Wlan; Wpa; Wep; Wi-Fi - Revox Joy Symphony User Manual

Table of Contents

Advertisement

Network terminology glossary

WLAN

(
W-LAN, Wireless LAN)
Radio network. Network connection is done
using radio waves in the 2.4 GHz frequency
range. Radio networks are easy to install as
no cables have to be laid but are often
problematic and unreliable, particularly over
longer transmission distances. In many
cases, Power Line networks that also don't
require any cabling are a better choice.
In each case, the installation of a network
cable is the most fault-tolerant and problem
free transmission technology. An additional
point is that cabled networks don't produce
any electro smog.

WPA

Wi-Fi Protected Access (WPA)
WPA contains the architecture of WEP, but
offers additional protection through dynamic
keys that are based on the following (
standards:
- Temporal Key Integrity Protocol
Advanced Encryption Standard
WPA offers Pre- Shared Keys (PSK) for
authentication or Extensible Authentication
Protocol (EAP) through IEEE 802.1x.
The Symphony is based on the authentication
PSK and supports both the WPA encryption
TKIP and AES.
Cipher
)
-
(TKIP)
(AES)

WEP

Wired Equivalent Privacy (WEP) is the
previously
used
algorithm for WLANs. It should control
access to the network as well as ensuring
the confidentiality and integrity of the data.
Because of various weak spots, the process
is considered to be unsafe. For this reason,
WLAN installations should use the more
secure WPA encryption. See WPA.
With WPE authentication, a distinction is
drawn between two processes:
Open
Open System Authentication
authentication. The WEP key is used at the
same time for authentication: Each client
with the correct WEP key gets access to the
network.
Shared
Shared Key Authentication
the more secure version. In this case,
authentication
is
Challenge-Response authentication, with a
secret
key.
However,
Response process is also based on WEP and
demonstrates the same weaknesses.
The Symphony offers both
WEP authentication.

Wi-Fi

Certificate for WLAN products that work
according to IEEE802.11 standards and are
compatible with other products.
Symphony
standard
encryption
is the standard
is reputed to be
done
through
the
the
Challenge-
Open
Shared
and
81

Advertisement

Table of Contents
loading

Table of Contents