|
|
Jackson, Charles, 292
jamming, 117-118
jitter, 122, 127, 178, 186
Joltage, 284
Kasami codes, 22
Kerberos in, 99-102, 100
key management and security, 63-65
label distribution protocol (LDP), 137
label switched paths (LSP), 134, 137
label switching router (LSR), 136-137
label switching using multiprotocol label switching (MPLS) in, 127, 134-139
Lamar, Hedy, 20-21
LAN jacking, 62
land mobile radio, interference and, 315
last mile problems, 6, 330
latency (see also delay), 106, 140-142, 175-177
layer 2 tunneling protocol (L2TP), 98
layered office hotspots, 261-262, 262
layering, private networks made public using, 286-288, 287
LEAP, 92
lighting, as source of interference, 264
lightning protection, antennas, 246
lightweight directory access protocol (LDAP), 90, 167
line of sight, 118-121, 120
Fresnel zone and, 119-121, 213, 214-215, 214, 224
overcoming limitations to, 253-254, 254
link budget, 204-205, 213, 216-224
antenna and transmitter gain in, 217
antenna gain in, 218
attenuation in, 220-224
coax and connector loss in, 219-220, 219
diffraction loss, 219
fade margin in, 218-219
link margin in, 218-219
path loss in, 218
site plan prediction tools in, 224
site survey in, 224-226
link margin, 218-219
link type, 203
Linksys, 234
local area networks (LAN), 158, 268
local exchange carriers (LEC), 5, 235
local loop, 2-3, 48, 278
local multipoint distribution service (LMDS), 48, 50-51, 52
local offices (see central offices)
local television transmission service (LTTS), 315
Lockheed Martin Global Telecommunications (LMGT) evaluation of VoIP, 187-188
logical link control (LLC)
media access control (MAC) and, 27
quality of service (QoS) and, 148-149
logs, security, 265
long range Ethernet (LRE) routers, 260
loss or theft of equipment, 76
LoveBug virus, 76
low noise amplifiers (LNA), 45-46
Lucent, 235, 251
|
|