Page 181 / 193 Scroll up to view Page 176 - 180
181
TCP
The
Transmission Control Protocol
(TCP) is built on top of Internet Protocol (
IP
). It adds
reliable communication (guarantees delivery of data), flow-control, multiplexing (more than one
simultaneous connection), and connection-oriented transmission (requires the receiver of a
packet to acknowledge receipt to the sender). It also guarantees that packets will be delivered in
the same order in which they were sent.
TCP/IP
The Internet and most local area networks are defined by a group of protocols. The most important
of these is the
Transmission Control Protocol over Internet Protocol
(TCP/IP), the de facto standard
protocols. TCP/IP was originally developed by Defense Advanced Research Projects Agency
(DARPA, also known as ARPA, an agency of the US Department of Defense).
Although
TCP
and
IP
are two specific protocols, TCP/IP is often used to refer to the entire protocol
suite based upon these, including ICMP, ARP,
UDP
, and others, as well as applications that run
upon these protocols, such as telnet, FTP, etc.
TKIP
The
Temporal Key Integrity Protocol
(TKIP) provides an extended 48-bit initialization vector,
per-packet key construction and distribution, a Message Integrity Code (MIC, sometimes called
“Michael”), and a re-keying mechanism. It uses a
RC4
stream cipher to encrypt the frame body
and CRC of each
802.11
frame before transmission. It is an important component of the
WPA
and
802.11i
security mechanisms.
ToS
TCP/IP
packet headers include a 3-to-5 bit Type
of Service
(ToS) field set by the application
developer that indicates the appropriate type of service for the data in the packet. The way the
bits are set determines whether the packet is queued for sending with minimum delay, maximum
throughput, low cost, or midway “best-effort” settings depending upon the requirements of the data.
The ToS field is used by the D-Link DWL-2210AP to provide configuration control over
Quality of
Service
(
QoS
) queues for data transmitted from the AP to client stations.
UDP
The
User Datagram Protocol
(UDP) is a transport layer protocol providing simple but unreliable
datagram services. It adds port address information and a checksum to an
IP
packet. UDP
neither guarantees delivery nor does it require a connection. It is lightweight and efficient. All error
processing and retransmission must be performed by the application program.
Unicast
A
Unicast
sends a message to a single, specified receiver. In wireless networks, unicast usually
refers to an interaction in which the access point sends data traffic in the form of
IEEE 802.1x
Frame
s directly to a single client station
MAC
address on the network.
Some wireless security modes distinguish between how unicast, multicast, and broadcast frames
are encrypted or whether they are encrypted.
See also
Multicast
and
Broadcast
.
Glossary
Page 182 / 193
182
Glossary
URL
A
Uniform Resource Locator
(URL) is a standard for specifying the location of objects on the
Internet, such as a file or a newsgroup. URLs are used extensively in HTML documents to specify
the target of a hyperlink which is often another HTML document (possibly stored on another
computer). The first part of the URL indicates what protocol to use and the second part specifies
the IP address or the domain name where that resource is located.
For example,
specifies a file that
should be fetched using the FTP protocol;
specifies
a Web page that should be fetched using the
HTTP
protocol.
VLAN
A
virtual
LAN
(VLAN) is a software-based, logical grouping of devices on a network that allow
them to act as if they are connected to a single physical network, even though they may not be.
The nodes in a VLAN share resources and bandwidth, and are isolated on that network. The D-
Link DWL-2210AP supports the configuration of a wireless VLAN. This technology is leveraged
on the access point for the “virtual” guest network feature.
VPN
A
Virtual Private Network
(VPN) is a network that uses the Internet to connect its nodes. It uses
encryption and other mechanisms to ensure that only authorized users can access its nodes
and that data cannot be intercepted.
WAN
A
Wide Area Network
(WAN) is a communications network that spans a relatively large
geographical area, extending over distances greater than one kilometer. A WAN is often connected
through public networks, such as the telephone system. It can also be connected through leased
lines or satellites. The Internet is essentially a very large WAN.
WDS
A
Wireless Distribution System
(WDS) allows the creation of a completely wireless infrastructure.
Typically, an
Access Point
is connected to a wired
LAN
. WDS allows access points to be connected
wirelessly. The access points can function as wireless repeaters or bridges.
WEP
Wired Equivalent Privacy
(WEP) is a data encryption protocol for
802.11
wireless networks. All
wireless stations and access points on the network are configured with a static 64-bit (40-bit
secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV)
Shared Key
for data encryption. It uses a
RC4
stream cipher to encrypt the frame body and CRC of each
802.11
frame before transmission.
Wi-Fi
A test and certification of interoperability for
WLAN
products based on the
IEEE 802.11
standard
promoted by the
Wi-Fi Alliance
, a nonprofit trade organization.
Page 183 / 193
183
Glossary
WINS
The
Windows Internet Naming Service
(WINS) is a server process for resolving Windows-based
computer names to IP addresses. It provides information that allows these systems to browse
remote networks using the
Network Neighborhood
.
Wireless Networking Framework
There are two ways of organizing a wireless network:
• Stations communicate directly with one another in an
Ad hoc Mode
network, also known as an
independent basic service set (
IBSS
).
• Stations communicate through an
Access Point
in an
Infrastructure Mode
network. A single
access point creates an infrastructure basic service set (
BSS
) whereas multiple access points
are organized in an extended service set (
ESS
).
WLAN
Wireless Local Area Network
(WLAN) is a
LAN
that uses high-frequency radio waves rather than
wires to communicate between its nodes.
WME
Wireless Multimedia Enhancements
(WME) is a subset of the
802.11e
draft specification. It
uses four priority queues between an
Access Point
and its clients. WME provides an interim,
standards-based
QoS
solution.
WPA
Wi-Fi Protected Access
(WPA) is a
Wi-Fi
Alliance version of the draft
IEEE 802.11i
standard. It
provides more sophisticated data encryption than
WEP
and also provides user authentication.
WPA includes
TKIP
and
802.1x
mechanisms.
WRAP
Wireless Robust Authentication Protocol
(WRAP) is an encryption method for
802.11i
that uses
AES
but another encryption mode (
OCB
) for encryption and integrity.
XML
The
Extensible Markup Language
(XML) is a specification developed by the
W3C
. XML is a
simple, flexible text format derived from
Standard Generalized Markup Language
(SGML), which
is defined in
ISO 8879:1986
, designed especially for electronic publish
ing.
Page 184 / 193
184
Standards
• IEEE 802.11b
• IEEE 802.11g
• IEEE 802.3
• IEEE 802.3af
• IEEE 802.3u
• IEEE 802.3x
Device Management
• Web-Based – Internet Explorer v6 or later; Netscape Navigator v6 or later; or other
Java-enabled browsers.
• Telnet
• Kickstart
Data Rate*
For 802.11g:
• 108, 54, 48, 36, 24, 18, 12, 9 and 6Mbps
For 802.11b:
• 11, 5.5, 2, and1Mbps
Security
• 64-, 128-, 152-bit WEP
• WPA – TKIP/AES PSK Mode
• WPA – RADIUS Server Mode
(EAP-MD5/TLS/TTLS/PEAP)
• Embedded RADIUS Server
• Weak IV Avoidance
• Ignore/Inhibit SSID Broadcast
• MAC Address Access Control List
Wireless Frequency Range
• 2.4GHz to 2.4835GHz
Technical Specifications
*”Maximum wireless signal rate derived from IEEE Standard 802.11a and 802.11g specifications. Actual
data throughput will vary. Network conditions and environmental factors, including volume of network traffic,
building materials and construction, and network overhead lower actual data throughput rate”.
Page 185 / 193
185
Wireless Operating Range*
802.11g (Full Power with 5dBi gain diversity dipole antenna)
Indoors:
• 98ft (30m) @ 54Mbps
• 108ft (33m) @ 48Mbps
• 121ft (37m) @ 36Mbps
• 151ft (46m) @ 24Mbps
• 203ft (62m) @ 18Mbps
• 223ft (68m) @ 12Mbps
• 256ft (78m) @ 9Mbps
• 302ft (92m) @ 6Mbps
Outdoors:
• 328ft (100m) @ 54Mbps
• 968ft (295m) @ 11Mbps
• 1378ft (420m) @ 6Mbps
Antenna Type
• Dipole antenna with 5dBi gain
Operating Voltage
• 48VDC +/- 10% for PoE
Technical Specifications (continued)
Radio and Modulation Type
For 802.11b:
DSSS:
• DBPSK @ 1Mbps
• DQPSK @ 2Mbps
• CCK @ 5.5 and 11Mbps
For 802.11g:
OFDM:
• BPSK @ 6 and 9Mbps
• QPSK @ 12 and 18Mbps
• 16QAM @ 24 and 36Mbps
• 64QAM @ 48 and 54Mbps
DSSS:
• DBPSK @ 1Mbps
• DQPSK @ 2Mbps
• CCK @ 5.5 and 11Mbps

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top