GN-MD01 AirCruiser G Game Adapter
Site survey
A comprehensive facility study performed by network managers to insure that planned service levels will be
met when a new wireless LAN, or additional WLAN segments to an existing network, are deployed. Site
survey’s are usually performed by a radio frequency engineer and used by systems integrators to identify
the optimum placements of access points to insure that planned levels of service are met. Site surveys are
sometimes conducted following the deployment to insure that the WLAN is achieving the necessary level of
coverage. Site surveys can also be used to detect rogue access points
.
SSID
The SSID is the name represents the routers and Access Point in wireless network.
Subnet Mask
A mask used to determine which subnet a IP address belongs to. An IP address has two components, the
network address and the host address. Subnetting enables the network administrator to further divide the
host part of the address into two or more subnets.
Switch
A type of hub that controls device usage to prevent data collisions and insures optimal network performance.
A switch acts as a network traffic cop: Rather than transmitting all the packets it receives to all ports, as a
hub does, a switch transmits packets to only the receiving port.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to
connect hosts on the Internet.
TKIP
Temporal Key Integrity Protocol. The wireless security encryption mechanism in Wi-Fi Protected Access.
TKIP uses a key hierarchy and key management methodology that removes the predictability that intruders
relied upon to exploit the WEP key. It increases the size of the key from 40 to 128 bits and replaces WEP’s
single static key with keys that are dynamically generated and distributed by an authentication server,
providing some 500 trillion possible keys that can be used on a given data packet. It also includes a
Message Integrity Check (MIC), designed to prevent an attacker from capturing data packets, altering them
and resending them. By greatly expanding the size of keys, the number of keys in use, and by creating an
integrity checking mechanism, TKIP magnifies the complexity and difficulty involved in decoding data on a
Wi-Fi network. TKIP greatly increases the strength and complexity of wireless encryption, making it far
more difficult—if not impossible—for a would-be intruder to break into a Wi-Fi network.
USB
A high-speed bidirectional serial connection between a PC used to transfer data between the computer and
peripherals such as digital cameras and memory cards. The USB 2.0 specification, announced in 2000,
provides a data rate of up to 480 Mbps, 40 times faster than the original specification which provided only
12 Mbps.
WAN
Wide Area Network, a communication network that covers a relatively broad geographic area, consisting of
two or more LANs. Broadband communication over the WAN is often through public networks such as the
ADSL or Cable systems, or through leased lines or satellites. To simplify it, please image network as a
WAN.
WEP
WEP (Wired Equivalent Privacy) is a data privacy mechanism based on a 64/128-bit shared key algorithm,
as described in the IEEE 802.11 standard.
53