Introduction to Wireless LANs | p. 1 |
The Wireless LAN Market | p. 2 |
History of Wireless LANs | p. 2 |
Today's Wireless LAN Standards | p. 3 |
Applications of Wireless LANs | p. 4 |
Access Role | p. 5 |
Network Extension | p. 6 |
Building-to-Building Connectivity | p. 7 |
Last Mile Data Delivery | p. 8 |
Mobility | p. 9 |
Small Office-Home Office | p. 11 |
Mobile Offices | p. 12 |
Summary | p. 13 |
Radio Frequency (RF) Fundamentals | p. 25 |
Radio Frequency | p. 26 |
RF Behaviors | p. 27 |
Voltage Standing Wave Ratio (VSWR) | p. 34 |
Principles of Antennas | p. 36 |
Line of Sight (LOS) | p. 37 |
Fresnel Zone | p. 38 |
Antenna Gain | p. 39 |
Intentional Radiator | p. 40 |
Equivalent Isotropically Radiated Power (EIRP) | p. 41 |
Radio Frequency Mathematics | p. 42 |
Units of Measure | p. 42 |
Spread Spectrum Technology | p. 61 |
Introducing Spread Spectrum | p. 62 |
Narrow Band Transmission | p. 62 |
Spread Spectrum Technology | p. 63 |
Uses of Spread Spectrum | p. 64 |
FCC Specifications | p. 66 |
Frequency Hopping Spread Spectrum (FHSS) | p. 67 |
How FHSS Works | p. 67 |
Effects of Narrow Band Interference | p. 68 |
Frequency Hopping Systems | p. 69 |
FCC Rules affecting FHSS | p. 73 |
Direct Sequence Spread Spectrum (DSSS) | p. 74 |
How DSSS Works | p. 75 |
Direct Sequence Systems | p. 75 |
Effects of Narrow Band Interference | p. 78 |
FCC Rules affecting DSSS | p. 78 |
Comparing FHSS and DSSS | p. 79 |
Narrowband Interference | p. 79 |
Cost | p. 79 |
Co-location | p. 80 |
Equipment compatibility and availability | p. 81 |
Data rate & throughput | p. 82 |
Security | p. 83 |
Standards Support | p. 83 |
Wireless LAN Infrastructure | p. 97 |
Access Points | p. 98 |
Access Point Modes | p. 100 |
Common Options | p. 103 |
Configuration and Management | p. 106 |
Wireless Bridges | p. 109 |
Wireless Bridge Modes | p. 110 |
Common Options | p. 112 |
Configuration and Management | p. 115 |
Wireless Workgroup Bridges | p. 115 |
Common Options | p. 116 |
Configuration and Management | p. 117 |
Wireless LAN Client Devices | p. 117 |
PCMCIA & Compact Flash Cards | p. 118 |
Wireless Ethernet & Serial Converters | p. 119 |
USB Adapters | p. 120 |
PCI & ISA Adapters | p. 121 |
Configuration and Management | p. 121 |
Wireless Residential Gateways | p. 124 |
Common Options | p. 125 |
Configuration and Management | p. 126 |
Enterprise Wireless Gateways | p. 127 |
Configuration and Management | p. 129 |
Antennas and Accessories | p. 141 |
RF Antennas | p. 143 |
Omni-directional (Dipole) Antennas | p. 143 |
Semi-directional Antennas | p. 147 |
Highly-directional Antennas | p. 149 |
RF Antenna Concepts | p. 151 |
Antenna Installation | p. 158 |
Power over Ethernet (PoE) Devices | p. 163 |
Common PoE Options | p. 164 |
PoE Compatibility | p. 168 |
Wireless LAN Accessories | p. 170 |
RF Amplifiers | p. 171 |
RF Attenuators | p. 176 |
Lightning Arrestors | p. 179 |
RF Splitters | p. 183 |
RF Connectors | p. 188 |
RF Cables | p. 190 |
RF "Pigtail" Adapter Cable | p. 191 |
Frequency Converter | p. 193 |
Bandwidth Control Units | p. 194 |
Test Kits | p. 196 |
Wireless LAN Organizations and Standards | p. 209 |
Federal Communications Commission | p. 210 |
ISM and UNII Bands | p. 211 |
Industrial Scientific Medical (ISM) Bands | p. 212 |
Unlicensed National Information Infrastructure Bands | p. 213 |
Power Output Rules | p. 215 |
Institute of Electrical and Electronics Engineers | p. 218 |
IEEE 802.11 | p. 218 |
IEEE 802.11b | p. 219 |
IEEE 802.11a | p. 220 |
IEEE 802.11g | p. 222 |
IEEE Standards Summary | p. 222 |
Major Organizations | p. 223 |
Wi-Fi Alliance | p. 224 |
European Telecommunications Standards Institute | p. 225 |
Wireless LAN Association | p. 226 |
Competing Technologies | p. 226 |
HomeRF | p. 226 |
Bluetooth | p. 228 |
Infrared Data Association (IrDA) | p. 229 |
Wireless LAN Interoperability Forum (WLIF) | p. 230 |
802.11 Network Architecture | p. 242 |
Locating a Wireless LAN | p. 243 |
Service Set Identifier | p. 243 |
Beacons | p. 244 |
Passive Scanning | p. 245 |
Active Scanning | p. 247 |
Authentication & Association | p. 248 |
Authentication | p. 249 |
Association | p. 249 |
States of Authentication & Association | p. 250 |
Authentication Methods | p. 252 |
Service Sets | p. 262 |
Basic Service Set (BSS) | p. 262 |
Extended Service Set (ESS) | p. 263 |
Independent Basic Service Set (IBSS) | p. 264 |
Roaming | p. 265 |
Power Management Features | p. 276 |
Continuous Aware Mode | p. 276 |
Power Save Polling | p. 276 |
MAC and Physical Layers | p. 293 |
How Wireless LANs Communicate | p. 294 |
Wireless LAN Frames vs. Ethernet Frames | p. 294 |
Collision Handling | p. 296 |
Fragmentation | p. 297 |
Fragment Bursting | p. 299 |
Fragmentation Dynamic Rate Shifting (DRS) | p. 300 |
Distributed Coordination Function | p. 301 |
Point Coordination Function | p. 302 |
Interframe Spacing | p. 302 |
Three Types of Spacing | p. 303 |
The Communications Process | p. 307 |
Request to Send/Clear to Send (RTS/CTS) | p. 310 |
Configuring RTS/CTS | p. 311 |
Modulation | p. 312 |
Troubleshooting Wireless LAN Installations | p. 327 |
Multipath | p. 328 |
Effects of Multipath | p. 329 |
Troubleshooting Multipath | p. 334 |
Solutions for Multipath | p. 334 |
Hidden Node | p. 337 |
Troubleshooting Hidden Node | p. 338 |
Solutions for Hidden Node | p. 339 |
Near/Far | p. 341 |
Troubleshooting Near/Far | p. 342 |
Solutions for Near/Far | p. 343 |
System Throughput | p. 344 |
Co-location Throughput (Theory vs. Reality) | p. 345 |
Theory: What Should Happen | p. 347 |
Reality: What Does Happen | p. 347 |
Solutions for Co-location Throughput Problems | p. 349 |
Summary | p. 351 |
Types of Interference | p. 352 |
Narrowband | p. 352 |
All-band Interference | p. 354 |
Weather | p. 356 |
Adjacent Channel and Co-Channel Interference | p. 358 |
Range Considerations | p. 363 |
Transmission Power | p. 363 |
Antenna Type | p. 363 |
Environment | p. 363 |
Wireless LAN Security | p. 375 |
Wired Equivalent Privacy | p. 377 |
Why WEP Was Chosen | p. 381 |
WEP Keys | p. 382 |
Advanced Encryption Standard | p. 388 |
Filtering | p. 389 |
Attacks on Wireless LANs | p. 395 |
Passive Attacks | p. 395 |
Active Attacks | p. 397 |
Jamming | p. 398 |
Man-in-the-middle Attacks | p. 400 |
Emerging Security Solutions | p. 401 |
WEP Key Management | p. 402 |
Wireless VPNs | p. 402 |
Temporal Key Integrity Protocol (TKIP) | p. 404 |
AES Based Solutions | p. 405 |
Wireless Gateways | p. 405 |
802.1x and Extensible Authentication Protocol | p. 406 |
Corporate Security Policy | p. 409 |
Keep Sensitive Information Private | p. 410 |
Physical Security | p. 410 |
Wireless LAN Equipment Inventory & Security Audits | p. 411 |
Using Advanced Security Solutions | p. 412 |
Public Wireless Networks | p. 412 |
Limited and Tracked Access | p. 413 |
Security Recommendations | p. 414 |
WEP | p. 414 |
Cell Sizing | p. 414 |
User Authentication | p. 415 |
Security Needs | p. 416 |
Use Additional Security Tools | p. 416 |
Monitoring for Rogue Hardware | p. 417 |
Switches, not hubs | p. 417 |
Wireless DMZ | p. 417 |
Firmware & Software Updates | p. 418 |
Site Survey Fundamentals | p. 431 |
What is a Site Survey? | p. 433 |
Preparing for a Site Survey | p. 435 |
Facility Analysis | p. 436 |
Existing Networks | p. 437 |
Area Usage & Towers | p. 440 |
Purpose & Business Requirements | p. 442 |
Bandwidth & Roaming Requirements | p. 443 |
Available Resources | p. 446 |
Security Requirements | p. 447 |
Preparation Exercises | p. 448 |
Preparation Checklist | p. 449 |
Site Survey Equipment | p. 450 |
Access Point | p. 450 |
PC Card and Utilities | p. 451 |
Laptops & PDAs | p. 454 |
Paper | p. 455 |
Outdoor Surveys | p. 455 |
Spectrum Analyzer | p. 456 |
Network Analyzer | p. 457 |
Site Survey Kit Checklist | p. 458 |
Conducting a Site Survey | p. 461 |
Indoor Surveys | p. 461 |
Outdoor Surveys | p. 462 |
Before You Begin | p. 463 |
RF Information Gathering | p. 464 |
Site Survey Reporting | p. 476 |
Report Format | p. 477 |
RF in Perspective | p. 495 |
RF in Perspective | p. 496 |
Radio acts like light | p. 496 |
Light bulb analogy | p. 496 |
Transmit Range Tests | p. 497 |
Receive range tests | p. 498 |
Obstacles | p. 499 |
Fresnel Zone | p. 499 |
Increasing power at the tower | p. 500 |
Reflection | p. 500 |
RF Summary | p. 500 |
Glossary | p. 503 |
Index | p. 525 |
Table of Contents provided by Rittenhouse. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.