Appendix b - useful terms and definitions – SmartBridges sB3210 User Manual

Page 51

Advertising
background image

Page 51 of 55

airPoint™ Nexus User Configuration Guide

i n t e l l i g e n t w i r e l e s s p l a t f o r m

Appendix B - Useful terms and definitions

Abbreviations Acronyms

MAC Media

Access

Control

RSSI

Receive Signal Sensitivity Indication

SSID Service

Set

Identifier

DHCP

Dynamic Host Configuration Protocol

ACL

Access Control List

SNMP

Simple Network Management Protocol

NTP

Network Time Protocol

STP

Spanning Tree Protocol

TCP/IP

Transmission Control Protocol/ Internet Protocol

802.11h

The 802.11h specification is an addition to the 802.11 family of standards for wireless local area
networks (WLANs). 802.11h is intended to resolve interference issues introduced by the use of
802.11a in some locations, particularly with military radar systems and medical devices.

802.11Q

IEEE 802.11Q defines a mechanism for tagging frames so that they can be segregated into separate
VLANs.


802.11i

An upcoming security standard currently being developed by IEEE that features 802.1x authentication
protections and adds AES (Advanced Encryption Standard) technology, a stronger level of security
than used in WPA for encryption protection along with other enhancements.

IEEE 802.1x

A security standard featuring a port-based authentication framework and dynamic distribution of
session keys for WEP encryption. A RADIUS server is required.

SSID

Each ESS has a Service Set Identifier (SSID) used to identify the Radio that belong to the ESS.
Radios can be configured with the SSID of the ESS to which they should associate. By default,
radios broadcast their SSID to advertise their presence.


VLAN

A VLAN is a switched network that is logically rather than physically segmented. VLANs enable
workstations and other devices to have a virtual association - independent of geographic location or
physical attachment to the network. These groupings can be based upon organizational unit,
application, role, or any other logical grouping.


WEP

According to the IEEE 802.11 standard, Wired Equivalent Privacy (WEP) is intended to provide
“confidentiality that is subjectively equivalent to the confidentiality of a wired local area network
medium and that does not employ cryptographic techniques to enhance privacy.”
WEP relies on a secret key that is shared between a mobile station and an access point. WEP uses
the RC4 stream cipher invented by RSA Data Security. RC4 is a symmetric stream cipher that uses
the same variable length key for encryption and decryption. With WEP enabled, the sender encrypts
the data frame payload and replaces the original payload with the encrypted payload. The sender

Advertising