beautypg.com

Glossary – LevelOne WAB-1000 User Manual

Page 57

background image

52

Glossary

3DES

Also referred to as Triple DES, a mode of the DES encryption algorithm that encrypts data three times.

802.11

802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an

over-the-air interface between a wireless client and a base station or between two wireless clients. The IEEE accepted

the specification in 1997.

802.11b (also referred to as 802.11 High Rate or WiFi)

802.11b is an extension to 802.11 that applies to wireless LANs and provides 11 Mbps transmission (with a fallback to

5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b/g uses only DSSS. 802.11b/g was a 1999 ratification to the original

802.11 standard, allowing wireless functionality comparable to Ethernet.

802.11g

802.11g applies to wireless LANs and provides 20-54 Mbps in the 2.4 GHz band. Because 802.11g is backwards-

compatible with 802.11b, it is a popular component in WLAN construction. 802.11g uses OFDM (orthogonal

frequency division multiplexing) technology.

Access Point

An access point is a gateway set up to allow a group of LAN users access to another group or a main group. The access

point doesn’t use the DHCP server function and therefore accepts IP address assignment from the controlling network.

AES

Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique developed by Belgian

cryptographers Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption

technique in October 2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously.

There are two current “flavors” of AES, AES-CCMP, which has been ratified by the WiFi Alliance for use in WPA and,

eventually, under the 802.11i standard, and AES-ECB, which has been ratified by NIST for use in the FIPS-140-2

standard.

Bridge

A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol,

such as Ethernet or Token-Ring.