Canon 802.11g 54M WLAN User Manual

Page of 72
802.11g 4-Port Wireless LAN Broadband Router 
 
 
 
68
Shared Key   
It’s when both the sender and recipient share a secret key. Both units use this key for an 
extended length of time, sometimes indefinitely. Any eavesdropper that discovers the key 
may decipher all packets until the key is changed.   
Signal Strength   
The signal level indicates the strength of the signal as received at the wireless network 
interface.  
SSID (Service Set Identifier)   
It’s the unique name shared among all points in a wireless network. The SSID must be 
identical for all points in the network. It is case sensitive and must not exceed 32 
characters. 
TCP/IP 
Transmission Control Protocol (TCP) with Internet Protocol (IP). The main internetworking 
protocol used in the Internet. 
UDP (User Datagram Protocol) 
UDP provides a procedure for application programs to send messages to other programs 
with a minimum of protocol mechanism. The protocol is transaction oriented, and delivery 
and duplicate protection is not guaranteed. Applications requiring ordered reliable delivery 
of streams of data should use the TCP. 
 
 
 
What is Router?   
A router is a device that forwards data packets from a source to a destination. Routers 
forward data packets using IP addresses and not a MAC address. A router will forward data 
from the Internet to a particular computer on your LAN. A router also determines the best 
route that data packets should follow to ensure that the data packets are delivered properly. 
WEP (Wired Equivalent Privacy)   
A data privacy mechanism based on a 40 bit shared key algorithm, as described in the 
IEEE 802 .11 standard. The optional cryptographic confidentiality algorithm specified by 
IEEE 802.11 used to provide data confidentiality that is subjectively equivalent to the 
confidentiality of a wired LAN medium that does not employ cryptographic techniques to 
enhance privacy. 
WPA (Wi-Fi Protected Access) 
Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It 
uses 802.1x and EAP to control network access. Temporal Key Integrity Protocol (TKIP) is