Home > Articles > Networking > Wireless/High Speed/Optical

Wireless/High Speed/Optical

240 Items

Sort by Date | Title

Wireless LANs: Extending the Reach of a LAN
By Stephen McQuerry
Jun 17, 2008
This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.
Wireless Markup Language
Oct 1, 2000
WAP, the Wireless Application Protocol TM, is a set of standards specifically designed to meet the challenges of the wireless Internet. An important part of WAP is the Wireless Markup Language (WML), used to define content for WAP devices.
Wireless Markup Languages
Oct 26, 2001
In this article, Paul Wallace outlines the current crop of markup languages that are used for developing i-mode content.
Wireless Networking with Windows Vista in a Domain Environment
Dec 8, 2006
Zubair Alexander discusses various methods for joining a Windows Vista wireless network client to an Active Directory domain, and addresses some of the security issues involved.
Wireless Networks: An Overview
By William Stallings
Oct 26, 2001
In this first in a series of articles on wireless networks, network expert Bill Stallings provides an overview of the subject.
Wireless Networks: To Probe Further
By William Stallings
Oct 26, 2001
This final article in a seven-part series by network expert Bill Stallings provides suggestions for further reading and pointers to other resources for keeping up with the fast-changing landscape of LAN technology and products.
Wireless Networks: Where We Are, Where We're Headed
Jun 28, 2002
Follow the evolution of the telecommunications industry from start to present. Learn about the principles of air-interface designs, the impact of the internet and cable television networks, and the standard development process that continues to shape the industry.
Wireless Security and Privacy: Identify Targets and Roles
Dec 20, 2002
Follow this plan to break down your wireless system into functional blocks, then determine which resources or data require protection. After identifying possible security targets, you determine the roles that affect the targets. With the roles and targets identified, you'll be ready to mitigate and protect your system.
Wireless Security Fundamentals
Oct 19, 2001
Bryan Morgan discusses the issues involved in protecting wireless software and data from intrusion.
Wireless Spam: Preparing for the Coming Blizzard
Feb 25, 2005
Wireless spam? It might not be a problem for you yet, but within a year or two, it will be! Anne Zieger has some tips on how to meet this threat head-on before it causes big hassles for your users.
Wireless System Architecture: How Wireless Works
Oct 15, 2004
Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
Wireless: The View from 30,000 feet
Sep 2, 2001
Like most new devices, the hype for wireless far outflew the realities of the technology. But as Frank Coyle explains, this is really part of the lifecycle of new products.
Wizarding Up a WAP Application
May 24, 2002
Discover decks, cards, and links, and build your first WAP application! Then watch your tiny little application in action.
WLAN Design: Range, Performance, and Roaming Considerations
Aug 3, 2010
This chapter provides insight and addresses important elements you should consider to avoid common problems when designing a wireless LAN.
WMLScript
Oct 30, 2000
In the fourth article in the Wireless Access Protocol series, authors Chris Bennett and Frank Coyle provide an overview of the language basics behind WMLScript.
WTAI + Voice = WAP's Killer App?
Jul 13, 2001
Bryan Morgan discusses the exciting applications that can result when voice and wireless data technologies converge in WTAI.
XML and Wireless Technologies: WML
Apr 16, 2004
David Gulbransen illustrates how XML penetrates just about everywhere in the Internet. However, the triumph of XML has continued even after thatโ€”to wireless technologies.
Your Home Network: Should You Go Wireless?
Oct 17, 2003
Wireless networking offers some obvious convenience over its wired counterparts, such as Ethernet networks and those that work over the telephone or via electrical wiring in your house. However, wireless networking also has some drawbacks. It's a good idea to know a little about the pros and cons before you start your network.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
Zune: Reflections on the First Generation
Oct 12, 2007
John Tränkenschuh explains his love-hate relationship with his Zune.

<< < Prev Page 8 9 10 11 12