Appendix A
A.1 Glossary of Terms
SCALANCE W1750D CLI
736 Function Manual, 03/2019, C79000-G8976-C452-04
Elliptical Curve Cryptography or Error correcting Code memory. Elliptical
Curve Cryptography is a public
-key encryption technique that is based on
elliptic curve theory used for creating faster, smaller, and more efficient cryp-
togr
aphic keys. Error Correcting Code memory is a type of computer data
storage that can detect and correct the most common kinds of internal data
corruption. ECC memory is used in most computers where data corruption
cannot be tolerated under any circumstance
s, such as for scientific or finan-
Elliptic Curve Digital Signature Algorithm. ECDSA is a cryptographic algo-
rithm that supports the use of public or private key pairs for encrypting and
decrypting information.
Distributed Channel Access. The EDCA function in the IEEE
802.11e Quality of Service standard supports differentiated and distributed
access to wireless medium based on traffic priority and Access Category
types. See WMM and WME.
ateway Routing Protocol. EIGRP is a routing protocol
used for automating routing decisions and configuration in a network.
Effective Isotropic Radiated Power or Equivalent Isotropic Radiated Power.
EIRP refers to the output power generated when a signal is concentrated into
a smaller area by the Antenna.
External Services Interface. ESI provides an open interface for integrating
security solutions that solve interior network problems such as viruses,
worms, spyware, and corporate compliance.
Extended Service Set. An ESS is a set of one or more interconnected BSSs
that form a single sub network.
Extended Service Set Identifier. ESSID refers to the ID used for identifying an
extended service set.
Ethernet is a network protocol for data transmission over LAN.
End User License Agreement. EULA is a legal contract between a software
application publisher or author and the users of the application.
Federal Communications Commission. FCC is a regulatory body that defines
standards for the interstate and international communications by radio, tele-
vision, wire, satellite, and cable.
Fast Fourier Transform. FFT is a frequency analysis mechanism that aims at
faster conversion of a discrete signal in time domain into a discrete frequency
domain representation. See also DFT.
Frequency Hopping Spread Spectrum. FHSS is transmission technique that
allows modulation and transmission of a data signal by rapidly switching a
carrier among many frequency channels
in a random but predictable se-
Forwarding Information Base. FIB is a forwarding table that maps MAC ad-
dresses to ports. FIB is used in network bridging, routing, and similar func-
tions to identify the appropriate interface for forwarding packets.
Federal Information Processing Standards. FIPS refers to a set of standards
that describe document processing, encryption algorithms, and other infor-
mation technology standards for use within non
-military government agen-
government contractors and vendors who work with these