Appendix D: Glossary of Terms

LAN

Network Planner

RF

RSSI

3Com ® AirProtect Enterprise

3Com ® AirProtect Enterprise Sensors

Spillage

.spm file

.prj file

WAN

Wi-Fi

802.11a

Local Area Network

A tool for planning the WLAN in Planner

Radio Frequency

Received Signal Strength Indicator

Propagation of signal outside a stipulated area

Planner File

Planner Project File

Wide Area Network

Wireless Fidelity

Wireless Protocol

size of a unit determines the granularity of the RF computations and computational time. Smaller the size of the unit, higher is the granularity.

However, this requires more time for WLAN signal computations. Higher granularity also increases the amount of data generated. The dimension of each unit is called ‘Factor’. A Factor of four means that the plan is divided into 4x4 feet or 4x4 meters as per the measurement unit in use. Planner has an in-built intelligent algorithm to decide the granularity based on the size of the plan.

A LAN usually resides in a single building or campus, and links the computing resources together, typically by a cable.

Network Planner helps you design the entire layout with the specifications of the locations of the objects on the layout. It also helps you plan the entire network after the placement of objects on the layout is fixed. It allows you to drag and drop the devices such as APs and Sensors on the layout model. This helps you try various ‘What-If’ scenarios. You can also generate various RF views.

This is a name given to invisible electromagnetic waves.

This is an indicator of the value of the signal strength at a wireless receiver.

A proprietary product of 3Com Corporation that functions as a comprehensive Wi-Fi Intrusion Prevention System and Performance Management Solution.

Sensors are devices that work with the 3Com ® AirProtect Enterprise Server to provide 802.11 Intrusion Detection and Prevention.

In Planner, spillage refers to the propagation of RF signal outside the authorized area of deployment. Such spillage exposes the authorized area to the risk of attacks from hackers using Wi-Fi.

This is the proprietary Planner file format, which holds information about RF signal values, placement of devices, and device settings.

This is the propriety Planner project file, which contains a bundle of .spm, image, and AutoCAD files.

It is a public and private network serving a large geographical area. For example, the Internet.

Wi-Fi is a commonly used name to refer to

802.11.It is a trade term promulgated by the Wireless Ethernet Compatibility Alliance (WECA). "Wi-Fi" is used in place of 802.11b in the same way that "Ethernet" is used in place of IEEE

802.3.Products certified as Wi-Fi by WECA are interoperable with each other even if they are from different manufacturers. A user with a Wi-Fi product can use any brand of AP with any other brand of Client hardware that is built to the Wi-Fi standard.

When 802.11b was developed, IEEE created a second extension to the original 802.11 standard called 802.11a. 802.11a works in the ~5 GHz frequency band and provides wireless connectivity speeds of up to 54 Mbps.

802.11b

 

Wireless Protocol

 

 

 

112

IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification.

3Com ® AirProtect Planner User Guide

Page 120
Image 120
HP AirProtect Security Software manual 112

AirProtect Security Software specifications

HP AirProtect Security Software is an advanced security solution designed to provide comprehensive protection for enterprise devices, particularly those operating within the fluctuating and unpredictable environments of modern business. With the growing trend of remote work and mobile computing, the need for robust cybersecurity solutions has never been more critical. HP AirProtect offers a multi-layered approach to safeguard sensitive information and ensure seamless connectivity, making it an essential tool for businesses of all sizes.

One of the standout features of HP AirProtect is its real-time threat detection and response capabilities. Leveraging artificial intelligence and machine learning technologies, it continuously monitors devices for any unusual behavior or potential malware threats. This proactive approach allows for immediate intervention before any potential breaches can escalate, ensuring that valuable company data remains secure.

Another key characteristic of HP AirProtect is its integration with HP's proprietary software and hardware solutions. This seamless compatibility enhances the overall security posture of the devices it protects. Organizations can benefit from features such as device health monitoring, which assesses the security status of endpoints, providing an additional layer of assurance that devices meet necessary compliance standards.

Additionally, HP AirProtect emphasizes user-centric design, offering intuitive dashboards and easy-to-navigate interfaces. This ease of use is vital for IT administrators, who can manage security protocols efficiently without extensive training. It also provides insightful analytics and reporting tools that help organizations understand potential vulnerabilities and areas for improvement.

The software also prioritizes network security, employing virtual private network (VPN) technology to encrypt data transmission and protect against interception during remote access. Moreover, HP AirProtect includes endpoint isolation features, which allow organizations to limit network access for devices that are suspected of being compromised, thereby containing potential threats.

In conclusion, HP AirProtect Security Software combines cutting-edge technologies with user-friendly features to provide a comprehensive cybersecurity solution suited for the modern workforce. By focusing on real-time threat detection, seamless integration, and network security, it empowers organizations to navigate the complexities of digital security, ensuring their critical data remains protected in an ever-evolving threat landscape.