Operation Manual
11N Wireless Broadband Router User Guide
45
Appendix 1 Glossary
Channel:
An instance of medium use for the purpose of passing protocol data units (PDUs) that may be used
simultaneously, in the same volume of space, with other instances of medium use(on other channels) by
other instances of the same physical layer (PHY),with an acceptably low frame error ratio(FER) due to
mutual interference.
SSID:
SSID (Service Set Identifier) is the network name shared by all devices in a wireless network. Your
network’s SSID should be unique to your network and identical for all devices within the network. It is
case-sensitive and must not exceed 20 characters (use any of the characters on the keyboard).Make
sure this setting is the same for all devices in your wireless network.
WPA/WPA2 Encryption:
A security protocol for wireless networks that builds on the basic foundations of WEP. It secures wireless
data transmission by using a key similar to WEP, but the added strength of WPA is that the key changes
dynamically. The changing key makes it much more difficult for a hacker to learn the key and gain
access to the network.WPA2 is the second generation of WPA security and provides a stronger
encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some
government users.
802,1x authentication
Static WEP key is difficult to manage for when you change the key, you will have to inform all others, and
if the key is disclosed in one of the places, the key can no longer provide security. Besides, there’s
severe security loophole about static WEP encryption. The WEP key can be decrypted after one person
receives a specific amount of data via wireless intercepting. 802,1x is initially used for wired Ethernet
authentication access to prevent illegal users from accessing the network. Later, it is found that 802.1x
can better solve the wireless network security problem. EAP-TLS of the 802.1x successfully achieves
the two-way authentication between users and networks, i.e. can prevent illegal users from accessing
the network and can also prevent users from accessing the illegal AP. 802.1x utilizes dynamic WEP
encryption to protect the WEP key from being decrypted. To solve the publishing problem for digital
certification, people make some changes to TLS authentication and TTLS and EAP come into exist,
which enable you to access the network by using the traditional way of authentication: username and
password.