Glossary (cont.)
Category | Item | Description | Page | ||
| AD_HOC | This is the mode in which computers | 17/ | ||
|
| communicate with each other directly, rather | 50 | ||
|
| than via access points. |
| ||
| INFRASTRUCTURE | This is the mode in which communications | 19/ | ||
| (infrastructure mode) | are performed via the access point. | 50 | ||
| SSID | Abbreviation for Service Set ID. The SSID | 17/ | ||
|
| identification code must be set to distinguish | 50 | ||
|
| equipment included in a wireless LAN that |
| ||
|
| uses access points from equipment not |
| ||
|
| included in that LAN. |
|
| |
|
| This may appear as the “ESSID” or the |
| ||
|
| “network name” for wireless LAN cards |
| ||
|
| made by some manufacturers. |
| ||
| Open System/ | This is an authentication of wireless signals | 17/ | ||
| OPEN | employing a public key encryptosystem. | 50 | ||
| Shared Key/ | This is a secret key encryptosystem for | 17/ | ||
| SHARED | wireless signals in which authentication is | 50 | ||
|
| performed with a key |
| ||
|
| Other terms for this method, in which the |
| ||
|
| same key is used for both encryption and |
| ||
Advanced |
| decryption, are “shared key encryptosystem” |
| ||
| and “common key encryptosystem”. |
| |||
setting of |
|
|
|
| |
| This is a standard covering encryption | 50 | |||
connection | |||||
| methods used in wireless LAN. It provides |
| |||
|
| greater security than WEP, and has functions |
| ||
|
| such as a user authentication function and also |
| ||
|
| TKIP (encryption protocol) which automatically |
| ||
|
| changes the encryption key at fixed intervals. |
| ||
| WEP | Abbreviation for | Wired Equivalent | 17/ | |
|
| Privacy. This is a method for encrypting | 51 | ||
|
| communication data. The encryption |
| ||
|
| key is created and notified only to the |
| ||
|
| communicating user, so the communication |
| ||
|
| data cannot be decrypted by a third party. |
| ||
| TKIP | Abbreviation for Temporal Key Integrity | 51 | ||
|
| Protocol. |
|
| |
|
| This encryption protocol provides even |
| ||
|
| greater security | than WEP because |
| |
|
| it changes the encryption key at fixed |
| ||
|
| intervals. |
|
| |
| AES | These are the US Government’s next- | 15/ | ||
|
| generation standard encryption methods, | 51/ | ||
|
| the selection work of which is performed | 59 | ||
|
| by the National Institute of Standards and |
| ||
|
| Technology (NIST). |
|
|
62