Transmission Control Protocol. The Transport level protocol used with the Internet Protocol (IP) to route data across the Internet. (See IP, TCP/IP).
The underlying technology of Internet communications. While IP handles the actual delivery of data, TCP tracks the data packets to efficiently route a message through the Internet. Every computer in a TCP/IP network has its own IP address that is either dynamically assigned at startup (See DHCP) or permanently assigned as a static address. All TCP/IP messages contain the address of the destination network, as well as the address of the destination station. This enables TCP/IP messages to be transmitted to multiple networks (subnets) within an organization or worldwide. For example, when a user downloads a web page, TCP divides the page file on the web server into packets, numbers the packets, and forwards them individually to the user's IP address. The packets may be routed along different paths before reaching the user's address. At the destination, TCP reassembles the individual packets, waiting until they have all arrived to present them as a single file. (See IP, IP address, packet, TCP).
Usually measured in bps, Kbps, Mbps or Gbps, throughput is the amount of data that can be sent from one location to another in a specific amount of time. (See bps, Mbps).
Temporal Key Integrity Protocol. The wireless security encryption mechanism in Wi-Fi Protected Access. TKIP uses a key hierarchy and key management methodology that removes the predictability that intruders relied upon to exploit the WEP key. It increases the size of the key from 40 to 128 bits and replaces WEP's single static key with keys that are dynamically generated and distributed by an authentication server, providing some 500 trillion possible keys that can be used on a given data packet. It also includes a Message Integrity Check (MIC), designed to prevent an attacker from capturing data packets, altering them and resending them. By greatly expanding the size of keys, the number of keys in use, and by creating an integrity checking mechanism, TKIP magnifies the complexity and difficulty involved in decoding data on a Wi-Fi network. TKIP greatly increases the strength and complexity of wireless encryption, making it far more difficult-if not impossible-for a would-be intruder to break into a Wi-Fi network. (See AES, WPA, WPA2).
Transport Layer Security. A newer version of the SSL protocol, It supports more cryptographic algorithms than SSL. TLS is designed to authenticate and encrypt data communications, preventing eavesdropping, message forgery and interference. (See EAP, SSL).
In the Wi-Fi context, tri-mode refers to devices which are 802.11b, a, and g-compatible. In the mobile context, tri-mode describes a cellular phone that is capable of using analog, digital and GSM frequencies. (See dual band).
Or Tunneled Direct Link Setup, is a direct connection created between two client devices after they have linked to the traditional Wi-Fi network. Wi-Fi CERTIFIED TDLS devices can set up secure links and transfer data directly between them. TDLS-linked devices benefit from an optimized connection to do things such as streaming video or syncing content, without burdening the network as a whole.