Email Alerts
-
Troubleshooting WLAN connectivity on the network
This tip looks at potentially troublesome areas an admin will want to consider when troubleshooting WLAN connectivity on the network: the access point (AP), the LAN, the authentication server and routing aspects. Tip
-
Configuring and troubleshooting wireless LAN clients
An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, Robbie Harrell discusses some of the issues that can b... Tip
-
Weighing the costs of wireless network management
Wireless devices may be getting less expensive, but the cost of managing those devices is rising. Before jumping into wireless network deployment, there are some things that SMBs need to know. Article
-
Next steps in municipal wireless mesh networks
Strix Systems VP Nan Chen shares his take on the wireless mesh networking market and why he believes that wireless mesh networks are gaining so much momentum. TechColumn
-
Keep an eye on the sky: WLAN usage monitoring
In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniques with wireless-specific methods and tools. Tip
-
Wireless IDS/IPS thwarts mall intruders
Siemens yesterday announced the addition of IDS/IPS and location services to its HiPath wireless line, which the largest shopping mall in the world will use to secure its WLAN. Article
-
802.11a
802.11a is one of several specifications in the 802.11 family applicable to wireless local area networks (wireless LANs or WLANs). Definition
-
Overlay vs. embedded WIDS sensors
WIDSs rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDS use special-purpose sensors, dedicated to this monitoring task. Embedded WIDS use APs to monitor the WLAN in their spare time. This tip compares... School
-
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag a... School
-
WLAN security tools: Buyers' guide for SMBs
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks. Tip
Network Management Strategies for the CIO