background image

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

8

Glossary

July 2005 v3.0

MAC (Media Access Control) 

Every wireless 802.11 device has its own specific MAC address hard-coded into it. This unique identifier 
can be used to provide security for wireless networks. When a network uses a MAC table, only the 802.11 
radios that have had their MAC addresses added to that network's MAC table will be able to get onto the 
network. 

Mesh Networks 

Also called mesh topology, mesh is a network topology in which devices are connected with many 
redundant interconnections between network nodes. In a full mesh topology every node has a connection to 
every other node in the network. Mesh networks may be wired or wireless. 

In a wireless mesh example, each of the spheres below represent a mesh router. Corporate servers and 
printers may be shared by attaching to each mesh router. For wireless access to the mesh, an access point 
must be attached to any one of the mesh routers. 

Multiple Input Multiple Output (MIMO)

MIMO refers to radio links with multiple antennas at the transmitter and the receiver side to improve the 
performance of the wireless link. 

NAT (Network Address Translation) 

A network capability that enables a houseful of computers to dynamically share a single incoming IP 
address from a dial-up, cable or xDSL connection. NAT takes the single incoming IP address and creates 
new IP address for each client computer on the network. 

Network name 

Identifies the wireless network for all the shared components. During the installation process for most 
wireless networks, you need to enter the network name or SSID. Different network names are used when 
setting up your individual computer, wired network or workgroup. 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: