An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an access point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.
A relationship between two or more small- or medium-sized ISPs in which the ISPs create a direct link between each other and agree to forward each other’s packets directly across this link instead of using the standard Internet backbone. For example, suppose a client of ISP X wants to access a web site hosted by […]
- pen computer
A computer that utilizes an electronic pen (called a stylus) rather than a keyboard for input. Pen computers generally require special operating systems that support handwriting recognition so that users can write on the screen or on a tablet instead of typing on a keyboard. Most pen computers are hand-held devices, which are too small […]
- pen tool
In graphics software, the pen tool is frequently used in the creation of smooth-edged selections, but is not a type of selection tool. The Pen Tool creates vector paths that can be converted into selections that in turn can be used to extract or mask groups of pixels.
- perceptual coding
In digital audio perceptual coding is a coding method used to reduce the amount of data needed to produce high-quality sound. Perceptual coding takes advantage of the human ear, screening out a certain amount of sound that is perceived as noise. In perceptual coding you reduce or eliminate the sounds that the ear would perceive […]
- perfect forward secrecy
A key-establishment protocol, used to secure VPN communications. If one encryption key is compromised only data encrypted by that specific key is compromised. For perfect forward secrecy (PFS) to exist the key used to protect transmission of data must not be used to derive any additional keys.