Appendix D: Glossary of Terms

 

MCS

 

 

 

Modulation and Coding

 

 

 

 

 

Schemes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Frame aggregation

Regulatory Domain

Compliance

IEEE 802.11n draft 2.0 defines 77 MCS based on the modulation technique, coding rate, number of spatial streams, channel width, and guard interval. The mandatory settings of 20 MHz channel width, 800 ns guard interval, and up to two spatial streams gives a total of 16 mandatory schemes (MCS 0 to 15).

Frame aggregation is introduced in IEEE 802.11n for improving the protocol efficiency. Aggregation is defined at two levels: Medium Access Control (MAC) and physical (PHY) layers. At the MAC layer, Multiple MAC Service Data Units (MSDUs) or subframes are aggregated and an aggregated MSDU (A-MSDU) is delivered to the PHY layer for transmission. The maximum A-MSDU size can be set to 4KB or 8KB; the maximum MSDU size carried in each subframe is limited to 2304 bytes. At the PHY layer, Multiple Protocol Data Units (MPDUs) or subframes can be aggregated into an aggregated MPDU (A-MPDU). The maximum size of an A-MPDU is 64 KB or 64 subframes, whichever limit is reached first. The maximum MPDU size carried in each subframe of an A-MPDU is limited to 4065 bytes.

Different countries have regulatory agencies permitting a select number of channels for device protocols. Hence, the power values of the devices placed on the floor map will operate only on those power values that match that of the respective country where you are planning.

While specifying the desired power range for each protocol, ensure that the values are complaint with the regulatory domain for a particular country for which you are performing planning.

If you create a .spm file in one location and forget to send the device information along with the

.spm to another location, then the Client at the second location will not be able to view the device information of the previous location. In such a case, Planner assigns the default device, as defined by you, in the .spm. If this device has power values conflicting with the regulatory domain compliance of the region, then Planner assigns the factory default device, which is regulatory domain complaint for any region.

114

3Com ® AirProtect Planner User Guide

Page 122
Image 122
HP AirProtect Security Software manual 114 3Com AirProtect Planner User Guide

AirProtect Security Software specifications

HP AirProtect Security Software is an advanced security solution designed to provide comprehensive protection for enterprise devices, particularly those operating within the fluctuating and unpredictable environments of modern business. With the growing trend of remote work and mobile computing, the need for robust cybersecurity solutions has never been more critical. HP AirProtect offers a multi-layered approach to safeguard sensitive information and ensure seamless connectivity, making it an essential tool for businesses of all sizes.

One of the standout features of HP AirProtect is its real-time threat detection and response capabilities. Leveraging artificial intelligence and machine learning technologies, it continuously monitors devices for any unusual behavior or potential malware threats. This proactive approach allows for immediate intervention before any potential breaches can escalate, ensuring that valuable company data remains secure.

Another key characteristic of HP AirProtect is its integration with HP's proprietary software and hardware solutions. This seamless compatibility enhances the overall security posture of the devices it protects. Organizations can benefit from features such as device health monitoring, which assesses the security status of endpoints, providing an additional layer of assurance that devices meet necessary compliance standards.

Additionally, HP AirProtect emphasizes user-centric design, offering intuitive dashboards and easy-to-navigate interfaces. This ease of use is vital for IT administrators, who can manage security protocols efficiently without extensive training. It also provides insightful analytics and reporting tools that help organizations understand potential vulnerabilities and areas for improvement.

The software also prioritizes network security, employing virtual private network (VPN) technology to encrypt data transmission and protect against interception during remote access. Moreover, HP AirProtect includes endpoint isolation features, which allow organizations to limit network access for devices that are suspected of being compromised, thereby containing potential threats.

In conclusion, HP AirProtect Security Software combines cutting-edge technologies with user-friendly features to provide a comprehensive cybersecurity solution suited for the modern workforce. By focusing on real-time threat detection, seamless integration, and network security, it empowers organizations to navigate the complexities of digital security, ensuring their critical data remains protected in an ever-evolving threat landscape.