Browse Definitions :

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

802 - YAG

  • 802.11 - 802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • 802.11a - 802.11a is one of several specifications in the 802.
  • 802.11ac (Gigabit Wi-Fi) - 802.11ac, also known as Gigabit Wi-Fi, is a proposed specification in the 802.
  • 802.11ad - 802.11ad, also called WiGig 1.
  • 802.11b - The 802.11b standard for wireless local area networks (WLANs) - often called Wi-Fi - is part of the 802.
  • 802.11d - 802.11d is a communications specification for use in countries where systems using other standards in the 802.
  • 802.11e - 802.11e is a proposed enhancement to the 802.
  • 802.11g - The 802.11g specification is a standard for wireless local area networks WLANs) that offers wireless transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.
  • 802.11h - The 802.11h specification is an addition to the 802.
  • 802.11j - The 802.11j specification is a proposed addition to the 802.
  • 802.11k - 802.11k is a proposed standard for a series of measurement requests and reports involving channel selection, roaming, transmit power control (TPC), and subscriber statistics in 802.
  • 802.11m - 802.11m is an initiative to perform editorial maintenance, corrections, improvements, clarifications, and interpretations relevant to documentation for 802.
  • 802.11n - 802.11n is an addition to the 802.
  • 802.11s - 802.11s is a proposed amendment to the 802.
  • 802.11u - 802.11u is an amendment to the IEEE 802.
  • 802.11x - 802.11x refers to a group of evolving wireless local area network (WLAN) standards that are under development as elements of the IEEE 802.
  • Access Network Query Protocol (ANQP) - The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot.
  • access point base station - Access point base station is the original term for what is now known as a femtocell.
  • ad-hoc network - An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
  • antenna - An antenna is a specialized transducer that converts radio-frequency (RF) fields into alternating current (AC) or vice-versa.
  • beamforming - Beamforming is a type of RF (radio frequency) management in which an access point uses multiple antennas to send out the same signal.
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • dead zone (Wi-Fi dead zone) - A dead zone (Wi-Fi dead zone) is an area within a wireless LAN location where Wi-Fi does not function, typically due to radio interference or range issues.
  • distributed antenna system (DAS) - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • enterprise-mobile integration (EMI) - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet.
  • femtocell - A femtocell is a wireless access point that improves cellular reception inside a home or office building.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • fixed wireless - Fixed wireless refers to the operation of wireless devices or systems in fixed locations such as homes and offices.
  • frequency jammer - Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • HiperLAN - MEO satellite"HiperLAN is a set of wireless local area network (WLAN) communication standards primarily used in European countries.
  • hot spot - For users of portable computers equipped for wireless, a hot spot (or hotspot) is a wireless LAN (local area network) node that provides Internet connection and virtual private network (VPN) access from a given location.
  • hot zone - A hot zone is a wireless access area created by multiple hot spots located in close proximity to each other.
  • hybrid WAN - A hybrid WAN is a wide area network that sends traffic over two or more connection types.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • IoT security (internet of things security) - IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).
  • IR wireless (infrared wireless) - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • IrDA (Infrared Data Association) - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • line of sight (LOS) - The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • microwave - The term microwave refers to electromagnetic energy having a frequency higher than 1 gigahertz (billions of cycles per second), corresponding to wavelength shorter than 30 centimeters.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • MISO (multiple input, single output) - MISO (multiple input, single output) is an antenna technology for wireless communications in which multiple antennas are used at the source (transmitter).
  • mobile hotspot - A mobile hotspot is wireless Internet connectivity that is enabled by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • Near Field Communication (NFC) - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • OLPC (One Laptop Per Child) - The One Laptop Per Child project (OLPC) is an initiative aimed at providing inexpensive laptop computers to children in the developing world as a means of bridging the digital divide.
  • optical wireless - Optical wireless refers to the conbined use of two technologies - conventional radio-frequency (RF) wireless and optical fiber - for telecommunication.
  • patch antenna - A patch antenna is a wafer-like directional antenna suitable for covering single-floor small offices, small stores and other indoor locations where access points cannot be placed centrally.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.
  • push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.
  • radio frequency (RF, rf) - Radio frequency is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.
  • single stream 802.11n - Single-stream 802.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • superheterodyne - Superheterodyne refers to a method of designing and building wireless communications or broadcast equipment, particularly radio receivers.
  • SWAN (Structured Wireless-Aware Network) - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • VoWLAN (Voice over WLAN) - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VPN (virtual private network) - A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet.
  • W-CDMA (Wideband Code-Division Multiple Access) - Also see CDMA, CDMA One, and CDMA2000.
  • WAP (Wireless Application Protocol) - WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access.
  • WAPI (WLAN Authentication and Privacy Infrastructure) - WAPI (WLAN Authentication and Privacy Infrastructure) is the wireless local area network (WLAN) standard officially supported by the Chinese state government.
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • WAX (Wireless Abstract XML) - Wireless Abstract XML (WAX) is an abstract markup language and associated tools that facilitate wireless application development.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • White Space Wi-Fi (White-Fi) - White space Wi-Fi, also known as White-Fi, specified in IEEE 802.
  • Wi-Fi (802.11x standard) - Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.
  • Wi-Fi Alliance - The Wi-Fi Alliance is a wireless industry organization that exists to promote wireless technologies and interoperability.
  • Wi-Fi Direct - Wi-Fi Direct is a peer-to-peer specification that allows devices certified for Wi-Fi Direct to exchange data without an Internet connection or a wireless router.
  • Wi-Fi finder (Wi-Fi signal finder, Wi-Fi seeker or Wi-Fi locator) - A Wi-Fi finder, also called a Wi-Fi signal finder, Wi-Fi seeker or Wi-Fi locator, is a miniature electronic device that can determine whether or not a portable computer user is within range of an access point for a wireless local area network (WLAN).
  • Wi-Fi HaLow (802.11ah) - HaLow is based on the WiFi Alliance 802.
  • Wi-Fi Multimedia (WMM) - Wi-Fi Multimedia (WMM), previously known as Wireless Multimedia Extensions (WME), is a subset of the 802.
  • Wi-Fi Protected Access (WPA) - Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.
  • Wibree (Baby Bluetooth) - Wibree, also called Baby Bluetooth, is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment.
  • WiMAX (Worldwide Interoperability for Microwave Access) - WiMAX is a wireless industry coalition whose members organized to advance IEEE 802.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireless - Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.
  • wireless application service provider (WASP) - WASP is also an acronym for the Web Standards Project.
  • wireless broadband (WiBB) - Wireless broadband is high-speed Internet and data service delivered through a wireless local area network (WLAN) or wide area network (WWAN).
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless fidelity - Wireless fidelity is frequently thought to be the full version of Wi-Fi, which refers to any of the IEEE (Institute of Electrical and Electronics Engineers) 802.
  • wireless ISP (wireless Internet service provider or WISP) - A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi.
  • wireless LAN (WLAN or Wireless Local Area Network) - A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access points installed at each network user's locale.
  • wireless service provider (WSP) - A wireless service provider (WSP) is a company that offers transmission services to users of wireless devices (handheld computers and telephones) through radio frequency (RF) signals rather than through end-to-end wire communication.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.
  • Yagi antenna (Yagi-Uda array) - A Yagi antenna, also known as a Yagi-Uda array or simply a Yagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close