List of Figures

Chapter 1: Introduction to Wireless Personal Area Networks (WPANs), Public Access Locations (PALs), and Hotspot Services

1-1: Technologies addressed in this book
1-2: Anticipated growth of mobile data/3G users in the United States (Source: Dresdner Kleinwort & Siemens Mobile Network marketing data)
1-3: Anticipated growth of wireless users worldwide (Source: UMTS Forum)
1-4: Data-enabled wireless units will equal the number of PCs in the near future. (Source: Nokia)
1-5: Interest in location-based and other wireless/nomadic services (Source: Siemens Mobile Networks [2001 data])
1-6: Revenues for location-based and other wireless/nomadic data services
1-7: Continuum of wireless technologies
1-8: Wireless technologies by Locus
1-9: Ranges of various technologies
1-10: Comparison of line rate and throughput
1-11: Typical cell layout
1-12: Advantages of 802.11a based on cell topology
1-13: WLAN versus WPAN
1-14: The evolution of WWLAN over three decades
1-15: Nominal/actual data rates for various technologies
1-16: Taxonomy of WWANs
1-17: Standards bodies involved in 3G
1-18: Examples of portable terminals supporting hotspot services (Source: GSM World, http://www.gsmworld.com)
1-19: Wireless data evolution possibilities
1-20: 3G examples
1-21: Bandwidth requirements based on applications
1-22: Future all-IP wireless WWANs (Source: Nortel Networks)
1-23: Hotspot services need not wait for complex evolution scenarios.
1-24: Worldwide revenues and percentage allocation
1-25: Example of hotspot network (indoor application)
1-26: Example of hotspot network (outdoor application)

Chapter 2: Standards for Hotspots

2-1: Standardization efforts
Figure 2-2. 802.15 protocol view
2-3: Routing datagrams
2-4: Mobile IP
2-5: Levels of security in practical implementations of IEEE 802.11b technology (Source: Cisco Systems)

Chapter 3: Technologies for Hotspots

3-1: Nonoverlapping channels
3-2: IBSS
3-3: ESS
3-4: FHSS
3-5: DSSS
3-6: DSSS signal operation
3-7: DCF procedure
3-8: Basics of encryption
3-9: WEP
3-10: Bluetooth applications Source: Tom Siep, TI, and Chatschik Bisdikian, IBM
3-11: Circuit-mode data over cellular phone
3-12: GPRS architecture
3-13: GPRS protocol stack
3-14: CDMA2000 network architecture
3-15: CDMA2000 reference model and protocol stack
3-16: Typical 2G network
3-17: Cell hierarchy of a next-generation network
3-18: An all-IP wireless/mobile network
3-19: Relative importance/ penetration of various technologies for hotspot services

Chapter 4: Security Considerations for Hotspot Services

4-1: TLS handshake
4-2: Protected EAP authentication phase
4-3: Roaming in protected EAP
4-4: The setup using the IEEE 802.1X port- based authentication mechanism
4-5: General topology of IEEE 802.1X
4-6: IEEE 802.1X
4-7: Initial Cisco implementation of IEEE 802.1X
4-8: An infrastructure mode network
4-9: Typical message exchange
4-10: Central user administration
4-11: Authentication- protocol configuration option format
4-12: EAP packet format
4-13: Request and response packet format
4-14: Success and failure packet format
4-15: Contents of the Type- Data field
4-16: AAA servers in home and local domains
4-17: Security associations
4-18: AAA Servers with Mobile IP Agents
4-19: Home agent allocated by AAAL
4-20: Local payment for local Mobile IP services
4-21: AAA servers using a broker
4-22: RADIUS application
4-23: RADIUS data format

Chapter 5: IEEE 802.11

5-1: Basic protocol model, IEEE 802.11
5-2: BSSs
5-3: DSs and APs
5-4: ESS
5-5: Connecting to other IEEE 802 LANs
5-6: Complete IEEE 802.11 architecture
5-7: IEEE 802.11 architecture (again)
5-8: 802.11 IBSS
5-9: Portion of the ISO/IEC basic reference model covered in the 802.11 standard
5-10: MAC frame format
5-11: Frame Control field
5-12: Sequence Control field
5-13: Frame Control field subfield values within control frames
5-14: RTS frame
5-15: CTS frame
5-16: ACK frame
5-17: PS-Poll frame
5-18: CF-End frame
5-19: CF-End+CF-Ack frame
5-20: Data frame
5-21: Management frame
Figure 5-22. Authentication Algorithm Number fixed field
Figure 5-23. Authentication Transaction Sequence Number fixed field
Figure 5-24. Beacon Interval fixed field
5-25: Capability Information field
5-26: Current AP Address field
5-27: Listen Interval fixed field
5-28: Reason Code fixed field
5-29: AID fixed field
5-30: Status Code fixed field
5-31: Timestamp fixed field
5-32: Element format
5-33: MAC architecture

Chapter 6: IEEE 802.11b and IEEE 802.11a

6-1: Layer reference model
6-2: Long PLCP PDU format
Figure 6-3: PLCP transmit procedure
Figure 6-4: PMD layer reference model
Figure 6-5: PPDU frame format
Figure 6-6: OFDM training structure
Figure 6-7: SIGNAL field bit assignment
Figure 6-8: SERVICE field bit assignment
Figure 6-9: BPSK, QPSK, 16-QAM, and 64-QAM constellation bit encoding
Figure 6-10: Transmitter and receiver block diagram for the OFDM PHY
Figure 6-11: OFDM PHY frequency channel plan for the United States
Figure 6-12: PLCP transmit procedure
Figure 6-13: Primitives

Chapter 7: Wireless Application Protocol (WAP)

7-1: World-wide-web programming model
7-2: WAP programming model
7-3: Feature/performance-enhancing proxy
7-4: Supporting services
7-5: A WAP network example
7-6: WAP client architecture
7-7: WAP stack architecture
7-8: An example of WAP 1.x gateway
7-9: An example of WAP HTTP proxy with profiled TCP and HTTP
7-10: An example of WAP proxy support for TLS tunneling
7-11: An example of direct access
7-12: Dual stack support
7-13: Interoperability and compliance

Chapter 8: Designing Nomadic and Hotspot Networks

8-1: Example of hotspot service configuration
8-2: Typical AP
8-3: Typical setup screen
8-4: Antenna types
8-5:   Example of propagation
8-6:   Wireless bridging using Cisco products
8-7: Coverage examples
8-8: Examples of hotspot outdoor topologies
8-9: Examples of Prefabricated Hotspot node/repeater
8-10: Indoor coverage
8-11: Indoors WLAN coverage options (Source: Cisco Systems)
8-12: One AP configuration
8-13: One AP with a bridge
8-14: Multiple AP configuration
8-15: Multiple APs with a bridge
8-16: Connections back to Internet resources
8-17: Example of hotspot installation process
8-18: Specific topological example of hotspot installation
8-19: Traditional NAT configuration
8-20: Basic NAT operation
8-21: Network address port translation (NAPT) operation
8-22: DHCP mechanism
8-23: Format of a DHCP message
8-24: Format of the flags field
8-25: Timeline diagram of messages exchanged between the DHCP client and servers when allocating a new network address
8-26: Timeline diagram of messages exchanged between DHCP client and servers when reusing a previously allocated network address
8-27: State transition diagram for DHCP clients
A-1: Cisco offers a complete range of antennas for client adapter, AP, and bridge equipment that enable a customized wireless solution for almost any installation.
A-2: Optional, higher-gain antennas can be used to extend the range of APs.
A-3: With Cisco Aironet bridge antennas, the correct mounting hardware, and qualified installation, wireless links over great distances and obstacles are possible.
A-4: Cisco Aironet antenna accessories

Chapter 9: Migrating to 3G WWANs

9-1: Evolution paths for WWAN voice and data
9-2: The transition of architecture in future networks
9-3: An all-IP network
9-4: Control plane (signaling) of an all-IP wireless network (Source: Nortel Networks)
9-5: Movement to an all-IP networks (Source: Mark Tubinis Water Cove Network)
9-6: IMT-2000: ITU’s concept for future networks
9-7: 2.5G/3G-to-WLAN interworking



Hotspot Networks(c) Wi-Fi for Public Access Locations
Hotspot Networks(c) Wi-Fi for Public Access Locations
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 88

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net