Browse Definitions :
Definition

802.11ad

802.11ad, also called WiGig 1.0, is a proposed specification in the 802.11 family applicable to WLANs (wireless local area networks). 802.11ad represents an extension or update of the current 802.11a standard.

Networks using 802.11ad will operate in the 60-GHz (gigahertz) band using OFDM (orthogonal frequency-division multiplexing). The enhancements supported by 802.11ad will facilitate simultaneous streaming of HD (high definition) video to multiple clients in large office environments, as well as faster wireless synchronization and backup of large files.

New features that will exist in 802.11ad, over and above those proposed for 802.11ac (another enhancement to 802.11a), include:

  • Native 802.11a/b/g/n/ac support.
  • Seamless switching between 2.4-, 5-, and 60-GHz bands.
  • Channel width up to 2160 MHz (megahertz).
  • Throughput of up to 7 Gbps (gigabits per second).
  • Built-in support for wired connections.
  • Working range of 10 meters or more.
  • Improved functionality for mobile devices.
  • Advanced security features.
  • Support for power management.

For information about other specifications in the 802 family, see the IEEE 802 Wireless Standards Fast Reference.

This was last updated in August 2012

Continue Reading About 802.11ad

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close