access control, passwords and, 169
access points
accidental connections and, 129
bridge mode, 11–12
client mode, 11–12
configuration errors, 132–133
definition, 249
description, 9
DHCP and, 11, 193
hubs, 11
interoperability and, 138
IP addresses and, 191–192
network settings, 193
normal mode, 11–12
print server, 11
repeater mode, 11, 13
rogue access points, 68–70
routers, 11
switches, 11
WPA, protection and, 182
accessory manufacturers, 240–241
accidental connections, 129
active devices, hubs, 5
ad hoc mode, 10, 250
ad-blocking software, 153
adapters
built-in adapters, 13–14
CF (Compact Flash) card adapters, 13–14
modes, configuration errors and, 133
PCI adapter cards, 13–14
PCMCIA card adapters, 13–14
USB, 13–14
address books, worms and, 113
addresses
classes, 35–36
DHCP and IP, 38–39
IP security, 191–193
restricted, 36
subnet masks, 38
subnets, 36–37
adjacent channels, overlap, 130
ADSL (Asymmetric DSL), 250
adware. See spyware
antennas
decibels, 140
definition, 250
Fresnel zone, 143–144
gain, 140
grounded, 142–143, 229–230
installation, configuration errors and, 133
interference and, 127
introduction, 138
mounts, 140–142
RF signals, 139
transceivers and, 139
trees and, 144–145
antispyware software, 116, 152
antivirus software
adware/spyware and, 153
drive-by downloads and, 152
hotspot protection and, 65
resource Web sites, 238–239
updates, 213
worms, 114
Application layer
OSI reference model, 27–28
TCP/IP model, 29, 30
ARP (Address Resolution Protocol), 32
attenuation
definition, 8, 250
Fresnel zone and, 144
inline attenuators, broadcast power and, 203
sniffers and, 85