Page 151 / 154 Scroll up to view Page 146 - 150
Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Glossary
-11
202-10099-01, April 2005
For example, when a web page is downloaded from a web server, the TCP program layer in that server
divides the file into packets, numbers the packets, and then forwards them individually to the IP program
layer. Although each packet has the same destination IP address, it may get routed differently through the
network. At the other end, TCP reassembles the individual packets and waits until they have all arrived to
forward them as a single file.
TCP/IP
The underlying technology behind the Internet and communications between computers in a network. The
first part, TCP, is the transport part, which matches the size of the messages on either end and guarantees that
the correct message has been received. The IP part is the user's computer address on a network. Every
computer in a TCP/IP network has its own IP address that is either dynamically assigned at startup or
permanently assigned. All TCP/IP messages contain the address of the destination network as well as the
address of the destination station. This enables TCP/IP messages to be transmitted to multiple networks
(subnets) within an organization or worldwide.
TKIP
A security feature that is a WEP enhancement: Temporal Key Integrity Protocol and Message Integrity
Check (MIC) is a modification of WEP to defend against known attacks (WEP+ four patches for key
mixing, message integrity, rekeying, initialization vector protection)
Universal Plug and Play (UPnP)
UPnP helps devices, such as Internet appliances and computers, access the network and connect to other
devices as needed. UPnP devices can automatically discover the services from other registered UPnP
devices on the network.
USB (Universal Serial Bus)
A high-speed bidirectional serial connection between a PC and a peripheral that transmits data at the rate of
12 megabits per second. The new USB 2.0 specification provides a data rate of up to 480 Mbps, compared to
standard USB at only 12 Mbps. 1394, FireWire and iLink all provide a bandwidth of up to 400 Mbps.
VoIP (Voice over IP)
Voice transmission using Internet Protocol to create digital packets distributed over the Internet. VoIP can be
less expensive than voice transmission using standard analog packets over POTS (Plain Old Telephone
Service).
VPN (Virtual Private Network)
A type of technology designed to increase the security of information transferred over the Internet. VPN can
work with either wired or wireless networks, as well as with dial-up connections over POTS. VPN creates a
private encrypted tunnel from the end user's computer, through the local wireless network, through the
Internet, all the way to the corporate servers and database.
War Chalking
The act of making chalk marks on outdoor surfaces (walls, sidewalks, buildings, sign posts, trees) to indicate
the existence of an open wireless network connection, usually offering an Internet connection so that others
Page 152 / 154
Reference Manual for the 54 Mbps Wireless Router WGR614 v6
-12
Glossary
202-10099-01, April 2005
can benefit from the free wireless access. The open connections typically come from the access points of
wireless networks located within buildings to serve enterprises. The chalk symbols indicate the type of
access point that is available at that specific spot.
There are three basic designs that are currently used: a pair of back-to-back semicircles, which denotes an
open node; a closed circle, which denotes a closed node; a closed circle with a “W” inside, which denotes a
node equipped with WEP. Warchalkers also draw identifiers above the symbols to indicate the password that
can be used to access the node, which can easily be obtained with sniffer software.
As a recent development, the debate over the legality of warchalking is still going on.
The practice stems from the U.S. Depression-era culture of wandering hobos who would make marks
outside of homes to indicate to other wanderers whether the home was receptive to drifters or was
inhospitable.
War Driving
War driving is the act of locating and possibly exploiting connections to wireless local area networks while
driving around a city or elsewhere. To do war driving, you need a vehicle, a computer (which can be a
laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can
be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends
beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet
connection, and possibly gain access to company records and other resources.
Some people have made a sport out of war driving, in part to demonstrate the ease with which wireless
LANs can be compromised. With an omnidirectional antenna and a geophysical positioning system (GPS),
the war driver can systematically map the locations of 802.11b wireless access points.
WEP (Wired Equivalent Privacy)
Basic wireless security provided by Wi-Fi. In some instances, WEP may be all a home or small-business
user needs to protect wireless data. WEP is available in 40-bit (also called 64-bit), or in 108-bit (also called
128-bit) encryption modes. As 108-bit encryption provides a longer algorithm that takes longer to decode, it
can provide better security than basic 40-bit (64-bit) encryption.
Wi-Fi (Wireless Fidelity)
Another name for IEEE 802.11b. Products certified as Wi-Fi are interoperable with each other even if they
are from different manufacturers. A user with a Wi-Fi product can use any brand of access point with any
other brand of client hardware that is built to the Wi-Fi standard.
Wi-Fi Alliance (formerly WECA – Wireless Ethernet Compatibility Alliance)
The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of
wireless Local Area Network products based on IEEE 802.11 specification. Currently the Wi-Fi Alliance
has 193 member companies from around the world, and 509 products have received Wi-Fi certification since
certification began in March of 2000. The goal of the Wi-Fi Alliance's members is to enhance the user
experience through product interoperability (
www.weca.net
).
Page 153 / 154
Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Glossary
-13
202-10099-01, April 2005
Wi-Fi Protected Access (WPA)
WPA is a security technology for wireless networks that improves on the authentication and encryption
features of WEP (Wired Equivalent Privacy). In fact, WPA was developed by the networking industry in
response to the shortcomings of WEP.
One of the key technologies behind WPA is the Temporal Key Integrity Protocol (TKIP). TKIP addresses
the encryption weaknesses of WEP. Another key component of WPA is built-in authentication that WEP
does not offer. With this feature, WPA provides roughly comparable security to VPN tunneling with WEP,
with the benefit of easier administration and use. This is similar to 802.1x support and requires a RADIUS
server in order to implement. The Wi-Fi Alliance will call this, 'WPA-Enterprise.'
One variation of WPA is called WPA Pre Shared Key or WPA-PSK for short - this provides an
authentication alternative to an expensive RADIUS server. WPA-PSK is a simplified but still powerful form
of WPA most suitable for home Wi-Fi networking. To use WPA-PSK, a person sets a static key or
"passphrase" as with WEP. But, using TKIP, WPA-PSK automatically changes the keys at a preset time
interval, making it much more difficult for hackers to find and exploit them. The Wi-Fi Alliance will call
this, 'WPA-Personal.'
Wi-Fi Protected Access and IEEE 802.11i Comparison
Wi-Fi Protected Access will be forward-compatible with the IEEE 802.11i security specification currently
under development by the IEEE. Wi-Fi Protected Access is a subset of the current 802.11i draft, taking
certain pieces of the 802.11i draft that are ready to bring to market today, such as its implementation of
802.1x and TKIP. These features can also be enabled on most existing Wi-Fi CERTIFIED products as a
software upgrade. The main pieces of the 802.11i draft that are not included in Wi-Fi Protected Access are
secure IBSS, secure fast handoff, secure de-authentication and disassociation, as well as enhanced
encryption protocols such as AES-CCMP. These features are either not yet ready for market or will require
hardware upgrades to implement.
Wi-Fi Protected Access for the Enterprise
Wi-Fi Protected Access effectively addresses the WLAN security requirements for the enterprise and
provides a strong encryption and authentication solution prior to the ratification of the IEEE 802.11i
standard. In an enterprise with IT resources, Wi-Fi Protected Access should be used in conjunction with an
authentication server such as RADIUS to provide centralized access control and management. With this
implementation in place, the need for add-on solutions such as VPNs may be eliminated, at least for the
express purpose of securing the wireless link in a network.
Wi-Fi Protected Access for Home/SOHO
In a home or Small Office/ Home Office (SOHO) environment, where there are no central authentication
servers or EAP framework, Wi-Fi Protected Access runs in a special home mode. This mode, also called
Pre-Shared Key (PSK), allows the use of manually-entered keys or passwords and is designed to be easy to
set up for the home user. All the home user needs to do is enter a password (also called a master key) in their
access point or home wireless gateway and each PC that is on the Wi-Fi wireless network. Wi-Fi Protected
Access takes over automatically from that point. First, the password allows only devices with a matching
password to join the network, which keeps out eavesdroppers and other unauthorized users. Second, the
password automatically kicks off the TKIP encryption process, described above.
Page 154 / 154
Reference Manual for the 54 Mbps Wireless Router WGR614 v6
-14
Glossary
202-10099-01, April 2005
Wi-Fi Protected Access for Public Access
The intrinsic encryption and authentication schemes defined in Wi-Fi Protected Access may also prove
useful for Wireless Internet Service Providers (WISPs) offering Wi-Fi public access in "hot spots" where
secure transmission and authentication is particularly important to users unknown to each other. The
authentication capability defined in the specification enables a secure access control mechanism for the
service providers and for mobile users not utilizing VPN connections.
Wi-Fi Protected Access in "Mixed Mode" Deployment
In a large network with many clients, a likely scenario is that access points will be upgraded before all the
Wi-Fi clients. Some access points may operate in a "mixed mode", which supports both clients running
Wi-Fi Protected Access and clients running original WEP security. While useful for transition, the net effect
of supporting both types of client devices is that security will operate at the less secure level (WEP),
common to all the devices. Therefore, organizations will benefit by accelerating the move to Wi-Fi Protected
Access for all Wi-Fi clients and access points.
WiMAX
An IEEE 802.16 Task Group that provides a specification for fixed broadband wireless access systems
employing a point-to-multipoint (PMP) architecture. Task Group 1 of IEEE 802.16 developed a
point-to-multipoint broadband wireless access standard for systems in the frequency range 10-66 GHz. The
standard covers both the Media Access Control (MAC) and the physical (PHY) layers. Ratification is
expected in second half of 2004.
Wireless Multimedia (WMM)
WMM (Wireless Multimedia) is a subset of the 802.11e standard. WMM allows wireless traffic to have a
range of priorities, depending on the kind of data. Time-dependent information, like video, audio, or voice
will have a higher priority than normal traffic. For WMM to function correctly, wireless clients must also
support WMM.
Wireless Networking
Wireless Networking refers to the infrastructure enabling the transmission of wireless signals. A network
ties things together and enables resource sharing.
WLAN (Wireless LAN)
Also referred to as LAN. A type of local-area network that uses wireless or high-frequency radio waves
rather than wires to communicate between nodes.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top