Edimax EW-7438RPn Manual - Page 55

A specific Ad-hoc LAN is called a Basic Service Set BSS. - air

Page 55 highlights

a branch or SOHO operation. 5. What is Infrastructure? An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad-hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. 8. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard. 9. What is AES? AES (Advanced Encryption Standard), a chip-based security method, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in the IEEE 802.11i standard. Compared with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level. 10. Can wireless products support printer sharing? Wireless products perform the same function as LAN products. Therefore, wireless products can work with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing. 11. Can the information be intercepted while transmitting over the air? WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series offer an encryption function to enhance security and Access Control. Users can set it up depending upon their needs. 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

53
a branch or SOHO operation.
5.
What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an
Infrastructure configuration. Infrastructure is applicable to enterprise
scale for wireless access to central database, or wireless application
for mobile workers.
6.
What is BSS ID?
A specific Ad-hoc LAN is called a Basic Service Set (BSS).
Computers in a BSS must be configured with the same BSS ID.
7.
What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based
on a 40 bit shared key algorithm, as described in the IEEE 802 .11
standard.
8.
What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent
weaknesses in WEP security, especially the reuse of encryption keys.
TKIP is involved in the IEEE 802.11i WLAN security standard.
9.
What is AES?
AES (Advanced Encryption Standard), a chip-based security method,
has been developed to ensure the highest degree of security and
authenticity for digital information, wherever and however
communicated or stored, while making more efficient use of
hardware and/or software than previous encryption standards. It is
also included in the IEEE 802.11i standard. Compared with AES,
TKIP is a temporary protocol for replacing WEP security until
manufacturers implement AES at the hardware level.
10.
Can wireless products support printer sharing?
Wireless products perform the same function as LAN products.
Therefore, wireless products can work with Netware, Windows 2000,
or other LAN operating systems to support printer or file sharing.
11.
Can the information be intercepted while transmitting over the
air?
WLAN features two-fold protection in security. On the hardware
side, as with Direct Sequence Spread Spectrum technology, it has
the inherent security feature of scrambling. On the software side,
WLAN series offer an encryption function to enhance security and
Access Control. Users can set it up depending upon their needs.