Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction Part I Fundamental Concepts Chapter 1 Introduction to Wireless LANs
Wireless LAN Markets and Applications
Retail Warehousing Healthcare Hospitality Voice over WLAN Video Surveillance Home and Small Office General Enterprise Systems Location-Aware Wireless Applications
Benefits of Wireless Networks
Mobility Installation in Difficult-to-Wire Areas Increased Reliability Reduced Installation Time Long-Term Cost Savings Productivity Gain Is the Answer
Wireless Network Technologies
IEEE 802.11 (Wi-Fi) Initial 802.11 802.11a 802.11b 802.11g 802.11n Comparison of 802.11 Standards Wi-Fi Certification
Other Wireless Network Technologies
IEEE 802.16 (WiMAX) IEEE 802.15 (Bluetooth) IEEE 802.15.4 (ZigBee) Certified Wireless USB
Wireless LANs: A Historical Perspective
The Early Days Initial 802.11 Standardization 802.11n Standardization
Chapter 2 Radio Wave Fundamentals
Radio Wave Attributes
Amplitude Frequency Phase
RF System Components
RF Transceiver RF Modulation Amplitude Shift-Keying Frequency Shift-Keying Phase Shift-Keying Quadrature Amplitude Modulation Spread Spectrum Orthogonal Frequency-Division Multiplexing
RF Signal Propagation
Attenuation Free Space Loss Physical Obstacles Multipath Propagation Noise and Signal-to-Noise Ratio
RF Mathematics
Converting Units
Chapter 3 Wireless LAN Types and Components
Types of Wireless LANs
Ad Hoc Wireless LANs Infrastructure Wireless LANs Mesh Wireless Networks
Wireless LAN Components
Client Devices Client Radio Industry Standard Architecture Peripheral Component Interconnect Mini-PCI PC Card ExpressCard CompactFlash Universal Serial Bus Access Points Autonomous Access Points Controller-Based Access Points Wi-Fi Routers Mesh Nodes Antennas RF Amplifiers Repeaters Bridges
Network Infrastructure Components
Network Distribution Systems Switches Optical Fiber Power over Ethernet Application Connectivity Software Terminal Emulation Browser-Based Approaches Direct Database Interfaces Wireless Middleware
Chapter 4 Wireless LAN Implications
Security Vulnerabilities
Passive Monitoring Unauthorized Access Denial of Service
Radio Signal Interference
Microwave Oven Interference Cordless Phone Interference Bluetooth Interference Neighboring Wireless LAN Interference
Impacts of Multipath Propagation Roaming Issues Battery Limitations Interoperability Problems Installation Issues
Part II The 802.11 Standard Chapter 5 Introduction to IEEE 802.11 and Related Standards
The Importance of Standards
Types of Standards Institute for Electrical and Electronic Engineers Benefits of the 802.11 Standard Appliance Interoperability Fast Product Development Stable Future Migration Price Reductions Avoiding Silos
The IEEE 802 LAN Standards Family
802.11 MAC Sublayer 802.11 Physical Layer IEEE 802.2 Unacknowledged Connectionless Service Connection-Oriented Service Continuous ARQ Stop-and-Wait ARQ Acknowledged Connectionless Service
IEEE 802.11 Features
Station Services Authentication Deauthentication Privacy Distribution System Services Association Disassociation Distribution Integration Reassociation Station States and Corresponding Frame Types
Chapter 6 IEEE 802.11 Medium Access Control (MAC) Layer
Primary 802.11 MAC Layer Functions
Data Delivery Medium Access Distributed Coordination Function Hybrid Coordination Function Error Recovery Data Frame Acknowledgments Dynamic Rate Switching Data Frame Aggregation MSDU Aggregation MPDU Aggregation Data Frame Fragmentation Encryption Wired Equivalent Privacy Temporal Key Integrity Protocol Advanced Encryption Standard Multicasting
Connectivity
Scanning for Networks Authentication Open System Authentication Shared Key Authentication IEEE 802.1X Port-Based Authentication Association Reassociation
Timing and Synchronization
Short IFS PCF IFS DCF IFS Extended IFS
RTS/CTS
Power Management
802.11 MAC Frame Structures
Protocol Version Field Type Field Subtype Field To DS Field From DS Field More Frag Field Retry Field Power Management Field More Data Field Protected Frame Field Order Field Duration/ID Field Address 1, 2, 3, and 4 Fields Sequence Control Field QoS Control Field HT Control Field Frame Body Field Frame Check Sequence Field
MAC Frame Types
Management Frames Association Request Frame Association Response Frame Reassociation Request Frame Reassociation Response Frame Probe Request Frame Probe Response Frame Beacon Frame ATIM Frame Disassociation Frame Authentication Frame Deauthentication Frame Action Frame Action No ACK Frame Management Frame Body Contents Control Frames Control Wrapper Frame Block ACK Request Frame Block ACK Frame Power-Save Poll Frame Request-to-Send Frame Clear-to-Send Frame Acknowledgment Frame Contention-Free End Frame CF End + CF ACK Frame Data Frames
Interoperability
Chapter 7 IEEE 802.11 Physical Layers
802.11 Physical Layer Architecture
PLCP Sublayer PMD Sublayer
802.11 Physical Layer Functions
Carrier-Sense Function Transmit Function Receive Function
Legacy 802.11 Physical Layers
Frequency-Hopping Spread-Spectrum PHY Direct-Sequence Spread-Spectrum PHY Infrared PHY Orthogonal Frequency Division Multiplexing PHY (802.11a) High-Rate Direct-Sequence Spread-Spectrum PHY (802.11b) Extended-Rate PHY (802.11g)
HT-OFDM (802.11n)
MIMO Concepts Transmit Beamforming Spatial Multiplexing Channel Bonding 802.11n Modulation
Interoperability
Part III Wireless Network Design Chapter 8 Planning a Wireless LAN Deployment
Project Management Principles Wireless LAN Deployment Planning Steps Step 1: Defining the Project Scope
Project Charter Assumptions Constraints
Step 2: Developing the Work Breakdown Structure
Requirements Definition Phase Design Phase Implementation Phase Operations and Maintenance Phase
Step 3: Identifying Staffing Step 4: Creating a Schedule Step 5: Developing a Budget
Preliminary Requirements and Design Hardware and Software Costs Deployment Services Costs Ongoing Operations and Maintenance Costs
Step 6: Evaluating Risks Step 7: Analyzing Feasibility
Costs Benefits Impacts on Users Impacts on Existing Systems Making the Decision to Proceed
Executing the Project
The Kick-Off Meeting Periodic Activities
Evaluating the Outcome of the Project
Chapter 9 Defining Requirements for a Wireless LAN
Requirements Attributes Requirements Definition Steps Step 1: Gathering Information
Interviewing Users Interviewing IT Staff Reviewing the Existing Infrastructure and Systems
Step 2: Analyzing Requirements
Application Requirements Client Device Requirements Signal Coverage Requirements Utilization Requirements Mobility Requirements Continuous Movement Portable Access Stationary Access Security Requirements Sensitivity of Information and Systems Organization Security Policies Network Access Privileges Existing Security Mechanisms Scalability Requirements Existing Network Infrastructure Requirements Integration Requirements Environmental Requirements Building Construction and Obstacles Floor Plans Temperature and Humidity Durability Aesthetic Requirements
Step 3: Documenting Requirements Step 4: Obtaining Requirements Approval
Chapter 10 System Architecture Considerations
Architectural Considerations Wireless Access Networks
Autonomous Access Point Architecture Controller-Based Access Point Architecture Mesh Network Architecture Ad Hoc Architecture 2.4 GHz Versus 5 GHz Geographical Location Considerations Performance Considerations Existing Client Device Considerations Facility Size Considerations Radio Signal Interference Considerations Hybrid Frequency Band Considerations Common Infrastructure Considerations Migration Considerations Redundancy Considerations Controller Redundancy Access Point Redundancy
Distribution Systems
Switch Considerations PoE Considerations
Voice over WLAN Systems
Single-Site Architecture Multisite WAN with Centralized Call Processing Multisite WAN with Distributed Call Processing
Application Connectivity
Terminal Emulation Considerations Browser-Based Connectivity Considerations Direct Database Considerations Wireless Middleware Considerations
Chapter 11 Range, Performance, and Roaming Considerations
Range Versus Performance Range Considerations
Signal Coverage Requirements Radio Frequency Bands Transmit Power Settings Transmission Channel Settings Data Rate Settings Antennas Amplifiers Repeaters Physical Obstacles Radio Signal Interference
Performance Considerations
Throughput Versus Data Rate Radio Frequency Bands Transmit Power Settings Transmission Channel Settings Data Rate Settings Antennas Amplifiers Radio Signal Interference Channel Width Settings Signal Coverage Fragmentation Settings RTS/CTS Settings Bandwidth Control Mechanisms Microcell Deployment Strategies
Roaming Considerations
Roaming Levels Access Point Roaming Subnet Roaming Wireless ISP Roaming Wireless IP Phone Roaming Mobility Settings
Chapter 12 Radio Frequency Considerations
Frequency Band Selection
2.4-GHz Frequency Band 5-GHz Frequency Band
Transmission Channel Settings
Manual Channel Settings Single-Level Facilities Multilevel Facilities Adaptive Channel Settings
Difficult-to-Cover Areas
Signal Coverage in Elevators Signal Coverage in Stairwells Signal Coverage in Parking Areas
Radio Signal Interference Reduction
Chapter 13 Security Considerations
Security Elements Encryption Authentication
EAP Methods Authentication Servers Guest Access
Rogue Access Point Detection RF Shielding Wireless Security Polices
Part IV Wireless Network Installation and Testing Chapter 14 Test Tools
Tool Considerations Spectrum Analyzers
Real-Time Fast Fourier Transform FFT Duty Cycle Swept Spectrogram Active Devices Recording Spectrum Data
Signal Coverage Testers
Heat Maps Positioning Passive Versus Active Modes Simulation Free Signal Coverage Tester: NetStumbler
Wireless Protocol Analyzers
Filtering Frames Recording Traces Free Protocol Analyzer: WireShark
Chapter 15 Performing a Wireless Site Survey
Wireless Site Survey Considerations Reviewing Requirements Selecting Site Survey Tools Obtaining Floor Diagrams Inspecting the Facility Assessing the Existing Network Infrastructure
Communications Rooms Switches and Power over Ethernet WAN
Identifying Potential Radio Signal Interference Defining Signal Values for Acceptable Signal Coverage
Minimum Received Signal Strength Minimum SNR Uplink Versus Downlink Signal Values
Identifying Optimum Access Point Antenna Installation Locations
Propagation Testing Test Access Point Configuration Antenna Considerations Identifying Test Locations Measuring Test Signals Assessing Propagation Test Results Cell Overlap Considerations Annotate Access Point Antenna Installation Locations
Writing an RF Site Survey Report
Chapter 16 Installing and Configuring a Wireless LAN
Wireless LAN Installation Considerations Planning the Installation
Developing an Installation Plan Points of Contact Safety Tips Installation Procedures Required Facility Changes Tools Reference to Design Documentation Schedule Resources Budget Risks Coordinating the Installation
Staging the Components Installing Ethernet Switches and Cabling Installing Access Points
Mounting Practices Antenna Alignment Configuration Setting Access Firmware Access Point Configuration Settings 802.11n Enable SSID DTIM Interval Beacon Interval Radio Frequency Bands Transmit Power Transmission Channel Data Rates Antenna Diversity Channel Width Fragmentation Threshold RTS/CTS Threshold
Testing the Installation Documenting the Installation
Chapter 17 Testing a Wireless LAN
Wireless LAN Testing Considerations Signal Coverage Testing
Wireless Site Survey Coverage Testing As-Installed Coverage Testing Consider Beacon Rates
Performance Testing
Association Tests Registration Tests Network Connection Tests Authentication Tests Application Connection Tests Application Tests Load Tests
In-Motion Testing Security Vulnerability Testing
Security Settings Verification Penetration Testing Private-Side Testing Public-Side Testing
Acceptance/Verification Testing Simulation Testing Prototype Testing Pilot Testing Test Documentation
Part V Operational Support Considerations Chapter 18 Managing a Wireless LAN
Operational Support Considerations Help Desk
Connection Problems Poor Signal Coverage Poor Performance System Status Additional Considerations
Network Monitoring
Performance Monitoring Access Point Monitoring Configuration Monitoring Security Policy Management Installation Control Policies Monitoring Policies Periodic Testing Policies
Maintenance
Inoperative Access Points Poor Performance Poor Signal Coverage Broken Hardware Firmware Updates Signal Coverage Verification Access Point Inspections Troubleshooting Sparing
Engineering
Advanced Problem Resolution Coverage Expansion Capacity Increases Firmware Review Technology Upgrades Design Review
Configuration Management
Change-Control Processes Security Management Review Existing Security Policies Review the System Architecture Review Management Tools and Procedures Interview Users Verify Configurations of Wireless Devices Investigate Physical Installations of Access Points Identify Rogue Access Points Perform Penetration Tests Analyze Security Gaps Recommend Improvements
Trouble Ticket Coordination
Help Desk Group Desktop Support Group Network Support Group
Preparing for the Transfer to Operational Mode
Chapter 19 Troubleshooting a Wireless LAN
Troubleshooting Methodology
Identify the Problem Identify the Underlying Cause of the Problem Fix the Problem
Connection Problems
Insufficient Signal Coverage Radio Signal Interference Access Point Failure Incompatible Client Radio Faulty Firmware Incorrect Client Radio Configuration
Performance Problems
Insufficient Signal Coverage Radio Signal Interference Faulty Firmware Nonoptimal Client Radio Configuration Nonoptimal Access Point Configuration Misaligned Antennas High Utilization
Chapter 20 Preparing Operational Support Staff
Support Staff Considerations Availability of Existing Staff Experience Requirements Education and Training Requirements
Vendor-Neutral Training Vendor-Specific Training College Education
Certifications Staffing Sources
Glossary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion