Flylib.com
Hotspot Networks(c) Wi-Fi for Public Access Locations
Hotspot Networks(c) Wi-Fi for Public Access Locations
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 88
BUY ON AMAZON
Table of Contents
BackCover
Hotspot Networks-Wi-Fi for Public Access Locations
Preface
Dedication
About the Author
Chapter 1: Introduction to Wireless Personal Area Networks (WPANs), Public Access Locations (PALs), and Hotspot Services
The Potential Opportunity
Approaches to WLANs, WWANs, WPANs, and PALs
Wireless Local Area Networks (WLANs)
Wireless Personal Area Networks (WPANs)
Home Radio Frequency (HomeRF)
Wireless Wide Area Networks (WWANs)
Economics and Realities of Hotspot Services - A Provider s Perspective
Chapter 2: Standards for Hotspots
Quality of Service (QoS)
Conclusion
Chapter 3: Technologies for Hotspots
WPANs: A Capsule View of Bluetooth
Bluetooth Technical Summary
Compliance
Constituent Products
The Technology
WWAN Approaches
Antenna Basics for Hotspot Services
Conclusion
Chapter 4: Security Considerations for Hotspot Services
Problems in Security Protocols
PPP Extensible Authentication Protocol (EAP)
Authentication, Authorization, and Accounting (AAA)
Remote Authentication Dial-In User Service (RADIUS)
Practical Security Aspects
Chapter 5: IEEE 802.11
How WLAN Systems Are Different
Components of the IEEE 802.11 Architecture
Logical Service Interfaces
Overview of the Services
Relationships Between Services
Differences Between ESS and IBSS LANs
Message Information Contents That Support Services
Reference Model
MAC Service Definition
Frame Formats
MAC Sublayer Functional Description
DSSS PHY Specification for the 2.4 GHz Band Designated for Industrial, Science, and Medical (ISM) Applications
Chapter 6: IEEE 802.11b and IEEE 802.11a
IEEE 802.11a: OFDM PHY Specification for the 5 GHz Band
Chapter 7: Wireless Application Protocol (WAP)
Wireless Application Protocol (WAP) Fundamentals
Definitions and Abbreviations
WAP Background
WAP Architecture
Components of the WAP Architecture
Sample Configurations of WAP Technology
Conformance and Interoperability
Chapter 8: Designing Nomadic and Hotspot Networks
Network Address Translation (NAT)
Dynamic Host Configuration Protocol (DHCP)
Appendix A: Case Study of a Plethora of Antenna Types from Cisco
Chapter 9: Migrating to 3G WWANs
ITU IMT-2000
Transitions to 3G for Wireless WANs (WWANs)
End Notes
References
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F-G
Index_H
Index_I
Index_J-L
Index_M
Index_N
Index_O-P
Index_Q-R
Index_S
Index_T
Index_U
Index_V-W
Index_X-Z
List of Figures
List of Tables
List of Equations
List of Sidebars
Hotspot Networks(c) Wi-Fi for Public Access Locations
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 88
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Market Orientation and Supply Chain Management in the Fashion Industry
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
PMP Practice Questions Exam Cram 2
Project PlanningCore Processes
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Adding Shapes to Diagrams
Key Points
Key Points
Connecting Shapes in Network Diagrams
Choose the Right Book for You
Comparing, Designing, and Deploying VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying SSL VPNs (WebVPN) on the ASA 5500
MPLS Configuration on Cisco IOS Software
Case Study-Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Command Reference
Constraint-Based Routing and Operation in MPLS TE
Implementing VPNs with Layer 2 Tunneling Protocol Version 3
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies