The Broadband Guide
SG
search advanced

List of netowrking, wireless, broadband, satellite, telephony, general computing and other technical terms used throughout the site.
 search  1 |....| 5 | 6 | 7 | 8 | 9 | 10 | 11 
| All  | # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
Term Description
tunneling Tunneling refers to the ability to encapsulate packets of data formatted for one network protocol (or a private secure network) in packets used by another protocol (or a public network). Tunneling allows the use of the (public) Internet to transfer data on behalf of a private network. See also: VPN, PPTP.

Note that tunneling and VPN is not intended as a substitute for data encryption by itself. For a higher security level strong encryption should be used within the VPN.
TurboQAM TurboQAM is a Broadcom 802.11 wireless technology that makes it possible for the 2.4GHz band with 40MHz channels to achieve a maximum transfer rate of 200 Mbps per data stream, instead of the standard 150 Mbps. This is achieved by using QAM-256, instead of the standard QAM-64 used until now by 802.11n wireless networks.

TurboQAM requires 40MHz channels and clients that support QAM-256. Current routers revert back to 20MHz channels when there is interference from another radio that is within two channels of them.
twisted pair Two single core copper wires twisted around ach other to reduce crosstalk or electromagnetic induction. Twisted pair is usually installed in two or more pairs, all within a single cable. For some locations, twisted pair is enclosed in a shield that functions as a ground, and is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair (UTP).
UAC UAC (User Account Control) is a Windows Vista/2008 feature intended to provide aditional security by reducing user access.

It is intended to prevent access to core Windows components, prompting the user for access to perform any administrative tasks.

As a result from UAC, local administrative accounts run as standard user accounts by default, with their administrative priviledges disabled until they attempt to run an application or task that requires administrative token. When attempting to start such applications, the user is prompted to consent to running the application with elevated priviledges.

Applications can be configured to always run as elevated, or UAC can be reconfigured from from Control Panel > User Accounts > Turn User Account Control On or Off.

See Also: How to change Vista UAC settings
UAC UAC (User Account Control) is a Windows Vista/2008 feature intended to provide aditional security by reducing user access.

It is intended to prevent access to core Windows components, prompting the user for access to perform any administrative tasks.

As a result from UAC, local administrative accounts run as standard user accounts by default, with their administrative priviledges disabled until they attempt to run an application or task that requires administrative token. When attempting to start such applications, the user is prompted to consent to running the application with elevated priviledges.

Applications can be configured to always run as elevated, or UAC can be reconfigured from from Control Panel > User Accounts > Turn User Account Control On or Off.
UDP UDP (User Datagram Protocol, RFC 768) is a communications protocol, an alternative to TCP (Transmission Control Protocol), and uses the Internet Protocol (IP) to actually get a data units (datagrams) from one network node to another.

UDP does not provide the service of dividing a message into packets (unlike TCP) and reassembling it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the data arrives in.

UDP is a stateless protocol, meaning it doesn't acknowledge that packets being sent have been received. For this reason, the UDP protocol is typically used for streaming media, where a lost packet should not stop the transmission of data, or for simple applications where very little processing power is a requirement. TFTP (Trivial File Transfer Protocol) uses UDP as well.
UMTS UMTS (Universal Mobile Telecommunications System) is a third-generation (3G) broadband, packet-based data transmission technology with data rates up to 2 Mbps. UMTS is based on the GSM communication standard.
uncap Uncapping refers to the concept of somehow lifting the bandwidth cap many cable modem service providers (MSO's) impose. Some users want to do this in order to improve the speed of their cable modem, obviously circumventing the service provider and may be considered theft of service.

Some early pre-DOCSIS cable modems could be hacked to remove upstream limitations, however, those days are long gone.

Note that speed tweaks (changing TCP Receive Window, etc.) to improve speed are not considered "uncapping" and are absolutely legal way of fixing/tuning your OS to improve network performance.
Unicode Unicode is a 16 bit ISO 10646 character set. It can accommodate way more characters that ASCII, thus allowing for easier internationalization.
UPnP UPnP (Universal Plug and Play) is a standard that defines a connected environment, an automatic network of different, self-configuring devices, such as PCs, peripherals, wireless devices, and intelligent appliances. In a UPnP environment, all those devices would be able to configure themselves, aquire IP address automatically, announce their presense and location on the network (using HTTP), and be able to communicate using Internet and Web protocols.
upstream upstream (or upload, uplink) is a transmission from the end user to a server and downstream/download is a transmission toward the user. Data rate can differ in the downstream and upstream directions.
UTM UTM (Unified Threat Management) is a newer type of network security appliance, considered an evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single device.

UTM is an all-inclusive network gateway that typically includes a firewall, gateway antivirus/anti-malware/anti-spam, web content filtering, IPS (Intrusion Prevention System), VPN, load balancing, and some type of data loss prevention.
UTP UTP (Unshielded Twisted Pair) is a popular standard cable that consists of pairs of unshielded wires twisted areound each other. UTP cabling is commonly used for Ethernet networks and telephone connections because of its low cost and ease of use.
VDSL VDSL (Very-high-speed Digital Subscriber Line, a.k.a. VADSL, BDSL) is the fastest form of DSL, with the ability to achieve data rates up to approximately 51,840 Kbps for short distances (1000' to 4500'). Currently VDSL is in very limited commercial use.
VLAN VLAN (Virtual LAN) is a network of computers that appear to be connected to the same network even if they are physically located on differend segments of the LAN.
VoIP VoIP (Voice over Internet Protocol) refers to the transmission of voice, such as ordinary telephone calls, over a packet-switched IP network. Also known as IP telephony.
VPN VPN (Virtual Private Network) is a network of secure links over a public IP infrastructure. Technologies that fit in this category include PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer 2 tunneling protocol) and IPSec.

Note that tunneling and VPN is not intended as a substitute for data encryption by itself. For a higher security level strong encryption should be used within the VPN.
W3C W3C (World Wide Web Consortium) is an international consortium founded in 1994 that unites over 450 organizations involved with the Internet and the World Wide Web. Its purpose is to
"lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ensure its interoperability". The W3C develops and publishes open standards for the web.
WAN WAN (Wide Area Network) is a telecommunications network that covers a large area, such as a state or country, spanning multiple LANs. The term often suggests the inclusion of public (shared user) networks.
WAP WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that handheld wireless devices (PDAs, cell phones, pagers, two-way radios) can interoperate and be used for Internet access, including Web, e-mail, Web, newsgroups, IRC, etc.

Also: Wireless Access Point (WAP or AP) - a device, essentially a base station that connects wireless devices together to create a wireless network by transmitting/receiving radio signals. A WAP is usually also connected to a wired network, and can relay data between devices on each side.
Wardriving Wardriving is the practice of searching for Wireless LAN (WLAN) signals within a geographic area. It often refers to driving around looking for wireless networks. The term was coined by Pete Shipley. It's a concept taken from the movie "WarGames", where the actor dials many phone numbers looking for computers to access, called "War-Dialing". Other similar terms include war-walking, war-flying, etc. refering to the modes of transportation used for moving around to identify various wireless Access Points.

With many wireless networks being 'plug and play' right out of the box, we are witnessing a tremendous amount of networks that are simply wide open to intrusion. Drive down a city street with just a laptop, a wireless card, and a program such as Netstumbler. You will come across dozens of open networks from which you can access the internet, and potentially the files of the other computers on the network.
WDM WDM (Wavelength Division Multiplexing) is a type of multiplexing used in optical fiber. WDM modulates each of several data streams onto a different part of the light spectrum.

See also: TDM, FDM.
WDS WDS (Wireless Distribution System) is a Wireless Access Point mode that enables wireless bridging in which WDS APs communicate only with each other (without allowing for wireless clients or stations to access them), and/or wireless repeating in which APs communicate both with each other and with wireless stations (at the expense of half the throughput).
WebDAV WebDAV (Web distributed authoring and versioning) is an industry standard extension to the HTTP specification. WebDAV adds a capability for authorized users to remotely add and manage content on a web server.

For additional information, see RFC 2518.
WebSocket WebSocket is a TCP-based communication protocol standardized by [RFC 6455]. It establishes a persistent full-duplex communication channel over a single TCP connection using HTTP handshake, typically over standard TCP port 80.

Unlike traditional HTTP, WebSocket provides full-duplex communication allowing for more interaction between a web browser and a web server. The WebSocket protocol is supported in all modern browsers.
WEP WEP (Wired Equivalent Privacy) is IEEE security protocol, specified in the Wi-Fi (Wireless Fidelity, or 802.11b) standard. WEP is designed to provide a WLAN (Wireless Local Area Network, a.k.a LAWN ;) ) with a level of security and privacy comparable to what is usually expected of a wired LAN, by encrypting data transmitted over the WLAN.

Although WEP provides some level of security, there has been some controversy whether it lives up to being equivalent to that of wired LANs. Either way, WEP should always be used in conjunction with all other traditional security practices. In 2001, a fast WEP cracking algorithm was discovered, coming from capturing enough "weak IV" frames, something that occurs randomly. Manufactures have since altered the algorithm to not use weak IVs in most devices -- this technology is sometimes known as WEP-plus.

When entering WEP keys manually, note the following guidelines:
- One ASCII character is 8 bits, one Hex character is 4 bits.
- 64 (or 40) bit WEP code has 5 ASCII or 10 HEX characters.
- 128 (or 104) bit WEP code has 13 ASCII or 26 HEX characters.
Wi-Fi Wi-Fi (short for "Wireless Fidelity,") is a term used generically when referring to any type of 802.11 network, such as 802.11g, 802.11n, or 802.11ac.

Wi-Fi uses DSSS, and is comparable to Ethernet in functionality. While most Wi-Fi connections are between a mobile device and an access point, it is also possible to create an "ad-hoc" network directly among two or more devices, without an access point.

All Wi-Fi products using the same radio frequency band (2.4GHz or 5GHz typically) are designed to work with each other and be backward compatible.

Notes:
Wi-Fi is a trademark of the Wi-Fi Alliance, a nonprofit industry association. The IEEE technical specification for Wi-Fi is 802.11.

In an effort to simplify wireless standards, the Wi-Fi Alliance introduced a new naming system in 2019 to identify Wi-Fi standards and their generations retroactively to help users identify devices that provide "the latest Wi-Fi experience". This new naming convention for current Wi-Fi standards is as follows:

Wi-Fi 6E: 6GHz extension to Wi-Fi 6 devices
Wi-Fi 6: 802.11ax (2019)
Wi-Fi 5: 802.11ac (2014)
Wi-Fi 4: 802.11n (2009)

Wi-Fi Direct Wi-Fi Direct (a.k.a. Wi-Fi P2P) is a WiFi standard that enables devices to connect with each other easily without the need for a wireless access point. Wi-Fi direct negotiates a peer-to-peer link using WPS, and allows for everything from file transfers to internet connectivity.
WiGig WiGig (802.11ad) is a draft wireless standard that operates on the unlicensed 60GHz spectrum, with theoretical multi-gigabit speeds over a distance of up to 10 meters with no wall propagation. As such, it is not meant as a replacement of WiFi, however, it offers advantages in terms of bandwidth, low power consumption, beamforming, and TDMA, making it a good candidate for mobile devices.

The WiGig MAC specification was published in June 2011, and the standard is currently in draft stage with the IEEE as 802.11ad.
WiMAX WiMAX (Worldwide Interoperability for Microwave Access) is a wireless telecommunication technology based on the IEEE 802.16 family of standards, which allows for high-speed wireless data transmission over long distances (5-30 miles).

The initial version, based on 802.16a, is designed for fixed (non-mobile) applications only, such as a wireless replacement for home DSL or cable modem service. Newer versions, such as 802.16e, add support for mobility, potentially making WiMax a competitor for certain 3G or 4G cell-phone technologies.

WiMax operates at higher frequencies than mobile phone networks. WiMax technology can operate in the 2.5 or 3.5 GHz licensed bands, or in the 5.8 GHz unlicensed band.

The name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote conformance and interoperability of the standard.

See also: wimaxforum.org
Windows 9x Windows 9x/ME - "A 32 bit extension and graphical shell, for a 16 bit patch to an 8 bit operating system, originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition."

Note: Sense of humor required.
winsock Winsock (the Windows Sockets API) defines how software should access network services, especially TCP/IP. It defines a standard interface between TCP/IP client appliactions (such as an FTP client or a web browser) and the unterlying TCP/IP protocol stack.

Note: Winsock refers to the API, not only the DLL library file (winsock.dll) which only exposes the common WSA interfaces to applications above it.
Wireless Mesh Wireless Mesh Network (WMN) is a type of network using wireless radio nodes organized in a mesh topology. In mesh network topology, each node can relay data for the network, adding redundancy to distribute data more efficiently.

Wireless mesh networks consist of two or more wireless mesh routers/gateways that can relay data wirelessly between them, depending on shortest path/cleanest signal. It offers several advantage over the traditional setup (one router, multiple wireless clients using star topology). It also offers better throughput than using repeaters/extenders, especially when the link between the mesh nodes is over a dedicated "backhaul" channel, separate from the radios communicating with clients.
WISP WISP (Wireless Internet Service Provider) is an ISP that allows subscribers to connect to a server at designated access points using a wireless connection such as Wi-Fi. This type of ISP offers broadband service and allows subscriber computers, called stations, to access the Internet and the Web from anywhere within the zone of coverage provided by the server antenna(s).
WLAN WLAN (a wireless LAN) is a type of LAN that uses high-frequency radio transmissions (rather than cables) to communicate between network nodes.

Also reffered to as "LAWN" :)
WLL WLL (Wireless Local Loop) is a term for the use of a wireless communications link as the "last mile" connection for delivering plain old telephone service (POTS) and/or broadband Internet to telecommunications customers. Various types of WLL systems and technologies exist.
WML WML (Wireless Markup Language) is a tag based language similar to HTML, used to create web pages that can be delivered using WAP to handheld wireless devices. WML is tailored for the smaller display size of such devices, and requires less memory and processing power than HTML and Javascript.
WMM WMM (Wi-Fi Multimedia) is a wireless QoS specification, a subset of 802.11e improving quality of video and voice applications for wireless clients.

It can help control latency and jitter when transmitting multimedia content over a wireless connection.
WMM WMM (Wi-Fi Multimedia, formerly known as Wireless Multimedia Extensions - WME), is a Wi-Fi Alliance certified feature based on the IEEE 802.11e standard. This feature provides QoS to wireless networks. It is especially suitable for voice, music and video applications; for example, Voice over IP (VoIP), video streaming, and interactive gaming.
worm worm is a separate computer program that can replicate itself automatically over a network.

Worms are ofren, but not always, malicious and might interfere with the normal use of a computer or a program. They often exploit vulnerabilities in some automatic file sharing feature found on many computers to replicate.

Worm is different than a virus, it does not alter/infect files and its main ability is to replicate by itself. Still, a malicious worm can be programmed to delete all your files just as well.
Term Description
| All  | # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About