0-9
- 20/40 MHz channel operation
 
- A feature that enables Wi-Fi CERTIFIED n products that  operate with 40 MHz channels in the 2.4 GHz frequency band to sense  other Wi-Fi devices in the channel and coordinate a switch to the  default mode of 20 MHz channels. Wi-Fi CERTIFIED n devices that support  40 MHz channels in 2.4GHz must include support for this optional  feature.  See also 40 MHz channel operation.  
 
- 3G
 
- The term refers to digital, packet-switched technology and  is used to describe the third-generation of mobile telephony which  brings video and broadband Internet access to mobile phones. The first  generation was represented by analog cellular phones and the second  generation by digital cellular networks.
 
- 40 MHz channel operation
 
- A mode of operation in which two "channels," or paths on  which data can travel, are combined to increase performance in some  environments.  In the 2.4 GHz frequency band, Wi-Fi CERTIFIED n products  are configured to operate using 20 MHz channels by default, and must  employ coexistence mechanisms to help ensure that the device defaults to  20 MHz operation when sharing the frequency with other Wi-Fi networks.   In the 5 GHz frequency band, interference is not an issue, so  coexistence mechanisms are not required.  See also 20/40 MHz channel  coexistence.  
 
- 802.11a
 
- An IEEE standard for a wireless network that operates at 5 GHz with data rates up to 54Mbps.  
 
- 802.11b
 
- An IEEE standard for a wireless network that operates at 2.4 GHz with data rates up to 11Mbps.  
 
- 802.11d
 
- An IEEE specification that allows for configuration changes  at the Media Access Control layer (MAC layer) level to comply with the  rules of the country in which the network is to be used. (See MAC).
 
- 802.11e
 
- An IEEE standard that adds Quality of Service (QoS)  features and multimedia support to the existing 802.11b, 802.11g, and  802.11a wireless networks. (See QoS, WMM).
 
- 802.11g
 
- An IEEE standard for a wireless network that operates at 2.4 GHz Wi-Fi with data rates up to 54Mbps. 
 
- 802.11h
 
- 802.11h supports Dynamic Frequency Selection(DFS) and  Transmit Power Control(TPC) requirements to ensure coexistence between  Wi-Fi and other types of radio frequency devices in the 5 GHz band.
 
- 802.11i
 
- An IEEE standard specifying security mechanisms for 802.11  networks. 802.11i makes use of the Advanced Encryption Standard (AES)  block cipher. The standard also includes improvements in key management,  user authentication through 802.1X and data integrity of headers. (See  802.1X, AES, WPA2).
 
- 802.11j
 
- An IEEE specification for wireless networks that  incorporates Japanese regulatory requirements concerning wireless  transmitter output power, operational modes, channel arrangements and  spurious emission levels.
 
- 802.11n
 
- The most current generation of Wi-Fi technology.  802.11n  supports Multiple-Input-Multiple-Output (MIMO) technology devices, using  multiple receivers and multiple transmitters in both the client and  access point to achieve improved performance. Products desgnated as  Wi-Fi CERTIFIED n can operate in either 2.4 or 5 GHz frequency bands,  and are backward compatible with 802.11 a/b/g networks. 802.11n  technology can deliver data rates up to 600 Mbps. (See Mbps, MIMO).  
 
- 802.1X
 
- A standard for port-based authentication, first used in  wired networks, that was adapted for use in enterprise WLANs to address  security flaws in WEP, the original security specification for 802.11  networks. 802.1X provides a framework for authenticating users and  controlling their access to a protected network and dynamic encryption  keys to protect data privacy. (See EAP, WEP, WPA, WPA2).
 
- 802.3
 
- The standard defining wired Ethernet networks. (See Ethernet).
 
- Ad-Hoc mode
 
- A term used to describe one type of Wi-Fi device-to-device network. (See device-to-device network, peer-to-peer network).  
 
- AES
 
- Advanced Encryption Standard. The preferred standard for  the encryption of commercial and government data using a symmetric block  data encryption technique. It is used in the implementation of WPA2.  (See 802.11i, WPA2).
 
- Aggrergation
 
- Techniques that make the transmission of data more efficient in Wi-Fi networks. 
 
- AP
 
- Access point. A device which serves as a central wireless connection point for a Wi-Fi network. 
 
- Association
 
- Describes the establishment and maintenance of the wireless  link between devices. (If security is enabled, the devices cannot do  anything but exchange security credentials with this link). (See  authentication).
 
- Authentication
 
- The process that occurs after association to verify the  identity of the wireless device or end user and allow access to the  network. (See association, 802.1X, WPA, WPA2).
 
-  
 
- Backbone
 
- The central part of a large network that links two or more  sub-networks. The backbone is the primary data transmission path on  large networks such as those of enterprises and service providers. A  backbone can be wireless or wired.
 
-  
 
-  
 
- bps
 
- Bits per second. A measure of data transmission speed  across a network or communications channel; bps is the number of bits  that can be sent or received per second. It measures the speed at which  data is communicated and should not be-but often is-confused with bytes  per second (Bps, in this reference the B is capitalized while in bps  lower case is used). While "bits" is a measure of transmission speed,  "bytes" is a measure of storage capacity. (See bandwidth, Mbps).
 
-  
 
-  
 
- Bridge
 
- A wireless device that connects multiple networks together. (See router).
 
-  
 
-  
 
- Broadband
 
- A comparatively fast Internet connection possessing  sufficient bandwidth to accommodate multiple voice, data and video  channels simultaneously. Cable, DSL and satellite are all considered to  be broadband channels; they provide much greater speed than dial-up  Internet access over telephone wires. (See cable modem, DSL).
 
-  
 
-  
 
- Broadband modem
 
- A device that connects a local computer or network to a  high-speed Internet service, such as DSL or Cable Internet. (See cable  modem, DSL).
 
-  
 
- BSSID
 
- Basic Service Set Identifier. A unique address that  identifies the access point/router that creates the wireless network.  (See SSID).
 
-  
 
-  
 
- Channel
 
- One portion of the available radio spectrum that all  devices on a wireless network use to communicate. Changing the channel  on the access point/router can help reduce interference.
 
-  
 
-  
 
-  
 
-  
 
- Channel bonding
 
- A mode of operation in which two "channels," or paths on which data can  travel, are combined to increase performance in some environments.  In  the 2.4 GHz frequency band, Wi-Fi CERTIFIED products are configured to  operate using 20 MHz channels by default, and must employ coexistence  mechanisms to help ensure that the device defaults to 20 MHz operation  when sharing the frequency with other Wi-Fi networks.  In the 5 GHz  frequency band, interference is not an issue, so coexistence mechanisms  are not required.  
 
-  
 
-  
 
- Client
 
- A device, such as a computer, phone or TV which accesses a Wi-Fi or wired network. (See AP).  
 
-  
 
- Collision avoidance
 
- A means of proactively detecting whether a node on an  Ethernet network can transmit a signal without risk that it will collide  with other traffic on the network. (See CSMA/CA, CSMA/CD).
 
-  
 
-  
 
- Concurrent operation
 
- Wi-Fi Access Points with concurrent operation can transmit on both 5 GHz  and 2.4 GHz frequency bands at the same time.  Sometimes referred to as  "simultaneous dual-band".  
 
-  
 
-  
 
- Crossover cable
 
- A twisted-pair cable used to network two computers without  use of a hub. Instead of traveling in direct parallel paths between  plugs, the signals "crossover," reversing the sending and receiving wire  pairs on each end. Crossover cables may be required to connect a cable  or DSL modem to a wireless router or access point.
 
-  
 
-  
 
- CSMA/CA
 
- Carrier Sense Multiple Access/Collision Avoidance. The  principal media access control strategy used in 802.11 networks to avoid  data collisions. It is a "listen before talk" method of minimizing  collisions. The network node checks to see if the transmission channel  is clear before a data packet is sent. (See collision avoidance,  CSMA/CD).
 
-  
 
-  
 
- CSMA/CD
 
- Customer Sense Multiple Access/Collision Detection. The  principal media access control strategy used to manage traffic and  reduce noise on wired Ethernet networks. It allows a network device to  transmit data after detecting a channel is available. If two devices  transmit data simultaneously, the sending device detects the collision  of data packets and retransmits after a random time delay. (See  collision avoidance, CSMA/CA).
 
- Data rate
 
- Also known as the "PHY" rate, this number captures the speed at which  all data bits pass over the Wi-Fi network.  Many Wi-Fi devices will  report this number as the "speed" at which your network is performing.   Actual throughout rates will always be lower than the data rate, due to  available network capacity and overhead in real-world environments.  The  data rate communicates the maximum possible rate at which a device can  transmit data.  Wi-Fi CERTIFIED n devices have data rates which can  range from 150 Mbps to 450 Mbps.  See also throughput, which is a  real-world measure of performance and is always lower than data rate.  
 
-  
 
-  
 
- Device-to-device network
 
- Two or more devices that connect using wireless network  devices without the use of a centralized wireless access point. Also  known as a peer-to-peer network. (See ad hoc mode, Peer-to-peer  network).
 
-  
 
-  
 
- DHCP
 
- Dynamic Host Configuration Protocol. A protocol for  dynamically assigning IP addresses from a pre-defined list to nodes on a  network. When they log on, network nodes automatically receive an IP  address from a pool of addresses served by a DHCP. The DHCP server  provides (or leases) an IP address (to a client for a specific period of  time. The client will automatically request a renewal of the lease when  the lease is about to run out. If a lease renewal is not requested and  it expires, the address is returned to the pool of available IP  addresses. Using DHCP to manage IP addresses simplifies client  configuration and efficiently utilizes IP addresses. (See IP address).
 
-  
 
-  
 
- Dial-up
 
- A connection to a remote network, or the Internet, using a  standard modem and telephone connection, or Plain Old Telephone Service  (POTS). (See POTS).
 
-  
 
-  
 
- Digital home
 
- A name used to refer to the trend of networked consumer electronics  found in a home.  Digital home devices communicate with each other and  often connect to a central library of movies, photos, or music.  Digital  home devices range from televisions to set top boxes, notebook  computers to audio systems, cameras to digital photo frames and much  more.  Wi-Fi is a key technology for connecting the Digital Home.  
 
-  
 
-  
 
- Diversity antenna
 
- An antenna system that uses multiple antennas to reduce interference and maximize reception and transmission quality.
 
-  
 
-  
 
- Dual-band
 
- Designates a product that can communicate on a wireless network in  either the 2.4MHz or 5MHz frequency bands.  Dual-band Wi-Fi devices can  offer either "selectable" or "concurrent" operation.  For selectable  dual-band devices, the user must select one of the frequency bands.   Concurrent devices operate in both 2.4 and 5 GHz at the same time.  
 
-  
 
-  
 
- EAP
 
- Extensible Authentication Protocol. A protocol that  provides an authentication framework for both wireless and wired  Ethernet enterprise networks. It is typically used with a RADIUS server  to authenticate users on large networks. EAP protocol types are used in  the 802.1X-based authentication in WPA-Enterprise and WPA2-Enterprise.  (See 802.1X, EAP, LEAP, RADIUS, TLS, WPA-Enterprise, WPA2-Enterprise). 
 
-  
 
-  
 
- EAP-AKA
 
- Authentication and Key Agreement. Enables handoff between 3G cellular and Wi-Fi networks using a single user identifier.   
 
-  
 
-  
 
- EAP-FAST
 
- Flexible Authentication via Secure Tunneling. Uses multiple secured tunnels during authentication.   
 
-  
 
-  
 
- EAP-SIM
 
- Specifies a mechanism for mutual authentication and session  key agreement using the GSM-SIM and used in GSM-based mobile phone  networks.
 
-  
 
-  
 
- EAP-SIM
 
- Specifies a mechanism for mutual authentication and session  key agreement using the GSM-SIM and used in GSM-based mobile phone  networks.
 
-  
 
-  
 
- EAP-SIM
 
- Specifies a mechanism for mutual authentication and session  key agreement using the GSM-SIM and used in GSM-based mobile phone  networks.
 
-  
 
-  
 
-  
 
-  
 
- EAP-SIM
 
- Specifies a mechanism for mutual authentication and session  key agreement using the GSM-SIM and used in GSM-based mobile phone  networks.
 
-  
 
-  
 
- EAP-TLS
 
- Extensible Authentication Protocol Transport Layer Security
 
-  
 
-  
 
- EAP-TTLS/MSCHAPv2
 
- EAP-Tunneled TLS/Microsoft Challenge Authentication  Handshake Protocol. Securely tunnels clients authentication within TLS  records
 
-  
 
-  
 
- Encryption
 
- Data converted into a form that cannot be easily understood  by unauthorized persons.  Encrypted data is often used by websites for  secure payment options, and by communications systems such as those used  by safety officers for communicating sensitive information.  Wi-Fi  security, known as WPA2, uses encryption to help protect transmitted data. (See 802.11i, RC4, TKIP, WEP, WPA, WPA2). 
 
-  
 
-  
 
- ESSID
 
- Extended Service Set Identifier. A name used to identify a wireless network. (See SSID, network name).
 
-  
 
-  
 
- FIPS 140-2
 
- The Federal Information Processing Standard that defines  the requirements of security technologies used in the handling and  processing of information within government agencies. (See 802.11i, AES,  WPA2).
 
-  
 
-  
 
- Firewall
 
- A system of software and/or hardware that resides between  two networks to prevent access by unauthorized users. The most common  use of a firewall is to provide security between a local network and the  Internet. Firewalls can make a network appear invisible to the Internet  and can block unauthorized and unwanted users from accessing files and  systems on the network. Hardware and software firewalls monitor and  control the flow of data in and out of computers in both wired and  wireless enterprise, business and home networks. They can be set to  intercept, analyze and stop a wide range of Internet intruders and  hackers. (See Intrusion detection).
 
-  
 
-  
 
- Firmware
 
- Software routines that are embedded as read-only memory  (ROM) in a computer chip or hardware device to prevent modification of  the routines. Unlike random access memory (RAM), read-only memory stays  intact in the absence of electrical power. Startup routines and  low-level input/output instructions are stored in firmware.
 
-  
 
-  
 
- Frequency band
 
- Wi-Fi 802.11n operates at two frequencies: 5 GHz and 2.4 GHz.  Only  devices which operate in the same frequency band can communicate with  one another.  Wi-Fi CERTIFIED n devices may support one or both of these  frequency bands.    
 
- Gateway
 
- In the wireless world, a gateway is an access point with  additional software capabilities such as providing NAT and DHCP.  Gateways may also provide VPN support, roaming, firewalls, various  levels of security, etc.
 
- Hotspot
 
- A location where users can access the Internet using Wi-Fi  laptops and other Wi-Fi enabled devices. Access may be provided free or  for a fee. Hotspots are often found at coffee shops, hotels, airport  lounges, train stations, convention centers, gas stations, truck stops  and other public meeting areas. Corporations and campuses often offer it  to visitors and guests. Hotspot service is sometimes available aboard  planes, trains and boats. (See Wi-Fi ZONE).
 
- Hz
 
- Hertz. The international unit for measuring frequency  equivalent to the older unit of cycles per second. One megahertz (MHz)  is one million hertz. One gigahertz (GHz) is one billion hertz. The  standard US electrical power frequency is 60 Hz; 802.11a devices operate  in the 5 GHz band; 802.11b and g devices operate in the 2.4 GHz band. 
 
-  
 
-  
 
- I/O
 
- Input/Output. The term used to describe any operation that transfers data to or from a computer. (See MIMO).
 
-  
 
-  
 
- IEEE
 
- Institute of Electrical and Electronics Engineers. A global  technical professional society and standards-setting organization  serving the public interest and its members in electrical, electronics,  computer, information and other technologies.
 
-  
 
-  
 
-  
 
- IEEE 802.11
 
-  
 
- The family of specifications developed by the Institute of  Electrical and Electronics Engineers (IEEE) 802.11 committee which  establishes standards for wireless Ethernet networks. 802.11 standards  define the over-the-air interface between wireless clients and a base  station, or access point that is physically connected to the wired  network. (See 802.11, IEEE).
 
-  
 
-  
 
-  
 
- Infrastructure mode
 
- A term used to describe a wireless network consisting of  devices connected to a network using a centralized wireless access  point. One of two types of wireless network modes; the other is a  device-to-device network (also known as peer-to-peer or ad hoc mode).  (See ad hoc mode, device-to-device network, peer-to-peer network). 
 
-  
 
-  
 
- Internet appliance
 
- A computing device used primarily for Internet access. It  can be Wi-Fi enabled or connected to a wired network and generally  offers customized web browsing, touch-screen navigation, with built-in  e-mail services, entertainment and personal information management  applications. Applications cannot be installed independently.
 
-  
 
-  
 
- Intrusion detection
 
- A security service that monitors and analyzes system events  to identify security breaches to the network and provide real-time  warnings when an unauthorized intrusion, or break-in, to the network is  attempted. (See Rogue, War chalking, War driving).
 
-  
 
-  
 
- IP
 
- Internet Protocol. The basic communications protocol of the Internet. (See IP address, TCP/IP).
 
-  
 
-  
 
-  
 
- IP (Internet Protocol) telephony
 
- Technology that supports voice, data and video transmission  via IP-based LANs, WANs, and the Internet. This includes VoIP (Voice  over IP).
 
-  
 
-  
 
- IP address
 
- Internet Protocol address. IP Version 4, the most widely  used Internet protocol, provides 32-bit number that identifies the  sender or receiver of information sent across the Internet. An IP  address has two parts: The identifier of the particular network on the  Internet and the identifier of the particular device (which can be a  server or a workstation) within that network. The newer IP, Version 6,  provides a 128-bit addressing scheme to support a much greater number of  IP addresses. (See DHCP, DNS, IP).
 
-  
 
-  
 
-  
 
- IP telephony
 
- A general term referring to technologies that use IP  packet-switched connections to exchange voice, data, video, and other  forms of information traditionally carried over public telephone  networks. (See IP, VoIP).
 
-  
 
-  
 
-  
 
- ISO Network Model
 
- A model developed by the International Standards  Organization (ISO) that defines seven levels, or layers, in a network.  By standardizing these layers and the interfaces that connect them,  different portions of a given protocol can be modified or changed as  technologies advance or systems requirements are altered. The seven  layers are, beginning at the lowest layer: Physical, Data link, Network,  Transport, Session, Presentation, Application. The IEEE 802.11 Standard  encompasses the physical layer (PHY) and the lower portion of the data  link layer which is often referred to as the Media Access Control (MAC)  sub-layer. (See PHY).
 
-  
 
-  
 
- LAN
 
- Local Area Network. A system of connecting PCs and other  devices within the same physical proximity for sharing resources such as  an Internet connections, printers, files and drives. When Wi-Fi is used  to connect the devices, the system is known as a wireless LAN or WLAN.  (See WAN, WLAN, WMAN, WPAN). 
 
-  
 
-  
 
- LEAP
 
- Lightweight Extensible Authentication Protocol-A  proprietary Cisco protocol used for 802.1X authentication on wireless  LANs (WLANs). (See 802.1X, EAP).
 
-  
 
-  
 
- MAC address
 
- Media Access Control address. A unique hardware number that  identifies each device on a network. A device can be a computer,  printer, etc. (See IP address).
 
-  
 
-  
 
- MAN
 
- Metropolitan Area Network. A data network, typically  operated by a municipality or communications carrier that provides  high-speed service within a geographical area such as a college campus,  town or city. A MAN is larger than a Local Area Network (LAN) but  smaller than a Wide Area Network (WAN). (See WiMAX).
 
-  
 
-  
 
-  
 
- Mapping
 
- Assigning a PC to a shared drive or printer port on a network.
 
-  
 
-  
 
- Mbps
 
- Megabits per second. A measurement of data speed that is roughly equivalent to a million bits per second. (See bps).
 
-  
 
-  
 
- Mesh network
 
- A communications network with least two pathways to each  node, forming a net-like organization. When each node is connected to  every other node, the network is said to be fully meshed. When only some  of the nodes are linked, switching is required to make all the  connections and the network is said to be partially meshed, or partially  connected. 
 
-  
 
-  
 
- MIC
 
- Message Integrity Check. A technology that is employed to  prevent an attacker from capturing data packets, altering them and  resending them. The MIC provides a strong mathematical function in which  the receiver and the transmitter each compute and then compare the MIC.  If it does not match, the data is assumed to have been tampered with  and the packet is dropped. (See Packet, TKIP, WPA, WPA2).
 
-  
 
-  
 
- MIMO
 
- Multiple-Input/Multiple-Output.  An advanced signal processing  technology that uses multiple receivers and multiple transmitters in  both the client and access point to improve throughput and range.  For  most Wi-Fi CERTIFIED n devices, MIMO is foundational to  performance. (See 802.11n).   
 
- Network name
 
- A name used to identify a wireless network. (See ESSID, SSID)
 
-  
 
-  
 
-  
 
- NFC
 
- Near Field Communication. A short-range wireless  communication technology facilitating spontaneous data exchange between  two devices when they are in proximity to one another. Communication  between two NFC-compatible devices occurs when they are brought within  four centimeters of one another: a simple wave or touch can establish an  NFC connection.  Used in Wi-Fi Protected Setup as a method to join  devices to the network.  
 
-  
 
- NIC
 
- Network Interface Card. A wireless or wired PC adapter card  that allows the client computer to utilize network resources. Most  office wired NICs operate at 100 Mbps. Wireless NICs operate at data  rates defined by 802.11 standards. (See PC card).
 
-  
 
- Packet
 
- A unit of information transmitted from one device to  another on a network. A packet typically contains a header with  addressing information, data, and a checksum to insure data integrity.  (See MIC).
 
-  
 
-  
 
- Packet aggregation
 
- A technique to move data more efficiently.  Multiple smaller packets  which are headed to the same destination are bundled together,  eliminating multiple waiting periods between those packets.  This  increases throughput and allows devices to "sleep" more, which in turn  improves spectrum and power usage.  The method of packet aggregation  which is optionally tested in Wi-Fi CERTIFIED 802.11n is A-MPDU.  
 
-  
 
-  
 
-  
 
- Pass phrase
 
- A series of characters used to create a key which is used by Wi-Fi Protected Access (WPA). (See PSK, WPA).
 
-  
 
-  
 
-  
 
-  
 
- PC Card
 
- A removable, credit-card-sized memory or I/O device that  fits into an expansion slot on a notebook computer or a personal digital  assistant (PDA). PC Cards are used primarily in notebook computers and  PDAs. PC Card peripherals include Wi-Fi network cards, memory cards,  modems, wired NICs, and hard drives. (See NIC, PCI).
 
-  
 
-  
 
-  
 
- PCI
 
- Peripheral Component Interconnect. A high-performance I/O  (input/output) computer bus that allows expansion slots to be spaced  closely for high-speed operation. (See NIC, PC Card).
 
-  
 
-  
 
-  
 
- PCMCIA
 
- Expansion cards now referred to as "PC Cards" were  originally called "PCMCIA Cards" because they met the standards created  by the Personal Computer Memory Card International Association.
 
-  
 
-  
 
-  
 
- PEAP
 
- PEAP-Protected Extensible Authentication Protocol. A  protocol proposed by Microsoft, Cisco and RSA Security for 802.1X  authentication on wireless LANs (WLANs). (See EAP, LEAP).
 
-  
 
-  
 
-  
 
- PEAPv0/EAP-MSCHAPv2
 
- Protected Extensible Authentication Protocol, a protocol  developed jointly by Microsoft, RSA Security and Cisco for transmitting  authentication data, including passwords, over 802.11 wireless networks.  PEAP authenticates wireless LAN clients using only server-side digital  certificates by creating an encrypted SSL/TLS tunnel between the client  and the authentication
 
-  
 
-  
 
- PEAPv1/EAP-GTC
 
- Protected Extensible Authentication Protocol, a protocol  developed jointly by Microsoft, RSA Security and Cisco for transmitting  authentication data, including passwords, over 802.11 wireless networks.  PEAP authenticates wireless LAN clients using only server-side digital  certificates by creating an encrypted SSL/TLS tunnel between the client  and the authentication
 
-  
 
-  
 
-  
 
- Peer-to-peer network
 
- A wireless or wired computer network that has no server or  central hub or router. All the networked PCs are equally able to act as a  network server or client, and each client computer can talk to all the  other wireless computers without having to go through an access point or  hub. However, since there is no central base station to monitor traffic  or provide Internet access, the various signals can collide with each  other, reducing overall performance. (See Ad hoc mode, Device-to-device  network).
 
-  
 
-  
 
- Performance
 
- A concept which refers to how effectively (or quickly) data moves across  a network, a device's range, and or a network's reliability. See also  throughput, range, data rate.  
 
-  
 
- PHY
 
- The physical, or lowest, layer of the OSI Network Model. In  a wireless network, the PHY defines parameters such as data rates,  modulation method, signaling parameters, transmitter/receiver  synchronization, etc. Within an actual radio implementation, the PHY  corresponds to the radio front end and baseband signal processing  sections. (See ISO Network Model).
 
-  
 
- Plug-and-play
 
- Features that provide for automatic configuration of  add-ons and peripheral devices such as wireless PC Cards, printers,  scanners and multimedia devices. (See PC Card).
 
-  
 
-  
 
- Print server
 
- A network device, often a computer, that connects to at  least one printer, allowing it to be shared among computers on a  network.
 
-  
 
-  
 
- Proxy server
 
- A technique used in larger companies and organizations to  improve network operations and security. The proxy server receives  requests intended for another server to prevent direct communication  between two or more networks. The proxy server forwards allowable data  requests to remote servers and/or responds to data requests directly  from stored remote server data.
 
-  
 
-  
 
-  
 
- PSK
 
- A mechanism in Wi-Fi Protected Access (WPA)-Personal that  allows the use of manually entered keys or passwords to initiate WPA  security. The PSK is entered on the access point or home wireless  gateway and each PC that is on the Wi-Fi network. After entering the  password, Wi-Fi Protected Access automatically takes over. It keeps out  eavesdroppers and other unauthorized users by requiring all devices to  have the matching password. The password also initiates the encryption  process which, in WPA is Temporal Key Integrity Protocol (TKIP) and in  WPA2 is Advanced Encryption Standard (WPA2). (See TKIP, WPA-Personal,  WPA2-Personal).
 
-  
 
-  
 
-  
 
- QoS
 
- Quality of Service. Required to support wireless multimedia  applications and advanced traffic management. QoS enables Wi-Fi access  points to prioritize traffic and optimize the way shared network  resources are allocated among different applications. Without QoS, all  applications running on different devices have equal opportunity to  transmit data frames. That works well for data traffic from applications  such as web browsers, file transfers, or e-mail but it is inadequate  for multimedia applications. Voice over Internet Protocol (VoIP), video  streaming, and interactive gaming are highly sensitive to latency  increases and throughput reductions and require QoS. QoS extensions for  802.11 networks will be addressed in the upcoming IEEE 802.11e standard.  (See 802.11e, WMM).
 
-  
 
-  
 
- RADIUS
 
- Remote Access Dial-Up User Service. A standard technology  used by many major corporations to protect access to wireless networks.  RADIUS is a user name and password scheme that enables only approved  users to access the network; it does not affect or encrypt data. The  first time a user wants access to the network, secure files or net  locations, he or she must input his or her name and password and submit  it over the network to the RADIUS server. The server then verifies that  the individual has an account and, if so, ensures that the person uses  the correct password before she or he can get on the network. RADIUS can  be set up to provide different access levels or classes of access. For  example, one level can provide blanket access to the Internet; another  can provide access to the Internet as well as to e-mail communications;  yet another account class can provide access to the Net, email and the  secure business file server. Like other sophisticated security  technologies, RADIUS comes in a variety of types and levels. (See EAP,  WPA, WPA2).
 
-  
 
-  
 
-  
 
- Range
 
- The effective distance of for a wireless transmission.  Wi-Fi CERTIFIED n  devices typically have a range of up to 200 meters and can cover an  entire home with a strong Wi-Fi signal.  Another benefit of 802.11n  technology is much better coverage.  Wi-Fi CERTIFIED n devices use  "reflections" of the signal (from walls, etc.) to strengthen it and  eliminate cold or weak spots in the signal.  
 
-  
 
-  
 
-  
 
- RC4
 
- An encryption cipher designed RSA Data Security. It allows  key lengths up to 1024 bits and is a component in many encryption  schemes, including SSL, WEP, and TKIP. (See SSL, WEP, TKIP).
 
-  
 
-  
 
-  
 
- Repeater
 
- A wireless repeater is a device that extends the coverage  of an existing access point by relaying its signal. A wireless repeater  does not do intelligent routing performed by wireless bridges and  routers.
 
-  
 
-  
 
-  
 
- Residential gateway
 
- A wireless device that allows multiple devices accessing a  home network, including PCs and peripherals to access the Internet and  communicate with one another. (See gateway).
 
-  
 
-  
 
-  
 
-  
 
- RFID
 
- Radio Frequency Identification. An electronic  identification technology that uses radio frequency signals to read  identifying data contained in tags on equipment and merchandise. An  alternative to bar codes.
 
-  
 
-  
 
- Roaming
 
- The ability to move seamlessly from one area of Wi-Fi or  cellular phone coverage to another with no loss in connectivity. Roaming  also refers to the ability to wirelessly connect to the Internet from  different hotspots without confronting the array of schemes used by  different providers to authorize use and track billing. Roaming  agreements among providers allow mobile professionals to a single  authentication and authorization scheme to have all charges resolved to a  single bill. (See hotspot). 
 
-  
 
-  
 
- Rogue
 
- An unauthorized access point installed on a company's WLAN,  typically by a user. Rogue access points present security risks. They  rarely conform to the organization's security policies and, typically,  no security at all is enabled on them. Rogues present open, insecure  interfaces to the company's network. (See intrusion detection).
 
-  
 
-  
 
- Router
 
- A wireless router is device that accepts connections from  wireless devices to a network and includes a network firewall for  security, and provides local network addresses. (See hub).
 
- Security supplicant
 
- Client software that coordinates authentication and session key creation.
 
-  
 
- Server
 
- A computer that provides resources or services to other  computers and devices on a network. Types of servers can include print  servers, Internet servers, mail servers, and DHCP servers. A server can  also be combined with a hub or router. (See DHCP, hub, router).
 
-  
 
-  
 
-  
 
-  
 
- Simultaneous dual-band
 
-  
 
- Wi-Fi Access Points with concurrent operation can transmit on both 5 GHz  and 2.4 GHz frequency bands at the same time.  Sometimes referred to as  concurrent operation or concurrent dual-band.  
 
-  
 
-  
 
- Single-band
 
- Describes a wireless product that communicates using only a single radio  frequency band, such as 2.4GHz or 5GHz in Wi-Fi products.  
 
-  
 
-  
 
-  
 
-  
 
- Single-stream
 
- Term to describe a wireless device that communicates with a network by  using a single communications input and output transmission.  
 
-  
 
-  
 
-  
 
- Site survey
 
- A comprehensive facility study performed by network  managers to insure that planned service levels will be met when a new  wireless LAN, or additional WLAN segments to an existing network, are  deployed. Site survey's are usually performed by a radio frequency  engineer and used by systems integrators to identify the optimum  placements of access points to insure that planned levels of service are  met. Site surveys are sometimes conducted following the deployment to  insure that the WLAN is achieving the necessary level of coverage. Site  surveys can also be used to detect rogue access points. (See intrusion  detection, rogue).
 
-  
 
- Sniffer
 
- A software program that monitors network traffic. Sniffers  can capture data being transmitted on a network and are sometimes used  illegitimately to hack a network.
 
-  
 
-  
 
- SOHO
 
- Small office/home office.  The term describes an office or business with ten or fewer computers and/or employees. 
 
-  
 
-  
 
-  
 
- Spatial stream
 
- A data transmission in a wireless network.  A spatial  stream might be compared to a lane on a highway. MIMO technology makes  use of multiple spatial streams to increase a device's transmission  capacity.   
 
-  
 
-  
 
-  
 
- SSID
 
- A unique 32-character network name, or identifier, that  differentiates one wireless LAN from another. All access points and  clients attempting to connect to a specific WLAN must use the same SSID.  The SSID can be any alphanumeric entry up to a maximum of 32  characters. (See ESSID, network name).
 
-  
 
-  
 
- SSL
 
- SSL-Secured Sockets Layer. A protocol used to secure  Internet communications. SSL is commonly used to encrypt transactions on  online retail and banking. SSL encrypts the exchange of information  between a user's browser and Web server so only the intended parties can  read it. When an SSL session begins, the server sends its public key to  the browser. The browser then sends a randomly generated secret key  back to the server in order to have a secret key exchange for that  session. (See RC4).
 
-  
 
-  
 
- Subnetwork, or subnet
 
- An IP address range that is part of a larger address range.  Subnets are used to subdivide a network address of a larger network  into smaller networks. Subnets connect to other networks through a  router. Each individual wireless LAN will typically use the same subnet  for all of its clients. (See IP address, router).
 
-  
 
-  
 
- Switch
 
- A type of hub that controls device usage to prevent data  collisions and insures optimal network performance. A switch acts as a  network traffic cop: Rather than transmitting all the packets it  receives to all ports, as a hub does, a switch transmits packets to only  the receiving port. (See hub).
 
-  
 
-  
 
-  
 
- Switchable operation
 
- The capability of a dual-band device to be manually changed between two  frequency bands, either 2.4MHz or 5MHz for operation.  Contrasts with  concurrent operation, in which a device supports both 2.4 and 5 at the  same time.  See also dual-band, single-band.   
 
-  
 
-  
 
- TCP
 
- Transmission Control Protocol. The Transport level protocol  used with the Internet Protocol (IP) to route data across the Internet.  (See IP, TCP/IP).
 
-  
 
-  
 
-  
 
-  
 
-  
 
- TCP/IP
 
- The underlying technology of Internet communications. While  IP handles the actual delivery of data, TCP tracks the data packets to  efficiently route a message through the Internet. Every computer in a  TCP/IP network has its own IP address that is either dynamically  assigned at startup (See DHCP) or permanently assigned as a static  address. All TCP/IP messages contain the address of the destination  network, as well as the address of the destination station. This enables  TCP/IP messages to be transmitted to multiple networks (subnets) within  an organization or worldwide. For example, when a user downloads a web  page, TCP divides the page file on the web server into packets, numbers  the packets, and forwards them individually to the user's IP address.  The packets may be routed along different paths before reaching the  user's address. At the destination, TCP reassembles the individual  packets, waiting until they have all arrived to present them as a single  file. (See IP, IP address, packet, TCP).
 
-  
 
-  
 
-  
 
- Throughput
 
- Usually measured in bps, Kbps, Mbps or Gbps, throughput is  the amount of data that can be sent from one location to another in a  specific amount of time. (See bps, Mbps).
 
-  
 
-  
 
- TLS
 
- Transport Layer Security. A newer version of the SSL  protocol, It supports more cryptographic algorithms than SSL. TLS is  designed to authenticate and encrypt data communications, preventing  eavesdropping, message forgery and interference. (See EAP, SSL).
 
-  
 
-  
 
- Voice over Wi-Fi
 
- VoIP services delivered over Wi-Fi networks. Sometimes referred to as wireless voice over IP. (See IP telephony, VoIP). 
 
-  
 
-  
 
-  
 
- VoIP
 
- Voice over Internet Protocol. A technology for transmitting  ordinary telephone calls over the Internet using packet-based networks  instead of standard public switched telephone networks or Plain Old  Telephone Service (POTS). (See IP telephony, Voice over Wi-Fi).
 
-  
 
-  
 
-  
 
-  
 
- VPN
 
- Virtual Private Network. A network layer encryption scheme  that allows remote clients to securely connect to their corporate  networks using the Internet. Most major corporations today use VPN to  protect their remote-access workers and their connections. It works by  creating a secure virtual "tunnel" from the end-user's computer through  the end-user's access point or gateway, through the Internet, all the  way to the corporation's servers and systems. It also works for wireless  networks and can effectively protect transmissions from Wi-Fi equipped  computers to corporate servers and systems.
 
- WAN
 
- Wide Area Network (WLAN). A data communications network  that spans large local, regional, national or international areas and is  usually provided by a public carrier (such as a telephone company or  service provider).The term is used to distinguish between phone-based  data networks and Wi-Fi networks. Phone networks are considered WANs and  Wi-Fi networks are considered Wireless Local Area Networks. (See LAN,  WMAN, WPAN).
 
-  
 
-  
 
- WEP
 
- The original security standard used in Wi-Fi networks to  encrypt network traffic.  Users should not use WEP devices for any  sensitive data transmission, as there are well-known vulnerabilities in  this very old form of security.  If any devices on a network only  support WEP, the entire network is vulnerable. (See WPA, WPA2). 
 
-  
 
-  
 
-  
 
- Wi-Fi CERTIFIED 802.11n draft 2.0
 
-  
 
- Certification mark owned and assigned by the Wi-Fi Alliance  prior to the finalization of the 802.11n standards.  Products which  were designated Wi-Fi CERTIFIED 802.11n draft 2.0 are now considered  Wi-Fi CERTIFIED n. 
 
-  
 
-  
 
-  
 
- Wi-Fi CERTIFIED n
 
-  
 
- Certification mark owned and assigned by the Wi-Fi Alliance that  indicates a product has successfully passed the testing performed by the  Wi-Fi Alliance for interoperability, security and feature performance  based upon the IEEE 802.11n standard.  Product certification may be  identified by the Wi-Fi CERTIFIED n logo on the product or packaging.     
 
-  
 
-  
 
-  
 
-  
 
- Wi-Fi CERTIFIED™
 
-  
 
- A certification mark indicating that Wi-Fi products have  passed interoperability testing requirements developed and governed by  the Wi-Fi Alliance. Only products that have successfully completed the  Wi-Fi Alliance's testing programs can bear the Wi-Fi CERTIFIEDTM mark.  (See Wi-Fi Interoperability Certificate).  
 
-  
 
-  
 
- Wi-Fi Direct™
 
-  
 
- Wi-Fi Direct is a certification mark for products that  include a revolutionary technology advancement that can create  connections between Wi-Fi devices anywhere, at any time, with or without  a connection to a traditional Wi-Fi network. Wi-Fi Direct-certified  devices connect directly, so you can do things like share, synch or  transfer content, play games and chat. You don't need an access point or  internet connection to use it - the connection lives inside your Wi-Fi  Direct devices, and goes with you wherever you go.  
 
-  
 
-  
 
- Wi-Fi Interoperability Certificate
 
-  
 
- A statement that a product has passed the Wi-Fi Alliance's  interoperability testing and has been certified under the Wi-Fi  CERTIFIEDTM certification program for interoperability with other products that have also been certified under the Wi-Fi CERTIFIEDTM certification program. (See Wi-Fi CERTIFIED).  
 
-  
 
-  
 
- Wi-Fi n or Wireless n
 
-  
 
- Descriptions a manufacturer may give a product to indicate that the  product contains some features of 802.11n.  This does not indicate that  the product is  Wi-Fi CERTIFIED n, which is the only indication that a  product has passed Wi-Fi Alliance testing to the 802.11n standard.  
 
-  
 
-  
 
-  
 
-  
 
- Wi-Fi Protected Setup™
 
-  
 
- Wi-Fi Protected Setup™ is the Wi-Fi Alliance's  certification mark indicating that products have successfully completed  testing to ensure that they comply with standards developed by the Wi-Fi  Alliance for easy set up of security-enabled Wi-Fi networks in home and  small office environments. Products certified under the Wi-Fi Protected  Setup™ program support methods (pushing a button or entering  a PIN into a wizard-type application) that are familiar to most  consumers to configure a network and enable security.  
 
-  
 
-  
 
-  
 
-  
 
- Wi-Fi ZONE™
 
-  
 
- A certification program of the Wi-Fi Alliance® that allows  users to easily identify public hotspot locations that have Wi-Fi  connectivity available. The program allows customers from anywhere in  the world to look for a single Wi-Fi ZONE brand. The Wi-Fi ZONE logo  assures users that they will be able to get a fast, reliable Internet  connection in a coffee shop, hotel, airport, convention center or other  public venue. (See hotspot). 
 
-  
 
-  
 
-  
 
- Wi-Fi®
 
- A certification mark developed by the Wi-Fi Alliance to  indicate that wireless local area network (WLAN) products are based on  the Institute of Electrical and Electronics Engineers' (IEEE) 802.11  standards.  
 
-  
 
-  
 
-  
 
- WiMAX
 
- Worldwide Interoperability for Microwave Access. Refers to  the 802.16 standard being developed by the IEEE to provide a wireless  coverage of up to 31 miles. It operates in the 2 to 11 GHz bands and  enables connectivity without a direct line-of-sight to a base station  although line-of-site is probably required to achieve connectivity at  the distance of 31 miles.. It provides shared data rates up to 70 Mbps,  which, according to WiMAX proponents, is enough bandwidth to  simultaneously support more than 60 businesses and hundreds of homes.  (See WMAN).
 
-  
 
-  
 
-  
 
- Wireless network
 
- Devices connected to a network using a centralized wireless access point. (See WLAN).
 
-  
 
-  
 
- WLAN
 
- Wireless Local Area Network. A type of local-area network  in which data is sent and received via high-frequency radio waves rather  than cables or wires. (See LAN, wireless network).
 
-  
 
-  
 
-  
 
- WMAN
 
- Wireless Metropolitan Area Network-A wireless data network  that is comparable to a cell phone network in that users throughout a  metropolitan area can freely access the Internet. WiMAX technology  provides the basis of WMAN networks. (See WiMAX).
 
-  
 
-  
 
-  
 
- WMM® Power Save
 
-  
 
-  
 
- WMM Power Save is a set of features for Wi-Fi networks that  increase the efficiency and flexibility of data transmission in order  to conserve power. WMM Power Save has been optimized for mobile devices  running latency-sensitive applications such as voice, audio, or video,  but can benefit any Wi-Fi device. WMM Power Save uses mechanisms  included in the IEEE 802.11e standard and is an enhancement of IEEE  802.11 legacy power save. With WMM Power Save, the same amount of data  can be transmitted in a shorter time while allowing the Wi-Fi device to  remain longer in a low-power "dozing" state. 
 
-  
 
-  
 
- WMM®
 
-  
 
- The WMM® mark indicates that a product has successfully  completed testing under the Wi-Fi Alliance's Wi-Fi Multimedia™  certification program for multimedia features that improve the user  experience for audio, video and voice applications. In order to qualify  for WMM certification, a product must implement multimedia features  based on a subset of the IEEE 802.11e QoS draft standard, which add  prioritized capabilities to wireless networks and optimize their  performance when multiple concurring applications - each with different  latency and throughput requirements - compete for network resources. By  using products certified under the WMM program, end-user satisfaction is  maintained in a wider variety of environments and traffic conditions.  Products that qualify for WMM certification make it possible for home  network users and enterprise network managers to decide which data  streams are most important and assign them a higher traffic priority.  (See 802.11e, QoS). 
 
-  
 
-  
 
-  
 
- WPA2™
 
-  
 
- The Wi-Fi Protected Access 2 and WPA2 marks indicate that a  product has successfully completed testing under the Wi-Fi Alliance's  Wi-Fi Protected Access 2 certification program for wireless network  security features.  The features tested and certified through the WPA2  program provide stronger data protection and network access control that  the features tested and certified through the WPA program. They provide  enterprise and consumer Wi-Fi users with a high level of assurance that  only authorized users can access their wireless networks. Based on the  ratified IEEE 802.11i standard, the advanced security protocol provides  government grade security by implementing the National Institute of  Standards and Technology (NIST) FIPS 140-2 compliant AES encryption  algorithm and 802.1X-based authentication. There are two versions of  certification available through the WPA2 program: WPA2-Personal, and  WPA2-Enterprise. WPA2-Personal certifies a standard that protects  unauthorized network access by utilizing a set-up password.  WPA2-Enterprise certifies a standard that verifies network users through  a server. The standard certified through WPA2 is backward compatible  with the standard certified through WPA. Like the standard certified  through WPA, the standard certified through WPA2 uses the 802.1X/EAP  framework as part of the infrastructure that ensures centralized mutual  authentication and dynamic key management and offers a pre-shared key  for use in home and small office environments. This advanced security  protocol is designed to secure all versions of 802.11 devices, including  802.11b, 802.11a, and 802.11g, multi-band and multi-mode. (See  WPA2-Enterprise, WPA2-Personal).  
 
-  
 
-  
 
-  
 
- WPA2™- Enterprise
 
-  
 
- The Wi-Fi Protected Access 2 - Enterprise mark indicates  that a product has successfully completed testing under the Wi-Fi  Alliance's Wi-Fi Protected Access 2 certification program and meets the  criteria established to ensure stronger data protection for multiple  users and large managed networks. These criteria prevent unauthorized  network access by verifying network users through an authentication  server. (See WPA2).  
 
-  
 
-  
 
-  
 
-  
 
- WPA2™-Personal
 
-  
 
- The Wi-Fi Protected Access 2 - Personal mark indicates that  a product has successfully completed testing under the Wi-Fi Alliance's  Wi-Fi Protected Access 2 certification program and meets the criteria  established to ensure stronger data protection and prevent unauthorized  network access for small networks. (See WPA2, PSK).  
 
 
 
 
 
          
      
 
  
 
 
 
 
 
 
 
 
 
 
 
No comments:
Post a Comment