The Wi-Fi Wave

Levy, Steven; Stone, Brad
June 2002
Newsweek;6/10/2002, Vol. 139 Issue 23, p38
Reports on the increase in high-speed wireless Internet connections. Way that Wireless Fidelity, also known as Wi-Fi, works; Details of the radio origins of wireless technology; Efforts of companies to take advantage of Wi-Fi; Pros, including low cost; Cons, including issues with security; Outlook for the Wi-Fi revolution.


Related Articles

  • Beware The Hype. Seybold, Andrew // Wireless Week;2/15/2003, Vol. 9 Issue 4, p26 

    Comments on the publicity on the joint venture of companies to build several Wi-Fi hot spots in the U.S. Absence of an economic model for an independent hot spot business; Estimated revenue generated by Wi-Fi.

  • Evolution Data Only or Evolution Data Optimized.  // Network Dictionary;2007, p183 

    A definition of the term "Evolution Data Only or Evolution Data Optimized" is presented. It refers to a high-speed network protocol used for wireless Internet data communications. Asymmetric communications are supported by the protocol, allocating a majority of the bandwidth to downloads. It is...

  • Fast and Secure Session Mobility in IMS-based Vertical Handover Scenario. Bongkyo Moon // International Journal of Multimedia & Ubiquitous Engineering;Sep2014, Vol. 9 Issue 9, p171 

    In this paper, the make-before-break handover method is basically considered in order to reduce the SIP (session initiation protocol) session restoration delay due to the interface switching during WiFi-to-3G vertical handover under IMS (IP multimedia subsystem). Actually, the session...

  • Local search methods for efficient router nodes placement in wireless mesh networks. Xhafa, Fatos; S├ínchez, Christian; Barolli, Leonard // Journal of Intelligent Manufacturing;Aug2012, Vol. 23 Issue 4, p1293 

    Wireless Mesh Networks (WMNs) are an important networking infrastructure for providing cost-efficient broadband wireless connectivity to a group of users. WMNs are increasingly being used in urban, metropolitan and municipal area networks for deployment of medical, transport, surveillance...

  • Wi-Fi Networks Security and Accessing Control. Sobh, Tarek S. // International Journal of Computer Network & Information Security;Jun2013, Vol. 5 Issue 7, p9 

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the...

  • A Probability Problem Arising from the Security of the Temporal Key Hash of WPA. Ferreira, Rui // Wireless Personal Communications;Jun2013, Vol. 70 Issue 4, p1235 

    In this paper we raise and discuss a problem from the analysis done in Moen et al. (ACM SIGMOBILE Comput Commun Rev 8(2):76-83, ) about some weaknesses in the key scheduling in Wi-Fi protected access (WPA).

  • Wireless Internet access -- Wi-Fi, 3G and 4G. Stewart, John // Enterprise/Salt Lake City;10/4/2010, Vol. 40 Issue 13, p10 

    The article focuses on wireless Internet access through Wi-Fi, 3G, and 4G. According to the author, Wi-Fi is a commonly used term for wireless technology that utilizes the IEEE 802.11 standards. 3G is the third generation of the wireless protocol for wireless mobile gadgets that require the...

  • Wireless Heterogeneous Networks and Next Generation Internet. Ekici, Eylem; Vuran, Mehmet // Mobile Networks & Applications;Oct2010, Vol. 15 Issue 5, p607 

    The article focuses on the wireless heterogeneous networks and the next generation Internet. It mentions that the present developments in wireless access technologies and the rising number of mobile applications have made the Wireless Internet a reality. It notes on the management schemes,...

  • MIPv6 Secure Fast Handover Research Based MPLS. Lin Zhang; Shuwei Qiu; Jian Huang // International Proceedings of Computer Science & Information Tech;2012, Vol. 29, p18 

    The MIPv6 has already became a hot spot of the research of the wireless network. This paper has first analyzed the secure problem which existed in the based MIPv6 handoff scheme. Then one kind of high security and effective MIPv6 handoff scheme was proposed. The communication scheme based-MPLS...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics