
I
Summit WM-Series WLAN Switch and Altitude Access Point Software Version 1.0 User Guide
153
IP Internet Protocol is the method or protocol by which data is sent from
one computer to another on the Internet. Each computer (host) on the
Internet has at least one IP address that uniquely identifies it. Internet
Protocol specifies the format of packets, also called datagrams, and the
addressing scheme. Most networks combine IP with a higher-level
protocol called Transmission Control Protocol (TCP), which establishes
a virtual connection between a destination and a source.
IPC Interprocess Communication. A capability supported by some
operating systems that allows one process to communicate with
another process. The processes can be running on the same computer
or on different computers connected through a network.
IPsec
IPsec-ESP
IPsec-AH
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-ESP).
The encapsulating security payload (ESP) encapsulates its data,
enabling it to protect data that follows in the datagram.Internet
Protocol security Authentication Header (IPsec-AH). AH protects the
parts of the IP datagram that can be predicted by the sender as it will
be received by the receiver.IPsec is a set of protocols developed by the
IETF to support secure exchange of packets at the IP layer. IPsec has
been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel.
Transport mode encrypts only the data portion (payload) of each
packet, but leaves the header untouched. The more secure Tunnel
mode encrypts both the header and the payload. On the receiving
side, an IPSec-compliant device decrypts each packet. For IPsec to
work, the sending and receiving devices must share a public key. This
is accomplished through a protocol known as Internet Security
Association and Key Management Protocol/Oakley (ISAKMP/
Oakley), which allows the receiver to obtain a public key and
authenticate the sender using digital certificates.
isochronous Isochronous data is data (such as voice or video) that requires a
constant transmission rate, where data must be delivered within
certain time constraints. For example, multimedia streams require an
isochronous transport mechanism to ensure that data is delivered as
fast as it is displayed and to ensure that the audio is synchronized
with the video. Compare: asynchronous processes in which data
streams can be broken by random intervals, and synchronous
processes, in which data streams can be delivered only at specific
intervals.
ISP Internet Service Provider.
IV IV (Initialization Vector), part of the standard WEP encryption
mechanism that concatenates a shared secret key with a randomly
generated 24-bit initialization vector. WPA with TKIP uses 48-bit IVs,
an enhancement that significantly increases the difficulty in cracking
the encryption. (See WPA and TKIP)
I (Continued)
Kommentare zu diesen Handbüchern