Wireless network that requires no authentication.
Open Network
Wireless communication technology that allows two devices to connect to each other over a short distance.
Bluetooth
Translates hostnames to IP addresses.
Domain Name System (DNS)
Used for outgoing emails and operates on port 25.
Simple Mail Transfer Protocol (SMTP)
A smaller network that does not make use of servers to handle network resources or enterprise level switches to connect devices.
Small office/home office network (SOHO)
A method that combines channels into one to increase bandwidth.
Channel Bonding
Wireless authentication method that uses a passphrase to authenticate users.
Pre-shared key (PSK)
Automatically assigns the IP configuration when a device connects to the network.
Dynamic Host Configuration Protocol (DHCP)
Internet appliance that monitors incoming and outgoing emails to reduce spam from affecting the network.
Spam gateway
A protocol that allows multiple computers to share a single public IP address on the internet.
Network Address Translation (NAT)
A communication method that allows two-way communication between two devices within a few centimeters of each other.
Near Field Communication (NFC)
A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
Radio Frequency Identification (RFID)
A domain name that spells out each level of the hierarchy.
Fully Qualified Domain Name (FQDN)
Used for incoming emails and operates on port 110. Emails are downloaded to the local computer and then removed from the email server.
Post Office Protocol version 3 (POP3)
known as a demilitarized zone (DMZ), is used to place a device on the network that should be open to external users while still protecting the internal network.
Screened subnet
Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
Wi-Fi Protected Access (WPA)
Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
Captive portal
An internet appliance typically configured to monitor all incoming and outgoing network traffic and determines if the traffic is allowed or not.
Proxy server
Internet appliance that monitors servers and distributes network traffic so one server doesn't get overwhelmed.
Load balancer
A method that allows the frequency of the wireless network to be fine-tuned.
Wireless channel
Secure authentication method for wired and wireless networks.
802.1x authentication
IEEE designation for all wireless networking standards.
802.11
Used for incoming emails and operates on port 143. Emails are kept on the email server allowing users to access email from multiple devices.
Internet Message Access Protocol (IMAP)
DNS record that matches a hostname to its IP address.
Forward lookup zone
An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
Multi-user multiple-input multiple-output (MU-MIMO)