Premium Content

Access "Next-generation WLAN: How IEEE 802.11ac will change your network"

Lisa Phifer, Wireless Networking Expert - Owner
next-gen_WLAN.png

Sponsored by SearchNetworking.com

Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, reliability and robust throughput sufficient to delivery video and multimedia content, wireless LAN (WLAN) is a critical enterprise component. With the IEEE 802.11ac-2013 standard approved, WLAN data rates will soar to multiple-gigabit territory. This TechGuide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.   Access >>>

Table of contents

  • Counting the reasons to deploy 802.11ac
  • What WLAN planners need to know about the 802.11ac standard
  • With new wireless network capabilities come higher user capacity

About the Author

Lisa Phifer, Wireless Networking Expert - Owner

Lisa Phifer, owner of Core Competence, is an expert on ... Read More

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...