background image

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

12

Glossary

July 2005 v3.0

TCP/IP 

The underlying technology behind the Internet and communications between computers in a network. The 
first part, TCP, is the transport part, which matches the size of the messages on either end and guarantees that 
the correct message has been received. The IP part is the user's computer address on a network. Every 
computer in a TCP/IP network has its own IP address that is either dynamically assigned at startup or 
permanently assigned. All TCP/IP messages contain the address of the destination network as well as the 
address of the destination station. This enables TCP/IP messages to be transmitted to multiple networks 
(subnets) within an organization or worldwide. 

TKIP 

A security feature that is a WEP enhancement: Temporal Key Integrity Protocol and Message Integrity 
Check (MIC) is a modification of WEP to defend against known attacks (WEP+ four patches for key 
mixing, message integrity, rekeying, initialization vector protection) 

USB (Universal Serial Bus) 

A high-speed bidirectional serial connection between a PC and a peripheral that transmits data at the rate of 
12 megabits per second. The new USB 2.0 specification provides a data rate of up to 480 Mbps, compared to 
standard USB at only 12 Mbps. 1394, FireWire and iLink all provide a bandwidth of up to 400 Mbps. 

VoIP (Voice over IP) 

Voice transmission using Internet Protocol to create digital packets distributed over the Internet. VoIP can be 
less expensive than voice transmission using standard analog packets over POTS (Plain Old Telephone 
Service). 

VPN (Virtual Private Network) 

A type of technology designed to increase the security of information transferred over the Internet. VPN can 
work with either wired or wireless networks, as well as with dial-up connections over POTS. VPN creates a 
private encrypted tunnel from the end user's computer, through the local wireless network, through the 
Internet, all the way to the corporate servers and database. 

War Chalking 

The act of making chalk marks on outdoor surfaces (walls, sidewalks, buildings, sign posts, trees) to indicate 
the existence of an open wireless network connection, usually offering an Internet connection so that others 
can benefit from the free wireless access. The open connections typically come from the access points of 
wireless networks located within buildings to serve enterprises. The chalk symbols indicate the type of 
access point that is available at that specific spot. 

There are three basic designs that are currently used: a pair of back-to-back semicircles, which denotes an 
open node; a closed circle, which denotes a closed node; a closed circle with a “W” inside, which denotes a 
node equipped with WEP. Warchalkers also draw identifiers above the symbols to indicate the password that 
can be used to access the node, which can easily be obtained with sniffer software. 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: