Term
|
Definition
|
|
Term
|
Definition
Doubling the distance between a transmitter and receiver will decrease the received signal by 6 dB. Halving the distance between a transmitter and receiver will increase the received signal by 6 dB |
|
|
Term
|
Definition
A level of desired signal above what is required |
|
|
Term
|
Definition
Provides two functions in a communication system. When connected to the transmitter, it collects the AC signal that it receives from the trasmitter and directs, or radiates, the RF waves away from the antenna in a pattern specific to the antenna type. When connected to the receiver, it takes the RF waves that it receives through the air and directs the AC signal to the receiver |
|
|
Term
|
Definition
Provides approximate values when performing RF math calculations. 4 rules |
|
|
Term
|
Definition
It is a measurement of the ratio between two powers. Equals 10 * log10(P1/P2) |
|
|
Term
system operating margin (SOM) |
|
Definition
The calculation of the amount of RF signal that is received minus the amount of signal required by the receiver |
|
|
Term
|
Definition
The calculation of the amount of RF signal that is received minus the amount of signal required by the receiver |
|
|
Term
|
Definition
A point that radiates signal equally in all directions. e.g. sun |
|
|
Term
|
Definition
The amount of signal a wireless station must receive in order to distinguish between data and noise |
|
|
Term
equivalent isotropically radiated power (EIRP) |
|
Definition
The highest RF signal strength that is transmitted from a particular antenna |
|
|
Term
|
Definition
A unit of power equal to 1/1000 of a watt |
|
|
Term
|
Definition
The final component in a wireless medium. It takes the carrier signal that is received from the antenna and translates the modulated signals into 1s and 0s. it then takes this data and passes it to the computer to be processed |
|
|
Term
|
Definition
A basic unit of power. Equal to 1 ampere (amp) of current flowing at 1 volt |
|
|
Term
received signal strength indicator (RSSI) |
|
Definition
Used by a wireless device to determine if another device is transmitting, also known as a clear channel assessment. An optional 802.11 parameter with a value of 0 to 255. It is designed by the hardware manufacturer as a relative measurement of the RF power that is received. |
|
|
Term
intentional radiator (IR) |
|
Definition
A device that intentionally generates and emits radio frequency energy by radiation or induction |
|
|
Term
|
Definition
Units of measure that provide absolute measurement values, not relative or comparative measurements. Watt is an example |
|
|
Term
|
Definition
A point source that radiates signal equally in all directions. e.g. sun |
|
|
Term
Newton's Inverse Square Law |
|
Definition
This law states that the change in power is equal to 1 divided by the square of the change in distance |
|
|
Term
|
Definition
The initial component in a wireless medium. The computer hands the data off and this begins the RF communication |
|
|
Term
|
Definition
"Compares a signal to 1 milliwatt of power. means ""decibels relative to 1 milliwatt."" It is a measurement of power" |
|
|
Term
|
Definition
"The increase in gain of an antenna, conmpared to the signal of a dipole antenna. Another way of phrasing this is ""decibel gain relative to a dipole antenna""" |
|
|
Term
|
Definition
Units of measure that provide comparative measurement values, not absolute measurements. Decibel is an example |
|
|
Term
|
Definition
"Gain or increase of power from an antenna when compared to what an isotropic radiator would generate. Another way of phrasing this is ""decibel gain relative to an isotropic radiator""" |
|
|
Term
|
Definition
Non-profit group devoted to the growth of wireless LANs (WLANs). One of their primary task is to ensure interoperability of WLAN products by providing certification testing |
|
|
Term
|
Definition
A term describing a behavior of waves. How fast the waves travel, or more specifically, how many waves are generated over a 1-second period of time |
|
|
Term
|
Definition
height, force, or power of a wave |
|
|
Term
|
Definition
The relationship between two waves with the same frequency |
|
|
Term
Phase Shift Keying (PSK) |
|
Definition
Varies the phase of the signal to represent the binary data. State transition technique. determines the data that is being transmitted. one phase can represent a 0 bit and another phase can represent a 1 bit |
|
|
Term
|
Definition
The distance between similar points on two back-to-back waves. Typically measured from the peak of a wave to the peak of the next wave |
|
|
Term
|
Definition
"best known for LAN standards. Mission is to ""promote the engineering process of creating, developing, integrating, sharing, and applying knowledge about electro and information technologies and sciences for the benefit of humanity and the profession""" |
|
|
Term
|
Definition
Method of manipulating a signal so that it can represent multiple pieces of data. It's what changes a signal into a carrier signal. |
|
|
Term
Federal Communications Commission (FCC) |
|
Definition
independent United States agency that regulates communications to and from the United States. Regulates radio signals that are used for wireless networking |
|
|
Term
Frequency Shift Keying (FSK) |
|
Definition
A current state technique. one frequency can represent a 0 bit and another frequency can represent a 1 bit |
|
|
Term
|
Definition
global hierarchy that maintains a database for worldwide frequency assignments and coordinates spectrum management through five administrative regions |
|
|
Term
|
Definition
a modulated signal that is capable of distinguishing between 0s and 1s |
|
|
Term
Amplitude Shift Keying (ASK) |
|
Definition
varies the height of a signal to represent binary data. A current state technique. |
|
|
Term
|
Definition
The manipulation of a signal so that the receiving station has a way of distinguishing 0s and 1s |
|
|
Term
|
Definition
developed Open Systems Interconnection (OSI) model |
|
|
Term
|
Definition
Starts with a y. A type of semi-directional antenna designed to direct a signal in a specific direction. Used for short to medium-distance communication |
|
|
Term
|
Definition
When an access point has two antennas and receivers functioning together to minimize the negative effects of multipath |
|
|
Term
|
Definition
An antenna that consists of two elements. A half-wave type antenna consists of two elements, each 1/4 of the wavelength long |
|
|
Term
|
Definition
A highly-directional antenna that is similiar to the small digital satellite TV antennas that can be seen on the roofs of many houses |
|
|
Term
|
Definition
The measurement of how broad or narrow the focus of an antenna is. Measured both horizontally and vertically |
|
|
Term
highly-directional antenna |
|
Definition
Strictly used for point-to-point communications, typicall to provide network bridging between two buildings. These provide the most focused, narrow beamwidth of any of the antenna types. There are two types of these: parabolic dish and grid |
|
|
Term
omni-directional antenna |
|
Definition
A type of antenna that radiates RF signals in all directions |
|
|
Term
|
Definition
A special type of high-gain, semi-directional antenna that provide a pie-shaped coverage pattern |
|
|
Term
multiple input multiple output (MIMO) |
|
Definition
Any RF communications system that has multiple antennas at both ends of the communications link and being used concurrently |
|
|
Term
|
Definition
Takes an RF signal and divides it into two or more separate signals |
|
|
Term
|
Definition
small devices about the size of a C-cell battery, with cable connectors on both sides. They absorb energy, decreasing the signal as it travels through. Fixed types provide a set amount of loss. Variable loss types have a dial on it that allows you to adjust the amount of energy that is absorbed |
|
|
Term
voltage standing wave ratio (VSWR) |
|
Definition
A numerical relationship between the measurement of the maximum voltage along the line (what is generated by the transmitter) and the measurement of the mimimum voltage along the line (what is received by the antenna) |
|
|
Term
|
Definition
Labeled E-plane, shows the side view of the radiation pattner of the antenna |
|
|
Term
|
Definition
An antenna system made up of multiple antennas that are connected to the signal processor. |
|
|
Term
semi-directional antenna |
|
Definition
A type of antenna that is designed to direct a signal in a specifi direction |
|
|
Term
|
Definition
A type of semi-directional planar antenna designed to direct a signal in a specific direction. Used for short-to medium-distance communications |
|
|
Term
|
Definition
A device that redirects (shunts) transient currents caused by nearby lighting strikes or ambient static away from your electronic equipment and into the ground |
|
|
Term
|
Definition
Labeled H-plane, shows the top-down view of the radiation pattern of the antenna |
|
|
Term
|
Definition
refers to the the back of an antenna |
|
|
Term
|
Definition
When light travels from one point to another, it travels across what is perceived to be an unobstructed straight line |
|
|
Term
|
Definition
An imaginary football-shaped area that surrounds the path of the visual LOS between two point-to-point antennas |
|
|
Term
|
Definition
A highly-directional antenna taht resembles the rectangular grill of a barbeque, with the edges slightly curved inward. The spacing of the wries on this is determined by the wavelength of the frequencies that the antenna is designed for |
|
|
Term
|
Definition
The curvature of the earth, which must be considered when installing long distance point-to-point RF communications |
|
|
Term
|
Definition
A type of semi-directional planar antenna designed to direct a signal in a specific direction. |
|
|
Term
|
Definition
The orientation of the antenna. Antennas radiate RF signals with the amplitude of the waves fluctuating either vertically or horizontally |
|
|
Term
Voice over Wi-fi (VoWIP) |
|
Definition
Any software or hardware that uses voice over IP communications over an 802.11 wireless network. Because of latency concerns, this requires QoS mechanisms to function properly in an 802.11 BSS |
|
|
Term
|
Definition
A measurement of the amount of user data that successfully traverses the network over a period of time |
|
|
Term
transmit power control (TPC) |
|
Definition
Part of the 802.11h amendment. Used to regulate the power levels used by 802.11a radio cards |
|
|
Term
quality of service (QoS) |
|
Definition
The attempt to prioritize and provide certain levels of predictable throughput along a shared access medium |
|
|
Term
|
Definition
"A mechanism that allows to technologies to exist. The goal of the 802.11g ""this thing"" is to prevent ERP-OFDM radio cards from transmitting at the same time as DSSS radio cards" |
|
|
Term
Wired Equivalent Privacy (WEP) |
|
Definition
A layer 2 encryption method that uses the RC4 streaming cipher |
|
|
Term
wireless distribution system (WDS) |
|
Definition
Can connect access points together, using what is referred to as a wireless backhaul |
|
|
Term
Wi-fi Protected Access (WPA2) |
|
Definition
A more complete implementation of the 802.11i amendment and supports both the CCMP/AES and TKIP/RC4 dynamic encryption key management |
|
|
Term
Shared Key authentication |
|
Definition
The more complex of the two 802.11 authentication methods. This uses WEP to authenticate client stations and requires that a static WEP key be configured on both the station and the access point. In addition to WEP being mandatory, authentication will not work if the static WEP keys do not match. |
|
|
Term
Inter Access Point Protocol (IAPP) |
|
Definition
Announcement and handover processes that result in how APs inform other APs about roamed clients and that define a method of delivery for buffered packets |
|
|
Term
Industrial, Scientific, and Medical (ISM) |
|
Definition
902-928 (26 MHz wide) 2.4000-2.4835 GHz (83.5 MHz wide) 5.725-5.875 GHz (150 MHz wide) |
|
|
Term
|
Definition
The ability for the client stations to transition from one access point to another while maintaining network connectivity for the upper-layer applications |
|
|
Term
|
Definition
A communication technology that uses a light-based medium |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
An enhancement of WEP encryption that addresses many of the know weaknesses of WEP. |
|
|
Term
|
Definition
Default operational mode of most 802.11 access points. Support for both DSSS and OFDM is enabled, therefore 802.11b and 802.11g clients can communicate with the access point |
|
|
Term
Hybrid Coordination Function Controlled Access (HCCA) |
|
Definition
"Similar to PCF. Gives the access point the ability to provide for ""prioritization of stations"" via a polling mechanism. Certain client stations are given a chance to transmit before others" |
|
|
Term
Packet Binary Convolutional Coding (PBCC) |
|
Definition
A modulation technique that supports data rates of 5.5, 11, 22, and 33 Mbps. Both transmitter and receiver must support the technology to achieve the higher speeds. Was developed by Alantro Communications, which was purchased by Texas Instruments |
|
|
Term
Point Coordination Function (PCF) |
|
Definition
An optional 802.11 medium access method that uses a form of polling. Although defined by the standard, the medium access method has not been implemented |
|
|
Term
Robust Security Network (RSN) |
|
Definition
A network that only allows for the creation of robust security network associations (RSNAs). This utilizes CCMP/AES encryption as well as 802.1X/EAP authentication |
|
|
Term
|
Definition
A network environment where wireless mesh routers communicate with each other using proprietary layer 2 routing protocols, creating a self-forming and self-healing wireless infrastructure (a mesh) over which edge devices can communicate |
|
|
Term
|
Definition
A method of distributing encryption passphrases or keys by manually typing the matching passphrases or keys on both the access point and all client stations that will need to be able to associate to the wireless network |
|
|
Term
|
Definition
The transmission of voice conversations over a data network using TCP/IP protocols |
|
|
Term
|
Definition
these are responsible for revising and amending the orginal 802.11 standard. They are composed of MAC and PHY. |
|
|
Term
Orthogonal Frequency Division Multiplexing (OFDM) |
|
Definition
One of the most popular communication technologies, used in both wired and wireless communications. Is specified in the 802.11a and 802.11g amendments and can transmit at speeds of up to 54 Mbps. Transmits across 52 separate, clsely and precisely spaced frequencies, often referred to as subcarriers |
|
|
Term
Open System authentication |
|
Definition
Simpler of the 802.11 authentication methods. It provides authentication without performing any type of client verification. |
|
|
Term
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) |
|
Definition
The default encryption method defined under the 802.11i amendment. This method uses AES encryption. |
|
|
Term
Distributed Coordination Function (DCF) |
|
Definition
CSMA/CA is provided by this, which is the mandatory access method of the 802.11 standard |
|
|
Term
|
Definition
Transmission rates specified by the 802.11 standard and amendment, not actual throughput. |
|
|
Term
High-Rate DSSS (HR-DSSS) |
|
Definition
The 802.11b 5.5 and 11 Mbps speeds |
|
|
Term
distribution system (DS) |
|
Definition
a system used to interconnect a set of basic service sets (BSSs) and intregrated local area networks (LANDs) to create an extended service set (ESS). This consists of a medium used for transport of traffic as well as services used for transport of traffic |
|
|
Term
Extensible Authentication Protocol (EAP) |
|
Definition
Used to provide user authentication for an 802.1X port-based access control solution. It is a flexible layer 2 authentication protocol that resides under Point-to-Point (PPP) |
|
|
Term
dynamic frequency selection (DFS) |
|
Definition
Also known as dynamic rate shifting, adaptive rate selection, or automatic rate selection. A process that client stations use to shift to lower bandwidth capabilities as they move away from an access point and higher bandwidth capabilities as they move toward an access point. |
|
|
Term
direct sequence spread spectrum (DSSS) |
|
Definition
A spead spectrum technology originally specified in the 802.11 standard. Provides 1 and 2 Mbps RF communcations using the 2.4 GHz ISM band. These radio cards are often known as clause 15 devices |
|
|
Term
Extended Rate Physical OFDM (ERP-OFDM) |
|
Definition
Used to enhance the 802.11b physical layer to achieve greater bandwidth while remaining compatible with the 802.11 MAC. Used exactly as defined in the 802.11a amendment. Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps are possible. To maintain backward compatability, the DSSS data rates of 1, 2, 5.5, and 11 are supported as well |
|
|
Term
|
Definition
One of the key components of a wireless security solution. It is achieved by using encryption |
|
|
Term
Hybrid Coordination Function (HCF) |
|
Definition
An additional coordination function that is applied in an 802.11e QoS wireless network. Has two access mechanisms to provide QoS: EDCA and HCCA |
|
|
Term
|
Definition
A port based access control standard. Provides an authorization framework that allows or disallows traffic to pass through a port and thereby access network resources. 3 main components: supplicant, the authenticator, and the authentication server |
|
|
Term
|
Definition
Proprietary solutions that provide fast and secure 802.11 roaming, which is needed to implement security and time-sensitive applications in a wireless network |
|
|
Term
Enhanced Distributed Channel Access (EDCA) |
|
Definition
"An extension of DCF. This medium access method will provide for the ""prioritization of traffic"" via the use of 802.1d priority tags" |
|
|
Term
|
Definition
A spreading/coding technique used by 802.11 cards |
|
|
Term
|
Definition
Wireless communication is typically performed within a constrained set of frequencies known as a frequency band. This term is the frequency band |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
A block cipher that offers much stronger protection than RC4 streaming cipher. Used to encrypt 802.11 wireless data using an encryption method known as CCMP. Encrypts data in fixed data blocks with choices in encryption key strength of 128, 192, or 256 bits |
|
|
Term
Complementary Code Keying (CCK) |
|
Definition
A spreading/coding technique used by 802.11b cards to provide higher data rates (HR-DSSS) |
|
|
Term
|
Definition
Verification of user identity and credentials |
|
|
Term
|
Definition
The way in which the RF waves move. Varies drastically depending on the materials in the signal's path. Drywall will have a much different effect on an RF signal than metal |
|
|
Term
|
Definition
Most common RF behavior. Occurs when a signal does not bounce off an object or move around an object |
|
|
Term
|
Definition
Multiple reflections. 2 ways - First - wave reflects off of minute particles within the medium (smog, sandstorms). Second - occurs when the RF signal encounters some uneven surface (chain-link fence, tree foliage, and rocky terrain. Second kind of scattering can cause a significant downgrade or loss of signal |
|
|
Term
|
Definition
One of the most important RF propagation behaviors. When a wave hits a smooth object that is larger than the wave itself, depending upon the media, the wave may bounce in another direction |
|
|
Term
|
Definition
Also known as attenuation. Decrease of amplitude or signal strength |
|
|
Term
|
Definition
The loss of signal strength caused by the natural broadening of the wave, often referred to as beam divergence. RF signal energy spreads over larger areas as the signal travels farther away from an antenna, and as a result, the strength of the signal attenuates |
|
|
Term
|
Definition
A time domain tool that can be used to measure how a signal's amplitude changes over time |
|
|
Term
|
Definition
The increase of a signal's amplitude by the use of an external device |
|
|
Term
|
Definition
Delay between the reception of the main signal and the reflected signal |
|
|
Term
|
Definition
frequency domain measurement devices that can measure the amplitude and frequency space of electromagnetic signals. Used to pick up any sources of interference during an 802.11 |
|
|
Term
|
Definition
Due to the differences in phase of the multiple paths, a combined signal will often attenuate, amplify, or become corrupted. These effect are sometimes called Rayleigh fading, named after British physicists Lord Rayleigh |
|
|
Term
intersymbol interference (ISI) |
|
Definition
A type of multipath interference caused by the difference in time between the primary signal and the reflected signals |
|
|
Term
|
Definition
The movement or motion of the RF waves through the air |
|
|
Term
|
Definition
The bending of an RF signal around an object |
|
|
Term
|
Definition
"A single change from up to down to up or a signel change from positive to negative to positive. Also known as a ""cycle.""" |
|
|
Term
|
Definition
Decrease of amplitude or signal strength. Also known as loss |
|
|
Term
alternating current (AC) |
|
Definition
An electrical current with a magnitude and direction that varies cyclically. The shape and form of the signal (waveform) is a sine wave |
|
|
Term
|
Definition
A propagation phenomenon that results in two or more paths of a signal arriving at a receiving antenna at the same time or within nanoseconds of each other |
|
|
Term
|
Definition
Increase of a signal's amplitude caused by the use of an amplifier on the wire that connects the transceiver to the antenna. Requires the use of an external power source |
|
|
Term
|
Definition
The area directly behind an RF obstruction. Depending upon the change in direction and velocity of the diffracted signals, the area of the RF shadow can become a dead zone of coverage or still possibly receive degraded signals |
|
|
Term
|
Definition
Increase of amplitude or signal strength. 2 types |
|
|
Term
|
Definition
Position and direction of the electric field (E-field) as referenced to the surface of the earth. Vertical polarization is when the E-field is perpendicular to the earth. Horizontal polarization is when the E-field is parallel to the earth |
|
|
Term
|
Definition
A standard measurement of frequency |
|
|
Term
|
Definition
The bending of an RF signal as it passes through a medium with a different density, thus causing the direction of the wave to change. Most commonly occurs as a result of atmospheric conditions |
|
|
Term
|
Definition
The level of background noise |
|
|
Term
|
Definition
Accomplished by focusing the RF signal with the use of an antenna. Antennas with passive gain do not need an external power source. Focus of the signal is more powerful in one direction than another |
|
|
Term
Wireless Personal Area Network (WPAN) |
|
Definition
wireless computer network used for communication between computer devices with in close range. Devices such as laptops, PDA's and telephones. Must common is Bluetooth and infrared |
|
|
Term
Integration Service (IS) |
|
Definition
Enables delivery of MSDU's between distribution system and non-IEEE-802.11 LAN's, via a portal |
|
|
Term
|
Definition
common term used to refer to a client station that is configured to connect to a BSS or ESS |
|
|
Term
Distribution System Medium (DSM) |
|
Definition
Logical physical medium used to connect AP's. Normally the DSM is an 802.3 ethernet backbone. Medium can also be wireless or some other type of medium. |
|
|
Term
Service Set Identifier (SSID) |
|
Definition
Network name used to ID an 802.11 wireless network. The name is a logical name of WLAN. It can be made up by as many as 32 Characters and is case sensitive |
|
|
Term
Basic Service Area (BSA) |
|
Definition
Physical area of coverage provided by an AP. Clients can move within this area and maintain coverage with AP as long as radios remaine above RSSI thresholds |
|
|
Term
Basic Service Set (BSS) |
|
Definition
Involves communication between a single AP and client station that are associated to the AP. |
|
|
Term
MAC Service Data Unit (MSDU) |
|
Definition
contains data from the LLC and layers 3-7. It is the data payload that contains the IP packet plus some LLC data |
|
|
Term
Basic Service Set Identifier (BSSID) |
|
Definition
is a 48-bit MAC address used as a unique ID of basic service set. In either BSS or ESS the BSSID is simply the MAC address of a single AP. In IBSS the BSSID is a Virtual Address |
|
|
Term
Distribution System Services (DSS) |
|
Definition
System service built inside of an autonomous AP or WLAN controller usually in the form of software. DSS is used to transport 802.11 traffic. |
|
|
Term
Wireless Metropolitan area Network (WMAN) |
|
Definition
Provides coverage to a metropolitan area such as a city and surrounding suburbs. The topology associated with WMAN is 802.16 standard. Defines broadband wireless access and is refered to as WiMAX |
|
|
Term
Extended Service Set (ESS) |
|
Definition
Invovles communication between multiple AP's that share network infastructure. It is 1 or more BSS that share a distribution system medium |
|
|
Term
|
Definition
A timer mechanism that maintains a prediction of future traffic on medium based on duration value information seen in previous frame transmission. When a radio is not transmitting it's listening. When listening it and hears frame from another station it looks at the header and determines the Duration/ID contains a duration value or ID Value. If it contains duration value the listening station will set it's NAV timer to this value. Listening station will then use the NAV as a countdown timer, knowing that the RF medium should be busy until the countdown reaches 0. |
|
|
Term
Hybrid Coordinator (HC) |
|
Definition
QoS-aware centralized coordinator that works within HCCA. HC is built into AP and has a higher priority of access to the wireless medium. Using this higher priority level, it can allocate TXOP's to itself and other stations to provide a limited-duration controlled access phase (CAP) providing contention-free transfer of QoS data. |
|
|
Term
Hybrid Coordination Function Controlled Channel Access (HCCA) |
|
Definition
defined by 802.11e. HCCA is similar to PCF, HCCA gives the AP the ability to provide for prioritization of stations via a polling mechanism. Certain client stations are given a chance to transmit before others |
|
|
Term
|
Definition
Occurs when the AP is functioning in DCF mode |
|
|
Term
|
Definition
One of six control frames and one key component of CSMA/CA. Only way for a station to know that a frame was transmitted properly is to receive from the receiving station an ACK notification. |
|
|
Term
Clear Channel Assessment (CCA) |
|
Definition
A layer 1 process that determines whether the RF medium is busy. This is performed by 802.11 radios prior to transmitting data. |
|
|
Term
|
Definition
The polling device in an 802.11 PCF network. |
|
|
Term
|
Definition
A field in an 802.11 frame header that is physically used to set the NAV timer in other stations. Used with virtual carrier-sense |
|
|
Term
Transmit Opportunity (TXOP) |
|
Definition
A limited-duration controlled access phase, providing contention-free transfer of QoS data |
|
|
Term
|
Definition
After a station has waited while performing both virtual and physical carrier-senses, the station may contend for the medium during a window of time known as the contention window. |
|
|
Term
|
Definition
A period of time that differs between the different spread spectrum technologies. It is a large enough time to allow for receive-to-transmit radio turnaround, MAC processing, and clear channel assessment (CCA) |
|
|
Term
|
Definition
Media access control method used by 802.11 networks |
|
|
Term
Block Acknowledgement (BA) |
|
Definition
Improves channel efficiency by aggregating serveral acknowledgements into a single ACK frame. |
|
|
Term
Contention-free Period (CFP) |
|
Definition
Occurs when the AP is functioning in PCF mode. During the CFP, the AP polls only clients in PCF mode about their intention to send data. This is a method of prioritizing clients. |
|
|
Term
|
Definition
Differentiated access for stations provided by EDCA. User priority uses eight levels. The user priority tags are identical to 802.1D priority tags. |
|
|
Term
|
Definition
A period of time that exists between transmissions of wireless frames. |
|
|
Term
|
Definition
Performed constantly by all stations that are not transmitting or receiving data. determines whether a frame transmission is inbound for a station receive or whether the medium is busy before transmitting. This is known as the clear channel assessment (CCA) |
|
|
Term
Network Allocation Vector (NAV) |
|
Definition
A timer mechanism that maintains a prediction of future traffic on medium based on duration value information seen in previous frame transmission. When a radio is not transmitting it's listening. When listening it and hears frame from another station it looks at the header and determines the Duration/ID contains a duration value or ID Value. If it contains duration value the listening station will set it's NAV timer to this value. Listening station will then use the NAV as a countdown timer, knowing that the RF medium should be busy until the countdown reaches 0. |
|
|
Term
|
Definition
The Wi-Fi alliance oversees the WMM-PS (Power Save) certification, which uses 802.11e mechanisms to increase the battery life via advanced power-saving mechanisms. The Wi-Fi Alliance's WMM Power Save certification is based on automatic power save delivery (APSD) |
|
|
Term
Scheduled Automatic power save delivery (S-APSD) |
|
Definition
An enhanced power MGMT method introduced by the IEEE 802.11e amendment |
|
|
Term
Traffic Indication Map (TIM) |
|
Definition
used when stations have enabled power save mode. The TIM is a list of all stations that have undelivered data buffered on the AP waiting to be delivered. Every beacon will include the AID of the station until the data is delivered. |
|
|
Term
Logical Link Control (LLC) |
|
Definition
The upper portion of the Data-link layer is the IEE 802.2 Logical Link Control (LLC) sublayer, which is identical for all 802-based networks, although not used by all IEEE 802 networks. |
|
|
Term
PLCP Service Data Unit (PSDU) |
|
Definition
Equivalent to the MPDU. The MAC layer referes to the frame as the MPDU, while the Physical layer refers to this same exact frame as the PSDU |
|
|
Term
Short interframe space (SIFS) |
|
Definition
A short gap or period of time that is used during transmission of data |
|
|
Term
Unscheduled Automatic Power Save Delivery (U-APSD) |
|
Definition
an enhanced power-MGMT method introduced by IEEE 802.11e amendment. The Wi-Fi Alliance's WMM power save (WMM-PS) certification is based on U-APSD |
|
|
Term
Request to send/Clear to send (RTS/CTS) |
|
Definition
A mechanism that performs a NAV distribution and helps to prevent collisions from occurring. This NAV distribution reserves the medium prior to the transmission of the data frame. RTS/CTS can be used to discover hidden node problems. RTS/CTS is one of the two protection mechanisms used in mixed-mode environment |
|
|
Term
Power Save Multi Poll (PSMP) |
|
Definition
Power MGMT method defined for use by HT radios. PSMP is an extension of automatic power save delivery (APSD) that was defined by the 802.11e amendment |
|
|
Term
Physical Layer Convergence Procedure (PLCP) |
|
Definition
The upper portion of the physical layer. PLCP prepares the frame for transmission by taking the frame from the MAC sublayer and creating the PLCP Protocol Data Unit (PPDU) |
|
|
Term
|
Definition
Prob request management frame with no SSID information |
|
|
Term
|
Definition
When a client station decides to roam to a new AP, it will send a reassociation request frame to the new AP. It is called a reassociation not because it is reassociating to the AP, but because it is reassociating to the SSID of the wireless network |
|
|
Term
|
Definition
optional mode for 802.11 stations. A wireless station can shut down some of the transceiver components for a period of time to conserve power. The station indicates that it is using Power Save Mode by changing the value of the Power Mgmt field to 1 |
|
|
Term
|
Definition
MGMT frame that is transmitted during active scanning. A client station that is looking for an SSID sends a probe request. AP's that hear the probe request will send a probe response, notifying the client of the AP presence. If a client station receives probe responses from multiple AP's, signal strength and quality characteristics are typically uses by the client station to determine which AP has the best signal and thus which AP to connect to. |
|
|
Term
PLCP Protocol Data Unit (PPDU) |
|
Definition
When the PLCP receives the PSDU, it prepares it to be transmitted and creates the PPDU. The PLCP adds the preamble and PHY header to the PSDU |
|
|
Term
Spatial multiplexing power save (SM Power Save) |
|
Definition
Power-saving mechanism used to allow a MIMO 802.11n device to power down all but one of it's radios |
|
|
Term
Physical Medium Dependent (PMD) |
|
Definition
The lower portion of the Physical layer. the PMD sublayer modulates and transmits the data as bits |
|
|
Term
Integration Services (IS) |
|
Definition
Enables delivery of MSDU's between the distribution system (DS) and a non-IEEE-802.11 LAN via a portal |
|
|
Term
|
Definition
MGMT frame that is transmitted during active scanning. After a client station sends a probe request AP's that hear the probe request will send a probe response, notifying the client of the AP's presence. The information that is contained inside the body of the probe response frame is the exact same information that can be found in a beacon frame with the exception of the TIM |
|
|
Term
MAC Protocol Data Unit (MPDU) |
|
Definition
An 802.11 frame. The components include a MAC header, an MSDU (Data Payload) and the trailer |
|
|
Term
|
Definition
Majority of the frame types in an 802.11 network. Used by wireless stations to join and leave the network. Another name is Management MAC Protocol Data Unit MMPDU. Mgmt frames do not carry any upper-layer info. There is no MSDU encapsulated in the MMPDU frame body, which carries only L2 information fields and information elements |
|
|
Term
|
Definition
In order for a station to be able to connect to an AP, it needs to first discover an AP. Passive scanning involves the client station listening for beacon frames that are continuously being sent by the AP. |
|
|
Term
|
Definition
A bit in the 802.11 MAC header that is used by the client station to notify the AP that the station is going into Power Save Mode |
|
|
Term
|
Definition
Help with the delivery of data frames. Control frames must be able to be heard by all stations; therefore, they must be transmitted at one of the basic rates. Control frames are also used to clear the channel, acquire the channel, and provide unicast frame ACK's. They contain L2 header information. |
|
|
Term
Announcement traffic indication message (ATIM) |
|
Definition
A unicast frame that is used in an IBSS network when Power Save Mode is enabled. If a station has buffered data for another station it will send an ATIM frame to the other station, informing it that it must stay awake until the next ATIM window so that it can receive the buffered data. Any station that either has buffered data for another station or has received an ATM will stay awake so that the buffered data can be exchanged. |
|
|
Term
|
Definition
unit of data at the Data-Link Layer |
|
|
Term
|
Definition
A notification frame used to terminate an authentication. Because authentication is prerequisite for association, disassociation will also occur. Deauthentication cannot be refused by either party |
|
|
Term
|
Definition
Carry the actual data that is passed down from the higher-layer protocols |
|
|
Term
|
Definition
The set of data rates that a client station must be capable of communicating with in order to successfully associate with an AP. Basic rates are required rates with a BSS. |
|
|
Term
|
Definition
Fixed-length mandatory fields in the body of management frame. |
|
|
Term
|
Definition
Variable-length fields that are optional in the body of management frame |
|
|
Term
Delivery traffic indication message (DTIM) |
|
Definition
A special type of TIM that is used to ensure that all stations are awake when multicast or broadcast traffic is sent |
|
|
Term
|
Definition
In order for a station to be able to connect to an AP, it needs to first discover an AP. Active scanning is one of the methods that stations use to discover AP's. The station and access point will exchange probe requests and probe responses to establish the capabilities of the basic service set. |
|
|
Term
Frame check sequence (FCS) |
|
Definition
The extra characters added to a frame and used for error detection and correction |
|
|
Term
|
Definition
A notification frame used to terminate an association. A polite way of terminating the association. Disassociation cannot be refused by either party |
|
|
Term
|
Definition
After a station has authenticated with the AP the next step is for it to associate with the AP. When a client station associates, it becomes a member of a BSS. Association means that the client station can send data through the AP and on to the Distribution System Medium. |
|
|
Term
|
Definition
Default power management mode for most 802.11 stations. When a station is set for active mode, the wireless station is always ready to transmit or receive data. Active mode is sometimes referred to as Continuous aware mode, and it provides no battery conservation. In the MAC header of an 802.11 frame, the Power management field is 1 bit in length and is used to indicated the power-magagement mode of the station. A value of 0 indicated that the station is in active mode. Stations running in Active mode will achieve higher throughput than stations running in power save mode, but the battery life will typically be much shorter. |
|
|
Term
|
Definition
A protection mechanism for mixed-mode environments. One of the benefits of using CTS-to-self over RTS/CTS as a protection mechanism is that the throughput will be higher. Because there are fewer frames being sent |
|
|
Term
|
Definition
Probe request with specific SSIC |
|
|
Term
Automatic Power Save Delivery (APSD) |
|
Definition
an enhanced power-management method introduced by 802.11e amendment. |
|
|
Term
Association Identifier (AID) |
|
Definition
Any time a station associates to an AP, the station receives an AID. The AP uses this AID to keep track of the stations that are associated and the members of the BSS. |
|
|
Term
Beacon Management Frame |
|
Definition
One of the most important 802.11 frame types. Commonly referred to as the beacon. Beacons are essentially the heartbeat of the wireless network. They are sent only by the AP of a BSS. Client stations transmit beacons only when participating in an IBSS. Each beacon contains a time stamp, which the client stations use to keep their clocks in synch with the AP. |
|
|
Term
|
Definition
A set of configuration parameters that are configured on the WLAN controller The profile parameters can include the WLAN logical name (SSID), WLAN security settings, VLAN assignment, and QoS parameters. |
|
|
Term
Wireless Zero configuration (WZC) service |
|
Definition
The most widely used client utility is an integrated OS client utility, more specifically known as the WZC service utility that is enabled by default in Windows XP. |
|
|
Term
|
Definition
A WLAN controller and multiple AP's using sector antennas all combined in a single hardware device |
|
|
Term
|
Definition
A wireless network configuration that connects only two devices together. This is typically a wireless bridge link. |
|
|
Term
Radio frequency spectrum management (RFSM) |
|
Definition
Software and hardware solutions that can dynamically change the configuration of lightweight or autonomous AP's based on accumulated RF information gathered from the AP's radio cards. Based on the accumulated RF information, the centralized device controls the AP's and adjusts their power and channel settings, dynamically changing RF coverage cells |
|
|
Term
|
Definition
The BSSID is typically the MAC address of the AP's radio card and the L2 identifier of the BSS. Because AP's are capable of advertising multiple SSIDs, and because each SSID requires a separate BSSID, the AP will generate virtual BSSID addresses |
|
|
Term
Point-toMultipoint (PtMP) |
|
Definition
A wireless network configuration that has a central communications device such as a bridge of an AP providing connectivity to multiple devices such as the other bridges or clients |
|
|
Term
|
Definition
A hardware standard that is replacing PCMCIA cards |
|
|
Term
|
Definition
An environment in which a WLAN controller is a centralized device that can dynamically change the configuration of the lightweight AP based on accumulated RF information gathered from the AP's radio cards. |
|
|
Term
Software defined radio (SDR) |
|
Definition
A future technology that will be able to dynamically switch across a wide range of frequency bands, transmission techniques, and modulation schemes so that a single radio could replace multiple products. |
|
|
Term
|
Definition
The PC Card standard specifies 3 types of PC Cards. The 3 card types are the same length and width and use the same 68-pin connector. The thickness of the cards are follows: Type I = 3.3 mm, Type II = 5.0 mm, and Type III = 10.5 mm. |
|
|
Term
Enterprise encryption gateway (EEG) |
|
Definition
A specialty 802.11 device that provides for segmentation and encryption. The EEG typically sits behind several fat access points and segments the wireless network from the protected wired network infrastructure. Proprietary encryption technology using the AES algorithm at Layer 2 is provided by the enterprise encryption gateway |
|
|
Term
Wireless network management system (WNMS) |
|
Definition
A central management device originally used to configure and maintain as many as 5,000 autonomous APs. A WNMS can be either a hardware appliance or a software solution. The current WNMS servers are used to manage multiple WLAN controllers from a single vendor and many also be used to manage other vendors' WLAN infrastructure, including autonomous APs. |
|
|
Term
Enterprise wireless gateway (EWG) |
|
Definition
A specialty 802.11 device used to segment autonomous AP's from the protected wired network infrastructure. An EWG can segment the unprotected wireless network from the protected wired network by acting either as a router or a VPN endpoint and/or as a firewall |
|
|
Term
Generic routing Encapsulation (GRE) |
|
Definition
A process in which frames such as 802.11 frames are encapsulated in a packet, transmitted between two devices on a network, and then removed from the packet and forwarded. |
|
|
Term
|
Definition
With this type of WLAN architecture, some of the MAC services are handled by the WLAN controller and some are handled by the lightweight AP. For example, integration service (IS) and Distribution system service (DSS) are handled by the controller. WMM QoS methods are usually handled by the controller. Depending on the vendor, encryption of 802.11 data frames might be handled by the controller or by the AP. Some 802.11 management frames such as beacons and ACKs might orginate at the AP instead of the WLAN controller |
|
|
Term
Residential wireless gateway (RWG) |
|
Definition
A fancy term for a home wireless router, the main function of residential wireless gateway is to provide shared wireless access to a SOHO Internet connection while providing a level of security from the Internet. These SOHO Wi-Fi routers are generally inexpensive yet surprisingly full featured. |
|
|
Term
Role-based access control (RBAC) |
|
Definition
RBAC is an approach to restricting system access to authorized users. The three main components of an RBAC approach are users, roles and permissions. Separate roles can be created such as the sales role or the marketing role. Individuals or groups of users are assigned to one of these roles. Permissions can be defined as firewall permissions, layer 2 permissions, layer 3 permissions, and bandwidth permissions and can be time based. The permissions are then mapped to the roles. When wireless users authenticate via the WLAN, they inherit the permissions of whatever roles they have been assigned to. |
|
|
Term
|
Definition
Wireless bridges support two major configuration settings:Root and nonroot. Bridges work in a parent/child type of relationship. So think of the root bridge as the parent and the nonroot as the child. |
|
|
Term
|
Definition
Multiple SSIDs configured on a single physical AP, where each SSID is mapped to a unique BSSID |
|
|
Term
|
Definition
A peripheral expansion slot often found on handheld PDA's. |
|
|
Term
|
Definition
WLAN controllers are used in a centralized WLAN architecture together with lightweight AP's, known as thin APs. All the intelligence resides in the controller and all of the AP configs settings such as channel and power are distributed to the lightweight APs from the controller and stored in the RAM of the lightweight AP. Encryption and Decryption capabilities might reside in the centralized controller or may still be handled by the lightweight APs, depending on the vendor. DSS and IS function within the Controller. Also known as wireless switch, controllers provide AP management, user management, RF spectrum planning and management, L2 security, L3 security, captive portal, VRRP redundancy, WIDS, and VLAN segmentation. Another major advantage of the controller model is most of the controllers support some sort of fast secure roaming, which can assist in resolving latency issues often associated with roaming. |
|
|
Term
Single channel architecture (SCA) |
|
Definition
A WLAN architecture in which all AP's in the network can be deployed on one channel in either the 2.4Ghz or 5 GHz frequency bands. Uplink and Downlink transmissions are coordinated by a WLAN controller on a single 802.11 channel in such a manner that the effects of co-channel and adjacent-channel interference are minimized. |
|
|
Term
|
Definition
A small form factor PCI expansion card. The mini PCI is a variation of the Peripheral Component Interconnect (PCI) bus technology and was designed for use mainly in laptops. A mini PCI radio is often used inside AP's and is also the main type of radio used by manufacturers as the internal 802.11 wireless adapter inside laptops |
|
|
Term
Lightweight Access Point |
|
Definition
Lightweight AP's are used in a centralized WLAN architecture together with WLAN controllers. A lightweight AP has minimal intelligence and is functionally just a radio card and an antenna. All the intelligence resides in the centralized WLAN controller, and all of the AP configuration settings such as channel and power are distributed to the lightweight AP's from the WLAN controller and stored in the RAM of the lightweight AP. The encryption and decryption capabilities might reside in the centralized WLAN controller or may still be handled by the lightweight APs, depending on the vendor. Lightweight APs tunnel 802.11 traffic to the WLAN controller which is typically deployed at either the distribution or core layer. |
|
|
Term
Bridged Virtual Interface (BVI) |
|
Definition
Autonomous AP contain at least two physical interfaces, usually RF radio card and 10/100BaseT port. The majority of the time, these physical interfaces are bridged together by a virtual interface known as BVI. The BVI is assigned an IP address that is shared by two physical interfaces |
|
|
Term
|
Definition
A peripheral expansion slot often found on handheld PDA, laptops and other mobile devices |
|
|
Term
|
Definition
A group of integrated circuits designed to work together. Many 802.11 chipset manufactures exist and sell their technology to the various radio card manufacturers. |
|
|
Term
|
Definition
A wireless architecture that consists of groups of Autonomous AP's with WLAN controller intelligence and capabilities |
|
|
Term
Control and Provisioning of Wireless Access Points (CAPWAP) |
|
Definition
A set of standards proposed by the IETF for WLAN controller protocols. |
|
|
Term
Distributed Data Forwarding (DDF) |
|
Definition
The use of multiple wireless controllers as data distribution gateways onto the wired network |
|
|
Term
Cooperative Control Access Point (CC-AP) |
|
Definition
An AP that combines an autonomous AP with a suite of Cooperative control protocols, but without requiring a WLAN controller |
|
|
Term
|
Definition
Software used to configure a wireless client card. The software interface will usually have the ability to create multiple connection profiles. Configuration settings of a client utility typically include the SSID, transmit power, security settings, 802.11e/QoS capabilities, and power management. |
|
|
Term
|
Definition
Traditional AP. Contains at least two physical interfaces, usually an RF radio card and 10/100BaseT port. All configuration settings exist in the AP itself, and therefore, management and configuration occurs at the access layer. All encryption and decryption mechanisms and MAC layer mechanisms also operate within the autonomous AP. The DSS and IS function within an autonomous AP. |
|
|
Term
|
Definition
communicate with each other by using proprietary L2 routing protocols, creating a self-forming and self-healing wireless infrastructure (a mesh) over which edge devices can communicate |
|
|
Term
|
Definition
When an 802.1X/EAP solution is deployed, a device that blocks or allows traffic to pass through its port secuirty is known as the authenticator. Authentication traffic is normally allowed to pass through the authenticator while all other traffic is blocked until the identity of the supplicant has been verified. |
|
|
Term
Wi-Fi Protected Access 2 (WPA2) |
|
Definition
is based on security mechanisms that were orginally defined in the IEEE 802.11i amendment defining a robust security network (RSN). 2 versions of WPA2 exist. WPA2-personal defines security for a small office, home office SOHO ennvironment, and WPA2-Enterprise defines stronger secuirty for enterprise corportate networks. Each certified product is required to support WPA2-Personal or WPA2-Enterprise |
|
|
Term
|
Definition
Algorithm is a streaming cipher used in technologies that are often used to protect Internet traffic, such as Secure Sockets Layer (SSL). The RC4 algorithm is used to protect 802.11 wireless data and is incorporated into two encryption methods known as WEP and TKIP |
|
|
Term
|
Definition
Under the 802.11i amendment, two stations (STAs) must establish a procedure to authenticate and associate with each other as well as create dynamic encryption keys through a process known as the 4-Way Handshake. |
|
|
Term
|
Definition
When an 802.1X/EAP solution is deployed, a host with software that is requesting authentication and access to network resources is known as the supplicant |
|
|
Term
Internet Protocol Secuirty (IPsec) |
|
Definition
is a Layer 3 VPN technology. IPsec can use RC4, DES, 3DES and AES ciphers for encryption. It provides for encryption, encapsulation, data integrity, and device authnetication. |
|
|
Term
robust security network associations (RSNAs) |
|
Definition
As defined by the 802.11i security amendment, two stations (STAs) must establish a procedure to authenticate an associate with each other as well as create dynamic encryption keys through a process known as 4-Way Handshake. This association between two stations is referred to as a robust security network association (RSNA) |
|
|
Term
Message Integrity Check (MIC) |
|
Definition
TKIP uses a data integrity check known as Message Integrity Check (MIC) to mitigate known bit-flipping attacks against WEP. The MIC is sometimes referred to by the nickname Micheal. |
|
|
Term
Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP) |
|
Definition
The default encryption method defined under 802.11i amendment. This method uses the AES Cipher. CCMP/AES uses a 128-bit encryption key size and encrypts in 128-bit fixed-length blocks. An 8-byte Message Integrity Check is used that is considered much stronger than the one used in TKIP. CCMP/AES is the default encryption methoid defined by WPA2 |
|
|
Term
Authentication Server (AS) |
|
Definition
When 802.1X/EAP solution is deployed, an authentication server validates the credentials of the supplicant that is requesting access and notifies the authenticator that the supplicant has been authorized. The authentication server will maintain a user database or may proxy with an external user database to authenticate user credentials. |
|
|
Term
Authorization, Authentication and Accounting (AAA) |
|
Definition
is a secuirty concept. Authorization involves granting access to network resources and services. Before authorization to network resources can be granted, proper authentication must occur. Authentication is the verification of user identity and credentials. Accounting is tracking the use of network resources by users. It is an important aspect of network secuirty, used to keep a paper trail of who used what resources and when and where. |
|
|
Term
Initialization Vector (IV) |
|
Definition
The IV is utilized by the RC4 steaming chipher that WEP encryption uses. The IV is a block of 24 bits that is combined with a static key. It is sent in cleartext and is different on every frame. The effective key strength of combining the IV with the 40-bit static key is 64-bit encryption. TKIP uses an extended IV. |
|
|
Term
Point-to-Point Tunneling Protocol (PPTP) |
|
Definition
PPTP is a layer 3 VPN technology. It uses 128-bit Microsoft point-to-point encryption (MPPE), which uses the RC4 algorithm. MPPE encryption is considered adequate but not strong. PPTP also uses MS-CHAP version 2 for user authentication, which is susceptible to offline dictionary attacks. |
|
|
Term
transition security network (TSN) |
|
Definition
An 802.11 wireless network that allows for the creation of pre-robust security network associations (pre-RSNAs) as well as RSNAs is known as a transition security network. A TSN supports 802.11i-defined security as well as legacy security such as WEP within the same BSS |
|
|
Term
Wi-Fi Protected Access (WPA) |
|
Definition
Prior to the ratification of the 802.11i amendment, the Wi-Fi alliance introduced WPA certification as a snapshot of the not yet released 802.11i amendment, supporting only the TKIP/RC4 dynamic encryption key mangement. 802.1X/EAP authentication was required in the enterprise, and passpharse authentication was required in a SOHO environment. |
|
|
Term
port-based access control |
|
Definition
The 802.1X standard defines port-based access control. 802.1X provides an authorization framework that allows or disallows traffic to pass through a port and thereby access network resources. 802.1X defines two virtual ports: an uncontrolled port and a controlled port. The uncontrolled port allows EAP authentication traffic to pass through, while the controlled port blocks all other traffic until the supplicant has been authenticated. |
|
|
Term
|
Definition
After an EAP frame exchange where mutal authentication is required, both the AS and the supplicant known infomration about each other because of the exchanging of credentials. This newfound information is used as seeding material or keying material to generate a matching dynamic encryption key for both the supplicant and the authentication server. These dynamic keys are generated per session per user, meaning that every time a client station authenticates, a new key is generated and every user has a unique and seperate key. |
|
|
Term
Microsoft Point-to-Point encryption (MPPE) |
|
Definition
MPPE is a 128-bit encryption method that uses the RC4 algorithm. MPPE is used with P2P tunneling protocol (PPTP) VPN technology. |
|
|
Term
Wireless intrusion prevention system (WIPS) |
|
Definition
is a wireless intrusion detection system (WIDS) that is capable of mitigating attacks from rogue APs. WIPS use spoofed deauthentication frames, smnp, and prorietary methods to effectively render a rogue access devices useless and protect the network backbone. |
|
|
Term
|
Definition
Also known as the evil twin attack, occurs when a hacker disrupts communications between client stations and a legitimate AP. Client stations lose their connection to the legitimate AP and reconnect to the hacker's access point. The hacker AP hijacks the client stations at Layer 1 and Layer 2, allowing the hacker to proceed with Peer-to-Peer attacks. |
|
|
Term
Public Secure Packet Forwarding (PSPF) |
|
Definition
PSPF is a feature that can be enabled on WLAN AP or switches to block wireless clients from communicating with other wireless clients on the same wireless segment. With PSPF enabled, client devices cannot communicate with other client devices on the wireless network. PSPF is a term most commonly used by cisco; other vendors have similar capabilities under the different names. PSPF is useful in preventing peer-to-peer attacks through an AP. |
|
|
Term
|
Definition
A functional security policy defines the technical aspects of wireless security. The functional security policy establishes how to secure the wireless network in terms of what solutions and actions are needed. A functional policy defines essentials, baseline practices, design, implementation, and monitoring procedures. |
|
|
Term
|
Definition
The evil twin attack, also known as wireless hijacking, occurs when a hacker disrupts communication between client stations and a legitmate AP. Client stations lose thier connection to the legitimate AP and reconnect to the evil twin access point. The evil twin hijacks the client stations at layer 1 and layer 2, allowing the hacker to proceed with peer-to-peer attacks |
|
|
Term
|
Definition
After completing a wireless hijacking attack at a hotspot, a hacker may also use web server software and captive portal software to perform a Wi-Fi phishing attack. After client stations have been hijacked to an evil twin access point, they are redirected to a login web page that looks exactly like a hotspots login page. The hacker's fake login page will request a credit card number from the hijacked user. Phishing attacks are common on internet and are now appearing at Wi-Fi hotspots |
|
|
Term
|
Definition
Is not considered malicious and is also often referred to as wardriving. Software utilities known as WLAN discovery tools exist for the purpose of finding open WLAN networks. Wardriving is strictly the act of looking for wireless networks, usually while in a moving vechicle. The most common wardriving software tool is freeware program called NetStumbler |
|
|
Term
|
Definition
A general wireless security policy establishes why a wireless security policy is needed for an organization. The general wireless security policy defines a statement of authority, applicable audience, violating policy procedures, risk assessment, threat analysis, and auditing |
|
|
Term
Denial of service (DoS) |
|
Definition
Any individual with ill intent can temporarily disable Wi-Fi network by preventing legitimate wireless users from accessing network resources. Layer 1 and Layer 2 attacks exist that can deny 802.11 wireless services to legitimate authorized users. 802.11 DoS attacks cannot be prevented, but they can be detected with the proper intrusion detection tools. |
|
|
Term
Management Frame Protection (MFP) |
|
Definition
Techniques used to deliver management frames in a secure manner, with the hope of preventing many Layer 2 denial-of-service attacks. |
|
|
Term
Distributed spectrum analysis system (DSAS) |
|
Definition
A centralized server that uses remote hardware spectrum analyzer sensors. |
|
|
Term
Malicious eavesdropping |
|
Definition
The unauthorized use of protocol analyzers to capture wireless communications is known as malicious eavesdropping and is typically considered illegal. Most countries have laws making it unlawful to listen in on any type of electromagnetic communications such as phone conversations. Unauthorized monitoring of 802.11 wireless transmissions is considered malicious and normally illegal. The most common target of malicious eavesdropping attacks is public access hotspots |
|
|
Term
|
Definition
is the act of looking for wireless networks, usually while in a moving vehicle. Software utilities known as WLAN discovery tools exist for the purpose of finding open WLAN networks. The most common wardriving software tool is a freeware program called NetStumbler. |
|
|
Term
Wireless intrusion detection system (WIDS) |
|
Definition
is a client/server solution that is used to constantly monitor for 802.11 wireless attacks such as rogue APs, MAC spoofing, Layer 2 DoS, and so on. A WIDS usually consists of three components: a sever, sensors, and monitoring software. Wireless intrusion detection uses polices and alarms to properly classify attacks and to alert administrators to potential attacks |
|
|
Term
|
Definition
A technique used to manipulate people into divulging confidential information such as computer passwords. |
|
|
Term
|
Definition
In a MIMO system, multiple spatial streams are sent with different (unequal) modulation |
|
|
Term
|
Definition
Frames that are sent by 802.11n HT radios with transmit beamforming capabilites. Sounding frames are used to exchange implicit and explicit feedback. The transmitter is considered the beamformer, while receiver is considered the beamformee. The beamformer and the beamformee work together to educate each other about the characteristics of the MIMO channel. the beamformer will send a sounding request frame and will make phase adjustments based on the information that is returned in sounding response frame from the beamformee. any frame can be used as a sounding frame. |
|
|
Term
|
Definition
Antenna diversity that results in multiple RF streams following different paths to the receiver because of the space between the transmitting antennas. Each stream travels a different path, because there is at least a half-wavelength of space between the multiple transmitting antennas. |
|
|
Term
Single-input single-output (SISO) |
|
Definition
A system that makes use of single radio chain. |
|
|
Term
Transmit beamforming (TxBF) |
|
Definition
Multiple antennas that are connected to a signal processor. The processor feeds the individual antennas with signals of different relative phases, creating a directed beam of RF signal aimed at the client device. The 802.11n draft amendment proposes this as an optional PHY capability. Technology uses phased-array antenna technology and is often referred to as smart antenna technology. |
|
|
Term
Reduced interframe space (RIFS) |
|
Definition
A new interframe space that is used in 802.11n and is even shorter than a SIFS. A RIFS interval can be used in place of SIFS interval, resulting in less overhead during a frame burst |
|
|
Term
Maximal ratio combining (MRC) |
|
Definition
A signal-processing technique used to combine multiple received signals, which looks at each unique signal and optimally combines them in a method that is additive as opposed to destructive. |
|
|
Term
phased coexistence operation (PCO) |
|
Definition
An optional 802.11n mode of operation that divides time and alternates between 20 MHz and 40 MHz transmissions |
|
|
Term
|
Definition
When receiving, multiple copies of the same signal arrive at the receiver antennas with different amplitudes. The signal with the best amplitude is chosen, and the other signals are ignored. Also used when transmitting, but only one antenna is used. the transmitter will transmit out of the diversity where the best amplitude signal was last heard. |
|
|
Term
|
Definition
Occurs in 802.11n when a transmitter and receiver work together to educate each other about the characteristics of the MIMO channel. The transmitter will make phase adjustments based on the information that is returned from the receiver. When using implicit feedback, the beamformer receives long training symbols transmitted by the beamformee, which allow the MIMO channel between the beamformee and beamformer to be estimated. |
|
|
Term
|
Definition
An 802.11n protection mode that is used when one or more non-HT stations are associated to the HT access point. |
|
|
Term
|
Definition
MIMO radios transmit multiple radio signals at the same time and take advantage of multipath. Each individual radio signal is transmitted by a unique radio and antenna of the MIMO system. Each independent signal is known as a spatial stream, and each stream can contain different data than the other streams transmitted by one or more of the other radios. Each stream will also travel a different path because there is at least a half-wavelength of space between the multiple transmitting antennas. |
|
|
Term
Multiple traffic ID block ACK (MTBA) |
|
Definition
A block acknowledgment technique used to acknowledge each of the individual MPDUs when using aggregate MPDU. |
|
|
Term
|
Definition
A single radio and all of its supporting architecture including mixers, amplifiers and analog/digital converters |
|
|
Term
|
Definition
An 802.11n mode that is not compatible with legacy 802.11a/b/g radios; only HT radios can communicate when using the HT Greenfield |
|
|
Term
|
Definition
A period of time between OFDM symbols that accommodates for late arrival of symbols over longer paths. |
|
|
Term
|
Definition
High Throughput (HT) provides PHY and MAC enhancements to support wireless throughput of 100 Mbps and greater. HT is defined by the 802.11n draft amendment for clause 20 radios. |
|
|
Term
|
Definition
Combining multiple frames into a single frame transmission |
|
|
Term
Modulation coding scheme (MCS) |
|
Definition
As mandated by 802.11n draft amendment, data rates for clause 20 HT radios are defined by multiple variables known as MCS. Non-HT radios that used OFDM technology (802.11a/g) defined data rates of 6 Mbps-54 Mbps based on the modulation that was used. HT radios, however, define data rates based on numerous factors including modulation, the number of spatial streams, channel size, and guard interval. |
|
|
Term
|
Definition
Four protection modes used by 802.11n to ensure backward compatibility with older 802.11 a/b/g radios |
|
|
Term
|
Definition
In a MIMO system, multiple spatial streams are sent with the same (equal) modulation |
|
|
Term
Aggregate MAC Service Data Unit (A-MSDU) |
|
Definition
A frame aggregation technique that combines multiple frames into a single frame transmission. The aggregated MSDUs will have a single destination when wrapped together in a single frame. Multiple MSDUs are encrypted by using the same dynamic encryption key. |
|
|
Term
|
Definition
The 802.11n amendment defines an operational mechanism that accounts for coexistence between 802.11n HT coverage cells and nearby legacy 802.11a/b/g coverage cells. When either an HT or non-HT station transmits a frame, the station first sends a request-to-send(RTS) frame to the HT AP.The AP will then reply with two clear-to-send (CTS) frames. One CTS frame is in the legacy non-HT format, while the other frame is in the HT format |
|
|
Term
|
Definition
This occurs in 802.11n when a transmitter and receiver work together to educate each other about the characteristics of the MIMO channel. The transmitter will make phase adjustments based on the information that is returned from the receiver. When using explicit feedback, the beamformee makes a direct estimate of the channel from training symbols sent to the beamformee by the beamformer. The beamformee takes that information and sends additional feedback to the beamformer. The beamformer then transmits based on the feedback from the beamformee. |
|
|
Term
Aggregate MAC Protocol Data Unit (A-MPDU) |
|
Definition
A frame aggregation technique that combines multiple frames into a single frame transmission. All of the 802.11 frames (MPDUs) do not have to have the same destination address. Also, the data payload of each MPDU is encrypted separately by using the multiple dynamic encryption keys that are unique between the AP and each individual client |
|
|
Term
|
Definition
A public location where wireless data services are available |
|
|
Term
Wireless Communications Allow? |
|
Definition
Surfing the internet at public locations via HOTSPOTS... public locations where wireless data services are available. |
|
|