Extreme Networks ExtremeSwitching ISW Series Quick Installation Manual page 30

Managed industrial ethernet switch
Table of Contents

Advertisement

over a wide band of frequencies. This technique reduces interference. If synchronized properly, a single
logical channel is maintained. (Compare with DSSS (Direct-Sequence Spread Spectrum).)
IBSS
An IBSS is the 802.11 term for an ad hoc network. See ad hoc mode.
MIC
Message Integrity Check (or Code), also called 'Michael', is part of WPA and TKIP. The MIC is an
additional 8-byte code inserted before the standard 4-byte ICV appended in by standard WEP to the
802.11 message. This greatly increases the difficulty in carrying out forgery attacks.
Both integrity check mechanisms are calculated by the receiver and compared against the values sent
by the sender in the frame. If the values match, there is assurance that the message has not been
tampered with.
netmask
A netmask is a string of 0s and 1s that mask, or screen out, the network part of an IP address, so that
only the host computer part of the address remains. A frequently-used netmask is 255.255.255.0, used
for a Class C subnet (one with up to 255 host computers). The ".0" in the netmask allows the specific
host computer address to be visible.
PEAP
Protected Extensible Authentication Protocol is an IETF draft standard to authenticate wireless LAN
clients without requiring them to have certificates. In PEAP authentication, first the user authenticates
the authentication server, then the authentication server authenticates the user. If the first phase is
successful, the user is then authenticated over the SSL tunnel created in phase one using EAP-Generic
Token Card (EAP-GTC) or Microsoft Challenged Handshake Protocol Version 2 (MSCHAP V2). (See also
EAP-TLS/EAP-TTLS.)
PoE
The Power over Ethernet standard (IEEE 802.3af) defines how power can be provided to network
devices over existing Ethernet connections, eliminating the need for additional external power supplies.
QoS
Quality of Service is a technique that is used to manage network resources and guarantee a bandwidth
relationship between individual applications or protocols. A communications network transports a
multitude of applications and data, including high-quality video and delay-sensitive data such as real-
time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed
services. Achieving the required QoS becomes the secret to a successful end-to-end business solution.
SSL
Secure Socket Layer is a protocol for transmitting private documents using the Internet. SSL works by
using a public key to encrypt data that is transferred over the SSL connection. SSL uses the public-and-
private key encryption system, which includes the use of a digital certificate. SSL is used for other
applications than SSH, for example, OpenFlow.
syslog
A protocol used for the transmission of event notification messages across networks, originally
developed on the University of California Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating systems and networked devices. A
ISW Series Managed Industrial Ethernet Switch Quick Installation Guide
Glossary
30

Advertisement

Table of Contents
loading

Table of Contents