The SearchNetworking.com wireless Ask-the-Expert section receives dozens of wireless related questions every week, and sometimes it may take longer than you'd like to get a reply. Save yourself some time and review this list to see if your question has already been answered!
Fast Reference to 802.xx
How many wireless devices can connect to an 802.11b?
What should I get to strengthen my Wi-Fi signal?
Why can't I print wirelessly?
What is the purpose of Wi-Fi ad-hoc mode?
Secure network against illegal users
Can a wireless node still buffer packets when its receiver is turned off?
Are new wireless products supporting 802.11n any more or less secure than older 802.11a/b/g products?
When using a WLAN connection, what causes my laptop to slow connectivity and even disconnect?
Here are some wireless tips that offer practical hints, shortcuts, or words of wisdom:
Signs of WLAN intrusion
Understanding WLAN signal strength
Measuring your wireless network's range
Implementing 802.11g: Stop dropped connections
The ins and outs of AP placement
Helpful steps in troubleshooting your wireless connectivity problem
Research report: Wi-Fi interference
Research report: Benchmarking wireless LANs -- Recommended practice
Here are some books excerpts to help you learn more about wireless standards, security and deployment: 802.11 Wireless LAN Fundamentals," Chapter 5
Wireless Network Security, Chapter 8
Wireless Networks For Dummies, Chapter 1
Hacking Wireless Networks For Dummies, Chapter 10
Wireless Hacks, 2nd Edition: Hack 51 -- Track wireless users
Return to our Ask the Expert section
About our wireless networks expert: Lisa Phifer is vice president of Core Competence Inc., a consulting firm specializing in network security and management technology. Phifer has been involved in the design, implementation, and evaluation of data communications, internetworking, security, and network management products for nearly 20 years. She teaches about wireless LANs and virtual private networking at industry conferences and has written extensively about network infrastructure and security technologies for numerous publications. She is also a site expert to SearchMobileComputing.com and SearchNetworking.com.