GN-MD01 AirCruiser G Game Adapter

Site survey

A comprehensive facility study performed by network managers to insure that planned service levels will be met when a new wireless LAN, or additional WLAN segments to an existing network, are deployed. Site survey’s are usually performed by a radio frequency engineer and used by systems integrators to identify the optimum placements of access points to insure that planned levels of service are met. Site surveys are sometimes conducted following the deployment to insure that the WLAN is achieving the necessary level of coverage. Site surveys can also be used to detect rogue access points.

SSID

The SSID is the name represents the routers and Access Point in wireless network.

Subnet Mask

A mask used to determine which subnet a IP address belongs to. An IP address has two components, the network address and the host address. Subnetting enables the network administrator to further divide the host part of the address into two or more subnets.

Switch

A type of hub that controls device usage to prevent data collisions and insures optimal network performance. A switch acts as a network traffic cop: Rather than transmitting all the packets it receives to all ports, as a hub does, a switch transmits packets to only the receiving port.

TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to connect hosts on the Internet.

TKIP

Temporal Key Integrity Protocol. The wireless security encryption mechanism in Wi-Fi Protected Access. TKIP uses a key hierarchy and key management methodology that removes the predictability that intruders relied upon to exploit the WEP key. It increases the size of the key from 40 to 128 bits and replaces WEP’s single static key with keys that are dynamically generated and distributed by an authentication server, providing some 500 trillion possible keys that can be used on a given data packet. It also includes a Message Integrity Check (MIC), designed to prevent an attacker from capturing data packets, altering them and resending them. By greatly expanding the size of keys, the number of keys in use, and by creating an integrity checking mechanism, TKIP magnifies the complexity and difficulty involved in decoding data on a Wi-Fi network. TKIP greatly increases the strength and complexity of wireless encryption, making it far more difficult—if not impossible—for a would-be intruder to break into a Wi-Fi network.

USB

A high-speed bidirectional serial connection between a PC used to transfer data between the computer and peripherals such as digital cameras and memory cards. The USB 2.0 specification, announced in 2000, provides a data rate of up to 480 Mbps, 40 times faster than the original specification which provided only 12 Mbps.

WAN

Wide Area Network, a communication network that covers a relatively broad geographic area, consisting of two or more LANs. Broadband communication over the WAN is often through public networks such as the ADSL or Cable systems, or through leased lines or satellites. To simplify it, please image network as a WAN.

WEP

WEP (Wired Equivalent Privacy) is a data privacy mechanism based on a 64/128-bit shared key algorithm, as described in the IEEE 802.11 standard.

53

Page 56
Image 56
Gigabyte GN-MD01 user manual Ssid