RDK Documentation (Open Sourced RDK Components)
Wi-Fi

Description

Glossary of terms

Abbreviations Description
Access Popint A device that acts as the bridge between wireless clients and the wired network. Often abbreviated as AP.
AES The Advanced Encryption Standard is a symmetric block encryption protocol used in WPA2.
BSSID BSSID stands for Basic Service Set Identifier and is the MAC address of the AP.
EAP The Extensible Authentication Protocol (EAP) can be used to provide authentication to the wireless network when employing WPA-Enterprise and WPA2-Enterprise.
SSID The Service Set Identifier (SSID) is the name of the wireless network. It can be contained in the beacons sent out by APs.
ESSID The Extended Service Set Identifier is the name of the wireless network, and is used by all APs that provide access to the same infrastructure in an ESS.
ESS An extended service set (ESS) refers to a network with two or more APs working cooperatively.
QoS Quality of Service enables networks to prioritize certain traffic types.
CCMP Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the wireless standard local area networks.
STA Wireless Station.

Wi-Fi Standards

IEEE Standards for Wireless, 802.11 is the set of standards maintained by the IEEE for wireless networking.

Abbreviations Description
802.11a In the 5 GHz range. 802.11a networks can support up to 54 Mbps throughput and operate in the UNII bands
802.11ac In the 5 GHz range. 802.11ac networks can support up to 1 Gbps throughput using multiple channels.
802.11b In the 2.4 GHz range. 802.11b networks support up to 11 Mbps throughput and operate in the ISM band.
802.11d Addresses the Media Access Control (MAC) layer to comply with rules in each country.
802.11g In the 2.4 GHz range. 802.11g networks support up to 54 Mbps throughput and operate in the ISM band.
802.11h Sets the requirements for Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC).
802.11n Can use both the 2.4 GHz and 5 GHz ranges.

Wireless Security

Abbreviations Description
Ad Hoc Mode A peer to peer mode of networking using Wi-Fi networking but no access point. Ad Hoc networks can include more than two devices.
WAP WAP can refer to the Wireless Application Protocol, or can be used to mean Wireless Access Point.
WEP Wired Equivalent Privacy is the original encryption scheme implemented in wireless networks
WPA Wi-Fi Protected Access is a security protocol for wireless networks that was designed to replace WEP. It uses TKIP to encrypt data.
WPA2 Wi-Fi Protected Access v2 is currently the strongest encryption protocol available to wireless networks. It uses AES encryption algorithm.
WPS Wi-Fi Protected Setup makes it easier for users to add Wi-Fi clients to WPA and WPA2 protected wireless networks.
TKIP The Temporal Key Integrity Protocol was developed as a replacement for WEP but is no longer considered secure and has been removed from 802.11 standards.
TLS Transport Layer Security is a protocol designed to encrypt and authenticate all kinds of network traffic at the trans port layer, and is the successor to SSL.

Modules

 Wi-Fi HAL Public APIs and Data Types