ProSoft Technology RLX2-IHA User Manual page 156

Radiolinx rlx2 series, industrial, ieee 802.11 a / b / g / n
Hide thumbs Also See for RLX2-IHA:
Table of Contents

Advertisement

Support, Service & Warranty
User Manual
Subnet Mask
A mask used to determine what subnet an IP address belongs to. An IP address
has two components: the network address, and the host (node or device)
address. For example, consider the IP address 150.215.017.009. Assuming this
is part of a Class B network (with a subnet mask of 255.255.0.0), the first two
numbers (150.215) represent the Class B network address, and the second two
numbers (017.009) identify a particular host on this network.
TKIP
Temporal Key Integrity Protocol. The wireless security encryption mechanism in
Wi-Fi Protected Access. TKIP uses a key hierarchy and key management
methodology that removes the predictability that intruders relied upon to exploit
the WEP key. In increases the size of the key from 40 to 128 bits and replaces
WEP's  single  static  key  with  keys  that  are  dynamically  generated  and  distributed  
by an authentication server, providing some 500 trillion possible keys that can be
used on a given data packet. If also includes a Message Integrity Check (MIC),
designed to prevent the attacker from capturing data packets, altering them, and
resending them. By greatly expanding the size of keys, the number of keys in
use, and by creating an integrity checking mechanism, TKIP magnifies the
complexity and difficulty involved in decoding data on a Wi-Fi network. TKIP
greatly increases the strength and complexity of wireless encryption, making it far
more difficult (if not impossible) for a would-be intruder to break into a Wi-Fi
network.
UART
Universal Asynchronous Receiver/Transmitter
WAP
Wireless Application Protocol. A set of standards to enable wireless devices to
access internet services, such as the World Wide Web and email.
WDS
Wireless Distribution System. Enables access points to communicate with one
another in order to extend the range of a wireless networks. Used in 802.11g
based access points.
WEP
Wired-Equivalent Privacy protocol was specified in the IEEE 802.11 standard to
provide a WLAN with a minimal level of security and privacy comparable to a
typical wired LAN, using data encryption.
Page 156 of 161
T
U
W
RLX2 Series ♦ 802.11a, b, g, n
Industrial Hotspot
ProSoft Technology, Inc.
May 8, 2013

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RLX2-IHA and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Rlx2-ihgRlx2-ihwRlx2-ihnf

Table of Contents