5. What is Infrastructure
An integrated wireless and wireless and wired LAN is called an Infrastructure
configuration. Infrastructure is applicable to enterprise scale for wireless access to
central database, or wireless application for mobile workers.
6. What is BSS ID
A specific Ad hoc LAN is called a Basic Ser vice Set ( BSS). Compute rs i n a BSS must
be configured with the same BSS ID.
7. What is WEP
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared
key algorithm, as described in the IEEE 802 .11 standard.
8. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP
security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i
WLAN security standard, and the specification might be officially released by early
2003.
9. What is AES?
AES (Advanced Encrypt ion Sta ndard ), a chip-base d sec urit y, has bee n de veloped to
ensure the highest degree of security and authenticity for digital information, wherever
and however communicated or stored, while making more efficient use of hardware
and/or software than previous encryption standards. It is also included in IEEE 802.11 i
standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security
until manufacturer s imple ment AES at the hardw are leve l.
10. Can Wireless products support printer sharing
Wireless products perform the same function as LAN products. Therefore, Wireless
products can work with Netware, Windows 2000, or other LAN operating systems to
support printer or file sharing.
11. Would the information be intercepted while transmitting on air
WLAN features two-fold protection in security. On the hardware side, as with Direct
Sequence Spread Spectrum technology, it has the inherent security feature of
scrambling. On the software side, WLAN series offer the encryption function (WEP) to
enhance security and Access Control. Users can set it up depending upon their needs.
28