a standard analog modem, and may or may not also provide voice-line capabilities for analog devices. An ISDN router must be configured for specific network addresses and traffic control and may or may not provide voice/analog line capabilities. Interlaced operation—A method of displaying elements on a display screen in alternating rows of pixels (picture elements) or scans across a display screen, as opposed to noninterlaced operation, which scans each row in succession. Interlacing often indicates a flickering or blinking of the illuminated screen. Interleave—The property, order, or layout of data sectors around disk cylinders to coincide with the speed of drive and controller electronics, so that data can be accessed as quickly as possible. An improper interleave can make a sector arrive too soon or too late at the data heads, and thus be unavailable when the drive and controller are ready for it, slowing disk system performance. An optimal interleave will have the rotation of the disk, placement of a data sector, and electronics coincident, so there is little or no delay in data availability. Interleave is set or determined at the time of a low-level format, which sets the order of the data sectors. Reinterleaving consists of shuffling data sectors to a pattern optimal for best performance. Internal command—A command that loads with and is available as part of the DOS command processor program, COMMAND.COM. DIR, Glossary 363 COPY, DEL, TYPE, and CLS are examples of some internal DOS commands. Internal command is the same as Built-in command. Also see your DOS manual. International Standards Organization (ISO)—A multifaceted, multinational group that establishes cross-border/cross-technology definitions for many industrial and consumer products. Related to the PC industry, it helps define electronic interconnection standards and tolerances. Internetwork packet exchange (IPX)—1. A networking protocol, IPX is a datagram protocol used for connectionless communications. 2. A device driver-type TSR program that interfaces a network interface card to the operating system. See also NETX. Interrupt—See hardware interrupt, interrupt request, and software interrupt. Interrupt request (IRQ)—This is a set of hardware signals available on the PC add-in card connections that can request prompt attention by the central processing unit (CPU) when data must be transferred to/from add-in devices and the CPU or memory. Keyboard—A device attached to the computer system that provides for manual input of alpha, numeric, and function key information to control the computer or place data into a file. Kilobyte (kB)—A unit of measure referring to 1,024 bytes or 8,192 bits of information, storage space, or memory. Label or volume label—A 1- to 11-character name recorded on a disk to identify it during disk and file operations. The volume label is written to disk with the DOS LABEL or FORMAT programs or with disk utility programs. This may be confused with the paper tag affixed to the outside of a diskette. See disk label. Language—The specifically defined words and functions that form a programming language or method to control a computer system. At the lowest accessible level, programmers can control a central processing unit’s (CPU’s) operations with assembly language. Applications programs are created initially in different high-level languages, such as BASIC, C, or Pascal, which are converted to assembly language for execution. DOS and applications may control the comput-
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.