Dedicated block-based storage, leveraging a high-speed architecture that interconnects and delivers shared pools of storage devices to multiple servers. A SAN makes its data act as if it were locally attached.
Storage Area Network (SAN)
A device that allows for Wi-Fi connectivity on a wired network.
Access point (AP)
A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
Spectrum analyzer
Any unauthorized access point added to a network.
Rogue access point
A protocol used in TCP/IP networks' data storage solutions. The advantage is the speed of data flow.
Internet Small Computer Systems Interface (iSCSI)
A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
Wi-Fi Protected Access (WPA)
A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
Site survey
The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
Data emanation
An approach to network management that lets you centrally control (or program) a network intelligently using a software application.
Software-Defined Network (SDN)
Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
Advanced Encryption Standard (AES)
where each AP stands alone, providing separate wireless networks by using its own independent configuration.
Independent access points
A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
Interference
Converts voice and fax calls between the PSTN and your IP network in real time.
VoIP gateway
The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communication transmission and broadcasting.
Radio frequency (RF)
In this configuration, a wireless controller is connected to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
Hub and spoke
An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
Omnidirectional antenna
The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
Bandwidth saturation
An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this attack to stage evil twin or on-path attacks.
Deauthentication attack
An authentication method that requires clients to provide a MAC address to connect to the wireless network.
Open authentication
An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
802.1x authentication