35
used generically to refer to the entire suite of related protocols.
Transmit/ Receive
The wireless throughput in Bytes per second averaged over two seconds.
Wide Area Network (WAN)
A WAN consists of multiple LANs that are tied together via telephone services and/or fiber
optic cabling. WANs may span a city, a state, a country, or even the world.
WPA/WPA2
Wi-Fi Protected Access (WPA/WPA2) is a security enhancement that strongly increases the
level of data protection and access control to a w ireless netw ork. WPA enforces 802.1x
authentication and key-exchange and only works with dynamic encryption keys. To strengthen
data encryption, WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides
important data encryption enhancements that include a per-packet key mixing function, a
message integrity check (MIC) na med Mi chael an extended initializat ion vector (IV) with
sequencing rules, and a also re-keying mechanism. Using these improvement enhancements,
TKIP protects against WEP's known weaknesses.
The second generation of WPA that complies with the IEEE TGi specification i s known as
WPA2.
WPA/WPA2 – Enterprise p rovides this level of security on enterprise n etworks with a 802.1x
RADIUS server. An Authentication Type is selected to match the authentication protocol of the
802.1x server.
WPA/WPA2 - Personal provides this level of security i n the smal l network or home
environment. It uses a password also called a pre-shared key (PSK). The longer this password
the stronger the security of the wireless network. If your Wireless Access Point or Router
supports WPA/WPA2 Personal (WPA-PSK) then you should enable it on the access point and
provide a long, strong password. The same password entered into ac cess point needs to be
used on this computer and all other wireless devices that access the wireless network.