Technical data
330 Meru System Director Configuration Guide © 2012 Meru Networks, Inc.
EAP - TTLS
Extensible Authentication Protocol with Tunneled Transport Layer Security. EAP-TTLS uses
a combination of certificates and password challenge and response for authentication
within an 802.1X environment. TTLS supports authentication methods defined by EAP, as
well as the older Challenge Handshake Authentication Protocol (CHAP), Password Authen-
tication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2.
encryption key
An alphanumeric (letters and/or numbers) series that enables data to be encrypted and
then decrypted so it can be safely shared among members of a network. WEP uses an
encryption key that automatically encrypts outgoing wireless data. On the receiving side,
the same encryption key enables the computer to automatically decrypt the information
so it can be read.
enterprise
A term that is often applied to large corporations and businesses. The enterprise market
can incorporate office buildings, manufacturing plants, warehouses and R&D facilities, as
well as large colleges and universities.
ESSID
Extended Service Set Identifier (ID). The identifying name of an 802.11 wireless network,
which is a string of up to 32 characters that is intended to be viewed by humans. When you
specify an ESSID in your client setup, you ensure that you connect to your wireless network
rather than another network in range.
A set of access points can share an ESSID. In this case, a station can roam among the access
points.
Ethernet
International standard networking technology for wired implementations. Basic 10BaseT
networks offer a bandwidth of about 10 Mbps. Fast Ethernet (100 Mbps) and Gigabit
Ethernet (1000 Mbps) are becoming popular.
F
FCC
Federal Communications Commission. The United States' governing body for telecommuni-
cations law.
firewall
A system that secures a network and prevents access by unauthorized users. Firewalls can
be software, hardware or a combination of both. Firewalls can prevent unrestricted access
into a network, as well as restrict data from flowing out of a network.
Fourth Genera-
tion
Term coined by analyst firm Gartner to describe a wireless LAN system in which the
controller governs handoffs, such as one utilizing Virtual Cells. This is contrasted with third
generation (micro-cell architecture) systems, in which the controller is only responsible
for managing access points and clients must decide for themselves when to initiate a
handoff. Second generation systems lacked a controller altogether and were designed for
standalone operation, whereas the first generation used proprietary, non-802.11 systems.
G
gain
The ratio of the power output to the power input of an amplifier in dB. The gain is specified
in the linear operating range of the amplifier where a 1 dB increase in input power gives
rise to a 1 dB increase in output power.