Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Introduction

Published: 01 May 2003 Publication History

Abstract

In the time span of just a few years, wireless local area networking went from being a novelty to revolutionizing the way many organizations connect their computers. Visit any major department store, hospital, or office building, and you will encounter 802.11 cards in all of the PCs and access points hanging from the ceiling. The speed with which wireless networking has caught on is not surprising, as 802.11b offers up to 11Mbps of bandwidth, and a range of several hundred feet. Newer standards, such as 802.11g, promise five times the speed. Multiple wireless access points can be easily installed on the same network to increase the coverage area, so that an entire building can be easily connected. Conversely, wiring buildings with Ethernet is expensive and limits the locations from which networked computers can be used.

Cited By

View all
  • (2014)Introduction to Radioactive Waste―Management of Radioactive Waste from Operation and Decommissioning of Nuclear and Other Facilities(4)放射性廃棄物概論 施設の運転および廃止措置により発生する放射性廃棄物の対策Journal of the Atomic Energy Society of Japan10.3327/jaesjb.56.12_80256:12(802-807)Online publication date: 2014
  • (2014)“HIGH-RISK”: A Useful Tool for Improving Police Decision-Making in Hostage and Barricade IncidentsJournal of Police and Criminal Psychology10.1007/s11896-014-9151-430:3(125-138)Online publication date: 31-May-2014
  • (2012)Specializing network analysis to detect anomalous insider actionsSecurity Informatics10.1186/2190-8532-1-51:1Online publication date: 27-Feb-2012
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 46, Issue 5
Wireless networking security
May 2003
84 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/769800
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2003
Published in CACM Volume 46, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)137
  • Downloads (Last 6 weeks)36
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Introduction to Radioactive Waste―Management of Radioactive Waste from Operation and Decommissioning of Nuclear and Other Facilities(4)放射性廃棄物概論 施設の運転および廃止措置により発生する放射性廃棄物の対策Journal of the Atomic Energy Society of Japan10.3327/jaesjb.56.12_80256:12(802-807)Online publication date: 2014
  • (2014)“HIGH-RISK”: A Useful Tool for Improving Police Decision-Making in Hostage and Barricade IncidentsJournal of Police and Criminal Psychology10.1007/s11896-014-9151-430:3(125-138)Online publication date: 31-May-2014
  • (2012)Specializing network analysis to detect anomalous insider actionsSecurity Informatics10.1186/2190-8532-1-51:1Online publication date: 27-Feb-2012
  • (2012)Forensic analysis of phone call networksSocial Network Analysis and Mining10.1007/s13278-012-0060-13:1(15-33)Online publication date: 11-Mar-2012
  • (2011)Exploring extensions to working life: job lock and predictors of decreasing work function in older workersDisability and Rehabilitation10.3109/09638288.2010.54483533:19-20(1719-1727)Online publication date: 23-Sep-2011
  • (2009)Prospects for Life Span ExtensionAnnual Review of Medicine10.1146/annurev.med.60.061607.22053360:1(457-469)Online publication date: Feb-2009
  • (2005)User acceptance of Intelligence and Security Informatics technology: A study of COPLINKJournal of the American Society for Information Science and Technology10.1002/asi.2012456:3(235-244)Online publication date: 2005
  • (2004)Short-range wireless technologies with mobile payments systemsProceedings of the 6th international conference on Electronic commerce10.1145/1052220.1052302(649-656)Online publication date: 25-Mar-2004

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media