Why The 2.4 Ghz Frequency Range; What Is Server Set Id (Ssid); What Is An Essid; How Do I Secure The Data Across An Access Point's Radio Link - ZyXEL Communications P-870HN-5xb Support Notes

Ipv6 version 802.11n vdsl2 4-port gateway
Hide thumbs Also See for P-870HN-5xb:
Table of Contents

Advertisement

P-870HN-5xb Support Notes

Why the 2.4 Ghz Frequency range?

This frequency range has been set aside by the FCC, and is generally labeled the ISM
band. A few years ago Apple and several other large corporations requested that the
FCC allow the development of wireless networks within this frequency range. What
we have today is a protocol and system that allows for unlicensed use of radios
within a prescribed power level. The ISM band is populated by Industrial, Scientific
and Medical devices that are all low power devices, but can interfere with each other.

What is Server Set ID (SSID)?

SSID is a configurable identification that allows clients to communicate to the
appropriate base station. With proper configuration, only clients that are configured
with the same SSID can communicate with base stations having the same SSID. SSID
from a security point of view acts as a simple single shared password between base
stations and clients.

What is an ESSID?

ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The
ESSID of the mobile device must match the ESSID of the AP to communicate with the
AP. The ESSID is a 32-character maximum string and is case-sensitive.

How do I secure the data across an Access Point's radio link?

Enable Wired Equivalency Protocol (WEP) or Wi-Fi Protected Access (WPA) to
encrypt the payload of packets sent across a radio link.
What is WEP?
Wired Equivalent Privacy. WEP is a security mechanism defined within the 802.11
standard and designed to make the security of the wireless medium equal to that of
a cable (wire). WEP data encryption was designed to prevent access to the network
by "intruders" and to prevent the capture of wireless LAN traffic through
eavesdropping. WEP allows the administrator to define a set of respective "Keys" for
each wireless network user based on a "Key String" passed through the WEP
encryption algorithm. Access is denied by anyone who does not have an assigned key.
WEP comes in 40/64-bit and 128-bit encryption key lengths. Note, WEP has shown to
All contents copyright (c) 2009 ZyXEL Communications Corporation.

Advertisement

Table of Contents
loading

Table of Contents