Glossary (Write Only The Key Terms of Your Project/thesis With Definition)
Glossary (Write Only The Key Terms of Your Project/thesis With Definition)
2. Frequency: The number of cycles per unit of time is called the frequency.
9. 125 High Speed Mode: 54g performance enhancement that delivers the industry's
fastest wireless throughput in real-world environments. It is designed for home
networks that require high-speed throughput for multimedia applications, such as
sharing digital pictures.
10. 802.11: The standard that defines the technology used for wireless LAN products.
The original standard was ratified by the IEEE in 1997, and specified products with a
maximum data rate of 2 Mbps. Since then, the standard has expanded to define faster
wireless systems.
11. 802.11a: The IEEE standard for wireless LAN products that specifies data rates
up to 54 Mbps in the 5 GHz band. 802.11a products are not compatible with those
74
based on 802.11b or 802.11g and their range is approximately half that of 802.11b/g
products.
12. 802.11b: The IEEE standard for wireless LAN products that specifies data rates
up to 11 Mbps in the 2.4 GHz band. 802.11b was the first widely-accepted Wi-Fi
technology, but has now been replaced by the faster 802.11g standard.
13. 802.11e: An IEEE standard that adds Quality of Service (QoS) features and
multimedia support to the existing 802.11b, 802.11g, and 802.11a wireless networks.
14. 802.11g: The IEEE standard for wireless LAN products that specifies data rates
up to 54 Mbps in the 2.4 GHz band. 802.11g is now the mainstream technology for
wireless networks in the home, office and public places.
15. 802.11i: The IEEE standard specifying security mechanisms for 802.11 networks.
802.11i makes use of the Advanced Encryption Standard (AES), and includes
improvements in key management, user authentication through 802.1X and data
integrity of headers.
16. 802.11n: The forthcoming IEEE standard for wireless LAN products that may
specify data rates up to 500 Mbps, and throughput between 100 and 200 Mbps. The
802.11n standard utilizes MIMO technology along with other techniques to improve
efficiency.
17. Advanced Encryption Standard (AES): The preferred standard for the
encryption of commercial and government data using a symmetric block data
encryption technique. It is specified in the 802.11i security standard and used in the
implementation of WPA2.
18. Access Point (AP): Wi-Fi enabled computers typically connect to wire networks
by means of an access point, a wireless device whose primary function is to
consolidate multiple wireless connections, serving as an intermediary between
wireless devices and high-speed wired networks. Access points are connected to a
wired network with an Ethernet cable.
75
20. Authentication: The process to verify the identity of a wireless client or end user
and allow it access to the network.
23. Broadband Modem: Broadband modems act as gateways for high speed network
access in the home and small business, facilitating a broadband connection through
cable or DSL connection. Some broadband modems are beginning to incorporate Wi-
Fi capabilities, replacing the need for an access point or router.
24. Client: Any computer connected to a network that requests files and services from
the server or other devices on the network. The term also refers to end users in a
network.
25. Data Rate: Pre-determined rates set in the 802.11 standard that provide for
systematic speed decrease to maintain a connection as the client moves farther away
from the access point. The OFDM data rates include: 54, 48, 36, 24, 18, 12, 11, 9, 6,
5.5, 2 and 1. This is not the actual speed at which data is sent (called throughput),
because of built-in redundancy, error correction, and protocol overhead.
28. Hotspot: Each area in which wi-fi is available is called a “hotspot”. Hotspots are
often found at coffee shops, hotels, airport lounges, train stations, convention centers,
and other public meeting areas. Corporations and campuses often offer it to visitors
and guests.
29. LAN: Local Area Networks. A system that connects PCs and other devices within
the same location in order to share resources such as Internet connections, printers,
76
files and storage drives. When Wi-Fi is used to connect the devices, the system is
known as a wireless LAN or WLAN.
30. MIMO: Multiple Input Multiple Output. A technique that uses multiple receivers
and multiple transmitters on both ends of a wireless connection to improve
throughput and range. MIMO is expected to be the basis of the forthcoming 802.11n
wireless LAN standard.
32. PC Card: Wireless functionality can be added to notebook computers through the
use of a removable network card which is inserted into a type 2 or 3 card bus slot.
33. PCI Card: Wireless card that is installed in the PCI bus slot inside desktop PCs.
35. Print Server: A wireless print server allows multiple computers and other Wi-Fi
enabled devices to share a printer without the use of cables. A print server is
typically connected via parallel or USB port to the printer, and allows files to be
transferred wirelessly for printing.
36. Quality of Service (QoS): Enables Wi-Fi access points to prioritize traffic and
optimize the way shared network resources are allocated among different
applications. Without QoS, all applications running on different devices have equal
opportunity to transmit data frames. That works well for data traffic from
applications such as file transfers or e-mail, but it is inadequate for multimedia
applications. QoS is required for multimedia applications (such as VoIP, video
streaming, and interactive gaming), which are highly sensitive to latency increases
and throughput reductions.
77
37. Repeater: A device that extends the coverage of an existing access point by
relaying its signal.
38. Router: Wireless routers provide the same functionality as access points, but
include the added features of allowing multiple users to share a wide area connection
to a broadband modem-providing multiple IP addresses, firewall capabilities, and
hub and switching functionality.
39. SecureEasySetup: A feature that allows people to setup their Wi-Fi network and
activate WPA security with the push of a button. SecureEasySetup is currently
offered in some models of Wi-Fi products from Linksys, HP and Buffalo.
40. SpeedBooster: Linksys' brand of Wi-Fi products that use Broadcom's 125 High
Speed Mode, which increases the throughput of an 802.11g network.
41. Throughput: The actual speed at which data is transmitted in a wireless network.
Because of communication and protocol overhead, throughout is generally less than
the data rate.
42. USB: Universal Serial Bus (USB) interface cards connect notebook and desktop
computers to wireless networks via the client's USB port, rather than utilizing either
embedded mini-PCI or removable PC cards.
43. WEP: The original security standard used in wireless networks to encrypt the
wireless data. Because WEP had many flaws that were easily cracked, it has been
replaced by stronger security technologies, such as WPA and WPA2.
44. Wi-Fi: A term developed by the Wi-Fi Alliance to describe WLAN products that
are based on the IEEE 802.11 standards.
78
47. Wi-Fi Multimedia (WMM): A group of features that improves the user
experience for audio, video and voice applications on wireless networks. Based on
the IEEE 802.11e draft standard, WMM adds prioritization capabilities to Wi-Fi
networks and optimizes their performance when multiple concurrent applications,
each with different latency and throughput requirements, compete for network
resources.
48. WiMax: The common name for the forthcoming IEEE 802.16 standard. Wi-Max
is will provide last-mile wireless broadband access to areas in which cable or DSL
are not feasible.
50. WPA: Wi-Fi Protected Access. A security standard that uses the latest encryption
and authentication technologies to provide strong data protection and network access
control for wireless networks. WPA was designed to secure all 802.11 devices, and
can be found on all 802.11b, 802.11a and 802.11g products that are Wi-Fi certified.
51. WPA2: Wi-Fi Protected Access 2, also known as 802.11i. The latest security
method that provides even greater data protection and network access control for
wireless networks. The primary difference is that WPA2 uses the government-grade
AES encryption algorithm and 802.1X-based authentication, which are required to
secure large corporate networks.
53. Mini PCI : is a standard for a computer bus for attaching peripheral devices to a
computer motherboard and is an adaptation of the Peripheral Component
Interconnect (PCI) bus.
54. USB Port: A universal Serial Bus Connector. A USB port connects devices such
as a mouse or printer to the computer quickly and easily.
55. Express Card: is a hardware standard replacing Card Bus PC cards, both
developed by the Personal Computer Memory Card International Association.
79
56. PCMCIA: Personal Computer Memory Card International Association - A
standardized technology used to develop a expansion for portable devices (ie
notebooks) In paging these credit card sized devices support wireless connectivity.
58. DSL: An asymmetric digital subscriber line transceiver, also known as a ADSL
modem or DSL modem, is a device used to connect a single computer to a DSL
phone line, in order to use an ADSL service.
60. Latency: This is the amount of time it takes a packet of data to move across a
network connection.
62. Wireless repeater: a device that you can place anywhere and it will wirelessly
repeat the strongest signal, onto another wireless network (with or without security).
This functionality is also known as Wireless Client Bridge, or Range Expander.
64. Infrastructure: The physical equipment (computers, cases, racks, cabling, etc.)
that comprises a computer system.
80
69. EAP authentication: Short for Extensible Authentication Protocol, an extension
to PPP. EAP is a general protocol for authentication that also supports multiple
authentication methods, such as token cards,
71. Spread spectrum: A wireless LAN transmission technique which spreads the
original signal over a broad range of frequencies.
72. U-NII: The Unlicensed National Information Infrastructure is part of the used by
devices and by many wireless ISPs. It operates over three ranges:
UNII 1:
76. DNS server: DNS Server that will return an IP Address when some body queries
it with the Domain Name.
78. Sub Carrier: A sub carrier is a separate analog or digital signal carried on a main
radio transmission, which carries extra information such as voice or data.
81
79. Channel: a path over which electrical signals can pass.
80. Center Frequency: Defined for BAND-PASS and BAND-REJECT filters as the
frequency at the GEOMETRIC MEAN of two CORNER FREQUENCIES (usually
-3 dB).
81. TKIP: It is an encryption protocol used in 802.11 networks and is part of the
IEEE 802.11i standard. TKIP was designed as a successor to WEP that could be
implemented without replacing legacy hardware. This was necessary due to the ease
with which WEP keys could be broken; leaving Wi-Fi networks vulnerable and
without a viable link-layer security solution. It was deemed that solving this problem
could not wait for new hardware to become available – hence the imperative to
provide legacy support.
82