Welcome to our glossary page, where you can familiarize yourself with the key terms and concepts used in our wireless network solutions at TPK Advanced Wireless. This resource is designed to help you better understand the technologies and services that ensure your network performs optimally.
802.11
A family of IEEE standards for wireless local area networking (WLAN). These standards define the protocols and specifications for wireless communication between devices within a local network, including data transmission rates, frequency bands, modulation techniques, and security protocols.
Access Point (AP)
A device that allows wireless devices to connect to a wired network using Wi-Fi or related standards. The AP can be mounted on a ceiling, wall, or other structure and is essential in extending the wireless coverage in a building.
Active Survey
Involves connecting to a wireless network to measure real-world performance metrics like throughput, latency, and roaming capabilities. This survey type simulates actual user experiences on the network.
Antenna
A passive device that transmits and receives electromagnetic waves. It converts electrical signals into radio waves for transmission or vice versa for reception. They come in various designs and configurations optimized for specific frequency bands and applications. TPK can help provide a wide array of options to meet these needs.
AP on a Stick (APoS)
A method of surveying where a test access point is mounted on a pole or tripod, strategically placed in various locations to measure signal coverage and strength. It helps in designing optimal wireless network deployments.
Artificial Intelligence (AI)
Technologies and algorithms used to simulate human intelligence processes by machines, especially computer systems. In the context of wireless networks, AI is used for automated troubleshooting, predictive analytics, and proactive network management.
Bandwidth
The maximum rate of data transfer across a given path. In wireless networks, sufficient bandwidth ensures efficient handling of internet and intranet traffic, essential for operations like video conferencing and cloud computing.
Behavioral Profiling
A method used by AI engines to learn and predict the normal functioning of a network, which helps in quickly identifying and rectifying deviations from the norm.
Break Fix
A service model focused on providing support when technical issues occur. TPK addresses issues ranging from RF interference to outdated configurations, enhancing network efficiency and user experience.
BYOD (Bring Your Own Device)
A policy allowing employees to use their personal laptops, smartphones, or tablets for work purposes, often enhancing flexibility and productivity while requiring measures to maintain security and manageability.
CCI (Co-Channel Interference)
Occurs when multiple devices are operating on the same frequency or channel, which causes interference and contention on the wireless medium and can degrade overall performance.
Cloud Management
Managing and monitoring wireless networks through a web-based platform accessible via the internet, offering simplified management, scalability, remote accessibility, automatic updates, and enhanced visibility and analytics. It allows administrators to efficiently oversee multiple Wi-Fi access points and network infrastructure devices from anywhere, optimizing network performance and user experience while reducing operational complexity.
Device Fingerprinting
A security measure that identifies and classifies devices based on their specific characteristics and behaviors, enhancing network security protocols.
Device Pattern Recognition
Technology that analyzes the habitual data of network devices to enhance security and performance monitoring.
DFS (Dynamic Frequency Selection)
Feature that allows access points to detect and avoid interference from radar systems, particularly on the 5 GHz bands.
DHCP (Dynamic Host Configuration Protocol)
A network management protocol used on IP networks whereby a server dynamically assigns an IP address and other network configuration parameters to each device on a network, so they can communicate with other IP networks.
Enclosure
A protective housing designed to safeguard an access point. They come in various form factors depending on the application and environmental requirements including preventing physical damage, preventing unauthorized access to hardware, maintaining proper operating temperature, and enhance aesthetics. TPK can help provide a wide array of options to meet these needs.
Encryption
The process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information.
IoT (Internet of Things)
Network of interconnected devices, such as sensors, that can collect and exchange data with other devices or systems enabling automation, monitoring, and control across multiple verticals. The number of wireless IoT devices is expected to double by 2030.
Mesh
System where multiple access points associate to each other to provide seamless coverage over a large area, effectively eliminating Wi-Fi dead zones and improving overall network performance particularly where cabling is not a viable option.
MIMO (Multi-Input Multi-Output)
Technology that improves throughput and reliability by utilizing multiple antennas at both the transmitter and receiver to create multiple wireless communication paths.
NAC (Network Access Control)
Security technology used to control and restrict access to network resources based on the identity, security posture, and compliance status of devices seeking to connect to the network.
Non-WiFi Interference
Disturbances from electronic devices and other sources that are not part of the Wi-Fi network but can affect wireless signal quality and performance, such as Bluetooth, microwave ovens, fluorescent lights, and RF Jammers.
Passive Survey
This type of survey involves listening to Wi-Fi data from all available networks without connecting to them. It is used to create a heatmap of existing coverage and identify rogue devices and potential sources of interference.
Performance Test Suite
A collection of tests designed to measure and evaluate the performance of network services and infrastructure.
Predictive Survey
Uses software to simulate wireless network behavior and predict future coverage and performance. It is useful in planning network installations in new buildings or spaces without needing physical site visits.
PSK (Pre-Shared Key)
Simple and straight forward method of securing wireless networks by requiring users to enter a passphrase before they can connect. Commonly used in WPA2-Personal or home networks. Not to be confused with SAE (Simultaneous Authentication of Equals).
RADIUS (Remote Authentication Dial-In User Service)
A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
RF Spectrum
The range of radio frequencies used to transmit data wirelessly. The RF spectrum survey measures these frequencies to identify optimal channels and settings, improving network performance.
Rogue
Unauthorized and unmanaged access points or client devices that are operating within the WLANs space without the approval of network administrators. Rogues may pose security risks and should be identified and remediated as part of an overall security posture.
RSSI (Received Signal Strength Indicator)
A measurement of the power present in a received radio signal, which is crucial for assessing the signal quality and coverage of an access point.
RTLS (Real-Time Location Services)
Technology used to track the physical location of objects, such as client devices or RF tags, in real-time. This can use a number of methods including triangulation, Bluetooth Low Energy (BLE), or time-of-arrival to calculate the position.
SAE (Simultaneous Authentication of Equals)
Method used to secure wireless WPA3-Personal networks and is a replacement to PSK as it still requires users to enter a passphrase but includes additional authentication messages to provide stronger security than PSK and protect the traffic from offline dictionary attacks.
Security Audit
A thorough inspection and analysis of the security of a network's infrastructure, aimed at identifying and mitigating potential vulnerabilities.
Site Surveys
Assessments conducted to understand the environment where a wireless network will operate. These surveys help in planning and optimizing the network layout to ensure comprehensive coverage and performance.
Site Survey Tools
Products provided by industry leading companies, such as Ekahau, AirMagnet, Metageek, Wyebot, and Hamina to help design and maintain Wi-Fi networks, providing features for site surveys, planning, and troubleshooting wireless networks.
SNR (Signal to Noise Ratio)
Measurement of the quality of the received signal relative to the level of interference or background noise in the environment. A higher SNR generally indicates better signal quality and higher data rates.
Spectrum Survey
Measures raw radio frequency spectrum to identify interference sources and determine optimal settings for network channels, essential for troubleshooting and optimizing wireless networks.
SSID (Service Set Identifier)
The technical term for a network name. When you set up a wireless home network, you give it a name to distinguish it from other networks in your vicinity.
Synthetic Network Tests
Tests run to simulate user interactions with the network to ensure performance standards are met continuously.
Throughput
The rate at which data is successfully transmitted from one location to another, crucial in evaluating the performance of a network.
Wi-Fi
Stands for Wireless Fidelity. The name was chosen as a catchy play on the term Hi-Fi (High Fidelity), which is used to describe high-quality audio equipment. “Wi-Fi” itself doesn’t have any technical significance. It is a marketing-friendly name for IEEE 802.11 wireless networking standards.
Wireless Connectivity and Internet Connectivity/Ping Test
Standard procedures to evaluate the stability and speed of a network connection, essential for maintaining network reliability.
Wireless Intelligence Platform (WIP)
A comprehensive system designed to proactively monitor, troubleshoot, and optimize wireless networks, ensuring operational efficiency and reducing downtime.
WPA3 (Wi-Fi Protected Access 3)
The latest security protocol and the newest generation of Wi-Fi security, providing cutting-edge security protocols to protect wireless networks.
Wyebot
TPK’s AI-driven tool used for wireless network management. It helps in proactive troubleshooting, performance analytics, and operational optimization, ensuring networks meet the demands of modern business environments.
For more detailed information on how TPK Advanced Wireless can tailor these technologies to fit your business needs, please contact us. Our experts are ready to assist you in achieving a robust and efficient wireless network solution.
Copyright © 2024 TPK Advanced Wireless - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.