171
Copyright © 2004-2005, Vivato, Inc.
TKIP
The
Temporal Key Integrity Protocol
(TKIP) provides an extended 48-bit initialization vector, per-packet
key construction and distribution, a Message Integrity Code (MIC, sometimes called "Michael"), and a re-
keying mechanism. It uses a
stream cipher to encrypt the frame body and CRC of each
before transmission. It is an important component of the
and
security mechanisms.
ToS
packet headers include a 3-to-5 bit Type
of Service
(ToS) field set by the application developer that
indicates the appropriate type of service for the data in the packet. The way the bits are set determines
whether the packet is queued for sending with minimum delay, maximum throughput, low cost, or mid-way
"best-effort" settings depending upon the requirements of the data. The ToS field is used by the Vivato Wi-
Fi AP/Bridge to provide configuration control over
Quality of Service
(
) queues for data transmitted
from the VA4200 to client stations.
UDP
The
User Datagram Protocol
(UDP) is a transport layer protocol providing simple but unreliable datagram
services. It adds port address information and a checksum to an
packet.
UDP neither guarantees delivery nor does it require a connection. It is lightweight and efficient. All error
processing and retransmission must be performed by the application program.
Unicast
A
Unicast
sends a message to a single, specified receiver. In wireless networks, unicast usually refers to
an interaction in which the AP/Bridge sends data traffic in the form of
s directly to a
single client station
Some wireless security modes distinguish between how unicast, multicast, and broadcast frames are
encrypted or whether they are encrypted.
See also
.
URL
A
Uniform Resource Locator
(URL) is a standard for specifying the location of objects on the Internet, such
as a file or a newsgroup. URLs are used extensively in HTML documents to specify the target of a
hyperlink which is often another HTML document (possibly stored on another computer). The first part of
the URL indicates what protocol to use and the second part specifies the IP address or the domain name
where that resource is located.
For example,
ftp://ftp.glasplanes.com/downloads/myfile.tar.gz
specifies a file that should be
fetched using the FTP protocol;
http://www.glasplanes.com/index.html
specifies a Web page that
should be fetched using the
protocol.
VLAN
A
virtual
(VLAN) is a software-based, logical grouping of devices on a network that allow them to act
as if they are connected to a single physical network, even though they may not be. The nodes in a VLAN
share resources and bandwidth, and are isolated on that network. The Vivato Wi-Fi AP/Bridge supports the
configuration of a wireless VLAN. This technology is leveraged on the AP/Bridge for the "virtual" guest
network feature.