D-Link DWS-1008 User Manual page 439

Wireless 8 port switch with poe
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

DWS-1008 User's Manual
SHA
Secure hashing algorithm. A one-way hashing algorithm used in many authentication
algorithms and also for key derivation in many algorithms. A SHA produces a 160-bit hash.
shared secret
A static key distributed by an out-of-band mechanism to both the sender and receiver. Also
known as a shared key or preshared key (PSK), a shared secret is used as input to a one-way
hash algorithm. When a shared secret is used for authentication, if the hash output of both
sender and receiver is the same, they share the same secret and are authenticated. A shared
secret can also be used for encryption key generation and key derivation.
SIP
Session Initialization Protocol. A signaling protocol that establishes real-time calls and
conferences over IP networks.
Spanning Tree Protocol
See STP.
SSH
Secure Shell protocol. A Telnet-like protocol that establishes an encrypted session.
SSID
Service set identifier. The unique name shared among all computers and other devices in a
wireless LAN (WLAN).
SSL
Secure Sockets Layer protocol. A protocol developed by Netscape for managing the security
of message transmission over the Internet. SSL has been succeeded by Transport Layer
Security (TLS) protocol, which is based on SSL. The sockets part of the term refers to the
sockets method of passing data back and forth between a client and a server program in a
network or between program layers in the same computer. SSL uses the public-and-private
key encryption system from RSA Data Security, Inc., which also includes the use of a digital
certificate. See also HTTPS; TLS.
station
Any device with a media access control (MAC) address and a Physical layer (PHY) interface
to the wireless medium that comply with the standards for all IEEE 802 networks. Wireless
clients and DWL-8220AP access points are stations in a D-Link Mobility System.
STP
Spanning Tree Protocol. A link management protocol, defined in the IEEE 802.1D standard,
that provides path redundancy while preventing undesirable loops in a network. STP is also
known as Spanning Tree Bridge Protocol.
D-Link Systems, Inc.
Appendix D - Glossary
434

Advertisement

Table of Contents
loading

Table of Contents