802.1x
Not to be confused with 802.11x, which is the term used to describe the family of 802.11 standards for wireless LAN technology, 802.1X is the IEEE standard for port-based Network Access Control for enabling restricted use of IEEE 802 LAN service access points (ports) to secure communication between authenticated and authorized devices.
See 802.11 for a complete overview of the 802.11x family of specifications.
Read Also:
- 8514/A
A high-resolution video standard for PCs developed by IBM in 1987. It is designed to extend the capabilities of VGA. The 8514/A standard provides a resolution of 1,024 by 768 pixels, which gives it about 2.5 times the pixels of VGA (640 by 480). Like VGA, 8514/A provides a palette of 262,000 colors, of which […]
- 8B/10B encoding
When transmitting data, 8B/10B encoding refers to the algorithm for encoding the data for transmission where each eight-bit data byte is converted to a 10-bit transmission character. 8B/10B encoding supports continuous transmission and detects single bit transmission errors. This transmission encoding is used in a number of communications technologies including Serial ATA , Fibre Channel, […]
- 8-way server
An 8-way server provides fast performance and scalability by supporting multiple CPUs. In this case it would support eight processors. The multiple CPUs available to complete individual processes simultaneously. The computer architecture used in 8-way servers is called SMP (Symmetric Multiprocessing).
- 90 nanometer
90 nanometer is the buzzword of choice (2000-2004) for an advanced semiconductor manufacturing process that combines higher-performance, lower-power transistors, strained silicon, high-speed copper interconnects and low-k dielectric material. Some of the new technologies in 90 nm are strained silicon which causes one type of transistor to switch faster, low-power transistors which are only 50 nm […]
- AAA
Short for authentication, authorization and accounting, a system in IP-based networking to control what computer resources users have access to and to keep track of the activity of users over a network. Authentication is the process of identifying an individual, usually based on a username and password. Authentication is based on the idea that each […]