Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Wireless Personal Area Networks (WPANs), Public Access Locations (PALs), and Hotspot Services
Table 1-1. Basic technologies and services
Table 1-2. Wireless services of interest
Table 1-3. Design goals of 3G
Table 1-4. GHz PAN radios
Table 1-5. Table Cornucopia of standards for WWANs
Chapter 2: Standards for Hotspots
Table 2-1. Wireless standards*
Table 2-2. IEEE wireless standardization activities
Table 2-3. IEEE 802.11 standards: the “workhorses” of hotspot networks today
Table 2-4. Global spectrum allocation at 2.4 GHz
Table 2-5. Regulatory entities
Table 2-6. Key technologies for 2G, 2.5G, and 3G
Table 2-7. Detailed listing of key 1G/2G/3G standards
Table 2-8. Recent wireless/mobile IETF RFCs
Table 2-9. Key mobile IP terms
Table 2-10. Table Increasing variance as the number of queues increases
Chapter 3: Technologies for Hotspots
Table 3-1. Key IEEE 802.11 definitions
Table 3-2. Channel types
Table 3-3. Throughput rates
Table 3-4. Comparison of Bluetooth and cabled connections
Table 3-5. Table Key capabilities of 1G, 2G, and 3G systems
Table 3-6. Capabilities of GSM
Table 3-7. Key GPRS protocols
Table 3-8. Key elements of today’s data WWAN networks
Chapter 4: Security Considerations for Hotspot Services
Table 4-1.
WLAN security choices
Chapter 5: IEEE 802.11
Table 5-1. Duration/ID field encoding
Table 5-2. Address field contents
Table 5-3. Beacon frame body
Table 5-4. Disassociation frame body
Table 5-5. Association Request frame body
Table 5-6. Association Response frame body
Table 5-7. Reassociation Request frame body
Table 5-8. Reassociation Response frame body
Table 5-9. Probe Request frame body
Table 5-10. Probe Response frame body
Table 5-11. Authentication frame body
Table 5-12. Presence of challenge text information
Table 5-13. Deauthentication frame body
Table 5-14. STA usage of CF-Pollable and CF-Poll Request
Table 5-15. AP usage of CF-Pollable and CF-Poll Request
Table 5-16. Element IDs
Chapter 6: IEEE 802.11b and IEEE 802.11a
Table 6-1. Modulation schemes supported by IEEE 802.11b
Table 6-2. SERVICE field definitions
Table 6-3. PMD_SAP peer-to- peer service primitives
Table 6-4. PMD_SAP sublayerto-sublayer service primitives
Table 6-5. High Rate PHY frequency channel plan
Table 6-6. DQPSK encoding table
Table 6-7. 5.5 Mbps CCK encoding table
Table 6-8. QPSK encoding table
Table 6-9. TXVECTPR parameters
Table 6-10. RXVECTOR parameters
Table 6-11. Rate-dependent parameters
Table 6-12. Timing-related parameters
Table 6-13. Major parameters of the OFDM PHY
Table 6-14. Valid operating channel numbers by regulatory domain and band
Table 6-15. Transmit power levels for the United States
Table 6-16. OFDM PHY characteristics (partial)
Chapter 8: Designing Nomadic and Hotspot Networks
Table 8-1. Typical antenna types
Table 8-2.
Table 8-3. Key NAT-related RFCs
Table 8-4. Description of fields in a DHCP message
Table 8-5. DHCP messages
Table 8-6. Fields and options used by DHCP servers
Table 8-7. Client messages from different states
Table 8-8. Fields and options used by DHCP clients
Table A-1. Cisco Aironet client adapter antenna features
Table A-2: Cisco Aironet AP antenna features
Table A-3: Cisco Aironet bridge antenna features
Table A-4. Cisco Aironet low-loss antenna cable features
Table A-5. Cisco Aironet accessory features
Previous page
Table of content
Next page
Hotspot Networks(c) Wi-Fi for Public Access Locations
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 88
BUY ON AMAZON
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Domain Analysis Testing
Use Case Testing
Test Planning
Defect Taxonomies
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Routing
Transmission Control Protocol (TCP) Data Flow
Dynamic Host Configuration Protocol (DHCP) Server Service
Windows Internet Name Service (WINS)
RADIUS and Internet Authentication Service
The Complete Cisco VPN Configuration Guide
VPN Technologies
Routing on the Concentrator
ISAKMP/IKE Phase 1 Policies
Viewing and Managing Connections
ISAKMP/IKE Phase 1 Connections
C++ How to Program (5th Edition)
Exercises
Function Pointers
(Optional) Software Engineering Case Study: Starting to Program the Classes of the ATM System
(Optional) Polymorphism, Virtual Functions and Dynamic Binding Under the Hood
D.3. Converting Octal and Hexadecimal Numbers to Binary Numbers
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Product Overview
Project B: Build a Conference Room Reservation System
Working with Dates and Times
Managing Access to Forms and Documents
Appendix B. IBM® Lotus® Notes® and Domino®Whats Next?
Junos Cookbook (Cookbooks (OReilly))
Configuring the Router by Copying a File from a Server
Installing a Different Software Release on J-Series Routers
Configuring IS-IS for IPv6
Setting Up Route Reflectors
Using Auto-RP to Dynamically Map RPs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies