i n t e l l i g e n t

w i r e l e s s

p l a t f o r m

Appendix B - Useful terms and definitions

Abbreviations

Acronyms

MAC

Media Access Control

RSSI

Receive Signal Sensitivity Indication

SSID

Service Set Identifier

DHCP

Dynamic Host Configuration Protocol

ACL

Access Control List

SNMP

Simple Network Management Protocol

NTP

Network Time Protocol

STP

Spanning Tree Protocol

TCP/IP

Transmission Control Protocol/ Internet Protocol

802.11h

The 802.11h specification is an addition to the 802.11 family of standards for wireless local area networks (WLANs). 802.11h is intended to resolve interference issues introduced by the use of 802.11a in some locations, particularly with military radar systems and medical devices.

802.11Q

IEEE 802.11Q defines a mechanism for tagging frames so that they can be segregated into separate VLANs.

802.11i

An upcoming security standard currently being developed by IEEE that features 802.1x authentication protections and adds AES (Advanced Encryption Standard) technology, a stronger level of security than used in WPA for encryption protection along with other enhancements.

IEEE 802.1x

A security standard featuring a port-based authentication framework and dynamic distribution of session keys for WEP encryption. A RADIUS server is required.

SSID

Each ESS has a Service Set Identifier (SSID) used to identify the Radio that belong to the ESS. Radios can be configured with the SSID of the ESS to which they should associate. By default, radios broadcast their SSID to advertise their presence.

VLAN

A VLAN is a switched network that is logically rather than physically segmented. VLANs enable workstations and other devices to have a virtual association - independent of geographic location or physical attachment to the network. These groupings can be based upon organizational unit, application, role, or any other logical grouping.

WEP

According to the IEEE 802.11 standard, Wired Equivalent Privacy (WEP) is intended to provide “confidentiality that is subjectively equivalent to the confidentiality of a wired local area network medium and that does not employ cryptographic techniques to enhance privacy.”

WEP relies on a secret key that is shared between a mobile station and an access point. WEP uses the RC4 stream cipher invented by RSA Data Security. RC4 is a symmetric stream cipher that uses the same variable length key for encryption and decryption. With WEP enabled, the sender encrypts the data frame payload and replaces the original payload with the encrypted payload. The sender

airPoint™ Nexus User Configuration Guide

Page 51 of 55

 

Page 51
Image 51
SmartBridges sB3210 manual Appendix B Useful terms and definitions, Abbreviations Acronyms