Technical data
© 2012 Meru Networks, Inc. Glossary 337
RF prediction
The process of predicting WLAN characteristics, such as throughput and coverage area,
based upon imported building characteristics and sample WLAN design configurations.
RF triangulation
A common method used for 802.11 device tracking whereby 3 or more Access Points
compare RSSI information to triangulate in on a device's location. While easy to imple-
ment, RF triangulation does not account for multipath, attenuation, and other RF charac-
teristics that may affect receive sensitivity, making it less accurate than RF fingerprinting.
roaming
The process that takes places as a client moves between the coverage areas of different
APs, necessitating a handoff. In microcell Wi-Fi networks, roaming can be a complex
procedure that risks dropped connections and drags down network performance, as the
client is forced to decide when to disconnect from one AP and search for another. In
networks using Virtual Cell and Virtual Port technology, the infrastructure controls
roaming, automatically connecting each client to the optimum AP.
rogue Access
Point
An AP that is not authorized to operate within a wireless network. Rogue APs subvert the
security of an enterprise network by allowing potentially unchallenged access to the enter-
prise network by any wireless user (client) in the physical vicinity.
RJ-45
Standard connectors used in Ethernet networks. Even though they look very similar to stan-
dard RJ-11 telephone connectors, RJ-45 connectors can have up to eight wires, whereas
telephone connectors have only four.
roaming
Moving seamlessly from one AP coverage area to another with no loss in connectivity.
router
A device that forwards data packets from one local area network (LAN) or wide area
network (WAN) to another. Based on routing tables and routing protocols, routers can read
the network address in each transmitted frame and make a decision on how to send it via
the most efficient route based on traffic load, line costs, speed, bad connections, etc.
RSA
A public-key algorithm developed in 1977 and named after its inventors, Rivest, Shamir,
and Adleman. RSA, currently owned by RSA Data Security, Inc., is used for encryption,
digital signatures, and key exchange.
RSN
Robust Security Network. A new standard within IEEE 802.11i to provide security and
privacy mechanisms in an 802.11 wireless network. RSN leverages 802.1x authentication
with Extensible Authentication Protocol (EAP) and AES for encryption.
RSSI
Received Signal Strength Indication. The measured power of a received signal.
S
scanning
The process of checking the airwaves for rogue access points or attackers. Scanning APs
are typically implemented as an Overlay Network, as most APs can not scan and serve
traffic at the same time. Meru's APs are able to scan the airwaves and serve clients simul-
taneously, eliminating the need for an overlay. Meru's single-channel architecture
improves accuracy when scanning for intruders, as all APs are able to detect signals from
all clients.
server
A computer that provides its resources to other computers and devices on a network.
These include print servers, Internet servers and data servers. A server can also be
combined with a hub or router.