Table of contents
Excerpt from course
WLAN technology is one of the faster growing networking technologies.
Wireless LAN technology provides a very good business model as it uses free unlicensed frequencies and provides a wireless last hop to IP networking which is free too.
Though WLAN protocol was initially designed for high bandwidth delay insensitive data applications, WLANs today are being used for a wide variety of traffic types and applications .
Some of the applications of WLANs include, corporate wireless data networks, hotspots, medical facilities using VoIP over WLAN phones and badges, department stores using wireless barcode scanners, consumer electronics using wireless communications like wireless TVs, wireless cameras.
Size : | 947.50 Kb |
File type : | |
Downloads: | 1260 |
Created: | 2016-12-27 |
This tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....
Introduction to Computer NetworkThis tutorial is aimed to learn the fundamental of computer network, many questions and answers about the popular technology used for networking systems (wireless network, cellular communication, wap, bluetooth, wimax,..). Free pdf tutorial designed to beginners....
Linux Network Administrator's GuideDownload free course Linux Network Administrator's Guide, pdf file on 507 pages by Olaf Kirch, Terry Dawson....
Guide to Computer Network Security, 4th EditionThis definitive text/reference on computer network and information security presents a com..., download free Network Security tutorial in PDF (572 pages) created by Joseph Migga Kizza ....
Rational Cybersecurity for BusinessDownload free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....
Guide to Computer Network SecurityDownload free course Guide to Computer Network Security, pdf file on 572 pages by Joseph Migga Kizza....
Language Technologies for the Challenges of the Digital AgeDownload free course Language Technologies for the Challenges of the Digital Age, pdf file on 315 pages by Georg Rehm, Thierry Declerck....
Platform Embedded Security Technology RevealedDownload free course Platform Embedded Security Technology Revealed, pdf file on 263 pages by Xiaoyu Ruan....
IP Tunneling and VPNs TutorialThe objective of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students....
Security in Computer and Information SciencesDownload free course Security in Computer and Information Sciences, pdf file on 169 pages by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras....