GIGA-BYTE TECHNOLOGY CO. LTD. GN-AP01G 사용자 설명서

다운로드
페이지 67
GN-AP01G AirCruiser G Access Point 
55
 
A comprehensive facility study performed by network managers to insure that planned service levels will be 
met when a new wireless LAN, or additional WLAN segments to an existing network, are deployed. Site 
survey’s are usually performed by a radio frequency engineer and used by systems integrators to identify 
the optimum placements of access points to insure that planned levels of service are met. Site surveys are 
sometimes conducted following the deployment to insure that the WLAN is achieving the necessary level of 
coverage. Site surveys can also be used to detect rogue access points
.
 
 
SSID 
The SSID is the name represents the routers and Access Point in wireless network. 
 
Subnet Mask 
A mask used to determine which subnet a IP address belongs to. An IP address has two components, the 
network address and the host address. Subnetting enables the network administrator to further divide the 
host part of the address into two or more subnets. 
 
Switch 
A type of hub that controls device usage to prevent data collisions and insures optimal network performance. 
A switch acts as a network traffic cop: Rather than transmitting all the packets it receives to all ports, as a 
hub does, a switch transmits packets to only the receiving port. 
 
TCP/IP 
TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to 
connect hosts on the Internet. 
 
TKIP 
Temporal Key Integrity Protocol. The wireless security encryption mechanism in Wi-Fi Protected Access. 
TKIP uses a key hierarchy and key management methodology that removes the predictability that intruders 
relied upon to exploit the WEP key. It increases the size of the key from 40 to 128 bits and replaces WEP’s 
single static key with keys that are dynamically generated and distributed by an authentication server, 
providing some 500 trillion possible keys that can be used on a given data packet. It also includes a 
Message Integrity Check (MIC), designed to prevent an attacker from capturing data packets, altering them 
and resending them. By greatly expanding the size of keys, the number of keys in use, and by creating an 
integrity checking mechanism, TKIP magnifies the complexity and difficulty involved in decoding data on a 
Wi-Fi network. TKIP greatly increases the strength and complexity of wireless encryption, making it far 
more difficult—if not impossible—for a would-be intruder to break into a Wi-Fi network. 
 
USB 
A high-speed bidirectional serial connection between a PC used to transfer data between the computer and 
peripherals such as digital cameras and memory cards. The USB 2.0 specification, announced in 2000, 
provides a data rate of up to 480 Mbps, 40 times faster than the original specification which provided only 
12 Mbps. 
 
WAN 
Wide Area Network, a communication network that covers a relatively broad geographic area, consisting of 
two or more LANs. Broadband communication over the WAN is often through public networks such as the 
ADSL or Cable systems, or through leased lines or satellites. To simplify it, please image network as a 
WAN. 
 
WEP 
WEP (Wired Equivalent Privacy) is a data privacy mechanism based on a 64/128-bit shared key algorithm, 
as described in the IEEE 802.11 standard.