Wireless networks first-step /

Saved in:
Bibliographic Details
Author / Creator:Geier, James T.
Imprint:Indianapolis, IN : Cisco Press, ©2005.
Description:1 online resource (xx, 238 pages) : illustrations.
Language:English
Series:First-step series
First-step series.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13590683
Hidden Bibliographic Details
ISBN:1587201119
9781587201110
1587201119
Notes:Includes index.
Summary:Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs. Wireless Networks First-Step , written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats. 158720111903232004
Other form:Print version: 1587201119
Standard no.:619472201114
9781587201110
Table of Contents:
  • Introduction
  • Chapter 1. The Wireless World: An Introduction to Concepts
  • Wireless Networks Defined
  • Wireless PANs
  • Wireless LANs
  • Wireless MANs
  • Wireless WANs
  • Drawing the Line
  • Wireless Network Applications
  • Basic Configurations
  • Internet Access
  • Voice over Wireless
  • Inventory Control
  • Health Care
  • Education
  • Real Estate
  • Utilities
  • Field Service
  • Field Sales
  • Vending
  • Public Networks
  • Location-Based Services
  • Wireless Network Benefits
  • Increasing Efficiency and Accuracy
  • Office Example
  • Warehouse Example
  • Hospital Example
  • Improving Reliability
  • Chapter 2. Wireless System Architecture: How Wireless Works
  • Wireless Network System Components
  • Users
  • Computer Devices
  • NICs
  • Air Medium
  • Wireless Network Infrastructures
  • Base Stations
  • Access Controllers
  • Application Connectivity Software
  • Distribution System
  • Management Systems
  • Security
  • Help Desk
  • Configuration Management
  • Network Monitoring
  • Reporting
  • Engineering
  • Maintenance
  • Network Architecture
  • Information Signals
  • Digital Signals
  • Analog Signals
  • Flow of Information Through a Wireless Network
  • End Points of Information Flow
  • Inputting, Storing, and Displaying Information
  • Interfacing with the Air Medium
  • Medium Access
  • Error Control
  • Transferring Wireless Data Signals
  • Connecting with the Wireless Network Infrastructure
  • Chapter 3. Radio Frequency and Light Signal Fundamentals: The Invisible Medium
  • Wireless Transceivers
  • Understanding RF Signals
  • RF Signal Attributes
  • RF Signal Pros and Cons
  • RF Signal Impairments
  • Interference
  • Multipath
  • Understanding Light Signals
  • Light Signal Attributes
  • Light Signal Pros and Cons
  • Light Signal Impairments
  • Interference
  • Attenuation Because of Obstructions and Weather
  • Modulation: Preparing Signals for Propagation
  • Frequency Shift-Keying
  • Phase Shift-Keying
  • Quadrature Amplitude Modulation
  • Spread Spectrum
  • Orthogonal Frequency Division Multiplexing
  • Ultrawideband Modulation
  • Chapter 4. Wireless PANs: Networks for Small Places
  • Wireless PAN Components
  • User Devices
  • Radio NICs
  • USB Adapters
  • Routers
  • Wireless PAN Systems
  • Home and Small Office
  • Synchronization
  • Streaming Multimedia
  • Control
  • Printing
  • Internet Connections
  • Enterprise
  • Wireless PAN Technologies
  • 802.15
  • Bluetooth
  • Basic Features
  • Could Bluetooth Replace Wireless LANs?
  • Could Wireless LANs Replace Bluetooth?
  • Minimizing Bluetooth Interference
  • IrDA
  • Basic Features
  • Chapter 5. Wireless LANs: Networks for Buildings and Campuses
  • Wireless LAN Components
  • User Devices
  • Radio NICs
  • Access Points
  • Routers
  • Repeaters
  • Antennae
  • Wireless LAN Systems
  • Home and Small Office Wireless LANs
  • Enterprise Wireless LANs
  • Public Wireless LANs
  • Ad Hoc Wireless LANs
  • Wireless LAN Technologies
  • 802.11
  • 802.11 MAC Layer
  • 802.11 Physical Layers
  • Wi-Fi
  • What Wi-Fi Means
  • Wi-Fi Protected Access
  • HiperLAN/2
  • HiperLAN/2 Enhancements
  • Is HiperLAN/2 a Threat to 802.11?
  • Chapter 6. Wireless MANs: Networks for Connecting Buildings and Remote Areas
  • Wireless MAN Components
  • Bridges
  • Bridges Versus Access Points
  • Basic Ethernet-to-Wireless Bridges
  • Workgroup Bridges
  • Directional Antennae
  • Semidirectional Antennae
  • Highly Directional Antennae
  • Effect of Polarization
  • Wireless MAN Systems
  • Point-to-Point Systems
  • Point-to-Multipoint System
  • Packet Radio Systems
  • Wireless MAN Technologies
  • 802.11 and Wi-Fi
  • 802.16
  • Chapter 7. Wireless WANs: Networks for Worldwide Connections
  • Wireless WAN Components
  • Wireless WAN User Devices
  • Radio NICs
  • Base Stations
  • Antennae
  • Wireless WAN Systems
  • Cellular-Based Wireless WANs
  • First-Generation Cellular
  • Second-Generation Cellular
  • Third-Generation Cellular
  • Space-Based Wireless WANs
  • Satellites
  • Meteor Burst Communications
  • Wireless WAN Technologies
  • Frequency Division Multiple Access
  • Time Division Multiple Access
  • Code Division Multiple Access
  • Spatial Division Multiple Access (SDMA)
  • Chapter 8. Wireless Network Security: Protecting Information Resources
  • Security Threats
  • Traffic Monitoring
  • Unauthorized Access
  • Man-in-the-Middle Attacks
  • Denial of Service
  • Encryption
  • WEP
  • WEP Operation
  • WEP Issues
  • When to Use WEP
  • Temporal Key Integrity Protocol
  • Wi-Fi Protected Access
  • Virtual Private Networks
  • Authentication
  • 802.11 Authentication Vulnerabilities
  • MAC Filters
  • Authentication Using Public Key Cryptography
  • 802.1x
  • 802.1x Operation
  • Authentication Types
  • Security Policies
  • Assessment Steps
  • Review Existing Security Policies
  • Review the Existing System
  • Interview Users
  • Verify Configurations of Wireless Devices
  • Identify Rogue Base Stations
  • Perform Penetration Tests
  • Analyze Security Gaps
  • Recommend Improvements
  • Common Security Policies
  • Place Wireless Users Outside a Firewall
  • Use Effective Encryption
  • Ensure Firmware Is Up-to-Date
  • Physically Secure Base Stations
  • Assign Strong Passwords to Base Stations
  • Don't Broadcast SSIDs
  • Reduce Propagation of Radio Waves
  • Implement Personal Firewalls
  • Monitor Base Station Configuration
  • Control Deployments
  • Appendix A. Answers to Chapter Review Questions
  • Glossary
  • Index