Browse Definitions :
Definition

Hot Spot 2.0 (HS 2.0)

Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming among WiFi networks and between WiFi and cellular networks. HS 2.0 was developed by the Wi-Fi Alliance and the Wireless Broadband Association to enable seamless hand-off of traffic  without requiring additional user sign-on and authentication.

A hot spot (or hotspot) is a wireless LAN (local area network) node that provides Internet connection and virtual private network (VPN) access from a given location for users of devices with wireless connectivity. Hot spots are common in hotels, airports, libraries, and coffee shops. Normally, a user must connect manually to a hotspot by checking the wireless connection options, selecting one, and entering authentication information, usually a simple password. The physical connectivity zone is determined by the range of the wireless router(s) owned by the establishment. In most cases the radius is about 100 to 200 meters.

The HS 2.0  specification is based on a set of protocols called 802.11u, which facilitates cellular-like roaming, increased bandwidth, and service on demand for wireless-equipped devices in general. When a subscriber's 802.11u-capable device is in range of at least one Wi-Fi network, the device automatically selects a network and connects to it. Network discovery, registration, provisioning, and access processes are automated, so that the user does not have to go through them manually in order to connect and stay connected.  

This was last updated in May 2013

Continue Reading About Hot Spot 2.0 (HS 2.0)

SearchNetworking
SearchSecurity
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

  • SYN flood attack

    A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.

SearchCIO
  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

  • business transformation

    Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close