Skip to content
excITingIP.com

Tech Blog & Business Insights

 Menu
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map

Category: Wireless Network

An overview of bluetooth technology and its enterprise applications

  • Rajesh K
  • May 2, 2011May 2, 2011

Bluetooth is a low power, short wave, short range wireless technology that is used to transfer data between two devices over the wireless medium. In this article, we will have...

Why Wireless Interference is an important consideration in Wi-Fi networks

  • Rajesh K
  • April 23, 2011August 22, 2014

Unlike a Wired Network, where adding more network switches gives better performance, a wireless network cannot be optimized for performance by adding more access points/ denser deployment of access points...

Why a Site Survey is crucial before implementing a Wi-Fi network

  • Rajesh K
  • March 20, 2011March 21, 2011

Planning for a Wireless network is not as simple as Wired network. Unlike wired networks, over-provisioning (of access points) is not a very good idea with wireless networks because of...

Honeypot & Man In the Middle (MITM) Attacks on Wireless Networks

  • Rajesh K
  • January 24, 2011

What is a Wireless Honeypot Attack? Normally, when a wireless client (PC, Laptop) is switched on, it will try to probe the nearby area for access points for a particular...

What are Rogue Access Points and how Rogue Access Points are detected & blocked

  • Rajesh K
  • January 24, 2011January 24, 2011

Rogue Access Points: Sometimes, an employee, or a guest might bring along inexpensive consumer grade access points and connect them to the corporate LAN to get wireless access. This can...

Wireless Intrusion Prevention System (WIPS) Deployment Architectures – Overlay, Integrated & Hybrid

  • Rajesh K
  • January 14, 2011January 15, 2011

So, as mentioned above, a wireless intrusion prevention system continuously scans for various wireless threats over the air and reports the same, when found. Some of them are automatically configured...

Six security tips for securing your Wi-Fi Access Point/Router at Home/SOHO

  • Rajesh K
  • March 25, 2010

This post gives six important security tips you need to follow to secure your Wireless (Wi-Fi) connection from being misused by neighbors / intruders.  Every wireless access point comes with...

Why is a Controller required in a wireless network

  • Rajesh K
  • March 8, 2010April 9, 2010

What can you do with a controller based centralized wireless networks of  today? Read on to find out the features and functionality provided by controller based wireless (Wi-Fi) networks for...

Using Directional and Omni-Directional Antennas in Wireless Networks

  • Rajesh K
  • July 20, 2009January 25, 2011

This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and...

Managing multi-vendor wireless access points in Wi-Fi networks

  • Rajesh K
  • July 14, 2009January 25, 2011

This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device...

Difference between Stand Alone Access points and Controller based Access points

  • Rajesh K
  • July 10, 2009January 25, 2011

This article discusses the difference between Stand-Alone Access Points (Thick) and Controller based Access Points (Thin) in a wireless network. We discuss the basic structural difference, authentication, radio management, security,...

Location Tracking using Wi-Fi based RFID Tags

  • Rajesh K
  • July 7, 2009January 25, 2011

This article gives an introduction to the Wi-Fi based RFID Tags, how the location of assets can be identified by the combination of Enterprise Wi-Fi and RFID technologies, what can...

Guest Access in Wireless LAN

  • Rajesh K
  • July 1, 2009January 25, 2011

This article explores the ways in which the guests can be given access to wireless networks, whether they could be authenticated, whether their access can be restricted to certain services...

Advantages and dis-advantages of having wireless (Wi-Fi) as primary network

  • Rajesh K
  • June 19, 2009June 19, 2009

Since Wi-Fi has become a very popular standard now for network access at the edge level, this article looks to ponder if an all wireless office is a possibility. We...

Rajesh K's Intellifluence Influencer Badge

(c) 2009 to Now by excITingIP.com Masonry Blog, WordPress theme by Perfectwpthemes