User's Manual

S
e
r
v
i
c
e
S
e
t
Identifier
(
SS
I
D)
Name
of
a WLAN. All wireless devices on a WLAN
m
us
t
use
the
same SSID
to
c
om
m
u
ni
c
a
t
e
wi
t
h
each
other.
S
i
mp
l
e
Network
M
a
n
a
g
e
m
e
n
t
Pr
o
t
o
c
o
l
(
S
N
M
P)
An
I
n
t
e
r
ne
t
-
s
t
a
nda
r
d
protocol
for
managing devices
on
IP
ne
t
wor
k
s
.
S
noop
i
n
g
Passively
w
a
t
c
hi
ng
a network
for
da
t
a
,
such as passwords,
that
can be used
to
benefit a
hacker.
Temporal Key
Integrity
P
r
o
t
o
c
o
l
(
T
K
I
P)
An encryption protocol
that
uses
128-bit
keys. Keys
are dynamically
g
e
n
e
r
a
t
e
d
and
di
s
t
r
i
bu
t
e
d
by
the
authentication
server.
TKIP
regularly changes and
r
o
t
a
t
e
s
encryption keys,
with
an
encryption
key never being used
twice.
Transmission
Co
n
t
r
o
l
Pr
o
t
o
c
o
l
/
In
t
e
r
n
e
t
P
r
o
t
o
c
o
l
(
T
CP
/
I
P)
A protocol
that
allows
c
o
mmuni
c
a
t
i
ons
over and be
t
w
ee
n
ne
t
wor
k
s
.
T
CP
/
I
P
is
the
basis
f
or
Internet
communications.
W
e
i
g
h
t
e
d
Fair Queuing
(
W
F
Q
)
WFQ services queues are based on
priority
and queue
w
e
i
g
h
t
.
Queues
with
larger
w
e
i
g
h
t
s
get
more service
than
queues
with
smaller
w
e
i
g
h
t
s
.
This
highly efficient
queuing mechanism
di
v
i
d
e
s
available bandwidth
across
different
traffic
q
ue
u
e
s
.
Wired
E
qu
i
v
a
l
e
n
t
Privacy
(
W
E
P)
S
e
c
ur
i
t
y
protocol
that
provides a WLAN
with
a level
of
s
e
c
u
r
i
t
y
and privacy comparable
to that of
a wired LAN. WEP encrypts
da
t
a
s
e
n
t
be
t
w
ee
n
wired and WLANs
to
keep
t
r
a
ns
m
i
ss
i
on
s
private.
Wireless Local-Area
Network
(
W
L
AN
)
WLANs use RF
t
e
c
hn
ol
ogy
to
send and receive da
t
a
wirelessly
in
a
c
e
r
t
a
i
n
area. This
l
e
t
s
users
in a
small zone send
da
t
a
and share resources such as
pr
i
n
t
e
r
s
without
using cables
to
ph
y
s
i
c
a
ll
y
c
onne
c
t
each
computer.
W
i
-
F
i
Pr
o
t
e
c
t
e
d
Access (WPA
)
A
s
u
bs
e
t
of the
IEEE
802.11i
s
t
a
n
da
r
d.
WPA applies
IEEE
802.1x and
E
x
t
e
ns
i
bl
e
Authentication
P
r
o
t
oc
ol
(EAP)
to
a
u
t
he
n
t
i
c
a
t
e
wireless
c
li
e
n
t
s
using an e
x
t
e
r
na
l
RADIUS
d
a
t
a
ba
s
e.
WPA
us
e
s
Temporal Key
Integrity
P
r
o
t
oc
ol
(TKIP), Message
Integrity
Check (MIC), and
IEEE
802.1x
to encrypt
da
t
a
.
See
also
WPA-PSK (WPA
-
P
r
e
-
S
ha
r
e
d
K
ey
)
.
W
i
-
F
i
MultiMedia (WMM)
P
a
r
t
of the
IEEE
802.11e QoS
e
n
ha
nce
m
e
n
t
to the
Wi-Fi
s
t
a
n
da
r
d
that
ensures
quality
of
service
for
multimedia
a
ppl
i
c
a
t
i
o
ns
in
W
L
A
Ns
.
Wireless
Cl
i
e
n
t
S
upp
li
c
a
n
t
s
S
o
f
t
w
a
r
e
that
runs
on
an
ope
r
a
t
i
ng
s
y
s
t
e
m
,
i
ns
t
r
u
c
t
i
ng
the
wireless
client how
to
use
W
P
A
.
WPA
-
Pre
-
S
h
a
r
e
d
Key
(
W
P
A
-
PS
K)
WPA-PSK
requires a single
(
i
de
n
t
i
c
a
l
)
password
e
n
t
e
r
e
d
into
each Access
P
oi
n
t
,
wireless
gateway,
and wireless
c
li
e
n
t
.
A client
is
g
r
a
n
t
e
d
access
to
a WLAN
if the
passwords
match.
W
P
A2
A wireless
s
e
c
ur
i
t
y
s
t
a
nd
a
r
d
that
defines
s
t
r
o
nge
r
enc
r
y
p
t
i
on,
authentication, and
key
m
a
na
g
e
m
e
n
t
than
WPA.
It
includes
two
da
t
a
encryption
a
l
g
or
i
t
h
m
s
,
Temporal Key
Integrity