User's Guide
Ad Hoc
Network
A communication configuration in which every computer has the same
capabilities, and any computer can initiate a communication session. Also
known as a peer-to-peer network, a device to device network or a
computer-to-computer network.
AES-CCMP
Advanced Encryption Standard - Counter CBC-MAC Protocol is the
new method for privacy protection of wireless transmissions
specified in the IEEE 802.11i standard. AES-CCMP provides a
stronger encryption method than TKIP. The AES algorithm is
capable of using cryptographic keys of 128, 192, and 256 bits to
encrypt and decrypt data in 128-bit blocks. AES-CCMP uses the
AES block cipher, but restricts the key length to 128 bits. AES-
CCMP incorporates two sophisticated cryptographic techniques
(counter mode and CBC-MAC) to provide improved security
between the mobile client and the access point.
Authentication
Verifies the identity of a user logging onto a network. Passwords,
digital certificates, smart cards and biometrics are used to prove
the identity of the client to the network. Passwords and digital
certificates are also used to identify the network to the client.
Available
network
One of the networks listed under Available networks on the Wireless
Networks tab of the Wireless Network Connection Properties (Windows XP
environment). Any wireless network that is broadcasting and is within
receiving range of the wireless adapter appears on the list.
BER Bit Error Rate. The ratio of errors to the total number of bits being sent in
a data transmission from one location to another.
Bit Rate The total number of bits (ones and zeros) per second that a network
connection can support. Note that this bit rate will vary, under software
control, with different signal path conditions.
Broadcast
SSID
Used to allow an access point to respond to clients on a wireless network
by sending probes.
BSSID A unique identifier for each wireless client on a wireless network. The Basic
Service Set Identifier (BSSID) is the Ethernet MAC address of each adapter
on the network.
CA
(Certificate
Authority)
A corporate certification authority implemented on a server. In
addition, Internet Explorer's certificate can import a certificate
from a file. A trusted CA certificate is stored in the root store.
CCX (Cisco
Compatible
eXtension)
Cisco Compatible Extensions Program ensures that devices used on Cisco
wireless LAN infrastructure meet the security, management and roaming
requirements.
Certificate Used for client authentication. A certificate is registered on the
authentication server (for example, RADIUS server) and used by the
authenticator.