Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Wireless Personal Area Networks (WPANs), Public Access Locations (PALs), and Hotspot Services
Table 1-1. Basic technologies and services
Table 1-2. Wireless services of interest
Table 1-3. Design goals of 3G
Table 1-4. GHz PAN radios
Table 1-5. Table Cornucopia of standards for WWANs
Chapter 2: Standards for Hotspots
Table 2-1. Wireless standards*
Table 2-2. IEEE wireless standardization activities
Table 2-3. IEEE 802.11 standards: the “workhorses” of hotspot networks today
Table 2-4. Global spectrum allocation at 2.4 GHz
Table 2-5. Regulatory entities
Table 2-6. Key technologies for 2G, 2.5G, and 3G
Table 2-7. Detailed listing of key 1G/2G/3G standards
Table 2-8. Recent wireless/mobile IETF RFCs
Table 2-9. Key mobile IP terms
Table 2-10. Table Increasing variance as the number of queues increases
Chapter 3: Technologies for Hotspots
Table 3-1. Key IEEE 802.11 definitions
Table 3-2. Channel types
Table 3-3. Throughput rates
Table 3-4. Comparison of Bluetooth and cabled connections
Table 3-5. Table Key capabilities of 1G, 2G, and 3G systems
Table 3-6. Capabilities of GSM
Table 3-7. Key GPRS protocols
Table 3-8. Key elements of today’s data WWAN networks
Chapter 4: Security Considerations for Hotspot Services
Table 4-1.
WLAN security choices
Chapter 5: IEEE 802.11
Table 5-1. Duration/ID field encoding
Table 5-2. Address field contents
Table 5-3. Beacon frame body
Table 5-4. Disassociation frame body
Table 5-5. Association Request frame body
Table 5-6. Association Response frame body
Table 5-7. Reassociation Request frame body
Table 5-8. Reassociation Response frame body
Table 5-9. Probe Request frame body
Table 5-10. Probe Response frame body
Table 5-11. Authentication frame body
Table 5-12. Presence of challenge text information
Table 5-13. Deauthentication frame body
Table 5-14. STA usage of CF-Pollable and CF-Poll Request
Table 5-15. AP usage of CF-Pollable and CF-Poll Request
Table 5-16. Element IDs
Chapter 6: IEEE 802.11b and IEEE 802.11a
Table 6-1. Modulation schemes supported by IEEE 802.11b
Table 6-2. SERVICE field definitions
Table 6-3. PMD_SAP peer-to- peer service primitives
Table 6-4. PMD_SAP sublayerto-sublayer service primitives
Table 6-5. High Rate PHY frequency channel plan
Table 6-6. DQPSK encoding table
Table 6-7. 5.5 Mbps CCK encoding table
Table 6-8. QPSK encoding table
Table 6-9. TXVECTPR parameters
Table 6-10. RXVECTOR parameters
Table 6-11. Rate-dependent parameters
Table 6-12. Timing-related parameters
Table 6-13. Major parameters of the OFDM PHY
Table 6-14. Valid operating channel numbers by regulatory domain and band
Table 6-15. Transmit power levels for the United States
Table 6-16. OFDM PHY characteristics (partial)
Chapter 8: Designing Nomadic and Hotspot Networks
Table 8-1. Typical antenna types
Table 8-2.
Table 8-3. Key NAT-related RFCs
Table 8-4. Description of fields in a DHCP message
Table 8-5. DHCP messages
Table 8-6. Fields and options used by DHCP servers
Table 8-7. Client messages from different states
Table 8-8. Fields and options used by DHCP clients
Table A-1. Cisco Aironet client adapter antenna features
Table A-2: Cisco Aironet AP antenna features
Table A-3: Cisco Aironet bridge antenna features
Table A-4. Cisco Aironet low-loss antenna cable features
Table A-5. Cisco Aironet accessory features
Previous page
Table of content
Next page
Hotspot Networks(c) Wi-Fi for Public Access Locations
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 88
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Changing the Database for an Open Connection
Connecting to a Text File
Binding Data to a Web Forms DataGrid
Using a DataView to Control Edits, Deletions, or Additions in Windows Forms
A.2. Classes
Java I/O
Introducing I/O
Buffered Streams
Sequence Input Streams
File Filters
IRPs
The CISSP and CAP Prep Guide: Platinum Edition
Legal, Regulations, Compliance, and Investigations
Physical (Environmental) Security
Initiation of the System Authorization Process
Continuous Monitoring Process
Appendix B Glossary of Terms and Acronyms
Network Security Architectures
Applied Knowledge Questions
General Design Considerations
References
IPsec VPN Design Considerations
Introduction
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Performance Tips
Defining the Input and Output Functions in C
Client 2Adding Error Checking
Using PostgreSQL with Tcl and Tcl/Tk
Summary
Mastering Delphi 7
The Delphi Programming Language
Building the User Interface
Multitier DataSnap Applications
Reporting with Rave
Appendix C Free Companion Books on Delphi
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies