rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781587201110

Wireless Networks First-Step

by
  • ISBN13:

    9781587201110

  • ISBN10:

    1587201119

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2004-08-03
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $36.95

Summary

Your First-Step into the World of Wireless NetworksNo experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand styleAs a basic introduction to wireless networking,Wireless Networks First-Stepassumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs.Wireless Networks First-Step, written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats.158720111903232004

Author Biography

Jim Geier is the founder and principal consultant of Wireless Nets, Ltd., a consulting firm that assists with the development and deployment of wireless networks.

Table of Contents

Introduction xvii
The Wireless World: An Introduction to Concepts
3(28)
Wireless Networks Defined
3(11)
Wireless PANs
5(2)
Wireless LANs
7(2)
Wireless MANs
9(2)
Wireless WANs
11(2)
Drawing the Line
13(1)
Wireless Network Applications
14(10)
Basic Configurations
14(1)
Internet Access
15(1)
Voice over Wireless
16(1)
Inventory Control
17(1)
Health Care
17(1)
Education
18(1)
Real Estate
19(1)
Utilities
20(1)
Field Service
20(1)
Field Sales
21(1)
Vending
21(1)
Public Networks
21(2)
Location-Based Services
23(1)
Wireless Network Benefits
24(3)
Increasing Efficiency and Accuracy
24(1)
Office Example
24(1)
Warehouse Example
25(1)
Hospital Example
26(1)
Improving Reliability
26(1)
Chapter Summary
27(1)
Chapter Review Questions
28(3)
Wireless System Architecture: How Wireless Works
31(38)
Wireless Network System Components
31(1)
Users
32(1)
Computer Devices
33(1)
NICs
34(3)
Air Medium
37(1)
Wireless Network Infrastructures
38(10)
Base Stations
38(2)
Access Controllers
40(2)
Application Connectivity Software
42(4)
Distribution System
46(2)
Management Systems
48(4)
Security
48(1)
Help Desk
49(1)
Configuration Management
49(1)
Network Monitoring
50(1)
Reporting
50(1)
Engineering
51(1)
Maintenance
51(1)
Network Architecture
52(2)
Information Signals
54(3)
Digital Signals
54(2)
Analog Signals
56(1)
Flow of Information Through a Wireless Network
57(9)
End Points of Information Flow
57(1)
Inputting, Storing, and Displaying Information
58(1)
Interfacing with the Air Medium
59(1)
Medium Access
59(2)
Error Control
61(4)
Transferring Wireless Data Signals
65(1)
Connecting with the Wireless Network Infrastructure
65(1)
Chapter Summary
66(1)
Chapter Review Questions
67(2)
Radio Frequency and Light Signal Fundamentals: The Invisible Medium
69(20)
Wireless Transceivers
69(1)
Understanding RF Signals
70(6)
RF Signal Attributes
70(2)
RF Signal Pros and Cons
72(1)
RF Signal Impairments
73(1)
Interference
73(1)
Multipath
74(2)
Understanding Light Signals
76(4)
Light Signal Attributes
76(2)
Light Signal Pros and Cons
78(1)
Light Signal Impairments
78(1)
Interference
79(1)
Attenuation Because of Obstructions and Weather
79(1)
Modulation: Preparing Signals for Propagation
80(7)
Frequency Shift-Keying
81(1)
Phase Shift-Keying
82(1)
Quadrature Amplitude Modulation
82(1)
Spread Spectrum
83(2)
Orthogonal Frequency Division Multiplexing
85(1)
Ultrawideband Modulation
86(1)
Chapter Summary
87(1)
Chapter Review Questions
87(2)
Wireless PANs: Networks for Small Places
89(16)
Wireless PAN Components
89(2)
User Devices
89(1)
Radio NICs
90(1)
USB Adapters
90(1)
Routers
91(1)
Wireless PAN Systems
91(4)
Home and Small Office
92(1)
Synchronization
92(1)
Streaming Multimedia
92(1)
Control
93(1)
Printing
93(1)
Internet Connections
94(1)
Enterprise
94(1)
Wireless PAN Technologies
95(7)
802.15
95(1)
Bluetooth
96(1)
Basic Features
96(1)
Could Bluetooth Replace Wireless LANs?
97(1)
Could Wireless LANs Replace Bluetooth?
97(1)
Minimizing Bluetooth Interference
98(3)
IrDA
101(1)
Basic Features
101(1)
Chapter Summary
102(1)
Chapter Review Questions
103(2)
Wireless LANs: Networks for Buildings and Campuses
105(32)
Wireless LAN Components
105(5)
User Devices
105(1)
Radio NICs
106(1)
Access Points
106(2)
Routers
108(1)
Repeaters
109(1)
Antennae
110(1)
Wireless LAN Systems
110(7)
Home and Small Office Wireless LANs
111(1)
Enterprise Wireless LANs
112(2)
Public Wireless LANs
114(3)
Ad Hoc Wireless LANs
117(1)
Wireless LAN Technologies
117(17)
802.11
118(1)
802.11 MAC Layer
118(6)
802.11 Physical Layers
124(6)
Wi-Fi
130(1)
What Wi-Fi Means
130(1)
Wi-Fi Protected Access
131(1)
HiperLAN/2
131(1)
HiperLAN/2 Enhancements
132(1)
Is HiperLAN/2 a Threat to 802.11?
133(1)
Chapter Summary
134(1)
Chapter Review Questions
134(3)
Wireless MANs: Networks for Connecting Buildings and Remote Areas
137(14)
Wireless MAN Components
138(4)
Bridges
138(1)
Bridges Versus Access Points
139(1)
Basic Ethernet-to-Wireless Bridges
139(1)
Workgroup Bridges
140(1)
Directional Antennae
140(1)
Semidirectional Antennae
141(1)
Highly Directional Antennae
141(1)
Effect of Polarization
142(1)
Wireless MAN Systems
142(3)
Point-to-Point Systems
142(1)
Point-to-Multipoint System
143(1)
Packet Radio Systems
144(1)
Wireless MAN Technologies
145(2)
802.11 and Wi-Fi
145(1)
802.16
146(1)
Chapter Summary
147(1)
Chapter Review Questions
148(3)
Wireless WANs: Networks for Worldwide Connections
151(20)
Wireless WAN Components
152(4)
Wireless WAN User Devices
152(1)
Radio NICs
153(1)
Base Stations
154(1)
Antennae
155(1)
Wireless WAN Systems
156(9)
Cellular-Based Wireless WANs
157(1)
First-Generation Cellular
158(1)
Second-Generation Cellular
158(1)
Third-Generation Cellular
159(2)
Space-Based Wireless WANs
161(1)
Satellites
161(3)
Meteor Burst Communications
164(1)
Wireless WAN Technologies
165(2)
Frequency Division Multiple Access
165(1)
Time Division Multiple Access
166(1)
Code Division Multiple Access
166(1)
Spatial Division Multiple Access (SDMA)
167(1)
Chapter Summary
167(1)
Chapter Review Questions
168(3)
Wireless Network Security: Protecting Information Resources
171(32)
Security Threats
171(7)
Traffic Monitoring
172(1)
Unauthorized Access
172(2)
Man-in-the-Middle Attacks
174(2)
Denial of Service
176(2)
Encryption
178(7)
WEP
181(1)
WEP Operation
181(1)
WEP Issues
182(1)
When to Use WEP
183(1)
Temporal Key Integrity Protocol
183(1)
Wi-Fi Protected Access
184(1)
Virtual Private Networks
185(1)
Authentication
185(5)
802.11 Authentication Vulnerabilities
185(2)
MAC Filters
187(1)
Authentication Using Public Key Cryptography
187(1)
802.1x
188(1)
802.1x Operation
188(2)
Authentication Types
190(1)
Security Policies
190(1)
Assessment Steps
191(4)
Review Existing Security Policies
191(1)
Review the Existing System
192(1)
Interview Users
192(1)
Verify Configurations of Wireless Devices
192(1)
Identify Rogue Base Stations
193(1)
Perform Penetration Tests
194(1)
Analyze Security Gaps
194(1)
Recommend Improvements
194(1)
Common Security Policies
195(4)
Place Wireless Users Outside a Firewall
195(1)
Use Effective Encryption
195(1)
Ensure Firmware Is Up-to-Date
196(1)
Physically Secure Base Stations
196(1)
Assign Strong Passwords to Base Stations
197(1)
Don't Broadcast SSIDs
197(1)
Reduce Propagation of Radio Waves
197(1)
Implement Personal Firewalls
198(1)
Monitor Base Station Configuration
198(1)
Control Deployments
198(1)
Chapter Summary
199(1)
Chapter Review Questions
199(4)
Appendix A Answers to Chapter Review Questions 203(12)
Glossary 215(10)
Index 225

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program