beautypg.com

SMC Networks SMCWHSG44-G User Manual

Page 95

background image

Dynamic Host Configuration Protocol (DHCP)
Provides a framework for passing configuration information to hosts on a
TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding
the capability of automatic allocation of reusable network addresses and
additional configuration options.

Encryption
Data passing between the access point and clients can use encryption to
protect from interception and eavesdropping.

Extended Service Set (ESS)
More than one wireless cell can be configured with the same Service Set
Identifier to allow mobile users can roam between different cells with the
Extended Service Set.

Extensible Authentication Protocol (EAP)
An authentication protocol used to authenticate network clients. EAP is
combined with IEEE 802.1x port authentication and a RADIUS authentication
server to provide “mutual authentication” between a client, the access point,
and the a RADIUS server

Ethernet
A popular local area data communications network, which accepts
transmission from computers and terminals.

File Transfer Protocol (FTP)
A TCP/IP protocol used for file transfer.

Hypertext Transfer Protocol (HTTP)
HTTP is a standard used to transmit and receive all data over the World
Wide Web.

Internet Control Message Protocol (ICMP)
A network layer protocol that reports errors in processing IP packets. ICMP
is also used by routers to feed back information about better routing choices.

IEEE 802.11b
A wireless standard that supports wireless communications in the 2.4 GHz
band using Direct Sequence Spread Spectrum (DSSS). The standard provides
for data rates of 1, 2, 5.5, and 11 Mbps.

IEEE 802.11g
A wireless standard that supports wireless communications in the 2.4 GHz
band using Orthogonal Frequency Division Multiplexing (OFDM). The stan-
dard provides for data rates of 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps. IEEE
802.11g is also backward compatible with IEEE 802.11b.

IEEE 802.1x
Port Authentication controls access to the switch ports by requiring users to
first enter a user ID and password for authentication.

94