Specifications
82
83
NIC or Network Interface Card
An adapter (board or card) that can be inserted into a device, so the device can be connected to a
network. The NIC converts data from the device into the form transmitted or received from the network.
Node
A processing location on a network. The location can be a workstation, computer, or printer. Each Node
has a unique MAC address.
Open Authentication
This allows any device to authenticate and then attempt to communicate with the access point. Any
wireless device can authenticate with the accesspoint, but if WEP is used, the device can communicate
only if its WEP keys match the access point’s. There is no challenge that occurs, you either have the
correct key or not when you communicate with the access point. By eliminating the challenge process, it
actually makes this more secure than shared key authentication
PAP (Password Authentication Protocol)
A simple authentication protocol used with PPP (Point-to-Point Protocol). It is a plain text password
system, which is not very secure. Pathname/The location of a particular le or directory that includes the
full path to the needed lename or directory. This is a combination of path and lename.
PEAP (Protected Extensible Authentication Protocol) :
Authenticates clients into a network using only server-side certicates, which makes implementing and
administering a wireless LAN easier.
Ping
A way to determine if a device is accessible. It sends a packet to the specied address and waits for a
reply.
Protocol
This is the way two devices transmit data between each other, including error checking, data
compression, and how messages start and end.
PSK (Pre-Shared Key)
Authentication mode of WPA used in SOHO environments. The key value(or pass-phrase) is used for
network authentication only (not data encryption). It does not use a RADIUS server like the other modes,
but uses a shared key to provide the initial authentication with the access point or host.
RADIUS (Remote Authentication Dial-In Server)
This is an authentication server, such as the Cisco® ACS, Microsoft® IAS, etc.
RARP
One of the available boot methods. The device sends an RARP request and the RARP server responds
with an IP address. The device knows its MAC address and the server responds with the IP address for
it.
Router
Any device that forwards data along networks. Routers are located at gateways.
Shared Authentication
The access point sends an unencrypted challenge text string to any device attempting to communicate
with it. The device requesting authentication encrypts the challenge text and sends it back to the access
point. If the challenge text is encrypted correctly, the access point allows the requesting device to
authenticate. Both the unencrypted challenge and the encrypted challenge can be monitored; however,
this leaves the access point open to attack. Because of this weakness, shared key authentication can be
less secure than open authentication.
Signal Strength
A percentage (1 to 100) of the connection between the device and access point. If the signal strength is
0, there is no connection with the access point; 30 or less indicates you may be experiencing interference
or close to being out of access point range, and below 50, printing performance could be affected. To
improve the signal strength, try moving the printer closer to the access point and away from other radio
devices such as Bluetooth® wireless devices, microwave ovens, or 2.4-GHz cordless phones.
Speed or Transmit Rate
Sets the maximum rate of communication between the devices on thenetwork. It is also called transmit
rate. The speeds are in megabits per second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24, 36, 48, and 54.
SSID or Service Set Identier
A unique identier that must match for all nodes on a subnetwork to communicate with each other. It
consists of up to 32 characters (any printable character, including spaces). If using the space character, it
must be enclosed in quotation marks. It is case-sensitive.
Static Method
One of the available boot methods. Use static if your network uses xed conguration. The IP address
remains the same every time the device connects to the network.
Subnet
A portion of a network that shares a common address component. On TCP/IP networks, subnets are all
devices with the same prex. For example, all devices that start with 192.192.192 are part of the same
subnet. Dividing a network into subnets is useful for both security and performance reasons.
Subnet Mask
A mask is used to determine what subnet an IP address belongs to. Companies often
have ranges of IP addresses that can be described by one or more masks. For example, a mask of
255.255.255.0 allows variation in the last position only, because the rst three positions are xed.
TCP/IP
A way that two devices can transmit data between each other. TCP/IP(Transmission Control Protocol/
Internet Protocol) is generally the standard for transmitting data over a network.