User guide

HiPath Wireless Standalone 802.11n AP User Guide D-13
SSH Secure Shell, sometimes known as Secure Socket Shell, is a
Unix-based command interface and protocol for securely getting
access to a remote computer. SSH is a suite of three utilities -
slogin, ssh, and scp - secure versions of the earlier UNIX utilities,
rlogin, rsh, and rcp. With SSH commands, both ends of the client/
server connection are authenticated using a digital certificate, and
passwords are protected by being encrypted.
SSID Service Set Identifier. A 32-character unique identifier attached to
the header of packets sent over a Wireless LAN that acts as a
password when a wireless device tries to connect to the Basic
Service Set (BSS). Several BSSs can be joined together to form
one logical WLAN segment, referred to as an extended service set
(ESS). The SSID is used to identify the ESS.
In 802.11 networks, each Access Point advertises its presence
several times per second by broadcasting beacon frames that
carry the ESS name (SSID). Stations discover APs by listening for
beacons, or by sending probe frames to search for an AP with a
desired SSID. When the station locates an appropriately-named
Access Point, it sends an associate request frame containing the
desired SSID. The AP replies with an associate response frame,
also containing the SSID.
Some APs can be configured to send a zero-length broadcast
SSID in beacon frames instead of sending their actual SSID. The
AP must return its actual SSID in the probe response.
SSL Secure Sockets Layer. A protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by
using a public key to encrypt data that's transferred over the SSL
connection. URLs that require an SSL connection start with https:
instead of http.
SSL uses a program layer located between the Internet's
Hypertext Transfer Protocol (HTTP) and Transport Control
Protocol (TCP) layers. The ‘sockets’ part of the term refers to the
sockets method of passing data back and forth between a client
and a server program in a network or between program layers in
the same computer. SSL uses the public-and-private key
encryption system from RSA, which also includes the use of a
digital certificate.
SSL has recently been succeeded by Transport Layer Security
(TLS), which is based on SSL.
Subnet mask (See netmask)
Subnets Portions of networks that share the same common address
format. A subnet in a TCP/IP network uses the same first three
sets of numbers (such as 198.63.45.xxx), leaving the fourth set to
identify devices on the subnet. A subnet can be used to increase
the bandwidth on the network by breaking the network up into
segments.
SVP SpectraLink Voice Protocol, a protocol developed by SpectraLink
to be implemented on access points in order to facilitate voice
prioritization over an 802.11 wireless LAN that will carry voice
packets from SpectraLink wireless telephones.
Term Definition