i n t e l l i g e n t | w i r e l e s s | p l a t f o r m |
Appendix B - Useful terms and definitions
Abbreviations | Acronyms |
MAC | Media Access Control |
RSSI | Receive Signal Sensitivity Indication |
SSID | Service Set Identifier |
DHCP | Dynamic Host Configuration Protocol |
ACL | Access Control List |
SNMP | Simple Network Management Protocol |
NTP | Network Time Protocol |
STP | Spanning Tree Protocol |
TCP/IP | Transmission Control Protocol/ Internet Protocol |
802.11h
The 802.11h specification is an addition to the 802.11 family of standards for wireless local area networks (WLANs). 802.11h is intended to resolve interference issues introduced by the use of 802.11a in some locations, particularly with military radar systems and medical devices.
802.11Q
IEEE 802.11Q defines a mechanism for tagging frames so that they can be segregated into separate VLANs.
802.11i
An upcoming security standard currently being developed by IEEE that features 802.1x authentication protections and adds AES (Advanced Encryption Standard) technology, a stronger level of security than used in WPA for encryption protection along with other enhancements.
IEEE 802.1x
A security standard featuring a
SSID
Each ESS has a Service Set Identifier (SSID) used to identify the Radio that belong to the ESS. Radios can be configured with the SSID of the ESS to which they should associate. By default, radios broadcast their SSID to advertise their presence.
VLAN
A VLAN is a switched network that is logically rather than physically segmented. VLANs enable workstations and other devices to have a virtual association - independent of geographic location or physical attachment to the network. These groupings can be based upon organizational unit, application, role, or any other logical grouping.
WEP
According to the IEEE 802.11 standard, Wired Equivalent Privacy (WEP) is intended to provide “confidentiality that is subjectively equivalent to the confidentiality of a wired local area network medium and that does not employ cryptographic techniques to enhance privacy.”
WEP relies on a secret key that is shared between a mobile station and an access point. WEP uses the RC4 stream cipher invented by RSA Data Security. RC4 is a symmetric stream cipher that uses the same variable length key for encryption and decryption. With WEP enabled, the sender encrypts the data frame payload and replaces the original payload with the encrypted payload. The sender
airPoint™ Nexus User Configuration Guide | Page 51 of 55 |
|