background image

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

Glossary

11

July 2005 v3.0

Site survey 

The process whereby a wireless network installer inspects a location prior to putting in a wireless network. 
Site surveys are used to identify the radio- and client-use properties of a facility so that access points can be 
optimally placed. 

SSID (also called ESSID) 

A 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password 
when a mobile device tries to connect to the BSS. (Also called ESSID.) The SSID differentiates one WLAN 
from another, so all access points and all devices attempting to connect to a specific WLAN must use the 
same SSID. 

A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can 
be sniffed in plain text from a packet, it does not supply any security to the network. An SSID is also 
referred to as a Network Name because essentially it is a name that identifies a wireless network. 

SSL (Secure Sockets Layer) 

Commonly used encryption scheme used by many online retail and banking sites to protect the financial 
integrity of transactions. When an SSL session begins, the server sends its public key to the browser. The 
browser then sends a randomly generated secret key back to the server in order to have a secret key 
exchange for that session. 

Subnetwork or Subnet 

Found in larger networks, these smaller networks are used to simplify addressing between numerous 
computers. Subnets connect to the central network through a router, hub or gateway. Each individual 
wireless LAN will probably use the same subnet for all the local computers it talks to. 

Switch 

A type of hub that efficiently controls the way multiple devices use the same network so that each can 
operate at optimal performance. A switch acts as a networks traffic cop: rather than transmitting all the 
packets it receives to all ports as a hub does, a switch transmits packets to only the receiving port. 

TCP (Transmission Control Protocol) 

A protocol used along with the Internet Protocol (IP) to send data in the form of individual units (called 
packets) between computers over the Internet. While IP takes care of handling the actual delivery of the 
data, TCP takes care of keeping track of the packets that a message is divided into for efficient routing 
through the Internet. 

For example, when a web page is downloaded from a web server, the TCP program layer in that server 
divides the file into packets, numbers the packets, and then forwards them individually to the IP program 
layer. Although each packet has the same destination IP address, it may get routed differently through the 
network. At the other end, TCP reassembles the individual packets and waits until they have all arrived to 
forward them as a single file. 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: