Glossary
GL-6
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide
OL-4211-03
T
TKIP Temporal Key Integrity Protocol. Also referred to as WEP key hashing. A security feature that defend s
against an attack on WEP in which the intruder uses the initialization vector (IV) in encrypted packets
to calculate the WEP key. TKIP removes the predictability that an intruder relies on to determine the
WEP key by exploiting IVs.
transmit power The power level of radio transmission.
U
unicast packets Packets transmitted in point-to-point communication.
UNII Unlicensed National Information Infrastructure. An FCC regulatory domain for 5-GHz wireless
devices. UNII bands are 100 MHz wide and divided into four channels whe n usi ng 80 2.11a OF DM
modulation.
UNII 1 A UNII band dedicated to in-building wireless LAN applications. UNI I 1 is located at 5.15 to 5.25 GHz
and allows for a maximum transmit power of 40 mW (or 16 dBm) with an antenna up to 6 dBi. UNII 1
regulations require a nonremovable, integrated antenna.
UNII 2 A UNII band dedicated to in-building wireless LAN applications. UNI I 2 is located at 5.25 to 5.35 GHz
and allows for a maximum transmit power of 200 mW (or 23 dBm) with an antenna up to 6 dBi. UNII
2 regulations allow for an auxiliary, user-installable antenna.
UNII 3 A UNII band dedicated to wireless LAN applications. UN II 3 i s loc at ed at 5.725 t o 5.825 G Hz an d
allows for a maximum transmit power of 1 Watt (or 30 dBm) with an antenna up to 6 dBi. UNII 3
regulations allow for an auxiliary, user-installable antenna.
V
VLAN A switched network that is logically segmented, by functions, project teams, or applications rather than
on a physical or geographical basis. For example, all workstations and servers use d by a pa rti cul ar
workgroup team can be connected to the same VLAN regardless of their physical connections to the
network or the fact that they might be intermingled with other teams. You use VLANs to reconfigure
the network through software rather than physically unplugging and moving devices or wi res.
A VLAN consists of a number of end systems, either hosts or network equ ipment (such as bridges and
routers), connected by a single bridging domain. The bridging domain is supported on various pieces
of network equipment such as LAN switches that operate bridging p rotocol s betwe en t h em w it h a
separate group for each VLAN.