NETGEAR WG3002 Скачать руководство пользователя страница 2

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

2

Glossary

July 2005 v3.0

The purpose of 11d is to add features and restrictions to allow WLANs to operate within the rules of these 
countries. Equipment manufacturers do not want to produce a wide variety of country-specific products and 
users that travel do not want a bag full of country-specific WLAN PC cards. The outcome will be 
country-specific firmware solutions. 

802.11e Standard 

802.11e is a proposed IEEE standard to define quality of service (QoS) mechanisms for wireless gear that 
gives support to bandwidth-sensitive applications such as voice and video.

802.11g Standard 

Similar to 802.11b, this physical layer standard provides a throughput of up to 54 Mbps. It also operates in 
the 2.4 GHz frequency band but uses a different radio technology in order to boost overall bandwidth. 

802.11i 

This is the name of the IEEE Task Group dedicated to standardizing WLAN security. The 802.11i Security 
has a frame work based on RSN (Robust Security Mechanism). RSN consists of two parts: 1) The Data 
Privacy Mechanism and 2) Security Association Management. 

The Data Privacy Mechanism supports two proposed schemes: TKIP and AES. TKIP (Temporal Key 
Integrity) is a short-term solution that defines software patches to WEP to provide a minimally adequate 
level of data privacy. AES or AES-OCB (Advanced Encryption Standard and Offset Codebook) is a robust 
data privacy scheme and is a longer-term solution. 

Security Association Management is addressed by a) RSN Negotiation Procedures, b) IEEE 802.1x 
Authentication and c) IEEE 802.1x Key management. 

The standards are being defined to naturally co-exist with pre-RSN networks that are currently deployed. 

802.11n Standard 

A recently formed (Oct 2003) IEEE official task group referred to as: 802.11n or "TGn" for the 100 Mbps 
wireless physical layer standard protocol. Current published ratification date is December 2005. As of 
February 2004, no draft specification has been written - It is expected to use both the 2.4 and 5GHz 
frequencies. 

AES (Advanced Encryption Standard) 

A symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen 
and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October 
2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. The 
National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the 
algorithm, called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of five algorithms under 
consideration, including one called MARS from a large research team at IBM. AES is expected to replace 
WEP as a WLAN encryption method in 2003. 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: