Beans
Beans 2
Hummus
The Noid
100

Dedicated block-based storage, leveraging a high-speed architecture that interconnects and delivers shared pools of storage devices to multiple servers. A SAN makes its data act as if it were locally attached.

Storage Area Network (SAN)

100

A device that allows for Wi-Fi connectivity on a wired network.

Access point (AP)

100

A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.

Spectrum analyzer

100

Any unauthorized access point added to a network.

Rogue access point

200

A protocol used in TCP/IP networks' data storage solutions. The advantage is the speed of data flow.

Internet Small Computer Systems Interface (iSCSI)

200

A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.

Wi-Fi Protected Access (WPA)

200

A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.

Site survey

200

The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.

Data emanation

300

An approach to network management that lets you centrally control (or program) a network intelligently using a software application.

Software-Defined Network (SDN)

300

Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.

Advanced Encryption Standard (AES)

300

where each AP stands alone, providing separate wireless networks by using its own independent configuration.

Independent access points

300

A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.

Interference

400

Converts voice and fax calls between the PSTN and your IP network in real time.

VoIP gateway

400

The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communication transmission and broadcasting.

Radio frequency (RF)

400

In this configuration, a wireless controller is connected to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).

Hub and spoke

400

An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.

Omnidirectional antenna

500

The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.

Bandwidth saturation

500

An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this attack to stage evil twin or on-path attacks.

Deauthentication attack

500

An authentication method that requires clients to provide a MAC address to connect to the wireless network.

Open authentication

500

An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.

802.1x authentication

M
e
n
u