Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Roshan P., Leary J. — 802.11 wireless LAN fundamentals
Roshan P., Leary J. — 802.11 wireless LAN fundamentals



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: 802.11 wireless LAN fundamentals

Авторы: Roshan P., Leary J.

Аннотация:

802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations.
Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users. 802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 312

Добавлена в каталог: 22.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
linear polarization      
linear polarization, WLANs      
Local Area Transport (LAT). [See LAT (Local Area Transport)]      
Logical link (LLC) sublayer (OSI)      
Logical units      
Logical units, network hierarchies      
MAC      
MAC address authentication 2nd 3rd      
MAC address authentication, 802.11 standards
MAC address authentication, 802.11 standards, vunerabilities
MAC layer operations      
MAC layer operations, 802.11 WLANs
MAC layer operations, 802.11 WLANs power save operations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
MAC layer operations, 802.11 WLANs station connectivity 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
MAC layer operations, 802.11 WLANs, frame formats 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th
MAC, address tables      
MAC, address tables, updating      
Main lobes      
Main lobes, antennas      
Management frames      
Management frames, 802.11 MAC
Management frames, 802.11 management frames 2nd 3rd 4th
Management frames, 802.11 management frames, association request frames 2nd
Management frames, 802.11 management frames, association response frames
Management frames, 802.11 management frames, ATM frames
Management frames, 802.11 management frames, authentication frames 2nd
Management frames, 802.11 management frames, beacon frames 2nd 3rd
Management frames, 802.11 management frames, CF parameter set IE 2nd
Management frames, 802.11 management frames, challenge text IE
Management frames, 802.11 management frames, deauthentication frames 2nd 3rd
Management frames, 802.11 management frames, disassociation frames
Management frames, 802.11 management frames, DS parameter set IE 2nd
Management frames, 802.11 management frames, FH parameter set IE 2nd
Management frames, 802.11 management frames, IBSS parameter set IE
Management frames, 802.11 management frames, probe request frames 2nd 3rd
Management frames, 802.11 management frames, reassociation request frames
Management frames, 802.11 management frames, reassociation response frames 2nd
Management frames, 802.11 management frames, SSID-IE 2nd 3rd
Management frames, 802.11 management frames, support rate IE 2nd 3rd
Management frames, 802.11 management frames, TIM IE 2nd 3rd 4th
Master keys      
Media      
Media, 802.3 Ethernet 2nd 3rd
Medium access mechanisms      
Medium access mechanisms, 802.11 WLANs
Medium access mechanisms, 802.11 WLANs, CSMA/CA 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
Medium access mechanisms, 802.11 WLANs, frame fragmentations 2nd 3rd 4th
Medium access mechanisms, 802.11 WLANs, PCF 2nd 3rd 4th 5th 6th 7th 8th 9th
Message integrity check (MIC)      
MIC (message integrity check)      
Michael MIC algorithm      
Minimal encapsulation      
Minimal encapsulation, Mobile IP registration      
Minor lobes      
Minor lobes, antennas      
MN (mobile node)      
MN (mobile node), Mobile IP      
MN, Mobile IP      
MN, Mobile IP, registration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st      
Mobile IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th      
Mobile IP, agent discovery 2nd 3rd 4th      
Mobile IP, CCoA (co-located care-of address)      
Mobile IP, CoA (care-of address)      
Mobile IP, FA (foreign agent)      
Mobile IP, HA (home agent)      
Mobile IP, MN (mobile node)      
Mobile node (MN), Mobile IP      
Mobile node (MN), Mobile IP, registration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st      
Mobility      
Mobility, Mobile IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th      
Mobility, Mobile IP, agent discovery 2nd 3rd 4th      
Modulation      
Modulation, 802.11 PHYs 2nd 3rd 4th 5th
More data field (MAC frame)      
More fragments field (MAC frame)      
Multicast addressing      
Mutual authentication      
Mutual authentication, one-way authentication      
Mutual authentication, one-way authentication, compared      
Near field      
Near field, antennas      
Negotiation      
Negotiation, auto negotiation      
Negotiation, auto negotiation, Gigabit Ethernet 2nd 3rd 4th      
Network diameter      
Network diameter, 802.3 Ethernet 2nd 3rd
networks      
Networks, hierarchies      
Networks, hierarchies, logical units      
Nomadic roaming 2nd      
North America      
North America, frequency hopping patterns      
OFDM 2nd 3rd 4th 5th 6th 7th 8th 9th      
Omnidirectional antennas      
One-way authentication      
One-way authentication, mutual authentication      
One-way authentication, mutual authentication, compared      
Open authentication      
Open authentication, 802.11 standards
Open authentication, 802.11 standards, vunerabilities
Open System Interconnect (OSI). [See OSI (Open System Interconnect)]      
Order field (MAC frame)      
OSI      
OSI, (Open System Interconnect)      
OSI, 802.3 Ethernet 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
Packets      
Packets, IP packets      
Packets, IP packets, encapsulation      
Passive scanning      
Passive scanning, APs      
Patch antennas      
Payload field (Ethernet frames)      
PBCC modulation 2nd 3rd      
PCF      
PCF, 802.11 WLANs 2nd 3rd 4th
PCF, 802.11 WLANs, CFP (Contention Free Period) 2nd 3rd
PCF, 802.11 WLANs, PIFS (priority interframe space) 2nd
Per-frame keying 2nd      
Phased AP deployment 2nd      
PHYs      
PHYs, (physical layers      
PHYs, 802.11 PHYs 2nd 3rd 4th 5th
PHYs, 802.11 PHYs, coding 2nd 3rd
PHYs, 802.11 PHYs, interleaving 2nd 3rd 4th
PHYs, 802.11 PHYs, modulation 2nd 3rd 4th 5th
PHYs, 802.11 PHYs, scrambling
PHYs, 802.11 PHYs, symbol mapping 2nd 3rd 4th 5th
Physical layers (PHYs). [See PHYs]      
PIFS      
PIFS (priority interframe space)      
PIFS (priority interframe space), 802.11 WLANs 2nd
PIFS, (priority interframe space)      
Police departments      
Police departments, WLAN design 2nd 3rd 4th      
Power limitations      
Power limitations, U-NII bands 2nd      
Power management field (MAC frame)      
Power save operations      
Power save operations, 802.11 WLANs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Preamble field (Ethernet frames)      
Preemptive AP discovery 2nd 3rd 4th 5th      
Priority interframe space (PIFS). [See PIFS (priotirty interframe space)]      
Probe process      
Probe process, station connectivity 2nd 3rd 4th 5th 6th 7th      
Probe request frames 2nd 3rd      
Properties      
Properties, radio antennas 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd      
Protocol version field (MAC frame)      
PS-Poll frames 2nd 3rd      
Public access      
Public access, WLAN design 2nd 3rd 4th      
Public safety      
Public safety, WLAN design 2nd 3rd 4th      
QoS      
QoS, 802.11 WLANs 2nd 3rd 4th 5th
QoS, 802.11 WLANs, cochannel overlap 2nd 3rd 4th 5th 6th 7th 8th
QoS, 802.11 WLANs, EDCF (enhanced DCF) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
QoS, 802.11 WLANs, half-duplex mediums 2nd
QoS, 802.11 WLANs, hidden nodes
Quadrature components (sinusoids)      
Quality of service (QoS). [See QoS (Quality of Service)]      
Radiation      
Radiation patterns      
Radiation patterns, antennas 2nd      
Radiation, radio antennas      
Radios      
Radios, antennas 2nd 3rd      
Radios, antennas, bandwidth      
Radios, antennas, beamwidth      
Radios, antennas, main lobes      
Radios, antennas, minor lobes      
Radios, antennas, properties 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd      
Radios, antennas, radiation patterns 2nd 3rd      
Radios, antennas, types 2nd 3rd 4th      
Radios, antennas, WLANs      
Radios, decibel values      
Radios, electromagnetic transmissions      
Radios, power      
Radios, receivers 2nd      
Radios, receivers, 802.11a minimum radio performance 2nd      
Radios, receivers, 802.11b minimum radio performance 2nd      
Radios, receivers, sensitivity calculation      
Radios, system performance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th      
Radios, two-way radios      
Radios, two-way radios, FDD (frequency division duplex)      
Radios, two-way radios, TDD (time division duplex)      
Radios, U-NII band frequencies 2nd 3rd      
Radios, U-NII band frequencies, power limitations 2nd      
Radios, U-NII band frequencies, spectral masks 2nd 3rd 4th      
Radios, unlicensed wireless 2nd      
Radios, unlicensed wireless, 2.4 GHz ISM band transmit power levels      
Radios, unlicensed wireless, ISM band frequencies 2nd 3rd 4th      
Radios, watts      
Reassociation request frames      
Reassociation response frames 2nd      
Receivers      
Receivers, radios 2nd      
Receivers, radios, 802.11a minimum radio performance 2nd      
Receivers, radios, 802.11b minimum radio performance 2nd      
Receivers, radios, sensitivity calculation      
Registration      
Registration, MN (mobile node) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st      
Retail stores      
Retail stores, WLAN design 2nd 3rd 4th 5th 6th 7th      
Retry field (MAC frame)      
Reverse tunneling      
Reverse tunneling, Mobile IP registration      
RF devices      
RF devices, impedance      
Roam-time AP discovery 2nd 3rd      
Roaming 2nd 3rd      
Roaming domains 2nd 3rd      
Roaming duration 2nd      
Roaming, 802.11 roaming 2nd
Roaming, active scanning      
Roaming, application operations      
Roaming, between subnets      
Roaming, Layer 2 roaming 2nd 3rd 4th 5th 6th 7th 8th 9th
Roaming, Layer 2 roaming, locations 2nd 3rd 4th 5th 6th
Roaming, Layer 2 roaming, roaming algorithms 2nd
Roaming, Layer 3 roaming
Roaming, Layer 3 roaming, between domains 2nd 3rd
Roaming, nomadic roaming 2nd      
Roaming, preemptive roaming 2nd 3rd 4th      
Roaming, roam-time AP discovery 2nd      
Roaming, roaming domains 2nd 3rd      
Roaming, roaming duration 2nd      
Roaming, seamless roaming 2nd      
Routing      
Routing, Layer 3 routing
Routing, Layer 3 routing, Mobile IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
Routing, Layer 3 routing, tunneling 2nd 3rd 4th 5th
Rpeater APs      
Rpeater APs, 802.11 WLANs 2nd 3rd
RTS frames 2nd 3rd      
RTS/CTS      
RTS/CTS, CSMA/CA 2nd 3rd 4th 5th      
Scanning      
Scanning, active scanning      
Scanning, passive scanning      
Schools      
Schools, WLAN design 2nd 3rd      
Scrambling      
Scrambling, 802.11 PHYs
Seamless roaming 2nd      
Security      
Security, 802.11 specifications 2nd
Security, 802.11 specifications, authentication mechanisms 2nd 3rd 4th 5th 6th
Security, 802.11 specifications, encryption 2nd 3rd 4th 5th 6th 7th
Security, 802.11 specifications, vunerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Security, 802.11 specifications, wireless 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
Security, attacks      
Security, attacks, bit flipping attacks      
Security, authenitaction      
Security, authenitaction, EAP (Extensible Authentication Protocol) 2nd      
Security, authentication      
Security, authentication, algorithms 2nd 3rd 4th 5th 6th      
Security, authentication, framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th      
Security, data integrity 2nd 3rd 4th 5th      
Security, data integrity algorithms      
Security, data privacy algorithms      
Security, encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th      
Security, encryption, 802.11 standards 2nd 3rd 4th 5th 6th 7th
Security, encryption, AES (Advanced Encryption Standard) 2nd 3rd      
Security, encryption, block ciphers      
Security, encryption, feedback modes      
Security, encryption, initialization vectors 2nd      
Security, encryption, stream ciphers      
Security, encryption, TKIP encryption      
Security, enhanced key management 2nd 3rd 4th 5th 6th      
Security, keys      
Security, keys, master keys      
Security, keys, per-frame keying 2nd      
Security, mutual authentication      
Security, one-way authentication      
Security, vunerabilities      
Security, vunerabilities, MAC address authentication      
Security, vunerabilities, open authentication      
Security, vunerabilities, shared key authentication 2nd 3rd 4th      
Security, vunerabilities, WEP 2nd 3rd 4th 5th 6th 7th      
Security, WLANs      
Security, WLANs, 802.11 WLANs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th
Sensitivity calculation      
Sensitivity calculation, radio receivers      
Sequence field (MAC frame)      
Service sets      
Service sets, BSS (basic service sets)      
Service sets, ESSs (extended service sets)      
Service sets, IBSSs (independent service sets)      
SFD (start of frame delimter) field (Ethernet frames)      
Shared key authentication      
Shared key authentication, 802.11 standards
Shared key authentication, 802.11 standards, vunerabilities 2nd 3rd 4th
Short interframe space (SIFS) 2nd      
Simultaneous bindings      
Simultaneous bindings, Mobile IP registration      
Sinusoids      
Site surveys 2nd 3rd 4th 5th 6th 7th 8th 9th      
Site surveys, conducting 2nd 3rd 4th      
Site surveys, tools      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте