Skip to: |

Newegg.com - A great place to buy computers, computer parts, electronics, software, accessories, and DVDs online. With great prices, fast shipping, and top-rated customer service - once you know, you Newegg.

If you are reading this message, Please click this link to reload this page.(Do not use your browser's "Refresh" button). Please email us if you're running the latest version of your browser and you still see this message.

Newegg.com - Computer Parts, Laptops, Electronics, HDTVs, Digital Cameras and More!

Sign up today for a 30-day free trial of Newegg Premier
  • Black November
  • Wish List
  • Feedback
  • Help
Search all
Search
Home
Home > 
All Learning Center > 
Wireless Routers > 
Wireless Routers Glossary
 

Wireless Routers Glossary

Table of contents


0~9

802.11a

802.11a is an IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz.

802.11b

802.11b is an IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.

802.11g

802.11g is an IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz, and it comes with the backward compatibility with 802.11b devices.

NOTE:  802.11b and 802.11g standards use the 2.4 gigahertz(GHz) band. Because of this choice of frequency band, 802.11b and 802.11g equipment can incur interference from microwave ovens, cordless telephones, bluetooth devices, and other appliances using this same band. The 802.11a standard uses the 5 GHz band, and is therefore not affected by products operating on the 2.4 GHz band.

802.11n

The next generation of high-speed wireless networking standard, the draft 802.11n standard specifies a maximum data transfer rate of up to 540Mbps. It is built on the basis of previous 802.11 standards with the addition of MIMO (multiple-input multiple-output) technology. It is required to be backward compatible and interoperable with 802.11b/g devices. The final 802.11n specification is expected to be approved in 2007 so that contemporary 802.11n-supporting products can provide different maximum data transfer rates (e.g. 270Mbps, 300Mbps)



^ Back to top

A~L

AP

The AP (Access Point) is a device that allows wireless-equipped computers and other devices to communicate with a wired network. An installed wireless adapter must communicate and connect to an Access Point to provide a computer with access to a wireless network.

Byte

A unit of data that is usually eight bits long.

IPSec

IPSec (IP Security) is a protocol used to secure the exchange of data packages at the IP layer. It is widely used in VPNs to protect data packages.

Kbps

Kbps (Kilobits or 1 thousand bits per Second) is a unit of measurement for data transmission.

L2TP

Layer Two Tunneling Protocol, a tunneling protocol used to support VPNs.

LAN

Local Area Network, a small-area computer network—the home network is a typical example.


^ Back to top

M~Z

MAC address

Media Access Control address – e.g. 00-05-5D-85-6A-74.

Mbps

Mbps (Megabits 1 million bits per Second) is a unit of measurement for data transmission.

PPTP

Point-to-Point Tunneling Protocol, a method used to create VPNs to secure data message between two VPN nodes.

SSID

Service Set Identifier, the ID or name of wireless network. It can be a string of up to 32 alphanumeric characters. The wireless network client must know the SSID before it can make a wireless connection to the network.

VPN

VPN is short for Visual Private Network. It is used to secure the actual transmission of data from one specific location to location over the network (in most cases the Internet). Only authorized users can access the VPN and data cannot be intercepted.

WAN

WAN (Wide Area Network) is a computer network in a large area containing two or more LANs. For example, the Internet is the world’s largest WAN.

WEP

WEP (Wired Equivalent Privacy) is a security protocol for wireless networks. It aims to protect data via encryption over radio waves with point-to-point transmission. A shared key (similar to a password) is used to allow communication between the wireless adapter and the wireless AP/router.

WPA

WPA (Wi-Fi Protected Access) is built on the foundation of WEP. WPA also protects wireless data transmission via a key similar to WEP, but the added strength of WPA is in its automatic encryption key changes making it much more difficult for a hacker to invade a wireless network.

WPA2

As the successor to WPA, WPA2 (Wi-Fi Protected Access 2) is offered to users requiring the highest level of wireless security and is capable of offering a stronger encryption mechanism over WPA via AES (Advanced Encryption Standard).


^ Back to top

« Wireless Routers Glossary
Home Network Building Guide »
 
Shop by Region: United States | Canada | China
VeriSign Click for the BBB Business Review of this Computers - Supplies & Parts in Whittier CAThis site protected by Trustwave's Trusted Commerce program Inc500
Policy & Agreement | Privacy Policy    All rights reserved.
If the Adobe Reader does not appear when you click on a link for a PDF file, you can download Adobe Reader from the Adobe web site.