About Wireless LAN
Wi-Fi®
IEEE 802.11b
This is one wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States. It uses the
2.4GHz band usable freely without a radio frequency license (ISM band), enabling communications at a maximum speed of 11 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
IEEE 802.11g
This is another wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States, and is compatible with IEEE 802.11b. It also uses the 2.4 GHz band, but enables communications at a maximum speed of 54 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
Infrastructure Communications
“Infrastructure Communications” refers to networks using wireless LAN access points.
This function can be used to connect to the Internet or a wired LAN via a wireless LAN access point. Wireless LAN access points include wireless broadband routers.
Ad-hoc Communications
Signal transfer through wireless interconnection of computers is referred to as “ad hoc communications”. With such ad hoc communications there is no connection to the Internet. Ad hoc communications are suited for establishing simple temporary networks.
Network Names
(SSID: Security Set Identifier)
When forming wireless LAN networks, groups are formed to prevent interference, data theft, etc. This grouping is done by “SSID” or “Security Set Identifiers”. For further security, a WEP key is set and signal transfer is not possible unless the SSID and WEP key match.
WEP Key (Network Key)
This is key information used for encrypting data when conducting data transfer. On the
ENGLISH
WPA |
|
| Getting | |
| ||||
This is a security standard established by the |
| |||
Alliance. In addition to the conventional SSID (network |
| |||
name) and WEP key (network key), it also uses a user |
| Started | ||
identification function and encrypting protocol for |
| |||
stronger security. |
| |||
encryption. |
| Connections | ||
WPA2 |
|
| ||
This is a new version of the WPA established by the |
|
| ||
|
| |||
|
|
| Setup | |
This is a simple authentication system for mutual |
| |||
|
| |||
authentication when a preset character string matches |
|
| ||
on the wireless LAN access point and client. |
| Playback | ||
Passphrase |
|
| ||
|
| |||
This refers to the code key used for |
|
| ||
PSK authentication, a WPA authentication method. |
| Information | ||
TKIP (Temporal Key Integrity Protocol) |
|
| ||
|
| |||
This is a network key used for WPA. The encryption |
|
| ||
algorithm is RC4, the same as for WEP, but the security |
|
| ||
| Troubleshooting | |||
level is increased by changing the network key used |
| |||
for encryption for each packet. |
| |||
|
| |||
AES (Advanced Encryption Standard) |
|
|
| |
This is a next generation standard encryption method |
|
| ||
replacing the current DES and 3DES, and because of |
|
| ||
its high security it is expected to be applied widely |
|
| ||
to wireless LANs in the future. It uses the “Rijndael” |
|
| ||
algorithm developed by two Belgian cryptographers to |
|
| ||
divide the data into blocks of fixed lengths and encrypt |
|
| ||
each block. It supports data lengths of 128, 192 and |
|
| ||
256 bits and key lengths of 128, 192 and 256 bits as |
|
| ||
well, offering extremely high encryption security. |
|
|
24