beautypg.com

ProSoft Technology RLX2-IHNF-WC User Manual

Page 206

background image

RLX2 Industrial Hotspot Series

Page 206 of 212

ProSoft Technology, Inc.

June 15, 2015

Spread Spectrum

A form of wireless communication in which a signal’s frequency is deliberately varied.
This increases bandwidth and lessens the chances of interruption or interception of the
transmitted signal.

SSI

Service Set Identifier is a sequence of characters unique to a specific network or
network segment that’s used by the network and all attached devices to identify
themselves and allow devices to connect to the correct network when one or more than
one independent network is operating in nearby areas.

Subnet Mask

A mask used to determine what subnet an IP address belongs to. An IP address has two
components: the network address, and the host (node or device) address. For example,
consider the IP address 150.215.017.009. Assuming this is part of a Class B network
(with a subnet mask of 255.255.0.0), the first two numbers (150.215) represent the
Class B network address, and the second two numbers (017.009) identify a particular
host on this network.

T

TKIP

Temporal Key Integrity Protocol. The wireless security encryption mechanism in Wi-Fi
Protected Access. TKIP uses a key hierarchy and key management methodology that
removes the predictability that intruders relied upon to exploit the WEP key. In
increases the size of the key from 40 to 128 bits and replaces WEP’s single static key
with keys that are dynamically generated and distributed by an authentication server,
providing some 500 trillion possible keys that can be used on a given data packet. If also
includes a Message Integrity Check (MIC), designed to prevent the attacker from
capturing data packets, altering them, and resending them. By greatly expanding the
size of keys, the number of keys in use, and by creating an integrity checking
mechanism, TKIP magnifies the complexity and difficulty involved in decoding data on a
Wi-Fi network. TKIP greatly increases the strength and complexity of wireless
encryption, making it far more difficult (if not impossible) for a would-be intruder to
break into a Wi-Fi network.

This manual is related to the following products: