SMT-CW230 User’s Guide
Rev 0.8
39 / 39
components of the suite (the other being Internet Protocol, or IP), so the entire suite is commonly referred to as TCP/IP. Whereas IP
handles lower-level transmissions from computer to computer as a message makes its way across the Internet, TCP operates at a
higher level, concerned only with the two end systems, for example a Web browser and a Web server. In particular, TCP provides
reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
UDP: one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer
applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without
requiring prior communications to set up special transmission channels or data paths.
- SSID (Service Set Identifier)
Service set identifier, or SSID, is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from
all access points within range advertising their SSIDs. The client device can then either manually or automatically, based on the configuration,
select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of
human-readable ASCII characters.
- Subnet mask
A subnetwork, or subnet, is a logically visible, distinctly addressed part of a single Internet Protocol network.[1] The process of subnetting
is the division of a computer network into groups of computers that have a common, designated IP address routing prefix.
Subnetting breaks a network into smaller realms that may use existing address space more efficiently, and, when physically separated, may
prevent excessive rates of Ethernet packet collision in a larger network. The subnets may be arranged logically in a hierarchical architecture,
partitioning the organization's network address space (see also Autonomous System) into a tree-like routing structure.
- WPA Algorithm: 3 WLAN algorithm
TKIP : Temporal Key Integrity Protocol
TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the
replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable link-
layer security, and a solution was required for already deployed hardware.
AES : Advanced Encryption Standard
Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three
block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.
TKIPAES : complementary measures of TKIP and AES