97
W i r e l e s s L A N U s e r ’ s G u i d e
PEAP (Protected Extensible Authentication Protocol)
An improvement over EAP, making authentication
much easier to achieve.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol
adopted in telephone line connection (PPP) to be used
over an Ethernet.
Protocol
A procedure or rule of delivering data among
computers. Ordered data communication is allowed by
making all conditions required for communication
including the method of data transmission/reception
and actions upon communication errors into proce-
dures.
Shared key authentication
802.11 network authentication method in which the AP
sends the client device a challenge text packet that the
client must then encrypt with the correct WEP key and
return to the AP. If the client has the wrong key or no
key, authentication will fail and the client will not be
allowed to associate with the AP. Shared key authentica-
tion is not considered secure, because a hacker who
detects both the clear-text challenge and the same chal-
lenge encrypted with a WEP key can decipher the WEP
key.
SSID (Service Set Identifier)
Service Set Identifier, a 32-character unique identifier
attached to the header of packets sent over a WLAN that
acts as a password when a mobile device tries to connect
to the BSS. The SSID differentiates one WLAN from
another, so all access points and all devices attempting to
connect to a specific WLAN must use the same SSID. A
device will not be permitted to join the BSS unless it can
provide the unique SSID. Because the SSID is broadcast
in plain text, it does not supply any security to the
network.
Subnet mask
TCP-IP network is controlled by being divided into
multiple smaller networks (subnets). IP address consists
of the subnet address and the address of each computer.
Subnet mask defines how many bits of IP address
comprise the subnet address. The same value shall be set
among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet
Protocol)
A standard protocol of the Internet.
TKIP (Temporal Key Integrity Protocol)
Security feature that is a WEP enhancement to defend
against known wireless data security issues.
WEP (Wired Equivalent Privacy)
Standard wireless security provided by the Wi-Fi stan-
dard, used for protecting wireless data.
Wi-Fi
Wi-Fi, or Wireless Fidelity, is a set of standards for wire-
less local area networks (WLAN) based on the IEEE
802.11 specifications. Certified products can use the offi-
cial Wi-Fi logo, which indicates that the product is
interoperable with any other product also showing that
logo.
WPA (Wi-Fi Protected Access)
Strong replacement for WEP, providing improved data
encryption and user authentication.
P Series.book Page 97 Friday, February 17, 2006 11:09 AM
Summary of Contents for FPCM20654
Page 6: ...L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 7: ...1 1 Preface ...
Page 8: ...2 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 10: ...4 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 11: ...5 2 Getting to Know Your LifeBook ...
Page 12: ...6 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 32: ...26 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 33: ...27 3 Using Your LifeBook ...
Page 34: ...28 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 41: ...35 4 User Installable Features ...
Page 42: ...36 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 54: ...48 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 55: ...49 5 Troubleshooting ...
Page 56: ...50 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 69: ...63 6 Care and Maintenance ...
Page 70: ...64 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 74: ...68 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 75: ...69 7 System Specifications ...
Page 76: ...70 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 81: ...75 8 Glossary ...
Page 82: ...76 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 89: ...83 Appendix A Integrated Wireless LAN User s Guide Optional Device ...
Page 90: ...84 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 107: ...101 Appendix B Using the Fingerprint Swipe Sensor ...
Page 108: ...102 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...
Page 116: ...110 L i f e B o o k P S e r i e s N o t e b o o k T a b l e t P C ...