434
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
SHA
Secure hashing algorithm. A one-way hashing algorithm used in many authentication
algorithms and also for key derivation in many algorithms. A SHA produces a 160-bit hash.
shared secret
A static key distributed by an out-of-band mechanism to both the sender and receiver. Also
known as a
shared key
or
preshared key (PSK)
, a shared secret is used as input to a one-way
hash algorithm. When a shared secret is used for authentication, if the hash output of both
sender and receiver is the same, they share the same secret and are authenticated. A shared
secret can also be used for encryption key generation and key derivation.
SIP
Session Initialization Protocol. A signaling protocol that establishes real-time calls and
conferences over IP networks.
Spanning Tree Protocol
See
STP
.
SSH
Secure Shell protocol. A Telnet-like protocol that establishes an encrypted session.
SSID
Service set identifier. The unique name shared among all computers and other devices in a
wireless LAN (WLAN).
SSL
Secure Sockets Layer protocol. A protocol developed by Netscape for managing the security
of message transmission over the Internet. SSL has been succeeded by Transport Layer
Security (TLS) protocol, which is based on SSL. The
sockets
part of the term refers to the
sockets method of passing data back and forth between a client and a server program in a
network or between program layers in the same computer. SSL uses the public-and-private
key encryption system from RSA Data Security, Inc., which also includes the use of a digital
certificate. See also
HTTPS
;
TLS
.
station
Any device with a media access control (MAC) address and a Physical layer (PHY) interface
to the wireless medium that comply with the standards for all IEEE 802 networks. Wireless
clients and DWL-8220AP access points are stations in a D-Link Mobility System.
STP
Spanning Tree Protocol. A link management protocol, defined in the IEEE 802.1D standard,
that provides path redundancy while preventing undesirable loops in a network. STP is also
known as
Spanning Tree Bridge Protocol
.
Summary of Contents for DWS-1008
Page 1: ......