Standards  >   Network Protocols  >   WLAN Protocols  >  

Wireless Ethernet Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Ethernet ProtocolsWhite Papers (View All Report Types)
 
802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

Delivering Breakthrough Performance with 802.11ac
sponsored by Ixia
WHITE PAPER: Gain an understanding of how 802.11ac can help provide higher performance by boosting bandwidth, and dive into the technical challenges associated with this new technology.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

The Case for Next-Generation Wireless LANs: Faster Connections and More Applications and Users
sponsored by Brocade
WHITE PAPER: Read this whitepaper to discover how the next generation of WLANs is creating faster connections, more applications, and a better experience for end-users.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Brocade

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: Upgrading your network and WLANs can be a daunting task but the benefits of 802.11ac cannot be over looked. This guide offers 5 simple steps towards a successful 802.11ac migration and how it will better equip your organization.
Posted: 03 Dec 2013 | Published: 03 Dec 2013

Aruba Networks

802-11AC Demystified
sponsored by Xirrus
WHITE PAPER: This informative paper takes an in-depth look at 802.11ac, a wireless networking solution that can help your organization meet the exploding need for greater wireless performance and accessibility.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Xirrus

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: 802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Aruba Networks

How to Unify Your Wireless Architecture Without Limiting Performance or Flexibility
sponsored by D-Link
WHITE PAPER: So much is happening today to give you a chance to rethink your wireless architecture. Learn what to look for in a wireless architecture that not only provides the mobility and performance today’s applications need, but also lowers your costs of operations while increasing wireless security.
Posted: 26 Apr 2010 | Published: 26 Apr 2010

D-Link

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

802.11n Technology
sponsored by Meraki
WHITE PAPER: This paper summarizes the benefits of a wireless LAN (WLAN) network for an introduction to Multiple-In Multiple-Out (MIMO) technology. Read on to learn so much more.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

Meraki

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement