Email Alerts
-
foreign agent
In Mobile Internet Protocol (Mobile IP), a foreign agent is a router serving as a mobility agent for a mobile node. Definition
-
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Ask the Expert
-
802.11n will require upgrades
802.11n, the new Wi-Fi standard on the cusp of being ratified by the IEEE, offers greater throughput and better range than other standards but may require companies to upgrade their wireless network infrastructure. Article
-
Is it possible to assign each radio to a specific channel for transmission in a multi-radio wireless
Wireless networking expert Lisa Phifer explains how to configure a multi-radio wireless network system in this Q&A. Ask the Expert
-
Are new wireless products supporting 802.11n any more or less secure than older 802.11a/b/g wireless
View this expert response to see if new wireless products, supporting 802.11n, are any more or less secure than older 802.11a/b/g wireless products. Ask the Expert
-
What should I get to strengthen my Wi-Fi signal?
Our WLAN solutions expert, Stephen Kim, recommends what to use in order to strengthen your Wi-Fi signal. Ask the Expert
-
When using a WLAN connection, what causes my laptop to slow connectivity and even disconnect?
When using a WLAN connection, what causes your laptop to slow connectivity and even disconnect? Our WLAN expert, Stephen Kim, answers in detail. Ask the Expert
-
IEEE 802.11n: Looking ahead to the next wireless standard
The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wireless standard and issues you must consider before de... Tip
-
IEEE 802.11n: Research carefully before deploying
Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network. Tip
-
Wireless network security -- Chapter 8 of 'Essential Computer Security'
Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security prec... Chapter Download
Network Management Strategies for the CIO