All Cisco Network Technology Articles
361. | - Wireless LAN Fundamentals: Mobility
- Jan 9, 2004
- This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
|
362. | - Wireless LAN Implications, Problems, and Solutions
- Jun 15, 2015
- When designing and supporting a WLAN, however, you must be aware of potential implications, such as security vulnerabilities, radio signal interference, multipath propagation, and other issues. This chapter from Designing and Deploying 802.11 Wireless Networks explains the impacts of these problems and introduces some ways to resolve them.
|
363. | - Wireless LANs: Extending the Reach of a LAN
- By
Stephen McQuerry
- Jun 17, 2008
- This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.
|
364. | - Wireless Security
- Jul 16, 2004
- Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
|
365. | - Wireless System Architecture: How Wireless Works
- Oct 15, 2004
- Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
|
366. | - WLAN Design: Range, Performance, and Roaming Considerations
- Aug 3, 2010
- This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
|
367. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|