Technical data
338 Meru System Director Configuration Guide © 2012 Meru Networks, Inc.
Single Channel
Term sometimes used to describe a network in which all access points operate on the same
channel, such as one using Virtual Cell technology. Single channel operation is more spec-
trally efficient than a microcell architecture and necessary for the use of Virtual Cells and
network-controlled handoff. Single Channel improves security by making intrusion detec-
tion easier and location tracking more accurate, as every AP automatically receives trans-
missions from every client within range. It also enables the RF Barrier to function with as
little as one radio, because only one channel needs to be blocked from outside access.
SIP
Session Initiation Protocol. SIP is a protocol for finding users, usually human, and setting
up multimedia communication among them, typically a VoIP phone call.
site survey
The process whereby a wireless network installer inspects a location prior to putting in a
wireless network. Site surveys are used to identify the radio- and client-use properties of
a facility so that access points can be optimally placed. Meru Wireless LAN System WLANs
are optimized to not require a site survey.
spectral
efficiency
The ratio of data rate to radio spectrum usage. A Virtual Cell is much more spectrally effi-
cient than a microcell architecture, as the microcells consume at least three non-overlap-
ping channels to provide the coverage that a Virtual Cell offers with just one.
SSID
A 32-character unique identifier attached to the header of packets sent over a WLAN that
acts as a name when a mobile device tries to connect to the BSS. (Also called ESSID.) The
SSID differentiates one WLAN from another, so all access points and all devices attempting
to connect to a specific WLAN must use the same SSID. A device will not be permitted to
join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plain
text from a packet, it does not supply any security to the network. An SSID is also referred
to as a Network Name because essentially it is a name that identifies a wireless network.
ssh
Secure SHell. A terminal-emulation program that allows users to log onto a remote device
and execute commands. It encrypts the traffic between the client and the host.
SSL
Secure Socket Layer. Commonly used encryption scheme used by many online retail and
banking sites to protect the financial integrity of transactions. When an SSL session begins,
the server sends its public key to the browser. The browser then sends a randomly gener-
ated secret key back to the server in order to have a secret key exchange for that session.
station
Devices such as cellular phones or laptops that need to communicate wirelessly with the
Meru Wireless LAN System and do so through access points.
subnetwork or
subnet
Found in larger networks, these smaller networks are used to simplify addressing between
numerous computers. Subnets connect to the central network through a router, hub or
gateway. Each individual Wireless LAN will probably use the same subnet for all the local
computers it talks to.
subnet mobility
The ability of a wireless user to roam across Access Points deployed on different subnets
using a single IP address.
supplicant
A wireless client that is requesting access to a network.