Setup guide

ILX34-AENWG POINT I/O Platform Glossary of Terms
Wireless Point I/O Adapter Setup Guide
Page 74 of 79 ProSoft Technology, Inc.
July 31, 2009
WEP
Wired-Equivalent Privacy protocol was specified in the IEEE 802.11 standard to
provide a WLAN with a minimal level of security and privacy comparable to a
typical wired LAN, using data encryption.
Wi-Fi
A certification mark managed by a trade group called the Wi-Fi Alliance. Wi-Fi
certification encompasses numerous standards including 802.11a, 802.11b,
802.11g, WPA, and more. Equipment must pass compatibility testing to receive
the Wi-Fi mark.
Wi-Fi CERTIFIED™
The certification standard designating IEEE 802.11-based wireless local area
network (WLAN) products that have passed interoperability testing requirements
developed and governed by the Wi-Fi alliance.
Wi-Fi Interoperability Certificate
A statement that a product has passed interoperability testing and will work with
other Wi-Fi CERTIFIED products.
Wi-Fi Protected Setup
Wi-Fi Protected Setup™ (previously called Wi-Fi Simple Config) is an optional
certification program developed by the Wi-Fi alliance designed to ease set up of
security enabled Wi-Fi networks in the home and small office environment. Wi-Fi
Protected Setup supports methods (pushing a button or entering a PIN into a
wizard-type application) that are familiar to most consumers to configure a
network and enable security.
Wireless Gateway
Term used to differentiate between an access point and a more-capable device
that can share an internet connection, serve DHCP, and bridge between wired
and wireless networks.
Wireless Network
Devices connected to a network using a centralized wireless access point.
WLAN
Wireless Local Area Network. A type of local area network in which data is sent
and received via high-frequency radio waves rather than cables or wires.
WPA
Wi-Fi Protected Access is a data encryption specification for 802.11 wireless
networks that replaces the weaker WEP. It improves on WEP by using dynamic
keys, Extensible Authentication Protocol to secure network access, and an
encryption method called Temporal Key Integrity Protocol (TKIP) to secure data
transmissions.