CWAP Certified Wireless Analysis Professional
CWDP Certified Wireless Design Professional
CWNA Certified Wireless Network Administrator
CWNE Certified Wireless Network Expert
CWNT Certified Wireless Network Trainer
CWSP Certified Wireless Security Professional
CWTS Certified Wireless Technology Specialist
ACMA Australian Communications and Media Authority
ARIB Association of Radio Industries and Businesses (Japan)
ATU African Telecommunications Union
CEPT European Conference of Postal and Telecommunications Administrations
CITEL Inter-American Telecommunication Commission
CTIA Cellular Telecommunications and Internet Association
CWNP Certified Wireless Network Professional
DoD Department of Defense
ERC European Radiocommunications Committee
EWC Enhanced Wireless Consortium
FCC Federal Communications Commission
FIPS Federal Information Processing Standards
GLBA Gramm-Leach-Bliley Act
HIPAA Health Insurance Portability and Accountability Act
IANA Internet Assigned Number Authority
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
ISO International Organization for Standardization
ITU-R International Telecommunications Union Radio Communication Sector
NEMA National Electrical Manufacturers Association
NIST National Institute of Standards and Technology
PCI Payment Card Industry
RCC Regional Commonwealth in the field of Communications
SEE-Mesh Simple, Efficient, and Extensible Mesh
SOX Sarbanes–Oxley
UTMS Universal Mobile Telecommunications System
WECA Wireless Ethernet Compatibility Alliance
WIEN Wireless Interworking with External Networks
Wi-Fi Alliance Wi-Fi Alliance
WiMA Wi-Mesh Alliance
WNN Wi-Fi Net News
dB decibel
dBd decibels referenced to a dipole antenna
dBi decibels referenced to an isotropic radiator
dBm decibels referenced to 1 milliwatt
GHz gigahertz
Hz hertz
KHz kilohertz
mA milliampere
MHz megahertz
mW milliwatt
SNR signal-to-noise ratio
V volt
VDC voltage direct current
W watt
3DES Triple DES
AA authenticator address
AAA authorization, authentication, and accounting
AAD additional authentication data
AC access category
AC access controller
AC alternating current
ACK acknowledgment
ACL access control list
AD Active Directory
AES Advanced Encryption Standard
AGL above ground level
AH Authentication Header
AID association identifier
AIFS arbitration interframe space
AKM authentication and key management
AM amplitude modulation
AMPE authenticated mesh peering exchange
A-MPDU Aggregate MAC Protocol Data Unit
A-MSDU Aggregate MAC Service Data Unit
ANonce authenticator nonce
AP access point
API application programming interface
APN Apple Push Notification
APSD automatic power save delivery
ARC4 Alleged RC4
ARP Address Resolution Protocol
ARS adaptive rate selection
ARS automatic rate selection
AS authentication server
ASCII American Standard Code for Information Interchange
ASK amplitude shift keying
ATF airtime fairness
ATIM announcement traffic indication message
AVP attribute–value pair
BA Block Acknowledgment
BER bit error rate
BIP broadcast/multicast integrity protocol
BPSK binary phase shift keying
BSA basic service area
BSS basic service set
BSSID basic service set identifier
BT Bluetooth
BVI bridged virtual interface
BYOD bring your own device
CA certificate authority
CAD computer-aided design
CAM content addressable memory
CAM continuous aware mode
CAPWAP Control and Provisioning of Wireless Access Points
CBC Cipher-Block Chaining
CBC-MAC Cipher Block Chaining Message Authentication Code
CBN cloud-based networking
CCA clear channel assessment
CC-AP cooperative control access point
CCI co-channel interference
CCK Complementary Code Keying
CCKM Cisco Centralized Key Management
CCM Counter with CBC-MAC
CCMP Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CCX Cisco Compatible Extensions
CDE cardholder data environment
CDMA2000 code division multiple access 2000
CDP Cisco Discovery Protocol
CEN cloud-enabled network
CF CompactFlash
CF contention free
CFP contention-free period
CHAP Challenge Handshake Authentication Protocol
CKIP Cisco Key Integrity Protocol
CLI command-line interface
CN common name
CoA Change of Authorization
COW computer on wheels
CP contention period
CRC cyclic redundancy check
CRM customer relationship management
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance
CSMA/CD Carrier Sense Multiple Access with Collision Detection
CSR certificate-signing request
CTL Certified Trust List
CTR Counter mode
CTS clear to send
CW contention window
CWG-RF Converged Wireless Group-RF Profile
DA destination address
DBPSK differential binary phase shift keying
DC direct current
DCF Distributed Coordination Function
DDF distributed data forwarding
DDoS distributed denial of service
DECT Digital Enhanced Cordless Telecommunications
DES Data Encryption Standard
DFS dynamic frequency selection
DHCP Dynamic Host Configuration Protocol
DIFS Distributed Coordination Function interframe space
DLS direct link setup
DoS denial of service
DPI deep packet inspection
DQPSK differential quadrature phase shift keying
DRS dynamic rate switching
DS distribution system
DSAS distributed spectrum analysis system
DSCP differentiated services code point
DSM distribution system medium
DSP digital signal processing
DSRC Dedicated Short Range Communications
DSS distribution system services
DSSS direct sequence spread spectrum
DSSS-OFDM direct sequence spread spectrum-orthogonal frequency division multiplexing
DTIM delivery traffic indication message
DTLS Datagram Transport Layer Security
DMZ demilitarized zone
EAP Extensible Authentication Protocol
EAPOL Extensible Authentication Protocol over LAN
EAP-AKA Extensible Authentication Protocol-Authentication and Key Agreement
EAP-FAST Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling
EAP-GTC Extensible Authentication Protocol-Generic Token Card
EAP-LEAP Extensible Authentication Protocol-Lightweight Extensible Authentication Protocol
EAP-MD5 Extensible Authentication Protocol-Message Digest5
EAP-MSCHAPv2 Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol
EAP-PEAP Extensible Authentication Protocol-Protected Extensible Authentication Protocol
EAP-POTP Extensible Authentication Protocol-Protected One-Time Password Protocol
EAP-SIM Extensible Authentication Protocol-Subscriber Identity Module
EAP-TEAP Extensible Authentication Protocol-Tunneled Extensible Authentication Protocol
EAP-TLS Extensible Authentication Protocol-Transport Layer Security
EAP-TTLS Extensible Authentication Protocol-Tunneled Transport Layer Security
ECDH Elliptic Curve Diffie-Hellman
ECDSA Elliptic Curve Digital Signature Algorithm
EDCA Enhanced Distributed Channel Access
EEG enterprise encryption gateway
EIFS extended interframe space
EIRP equivalent isotropically radiated power
EM electromagnetic
EQM equal modulation
ERP Extended Rate Physical
ERP-CCK Extended Rate Physical-Complementary Code Keying
ERP-DSSS Extended Rate Physical-Direct Sequence Spread Spectrum
ERP-OFDM Extended Rate Physical-Orthogonal Frequency Division Multiplexing
ERP-PBCC Extended Rate Physical-Packet Binary Convolutional Coding
ESA extended service area
ESP Encapsulating Security Payload
ESS extended service set
ESSID extended service set identifier
EUI extended unique identifier
EWG enterprise wireless gateway
FA foreign agent
FAST Flexible Authentication via Secure Tunnel
FCS frame check sequence
FEC forward error correction
FHSS frequency-hopping spread spectrum
FILS fast initial link setup
FM frequency modulation
FMC fixed mobile convergence
FSK frequency shift keying
FSPL free space path loss
FSR fast secure roaming
FT fast BSS transition
FTAA FT authentication algorithm
FTIE fast BSS transition information element
FZ Fresnel zone
GCM Google Cloud Messaging
GCMP Glaois/Counter Mode Protocol
GFSK Gaussian frequency shift keying
GI guard interval
GMK group master key
GPO Group Policy Object
GPS Global Positioning System
GRE Generic Routing Encapsulation
GSM Global System for Mobile Communications
GTC Generic Token Card
GTK group temporal key
GUI graphical user interface
HA home agent
HC hybrid coordinator
HCCA Hybrid Coordination Function Controlled Channel Access
HCF Hybrid Coordination Function
HMAC Hashed Message Authentication Code
HR-DSSS high-rate direct sequence spread spectrum
HSRP Hot Standby Router Protocol
HT High Throughput
HTTPS Hypertext Transfer Protocol Secure
HWMP Hybrid Wireless Mesh Protocol
Hz Hertz
IAPP Inter-Access Point Protocol
IBSS independent basic service set
ICMP Internet Control Message Protocol
ICV Integrity Check Value
IdP Identity provider
IDS intrusion detection system
IE Information Element
IFS interframe space
IKE Internet Key Exchange
IoT Internet of Things
IP Internet Protocol
IPS intrusion prevention system
IPsec Internet Protocol Security
IR infrared
IR intentional radiator
IS integration service
ISAKMP Internet Security Association and Key Management Protocol
ISI intersymbol interference
ISM Industrial, Scientific, and Medical
ITS intelligent transportation systems
IV initialization vector
JDBC Java Database Connectivity
KCK Key Confirmation Key
KEK Key Encryption Key
L2TP Layer 2 Tunneling Protocol
LAN local area network
LBAC location-based access control
LCI location configuration information
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
LLC Logical Link Control
LLDP Link Layer Discovery Protocol
L-LTF Legacy (non-HT) long training field
LOS line of sight
LWAPP Lightweight Access Point Protocol
MAC media access control
MAHO Mobile Assisted Hand-Over
MAN metropolitan area network
MAP mesh access point
MCA multiple-channel architecture
MCS modulation and coding scheme
MD mobility domain
MD5 Message Digest5
MDC mobility domain controller
MDID mobility domain identifier
MDIE mobility domain information element
MDI media-dependent interface
MDM mobile device management
MFP management frame protection
MIB management information base
MIC Message Integrity Code
MIMO multiple-input multiple-output
MMPDU Management MAC Protocol Data Unit
MPDU MAC Protocol Data Unit
MP mesh point
MPP mesh point collocated with a mesh portal
MPPE Microsoft Point-to-Point Encryption
MRC maximal ratio combining
MSDU MAC Service Data Unit
MSK master session key
MSSID Mesh Service Set Identifier
MTBA multiple traffic ID block acknowledgment
MTK mesh temporal key
MTU maximum transmission unit
MU-MIMO multiuser MIMO
mW milliwatt
NAC network access control
NAT Network Address Translation
NAV Network Allocation Vector
NFC Near Field Communication
NMS network management server
NOC network operations center
nQSTA Non-Quality of Service Station
OAuth open standard for authorization
ODBC Open Database Connectivity
OFDM Orthogonal Frequency Division Multiplexing
OKC opportunistic key caching
OS operating system
OSI model Open Systems Interconnection model
OTAP Over-the-air provisioning
OTP one-time password
OU organizational unit
OUI Organizationally Unique Identifier
PAC protected access credential
PAN personal area network
PAP Password Authentication Protocol
PAT Port Address Translation
PBC push-button configuration
PBCC Packet Binary Convolutional Coding
PBX private branch exchange
PCI Peripheral Component Interconnect
PCMCIA Personal Computer Memory Card International Association (PC Card)
PD powered device
PEAP Protected Extensible Authentication Protocol
PHY Physical layer
PIFS Point Coordination Function interframe space
PIN personal information number
PKI public key infrastructure
PLCP Physical Layer Convergence Procedure
PMD Physical Medium Dependent
PMK pairwise master key
PMKID pairwise master key identifier
PMK-R0 pairwise master key-R0
PMK-R1 pairwise master key-R1
PMKSA pairwise master key security association
PN packet number
PN pseudorandom number
PoE Power over Ethernet
POP Post Office Protocol
PPDU PLCP Protocol Data Unit
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PSDU PLCP Service Data Unit
PRF pseudorandom function
PSE power-sourcing equipment
PSK Phase Shift Keying
PSK preshared key
PSMP Power Save Multi-Poll
PSPF Public Secure Packet Forwarding
PS-Poll power save poll
PSTN public switched telephone network
PTK pairwise transient key
PTKSA pairwise transient key security association
PTMP point-to-multipoint
PTP point-to-point
QAM quadrature amplitude modulation
QAP quality-of-service access point
QBSS quality-of-service basic service set
QoS quality of service
QSTA quality-of-service station
QPSK quadrature phase shift keying
RA receiver address
RADIUS Remote Authentication Dial-In User Service
RAP remote access point
RBAC role-based access control
RF radio frequency
RFC request for comment
RF LOS RF line of sight
RIC resource information container
RIFS reduced interframe space
R0KH R0 key holder
R1KH R1 key holder
RRM radio resource measurement
RSL received signal level
RSN robust security network
RSNA robust security network association
RSNIE robust security network information element
RSSI received signal strength indicator
RTLS real-time location system
RTS request to send
RTS/CTS request to send/clear to send
RX receive or receiver
SA security associations
SA source address
SaaS Software as a Service
SAE Simultaneous Authentication of Equals
SAML Security Assertion Markup Language
S-APSD scheduled automatic power save delivery
SCA single-channel architecture
SCEP Simple Certificate Enrollment Protocol
SD Secure Digital
SDR software-defined radio
SHA-1 Secure Hash Algorithm
SID system identifier
SIFS short interframe space
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SISO single-input, single-output
SRP SpectraLink Radio Protocol
SVP SpectraLink Voice Priority
SISO single-input single-output
SM spatial multiplexing
SMB small and medium-sized business
SMK STSL master key
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SNR signal-to-noise ratio
SOHO small office/home office
S0KH S0 key holder
S1KH S1 key holder
SOM system operating margin
SOW statement of work
SP service provider
SPA supplicant address
SQ signal quality
SSH Secure Shell
SSID service set identifier
SSL Secure Sockets Layer
SSO single sign-on
STA Station
STBC space-time block coding
STC Space Time Coding
STK STSL transient key
STP Spanning Tree Protocol
STSL station-to-station link
SU-MIMO single user MIMO
TA transmitter address
TBTT target beacon transmission time
TCP/IP Transmission Control Protocol/Internet Protocol
TDEA Triple Data Encryption Algorithm
TDoA Time Difference of Arrival
TDLS Tunneled Direct Link Setup
TIM traffic indication map
TK Temporal Key
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TPC transmit power control
TPK TDLS Peer Key
TPKSA TDLS Peer Key security association
TSC TKIP sequence counter
TSN transition security network
TTAK TKIP-mixed transmit address and key
TTL time to live
TTLS Tunneled Transport Layer Security
TX transmit or transmitter
TxBF transmit beamforming
TXOP transmit opportunity
U-APSD unscheduled automatic power save delivery
UEQM unequal modulation
UNII Unlicensed National Information Infrastructure
UP user priority
USB Universal Serial Bus
USIM User Subscriber Identity Module
UTMS Universal Mobile Telecommunications System
VHT Very High Throughput
VLAN virtual local area network
VoIP Voice over IP
VoWiFi Voice over Wi-Fi
VPN virtual private network
VRRP Virtual Router Redundancy Protocol
VSA vendor specific attribute
VSWR voltage standing wave ratio
WAN wide area network
WAVE Wireless Access in Vehicular Environments
WDS wireless distribution system
WEP Wired Equivalent Privacy
WGB workgroup bridge
WIDS wireless instruction detection system
Wi-Fi Sometimes said to be an acronym for wireless fidelity, a term that has no formal definition; Wi-Fi is a general marketing term used to define 802.11 technologies.
WIGLE Wireless Geographic Logging Engine
WiMAX Worldwide Interoperability for Microwave Access
WIPS wireless intrusion prevention system
WISP Wireless Internet Service Provider
WLAN wireless local area network
WLSE Wireless LAN Solution Engine
WM wireless medium
WMAN wireless metropolitan area network
WMM Wi-Fi Multimedia
WMM-PS Wi-Fi Multimedia Power Save
WMM-SA Wi-Fi Multimedia Scheduled Access
WNM wireless network management
WNMS wireless network management system
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access 2
WPAN wireless personal area network
WPP Wireless Performance Prediction
WPS Wi-Fi Protected Setup
WTP wireless termination point
WWAN wireless wide area network
XML Extensible Markup Language
XOR exclusive or
3.145.101.192