Results 1 - 10
of
41,370
Table 7 Wi-Fi hot spots in Africa
"... In PAGE 26: ... Jiwire reports information on hot spots from Boingo, Wayport, Holiday Inn and others. It holds details of 120,106 hot spots worldwide, including over 400 in Africa (see Table7 ). Alternative suppliers list fewer than two hundred.... ..."
Table 1. The relative importance of security, usability, and interoperability in Wi-Fi networks varies according to application. In some cases, users prize usability and interoperability more than security.
2004
"... In PAGE 1: ... Security has to be balanced with other requirements, such as usability and in- teroperability. In Wi-Fi networks, the relative importance of these requirements varies with application, as summarized in Table1 . Enterprise networks are in- stalled in companies or government offices and therefore require a high level of security, with mutual authentication between mobile stations and network at connection time and encryption and authentication of all user traffic after that.... ..."
Cited by 4
Table 2 : WiFi reliability test
2004
Cited by 6
Table VI. Maximum data transfer speeds for Wi-Fi.
2005
Cited by 9
Table VII. A comparison of the Bluetooth and Wi-Fi protocols.
2005
Cited by 9
Table 1. Data rates that users can expect using either cellular networks or WiFi.
"... In PAGE 4: ... Similarly, deployment of WiFi is accelerating thus increasing its geographical availability. However, 3G networks will never offer comparable data rates to WiFi ( Table1 ). Likewise, WiFi will never cover as wide a geographic area as cellular networks.... ..."
Table 1. Data rates that users can expect using either cellular networks or WiFi.
"... In PAGE 4: ... Similarly, deployment of WiFi is accelerating thus increasing its geographical availability. However, 3G networks will never offer comparable data rates to WiFi ( Table1 ). Likewise, WiFi will never cover as wide a geographic area as cellular networks.... ..."
Table VIII. Current absorbed by the Bluetooth and Wi-Fi chipsets in two operating modes.
2005
Cited by 9
Table 2. Recommendations for WI-FI Network Access Security Management (Based on Sipior and Ward, in press).
Results 1 - 10
of
41,370