Chapter - appendix – Asus WL-320gP User Manual
Page 59
.
Appendix
ASUS 802.11g Access Point
Chapter - Appendix
Hertz. One gigahertz (GHz) is one billion Hertz. The standard US electrical
power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55-1.6
MHz, the FM broadcast radio frequency band is 88-108 MHz, and wireless
802.11 LANs operate at 2.4 GHz.
RIP (Routing Information Protocol)
Routing Information Protocol(RIP1) is defined as a means by which routing
equipment can find the best path for transmitting data packets from one
network to another. Upgrades have been made to the RIP1 protocol, resulting
in Routing Information Protocol Version 2 (RIP2). RIP2 was developed to
cover some of the inefficiencies of RIP1.
Metric: RIP metric is a value of distance for the network. Usually
RIP increments the metric when the network information is received.
Redistributed routes’ default metric offset is set to 1. These rules can be
used to change the metric offset only for the matched networks specified
or excluded in the Route Metric Offset table. But the metric offset of other
networks is still set to 1.
SSID (Service Set ID)
SSID is a group name shared by every member of a wireless network. Only
client PCs with the same SSID are allowed to establish a connection.
Station
Any device containing IEEE 802.11 wireless medium access conformity.
Subnet Mask
A subnet mask is a set of four numbers configured like an IP address. It is
used to create IP address numbers used only within a particular network.
TCP (Transmission Control Protocol)
The standard transport level protocol that provides the full duplex, stream
service on which many application protocols depend. TCP allows a process
or one machine to send a stream of data to a process on another. Software
implementing TCP usually resides in the operating system and uses the IP
to transmit information across the network.
TKIP (Temporal Key Integrity Protocol)
TKIP is used in WPA to replace WEP with a new encryption algorithm that
is stronger than the WEP algorithm but that uses the calculation facilities
present on existing wireless devices to perform encryption operations.