12. Wireless Network Glossary
93
AirLive AP60 User’s Manual
SSH
Developed by SSH Communications Security Ltd., Secure Shell is a program to log into
another computer over a network, to execute commands in a remote machine, and to move
files from one machine to another. It provides strong authentication and secure
communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.
SSL
Secure Sockets Layer. It is a popular encryption scheme used by many online retail and
banking sites to protect the financial integrity of transactions. When an SSL session
begins, the server sends its public key to the browser. The browser then sends a randomly
generated secret key back to the server in order to have a secret key exchange for that
session. SSL VPN is also known as Web VPN. The HTTPS and SSH management
interface use SSL for data encryption.
Subnet Mask
An address code mask that determines the size of the network. An IP subnet are
determined by performing a BIT-wise AND operation between the IP address and the
subnet mask. By changing the subnet mask, you can change the scope and size of a
network.
Subnetwork or Subnet
Found in larger networks, these smaller networks are used to simplify addressing between
numerous computers. Subnets connect to the central network through a router, hub or
gateway. Each individual wireless LAN will probably use the same subnet for all the local
computers it talks to.
TCP
A layer-4 protocol used along with the IP to send data between computers over the Internet.
While IP takes care of handling the actual delivery of the data, TCP takes care of keeping
track of the packets that a message is divided into for efficient routing through
the Internet.
TX Output Power
Transmit Output Power. The TX output power means the transmission output power of
the radio. Normally, the TX output power level limit for 2.4GHz 11g/b is 20dBm at the
antenna end. The output power limit for 5GHz 802.11a is 30dBm at the antenna end..
UDP
User Datagram Protocol. A layer-4 network protocol for transmitting data that does not
require acknowledgement from the recipient of the data.