Technical data

326 Meru System Director Configuration Guide © 2012 Meru Networks, Inc.
802.11i
Supports the 128-bit Advanced Encryption Standard (AES) and Temporal Key Integrity
Protocol (TKIP) along with 802.1X authentication and key management features for
increased WLAN security capabilities.
802.11j
Provides enhancements to the current 802.11 standard to support the 4.9GHz - 5GHz band
for operations in Japan.
802.11k
Due for ratification in 2005, the 802.11k Radio Resource Management standard will provide
measurement information for access points and switches to make Wireless LANs run more
efficiently.
802.11n
An emerging standard aimed at providing greater than 100 Mbps of throughput in a wireless
environment.
802.11r
A specification under development to improve a wireless client's ability to roam across
wireless networks.
802.16
A specification for fixed broadband wireless metropolitan access networks (MANs) that
uses a point-to-multipoint architecture. The standard defines the use of bandwidth
between the licensed 10GHz and 66GHz bands and between the 2GHZ and 11GHz (licensed
and unlicensed) frequency ranges. 802.16 supports very high bit rates for a distance of
approximately 30 miles.
802.1X
Wireless LAN security implementation that uses port-based authentication between an
operating system and the network access device, meant to increase security in user
authentication by using Radius, Extensible Authentication Protocol (EAP), and LDAP.
A
AAA
authentication, authorization, and accounting (triple A). An IP-based system for
providing services to ensure secure network connections for users. The system requires a
server such as a Radius server to enforce these services.
access point
A device that is managed by a controller and that allows stations such as cellular phones
or laptops to communicate wirelessly with the Meru Wireless LAN System.
accounting
Services that track the resources a user session uses such as amount of time logged on,
data transferred, resources, etc. Accounting services are typically used for billing,
auditing, analysis, etc.
ACL
Access Control List. A list kept by the controller to limit access of station to the WLAN. The
ACL can be a permit, deny, or Radius Server list of MAC addresses of the NIC device within
the station. An ACL is controller by the configured state, either enabled or disabled.
AES
Advanced Encryption Standard. An encryption standard that uses a symmetric encryption
algorithm (Rijndael). AES was chosen by the National Information and Standards Institute
(NIST) as the Federal Information Processing Standard (FIPS).
Air Traffic
Control
Meru technology that exercises a high degree of control over all transmissions within a
wireless network. Unlike superficially similar technologies from other vendors, Air Traffic
Control technology coordinates uplink and downlink transmissions on a single 802.11
channel in such a manner that the effects of co-channel and adjacent channel interference