Subnet Mask - Asus USB-N14 User Manual

Dual-band wireless-ac600 usb adapter
Hide thumbs Also See for USB-N14:
Table of Contents

Advertisement

SSID (Service Set Identifier)
SSID is a group name shared by every member of a wireless network. Only
client PCs with the same SSID are allowed to establish a connection. Enabling
the Response to Broadcast SSID requests option allows the device to
broadcast its SSID in a wireless network. This allows other wireless devices
to scan and establish communication with the device. Unchecking this
option hides the SSID to prevent other wireless devices from recognizing and
connecting to the device.
Station
Any device containing IEEE 802.11 wireless medium access conformity.

Subnet Mask

A subnet mask is a set of four numbers configured like an IP address. It is used
to create IP address numbers used only within a particular network.
TCP (Transmission Control Protocol)
The standard transport level protocol that provides the full duplex, stream
service on which many application protocols depend. TCP allows a process
or one machine to send a stream of data to a process on another. Software
implementing TCP usually resides in the operating system and uses the IP to
transmit information across the network.
WAN (Wide Area Network)
A system of LANs, connected together. A network that connects computers
located in separate areas, (i.e., different buildings, cities, countries). The Internet
is a wide area network.
WECA (Wireless Ethernet Compatibility Alliance)
An industry group that certifies cross-vender interoperability and compatibility
of IEEE 802.11b wireless networking prod WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access)
Wi-Fi Protected Access (WPA) is an improved security system for 802.11. It is
part of the 802.11i draft security standard. WPA encompasses TKIP (Temporal
Key Integrity Protocol) along with MIC (Message Integrity Check) and other
fixes to WEP such as Weak IV (Initialization Vector) filtering and Random IV
generation. TKIP uses 802.1x to deploy and change temporary keys as opposed
to static WEP keys once used in the past. It is a significant improvement
over WEP. WPA is part of a complete security solution. WPA also requires
authentication servers in enterprise security solutions.
18

Advertisement

Table of Contents
loading

This manual is also suitable for:

Usb-ac51

Table of Contents