8. What is TKIP?
TKIP is a quic k-fix method to quickly overcome the inhe rent weaknesses in WEP
security, especially the reuse of encryption keys. TKIP i s involved in the IEEE 802.11i
WLAN security standa rd, an d the specification might be of fi cial l y released by early
2003.
9. What is AES?
AES (Advanced Encryption Stan dard), a chip-based securit y, h a s been developed to
ensure the highe st degree of security and authenticity fo r digital information, whereve r
and however communicated o r stored, while ma king more efficient use of hardware
and/or software than pre viou s encryption standards. It i s also included in IEEE 802.11i
standard. Compare with AES, TKIP is a tem po rary protocol for replacing WEP security
until manufacturers impl ement AES at the ha rdware level.
10. Can Wireless products support prin ter sharing
Wireless products perform the same function as LAN p roducts. Therefore, Wireless
products can work with Netware, Windows 2000, or othe r LAN operating system s to
support printer or file sharing.
11. W oul d t h e in forma ti on b e in terc e p te d w hile tra nsmi tti n g o n ai r
WLAN features two-fold p rotection in security. On the h ardware side, as with Direct
Sequence Spread Spect rum technology, it has the inhere nt security feature of
scrambling. On the softwa re side, WLAN series offe r the enc ryption function (WEP) to
enhance security and Acc e ss Control. Users can set it up depending upon thei r need s.
12. What is DSSSWha t is FHSSAnd what are thei r differences
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes
frequency in a patte rn that is known to both t ransmitter and receiver. Properly
synchronized, the net eff ect is to maintain a single logi cal channel. To an unintende d
receiver, FHSS appears to be short-duration impul se noise. Direct-sequence spread-
spectrum (DSSS) gene rates a redundant bit pattern for each bit to be transmitted. Thi s
bit pattern is called a chip (or chipping code). T he longer the chip i s, the gre ate r the
probability that the original data can be recovered. Even if one or more bits in the chip
are damaged during t ransmission, statistical techniques embedded in the radio can
recover the original data without-the need for retran smi ssion. To an unintended
receiver, DSSS appea r s a s low power wideband noise and i s rejected (ignored) by
most narrowband receive rs.
13. What is Spread Spectru m
Spread Spectrum technology i s a wideband radio frequenc y technique developed by
the military for use in reliable, secure, mission-critical communication systems. It is
designed to trade off band width efficiency for reliability, integrity, and security. In othe r
words, more bandwidth i s consumed than in the ca se of narrowband transmission, but
the trade off produ ce s a signal that is, in effec t, loude r and thus easier to dete ct,
provided that the receiver knows the parameters of the spread-spectrum signal being
broadcast. If a re ceive r is not tuned to the right frequency, a spread – spectrum signal
28