Lack of Integration at the Protocol Structural Level At the most fundamental level of integration wireless networks often support a varying standard to the Carrier Sense Multiple Access, Collision Detection (CSMA/CD) based protocols that full category-5 cabled networks do, in addition to having more options for optimizing network performance. Wireless protocols for example support both asynchronous and synchronous communication and have for decades successfully compared to many legacy information systems platforms from proprietary vendors including IBM and their Token Ring standard and others (Adams, Dimitriou, 2008)
While speed and customization of IEEE 802.11 standards continues ironically these networks have less versatility than a fully-wired counterpart using standard TCP/IP-based command structures and configuration (Macedo, dos Santos, Correia, Nogueira, Pujolle, 2010)
This has become even more challenging as the threat levels and complexity of them continue to accelerate over time as well (Potter, 2007). The ability to hack through Secured Socket Layers (SSL) of Web-based applications just underscores how susceptible enterprise networks are and how easily they could be compromised (Rowan, 2010)
The ability to hack through Secured Socket Layers (SSL) of Web-based applications just underscores how susceptible enterprise networks are and how easily they could be compromised (Rowan, 2010). To attain a level of security consistency, often the entire network must be slowed down to a minimal level to allow for packet checking and verification (Zhu, Fang, Wang, 2010)
5, users can detect unauthorized or rogue access points. They can also deploy new access points with the help of the coverage maps the system creates (Rendon, 2003)