Owner's Manual
• None
bit error rate (BER)
The ratio of errors to the total number of bits being sent in a data transmission from one location to another.
broadcasting network
A network that is broadcasting its network name.
carrier sense multiple access with collision avoidance (CSMA/CA)
An IEEE 802.11 protocol that ensures that the number of collisions within a domain are kept to a minimum.
certificate
A digital document that is commonly used for authentication and secure exchange of information on open networks,
such as the Internet, extranets, and intranets. A certificate securely binds a public key to the entity that holds the
corresponding private key. Certificates are digitally signed by the issuing certification authority and can be issued for a
user, a computer, or a service. The most widely accepted format for certificates is defined by the
ITU-T X.509 version
3 international standard. See also
intermediate certificate and root certificate.
Certification Authority (CA)
An entity responsible for establishing and vouching for the authenticity of public keys belonging to users (end entities)
or other certification authorities. Activities of a certification authority can include binding public keys to distinguished
names through signed certificates, managing certificate serial numbers, and revoking certificates.
certificate store
The storage area on your computer where requested certificates are stored.
• The user store is the Personal folder in the certificate store.
• The root store is in the Trusted Root Certification Authorities folder in the certificate store.
• The machine store is on the authentication server of the certification authority.
Challenge Handshake Authentication Protocol (CHAP)
An authentication scheme used by Point-to-Point-Protocol servers to validate the identity of the originator of a
connection, upon connection or any time later.
Cisco Centralized Key Management (CCKM)
An authentication method in which an access point is configured to provide Wireless Domain Services (WDS) to take
the place of the RADIUS server and to authenticate the client so quickly that there is no perceptible delay in voice or
other time-sensitive applications.
Cisco Key Integrity Protocol (CKIP)
A Cisco proprietary security protocol for encryption in IEEE 802.11 media. CKIP uses key permutation, message
integrity check, and message sequence number to improve IEEE 802.11 security in infrastructure mode.
complimentary code keying (CCK)
The modulation technique for high and medium transmit rates.
Counter-Mode/CBC-MAC Protocol (CCMP)
An IEEE 802.11i encryption algorithm. In the IEEE 802.11i standard, unlike WPA, key management and message
integrity is handled by a single component CCMP built around AES.
cryptographic service provider (CSP)
A cryptographic service provider contains implementations of cryptographic standards and algorithms. A smart card is
an example of a hardware-based CSP.
dBm