Bluetooth is a low power, short wave, short range wireless technology that is used to transfer data between two devices over the wireless medium. In this article, we will have...
Category: Wireless Network
Unlike a Wired Network, where adding more network switches gives better performance, a wireless network cannot be optimized for performance by adding more access points/ denser deployment of access points...
Planning for a Wireless network is not as simple as Wired network. Unlike wired networks, over-provisioning (of access points) is not a very good idea with wireless networks because of...
What is a Wireless Honeypot Attack? Normally, when a wireless client (PC, Laptop) is switched on, it will try to probe the nearby area for access points for a particular...
Rogue Access Points: Sometimes, an employee, or a guest might bring along inexpensive consumer grade access points and connect them to the corporate LAN to get wireless access. This can...
So, as mentioned above, a wireless intrusion prevention system continuously scans for various wireless threats over the air and reports the same, when found. Some of them are automatically configured...
This post gives six important security tips you need to follow to secure your Wireless (Wi-Fi) connection from being misused by neighbors / intruders. Every wireless access point comes with...
What can you do with a controller based centralized wireless networks of today? Read on to find out the features and functionality provided by controller based wireless (Wi-Fi) networks for...
This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and...
This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device...
This article discusses the difference between Stand-Alone Access Points (Thick) and Controller based Access Points (Thin) in a wireless network. We discuss the basic structural difference, authentication, radio management, security,...
This article gives an introduction to the Wi-Fi based RFID Tags, how the location of assets can be identified by the combination of Enterprise Wi-Fi and RFID technologies, what can...
This article explores the ways in which the guests can be given access to wireless networks, whether they could be authenticated, whether their access can be restricted to certain services...
Since Wi-Fi has become a very popular standard now for network access at the edge level, this article looks to ponder if an all wireless office is a possibility. We...