beautypg.com

Canon 802.11g 54M WLAN User Manual

Page 68

background image

802.11g 4-Port Wireless LAN Broadband Router

68

Shared Key

It’s when both the sender and recipient share a secret key. Both units use this key for an

extended length of time, sometimes indefinitely. Any eavesdropper that discovers the key

may decipher all packets until the key is changed.

Signal Strength

The signal level indicates the strength of the signal as received at the wireless network

interface.

SSID (Service Set Identifier)

It’s the unique name shared among all points in a wireless network. The SSID must be

identical for all points in the network. It is case sensitive and must not exceed 32

characters.

TCP/IP

Transmission Control Protocol (TCP) with Internet Protocol (IP). The main internetworking

protocol used in the Internet.

UDP (User Datagram Protocol)

UDP provides a procedure for application programs to send messages to other programs

with a minimum of protocol mechanism. The protocol is transaction oriented, and delivery

and duplicate protection is not guaranteed. Applications requiring ordered reliable delivery

of streams of data should use the TCP.

What is Router?

A router is a device that forwards data packets from a source to a destination. Routers

forward data packets using IP addresses and not a MAC address. A router will forward data

from the Internet to a particular computer on your LAN. A router also determines the best

route that data packets should follow to ensure that the data packets are delivered properly.

WEP (Wired Equivalent Privacy)

A data privacy mechanism based on a 40 bit shared key algorithm, as described in the

IEEE 802 .11 standard. The optional cryptographic confidentiality algorithm specified by

IEEE 802.11 used to provide data confidentiality that is subjectively equivalent to the

confidentiality of a wired LAN medium that does not employ cryptographic techniques to

enhance privacy.

WPA (Wi-Fi Protected Access)

Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It

uses 802.1x and EAP to control network access. Temporal Key Integrity Protocol (TKIP) is