User Manual

RC4: An encryption algorithm designed at RSA Laboratories; specifically, a stream cipher of pseudo-random
bytes that is used in WEP encryption.
Remote Authentication Dial-In User Service (RAID): An authentication and accounting system that verifies
users' credentials and grants access to requested resources.
Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure
networks built around multiple access points.
S
Service Set Identifier (SSID): Used to identify clients on a wireless network.
Shared key An encryption key known only to the receiver and sender of data.
Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot
the field strength of the first unit’s transmitted signal. By moving the transmitter around, and repeating the
plots, you can develop a plan as to the best locations for access points. You will also identify dead zones and
other areas in need of special attention. This can be a long, slow process, but it beats ripping up an
unsatisfactory installation and starting over. These tests require special software commands. Refer to your
manual for specific instructions. If you have a very large, or unusually complex installation situation, you might
want to consider calling in professionals to do your survey. We are not permitted to suggest installer names,
but you can check your yellow pages or similar sources for likely candidates.
T
Transceiver: A commonly used term that describes a combination transmitter and receiver. Both 802.11a and
802.11b devices would be properly described as data transceivers.
U
UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of
frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference
from other legal WLAN users, but the other sources of interference problems are, or legally should be,
missing.
W
WECA: The Wireless Ethernet Compatibility Alliance...
WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit).
This is a low-level encryption technique designed to give the user about the same amount of privacy that he
would expect from a LAN. It is extremely important to understand that WEP is not some CIA-proof supercode!
It performs as intended, giving the user a simple level of data security and protection from casual electronic
eavesdropping. Use of the 128 bit option at all possible times is recommended. Remember that 802.11
devices transmit (broadcast) in all directions, and that it is possible, with very complex software, to copy and