User's Guide

SIM
(Subscriber
Identity
Module)
A SIM card is used to validate credentials with the network. A SIM
card is a special smart card used by GSM-based digital cellular
networks.
Silent mode
Silent Mode Access Points or Wireless Routers have been
configured to not broadcast the SSID for the wireless network.
This makes it necessary to know the SSID in order to configure the
wireless profile to connect to the access point or wireless router.
Single Sign On Single Sign On feature set allows the 802.1X credentials to match your
Windows log on user name and password credentials for wireless network
connections.
SSID (Service
Set Identifier)
SSID or network name is a value that controls access to a wireless
network. The SSID for your wireless network card must match the SSID
for any access point that you want to connect with. If the value does not
match, you are not granted access to the network. Each SSID may be up
to 32 alphanumeric characters long and is case-sensitive.
stealth
A stealth access point is one that has the capability and is
configured to not broadcast its SSID. This is the wireless network
name that appears when a DMU (Device Management Utility, such
as IntelĀ® PROSet/Wireless WiFi ) scans for available wireless
networks. Although this can enhance wireless network security, it
is commonly considered a weak security feature. To connect to a
stealth access point, a user must specifically know the SSID and
configure their DMU accordingly. The feature is not a part of the
802.11 specification, and is known by differing names by various
vendors: closed mode, private network, SSID broadcasting.
TKIP
(Temporal
Key Integrity
Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi
Protected Access* uses its TKIP. TKIP provides important data
encryption enhancements including a re-keying method. TKIP is
part of the IEEE 802.11i encryption standard for wireless
networks. TKIP is the next generation of WEP, the Wired
Equivalency Protocol, which is used to secure 802.11 wireless
networks. TKIP provides per packet key mixing, a message
integrity check and a re-keying mechanism, thus fixing the flaws
of WEP.