background image

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

Glossary

5

July 2005 v3.0

CSMA-CD (Carrier Sense Multiple Action/Collision Detection) 

A method of managing traffic and reducing noise on an Ethernet network. A network device transmits data 
after detecting that a channel is available. However, if two devices transmit data simultaneously, the sending 
devices detect a collision and retransmit after a random time delay. 

DHCP (Dynamic Host Configuration Protocol) 

A utility that enables a server to dynamically assign IP addresses from a predefined list and limit their time 
of use so that they can be reassigned. Without DHCP, an IT Manager would have to manually enter in all the 
IP addresses of all the computers on the network. When DHCP is used, whenever a computer logs onto the 
network, it automatically gets an IP address assigned to it. 

Diversity: antenna 

A type of antenna system that uses two antennas to maximize reception and transmission quality and reduce 
interference 

DNS (Domain Name System) 

A program that translates URLs to IP addresses by accessing a database maintained on a collection of 
Internet servers. The program works behind the scenes to facilitate surfing the Web with alpha versus 
numeric addresses. A DNS server converts a name like mywebsite.com to a series of numbers like 
107.22.55.26. Every website has its own specific IP address on the Internet. 

Encryption Key 

An alphanumeric (letters and/or numbers) series that enables data to be encrypted and then decrypted so it 
can be safely shared among members of a network. WEP uses an encryption key that automatically encrypts 
outgoing wireless data. On the receiving side, the same encryption key enables the computer to 
automatically decrypt the information so it can be read. 

Enhanced Data Encryption through TKIP 

To improve data encryption, Wi-Fi Protected Access utilizes its Temporal Key Integrity Protocol (TKIP). 
TKIP provides important data encryption enhancements including a per-packet key mixing function, a 
message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, 
and a re-keying mechanism. Through these enhancements, TKIP addresses all WEP known vulnerabilities. 

Enterprise-level User Authentication via 802.1x and EAP 

WEP has almost no user authentication mechanism. To strengthen user authentication, Wi-Fi Protected 
Access implements 802.1x and the Extensible Authentication Protocol (EAP). Together, these 
implementations provide a framework for strong user authentication. This framework utilizes a central 
authentication server, such as RADIUS, to authenticate each user on the network before they join it, and also 
employs "mutual authentication" so that the wireless user doesn’t accidentally join a rogue network that 
might steal its network credentials. 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: