Showing posts with label NetPlus. Show all posts
Showing posts with label NetPlus. Show all posts

Thursday, March 12, 2020

Network+ Chapter 19 Power Words - Blank

Chapter 19 - Protecting Your Network
Defined
1. Mantrap 
2. Monlist
3. NAC
4. Network-Based anti-malware
5. Network-based firewall
6. Network Closet
7. Non-persistent agent
8. Ntpdc
9. OUI
10. Outbound traffic
11. PDos
12. Persistent agent
13. Phishing
14. Posture Assessment
15. Proximity Reader
16. Quarantine Network
17. Reddit Effect
18. Reflection
19. Cipher lock
20. Cleartext credential
21. Closed circuit television
22. Cloud 
23. DZ
24. DOS
25. DHCP snooping 
26. DDOS 
27. DAC 
28. DAI 
29. Edge
30. Effective permission
31. External firewall 
32. Fail close
33. Fail open 
34. Fault tolerance
35. Firewall
36. Guest network
37. Hardening 
38. Hardware Appliance 
39. Honeynet 
40. Honeypot
41. Host-Based Anti-Malware
42. Host-Based Firewall 
43. Implicit Deny Any
44. Inbound Traffic
45. Inheritance
46. Internal Firewall 
47. IP Camera 
48. Key Fob 
49. Keypad 
50. Macro 
51. Malicious Employee 
52. Malicious User 
53. Malware
54. Man-In-The-Middle
55. Reddit effect 
56. Quarantine network
57. Proximity reader
58. Posture assessment 
59. Pashing 
60. Persistent agent
61. Permanent dos
62. Outbound traffic
63. OUI 
64. Ntpdc
65. Non-persistent agent 
66. Network closet
67.Network based firewall
68. Anti-malware
69. Nac
70. Mon list
71. Mantrap 
72. Reflection
73. Threat
74. TEMPEST 
75. Tail gating 
76. Stateless inspection
77. Stateful inspection 
78. Spyware
79. Spoofing 
80. Reflection 
81. RF emanation
82. Rootkit 
83. Security Guard
84. Services 
85. Session Hijacking 
86. Signature 
87. Slash dotting 
88. Social Engineering 
89. SOHO firewall
90. Smurf attack 
91. Traffic spike
92. Trojan horse
93. Trusted user 
94. Unencrypted user
95. Unified Threat Management (UTM) 
96. Untrusted user
97. Video monitoring
98. Virus
99. Virus shield
100.  VLAN hopping 
101.  Vulnerability 
102. Worm
103. Zero-day attack
104. zombie 

Tuesday, March 3, 2020

Network+ Chapter 20 Power Words - Blank

Chapter 20 – Network Monitoring
  1. Log Management
  2. Managed device
  3. Managed network
  4. MIB
  5. Netflow 
  6. Netflow collector 
  7. NOC 
  8. Packet analyzer 
  9. Packet sniffer 
  10. Performance monitors 
  11. PDU
  12. Response Time 
  13. SIEM 
  14. Set 
  15. SMS
  16. SNMP manager
  17. SNM
  18. Top listener 
  19. Top talker
  20. Trap
  21. Variable
  22. Wireshark




Network+ Chapter 17 Power Words - Blank

Chapter 17 - Building a Real World Network
  1. Air Gap 
  2. CAN
  3. CoS
  4. Compatibility Requirements 
  5. Device Types/Requirements 
  6. DiffServ 
  7. DCS
  8. Environment Limitations
  9. Equipment Limitations
  10. H.320
  11. H.323 
  12. HMI 
  13. ICS Server 
  14. ICS 
  15. List of Requirements
  16. MGCP
  17. Medianet 
  18. Metro Ethernet
  19. Operator
  20. Power Converter 
  21. Power Redundancy 
  22. PLC
  23. RTP
  24. Real-time Video 
  25. RTU
  26. Security Considerations
  27. SIP 
  28. SCADA 
  29. UC Device
  30. UC Gateway
  31. UC Server 
  32. UC 
  33. VTC
  34. Wired/Wireless Considerations



Network+ Chapter 9A Power Words - Blank

Network + Chapter 9A
Defined
  1. A record
  2. Active Directory 
  3. Authoritative DNS server 
  4. Authoritative name server 
  5. Cached lookups
  6. Cache-only DNS server
  7. CNAME
  8. DNS root server 
  9. DNS server
  10. DNS tree 
  11. DIG 
  12. DNS 
  13. DDNS 
  14. Flat Name Space 
  15. Forward Lookup Zone 
  16. FQDN
  17. Hierarchical Name Space 
  18. Host Name
  19. Hosts File 

Network+ Chapter 2A Power Words - Blank

Chapter 2 - Network Models
  1. Application layer
  2. API 
  3. Broadcast 
  4. Broadcast Address
  5. CRC
  6. Data Link Layer
  7. Datagram
  8. De-encapsulation
  9. Device ID 
  10. Encapsulation
  11. EUI-48 
  12. Frame 
  13. FCS 
  14. Internet Layer
  15. IP
  16. IP Address
  17. Link Layer 
  18. Logical Address 
  19. Logical Addressing 
  20. LLC 
  21. MAC 
  22. MAC Address 
  23. Model
  24. NIC

Monday, March 2, 2020

Table Of Contents

A+

Chapter 1 - The Path of the PC Tech
Defined
Blank

Chapter 2 - Operational Procedures
Defined
Blank

Chapter 3 - The Visible Computer
Defined
Blank

Chapter 4 - Microprocessors
Defined
Blank

Chapter 5 - RAM
Defined
Blank

Chapter 6 - BIOS
Defined
Blank

Chapter 7 - Motherboards
Defined
Blank

Chapter 8 - Power Supplies
Defined
Blank

Chapter 9 - Hard Drive Technologies
Defined
Blank

Chapter 10 - Implementing Hard Drives
Defined
Blank

Chapter 11 - Essential Peripherals
Defined
Blank

Chapter 12 - Building a PC
Defined
Blank

Chapter 13 - Windows Under the Hood
Defined
Blank

Chapter 14 - Users, Groups. and Permissions
Defined
Blank

Chapter 15 - Maintaining and Optimizing Operating Systems
Defined
Blank

Chapter 16 - Working with the Command-Line Interface
Defined
Blank

Chapter 17 - Troubleshooting Operating Systems
Defined
Blank

Chapter 18 - Virtualization
Defined
Blank

Chapter 19 - Display Technologies
Defined
Blank

Chapter 20 - Essentials of Networking
Defined
Blank

Chapter 21 - Local Area Networking
Defined
Blank

Chapter 22 - Wireless Networking
Defined
Blank

Chapter 23 - The Internet
Defined
Blank

Chapter 24 - Portable Computing
Defined
Blank

Chapter 25 - Understanding Mobile Devices
Defined
Blank

Chapter 26 - Care and Feeding of Mobile Devices
Defined Coming Soon
Blank Coming Soon

Chapter 27 - Printers and Multi-function Devices
Defined
Blank

Chapter 28 - Securing Computers
Defined
Blank

Network+


Chapter 2A
Defined
Blank

Chapter 2B
Defined
Blank

Chapter 3
Defined
Blank

Chapter 4A
Defined
Blank

Chapter 4B
Defined
Blank

Chapter 5A
Defined
Blank

Chapter 5B
Defined
Blank

Chapter 6A
Defined
Blank

Chapter 6B
Defined
Blank

Chapter 7A
Defined
Blank

Chapter 7B
Defined
Blank

Chapter 8A
Defined
Blank

Chapter 8B
Defined
Blank

Chapter 9A
Defined
Blank

Chapter 9B
Defined
Blank

Chapter 10
Defined
Blank

Chapter 11A
Defined
Blank

Chapter 11B
Defined
Blank

Chapter 12A
Defined
Blank

Chapter 12B
Defined
Blank

Chapter 13
Defined
Blank

Chapter 14
Defined
Blank

Chapter 15
Defined
Blank

Chapter 16
Defined
Blank

Chapter 17
Defined
Blank

Chapter 18
Defined
Blank

Chapter 19
Defined
Blank

Chapter 20
Defined
Blank

Chapter 21
Defined
Blank

Thursday, February 27, 2020

Network+ Chapter 18 Power Words - Defined

Chapter 18 – Managing Risk
Blank
  1. Acceptable Group Policy - a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts
  2. Aircrack-ng - a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
  3. Approval Process - the method an organization uses to approve anything from documents, invoices, budgets, and purchase orders, to a new process that a company wants to institute
  4. Archive - place or store (something)
  5. Backup - an extra copy of data from a computer
  6. Business Continuity Plan (BCP) - the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery
  7. Chain of custody -  a document that is borrowed from law enforcement that tracks evidence from the time the Computer Forensics Examiner gains possession of the item until it is released back to the owner
  8. Change management - the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. ... In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain
  9. Change management team – Team that does change management
  10. Change request - a message sent between objects.
  11. Cold site -  a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.
  12. Computer forensics – forensics on a computer
  13. Contingency plan - A plan involving suitable backups, immediate actions and longer term measures for responding to computer emergencies such as attacks or accidental disasters. ... Also called a "disaster plan," a contingency plan must be updated periodically
  14. Disaster recovery – Recovery for a disaster
  15. Documentation – Recording what has been done
  16. Electronic discovery - refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case
  17. Electrostatic discharge (ESD) – Discharge that can harm you from working on computers 
  18. Exit plan – Plan for exit
  19. Fail closed  - is when a device or system is set, either physically or via software, to shut down and prevent further operation when failure conditions are detected
  20. Fail open - does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important that authentication
  21. First responder – First people to respond to an emergency
  22. Forensics report – Report from forensics
  23. Ground loop -  occurs when two points of a circuit both intended to be at ground reference potential have a potential between them.
  24. Heating, ventilation, and air conditioning (HVAC) – Cooling and heating systems
  25. High availability (HA) – Availability that is high
  26. Hot site -  a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster
  27. Incident - an event that is not part of normal operations that disrupts operational processes
  28. Incident response – Response to an incident 
  29. Legal hold -  a situation wherein a business or organization makes changes to its method of records management in order to preserve information because of a pending litigation
  30. Maintenance window – Windows for maintenance
  31. Material safety data sheet (MSDS) – Data sheet that shows safety for materials
  32. Memorandum of understanding (MOU) - A metric used to compute billing and/or statistics for telephone calls or other network use
  33. Metasploit - An open source attack framework 
  34. Microsoft baseline security analyzer (MBSA) – Baseline security analyzer developed by Microsoft
  35. Multi-source agreement (MSA) – Agreement with multiple sources
  36. Nessus - an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools
  37. Network access policy – Access policy for a network
  38. Nmap -  a free and open-source network scanner
  39. Penetration testing (PENTEST) – testing on a device to see if it can be penetrated or not
  40. Recovery point objective (RPO) – Objective for recovery points
  41. Recovery time objective (RTO) – Objective for time points
  42. Risk management - the process of identifying, assessing and controlling threats to an organization's capital and earnings
  43. Security policy – Policy for security
  44. Service level agreement (SLA) – Level agreement for services 
  45. Single point of failure – Point where the failure occurs
  46. Statement of work (SOW) - a document that enables offeror's to clearly understand the government's needs for the work to be done in developing or producing the goods or services to be delivered by a contractor
  47. Succession planning – Planning for succession
  48. Virtual IP – Virtual Internet Protocol 
  49. Vulnerability management – Management for vulnerability 
  50. Vulnerability scanner – Scanner that scans for vulnerability in your device
  51. Warm site -  a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down


Network+ Chapter 6B Power Words - Blank

Network+ Chapter 6B
  1. Near End Crosswalk 
  2. Race way 
  3. Run 
  4. Solid Core 
  5. Split Pair
  6. Punch down tool 
  7. Wire map 
  8. Work Area 
  9. Patch panel 
  10. Patch Cables 
  11. Smart Jacks 
  12. Stranded core –
  13. Solid Core 
  14. Near End Crosswalk 
  15. Unit 
  16. Split Paire.
  17. Punch down tool 
  18. Wire map 
  19. Work Area 
  20. Near End Crosswalk 



Wednesday, February 26, 2020

Network+ Chapter 4A Power Words - Blank


Network + Chapter 4A 
10base2 
10baseFL 
10baseT
802.3
BNC Connector 
Bnc coupler 
bridge 
bridging loop 
broadcast domain 
CSMA/CD 
collision domain 
crimper 
crossover cable
Ethernet 
frame
frame check sequence 
full duplex 
half duplex
hub 
MAC address 
media converter 

Network+ Chapter 5A Power Words - Blank

Network+ Chapter 5A Power Words
Defined
  1. 10GBaseER 
  2. 10GBaseEW
  3. 10GBaseLR 
  4. 10GBaseLW
  5. 10GBaseSR 
  6. 10GBaseSW 
  7. 10GBaseT .
  8. Gigabit Ethernet (10 GbE) 
  9. 100Base FX
  10. 100BaseT
  11. 100BaseT4
  12. 100BaseTX 
  13. 1000BaseCX 
  14. 1000BaseLX 
  15. 1000BaseT 
  16. 1000BaseTX
  17. 1000BaseX 
  18. 802.3ab 
  19. 802.3z 

Network+ Chapter 4B Power Words - Blank

Network Plus chapter 4 words

Defined
  1. Multimode
  2. Node
  3. Pad
  4. Ports
  5. Preamble
  6. Promiscuous mode
  7. Repeater
  8. RG 58
  9. RJ 45
  10. Segment
  11. Sneakernet
  12. Sniffer
  13. SAT
  14. STP
  15. Straight Though
  16. Switch
  17. T connector
  18. Thinnet
  19. TIA/EIA 568A
  20. TIA/EIA 568B
  21. Uplink Port
  22. UTP coupler

Network+ Chapter 2 Power Words - Blank

Chapter 2 – Network Models

Define
  1. Network Interface Layer 
  2. Network Layer
  3. Network Protocol 
  4. Open Systems Interconnection (OSI) seven-layer model
  5. Organizationally Unique Identifier (OUI)
  6. packet
  7. payload 
  8. physical address 
  9. Physical Layer
  10. Presentation Layer 
  11. protocol
  12. router
  13. segment
  14. Session Layer
  15. session software
  16. subnet
  17. switch 
  18. TCP segment
  19. Transmission Control Protocol (TCP)
  20. Transmission Control Protocol/Internet Protocol (TCP/IP) model
  21. Transport Layer
  22. UDP datagram
  23. Unshielded Twisted Pair (UTP)
  24. User Datagram Protocol (UDP)


Thursday, February 20, 2020

Network+ Chapter 21 Power Words - Defined

 Network+ Chapter 21 Power Words - Network Troubleshooting

  1. ARP- Address Resolution Protocol
  2. Arping- Uses ARP frames instead of ICMP
  3. Broadcast Storm- One of more devices sending nonstop broadcast frames to a network
  4. Butt Set- Tests if certain telephone lines can function correctly
  5. Cable Stripper- Supports creating UTP cables
  6. Cable Tester- Checks if a wire map is correct
  7. Certifier- Tests if a cable can handle a certain amount of capacity
  8. Dig- Linux command that diagnoses DNS problems
  9. End-to-end principle- In early days of networking, stated that apps and work only happens at endpoints in a network
  10. EoP- Ethernet over Power
  11. Hardware Tool- Tools that help configure a network
  12. HEC- HDMI Ethernet Channel
  13. Hostname- Command that displays your computer’s host name
  14. IEEE 1905.1- A hybrid networking standard with the goal of flexibility
  15. Ifconfig- UNIX command to display IP configurations
  16. IoT- Internet of Things
  17. Ip- Linux command to display IP configurations
  18. Ipconfig- Windows command to display IP configurations
  19. Light Meter- Another name for an optical power meter
  20. Line Tester- Checks the integrity of telephone writing
  21. Link Aggregation- Enables connections to work together simultaneously
  22. Looking Glass Site- Remote servers accessible by browser
  23. Multimeter- Tests voltage resistance and continuity
  24. Mtr- My Traceroute
  25. Nbtstat- Windows command that displays systems running in a network
  26. Netstat- Command that displays the current state of all running IP processes
  27. Network Appliance- Device that has to do with networking
  28. NIC teaming- Enables connections to work together simultaneously
  29. NSlookup- Windows command that diagnoses DNS problems
  30. nVoy- Branding for IEEE 1906.1
  31. Optical Power Meter- Measures the amount of light loss
  32. Packet Sniffer-Intercepts and logs network packets
  33. Pathping- Combines the commands ping and tracert
  34. Ping- Uses ICMP packets to query by IP or name
  35. Ping -6- A command used in Windows Command prompt
  36. Ping6- A command used in Linux and Unix command prompts
  37. Port Scanner- Program that probes ports on another system
  38. Protocol Analyzer- Monitor the different protocol
  39. Proxy ARP- Process of making remotely connected computers act like they are on a single LAN
  40. Punchdown Tool- Puts UTP wires into 66- and 110- blocks
  41. Route- Command that displays and edits local system routing tables
  42. Routing Loop- When network traffics repeats and slows down
  43. Snip- Synonym for cable stripper
  44. Speed-test Site- Used for internet connection throughput
  45. Switching Loop- Connecting and configuring multiple switches in a circle
  46. Temperature Monitor- Detects heat issues in server rooms
  47. Tone Generator- Backbone to a tone probe
  48. Tone Probe- Locates cables
  49. Traceroute- Traces all routers from one point to another
  50. Traceroute6- Displays IPv6 addresses for tracert in UNIX/Linux
  51. Tracert- Traces all routers from one point to another in Windows
  52. Tracert -6- Displays IPv6 addresses for tracert in Windows
  53. Voltage Event Recorder-Detects electricity issues in server rooms
  54. Wireshark- Popular GUI packet sniffer and analyzer

Network+ Chapter 14 Power Words - Defined

Network+ Chapter 14
Blank
  1. 3G: Third generation of wireless mobile telecommunications technology.
  2. 4G: A mobile communications standard intended to replace 3G, allowing wireless Internet access at a much higher speed.
  3. ADSL: Asymmetric digital subscriber line is a type of digital subscriber line technology.
  4. ATM: Asynchronous Transfer Mode; It is a switching technique that uses time division multiplexing for data communications.
  5. BRI: Basic Rate Access is an Integrated Services Digital Network configuration intended primarily for use in subscriber lines similar to those that have long been used for voice-grade telephone service.
  6. Baud: A common measure of symbol rate, one of the components that determine the speed of communication over a data channel.
  7. Baud rate: Rate at which information is transferred in a communication channel.
  8. B Channel: The channel that carries the main data. 
  9. BERT: A neural network-based technique for natural language processing pre-training.
  10. Bridged Connection:  A bridge allows you to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch.
  11. CCITT:  Primary international body for fostering cooperative standards for telecommunications equipment and systems.
  12. Central Office: A locality to which subscriber home and business lines are connected on what is called a local loop.
  13. CSU/DSU: A hardware device that converts a digital data frame from the communications technology used on a local area network.
  14. Circuit Switching: a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
  15. CWDM: A wavelength multiplexing technology for city and access network.
  16. DOCSIS: An international telecommunications standard that allows for the addition of high-bandwidth data transfer to an existing coaxial cable TV system.
  17. dB: A relative unit of measurement corresponding to one tenth of bel.
  18. Dedicated Line: A communications cable or other facility dedicated to a specific application.
  19. D Channel: A term which refers to the ISDN channel in which the control and signaling information is carried.
  20. Demultiplexer: A device that takes a single input line and routes it to one of several digital output lines.
  21. DWDM: A technology which multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths of laser light.
  22. Dial-Up Line: A telephone connection in a system of many lines shared by many users.



Wednesday, February 19, 2020

Network+ Chapter 15 Power Words - Defined

Chapter 15 - Wireless Networking
Blank
  1. 802.1X – IEEE Standard for port-based Network Access Control (PNAC).
  2. 802.11 – evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  3. 802.11a – an IEEE standard for transmitting data over a wireless network.
  4. 802.11a-ht - technical terms for mixed mode 802.11a/802.11g operation.
  5. 802.11b – one of several Wi-Fi standards developed by the Institute of Electrical and Electronics Engineers (IEEE).
  6. 802.11g – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
  7. 802.11g-ht – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
  8. 802.11i – a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards.
  9. 802.11n – a Wi-Fi standard that was introduced by the IEEE in 2007 and officially published in 2009.
  10. Ad hoc mode – The mode of operation in a peer-to-peer wireless network, such as Wi-Fi or Bluetooth, in which computers communicate with each other rather than to a central base station (access point).
  11. AES – is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
  12. Bandwidth saturation – is a phenomenon that occurs when all a circuits available bandwidth in a given direction is being utilized by a large upload or download.
  13. BSS – Basic Server Set.
  14. BSSID – Basic Server Set Identifier.
  15. Bounce – a method of hiding the source of a user's network connection.
  16. BYOD – Bring Your Own Device.
  17. CSMA/CA – Carrier Sense Multiple Access / Collision Avoidance.
  18. Channel – refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
  19. Channel bonding – a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices.
  20. Dead spot – a location within the coverage area of a wireless network where a signal is not received.
  21. Dipole Antenna – the simplest type of radio antenna, consisting of a conductive wire rod that is half the length of the maximum wavelength the antenna is to generate.
  22. DSSS – Direct Sequence Spread Spectrum.
  23. DCF – Distributed Coordination Function.
  24. Encryption – the process of encrypting or encoding data and messages transmitted or communicated over a computer network.
  25. Evil Twin – a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.
  26. ESS – Extended Service Set.
  27. ESSID – Extended Service Set Identifier.
  28. EAP – Extendable Authentication Protocol.
  29. FHSS – Frequency Hopping Spread Spectrum.
  30. Gain – the ratio of an output power to an input power.
  31. Greenfield Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
  32. IBSS – Independent Basic Service Set.
  33. Infrastructure Mode – an 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP).
  34. IFG – Interframe Gap.
  35. Latency – is the amount of time a message takes to traverse a system.
  36. Legacy Mode – is the generic name assigned to any old network, which is rarely used today and not part of the TCP/IP protocol suite.
  37. Link State – is a complex routing technique in which each router shares information with other routers about the reachability of other networks and the metric to reach the other networks in order to determine the best path.
  38. MAC addressing filtering – a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
  39. Mixed Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
  40. MIMO – Multiple in Multiple Out.
  41. NAS – Network Access Server.
  42. Network Name – a text string that devices use to reference a particular computer network.
  43. OFDM – Orthogonal Frequency Division Multiplexing.
  44. Peer-to-peer mode – computer systems which are connected to each other via the Internet.
  45. PAN – Personal Area Network.
  46. PCF – Point Coordination Function.
  47. Point-to-multipoint – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
  48. Point-to-point – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
  49. PoE – Power over Ethernet.
  50. RFI – Radio Frequency Interference.
  51. RADIUS server – a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  52. Roaming – the ability for a customer of mobile communications to automatically make and receive telephone calls, send and receive data, or access other services while travelling outside the geographical coverage area of the home network, by means of using a network of another operator.
  53. Rouge AP – an access point that has been installed on a secure network without explicit authorization from a system administrator.
  54. SSID – Service Set Identifier.
  55. Signal Strength – the magnitude of an electric field at a reference point, which is located at a significant distance from the transmitting antenna. This is expressed in terms of the signal power of the receiver or the voltage per length received by the reference antenna.
  56. Site Survey – the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service.
  57. SSID broadcast – the name of your wireless network.
  58. Supplicant – an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link.
  59. TKIP – Temporal Key Integrity Program.
  60. Thick client – full-featured computers that are connected to a network.
  61. Thin Client – a client designed to be especially small so that the bulk of the data processing occurs on the server.
  62. Transmit beamforming – a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna, as it normally would.
  63. Unidirectional antenna – Basically give off bad signals.
  64. VLAN pooling – a feature that enables you to group multiple wireless controller VLANs to form a VLAN pool.
  65. Wi-Fi – an abbreviation for wireless fidelity.
  66. Wi-Fi analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
  67. WPA – Wi-Fi Protected Access.
  68. WPA2 – Wi Fi Protected Access 2.
  69. WPS – Wi-Fi Protected Setup.
  70. WEP – Wired Equivalent Privacy.
  71. WAP – Wireless Access Point.
  72. Wireless analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
  73. Wireless bridge – A device that connects two LAN segments together via infrared or microwave transmission.
  74. Wireless controller – used in combination with the Lightweight Access Point Protocol to manage light-weight access points in large quantities by the network administrator or network operations center.
  75. WLAN – Wireless LAN.
  76. Wireless Network – a computer network that uses wireless data connections between network nodes.
  77. Wireless Survey tool – a physical survey of the premises where the wireless network will be installed.
  78. WPA2-Enterprise – is the security method added to WPA for wireless networks that provides stronger data protection and network access control.