G
LOSSARY
– 133 –
ODFM Orthogonal Frequency Division Multiplexing: OFDM allows multiple users to
transmit in an allocated band by dividing the bandwidth into many narrow
bandwidth carriers.
SSID Service Set Identifier: An identifier that is attached to packets sent over
the wireless LAN and functions as a password for joining a particular radio
cell; i.e., Basic Service Set (BSS).
SESSION KEY Session keys are unique to each client, and are used to authenticate a
client connection, and correlate traffic passing between a specific client and
the access point.
SHARED KEY A shared key can be used to authenticate each client attached to a wireless
network. Shared Key authentication must be used along with the 802.11
Wireless Equivalent Privacy algorithm.
SNTP Simple Network Time Protocol: SNTP allows a device to set its internal
clock based on periodic updates from a Network Time Protocol (NTP)
server. Updates can be requested from a specific NTP server, or can be
received via broadcasts sent by NTP servers.
TKIP Temporal Key Integrity Protocol: A data encryption method designed as a
replacement for WEP. TKIP avoids the problems of WEP static keys by
dynamically changing data encryption keys.
TFTP Trivial File Transfer Protocol: A TCP/IP protocol commonly used for software
downloads.
VAP Virtual Access Point: Virtual AP technology multiplies the number of Access
Points present within the RF footprint of a single physical access device.
With Virtual AP technology, WLAN users within the device.s footprint can
associate with what appears to be different access points and their
associated network services. All the services are delivered using a single
radio channel, enabling Virtual AP technology to optimize the use of limited
WLAN radio spectrum.
WI-FI PROTECTED
ACCESS
WPA employs 802.1X as its basic framework for user authentication and
dynamic key management to provide an enhanced security solution for
802.11 wireless networks.
WEP Wired Equivalent Privacy: WEP is based on the use of security keys and the
popular RC4 encryption algorithm. Wireless devices without a valid WEP
key will be excluded from network traffic.