06.01.2013 Views

AirData 54 Plus S2 USB

AirData 54 Plus S2 USB

AirData 54 Plus S2 USB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>AirData</strong> <strong>54</strong> <strong>Plus</strong> <strong>S2</strong> <strong>USB</strong> User Manual<br />

SSID: Service Set Identifier is a unique name shared among all clients and nodes in a<br />

wireless network. The SSID must be identical for all clients and nodes within a wireless<br />

network.<br />

Subnet Mask: The method used for splitting IP networks into a series of sub-groups, or<br />

subnets.<br />

TKIP: Temporal Key Integrity Protocol. The TKIP works with a RADIUS server and changes<br />

the network keys every 10.000 packets, ensuring greater security.<br />

TLS: Transport Layer Security is a protocol that guarantees privacy and data integrity<br />

between client / server applications communicating over the Internet. It is application protocolindependent,<br />

allowing higher-level protocols to be setup on top of it transparently.<br />

Throughput: The amount of data transferred from one place to another or processed in a<br />

specified amount of time.<br />

WEP: Wired Equivalent Privacy is an encryption scheme that is used in wireless data<br />

communication and prevents stations that do not have the correct WEP key from linking to an<br />

Access Point / Router.<br />

WPA: Wi-Fi Protected Access is a standard designed to improve the WEP security feature<br />

on WLANs. It incorporates TKIP and EAP.<br />

WPA-PSK: Wi-Fi Protected Access Pre Shared Key is a variation of the WPA standard that is<br />

designed for small office – home use. It incorporates a Pre Shared Key, called passphrase to<br />

prevent unwanted stations from linking to an Access Point / Router.<br />

AES : AES (Advanced Encryption Standard), a chip-based security, has been developed to<br />

ensure the highest degree of security and authenticity for digital information, wherever and<br />

however communicated or stored, while making more efficient use of hardware and/or<br />

software than previous encryption standards. It is also included in IEEE 802.11i standard.<br />

Compare with AES, TKIP is a temporary protocol for replacing WEP security until<br />

manufacturers implement AES at the hardware level.<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!