LevelOne WBR-6005 User Manual

Page 119

Advertising
background image

ODFM

Orthogonal Frequency Division Multiplexing: OFDM allows multiple users to
transmit in an allocated band by dividing the bandwidth into many narrow

bandwidth carriers.

SSID

Service Set Identifier: An identifier that is attached to packets sent over
the wireless LAN and functions as a password for joining a particular radio
cell; i.e., Basic Service Set (BSS).

S

ESSION

K

EY

Session keys are unique to each client, and are used to authenticate a
client connection, and correlate traffic passing between a specific client and

the access point.

S

HARED

K

EY

A shared key can be used to authenticate each client attached to a wireless
network. Shared Key authentication must be used along with the 802.11

Wireless Equivalent Privacy algorithm.

SNTP

Simple Network Time Protocol: SNTP allows a device to set its internal
clock based on periodic updates from a Network Time Protocol (NTP)

server. Updates can be requested from a specific NTP server, or can be

received via broadcasts sent by NTP servers.

TKIP

Temporal Key Integrity Protocol: A data encryption method designed as a
replacement for WEP. TKIP avoids the problems of WEP static keys by

dynamically changing data encryption keys.

TFTP

Trivial File Transfer Protocol: A TCP/IP protocol commonly used for software
downloads.

VAP

Virtual Access Point: Virtual AP technology multiplies the number of Access
Points present within the RF footprint of a single physical access device.

With Virtual AP technology, WLAN users within the device.s footprint can

associate with what appears to be different access points and their

associated network services. All the services are delivered using a single

radio channel, enabling Virtual AP technology to optimize the use of limited

WLAN radio spectrum.

W

I

-F

I

P

ROTECTED

A

CCESS

WPA employs 802.1X as its basic framework for user authentication and
dynamic key management to provide an enhanced security solution for

802.11 wireless networks.

WEP

Wired Equivalent Privacy: WEP is based on the use of security keys and the
popular RC4 encryption algorithm. Wireless devices without a valid WEP

key will be excluded from network traffic.

– 119 –

G

LOSSARY

Advertising