User's Manual

19
ٛ
ٛ 16. Static IP Addressing
A method of assigning IP addresses to clients on the network. In networks with Static IP address, the network administrator
manually assigns an IP address to each computer. Once a Static IP address is assigned, a computer uses the same IP address
every time it reboots and logs on to the network, unless it is manually changed.
ٛ
ٛ 17. Temporal Key Integrity Protocol (TKIP)
ٛ The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption standard for wireless
LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs.
TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP.
ٛ
ٛ 18. Transmission Control Protocol / Internet Protocol (TCP/IP)
TCP/IP is the protocol suite developed by the Advanced Research Projects Agency (ARPA). It is widely used in corporate
Internet works, because of its superior design for WANs. TCP governs how packet is sequenced for transmission the
network. The term “TCP/IP” is often used generically to refer to the entire suite of related protocols.
ٛ
ٛ 19. Transmit / Receive
ٛ The wireless throughput in Bytes per second averaged over two seconds.
ٛ
ٛ 20. Wi-Fi Alliance
The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area
Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance’s members is to enhance the user
experience through product interoperability. The organization is formerly known as WECA.
ٛ
ٛ 21. Wi-Fi Protected Access (WPA)
ٛ The Wi-Fi Alliance put together WPA as a data encryption method for 802.11 wireless LANs. WPA is an industry-supported,
pre-standard version of 802.11i utilizing the Temporal Key Integrity Protocol (TKIP), which fixes the problems of WEP,
including using dynamic keys.
ٛ
ٛ 22. Wide Area Network (WAN)
A WAN consists of multiple LANs that are tied together via telephone services and / or fiber optic cabling. WANs may span
a city, a state, a country, or even the world.
ٛ
ٛ 23. Wired Equivalent Privacy (WEP)
Now widely recognized as flawed, WEP was a data encryption method used to protect the transmission between 802.11
wireless clients and APs. However, it used the same key among all communicating devices. WEP’s problems are
well-known, including an insufficient key length and no automated method for distributing the keys. WEP can be easily
cracked in a couple of hours with off-the-shelf tools.
ٛ
ٛ 24. Wireless LAN (WLAN)
A wireless LAN does not use cable to transmit signals, but rather uses radio or infrared to transmit packets through the air.
Radio Frequency (RF) and infrared are the commonly used types of wireless transmission. Most wireless LANs use spread
spectrum technology. It offers limited bandwidth, usually under 11Mbps, and users share the bandwidth with other devices
in the spectrum; however, users can operate a spread spectrum device without licensing from the Federal Communications
Commission (FCC).
ٛ
ٛ 25. Fragment Threshold
The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve parallel transmissions. A
large data frame is fragmented into several fragments each of size equal to fragment threshold. By tuning the fragment
threshold value, we can get varying fragment sizes. The determination of an efficient fragment threshold is an important
issue in this scheme. If the fragment threshold is small, the overlap part of the master and parallel transmissions is large.
This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the overlap is
small and the spatial reuse ratio is low. However high fragment threshold leads to low fragment overhead. Hence there is a
trade-off between spatial re-use and fragment overhead. Fragment threshold is the maximum packet size used for
fragmentation. Packets larger than the size programmed in this field will be fragmented If you find that your corrupted
packets or asymmetric packet reception (all send packets, for example). You may want to try lowering your fragmentation
threshold. This will cause packets to be broken into smaller fragments. These small fragments, if corrupted, can be resent
faster than a larger fragment. Fragmentation increases overhead, so you'll want to keep this value as close to the maximum
value as possible.
26. RTS (Request To Send) Threshold
The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTS transaction. The IEEE
802.11-1997 standard allows for short packets to be transmitted without RTS/ CTS transactions. Each station can have a
different RTS threshold. RTS/CTS is used when the data packet size exceeds the defined RTS threshold. With the
CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the receiving station, and waits for
the receiving station to send back a CTS (Clear to Send) packet before sending the actual packet data. This setting is useful