0-9

0-9

20/40 MHz channel operation
A feature that enables Wi-Fi CERTIFIED n products that operate with 40 MHz channels in the 2.4 GHz frequency band to sense other Wi-Fi devices in the channel and coordinate a switch to the default mode of 20 MHz channels. Wi-Fi CERTIFIED n devices that support 40 MHz channels in 2.4GHz must include support for this optional feature.  See also 40 MHz channel operation.
3G
The term refers to digital, packet-switched technology and is used to describe the third-generation of mobile telephony which brings video and broadband Internet access to mobile phones. The first generation was represented by analog cellular phones and the second generation by digital cellular networks.
40 MHz channel operation
A mode of operation in which two "channels," or paths on which data can travel, are combined to increase performance in some environments.  In the 2.4 GHz frequency band, Wi-Fi CERTIFIED n products are configured to operate using 20 MHz channels by default, and must employ coexistence mechanisms to help ensure that the device defaults to 20 MHz operation when sharing the frequency with other Wi-Fi networks.  In the 5 GHz frequency band, interference is not an issue, so coexistence mechanisms are not required.  See also 20/40 MHz channel coexistence.
802.11a
An IEEE standard for a wireless network that operates at 5 GHz with data rates up to 54Mbps.
802.11b
An IEEE standard for a wireless network that operates at 2.4 GHz with data rates up to 11Mbps.
802.11d
An IEEE specification that allows for configuration changes at the Media Access Control layer (MAC layer) level to comply with the rules of the country in which the network is to be used. (See MAC).
802.11e
An IEEE standard that adds Quality of Service (QoS) features and multimedia support to the existing 802.11b, 802.11g, and 802.11a wireless networks. (See QoS, WMM).
802.11g
An IEEE standard for a wireless network that operates at 2.4 GHz Wi-Fi with data rates up to 54Mbps.
802.11h
802.11h supports Dynamic Frequency Selection(DFS) and Transmit Power Control(TPC) requirements to ensure coexistence between Wi-Fi and other types of radio frequency devices in the 5 GHz band.
802.11i
An IEEE standard specifying security mechanisms for 802.11 networks. 802.11i makes use of the Advanced Encryption Standard (AES) block cipher. The standard also includes improvements in key management, user authentication through 802.1X and data integrity of headers. (See 802.1X, AES, WPA2).
802.11j
An IEEE specification for wireless networks that incorporates Japanese regulatory requirements concerning wireless transmitter output power, operational modes, channel arrangements and spurious emission levels.
802.11n
The most current generation of Wi-Fi technology.  802.11n supports Multiple-Input-Multiple-Output (MIMO) technology devices, using multiple receivers and multiple transmitters in both the client and access point to achieve improved performance. Products desgnated as Wi-Fi CERTIFIED n can operate in either 2.4 or 5 GHz frequency bands, and are backward compatible with 802.11 a/b/g networks. 802.11n technology can deliver data rates up to 600 Mbps. (See Mbps, MIMO).
802.1X
A standard for port-based authentication, first used in wired networks, that was adapted for use in enterprise WLANs to address security flaws in WEP, the original security specification for 802.11 networks. 802.1X provides a framework for authenticating users and controlling their access to a protected network and dynamic encryption keys to protect data privacy. (See EAP, WEP, WPA, WPA2).
802.3
The standard defining wired Ethernet networks. (See Ethernet).

A

Ad-Hoc mode
A term used to describe one type of Wi-Fi device-to-device network. (See device-to-device network, peer-to-peer network).
AES
Advanced Encryption Standard. The preferred standard for the encryption of commercial and government data using a symmetric block data encryption technique. It is used in the implementation of WPA2. (See 802.11i, WPA2).
Aggrergation
Techniques that make the transmission of data more efficient in Wi-Fi networks.
AP
Access point. A device which serves as a central wireless connection point for a Wi-Fi network.
Association
Describes the establishment and maintenance of the wireless link between devices. (If security is enabled, the devices cannot do anything but exchange security credentials with this link). (See authentication).
Authentication
The process that occurs after association to verify the identity of the wireless device or end user and allow access to the network. (See association, 802.1X, WPA, WPA2).

B

 
Backbone
The central part of a large network that links two or more sub-networks. The backbone is the primary data transmission path on large networks such as those of enterprises and service providers. A backbone can be wireless or wired.
 
 
bps
Bits per second. A measure of data transmission speed across a network or communications channel; bps is the number of bits that can be sent or received per second. It measures the speed at which data is communicated and should not be-but often is-confused with bytes per second (Bps, in this reference the B is capitalized while in bps lower case is used). While "bits" is a measure of transmission speed, "bytes" is a measure of storage capacity. (See bandwidth, Mbps).
 
 
Bridge
A wireless device that connects multiple networks together. (See router).
 
 
Broadband
A comparatively fast Internet connection possessing sufficient bandwidth to accommodate multiple voice, data and video channels simultaneously. Cable, DSL and satellite are all considered to be broadband channels; they provide much greater speed than dial-up Internet access over telephone wires. (See cable modem, DSL).
 
 
Broadband modem
A device that connects a local computer or network to a high-speed Internet service, such as DSL or Cable Internet. (See cable modem, DSL).
 
BSSID
Basic Service Set Identifier. A unique address that identifies the access point/router that creates the wireless network. (See SSID).

C

 
 
Channel
One portion of the available radio spectrum that all devices on a wireless network use to communicate. Changing the channel on the access point/router can help reduce interference.
 
 
 
 
Channel bonding
A mode of operation in which two "channels," or paths on which data can travel, are combined to increase performance in some environments.  In the 2.4 GHz frequency band, Wi-Fi CERTIFIED products are configured to operate using 20 MHz channels by default, and must employ coexistence mechanisms to help ensure that the device defaults to 20 MHz operation when sharing the frequency with other Wi-Fi networks.  In the 5 GHz frequency band, interference is not an issue, so coexistence mechanisms are not required.
 
 
Client
A device, such as a computer, phone or TV which accesses a Wi-Fi or wired network. (See AP).
 
Collision avoidance
A means of proactively detecting whether a node on an Ethernet network can transmit a signal without risk that it will collide with other traffic on the network. (See CSMA/CA, CSMA/CD).
 
 
Concurrent operation
Wi-Fi Access Points with concurrent operation can transmit on both 5 GHz and 2.4 GHz frequency bands at the same time.  Sometimes referred to as "simultaneous dual-band".
 
 
Crossover cable
A twisted-pair cable used to network two computers without use of a hub. Instead of traveling in direct parallel paths between plugs, the signals "crossover," reversing the sending and receiving wire pairs on each end. Crossover cables may be required to connect a cable or DSL modem to a wireless router or access point.
 
 
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance. The principal media access control strategy used in 802.11 networks to avoid data collisions. It is a "listen before talk" method of minimizing collisions. The network node checks to see if the transmission channel is clear before a data packet is sent. (See collision avoidance, CSMA/CD).
 
 
CSMA/CD
Customer Sense Multiple Access/Collision Detection. The principal media access control strategy used to manage traffic and reduce noise on wired Ethernet networks. It allows a network device to transmit data after detecting a channel is available. If two devices transmit data simultaneously, the sending device detects the collision of data packets and retransmits after a random time delay. (See collision avoidance, CSMA/CA).

D

Data rate
Also known as the "PHY" rate, this number captures the speed at which all data bits pass over the Wi-Fi network.  Many Wi-Fi devices will report this number as the "speed" at which your network is performing.  Actual throughout rates will always be lower than the data rate, due to available network capacity and overhead in real-world environments.  The data rate communicates the maximum possible rate at which a device can transmit data.  Wi-Fi CERTIFIED n devices have data rates which can range from 150 Mbps to 450 Mbps.  See also throughput, which is a real-world measure of performance and is always lower than data rate.
 
 
Device-to-device network
Two or more devices that connect using wireless network devices without the use of a centralized wireless access point. Also known as a peer-to-peer network. (See ad hoc mode, Peer-to-peer network).
 
 
DHCP
Dynamic Host Configuration Protocol. A protocol for dynamically assigning IP addresses from a pre-defined list to nodes on a network. When they log on, network nodes automatically receive an IP address from a pool of addresses served by a DHCP. The DHCP server provides (or leases) an IP address (to a client for a specific period of time. The client will automatically request a renewal of the lease when the lease is about to run out. If a lease renewal is not requested and it expires, the address is returned to the pool of available IP addresses. Using DHCP to manage IP addresses simplifies client configuration and efficiently utilizes IP addresses. (See IP address).
 
 
Dial-up
A connection to a remote network, or the Internet, using a standard modem and telephone connection, or Plain Old Telephone Service (POTS). (See POTS).
 
 
Digital home
A name used to refer to the trend of networked consumer electronics found in a home.  Digital home devices communicate with each other and often connect to a central library of movies, photos, or music.  Digital home devices range from televisions to set top boxes, notebook computers to audio systems, cameras to digital photo frames and much more.  Wi-Fi is a key technology for connecting the Digital Home.
 
 
Diversity antenna
An antenna system that uses multiple antennas to reduce interference and maximize reception and transmission quality.
 
 
Dual-band
Designates a product that can communicate on a wireless network in either the 2.4MHz or 5MHz frequency bands.  Dual-band Wi-Fi devices can offer either "selectable" or "concurrent" operation.  For selectable dual-band devices, the user must select one of the frequency bands.  Concurrent devices operate in both 2.4 and 5 GHz at the same time.

E

 
 
EAP
Extensible Authentication Protocol. A protocol that provides an authentication framework for both wireless and wired Ethernet enterprise networks. It is typically used with a RADIUS server to authenticate users on large networks. EAP protocol types are used in the 802.1X-based authentication in WPA-Enterprise and WPA2-Enterprise. (See 802.1X, EAP, LEAP, RADIUS, TLS, WPA-Enterprise, WPA2-Enterprise).
 
 
EAP-AKA
Authentication and Key Agreement. Enables handoff between 3G cellular and Wi-Fi networks using a single user identifier.
 
 
EAP-FAST
Flexible Authentication via Secure Tunneling. Uses multiple secured tunnels during authentication.
 
 
EAP-SIM
Specifies a mechanism for mutual authentication and session key agreement using the GSM-SIM and used in GSM-based mobile phone networks.
 
 
EAP-SIM
Specifies a mechanism for mutual authentication and session key agreement using the GSM-SIM and used in GSM-based mobile phone networks.
 
 
EAP-SIM
Specifies a mechanism for mutual authentication and session key agreement using the GSM-SIM and used in GSM-based mobile phone networks.
 
 
 
 
EAP-SIM
Specifies a mechanism for mutual authentication and session key agreement using the GSM-SIM and used in GSM-based mobile phone networks.
 
 
EAP-TLS
Extensible Authentication Protocol Transport Layer Security
 
 
EAP-TTLS/MSCHAPv2
EAP-Tunneled TLS/Microsoft Challenge Authentication Handshake Protocol. Securely tunnels clients authentication within TLS records
 
 
Encryption
Data converted into a form that cannot be easily understood by unauthorized persons.  Encrypted data is often used by websites for secure payment options, and by communications systems such as those used by safety officers for communicating sensitive information.  Wi-Fi security, known as WPA2, uses encryption to help protect transmitted data. (See 802.11i, RC4, TKIP, WEP, WPA, WPA2).
 
 
ESSID
Extended Service Set Identifier. A name used to identify a wireless network. (See SSID, network name).

F

 
 
FIPS 140-2
The Federal Information Processing Standard that defines the requirements of security technologies used in the handling and processing of information within government agencies. (See 802.11i, AES, WPA2).
 
 
Firewall
A system of software and/or hardware that resides between two networks to prevent access by unauthorized users. The most common use of a firewall is to provide security between a local network and the Internet. Firewalls can make a network appear invisible to the Internet and can block unauthorized and unwanted users from accessing files and systems on the network. Hardware and software firewalls monitor and control the flow of data in and out of computers in both wired and wireless enterprise, business and home networks. They can be set to intercept, analyze and stop a wide range of Internet intruders and hackers. (See Intrusion detection).
 
 
Firmware
Software routines that are embedded as read-only memory (ROM) in a computer chip or hardware device to prevent modification of the routines. Unlike random access memory (RAM), read-only memory stays intact in the absence of electrical power. Startup routines and low-level input/output instructions are stored in firmware.
 
 
Frequency band
Wi-Fi 802.11n operates at two frequencies: 5 GHz and 2.4 GHz.  Only devices which operate in the same frequency band can communicate with one another.  Wi-Fi CERTIFIED n devices may support one or both of these frequency bands. 

G

Gateway
In the wireless world, a gateway is an access point with additional software capabilities such as providing NAT and DHCP. Gateways may also provide VPN support, roaming, firewalls, various levels of security, etc.

H

Hotspot
A location where users can access the Internet using Wi-Fi laptops and other Wi-Fi enabled devices. Access may be provided free or for a fee. Hotspots are often found at coffee shops, hotels, airport lounges, train stations, convention centers, gas stations, truck stops and other public meeting areas. Corporations and campuses often offer it to visitors and guests. Hotspot service is sometimes available aboard planes, trains and boats. (See Wi-Fi ZONE).
Hz
Hertz. The international unit for measuring frequency equivalent to the older unit of cycles per second. One megahertz (MHz) is one million hertz. One gigahertz (GHz) is one billion hertz. The standard US electrical power frequency is 60 Hz; 802.11a devices operate in the 5 GHz band; 802.11b and g devices operate in the 2.4 GHz band.

I

 
 
I/O
Input/Output. The term used to describe any operation that transfers data to or from a computer. (See MIMO).
 
 
IEEE
Institute of Electrical and Electronics Engineers. A global technical professional society and standards-setting organization serving the public interest and its members in electrical, electronics, computer, information and other technologies.
 
 
 
IEEE 802.11
 
The family of specifications developed by the Institute of Electrical and Electronics Engineers (IEEE) 802.11 committee which establishes standards for wireless Ethernet networks. 802.11 standards define the over-the-air interface between wireless clients and a base station, or access point that is physically connected to the wired network. (See 802.11, IEEE).
 
 
 
Infrastructure mode
A term used to describe a wireless network consisting of devices connected to a network using a centralized wireless access point. One of two types of wireless network modes; the other is a device-to-device network (also known as peer-to-peer or ad hoc mode). (See ad hoc mode, device-to-device network, peer-to-peer network).
 
 
Internet appliance
A computing device used primarily for Internet access. It can be Wi-Fi enabled or connected to a wired network and generally offers customized web browsing, touch-screen navigation, with built-in e-mail services, entertainment and personal information management applications. Applications cannot be installed independently.
 
 
Intrusion detection
A security service that monitors and analyzes system events to identify security breaches to the network and provide real-time warnings when an unauthorized intrusion, or break-in, to the network is attempted. (See Rogue, War chalking, War driving).
 
 
IP
Internet Protocol. The basic communications protocol of the Internet. (See IP address, TCP/IP).
 
 
 
IP (Internet Protocol) telephony
Technology that supports voice, data and video transmission via IP-based LANs, WANs, and the Internet. This includes VoIP (Voice over IP).
 
 
IP address
Internet Protocol address. IP Version 4, the most widely used Internet protocol, provides 32-bit number that identifies the sender or receiver of information sent across the Internet. An IP address has two parts: The identifier of the particular network on the Internet and the identifier of the particular device (which can be a server or a workstation) within that network. The newer IP, Version 6, provides a 128-bit addressing scheme to support a much greater number of IP addresses. (See DHCP, DNS, IP).
 
 
 
IP telephony
A general term referring to technologies that use IP packet-switched connections to exchange voice, data, video, and other forms of information traditionally carried over public telephone networks. (See IP, VoIP).
 
 
 
ISO Network Model
A model developed by the International Standards Organization (ISO) that defines seven levels, or layers, in a network. By standardizing these layers and the interfaces that connect them, different portions of a given protocol can be modified or changed as technologies advance or systems requirements are altered. The seven layers are, beginning at the lowest layer: Physical, Data link, Network, Transport, Session, Presentation, Application. The IEEE 802.11 Standard encompasses the physical layer (PHY) and the lower portion of the data link layer which is often referred to as the Media Access Control (MAC) sub-layer. (See PHY).

L

 
 
LAN
Local Area Network. A system of connecting PCs and other devices within the same physical proximity for sharing resources such as an Internet connections, printers, files and drives. When Wi-Fi is used to connect the devices, the system is known as a wireless LAN or WLAN. (See WAN, WLAN, WMAN, WPAN).
 
 
LEAP
Lightweight Extensible Authentication Protocol-A proprietary Cisco protocol used for 802.1X authentication on wireless LANs (WLANs). (See 802.1X, EAP).

M

 
 
MAC address
Media Access Control address. A unique hardware number that identifies each device on a network. A device can be a computer, printer, etc. (See IP address).
 
 
MAN
Metropolitan Area Network. A data network, typically operated by a municipality or communications carrier that provides high-speed service within a geographical area such as a college campus, town or city. A MAN is larger than a Local Area Network (LAN) but smaller than a Wide Area Network (WAN). (See WiMAX).
 
 
 
Mapping
Assigning a PC to a shared drive or printer port on a network.
 
 
Mbps
Megabits per second. A measurement of data speed that is roughly equivalent to a million bits per second. (See bps).
 
 
Mesh network
A communications network with least two pathways to each node, forming a net-like organization. When each node is connected to every other node, the network is said to be fully meshed. When only some of the nodes are linked, switching is required to make all the connections and the network is said to be partially meshed, or partially connected.
 
 
MIC
Message Integrity Check. A technology that is employed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If it does not match, the data is assumed to have been tampered with and the packet is dropped. (See Packet, TKIP, WPA, WPA2).
 
 
MIMO
Multiple-Input/Multiple-Output.  An advanced signal processing technology that uses multiple receivers and multiple transmitters in both the client and access point to improve throughput and range.  For most Wi-Fi CERTIFIED n devices, MIMO is foundational to performance. (See 802.11n).

N

Network name
A name used to identify a wireless network. (See ESSID, SSID)
 
 
 
NFC
Near Field Communication. A short-range wireless communication technology facilitating spontaneous data exchange between two devices when they are in proximity to one another. Communication between two NFC-compatible devices occurs when they are brought within four centimeters of one another: a simple wave or touch can establish an NFC connection.  Used in Wi-Fi Protected Setup as a method to join devices to the network.
 
NIC
Network Interface Card. A wireless or wired PC adapter card that allows the client computer to utilize network resources. Most office wired NICs operate at 100 Mbps. Wireless NICs operate at data rates defined by 802.11 standards. (See PC card).

P

 
Packet
A unit of information transmitted from one device to another on a network. A packet typically contains a header with addressing information, data, and a checksum to insure data integrity. (See MIC).
 
 
Packet aggregation
A technique to move data more efficiently.  Multiple smaller packets which are headed to the same destination are bundled together, eliminating multiple waiting periods between those packets.  This increases throughput and allows devices to "sleep" more, which in turn improves spectrum and power usage.  The method of packet aggregation which is optionally tested in Wi-Fi CERTIFIED 802.11n is A-MPDU.
 
 
 
Pass phrase
A series of characters used to create a key which is used by Wi-Fi Protected Access (WPA). (See PSK, WPA).
 
 
 
 
PC Card
A removable, credit-card-sized memory or I/O device that fits into an expansion slot on a notebook computer or a personal digital assistant (PDA). PC Cards are used primarily in notebook computers and PDAs. PC Card peripherals include Wi-Fi network cards, memory cards, modems, wired NICs, and hard drives. (See NIC, PCI).
 
 
 
PCI
Peripheral Component Interconnect. A high-performance I/O (input/output) computer bus that allows expansion slots to be spaced closely for high-speed operation. (See NIC, PC Card).
 
 
 
PCMCIA
Expansion cards now referred to as "PC Cards" were originally called "PCMCIA Cards" because they met the standards created by the Personal Computer Memory Card International Association.
 
 
 
PEAP
PEAP-Protected Extensible Authentication Protocol. A protocol proposed by Microsoft, Cisco and RSA Security for 802.1X authentication on wireless LANs (WLANs). (See EAP, LEAP).
 
 
 
PEAPv0/EAP-MSCHAPv2
Protected Extensible Authentication Protocol, a protocol developed jointly by Microsoft, RSA Security and Cisco for transmitting authentication data, including passwords, over 802.11 wireless networks. PEAP authenticates wireless LAN clients using only server-side digital certificates by creating an encrypted SSL/TLS tunnel between the client and the authentication
 
 
PEAPv1/EAP-GTC
Protected Extensible Authentication Protocol, a protocol developed jointly by Microsoft, RSA Security and Cisco for transmitting authentication data, including passwords, over 802.11 wireless networks. PEAP authenticates wireless LAN clients using only server-side digital certificates by creating an encrypted SSL/TLS tunnel between the client and the authentication
 
 
 
Peer-to-peer network
A wireless or wired computer network that has no server or central hub or router. All the networked PCs are equally able to act as a network server or client, and each client computer can talk to all the other wireless computers without having to go through an access point or hub. However, since there is no central base station to monitor traffic or provide Internet access, the various signals can collide with each other, reducing overall performance. (See Ad hoc mode, Device-to-device network).
 
 
Performance
A concept which refers to how effectively (or quickly) data moves across a network, a device's range, and or a network's reliability. See also throughput, range, data rate.
 
PHY
The physical, or lowest, layer of the OSI Network Model. In a wireless network, the PHY defines parameters such as data rates, modulation method, signaling parameters, transmitter/receiver synchronization, etc. Within an actual radio implementation, the PHY corresponds to the radio front end and baseband signal processing sections. (See ISO Network Model).
 
Plug-and-play
Features that provide for automatic configuration of add-ons and peripheral devices such as wireless PC Cards, printers, scanners and multimedia devices. (See PC Card).
 
 
Print server
A network device, often a computer, that connects to at least one printer, allowing it to be shared among computers on a network.
 
 
Proxy server
A technique used in larger companies and organizations to improve network operations and security. The proxy server receives requests intended for another server to prevent direct communication between two or more networks. The proxy server forwards allowable data requests to remote servers and/or responds to data requests directly from stored remote server data.
 
 
 
PSK
A mechanism in Wi-Fi Protected Access (WPA)-Personal that allows the use of manually entered keys or passwords to initiate WPA security. The PSK is entered on the access point or home wireless gateway and each PC that is on the Wi-Fi network. After entering the password, Wi-Fi Protected Access automatically takes over. It keeps out eavesdroppers and other unauthorized users by requiring all devices to have the matching password. The password also initiates the encryption process which, in WPA is Temporal Key Integrity Protocol (TKIP) and in WPA2 is Advanced Encryption Standard (WPA2). (See TKIP, WPA-Personal, WPA2-Personal).

Q

 
 
 
QoS
Quality of Service. Required to support wireless multimedia applications and advanced traffic management. QoS enables Wi-Fi access points to prioritize traffic and optimize the way shared network resources are allocated among different applications. Without QoS, all applications running on different devices have equal opportunity to transmit data frames. That works well for data traffic from applications such as web browsers, file transfers, or e-mail but it is inadequate for multimedia applications. Voice over Internet Protocol (VoIP), video streaming, and interactive gaming are highly sensitive to latency increases and throughput reductions and require QoS. QoS extensions for 802.11 networks will be addressed in the upcoming IEEE 802.11e standard. (See 802.11e, WMM).

R

 
 
RADIUS
Remote Access Dial-Up User Service. A standard technology used by many major corporations to protect access to wireless networks. RADIUS is a user name and password scheme that enables only approved users to access the network; it does not affect or encrypt data. The first time a user wants access to the network, secure files or net locations, he or she must input his or her name and password and submit it over the network to the RADIUS server. The server then verifies that the individual has an account and, if so, ensures that the person uses the correct password before she or he can get on the network. RADIUS can be set up to provide different access levels or classes of access. For example, one level can provide blanket access to the Internet; another can provide access to the Internet as well as to e-mail communications; yet another account class can provide access to the Net, email and the secure business file server. Like other sophisticated security technologies, RADIUS comes in a variety of types and levels. (See EAP, WPA, WPA2).
 
 
 
Range
The effective distance of for a wireless transmission.  Wi-Fi CERTIFIED n devices typically have a range of up to 200 meters and can cover an entire home with a strong Wi-Fi signal.  Another benefit of 802.11n technology is much better coverage.  Wi-Fi CERTIFIED n devices use "reflections" of the signal (from walls, etc.) to strengthen it and eliminate cold or weak spots in the signal.
 
 
 
RC4
An encryption cipher designed RSA Data Security. It allows key lengths up to 1024 bits and is a component in many encryption schemes, including SSL, WEP, and TKIP. (See SSL, WEP, TKIP).
 
 
 
Repeater
A wireless repeater is a device that extends the coverage of an existing access point by relaying its signal. A wireless repeater does not do intelligent routing performed by wireless bridges and routers.
 
 
 
Residential gateway
A wireless device that allows multiple devices accessing a home network, including PCs and peripherals to access the Internet and communicate with one another. (See gateway).
 
 
 
 
RFID
Radio Frequency Identification. An electronic identification technology that uses radio frequency signals to read identifying data contained in tags on equipment and merchandise. An alternative to bar codes.
 
 
Roaming
The ability to move seamlessly from one area of Wi-Fi or cellular phone coverage to another with no loss in connectivity. Roaming also refers to the ability to wirelessly connect to the Internet from different hotspots without confronting the array of schemes used by different providers to authorize use and track billing. Roaming agreements among providers allow mobile professionals to a single authentication and authorization scheme to have all charges resolved to a single bill. (See hotspot).
 
 
Rogue
An unauthorized access point installed on a company's WLAN, typically by a user. Rogue access points present security risks. They rarely conform to the organization's security policies and, typically, no security at all is enabled on them. Rogues present open, insecure interfaces to the company's network. (See intrusion detection).
 
 
Router
A wireless router is device that accepts connections from wireless devices to a network and includes a network firewall for security, and provides local network addresses. (See hub).

S

Security supplicant
Client software that coordinates authentication and session key creation.
 
Server
A computer that provides resources or services to other computers and devices on a network. Types of servers can include print servers, Internet servers, mail servers, and DHCP servers. A server can also be combined with a hub or router. (See DHCP, hub, router).
 
 
 
 
Simultaneous dual-band
 
Wi-Fi Access Points with concurrent operation can transmit on both 5 GHz and 2.4 GHz frequency bands at the same time.  Sometimes referred to as concurrent operation or concurrent dual-band.
 
 
Single-band
Describes a wireless product that communicates using only a single radio frequency band, such as 2.4GHz or 5GHz in Wi-Fi products.
 
 
 
 
Single-stream
Term to describe a wireless device that communicates with a network by using a single communications input and output transmission.
 
 
 
Site survey
A comprehensive facility study performed by network managers to insure that planned service levels will be met when a new wireless LAN, or additional WLAN segments to an existing network, are deployed. Site survey's are usually performed by a radio frequency engineer and used by systems integrators to identify the optimum placements of access points to insure that planned levels of service are met. Site surveys are sometimes conducted following the deployment to insure that the WLAN is achieving the necessary level of coverage. Site surveys can also be used to detect rogue access points. (See intrusion detection, rogue).
 
Sniffer
A software program that monitors network traffic. Sniffers can capture data being transmitted on a network and are sometimes used illegitimately to hack a network.
 
 
SOHO
Small office/home office.  The term describes an office or business with ten or fewer computers and/or employees.
 
 
 
Spatial stream
A data transmission in a wireless network.  A spatial stream might be compared to a lane on a highway. MIMO technology makes use of multiple spatial streams to increase a device's transmission capacity. 
 
 
 
SSID
A unique 32-character network name, or identifier, that differentiates one wireless LAN from another. All access points and clients attempting to connect to a specific WLAN must use the same SSID. The SSID can be any alphanumeric entry up to a maximum of 32 characters. (See ESSID, network name).
 
 
SSL
SSL-Secured Sockets Layer. A protocol used to secure Internet communications. SSL is commonly used to encrypt transactions on online retail and banking. SSL encrypts the exchange of information between a user's browser and Web server so only the intended parties can read it. When an SSL session begins, the server sends its public key to the browser. The browser then sends a randomly generated secret key back to the server in order to have a secret key exchange for that session. (See RC4).
 
 
Subnetwork, or subnet
An IP address range that is part of a larger address range. Subnets are used to subdivide a network address of a larger network into smaller networks. Subnets connect to other networks through a router. Each individual wireless LAN will typically use the same subnet for all of its clients. (See IP address, router).
 
 
Switch
A type of hub that controls device usage to prevent data collisions and insures optimal network performance. A switch acts as a network traffic cop: Rather than transmitting all the packets it receives to all ports, as a hub does, a switch transmits packets to only the receiving port. (See hub).
 
 
 
Switchable operation
The capability of a dual-band device to be manually changed between two frequency bands, either 2.4MHz or 5MHz for operation.  Contrasts with concurrent operation, in which a device supports both 2.4 and 5 at the same time.  See also dual-band, single-band.

T

 
 
TCP
Transmission Control Protocol. The Transport level protocol used with the Internet Protocol (IP) to route data across the Internet. (See IP, TCP/IP).
 
 
 
 
 
TCP/IP
The underlying technology of Internet communications. While IP handles the actual delivery of data, TCP tracks the data packets to efficiently route a message through the Internet. Every computer in a TCP/IP network has its own IP address that is either dynamically assigned at startup (See DHCP) or permanently assigned as a static address. All TCP/IP messages contain the address of the destination network, as well as the address of the destination station. This enables TCP/IP messages to be transmitted to multiple networks (subnets) within an organization or worldwide. For example, when a user downloads a web page, TCP divides the page file on the web server into packets, numbers the packets, and forwards them individually to the user's IP address. The packets may be routed along different paths before reaching the user's address. At the destination, TCP reassembles the individual packets, waiting until they have all arrived to present them as a single file. (See IP, IP address, packet, TCP).
 
 
 
Throughput
Usually measured in bps, Kbps, Mbps or Gbps, throughput is the amount of data that can be sent from one location to another in a specific amount of time. (See bps, Mbps).
 
 
TLS
Transport Layer Security. A newer version of the SSL protocol, It supports more cryptographic algorithms than SSL. TLS is designed to authenticate and encrypt data communications, preventing eavesdropping, message forgery and interference. (See EAP, SSL).

V

 
 
Voice over Wi-Fi
VoIP services delivered over Wi-Fi networks. Sometimes referred to as wireless voice over IP. (See IP telephony, VoIP).
 
 
 
VoIP
Voice over Internet Protocol. A technology for transmitting ordinary telephone calls over the Internet using packet-based networks instead of standard public switched telephone networks or Plain Old Telephone Service (POTS). (See IP telephony, Voice over Wi-Fi).
 
 
 
 
VPN
Virtual Private Network. A network layer encryption scheme that allows remote clients to securely connect to their corporate networks using the Internet. Most major corporations today use VPN to protect their remote-access workers and their connections. It works by creating a secure virtual "tunnel" from the end-user's computer through the end-user's access point or gateway, through the Internet, all the way to the corporation's servers and systems. It also works for wireless networks and can effectively protect transmissions from Wi-Fi equipped computers to corporate servers and systems.

W

WAN
Wide Area Network (WLAN). A data communications network that spans large local, regional, national or international areas and is usually provided by a public carrier (such as a telephone company or service provider).The term is used to distinguish between phone-based data networks and Wi-Fi networks. Phone networks are considered WANs and Wi-Fi networks are considered Wireless Local Area Networks. (See LAN, WMAN, WPAN).
 
 
WEP
The original security standard used in Wi-Fi networks to encrypt network traffic.  Users should not use WEP devices for any sensitive data transmission, as there are well-known vulnerabilities in this very old form of security.  If any devices on a network only support WEP, the entire network is vulnerable. (See WPA, WPA2).
 
 
 
Wi-Fi CERTIFIED 802.11n draft 2.0
 
Certification mark owned and assigned by the Wi-Fi Alliance prior to the finalization of the 802.11n standards.  Products which were designated Wi-Fi CERTIFIED 802.11n draft 2.0 are now considered Wi-Fi CERTIFIED n.
 
 
 
Wi-Fi CERTIFIED n
 
Certification mark owned and assigned by the Wi-Fi Alliance that indicates a product has successfully passed the testing performed by the Wi-Fi Alliance for interoperability, security and feature performance based upon the IEEE 802.11n standard.  Product certification may be identified by the Wi-Fi CERTIFIED n logo on the product or packaging.  
 
 
 
 
Wi-Fi CERTIFIED™
 
A certification mark indicating that Wi-Fi products have passed interoperability testing requirements developed and governed by the Wi-Fi Alliance. Only products that have successfully completed the Wi-Fi Alliance's testing programs can bear the Wi-Fi CERTIFIEDTM mark.  (See Wi-Fi Interoperability Certificate).
 
 
Wi-Fi Direct™
 
Wi-Fi Direct is a certification mark for products that include a revolutionary technology advancement that can create connections between Wi-Fi devices anywhere, at any time, with or without a connection to a traditional Wi-Fi network. Wi-Fi Direct-certified devices connect directly, so you can do things like share, synch or transfer content, play games and chat. You don't need an access point or internet connection to use it - the connection lives inside your Wi-Fi Direct devices, and goes with you wherever you go.
 
 
Wi-Fi Interoperability Certificate
 
A statement that a product has passed the Wi-Fi Alliance's interoperability testing and has been certified under the Wi-Fi CERTIFIEDTM certification program for interoperability with other products that have also been certified under the Wi-Fi CERTIFIEDTM certification program. (See Wi-Fi CERTIFIED).
 
 
Wi-Fi n or Wireless n
 
Descriptions a manufacturer may give a product to indicate that the product contains some features of 802.11n.  This does not indicate that the product is  Wi-Fi CERTIFIED n, which is the only indication that a product has passed Wi-Fi Alliance testing to the 802.11n standard.
 
 
 
 
Wi-Fi Protected Setup™
 
Wi-Fi Protected Setup™ is the Wi-Fi Alliance's certification mark indicating that products have successfully completed testing to ensure that they comply with standards developed by the Wi-Fi Alliance for easy set up of security-enabled Wi-Fi networks in home and small office environments. Products certified under the Wi-Fi Protected Setup program support methods (pushing a button or entering a PIN into a wizard-type application) that are familiar to most consumers to configure a network and enable security.
 
 
 
 
Wi-Fi ZONE™
 
A certification program of the Wi-Fi Alliance® that allows users to easily identify public hotspot locations that have Wi-Fi connectivity available. The program allows customers from anywhere in the world to look for a single Wi-Fi ZONE brand. The Wi-Fi ZONE logo assures users that they will be able to get a fast, reliable Internet connection in a coffee shop, hotel, airport, convention center or other public venue. (See hotspot).
 
 
 
Wi-Fi®
A certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards.
 
 
 
WiMAX
Worldwide Interoperability for Microwave Access. Refers to the 802.16 standard being developed by the IEEE to provide a wireless coverage of up to 31 miles. It operates in the 2 to 11 GHz bands and enables connectivity without a direct line-of-sight to a base station although line-of-site is probably required to achieve connectivity at the distance of 31 miles.. It provides shared data rates up to 70 Mbps, which, according to WiMAX proponents, is enough bandwidth to simultaneously support more than 60 businesses and hundreds of homes. (See WMAN).
 
 
 
Wireless network
Devices connected to a network using a centralized wireless access point. (See WLAN).
 
 
WLAN
Wireless Local Area Network. A type of local-area network in which data is sent and received via high-frequency radio waves rather than cables or wires. (See LAN, wireless network).
 
 
 
WMAN
Wireless Metropolitan Area Network-A wireless data network that is comparable to a cell phone network in that users throughout a metropolitan area can freely access the Internet. WiMAX technology provides the basis of WMAN networks. (See WiMAX).
 
 
 
WMM® Power Save
 
 
WMM Power Save is a set of features for Wi-Fi networks that increase the efficiency and flexibility of data transmission in order to conserve power. WMM Power Save has been optimized for mobile devices running latency-sensitive applications such as voice, audio, or video, but can benefit any Wi-Fi device. WMM Power Save uses mechanisms included in the IEEE 802.11e standard and is an enhancement of IEEE 802.11 legacy power save. With WMM Power Save, the same amount of data can be transmitted in a shorter time while allowing the Wi-Fi device to remain longer in a low-power "dozing" state.
 
 
WMM®
 
The WMM® mark indicates that a product has successfully completed testing under the Wi-Fi Alliance's Wi-Fi Multimedia™ certification program for multimedia features that improve the user experience for audio, video and voice applications. In order to qualify for WMM certification, a product must implement multimedia features based on a subset of the IEEE 802.11e QoS draft standard, which add prioritized capabilities to wireless networks and optimize their performance when multiple concurring applications - each with different latency and throughput requirements - compete for network resources. By using products certified under the WMM program, end-user satisfaction is maintained in a wider variety of environments and traffic conditions. Products that qualify for WMM certification make it possible for home network users and enterprise network managers to decide which data streams are most important and assign them a higher traffic priority. (See 802.11e, QoS).
 
 
 
WPA2™
 
The Wi-Fi Protected Access 2 and WPA2 marks indicate that a product has successfully completed testing under the Wi-Fi Alliance's Wi-Fi Protected Access 2 certification program for wireless network security features.  The features tested and certified through the WPA2 program provide stronger data protection and network access control that the features tested and certified through the WPA program. They provide enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the ratified IEEE 802.11i standard, the advanced security protocol provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1X-based authentication. There are two versions of certification available through the WPA2 program: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal certifies a standard that protects unauthorized network access by utilizing a set-up password. WPA2-Enterprise certifies a standard that verifies network users through a server. The standard certified through WPA2 is backward compatible with the standard certified through WPA. Like the standard certified through WPA, the standard certified through WPA2 uses the 802.1X/EAP framework as part of the infrastructure that ensures centralized mutual authentication and dynamic key management and offers a pre-shared key for use in home and small office environments. This advanced security protocol is designed to secure all versions of 802.11 devices, including 802.11b, 802.11a, and 802.11g, multi-band and multi-mode. (See WPA2-Enterprise, WPA2-Personal).
 
 
 
WPA2™- Enterprise
 
The Wi-Fi Protected Access 2 - Enterprise mark indicates that a product has successfully completed testing under the Wi-Fi Alliance's Wi-Fi Protected Access 2 certification program and meets the criteria established to ensure stronger data protection for multiple users and large managed networks. These criteria prevent unauthorized network access by verifying network users through an authentication server. (See WPA2).
 
 
 
 
WPA2™-Personal
 
The Wi-Fi Protected Access 2 - Personal mark indicates that a product has successfully completed testing under the Wi-Fi Alliance's Wi-Fi Protected Access 2 certification program and meets the criteria established to ensure stronger data protection and prevent unauthorized network access for small networks. (See WPA2, PSK).

No comments:

Post a Comment

SEARCH

Search Term:
Related Posts Plugin for WordPress, Blogger...

stumbleupon