Wireless networks first-step /
Saved in:
Author / Creator: | Geier, James T. |
---|---|
Imprint: | Indianapolis, IN : Cisco Press, ©2005. |
Description: | 1 online resource (xx, 238 pages) : illustrations. |
Language: | English |
Series: | First-step series First-step series. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13590683 |
Table of Contents:
- Introduction
- Chapter 1. The Wireless World: An Introduction to Concepts
- Wireless Networks Defined
- Wireless PANs
- Wireless LANs
- Wireless MANs
- Wireless WANs
- Drawing the Line
- Wireless Network Applications
- Basic Configurations
- Internet Access
- Voice over Wireless
- Inventory Control
- Health Care
- Education
- Real Estate
- Utilities
- Field Service
- Field Sales
- Vending
- Public Networks
- Location-Based Services
- Wireless Network Benefits
- Increasing Efficiency and Accuracy
- Office Example
- Warehouse Example
- Hospital Example
- Improving Reliability
- Chapter 2. Wireless System Architecture: How Wireless Works
- Wireless Network System Components
- Users
- Computer Devices
- NICs
- Air Medium
- Wireless Network Infrastructures
- Base Stations
- Access Controllers
- Application Connectivity Software
- Distribution System
- Management Systems
- Security
- Help Desk
- Configuration Management
- Network Monitoring
- Reporting
- Engineering
- Maintenance
- Network Architecture
- Information Signals
- Digital Signals
- Analog Signals
- Flow of Information Through a Wireless Network
- End Points of Information Flow
- Inputting, Storing, and Displaying Information
- Interfacing with the Air Medium
- Medium Access
- Error Control
- Transferring Wireless Data Signals
- Connecting with the Wireless Network Infrastructure
- Chapter 3. Radio Frequency and Light Signal Fundamentals: The Invisible Medium
- Wireless Transceivers
- Understanding RF Signals
- RF Signal Attributes
- RF Signal Pros and Cons
- RF Signal Impairments
- Interference
- Multipath
- Understanding Light Signals
- Light Signal Attributes
- Light Signal Pros and Cons
- Light Signal Impairments
- Interference
- Attenuation Because of Obstructions and Weather
- Modulation: Preparing Signals for Propagation
- Frequency Shift-Keying
- Phase Shift-Keying
- Quadrature Amplitude Modulation
- Spread Spectrum
- Orthogonal Frequency Division Multiplexing
- Ultrawideband Modulation
- Chapter 4. Wireless PANs: Networks for Small Places
- Wireless PAN Components
- User Devices
- Radio NICs
- USB Adapters
- Routers
- Wireless PAN Systems
- Home and Small Office
- Synchronization
- Streaming Multimedia
- Control
- Printing
- Internet Connections
- Enterprise
- Wireless PAN Technologies
- 802.15
- Bluetooth
- Basic Features
- Could Bluetooth Replace Wireless LANs?
- Could Wireless LANs Replace Bluetooth?
- Minimizing Bluetooth Interference
- IrDA
- Basic Features
- Chapter 5. Wireless LANs: Networks for Buildings and Campuses
- Wireless LAN Components
- User Devices
- Radio NICs
- Access Points
- Routers
- Repeaters
- Antennae
- Wireless LAN Systems
- Home and Small Office Wireless LANs
- Enterprise Wireless LANs
- Public Wireless LANs
- Ad Hoc Wireless LANs
- Wireless LAN Technologies
- 802.11
- 802.11 MAC Layer
- 802.11 Physical Layers
- Wi-Fi
- What Wi-Fi Means
- Wi-Fi Protected Access
- HiperLAN/2
- HiperLAN/2 Enhancements
- Is HiperLAN/2 a Threat to 802.11?
- Chapter 6. Wireless MANs: Networks for Connecting Buildings and Remote Areas
- Wireless MAN Components
- Bridges
- Bridges Versus Access Points
- Basic Ethernet-to-Wireless Bridges
- Workgroup Bridges
- Directional Antennae
- Semidirectional Antennae
- Highly Directional Antennae
- Effect of Polarization
- Wireless MAN Systems
- Point-to-Point Systems
- Point-to-Multipoint System
- Packet Radio Systems
- Wireless MAN Technologies
- 802.11 and Wi-Fi
- 802.16
- Chapter 7. Wireless WANs: Networks for Worldwide Connections
- Wireless WAN Components
- Wireless WAN User Devices
- Radio NICs
- Base Stations
- Antennae
- Wireless WAN Systems
- Cellular-Based Wireless WANs
- First-Generation Cellular
- Second-Generation Cellular
- Third-Generation Cellular
- Space-Based Wireless WANs
- Satellites
- Meteor Burst Communications
- Wireless WAN Technologies
- Frequency Division Multiple Access
- Time Division Multiple Access
- Code Division Multiple Access
- Spatial Division Multiple Access (SDMA)
- Chapter 8. Wireless Network Security: Protecting Information Resources
- Security Threats
- Traffic Monitoring
- Unauthorized Access
- Man-in-the-Middle Attacks
- Denial of Service
- Encryption
- WEP
- WEP Operation
- WEP Issues
- When to Use WEP
- Temporal Key Integrity Protocol
- Wi-Fi Protected Access
- Virtual Private Networks
- Authentication
- 802.11 Authentication Vulnerabilities
- MAC Filters
- Authentication Using Public Key Cryptography
- 802.1x
- 802.1x Operation
- Authentication Types
- Security Policies
- Assessment Steps
- Review Existing Security Policies
- Review the Existing System
- Interview Users
- Verify Configurations of Wireless Devices
- Identify Rogue Base Stations
- Perform Penetration Tests
- Analyze Security Gaps
- Recommend Improvements
- Common Security Policies
- Place Wireless Users Outside a Firewall
- Use Effective Encryption
- Ensure Firmware Is Up-to-Date
- Physically Secure Base Stations
- Assign Strong Passwords to Base Stations
- Don't Broadcast SSIDs
- Reduce Propagation of Radio Waves
- Implement Personal Firewalls
- Monitor Base Station Configuration
- Control Deployments
- Appendix A. Answers to Chapter Review Questions
- Glossary
- Index