Standards  >   Network Protocols  >   WLAN Protocols  >  

Wireless Ethernet Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Ethernet ProtocolsReports
 
802.11ac: The Fifth Generation of Wi-Fi
sponsored by Cisco India
WHITE PAPER: This white paper is an excellent resource for learning about 802.11ac, including what it is, how it works, how it differs from 802.11n, and the impact that it can have within your enterprise.
Posted: 21 Jul 2014 | Published: 31 Mar 2014

Cisco India

Top 7 applications for 802.11ac Gigabit Wi-Fi
sponsored by Aruba Networks
WHITE PAPER: This brief guide shows the top 7 use cases for the new 802.11ac Wi-Fi and highlights how this provides improved speed and capacity.
Posted: 15 Apr 2014 | Published: 17 May 2013

Aruba Networks

Network Evolution E-Zine: Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by SearchSecurity.com
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

SearchSecurity.com

802.11ac Deployment Considerations
sponsored by Extreme Networks
WHITE PAPER: This informative resource examines deployment considerations for getting the most value from the first wave of 802.11ac wireless products, discussing how your organization can best reap the benefits of the latest in Wi-Fi technology.
Posted: 20 May 2014 | Published: 20 May 2014

Extreme Networks

802.11n Technology
sponsored by Meraki
WHITE PAPER: This paper summarizes the benefits of a wireless LAN (WLAN) network for an introduction to Multiple-In Multiple-Out (MIMO) technology. Read on to learn so much more.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

Meraki

Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks
WHITE PAPER: Network managers want to limit access to only authorized users and users need assurance they are accessing the right network. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
Posted: 21 Aug 2006 | Published: 01 May 2006

Fluke Networks

Building High Performance Networks with 802.11ac
sponsored by Xirrus
WHITE PAPER: This resource takes an inside look at the 802.11ac wireless networking standard, and offers tips and tactics to help you approach wired-equivalent performance per user.
Posted: 29 Jul 2013 | Published: 31 Dec 2012

Xirrus

Magic Quadrant: WLAN Infrastructure
sponsored by Aruba Networks
ANALYST REPORT: The ratification of the 802.11n standard provides higher-speed wireless options and a replacement for access connectivity that has traditionally been wired. Learn about Gartner's assessment of vendors for controller-based WLAN systems.
Posted: 26 Aug 2010 | Published: 12 Feb 2010

Aruba Networks

Alcatel-Lucent Enterprise Wireless LAN (WLAN) Key Steps to Successfully Migrate to 802.11ac
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: In this white paper, uncover the 5 essential steps to follow when migrating to 802.11ac WLAN, the next-generation Wi-Fi.
Posted: 30 Oct 2013 | Published: 16 Jun 2013

Alcatel-Lucent Enterprise

802-11AC Demystified
sponsored by Xirrus
WHITE PAPER: This informative paper takes an in-depth look at 802.11ac, a wireless networking solution that can help your organization meet the exploding need for greater wireless performance and accessibility.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Xirrus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement