IT Systems  >   Communications Networks  >   LAN  >  

WLAN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Dual-mode Wireless LAN, Wireless Local Area Networks, Wireless LAN
DEFINITION: A wireless LAN (or WLAN, for wireless local area network, sometimes referred to as LAWN, for local area wireless network) is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. The IEEE 802.11 group of standards specify the technologies for wireless LANs. 802.11 standards use the Ethernet protocol and CSMA/CA (carrier sense multiple access with  … 
Definition continues below.
WLAN Reports
1 - 25 of 182 Matches Previous Page  |  Next Page
What to Look for in 802.11ac Access Points
sponsored by SearchNetworking.com
EBOOK: More and more enterprises are looking to upgrade their wireless LAN access points (APs) to Gigabit Wi-Fi 802.11ac standards to improve WLAN access and performance for users increasingly accessing the enterprise LAN from a mobile device.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

SearchNetworking.com

Wireless Infrastructure Implementation: Best Practices
sponsored by Intel
WHITE PAPER: Access this white paper to discover best practices and best-known methods for architecting a wireless infrastructure within your organization. Follow these practices to help you quickly and efficiently replace wired LAN access services in your workspace with WLAN to provide employees with secure, reliable connections to mobile devices.
Posted: 19 Jun 2015 | Published: 28 Nov 2014

Intel

Four Key Trends Impacting Mobile Infrastructure Strategy
sponsored by IBM
WHITE PAPER: Access this white paper for an in-depth look at the key building blocks of a successful mobile enterprise infrastructure solution, as well as the major trends and challenges of deployment in the modern business world.
Posted: 19 Jun 2015 | Published: 29 Aug 2014

IBM

Intro to Simplifying WLAN Security
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to simplify WLAN configuration and secure your network from the endpoint to the core and achieve a single-pane-of-glass view. Read on now to learn more.
Posted: 06 May 2015 | Published: 04 Dec 2013

Fortinet, Inc.

Discover the Power of Network Simplicity
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why organizations like yours need to seriously consider the value of unifying and converging wired and wireless systems in order to deal with increased network demands, reinforce security at the edge, increase the use of SaaS and more.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Designing a Converged Campus Network
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines innovative technology that can help satisfy the technical requirements of a modern network without sacrificing key agility, flexibility and manageability.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

The Evolution of Wireless LAN Architectures
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Today, wireless LANs are the primary and often only network in the organization. But are you making the most of the capabilities in your contemporary WLAN architecture? Learn about the role of the control plane - and the wireless controller – in optimizing your WLAN.
Posted: 17 Apr 2015 | Premiered: 17 Apr 2015

SearchNetworking.com

The Rapid Emergence of SDN is Revolutionizing Organization's Network Architectures
sponsored by TechTarget
RESOURCE: SDN is being implemented rapidly—is your organization maximizing its benefit? SDN is on its way to improving the way wireless networks are deployed and managed. In our e-guide, The Emergence of SDN in WLAN our experts explore how SDN is changing WLAN architectures, adoption timeframes and SDN for wireless application performance.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

How to Handle Mobile Devices' Impact on the Network
sponsored by SearchNetworking.com
EBOOK: The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

SearchNetworking.com

3 Key ways to measure wireless network performance
sponsored by TechTarget
RESOURCE: Next generation wireless capabilities are placing new demands on the wireless network. Wireless connectivity is more important than ever as mobile device usage, including phones, laptops and tablets, continues to grow. Gain exclusive access to our e-book on trends reshaping the wireless networking market after taking part in our brief survey.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Understanding Wireless LAN requirements
sponsored by TechTarget
RESOURCE: A decision all leaders will make is what type of wireless LAN they implement. What can be seen as an easy decision will have a big impact on the performance and output of your employees. By taking our survey, you will help us gain insight into the purchasing process and in return, you will receive our premium content,'The Wireless LAN Report'.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Transforming Your WiFi Network Into A Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper offers up a wireless LAN solution that will help you protect your network from mounting threats.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Is your network ready for the SDN WAN?
sponsored by TechTarget
RESOURCE: It's an exciting time to be in networking – if you're prepared. Brace yourself as software-defined networking hits the enterprise WAN. Our expert e-book dives in to the sea change SDN brings to the WAN: changes to job functions, how sys admins can apply SDN and how it addresses demands new technological developments bring to the network, and more.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

TechTarget

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Ensuring an Optimal Wi-Fi Experience: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

Five steps to successfully migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: This brief guide gives 5 guidelines to ensuring a successful migration to 802.11ac. These include auditing the current infrastructure, evaluating capacity requirements and choosing the right access points for your needs.
Posted: 16 Apr 2014 | Published: 17 May 2013

Aruba Networks

Tutorial: 5 Steps to Effective Wireless Networking in Health Care
sponsored by Aerohive Networks
EGUIDE: View this e-guide from searchHealthIT.com for 5 expert tips on how to plan, implement, and manage health care wireless networks.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

Aerohive Networks

Antwerp University Hospital Supports Staff, Patients, and Students with WLAN
sponsored by Aerohive Networks
WHITE PAPER: This case study shows how Antwerp University Hospital overcame their WLAN challenges with a more scalable, controller-less solution that supported access for growing numbers of staff and students.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

Aerohive Networks

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care
sponsored by Aerohive Networks
WHITE PAPER: In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Aerohive Networks

Wireless LAN Best Practices for Compliant Care
sponsored by Aerohive Networks
WHITE PAPER: Access this white paper to discover how wireless LAN (WLAN) has become a critical part of healthcare network infrastructure.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

Aerohive Networks

Healthcare Reference Architecture – Mobile Access Solutions for Point-of-Care Applications
sponsored by Aerohive Networks
WHITE PAPER: In this white paper, discover a set of solutions that enable healthcare providers with reliable, high-performance mobile voice and data access to help improve point-of-care delivery.
Posted: 24 Mar 2014 | Published: 31 Dec 2012

Aerohive Networks

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: Upgrading your network and WLANs can be a daunting task but the benefits of 802.11ac cannot be over looked. This guide offers 5 simple steps towards a successful 802.11ac migration and how it will better equip your organization.
Posted: 03 Dec 2013 | Published: 03 Dec 2013

Aruba Networks

Alcatel-Lucent Enterprise Wireless LAN (WLAN) Key Steps to Successfully Migrate to 802.11ac
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: In this white paper, uncover the 5 essential steps to follow when migrating to 802.11ac WLAN, the next-generation Wi-Fi.
Posted: 30 Oct 2013 | Published: 16 Jun 2013

Alcatel-Lucent Enterprise

Alcatel-Lucent Enterprise Wireless LAN (WLAN) ClientMatch Technology
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Access this resource for a radio frequency (RF) management solution that gives wireless local area network (WLAN) infrastructure control over client connectivity and roaming, to ensure always-on service.
Posted: 30 Oct 2013 | Published: 16 Jun 2013

Alcatel-Lucent Enterprise
1 - 25 of 182 Matches Previous Page    1 2 3 4    Next Page
 
WLAN DEFINITION (continued): …  collision avoidance) for path sharing and include an encryption method, the Wired Equivalent Privacy algorithm.High-bandwidth allocation for wireless will make possible a relatively low-cost wiring of classrooms in the United States. A similar frequency allocation has been made in Europe. Hospitals and businesses are also expected to install wireless LAN systems where existing LANs are not already in place. Using technology from the Symbionics Networks, Ltd., a wireless LAN adapter can be made to fit on a Personal Computer Memory Card Industry Association (PCMCIA) card for a laptop or notebook … 
WLAN definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement