Appendix 1 Glossary
Channel:
An instance of medium use for the purpose of passing protocol data units
(PDUs) that may be used simultaneously, in the same volume of space,
with other instances of medium use(on other channels) by other instances
of the same physical layer (PHY),with an acceptably low frame error
ratio(FER) due to mutual interference.
SSID:
SSID (Service Set Identifier) is the network name shared by all devices in a
wireless network. Your network’s SSID should be unique to your network
and identical for all devices within the network. It is case-sensitive and
must not exceed 20 characters (use any of the characters on the
keyboard).Make sure this setting is the same for all devices in your
wireless network.
WPA/WPA2 Encryption:
A security protocol for wireless networks that builds on the basic
foundations of WEP. It secures wireless data transmission by using a key
similar to WEP, but the added strength of WPA is that the key changes
dynamically. The changing key makes it much more difficult for a hacker to
learn the key and gain access to the network.WPA2 is the second
generation of WPA security and provides a stronger encryption mechanism
through Advanced Encryption Standard (AES), which is a requirement for
some government users.
802,1x authentication
Static WEP key is difficult to manage for when you change the key, you will
have to inform all others, and if the key is disclosed in one of the places,
the key can no longer provide security. Besides, there’s severe security
loophole about static WEP encryption. The WEP key can be decrypted
after one person receives a specific amount of data via wireless
intercepting. 802,1x is initially used for wired Ethernet authentication
access to prevent illegal users from accessing the network. Later, it is
found that 802.1x can better solve the wireless network security problem.
EAP-TLS of the 802.1x successfully achieves the two-way authentication
between users and networks, i.e. can prevent illegal users from accessing
the network and can also prevent users from accessing the illegal AP.
802.1x utilizes dynamic WEP encryption to protect the WEP key from