Glossary

Numerics

3DES (Triple Data Encryption Standard)

The de-facto standard for IP Security (IPSec) and virtual private network (VPN) encryption.

10BASE2

Implementation of Ethernet that runs over thin, RG-58, or RG-59 coaxial cable. A 10BASE2 segment has a maximum distance of 185 meters (m).

10BASE5

Implementation of Ethernet that runs over thick coaxial cable, and each segment has a maximum distance of 485 m.

10BASE-FL

Implementation of Ethernet that runs over multimode fiber cabling. Each 10BASE-FL link has a maximum distance of 2 kilometers (km).

10BASE-T

Implementation of Ethernet that runs over Category 3 or 5 unshielded twisted-pair (UTP) cabling. Each 10BASE-T segment has a distance of 100 m.

100BASE-CX

Implementation of Gigabit Ethernet that runs over shielded twisted-pair (STP) cabling. Each 1000BASE-CX segment has a maximum distance of 25 m.

100BASE-FX

Implementation of Fast Ethernet that runs over multimode fiber cabling. A 100BASE-FX segment has a maximum distance of 400 m in half-duplex mode and 2 km in full-duplex mode.

100BASE-LX

Implementation of Gigabit Ethernet that runs over single-mode fiber cabling. Each 1000BASE-LX segment has a maximum distance of 5 km.

100BASE-TX

Implementation of Fast Ethernet that runs over Category 5 UTP cabling. A 100BASE-TX segment has a maximum distance of 100 m.

100BASE-X

Collective term for both 100BASE-TX and 100BASE-FX Fast Ethernet topologies.

802.1X

The IEEE standard for port-based, Layer 2 authentication in 802 networks.

802.3

The IEEE standard for wired Ethernet topologies. This specification encompasses Ethernet, Fast Ethernet, and Gigabit Ethernet today.

802.5

The IEEE standard for Token Ring topologies.

802.11

The IEEE standard for wireless, Ethernet-compatible wireless LANs (WLANs).

802.11i

The IEEE standard for link layer security for 802.11 networks.

802.11e

The IEEE standard for link layer quality of service (QoS) for 802.11 networks.

802.11 slot time

A time value derived from the physical layer (PHY) based on radio frequency (RF) characteristics of the basic service set (BSS).

1000BASE-SX

Implementation of Gigabit Ethernet that runs over multimode fiber cabling. Each 1000BASE-SX segment has a maximum distance of 220 m.

1000BASE-T

Implementation of Gigabit Ethernet that runs over Category 5 UTP cabling. Each 1000BASE-T segment has a maximum distance of 100 m.

A

AAA server

A server that provides authentication, authorization, and accounting functions.

AC (access category)

Transmit queues for 802.11e QoS-enabled devices.

access layer

A term used for design networks that indicates the edge of a network. In a LAN, the access layer provides end stations with connectivity to the network.

acknowledgment frame

What a station receiving a frame sends back to the sending station to acknowledge the frame.

active scanning

A client actively searching for an access point (AP). It usually involves the client sending probe requests on each channel it is configured to use and waiting for probe responses from APs.

AES (Advanced Encryption Standard)

The latest standard encryption algorithm endorsed by the National Institute of Standards and Technology (NIST). AES is based on the Rijndael encryption algorithm.

AES-CCM

The mode of AES used in 802.11i.

AID (association identifier)

A logical port on the AP for the wireless station.

AIFS (arbitration interframe space)

Varying interframe spaces based on an AC's priority.

antenna

The part of the radio system designed to radiate or receive electromagnetic energy.

AP (access point)

The central point of communications for all stations in a BSS.

auto negotiation

Allows a station and Ethernet device (which can support one or more Ethernet variants such as 10BASE-T, 100BASE-TX, or 1000BASE-T) to automatically synchronize speed and duplex mode.

authentication server

An AAA server for 802.1X or Extensible Authentication Protocol (EAP) authentication.

authenticator

The entity to which a supplicant wants to secure connectivity.

B

beacon frame

An 802.11 management frame used by the AP to update the BSS of the AP's presence and its parameters.

Bluetooth

A short-range wireless technology designed to create personal area networks.

block cipher

A cipher that generates a key stream of a fixed size. The plaintext must be fragmented into matching size blocks during the encryption operation.

bridge

An Ethernet network device that physically separates two Ethernet collision domains.

broadcast domain

An internetwork of devices that are capable of sending and receiving broadcast frames to and from one another.

broadcast frame

A single frame destined to all stations in a broadcast domain.

BSS (basic service set)

A group of 802.11 stations communicating with one another via an AP.

C

CCK (complementary code keying)

A physical layer spreading technique used by the 802.11b standard to achieve 5.5 and 11 Mbps data rates.

CFP (contention-free period)

A time period where access to the wireless medium requires polling via the point coordination function (PCF) or hybrid coordination function (HCF).

CoA (care of address)

The device that receives packets sent by the home agent (HA) destined for the mobile node (MN). The CoA can exist on the MN itself or on the foreign agent (FA).

cochannel overlap

Overlap of two BSSs that are on the same channel.

collision

The result of two frames being transmitted in the same collision domain at the same time.

collision domain

An internetwork of Ethernet devices that contend for a single medium.

contention period

The time duration where distributed coordination function (DCF) stations contend with one another to access the medium.

core layer

A term used for designing networks that indicates the center of a network. The core layer should forward frames or packets as fast as possible between routers or switches.

CSMA/CA (carrier sense multiple access with collision avoidance)

The basic medium access method for 802.11 networks.

CSMA/CD (carrier sense multiple access with collision detection)

The basic medium access method for Ethernet networks.

CW (contention window)

The time period when the 802.11 medium is idle.

D

DAC (distributed admission control)

Enhanced DCF (EDCF) admission-control mechanism where stations determine whether they should transmit based on budget advertisements from the AP.

data link layer

The second layer of the Open System Interconnection (OSI) reference model. Consists of two sublayers: the data link sublayer and the logical link sublayer.

data link sublayer

Also known as the MAC layer, this sublayer focuses on topology-specific implementations. For example, 802.5 Token Ring networks have a different MAC from that of 802.3 Ethernet networks.

dBi

Unit for describing antenna gain relative to an isotropic antenna.

dBm

Unit for power measured relative to 1 milliwatt.

DCF (distributed coordination function)

CSMA/CA operation in 802.11 wireless LANs. DCF is the required basic access mechanism for all 802.11 devices.

DIFS (DCF interframe space)

The amount of time after the medium becomes available that a station must wait before beginning DCF medium access. A DIFS is equal to a short interframe space (SIFS) plus two slot times.

directivity

Describes the intensity of the radiation pattern emanating from an antenna.

distribution layer

A term used for designing networks that indicates the layer of the network that segments the networks into distinct Layer 2 broadcast domains by using routers or Layer 3 switches. Network services, such as access control lists (ACLs), route filtering, and Network Address Translation (NAT), are applied at the distribution layer.

DQPSK (differential quadrature phase shift keying)

The symbol-encoding mechanism used for 2 Mbps 802.11 operation.

DSSS (direct sequence spread spectrum)

The modulation technique used for 802.11 WLAN networking.

duplex

A term that describes whether a network topology allows simultaneous transit and receive by network devices or not .

See Also full duplex, half duplex.

E

EAP (Extensible Authentication Protocol)

A Point-to-Point Protocol (PPP) authentication framework.

EAP-MD5 (Message Digest 5)

An EAP authentication type based on Challenge Handshake Authentication Protocol (CHAP) authentication.

EAP-TLS (Transport Layer Security)

An EAP authentication type based on TLS authentication. Digital certificates are used for client- and server-side mutual authentication.

ECB (electronic code book)

A mode of encryption where the same plaintext always produces the same ciphertext.

EDCF (Enhanced DCF)

Mandatory 802.11e contention-based traffic prioritization and medium access method.

EIRP (effective isotropic radiated power)

A measurement that indicates the actual power that is radiated from an antenna.

ESS (extended service set)

A collection of BSSs that communicate with one another through the distribution system (usually the wired Ethernet port on an AP).

Ethernet

The IEEE 802.3 standard for wired 10 Mbps network operation. Other higher-speed variants to Ethernet are Fast Ethernet and Gigabit Ethernet.

Ethernet slot time

The time it takes for an Ethernet frame to traverse the network diameter.

Ethertype

The data contained in the payload of a MAC frame.

F

FA (foreign agent)

An agent on routers or Layer 3 switches that aids the MN in determining it has roamed and in receiving packets from the HA.

fading

Occurs when the power level of the signal drops because of various environmental factors.

Fast Ethernet

The IEEE 802.3u standard for 100 Mbps network operation.

FCS (frame check sequence)

A field in MAC frames to determine whether an error has occurred during transmission. The FCS value is computed and inserted into the frame by the transmitting station. The receiving station recalculates the FCS value and compares it to the FCS value in the frame. If the values match, the frame has been received error free.

FDD (frequency division duplex)

A duplex method that uses a different frequency to carry information in each direction.

FDDI (Fiber Distributed Data Interface)

The ANSI X3T9.5 standard for 100 Mbps network operation. FDDI uses a Token Ring–like topology with a multimode fiber cable plant.

FHSS (frequency hopped spread spectrum)

A modulation technique that hops from channel to channel.

FSK (frequency shift keying)

A modulation technique that shifts between two frequencies to represent 0s and 1s.

full duplex

A network topology where stations can transmit and receive data simultaneously.

G

Gigabit Ethernet

The IEEE 802.3z and 802.3ab standard for 1000 Mbps network operation.

GMK (group master key)

The master key for broadcast and multicast frame encryption operations, including encryption and message integrity.

GSM (global system mobile)

A common cellular phone standard.

GTK (group transient key)

The link layer key used to encrypt multicast and broadcast frames. The GTK is derived from the GMK.

H

HA (home agent)

An agent on routers or Layer 3 switches which ensures that a roaming MN receives its IP packets.

half duplex

A network topology where stations can either transmit or receive data at any moment.

HCF (hybrid coordination function)

Optional 802.11e polled access medium mechanism.

hidden node

When two stations are out of range of one another, but both are in range of the AP, the stations are said to be hidden from each other.

hub

A half-duplex Ethernet device with multiple ports. A hub allows a single Ethernet signal to be repeated out many ports.

I

IAPP (Interaccess Point Protocol)

Protocol used by APs to communicate with one another.

IBSS (independent basic service set)

A group of 802.11 stations communicating directly with one another. An IBSS is also referred to as an ad hoc network because it is essentially a simple peer-to-peer WLAN.

ICV (integrity check value)

A weak MIC function defined in 802.11. The ICV uses a CRC-32 to provide message integrity for 802.11 frames.

IRDP (Internet Router Discovery Protocol)

Protocol used by FAs and HAs to send agent advertisements.

isotropic antenna

An ideal lossless antenna that provides the same gain in all directions.

IV (initialization vector)

A numeric value that is concatenated to the key before the key stream is generated to avoid the same key generating the same key stream.

L–M

LEAP

A Cisco-developed EAP authentication type based on Microsoft CHAP (MS-CHAP) authentication.

logical link sublayer

Standard across all 802-based networks, this sublayer contains a simple frame protocol that provides connectionless frame delivery.

MIC (message integrity check)

Guarantees to the frame receiver that the frame is truly from the sender (as opposed to a man-in-the-middle) and that the frame has not been tampered with during transmission.

MN (mobile node)

A mobile-IP–aware roaming station.

mobile IP

A protocol that allows for a MN to retain a static IP address as it roams across VLANs.

multicast frame

A single frame destined to many stations in a broadcast domain.

multipath

Occurs when multiple versions of the transmitted signal arrive at the receiver via different paths.

mutual authentication

Authentication where not only does the network authenticate the client, but the client also authenticates the network. This authentication is a requirement for 802.11i authentication.

N–O

NAV (network allocation vector)

The virtual carrier-sense function for 802.11 stations. The NAV is a timer on every station that is updated by data frames transmitted on the medium. A station wanting to transmit must have a NAV that is equal to 0 before it can begin DCF operation.

network diameter

The distance between Ethernet stations at the extreme ends of a broadcast domain.

nonce

Number once. A number that is used only one time, primarily for cryptographic functions such as authentication or encryption.

OFDM (orthogonal frequency-division multiplexing)

A modulation technique used to provide very high data rates for 802.11a and 802.11g.

Open authentication

The 802.11 mandatory authentication type. Open authentication is a null authentication type, where any station is granted access.

P

passive scanning

Scanning where the client does not transmit any frames but rather listens for beacon frames on each channel. The client continues to change channels at a set interval, just as with active scanning, but the client does not send probe requests.

PBCC (packet binary convolutional coding)

An optional coding technique used in 802.11b.

PCF (point coordination function)

Mode of medium access for 802.11 BSSs where the AP (or point coordinator) polls PCF-pollable stations for data to transmit.

PEAP (Protected EAP)

An 802.1X authentication type where server-side authentication happens using digital certificates and client-side authentication happens via another 802.1X authentication type, such as EAP-MD5.

PIFS (PCF interframe space)

The amount of time after the medium becomes available that a station must wait before beginning PCF medium access. A PIFS is equal to a SIFS plus one slot time.

PMK (pairwise master key)

In 802.11i networks, PMK is the dynamic key generated by 802.1X authentication.

PTK (pairwise transient key)

The key used for link layer encryption in 802.11i networks.

R

radio

A communication device used for electromagnetic transmission through free space.

RADIUS server

A specific implementation of an AAA server.

RC4 (Rivest Cipher 4)

The cryptographic engine used for WEP encryption.

receiver sensitivity

The minimum signal level for the receiver to be able to decode the received signal.

repeater

A half-duplex Ethernet device. A repeater repeats an Ethernet signal to increase the network diameter of a given Ethernet topology. For example, you can use a repeater to extend the distance of a 10BASE-T network from 100 m to 200 m.

roaming domain

APs that are in the same broadcast domain and configured with the same service set identifier (SSID).

S

Shared Key authentication

A challenge/challenge-response authentication type included in the 802.11 standard where a WEP key is the shared secret.

SIFS (short interframe space)

The shortest amount of time stations wait before attempting to access the medium. A SIFS is typically used to manage frames. For example, after a station receives a data frame, it waits for a SIFS and then sends an acknowledgment frame.

spectral efficiency

A measure of the information bits that can be communicated or the amount of spectrum that is used to convey that information.

SSID (service set identifier)

A logical grouping for 802.11 devices.

stream cipher

A cipher that generates a key stream to match the size of the plaintext or unencrypted data frame.

supplicant

The device that is attempting to access the LAN using 802.1X authentication.

switch

A multiport Ethernet bridge that typically uses hardware acceleration to increase the performance of switching Ethernet frames between collision domains.

T

TC (traffic class)

Eight distinct classifications for data as defined in 802.11e.

TDD (time division duplex)

A modulation scheme that uses a different time slot to carry information in each direction.

TKIP (Temporal Key Integrity Protocol)

An encryption and MIC algorithm included in the 802.11i standard that uses per-frame keys and lightweight message integrity to fix weaknesses in the WEP and ICV functions of in the 802.11 standard.

Token Ring

A logical ring-based topology with deterministic, noncontention-based medium access. Typical data rates are 16 Mbps and 4 Mbps.

TXOP (transmission opportunity)

A moment in time when a station can begin transmitting frames for a given duration. A TXOP can facilitate multiple frames/acknowledgments as long as they fit within the duration of the TXOP.

U–Z

ultra-wide band

A new technology that provides very high data rates through the use of very short durations and very low power pulses.

unicast frame

A single frame destined to a specific station in a broadcast domain.

VLAN (virtual LAN)

A broadcast domain.

VSWR (voltage standing wave ratio)

A measure of the reflections formed from impedance mismatches along transmission lines.

WEP (Wired Equivalent Privacy)

A Layer 2 encryption algorithm based on the RC4 algorithm to provide data privacy for 802.11 networks.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.236.62