Appendix e: glossary – RF-Link WRT55AG User Manual

Page 52

Advertising
background image

Dual-Band Wireless A+G Broadband Router

97

2. In the command prompt, enter ipconfig /all. Then press the Enter key.

3. Write down the Physical Address as shown on your computer screen; it is

the MAC address for your Ethernet adapter. This will appear as a series of
letters and numbers.

The MAC address/Physical Address is what you will use for MAC address
cloning or MAC filtering.

Write down the IP Address as shown on your computer screen. The exam-
ple in Figure E-5 shows the IP address of your Ethernet adapter as
192.168.1.100. Your computer may show something different.

96

Appendix E: Glossary

802.11a - One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. It specifies a maximum
data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a
standard uses the Orthogonal Frequency Division Multiplexing (OFDM) trans-
mission method. Additionally, the 802.11a standard supports 802.11 features
such as WEP encryption for security.

802.11b - One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. The 802.11b standard
specifies a maximum data transfer rate of 11Mbps, an operating frequency of
2.4GHz, and WEP encryption for security. 802.11b networks are also referred
to as Wi-Fi networks.

802.11g - A proposed, but as yet unratified extension of the IEEE 802.11 stan-
dard for wireless networking hardware. The draft 802.11g specifications used
by Linksys specify a maximum data transfer rate of 54Mbps using OFDM
modulation, an operating frequency of 2.4GHz, backward compatibility with
IEEE 802.11b devices, and WEP encryption for security.

802.1x - Based on the Extensible Authentication Protocol (EAP), the 802.1x
standard is one of the IEEE standards for network authentication and key man-
agement. It establishes a framework that supports multiple authentication meth-
ods. This standard can be incorporated into any type of network to enhance its
security.

For example, a wireless user may use one of the authentication methods to
access a wireless network protected by an authentication server. The user, also
called the supplicant, sends a request to an access point or wireless router, also
called the authenticator. The authenticator sends an identification request back
to the user. After the user sends the authenticator the identification message,
the authenticator forwards the user's identification message to the authentica-
tion server. If the server accepts the identification message, then the user is per-
mitted access to the wireless network. The 802.1x standard can also support
encryption key management to strengthen wireless network encryption servic-
es.

Instant Wireless

®

Series

Figure D-5

Note: The MAC address is also called the Physical
Address.

Advertising