Wireless Terms and Definitions (Video)

Article ID: ART168376 | Date published: 08/11/2017 | Date last updated: 01/25/2018
 

Description

The following video contains Wireless Key Terms and Definitions.

Solution

Please click the arrow below to view the video on YouTube.



2.  If you are having problems viewing the video Click Here.

Transcript below of the definitions included from this video:
Wireless LAN – A local, wireless area network that links two or more computers or wireless-enabled devices so they can communicate together.
 
Router or Access Point –   These terms are sometimes used interchangeably.  A router is a device that can connect two or more networks; connectivity can be wired and (or) wireless.  Most, but not all routers are wireless.  Typically, an Access Point will have wireless capabilities.  When it does, it will allow wireless communication devices to connect to a wireless network using various standards, like Wi-Fi.
 
SSID – This is the name of your wireless network and stands for Service Set Identifier.
 
Firewall – This is software technology that protects your computer from unauthorized or unwanted access from outside intruders[C1] .
 
Network Key – This is simply a password which protects your wireless network from unwanted intruders. You may also see it referred to as Pass Key or Pass Phrase.
 
WPS – Stands for Wi-Fi Protected Setup and is a one-button configuration that is also known as “One Touch” and “Push ‘and’ Connect.” You don’t need to know keys or security settings. All you need for this setup is a WPS-enabled router.  We’ll help you check to see if you have one later.
 
WEP – Stands for Wired Equivalent Privacy, its intention is to provide data confidentiality comparable to that of a traditional wired network. WEP is widely in use and is often the first security choice presented to users by router configuration tools.
 
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

 

Rate this Article
Was this article helpful?
Yes, This document is helpful
No, This document needs a clearer explanation
 
Please provide your comments