Term

Definition

 

 

802.11 bSec

The bSec protocol is a pre-standard protocol that has been proposed to the IEEE

 

802.11 committee as an alternative to 802.11i. The difference between bSec and

 

standard 802.11i is that bSec implements Suite B algorithms whenever possible.

 

Notably, AES-CCM is replaced by AES-CGM, and the Key Derivation Function (KDF)

 

of 802.11i is upgraded to support SHA-256 and SHA-384.

 

In order to provide interoperability with standard Wi-Fi software drivers, bSec is

 

implemented as a shim layer between standard 802.11 Wi-Fi and a Layer 3 protocol

 

such as IP. A controller configured to advertise a bSec SSID will advertise an open

 

network, however only bSec frames will be permitted on the network.

 

 

802.1X

Standard designed to enhance 802.11 WLAN security. 802.1X provides an

 

authentication framework, allowing a user to be authenticated by a central

 

authority. The actual algorithm that is used to determine whether a user is

 

authentic is left open and multiple algorithms are possible.

 

 

access point (AP)

An access point connects users to other users within the network and also can

 

serve as the point of interconnection between the WLAN and a fixed wire network.

 

The number of access points a WLAN needs is determined by the number of users

 

and the size of the network.

 

 

access point mapping

The act of locating and possibly exploiting connections to WLANs while driving

 

around a city or elsewhere. To do war driving, you need a vehicle, a computer

 

(which can be a laptop), a wireless Ethernet card set to work in promiscuous

 

mode, and some kind of an antenna which can be mounted on top of or positioned

 

inside the car. Because a WLAN may have a range that extends beyond an office

 

building, an outside user may be able to intrude into the network, obtain a free

 

Internet connection, and possibly gain access to company records and other

 

resources.

 

 

ad-hoc network

A LAN or other small network, especially one with wireless or temporary plug-in

 

connections, in which some of the network devices are part of the network only for

 

the duration of a communications session or, in the case of mobile or portable

 

devices, while in some close proximity to the rest of the network.

 

 

A-MSDU

A structure containing multiple MSDUs , transported within a single

 

(unfragmented) data medium access control (MAC) protocol data unit (MPDU).

 

 

band

A specified range of frequencies of electromagnetic radiation.

 

 

digital wireless pulse

Wireless technology for transmitting large amounts of digital data over a wide

 

spectrum of frequency bands with very low power for a short distance. Ultra

 

wideband radio can carry a huge amount of data over a distance up to 230 feet at

 

very low power (less than 0.5 milliwatts), and has the ability to carry signals

 

through doors and other obstacles that tend to reflect signals at more limited

 

bandwidths and a higher power.

 

 

evil twin

A home-made wireless access point that masquerades as a legitimate one to

 

gather personal or corporate information without the end-user's knowledge. It's

 

fairly easy for an attacker to create an evil twin by simply using a laptop, a

 

wireless card and some readily-available software. The attacker positions himself

 

in the vicinity of a legitimate Wi-Fi access point and lets his computer discover

 

what name and radio frequency the legitimate access point uses. He then sends

 

out his own radio signal, using the same name.

 

 

extensible authentication protocol

Authentication protocol for wireless networks that expands on methods used by the

(EAP)

point-to-point protocol (PPP), a protocol often used when connecting a computer

 

 

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Acronyms and Terms 865

Page 865
Image 865
Dell 6.2 manual Term Definition

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.