Cisco Network Technology

All Cisco Network Technology Articles

Showing 361-367 of 367

Sort by Date | Title

Page: < Prev 15 16 17 18 19

361.
Wireless LAN Fundamentals: Mobility
Jan 9, 2004
This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
362.
Wireless LAN Implications, Problems, and Solutions
Jun 15, 2015
When designing and supporting a WLAN, however, you must be aware of potential implications, such as security vulnerabilities, radio signal interference, multipath propagation, and other issues. This chapter from Designing and Deploying 802.11 Wireless Networks explains the impacts of these problems and introduces some ways to resolve them.
363.
Wireless LANs: Extending the Reach of a LAN
By Stephen McQuerry
Jun 17, 2008
This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.
364.
Wireless Security
Jul 16, 2004
Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
365.
Wireless System Architecture: How Wireless Works
Oct 15, 2004
Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
366.
WLAN Design: Range, Performance, and Roaming Considerations
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
367.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.

Page: < Prev 15 16 17 18 19