841. | - Wireless Concepts
- By
Allan Johnson
- Mar 27, 2020
In this sample chapter from 31 Days Before your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam, you will learn how to explain the role and function of network components, describe wireless principles, compare Cisco Wireless Architectures and AP modes, and more.
|
842. | - Wireless is Calling - Will You Answer? Why Wireless Networking is a Promising Career Choice
- By
David Hucaby
- Jun 25, 2013
- David Hucaby shares his thoughts on why wireless engineering is a satisfying career choice, especially with new wireless capabilities rolling out all the time.
|
843. | - Wireless LAN Design
- Jun 2, 2006
- This chapter discusses wireless LAN (WLAN) technology and describes how it improves mobility. After introducing WLANs as strategic assets to corporate networks, WLAN standards and components are discussed. The security and management of WLANs are explored, followed by design considerations for WLANs.
|
844. | - Wireless LAN Fundamentals: Mobility
- Jan 9, 2004
- This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
|
845. | - Wireless LAN Implications, Problems, and Solutions
- Jun 15, 2015
- When designing and supporting a WLAN, however, you must be aware of potential implications, such as security vulnerabilities, radio signal interference, multipath propagation, and other issues. This chapter from Designing and Deploying 802.11 Wireless Networks explains the impacts of these problems and introduces some ways to resolve them.
|
846. | - Wireless LANs: Extending the Reach of a LAN
- By
Stephen McQuerry
- Jun 17, 2008
- This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.
|
847. | - Wireless Security
- Jul 16, 2004
- Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
|
848. | - Wireless System Architecture: How Wireless Works
- Oct 15, 2004
- Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
|
849. | - WLAN Design: Range, Performance, and Roaming Considerations
- Aug 3, 2010
- This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
|
850. | - WLAN Fundamentals
- May 30, 2012
- This excerpt from CCNA Wireless (640-722 IUWNE) Quick Reference covers Wireless Networks and Topologies.
|
851. | - Working with Protocol Analyzers and Related Certifications
- Aug 30, 2011
- Ed Tittel, creator of the Exam Cram series, discusses the current network protocol analyzers that any real expert needs to know. Who exactly counts as an "expert?" Ed also sorts out which of the many available certifications are really useful in identifying true masters of protocol analysis.
|
852. | - Workload Optimization
- By
Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, Mohit Vaswani
- Dec 17, 2022
Workload Optimizer is an analytical decision engine that generates actions that drive the IT environment toward a desired state where workload performance is assured and cost is minimized. In this sample chapter from Cisco Intersight: A Handbook for Intelligent Cloud Operations, you will explore how Workload Optimizer helps applications perform well while simultaneously minimizing cost (in a public cloud) and optimizing resource utilization (on premises) while also complying with workload policies.
|
853. | - Zero Trust Capabilities
- By
Cindy Green-Ortiz, Brandon Fowler, Jason Frazier, Hank Hensel, David Houck, Patrick Lloyd, Andrew McDonald
- Dec 24, 2023
In this sample chapter from Zero Trust Architecture, uncover the foundations of Zero Trust strategy with insights into its five pillars: policy overlay, identity-centric approach, vulnerability management, access control, and visibility. The authors offer a comprehensive guide for implementing Zero Trust in your organization.
|
854. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|