Canon 802.11g 54M WLAN User Manual
Page 68
802.11g 4-Port Wireless LAN Broadband Router
68
Shared Key
It’s when both the sender and recipient share a secret key. Both units use this key for an
extended length of time, sometimes indefinitely. Any eavesdropper that discovers the key
may decipher all packets until the key is changed.
Signal Strength
The signal level indicates the strength of the signal as received at the wireless network
interface.
SSID (Service Set Identifier)
It’s the unique name shared among all points in a wireless network. The SSID must be
identical for all points in the network. It is case sensitive and must not exceed 32
characters.
TCP/IP
Transmission Control Protocol (TCP) with Internet Protocol (IP). The main internetworking
protocol used in the Internet.
UDP (User Datagram Protocol)
UDP provides a procedure for application programs to send messages to other programs
with a minimum of protocol mechanism. The protocol is transaction oriented, and delivery
and duplicate protection is not guaranteed. Applications requiring ordered reliable delivery
of streams of data should use the TCP.
What is Router?
A router is a device that forwards data packets from a source to a destination. Routers
forward data packets using IP addresses and not a MAC address. A router will forward data
from the Internet to a particular computer on your LAN. A router also determines the best
route that data packets should follow to ensure that the data packets are delivered properly.
WEP (Wired Equivalent Privacy)
A data privacy mechanism based on a 40 bit shared key algorithm, as described in the
IEEE 802 .11 standard. The optional cryptographic confidentiality algorithm specified by
IEEE 802.11 used to provide data confidentiality that is subjectively equivalent to the
confidentiality of a wired LAN medium that does not employ cryptographic techniques to
enhance privacy.
WPA (Wi-Fi Protected Access)
Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It
uses 802.1x and EAP to control network access. Temporal Key Integrity Protocol (TKIP) is