Glossary
Our glossary provides clear and understandable explanations of key terms relating to Wi-Fi, network technologies, and our solutions.
Our glossary provides clear and understandable explanations of key terms relating to Wi-Fi, network technologies, and our solutions.
| Acronym | Explanation |
|---|---|
| 2G | Digital mobile networks of the second generation, e.g., GSM. |
| 3G | Digital mobile networks of the third generation, e.g., UMTS. Occasionally, the term 2.5G is used, referring to GSM extensions („EDGE, GPRS“). |
| 100 BaseT / 1000 BaseT | General term for the three 100/1000 Mbit/s Ethernet standards over twisted-pair cables: 100BASE-TX, 100BASE-T4, and 100BASE-T2. The maximum segment length is 100 meters, as with 10BASE-T. Connectors are 8P8C modular plugs and sockets, commonly referred to as RJ-45. |
| 802.11 | A series of standards for wireless network protocols developed by → IEEE. |
| Access Point | „Access Point“; a participant of a → WLAN that also performs administrative functions and provides clients with connectivity to wired networks, other clients in the same cell, or other cells. |
| ACK | „Acknowledge“; confirmation signal in the 802.11 protocol indicating that the sender's transmission was received correctly. Required for proper data transmission. |
| ACL | „Access Control List“; e.g., a list of MAC addresses allowed to access the wireless network. The term is also used for firewall access lists. |
| Ad-hoc-Netzwerk | „An unstructured WLAN with no access points. Clients communicate „at their own risk“ without central coordination. The opposite is an infrastructure-mode network.“ |
| AeroScout | A technology for locating participants using wireless networks and RFID tags. |
| AES | „Advanced Encryption Standard“; an encryption method. |
| Antennen-Diversity | Simultaneous availability of two antennas on a device's radio module. In challenging radio environments, the interface can dynamically switch to the antenna providing the best reception. |
| Antennencharakteristik | Horizontal, vertical, and circular polarization are antenna characteristics used to reduce reflections. |
| Antennengewinn | Improvement (passive!) of the antenna achieved by suitable design compared to an isotropic radiator. |
| ATM | „Asynchronous Transfer Mode“; wired network used especially in backbones for long distances and high data rates. |
| Authentication | „Access control in communication networks“; (Who am I?) to increase data security („Security“). |
| Authorisation | „Distribution of permissions in communication networks“; (What am I allowed to do?) to enhance data security („Security“). |
| Bandbreite | Directly proportional to the „maximum usable data rate“. The term derives from the fact that transmission at a certain data rate occupies a proportionally wide section of the radio spectrum. |
| Beacon | WLAN management packet. |
| Bluetooth | A short-range radio standard for communication between office devices and mobile phones. |
| CCI | Interference, or Co-Channel Interference (CCI), occurs when two or more transmitters operate on the same frequency channel. CCI forces other devices to delay transmissions and wait in a queue until the first device releases the channel. This can cause timeouts and communication interruptions. |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, an encryption algorithm used in WPA2. |
| Channel Overlapping | Overlapping channels – For optimal throughput, the chosen channel should not be used by other access points. In the 2.4 GHz band (802.11b/g), channels overlap, meaning an access point occupies the chosen channel and neighboring 2–3 channels, potentially reducing throughput and connection quality. |
| Channel-Bonding | Parallel use of multiple radio channels to increase bandwidth and data throughput. |
| CIR | „Committed Information Rate“; denotes the transmission rate guaranteed for a specific service at any given time. |
| Client | A participant of a WLAN that lacks infrastructure capabilities and accesses a wireless network via an access point. |
| Client Isolation | The ability on an access point to block traffic between clients. |
| CSMA/CA | „Carrier Sense Multiple Access with Collision Avoidance“; a method to prevent collisions, i.e., when multiple senders attempt simultaneous transmission on a frequency. Colliding senders stop transmitting and wait a random period. A multi-stage process ensures simultaneous data transmission is avoided. |
| DCF | „Distributed Coordination Function“; an organizational model for wireless networks. |
| DFS | „Dynamic Frequency Selection“; extension of the 802.11 standard (802.11h). If another network user is detected on a channel, the access point changes channels to avoid interference from other 5 GHz systems (radar, satellite, navigation). |
| DoS | „Denial of Service“; an attack method against a network. |
| EAP | „Extensible Authentication Protocol“; a method within RADIUS where server and client establish a secure tunnel for access data before authentication („User/Password“, „Certificate“). |
| EIR | „Excess Information Data Rate“; additional transmission rate available beyond the CIR depending on network load. |
| EN 954-1 | Standard for functional safety (old). |
| EtherSAM | Measurement standard to verify Ethernet service quality. |
| GPRS | „General Packet Radio Service“; a data transmission service used for mobile phone communication. |
| Guard Interval | Guard intervals prevent overlap of sending and receiving. Longer intervals reduce interference but decrease channel efficiency. |
| Handover | „Transition of a mobile client from one access point/cell to another (→ Roaming), including reintegration into the network.“ |
| Hidden-Node-Problem | See Hidden-Station-Problem. |
| Hidden-Station-Problem | Connection issue occurring when a receiver is addressed simultaneously by two transmitters that cannot hear each other, causing collisions at the receiver. |
| High Speed Redundancy Protocol (HRP) | HRP is a protocol for highly available networks, e.g., in critical automation. Availability is increased by a ring structure. |
| IEC 61508 | Standard for functional safety (new). |
| IEEE | „Institute of Electrical and Electronics Engineers“ („I – Triple E“), a US association developing guidelines and technical recommendations; roughly comparable to DIN. |
| IEEE 802.11 | WLAN standard – 2 Mbit/s max. |
| IEEE 802.11a | WLAN standard – 54 Mbit/s max (108 Mbit/s at 40 MHz proprietary bandwidth). |
| IEEE 802.11ac / Wi-Fi 5 | WLAN standard – Uses 2.4 GHz and 5 GHz bands; higher speeds than WLAN-ac/Wi-Fi 5; up to 1,201 Mbps per antenna; 2.4 GHz = 1,148 Mbps, 5 GHz = 9,608 Mbps; 5 GHz channel width = 160 MHz; increases reception range. |
| IEEE 802.11ad | WLAN standard – basis for 60 GHz WLAN; max 10 m range; 1.76 GHz wide channels provide 7 Gbit/s; mainly point-to-point; also called MGWS („Multiple Gigabit Wireless Systems“). |
| IEEE 802.11ax / Wi-Fi 6 | WLAN standard – Uses 2.4 GHz and 5 GHz bands; faster than WLAN-ac/Wi-Fi 5; up to 1,201 Mbps per antenna; 2.4 GHz = 1,148 Mbps, 5 GHz = 9,608 Mbps; 5 GHz channel width = 160 MHz; increases reception range. |
| IEEE 802.11ax / Wi-Fi 6E | Extension of 802.11ax/Wi-Fi 6; allows use of 6 GHz band; same rates and channel widths as Wi-Fi 6; less interference in 6 GHz due to new channels. |
| IEEE 802.11b | WLAN standard – 11 Mbit/s max (22 Mbit/s at 40 MHz proprietary, 44 Mbit/s at 60 MHz proprietary). |
| IEEE 802.11be / Wi-Fi 7 | WLAN standard – Uses 2.4, 5, and 6 GHz bands; faster than WLAN-ax/Wi-Fi 6; up to 2,882 Mbps per antenna; max channel width 320 MHz; 320 MHz throughput = 23,056 Mbps; wider channels via MLO using multiple bands. |
| IEEE 802.11bn / Wi-Fi 8 | Draft WLAN standard – uses 1 GHz to 7.125 GHz; expected ratification earliest 2028. |
| IEEE 802.11g | WLAN standard – 54 Mbit/s max (g+ =108 Mbit/s proprietary, up to 125 Mbit/s possible). |
| IEEE 802.11h | WLAN standard – ensures 5 GHz connectivity without interfering with military/satellite systems; features TPC and DFS; extension of IEEE 802.11a. |
| IEEE 802.11i | WLAN standard – included in IEEE 802.11 since 2007; enables WPA encryption using TKIP; security extension. |
| IEEE 802.11k | WLAN standard – Radio Resource Management; improves WLAN usage via client feedback; both AP and client must support it. |
| IEEE 802.11n / Wi-Fi 4 | WLAN standard – 2.4 and 5 GHz; 450 Mbit/s max (uses MIMO). |
| IEEE 802.11r | WLAN standard – Fast Basic Set Transition; switches APs in <50ms (default 100ms); reduces handover disruptions. |
| IEEE 802.11s | WLAN standard – handles mesh networks; first unified standard for meshed AP topologies (stationary/not mobile); defines component communication. |
| IEEE 802.11w | WLAN standard – security extension for management frames; certain frames encrypted; must be supported by AP and client. |
| IEEE802.1p | IEEE working group regulating transport of prioritized data in networks. |
| IEEE802.1q | IEEE 802.1Q defines VLAN tagging and prioritization at packet level, unlike older port-based VLANs. |
| Infrastrukturmodus | Network organized so one or more → access points form cells, giving the network a „structure“; opposite is → ad-hoc network. |
| IP 30 | Protection class indicating component is protected against large foreign objects (>2.5 mm) but not water; like standard household electrical devices. |
| IP 65 | Protection class indicating component is fully dust- and water-resistant; almost airtight enclosure. |
| ISM | „Industrial, Scientific and Medical“, frequency band including 2.4 GHz used by → 802.11 protocol. |
| KPI | „Key Point of Interest“; performance indicators to define requirements. |
| LAN | „Local Area Network“, geographically limited network vs. e.g., the Internet. |
| Layer II | Layer 2 in ISO/OSI model handles section-wise data exchange, including error correction, flow control, and medium access. |
| Leckwellenleiter | A coaxial cable with periodic gaps in shielding; produces limited, „shapeable“ radio field following cable curvature. |
| Link Check | Access point function to monitor client connections; events (connect/disconnect) can trigger automated AP actions („emails, traps, LEDs“). |
| MAC | „Media Access Control“, protocol controlling access to a shared medium (cable or wireless). |
| MAC-Adresse | Globally unique ID for each hardware component in a network. |
| Media Redundancy Protocol (MRP) | IEC 62439-2 standard network protocol allowing rapid recovery in multi-switch networks, faster than Spanning Tree, suitable for industrial Ethernet. |
| Middleware | Software mediating between operating systems/drivers and user applications. |
| MIMO | „Multiple Inputs, Multiple Outputs“, a method where each wireless participant transmits/receives simultaneously via multiple antennas; part of IEEE 802.11n standard. |
| MLO | „Multi-Link Operation“; connects a wireless participant over multiple bands simultaneously; can improve throughput or reliability; part of IEEE 802.11be/Wi-Fi 7. |
| Modulation | Process by which a signal modifies a carrier to allow high-frequency transmission; determines occupied bandwidth. |
| N-Connect | Connection system for WLAN antennas. |
| Parallel Redundancy Protocol (PRP) | Ethernet protocol providing seamless failover by duplicating packets on separate paths. |
| PCF | „Point Coordination Function“, an organizational model for wireless networks. |
| PoE | „Power over Ethernet“, powers devices via Ethernet cable. |
| Polling | Regularly querying a data source (server) by a client; alternative is event-driven updates sent automatically. |
| Port Isolation | Layer 2 switches can block traffic between ports in the same LAN/VLAN. |
| Priorisierung | Allows sorting of data packets by importance; important packets transmitted faster than less important ones. |
| PSK | „Pre-Shared Key“, encryption method in WPA/WPA2. |
| QoS | See Quality of Service. |
| Quality of Service | Overall term for requirements regarding data transmission quality. |
| R/SMA | „Reverse (Polarity) Sub Miniature A Connector“, WLAN antenna connector. |
| RADIUS | „Remote Authentication Dial In User Service“, access control via a third-party server handling client authentication. |
| Range Limiting Factors | Factors affecting wave propagation („reflection, refraction, diffusion, diffraction, attenuation“). |
| Rapid Spanning Tree | Optimized network path protocol similar to Spanning Tree; minimizes reconnection time if an AP fails. |
| RC4 | Encryption algorithm used in WEP/TKIP. |
| RCoax | → Leaky coaxial cable enabling real-time low-range wireless networks, suitable for → clients with fixed paths or in shielded environments („e.g., tunnels“). |
| RFC 2544 | Standard for measuring throughput, burst, latency, and packet loss in Ethernet. |
| RFID | „Radio Frequency Identification“, method using passive transponders on objects („e.g., library books“); transponders respond with ID to track items; small, low-power, limited range/data. |
| Roaming | Seamless movement of a WLAN participant from one cell to another. |
| RSSI | „Received Signal Strength Indication“, used in AeroScout for triangulation and locating a participant. |
| RSTP | „Rapid Spanning Tree Protocol“, algorithm enabling switches to find optimal network paths and alternatives on failure. |
| RTS/CTS | „Request-to-Send/Clear-to-Send“, prevents collisions and hidden-station problems. |
| RTT | Round Trip Time – time for a data packet to travel from source to destination and back. |
| Segmentierung | Network segmentation divides a network into subnets for performance and security. |
| Signal-Rauschabstand | Signal-to-noise ratio (SNR), measures quality of a signal over background noise. |
| SNR | See Signal-to-noise ratio. |
| Spanning Tree | Protocol optimizing data paths; disables redundant links to avoid loops; if preferred path fails, algorithm finds best alternative; see → Rapid Spanning Tree. |
| Spatial Multiplexing | Method to distribute data across multiple transmitters to increase throughput. |
| Spoofing | Attacks where the attacker hides their IP/MAC to impersonate a legitimate participant. |
| SSID | „Service Set Identifier“; generally translated as network name; includes BSSID (cell/AP MAC) and ESSID (logical network name connecting multiple cells). |
| SSL | „Secure Sockets Layer“, protocol for encrypted Internet communication using public-key algorithms. |
| TDOA | „Time Difference of Arrival“ – signal travel time difference used for triangulation and locating a participant. |
| TKIP | „Temporal Key Integrity Protocol“, dynamically generates client-AP key pairs in WLAN. |
| TPC | „Transmit Power Control“, 802.11h extension; AP sets client transmit power needed for interference-free reception. |
| TSN | „Time Sensitive Network“; time-slot based method ensuring Ethernet service quality. |
| UMTS | „Universal Mobile Telecommunications System“, high-capacity mobile data standard. |
| VLAN | „Virtual LAN“, protocol extension dividing physical network into multiple logical subnets. |
| VNS | „Virtual Network Services“, organizing logical networks within one or more physical networks. |
| VoIP | „Voice over IP“, transmitting phone calls over the Internet or IP networks. |
| VPN | „Virtual Private Network“, tunneled network similar to → VLANs, hidden from other participants; increases network security. |
| WAN | „Wide Area Network“, larger than a LAN but limited in extent. |
| WBM | „Web Based Management“, configuring an AP or client via web interface. |
| WDS | „Wireless Distribution System“, WLAN infrastructure mode with redundant network between access points. |
| WEP | „Wired Equivalent Protocol“, wireless encryption method. |
| Wi-Fi | Term introduced by WiFi Alliance for compatible WLAN products; sometimes incorrectly used as a synonym for WLAN. |
| WLAN | „Wireless Local Area Network“, like a local wireless network, a wireless → LAN. |
| WMM | „Wireless Multimedia Extensions“, early certification by Wi-Fi Alliance; designation for 802.11e standard. |