ComputerWeekly.com Research Library

Powered by Bitpipe.com

WLAN Protocols Research

  • Ensuring an Optimal Wi-Fi Experience: Best Practices

    Sponsored by: TechTarget Security

    This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.

  • Keeping Up With Network Needs: Five WLAN Questions Answered

    Sponsored by: TechTarget Security

    In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.

  • WLAN Planning For BYOD

    Sponsored by: TechTarget Security

    This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.

  • Wireless LAN ITDC - Checklist #3

    Sponsored by: TechTarget Security

    This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.

  • Wireless LAN ITDC - Checklist #2

    Sponsored by: TechTarget Security

    Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.

  • Wireless LAN ITDC - Checklist #1

    Sponsored by: TechTarget Security

    In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.

  • Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap

    Sponsored by: ADTRAN, Inc.

    This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.

  • Upgrading to 802.11n

    Sponsored by: TechTarget Security

    This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.

  • E-Guide: Wireless LAN access control: Managing users and their devices

    Sponsored by: TechTarget Security

    This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • Next-Gen 5G Wireless Technology Means Capacity is Key

    Sponsored by: T-Mobile for Business

    Historically, a new, major generation of wide-area wireless technologies emerges roughly every 10 years. So, what does the upcoming 5G wireless technology have to offer, and how is it different from previous generations? In this e-guide, uncover the important technologies that will enable 5G and learn about what it will be able to do.

  • How to Handle Mobile Devices' Impact on the Network

    Sponsored by: TechTarget Networking

    The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.

  • Five Steps to Successfully Migrate to 802.11ac

    Sponsored by: Aruba Networks

    802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.

  • Bring Your Own Design: Simplifying BYOD with Ruckus Wireless

    Sponsored by: RUCKUS Networks

    Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.

  • Wireless LANs and Multimedia: Matching wired network performance and quality

    Sponsored by: TechTarget Security

    The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • The Case for Next-Generation Wireless LANs: Faster Connections and More Applications and Users

    Sponsored by: Brocade

    Read this whitepaper to discover how the next generation of WLANs is creating faster connections, more applications, and a better experience for end-users.

  • 5 ways to improve WLAN reliability, performance and capacity

    Sponsored by: Hewlett Packard Enterprise

    Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.

  • The Economics of Cooperative Control – Protocols are Free

    Sponsored by: Aerohive Networks

    Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost.

  • Bring Your Own iPad to Work

    Sponsored by: Aruba Networks, Inc.

    Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.

  • The Network Impact of 802.11n

    Sponsored by: Aerohive Networks

    With the adoption of 802.11n, concerns over the capabilities of wireless LAN technology have become concerns that affect the whole network, not just the first hop across the radio. Read this paper to find out so much more.

  • Presentation Transcript: Upgrading to full 802.11n

    Sponsored by: SonicWALL

    This presentation transcript, taken from the podcast of the same name, discusses what businesses can expect to see in the final 802.11n standard and how those "full 802.11n" differences will and won't impact this year's deployments. Read on to learn more about the upcoming changes in 802.11n.

  • Enterprise Wireless LAN Security

    Sponsored by: Motorola Solutions

    This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.

  • Implementing a Wireless LAN

    Sponsored by: AT&T Corp

    This paper outlines the networking requirements and considerations for a successful WLAN implementation.

  • Motorola Installs a Wireless LAN to Improve Communications at Kilkenny Castle

    Sponsored by: Motorola Solutions

    How did the historic Kilkenny Castle go from being a completely un-networked site where only a few staff had Internet access to a completely networked site with 90% coverage around the castle? You'll have to read this to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.