Standards  >   Network Protocols  >   WLAN Protocols  >  

802.11

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IEEE 802.11, Wireless Ethernet Protocols, Wireless Ethernet Standards
DEFINITION: 802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and ElectronicsEngineers (IEEE). There are several specifications in the family and new ones are occasionally added.All the 802.11 specifications use the Ethernet protocol andCarrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for path sharing.  … 
Definition continues below.
802.11White Papers (View All Report Types)
26 - 30 of 30 Matches Previous Page  |  Next Page
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks
WHITE PAPER: Network managers want to limit access to only authorized users and users need assurance they are accessing the right network. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
Posted: 21 Aug 2006 | Published: 01 May 2006

Fluke Networks
26 - 30 of 30 Matches Previous Page    1 2    Next Page
 
802.11 DEFINITION (continued): …  The original modulation used in802.11 was phase-shift keying (PSK). However, other schemes, such as complementary code keying (CCK), are used in some of the newer specifications. The newer modulation methods provide higher data speed and reduced vulnerability to interference.The 802.11 specifications are summarized in our IEEE 802 Wireless Standards: Fast Reference.Getting started with 802.11To explore how 802.11 is used in the enterprise, here are additional resources:802.11 protocols: Learn more about the different 802.11 wireless protocols and deployment basics in this guide. Mastering 802.11n: … 
802.11 definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement