Remote Authentication Dial-In User Service, used by some authenticating servers to identify valid PPP connections, commonly for dial-up users. RADIUS can be used to authenticate many services, including wireless network users.
A component of a WDS that shares the main base station's Internet connection and passes on the connection to other remote or relay base stations.
A component of a WDS that shares the main base station's Internet connection.
Apple's name for the technology known as Zeroconf, a set of protocols which allow devices on a network (wired or wireless) to self-identify what services they can handle, thereby eliminating setup.
Radio Frequency, a method (on its way out) for connecting devices such as keyboards and mice wirelessly to a computer.
The ability to get cellular access while outside of your provider's service area.
A single wireless network consisting of multiple base stations with the same SSID hooked up to an Ethernet network.
A device on a network that handles figuring out where on the network packets should be sent.
A secure way to transfer files, replacing rcp.
A secure way to transfer files, replacing FTP.
A smart card placed inside a GSM phone that identifies the user account to the network.
A device on a Bluetooth piconet, paired to a single master device.
Short Message Service, a way to send text messages between GSM cell phones.
See Internet sharing.
Secure Shell. Lets users initiate a shell session (similar to Telnet) or exchange files with a remote server, with the information exchanges encrypted.
Service Set Identifier, a name that uniquely defines a wireless local network.
Spread Spectrum Technology, which spreads conversations across wide segments of the cellular broadcast spectrum.
An IP address that is assigned by an ISP, which (in return for a higher payment) is set to not change. See Dynamic IP address.
A sequence of bits that specifies the network that an IP address is part of.
In a WLAN using 802.1X, a user (called the supplicant) requests access to the authenticator. The authenticator then requests the supplicant's identity, which is then passed to an authenticating server, which then either accepts or rejects the supplicant.
A hub with additional features that allow it to do a better job of routing packets.
An input method for writing SMS messages with a cell phone keypad; faster than multitap.
Transmission Control Protocol/Internet Protocol, the networking standard used by the Internet.
A 16-bit number (between 1 and 65535) used by the TCP/IP protocol to address services that run on a computer, such as an FTP server or a Web server.
Time Division Multiple Access was the predecessor of GSM. TDMA operates similarly to network packet switching?it divides the signal into multiple segments, thereby allowing multiple calls to take place.
In a cellular network, a portion of time allocated to transmit data.
Temporal Key Integrity Protocol, a short-term solution for solving WEP's problems by using 128-bit dynamic keys that are utilized by different clients. Because of the changing keys, intruders would not have time to collect enough packets to compromise the security scheme.
The transmission of private data securely through a public network.
Universal Mobile Telephone Service is a 3G broadband standard. It provides a packet-based standard for cellular telephones which is planned to allow data transmissions of up to 2 Mbps.
A Virtual Private Network is a method of allowing remote users to securely work as though they are connected to a local network.
A Wide Area Network is a computer network that is spread out over multiple physical locations. See also LAN.
Wireless Application Protocol, standards to enable wireless devices to access the Internet.
Symbols (usually written in chalk) on the outside of buildings, denoting the existence of a wireless network.
Driving in a car while searching for wireless networks.
Wideband CDMA is a 3G version of CDMA.
Wireless Distribution System, a scheme that allows multiple base stations to act as a single wireless network.
Wired Equivalent Privacy, an early security protocol that had the goal of making wireless networks as secure as wired networks but has since proven insecure.
Short for Wireless Fidelity, Wi-Fi is the shorthand term for wireless technologies such as 802.11b and 802.11g.
A device that fulfills both the functions of a router and an Access Point.
An ISP that provides wireless access.
A Wireless Local Access Network (LAN), a network to which a computer can be wirelessly connected.
Wi-Fi Protected Access, an interim wireless security protocol designed to improve on WEP, before the 802.11i specification is eventually ratified.