S


Secure Shell protocol (SSH)

A Telnet-like protocol that establishes an encrypted session.



session

The series of communication transactions between a client device and specific station in a wireless network.



shared secret

A shared secret is a string of text or numbers that is communicated between two parties in an out-of-band connection. Also known as a shared key or pre-shared key (PSK), a shared secret is used as input to a one-way hash algorithm.



SIP

Session Initialization Protocol. A signaling protocol that establishes real-time calls and conferences over IP networks.



spectrum

Electromagnetic radiation arranged in order of wavelength with certain radio bands reserved for specific servicesfor examplepolice, fire, WLAN, and so on.



SSH

Secure Shell protocol. A Telnet-like protocol that establishes an encrypted session.



SSID

Service set identifier. The unique name shared among all computers and other devices in a wireless LAN (WLAN). SSIDs can be thought of as the "network name," and they are commonly used by network users to recognize specific wireless LANs. In enterprise WLANs, the same SSID is usually shared among all access points. This allows a client device to recognize the WLAN as the same logical network as it roams from AP to AP. A common SSID (or "network name") is used across all access points.

Furthermore, access points can support more than one SSID. This would allow an enterprise WLAN, for example, to have two or three different SSIDs, with different security settings, available on the same access points. Common examples would be for a WLAN to have different SSIDs for laptop users, wireless phone users, and maybe even guest users.



STA

Station. Any device that has a wireless network interface. All wireless clients and access points can be considered stations.



Station

See STA.



Supplicant

A client role in the 802.1x framework. This is basically the client device (or user) that wants to be authenticated for access to the network. Supplicant is a term used to describe the device that is attempting to access the network in an authentication event.






The Business Case for Enterprise-Class Wireless Lans
The Business Case for Enterprise-Class Wireless LANs
ISBN: 1587201259
EAN: 2147483647
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net