D-Link DWL-3500AP Administration Guide - Page 164

Unicast, Temporal Key Integrity Protocol, Service, Quality of Service, User Datagram Protocol

Page 164 highlights

D-Link Unified Access Point Administrator's Guide suite based upon these, including ICMP, ARP, UDP, and others, as well as applications that run upon these protocols, such as telnet, FTP, etc. Some wireless security modes distinguish between how unicast, multicast, and broadcast frames are encrypted or whether they are encrypted. TKIP The Temporal Key Integrity Protocol (TKIP) provides an extended 48-bit initialization vector, perpacket key construction and distribution, a Message Integrity Code (MIC, sometimes called "Michael"), and a re-keying mechanism. It uses a RC4 stream cipher to encrypt the frame body and CRC of each 802.11 frame before transmission. It is an important component of the WPA and 802.11i security mechanisms. ToS TCP/IP packet headers include a 3-to-5 bit Type of Service (ToS) field set by the application developer that indicates the appropriate type of service for the data in the packet. The way the bits are set determines whether the packet is queued for sending with minimum delay, maximum throughput, low cost, or mid-way "best-effort" settings depending upon the requirements of the data. The ToS field is used by the D-Link AP to provide configuration control over Quality of Service (QoS) queues for data transmitted from the AP to client stations. U UDP The User Datagram Protocol (UDP) is a transport layer protocol providing simple but unreliable datagram services. It adds port address information and a checksum to an IP packet. UDP neither guarantees delivery nor does it require a connection. It is lightweight and efficient. All error processing and retransmission must be performed by the application program. Unicast A Unicast sends a message to a single, specified receiver. In wireless networks, unicast usually refers to an interaction in which the access point sends data traffic in the form of IEEE 802.1X Frames directly to a single client station MAC address on the network. See also Multicast and Broadcast. URL A Uniform Resource Locator (URL) is a standard for specifying the location of objects on the Internet, such as a file or a newsgroup. URLs are used extensively in HTML documents to specify the target of a hyperlink which is often another HTML document (possibly stored on another computer). The first part of the URL indicates what protocol to use and the second part specifies the IP address or the domain name where that resource is located. For example, ftp://ftp.dlink.com/downloads/ myfile.tar.gz specifies a file that should be fetched using the FTP protocol; http://www.dlink.com/ index.html specifies a Web page that should be fetched using the HTTP protocol. V VLAN A virtual LAN (VLAN) is a software-based, logical grouping of devices on a network that allow them to act as if they are connected to a single physical network, even though they may not be. The nodes in a VLAN share resources and bandwidth, and are isolated on that network. The Unified Access Point supports the configuration of a wireless VLAN. This technology is leveraged on the access point for the "virtual" guest network feature. VPN A Virtual Private Network (VPN) is a network that uses the Internet to connect its nodes. It uses encryption and other mechanisms to ensure that only authorized users can access its nodes and that data cannot be intercepted. 164 © 2001-2008 D-Link Corporation. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166

D-Link Unified Access Point Administrator’s Guide
164
© 2001-2008 D-Link Corporation. All Rights Reserved.
suite based upon these, including ICMP, ARP,
UDP
,
and others, as well as applications that run upon these
protocols, such as telnet, FTP, etc.
TKIP
The
Temporal Key Integrity Protocol
(TKIP)
provides an extended 48-bit initialization vector, per-
packet key construction and distribution, a Message
Integrity Code (MIC, sometimes called “Michael”),
and a re-keying mechanism. It uses a
RC4
stream
cipher to encrypt the frame body and CRC of each
802.11
frame before transmission. It is an important
component of the
WPA
and
802.11i
security
mechanisms.
ToS
TCP/IP
packet headers include a 3-to-5 bit Type
of
Service
(ToS) field set by the application developer
that indicates the appropriate type of service for the
data in the packet. The way the bits are set
determines whether the packet is queued for sending
with minimum delay, maximum throughput, low
cost, or mid-way “best-effort” settings depending
upon the requirements of the data. The ToS field is
used by the D-Link AP to provide configuration
control over
Quality of Service
(
QoS
) queues for data
transmitted from the AP to client stations.
U
UDP
The
User Datagram Protocol
(UDP) is a transport
layer protocol providing simple but unreliable
datagram services. It adds port address information
and a checksum to an
IP
packet.
UDP neither guarantees delivery nor does it require a
connection. It is lightweight and efficient. All error
processing and retransmission must be performed by
the application program.
Unicast
A
Unicast
sends a message to a single, specified
receiver. In wireless networks, unicast usually refers
to an interaction in which the access point sends data
traffic in the form of
IEEE 802.1X Frame
s directly to
a single client station
MAC
address on the network.
Some wireless security modes distinguish between
how unicast, multicast, and broadcast frames are
encrypted or whether they are encrypted.
See also
Multicast
and
Broadcast
.
URL
A
Uniform Resource Locator
(URL) is a standard for
specifying the location of objects on the Internet,
such as a file or a newsgroup. URLs are used
extensively in HTML documents to specify the target
of a hyperlink which is often another HTML
document (possibly stored on another computer).
The first part of the URL indicates what protocol to
use and the second part specifies the IP address or the
domain name where that resource is located.
For example,
myfile.tar.gz
specifies a file that should be fetched
using the FTP protocol;
index.html
specifies a Web page that should be
fetched using the
HTTP
protocol.
V
VLAN
A
virtual
LAN
(VLAN) is a software-based, logical
grouping of devices on a network that allow them to
act as if they are connected to a single physical
network, even though they may not be. The nodes in
a VLAN share resources and bandwidth, and are
isolated on that network. The Unified Access Point
supports the configuration of a wireless VLAN. This
technology is leveraged on the access point for the
“virtual” guest network feature.
VPN
A
Virtual Private Network
(VPN) is a network that
uses the Internet to connect its nodes. It uses
encryption and other mechanisms to ensure that only
authorized users can access its nodes and that data
cannot be intercepted.