November 2008- Cisco explores the challenges and provides some solutions for a voice-ready WLAN.
May 2008- Wi-Fi Alliance notes that Wi-Fi Certified products bring interoperability and better user experience to WLAN technology; more than 4,300 products certified since March 2000. The Alliance provides this presentation to detail other benefits of Wi-Fi.
What drives the Session Initiation Protocol (SIP):
To be a universal text-based protocol
for managing multimedia sessions over IP, and for
exchanging notifications (presence) between end points
in the public: Internet, carrier networks, enterprise networks
April 2008- Device management is critical in implementing any mobility solution for the business IT environment, according to Nokia. This presentation details some of the benefits of mobile device management.
March 2008- IP telephony, RFID, and location integration are the topics discussed in this Motorola presentation. It includes a discussion of Motorola's vision for the evolving mobility landscape.
March 2008- What are the major security threats for wireless LANs today? How do you mitigate these? What standards and technologies are relevant in WLAN security? dBrn Associates investigates mobile security in this presentation.
March 2008- Voice over wireless LANs (VoWLANs) require such things as pervasive coverage and quality of service, among other factors. This white paper examines such requirements and whether a voice-capable WLAN can be deployed in a cost-effective manner.
March 2008- Cisco features this presentation on location services. Business operations can be greatly enhanced through location services. A fully integrated location solution leverages existing WLAN infrastructure. Networks provide the integration platform for RFID, location services, and Unified Communication.
January 2009- This white paper provides an overview of security threats in a wireless LAN (WLAN) environment, many of which go unnoticed. It discusses how HP ProCurve can help you deploy a secure and managed Wi-Fi infrastructure that can defend itself against wireless threats and help you comply with PCI guidelines.
Comprehensive LAN Security: A Business Requirement [ Source: HP ]
January 2009- This paper goes beyond a simple restatement of the problem of network security, proposing a viable solution: ProCurve’s ProActive Defense strategy. The ProCurve ProActive Defense strategy delivers a cohesive network security approach, backed by products and services designed to give businesses the best possible chance to keep their networks up and running, and their crucial information and processes both safe and available.
January 2009- Like any network technology, wireless local area networks (WLANs) need to be protected from security threats. Though recent developments in IEEE standards have been designed to help ensure privacy for authenticated WLAN users, WLAN clients and enterprise infrastructure can still be vulnerable to a variety of threats that are unique to WLANs.
October 2008- Ask a hundred CIOs what three things about WLANs (wireless LANs) strike fear into their hearts, and the answers are likely to be similar: Security, Security, and Security. Sure, you want good coverage. Sure, you want to minimize drops. But the only way an executive is likely to lose their job over a wireless network is if they end up like the folks at The TJX Companies, who saw millions of credit card numbers stolen ...
January 2008- This paper from Nortel Networks provides a terabit cluster based on the Nortel Ethernet Routing Switch 8600 at the core. This delivers industry-leading reliability and active, sub-second resilience by ensuring that no single component failure is able to impact critical applications or services. Furthermore, it is flexible enough to allow for the rapid expansion of DSOs business operations, while providing a solid foundation to support state-of-the-art multimedia applications that meet the evolving requirements of staff, ...
January 2008- This paper provides a configuration example on how to configure Wireless LAN Controllers (WLCs) and Lightweight Access Points (LAPs) for multicasting and communication with a multicast enabled wired network. Lightweight Access Point Protocol (LWAPP) tunnel to each access point (AP) connected to the controller. Each multicast frame received by the controller from a VLAN on the first hop router was copied and sent over the LWAPP tunnel to each of the APs connected to it. ...
January 2008- Hospital de Sao Sebastiao wanted medical staff to have anytime access to high-bandwidth medical images and data, no matter where they were located in the Hospital. But their network did not have the capacity to allow both this and other critical activities to take place at the same time. A highly available network core based upon an actively resilient configuration of the Nortel Ethernet Routing Switch 8600. High-speed connectivity - vital for accessing and exchanging medical ...
January 2008- Multiple Input Multiple Output (MIMO) communication, enabled by the presence of multiple transmit and receive antennas in the communication link, is a physical layer technology that can improve throughput in WLANs. Unfortunately, the cost of MIMO in terms of additional overhead, is often overlooked. In this paper the impact of overhead on MAC throughput is evaluated, using representative physical and MAC models. Several different MIMO configurations including spatial multiplexing, concurrent transmit and receive beam forming, ...
January 2008- CGI Group, Inc., one of the largest independent information technology (IT) services firms in the world. CGI Group wanted to set up two new help desk centers that would reuse existing hardware and applications, reduce cost and complexity, provide resilience through geographic redundancy and give contact center workers the freedom to stay accessible while not at their desks. The company deployed a Nortel contact center solution that offers the cost savings and flexibility of IP ...
January 2008- Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area Networks (WLANs). Several known vulnerabilities and attack tools have compromised WEP making it unsuitable for secure WLAN implementations, without additional layers of security. AirDefenses patented WEP Cloaking solution is designed to make WEP virtually invulnerable to known attacks and tools, providing a robust layer of protection for legacy WLANs. The solution does not require any hardware ...
January 2008- This paper from Hewlett-Packard provides information to help identify and troubleshoot common problems in a wireless LAN in which there is at least one Access Point (AP) connected to a wired LAN and one or more wireless stations. ProCurve wireless access points operate best when loaded with the most current version of software. Upgrade to the latest version of software early within the troubleshooting process.
January 2008- This paper explains how to configure NTP in wireless LAN devices, such as Wireless LAN Controller (WLC), Wireless Control System (WCS) and Wireless Location Appliance. In a Unified Wireless Network, it is essential that the WLCs, Location Appliance and WCS use NTP in order to have a common clock source. This paper explains how to synchronize local time on the different devices of a Unified Wireless Network. This is particularly important for Daylight Savings Time (...
January 2008- This paper published by Intermec Technologies discusses about Cisco Compatible Extensions: Client Benefits on a Cisco WLAN. A successful wireless implementation extends beyond the usual radio-to-access point communication supported by the IEEE 802.11 b/g standard. Cisco Compatible Extensions working in conjunction with a Cisco wireless network not only provide information vital to the network, Cisco and its partners also test and support every feature. Some of the most compelling benefits to working under unified network ...
January 2008- This research paper is the first analytical work to exhibit the substantial gains that result from applying site specific knowledge to frequency allocation in wireless networks. Two site-specific knowledge-based frequency allocation algorithms are introduced, and are shown to outperform all other published work. Site specific knowledge refers to the use of knowledge of the surrounding propagation environment, building layouts, the locations of APs and users, and the locations and electrical properties of physical objects.
January 2008- Cambridge Health Alliance, a nationally recognized healthcare system serving the residents of the Massachusetts cities of Cambridge and Somerville and Bostons Metro-North region. The company?s challenge was to deliver patient-care services electronically, anywhere, anytime, from any device, with an IT infrastructure thats converged, cost-efficient, reliable and secure. They upgraded to a wireless solution that include the addition of the Nortel WLAN 2300 Series and Nortel IP Phone 2000 Series; upgrades to its core Ethernet ...
January 2008- The main idea of the OBAN concept is that the future deployment of broadband access lines and wireless LANs will have so much excess capacity, beyond what will be utilized by the host households, that it can also accommodate public wireless access services. The purpose of this paper published by Telenor is to analyze the viability of this idea with respect to traffic capacity. The paper presents three types of results. Radio coverage has been ...
January 2008- WLAN is gradually moving in the enterprise and public areas with the growing demand for real time applications need for quality of service (QoS) is increasing. To offer network services transparently to end-users in converged network environment, WLAN access networks require a resource allocation mechanism and QoS guarantees similar to 3G networks. Current QoS support in WLANs enables prioritization to differentiate between real time and elastic traffic flows. This paper from Alcatel complements this by ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services