gfi.com

Woonplaats:1
Upvotes received5
Downvotes received3
Karma:1 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (73)

1

2 Thumbs up   2 Thumbs down

ofdm


Orthogonal frequency-division multiplexing is used by 802.11a, g, n, and ac standards using multiple carrier frequencies. It is especially useful at obtaining higher throughput and overcoming interference in discrete frequencies.
Source: gfi.com (offline)

2

1 Thumbs up   0 Thumbs down

essid


The Extended Service Set Identifier is the “name” of the wireless network, and is used by all APs that provide access to the same infrastructure in an ESS. It can be advertised by APs in their beacons, or suppressed so that clients must ‘know’ the ESSID before associating with an AP. See ESS.
Source: gfi.com (offline)

3

1 Thumbs up   0 Thumbs down

association


The process a client goes through to begin exchanging data with an Access Point. A client will listen for beacons from an AP for the SSID that it wants to use, and then will exchange hello packets with the AP with the strongest signal and/or supported data rates. Association can be open, or can require a pre-shared key. Once associated, the client [..]
Source: gfi.com (offline)

4

1 Thumbs up   0 Thumbs down

802.11d


The IEEE standard for wireless networking that addresses the Media Access Control (MAC) layer to comply with rules in each country.
Source: gfi.com (offline)

5

0 Thumbs up   0 Thumbs down

about the author


Christina Goggi
Source: gfi.com (offline)

6

0 Thumbs up   0 Thumbs down

wpa2


Wi-Fi Protected Access v2 is currently the strongest encryption protocol available to wireless networks, and is the current 802.11i standard. It uses AES encryption for data and is considered cryptographically strong. WPA2 Personal uses a PSK to establish initial authentication, but WPA2 Enterprise can use various EAP methods to ensure a strong aut [..]
Source: gfi.com (offline)

7

0 Thumbs up   0 Thumbs down

wps


Wi-Fi Protected Setup makes it easier for users to add Wi-Fi clients to WPA and WPA2 protected wireless networks. It was intended to help non-technical home users deploy WPA security, but is vulnerable to a brute-force attack and should not be used. WPS can use a PSK, encryption settings transferred using a USB key, a PIN, NFC, or with a simple pus [..]
Source: gfi.com (offline)

8

0 Thumbs up   0 Thumbs down

wpa


Wi-Fi Protected Access is a security protocol for wireless networks that was designed to replace WEP. It uses TKIP to encrypt data and is much more resistant to attacks that WEP is, but still has cryptographic vulnerabilities that make it undesirable for use. WPA was an IEEE 802.11i draft. WPA Personal typically uses an initial PSK to establish aut [..]
Source: gfi.com (offline)

9

0 Thumbs up   0 Thumbs down

workgroup bridge


A pair of APs that provide connectivity between two different wireless segments are a workgroup bridge. Entire offices can be connected wirelessly using workgroup bridges, or small office on another floor of a building, or across the street from the main office, may be connected using workgroup bridges rather than by running cables. These are extre [..]
Source: gfi.com (offline)

10

0 Thumbs up   0 Thumbs down

wimax


The WAN or community deployment of wireless networking, WiMax was initially started by Intel and is now designated by the IEEE as 802.16. WiMax offers ranges measured in miles and bandwidth of up to 1 Gbps. WiMax deployments are limited at present, but can include last mile services, regional mesh networks, and municipal access for entire cities.
Source: gfi.com (offline)


To view all 73 definitions, please sign in.