Book description
As the demand for higher bandwidth has lead to the development of increasingly complex wireless technologies, an understanding of both wireless networking technologies and radio frequency (RF) principles is essential for implementing high performance and cost effective wireless networks.Wireless Networking Technology clearly explains the latest wireless technologies, covering all scales of wireless networking from personal (PAN) through local area (LAN) to metropolitan (MAN). Building on a comprehensive review of the underlying technologies, this practical guide contains ‘how to’ implementation information, including a case study that looks at the specific requirements for a voice over wireless LAN application. This invaluable resource will give engineers and managers all the necessary knowledge to design, implement and operate high performance wireless networks.
· Explore in detail wireless networking technologies and understand the concepts behind RF propagation.
· Gain the knowledge and skills required to install, use and troubleshoot wireless networks.
· Learn how to address the problems involved in implementing a wireless network, including the impact of signal propagation on operating range, equipment inter-operability problems and many more.
· Maximise the efficiency and security of your wireless network.
Table of contents
- Front cover
- Wireless Networking Technology
- Copyright page
- Contents (1/2)
- Contents (2/2)
- Chapter 1: Introducing Wireless Networking
- Part I: WIRELESS NETWORK ARCHITECTURE
-
Part II: WIRELESS COMMUNICATION
-
Chapter 4: Radio Communication Basics
- The RF Spectrum
- Spread Spectrum Transmission (1/3)
- Spread Spectrum Transmission (2/3)
- Spread Spectrum Transmission (3/3)
- Wireless Multiplexing and Multiple Access Techniques (1/2)
- Wireless Multiplexing and Multiple Access Techniques (2/2)
- Digital Modulation Technique (1/3)
- Digital Modulation Technique (2/3)
- Digital Modulation Technique (3/3)
- RF Signal Propagation and Reception (1/3)
- RF Signal Propagation and Reception (2/3)
- RF Signal Propagation and Reception (3/3)
- Ultra Wideband Radio
- MIMO Radio
- Near Field Communications
- Chapter 5: Infrared Communication Basics
-
Chapter 4: Radio Communication Basics
-
Part III: WIRELESS LAN IMPLEMENTATION
- Chapter 6: Wireless LAN Standards
-
Chapter 7: Implementing Wireless LANs
- Evaluating Wireless LAN Requirements (1/2)
- Evaluating Wireless LAN Requirements (2/2)
- Planning and Designing the Wireless LAN (1/2)
- Planning and Designing the Wireless LAN (2/2)
- Pilot Testing
- Installation and Configuration
- Operation and Support
- A Case Study: Voice over WLAN (1/2)
- A Case Study: Voice over WLAN (2/2)
-
Chapter 8: Wireless LAN Security
- The Hacking Threat
- WLAN Security
- WEP – Wired Equivalent Privacy Encryption
- Wi-Fi Protected Access — WPA (1/2)
- Wi-Fi Protected Access — WPA (2/2)
- IEEE 802.11i and WPA2 (1/3)
- IEEE 802.11i and WPA2 (2/3)
- IEEE 802.11i and WPA2 (3/3)
- WLAN Security Measures (1/2)
- WLAN Security Measures (2/2)
- Wireless Hotspot Security
- VoWLAN and VoIP Security
- Summary
- Chapter 9: Wireless LAN Troubleshooting
- Part IV: WIRELESS PAN IMPLEMENTATION
- Part V: WIRELESS MAN IMPLEMENTATION
- Part VI: THE FUTURE OF WIRELESS NETWORKING TECHNOLOGY
- Part VII: WIRELESS NETWORKING INFORMATION RESOURCES
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
Product information
- Title: Wireless Networking Technology
- Author(s):
- Release date: February 2011
- Publisher(s): Newnes
- ISBN: 9780080471402
You might also like
book
Switch/Router Architectures
A practicing engineer's inclusive review of communication systems based on shared-bus and shared-memory switch/router architectures This …
book
Digital Communication Techniques
There have been considerable developments in information and communication technology. This has led to an increase …
book
Cloud Computing Basics: A Non-Technical Introduction
Regardless of where your organization is in your cloud journey, moving to the cloud is an …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …