Extreme Networks Summit WM User Manual page 313

Table of Contents

Advertisement

Term
IPC
IPsec
IPsec-ESP
IPsec-AH
isochronous
ISP
IV
LAN
License installation
LSA
MAC
Summit WM User Guide, Software Version 5.3
Explanation
Interprocess Communication. A capability supported by some operating
systems that allows one process to communicate with another process. The
processes can be running on the same computer or on different computers
connected through a network.
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-ESP). The
encapsulating security payload (ESP) encapsulates its data, enabling it to
protect data that follows in the datagram.Internet Protocol security
Authentication Header (IPsec-AH). AH protects the parts of the IP
datagram that can be predicted by the sender as it will be received by the
receiver.IPsec is a set of protocols developed by the IETF to support secure
exchange of packets at the IP layer. IPsec has been deployed widely to
implement Virtual Private Networks (VPNs). IPsec supports two
encryption modes: Transport and Tunnel. Transport mode encrypts only
the data portion (payload) of each packet, but leaves the header untouched.
The more secure Tunnel mode encrypts both the header and the payload.
On the receiving side, an IPSec-compliant device decrypts each packet. For
IPsec to work, the sending and receiving devices must share a public key.
This is accomplished through a protocol known as Internet Security
Association and Key Management Protocol/Oakley (ISAKMP/Oakley),
which allows the receiver to obtain a public key and authenticate the
sender using digital certificates.
Isochronous data is data (such as voice or video) that requires a constant
transmission rate, where data must be delivered within certain time
constraints. For example, multimedia streams require an isochronous
transport mechanism to ensure that data is delivered as fast as it is
displayed and to ensure that the audio is synchronized with the video.
Compare: asynchronous processes in which data streams can be broken by
random intervals, and synchronous processes, in which data streams can be
delivered only at specific intervals.
Internet Service Provider.
IV (Initialization Vector), part of the standard WEP encryption mechanism
that concatenates a shared secret key with a randomly generated 24-bit
initialization vector. WPA with TKIP uses 48-bit IVs, an enhancement that
significantly increases the difficulty in cracking the encryption. (See WPA
and TKIP)
Local Area Network.
Link State Advertisements received by the currently running OSPF process.
The LSAs describe the local state of a router or network, including the state
of the router's interfaces and adjacencies. See also OSPF.
Media Access Control layer. One of two sublayers that make up the Data
Link Layer of the OSI model. The MAC layer is responsible for moving
data packets to and from one Network Interface Card (NIC) to another
across a shared channel.
313

Advertisement

Table of Contents
loading

Table of Contents