Explanation of terms
Audio
ALAC (Apple Lossless Audio Codec)
This is a codec for lossless audio compression method developed by Apple Inc. This codec can be played back on iTunes, iPod or iPhone. Data compressed to approximately 60 – 70% can be decompressed to exactly the same original data.
AIFF (Audio Interchange File Format)
This is an uncompressed and lossless format for digital audio. Use AIFF files to burn high-quality audio CDs from imported songs. AIFF files use approximately 10 MB of disk space per minute.
DSD (Direct-Stream Digital)
One of the audio data recording methods, it is the signal aspect used to store audio signals on a super audio CD, and is Δ-Σ modulated digital audio. It is configured of an array of single bit values at a 2.8 MHz sampling rate.
FLAC
FLAC stands for Free lossless Audio Codec, and is a lossless free audio file format. Lossless means that the audio is compressed without any loss in quality.
The FLAC license is as shown below.
Copyright (C) 2000, 2001, 2002, 2003, 2004, 2005, 2006,2007, 2008, 2009 Josh Coalson
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Xiph.org Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
MP3 (MPEG Audio Layer-3)
This is an internationally standardized audio data compression scheme, using the “MPEG-1” video compression standard. It compresses the data volume to about one eleventh its original size while maintaining sound quality equivalent to a music CD.
MPEG (Moving Picture Experts Group), MPEG-2, MPEG-4
These are the names for digital compression format standards used for the encoding of video and audio. Video standards include “MPEG-1 Video”, “MPEG-2 Video”, “MPEG-4 Visual”, “MPEG-4 AVC”. Audio standards include “MPEG-1 Audio”, “MPEG-2 Audio”, “MPEG-4 AAC”.
WMA (Windows Media Audio)
This is audio compression technology developed by Microsoft Corporation.
WMA data can be encoded using Windows Media® Player. To encode WMA files, only use applications authorized by Microsoft Corporation. If you use an unauthorized application, the file may not work properly.
Sampling frequency
Sampling involves taking a reading of a sound wave (analog signal) at regular intervals and expressing the height of the wave at each reading in digitized format (producing a digital signal).
The number of readings taken in one second is called the “sampling frequency”. The larger the value, the closer the reproduced sound is to the original.
Bit rate
This expresses the read amount per 1 second of video/audio data recorded. A larger number means higher sound quality, but also means a larger file size.
Network
AES (Advanced Encryption Standard)
This is a next generation standard encryption method replacing the current DES and 3DES, and because of its high security it is expected to be applied widely to wireless LANs in the future. It uses the “Rijndael” algorithm developed by two Belgian cryptographers to divide the data into blocks of fixed lengths and encrypt each block. It supports data lengths of 128, 192 and 256 bits and key lengths of 128, 192 and 256 bits as well, offering extremely high encryption security.
AirPlay
AirPlay sends (plays) contents recorded in iTunes or on an iPhone/iPod touch/iPad to a compatible device via the network.
DLNA
DLNA and DLNA CERTIFIED are trademarks and/or service marks of Digital Living Network Alliance. Some contents may not be compatible with other DLNA CERTIFIED® products.
IEEE 802.11b
This is one wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States. It uses the 2.4 GHz band usable freely without a radio frequency license (ISM band), enabling communications at a maximum speed of 11 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
IEEE 802.11g
This is another wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States, and is compatible with IEEE 802.11b. It also uses the 2.4 GHz band, but enables communications at a maximum speed of 54 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
IEEE 802.11n
This is one wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States. And is compatible with IEEE 802.11a/b/g. It uses the 2.4/5 GHz band, enabling communications at a maximum speed of 600 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
TKIP (Temporal Key Integrity Protocol)
This is a network key used for WPA. The encryption algorithm is RC4, the same as for WEP, but the security level is increased by changing the network key used for encryption for each packet.
vTuner
This is a free online content server for Internet Radio.
For inquiries about this service, visit the vTuner site below.
vTuner website:
http://www.radiomarantz.com
This product is protected by certain intellectual property rights of Nothing Else Matters Software and BridgeCo. Use or distribution of such technology outside of this product is prohibited without a license from Nothing Else Matters Software and BridgeCo or an authorized subsidiary.
WEP Key (network key)
This is key information used for encrypting data when conducting data transfer. On this unit, the same WEP key is used for data encryption and decryption, so the same WEP key must be set on both devices in order for communications to be established between them.
Wi-Fi®
Wi-Fi Certification assures tested and proven interoperability by the Wi-Fi Alliance, a group certifying interoperability among wireless LAN devices.
WPA (Wi-Fi Protected Access)
This is a security standard established by the Wi-Fi Alliance. In addition to the conventional SSID (network name) and WEP key (network key), it also uses a user identification function and encrypting protocol for stronger security.
WPA2 (Wi-Fi Protected Access 2)
This is a new version of the WPA established by the Wi-Fi Alliance, compatible with more secure AES encryption.
WPA-PSK/WPA2-PSK (Pre-shared Key)
This is a simple authentication system for mutual authentication when a preset character string matches on the wireless LAN access point and client.
WPS (Wi-Fi Protected Setup)
This is a standard drawn up by the Wi-Fi Alliance to ease the task of setting up wireless LAN connections and configuring security.
There are two methods: push-button and PIN (Personal Identification Number) code.
Network Names (SSID: Security Set Identifier)
When forming wireless LAN networks, groups are formed to prevent interference, data theft, etc. These groups are based on “SSID (network names)”. For enhanced security, a WEP key is set so that communication is unavailable unless both the “SSID” and the WEP key match. This is suitable for temporarily constructing a simplified network.
Media player
iTunes
iTunes is the name of the multimedia player provided by Apple Inc.
It enables management and playback of multimedia contents including music and movies. iTunes supports many main file formats including AAC, WAV, and MP3.
Windows Media Player
This is a media player distributed free of charge by Microsoft Corporation.
It can play playlists created with Ver.11 or later of Windows Media Player, as well as WMA, DRM WMA, WAV, and other files.
Others
App Store
App Store is a site that sells application software for such devices as the iPhone or iPod Touch, and is operated by Apple Inc.
Pairing
Pairing (registration) is an operation that is required in order to connect a Bluetooth device to this unit using Bluetooth. When paired, the devices authenticate each other and can connect without mistaken connections occurring.
When using Bluetooth connection for the first time, you need to pair this unit and the Bluetooth device to be connected.
This unit can store pairing information for a maximum of 8 devices.