Email Alerts
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wi... Tip
-
Understanding 802.11n wireless antennas
Learn how 802.11n wireless antennas have been improved to increase network footprint, available bandwidth and resilience to problems that crippled older 802.11a/b/g access points, and how improved speed and capacity is made possible using techniques ... Tip
-
Upcoming wireless standards promise managed WLANs
Widespread deployment of wireless networks has created problems in office buildings, apartments and shopping areas, where multiple wireless networks share the air. It is anticipated that the problem of network overlap will get worse as more and more ... Tip
-
IEEE 802.11n: Looking ahead to the next wireless standard
The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wireless standard and issues you must consider before de... Tip
-
IEEE 802.11n: Research carefully before deploying
Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network. Tip
-
Implementing 802.11g: Stop dropped connections
What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip. Tip
-
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... Tip
-
Cellular data convergence: An introduction to wireless and 3G
The world of wireless data capabilities on the carrier networks is seeing a tremendous amount of growth as it relates to standards and service offerings. In this tip, Robbie Harrell sorts out the alphabet soup of data capabilities being offered by th... Tip
-
New products, standards help boost wireless security
New products and standards will help boost wireless security. Tip
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than others. Tip
Network Management Strategies for the CIO