Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Geier J. — Wireless networks first-step
Geier J. — Wireless networks first-step

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Wireless networks first-step

Автор: Geier J.

Аннотация:

As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 264

Добавлена в каталог: 28.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
(code division multiple access)      
(Denial of Service) threats      
(frequency division multiple access)      
(Local-Area Networks)      
(Metropolitan-Area Networks)      
(network interface cards)      2nd 3rd 4th 5th 6th 7th
(Orthogonal Frequency Division Multiplexing)      
(Personal-Area Networks)      
(radio frequency)      
(radio frequency) signals      
(security)      2nd
(spatial division multiple access)      
(time division multiple access)      
(Wi-Fi Protected Access)      
(Wide-Area Networks)      
(Wired Equivalent Privacy)      2nd 3rd 4th 5th 6th 7th 8th
(wireless)      2nd
ACCESS      
access controllers      2nd 3rd 4th 5th 6th
access points      
ad hoc wireless LANs      2nd 3rd
air medium      
air mediums      2nd
AirMagnet      
Airopeek      
alerts      
Amplification      
analog signals      2nd 3rd
analyzing      
Antennas      
application connectivity software      2nd 3rd 4th 5th 6th 7th
Application integration      
Application layer (Layer 7), OSI Reference Model      
application of      
applications      
Architectures      
assessments      2nd 3rd 4th 5th 6th 7th 8th
assigning      
assigning to      
Association      
Attacks      
Attenuation      
Attributes      
Authentication      
Bandwidth      
Bandwidth management      
base stations      2nd 3rd 4th 5th 6th 7th 8th 9th
basic configurations      
benefits      2nd
benefits of      
Bluetooth      
Bluetooth Special Interest Group (SIG)      
Bluetooth specifications      
bridges      
broadcasting      
carrier sense access      
carrier signals      
CDMA      
CDMA (Code Division Multiple Access)      2nd
CDPD (Cellular Digital Packet Data)      
Cellular Digital Packet Data (CDPD)      [See CDPD (Cellular Digital Packet Data)]
cellular-based wireless WANs      2nd 3rd 4th 5th 6th 7th
CF (Compact Flash) cards      
CF (CompactFlash) cards      
choosing      
Client devices      
Code division multiple access (CDMA)      [See CDMA (code division multiple access)]
colleges      
Compact Flash (CF) form factors      
CompactFlash (CF) cards      [See CF (Compact Flash) cards]
compared      
computer devices      
computer devicesNICs (network interface cards)      2nd 3rd 4th 5th 6th 7th
Configuration      
Configuration Management      
configuration monitoring      
configuration verifications      2nd
configurations      
Configuring      
Connections      2nd
content delivery (SMS)      
Control      
Cryptography      2nd [See also encryption]
CSMA/CA (carrier sense multiple access with collision avoidance) protocol      
data bundling      
Data link layer (Layer 2), OSI Reference Model      
data rates      
data signal transferrence      
data signals      
data transmissions      
DCF (distributed coordination function)      
Denial of Service (DoS) threats      [See DoS (Denial of Service) threats]
deployment control      
detriments      2nd
DHCP (Dynamic Host Configuration Protocol)      
Digital certificates      
digital signals      
direct database connectivity      
direct sequence spread spectrum (DSSS) physical layers      
Directional antennas      
displaying      
distributed coordination function (DCF)      
distribution systems      2nd 3rd 4th 5th 6th 7th
doctors' offices      
DOS      2nd 3rd 4th 5th
DoS (Denial of Service)      2nd 3rd 4th 5th 6th
DoS (denial of service) attacks      2nd 3rd 4th 5th
DSSS (direct sequence spread spectrum) physical layers      
Dynamic Host Configuration Protocol (DHCP)      
educational institutions      
Encryption      
end points      
end system support      
Engineering      
enterprise LANs      2nd 3rd 4th 5th 6th
Enterprise systems      
enterprise wireless LANs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Ethernet      
Ethernet LANs      
Ethernet-to-wireless bridges      
FDMA      
FDMA (frequency division multiple access)      2nd
FHSS (frequency hopping spread spectrum) physical layers      
field sales      
field services      
Filters      
Firewalls      
first generation cellular (1G cellular)      
first generation celular (1G cellular)      
flow of information      
form factors      
Fragmentation      
frequencies      
Frequency bands      
frequency division multiple access (FDMA)      [See FDMA (frequency division multiple access)]
frequency hopping spread spectrum (FHSS) physical layers      
FSK (frequency shift-keying)      2nd
full-duplex lines      
gateways      
hackers      
half-duplex lines      
Health care industry      
help desk      
Help Desks      
Hertz      
highly directional antennas      
HiperLAN/2 (High Performance Radio LAN)
HiperLAN/2 (High Perfromance Radio LAN)      2nd 3rd 4th
home and small office LANs      2nd 3rd 4th
home and small office systems      
home and small office wireless LANs      2nd 3rd 4th
Hospitals      
Hotels      
Hotspots      
identifying      
IEEE 802.11      
IEEE 802.11 authentication
IEEE 802.11 authentication vunerabilities      2nd 3rd
IEEE 802.11 standard      
IEEE 802.15 standard      
IEEE 802.15 standards      
IEEE 802.16      
IEEE 802.16 standard      2nd
IEEE 802.1X      2nd 3rd 4th 5th
impairments      
Implementing      
improvement recommendations      
improvements      
Industry-Standard Architecture (ISA)      [See ISA (Industry-Standard Architecture)]
information      
Information flow      2nd
information signals      
Infrared Data Association (IrDA)      [See IrDA (Infrared Data Association)]
Infrastructure      
infrastructures      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
inputting information      
intelligent restarts      
Interactivity      
interfacing with      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
interfacing with air medium      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Interference      2nd 3rd 4th 5th 6th
Internet connections      
Internet Protocol (IP) packet headers      
Interoperability      
interviewing      
Inventory control      
IP (Internet Protocol) packet headers      
IP packet headers      
IPsec      
IrDA (Infrared Data Association)      
ISA (Industry-Standard Architecture)      
LDAP (Lightweight Directory Access Protocol)      
Light      2nd 3rd
light signals      
Lightweight directory access protocol (LDAP)      
Local-Area Networks (LANs)      [See wireless LANs (Local-Area Networks)]
Location-based services      
MAC filters      2nd
MAC layer      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
MAC Layer (IEEE 802.11)      
Maintenance      
man-in-the-middle attacks      2nd 3rd 4th 5th
management systems      2nd 3rd 4th 5th 6th
medium access      
meteor burst communications      
metropolitan-area networks (MANs)      [See wireless MANs (Metropolitan-Area Networks)]
Middleware      
Mini-PCI cards      
minimizing      2nd 3rd 4th 5th 6th
Mobile phones      
Modulation      2nd 3rd 4th 5th 6th 7th
Monitoring      
Multipath propagation      2nd 3rd 4th 5th
multipath propogation      
multiple technology support      
Multiplexing      
NAT (Network Address Translation) protocol      
Network Address Translation (NAT) protocol      
network interface cards (NICs)      [See NICs (network interface cards)]
Network layer (Layer 3), OSI Reference Model      
Network monitoring      
networks      2nd 3rd 4th 5th
NICs      
NICs (network interface cards)      2nd 3rd 4th 5th 6th 7th
nodes      
noise floors      
obstructions      
OFDM      
OFDM (Orthogonal Frequency Division Multiplexing)      2nd 3rd
OFDM (Ortogonal Frequency Division Multiplexing)      2nd 3rd
OLE_LINK1      
Open System Interconnect (OSI) Reference Model      
optimization techniques      
Orthogonal Frequency Division Multiplexing (OFDM)      [See OFDM (Orthogonal Frequency Division Multiplexing)]
OSI (Open System Interconnect) Reference Model      
packet radio systems      
passive monitoring      
passive monitoring threats      
password assignments      
Passwords      
PC Card      
PC cards      
PCI (Peripheral Component Interconnect)      
PCI (Peripheral Component Interconnect) cards      
PCMCIA (Personal Computer Memory Card International Association)      
penetration tests      
performing      
Peripheral Component Interconnect (PCI)      [See PCI (Peripheral Component Interconnect) cards]
Personal Computer Memory Card International Association (PCMCIA)      
personal firewalls      
Personal-Area Networks (PANs)      [See wireless PANs (Personal-Area Networks)]
Physical layer (Layer 1), OSI Reference Model      
physical layers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Physical Layers (IEEE 802.11)      
physically securing      2nd
placing outside of      2nd 3rd
point-to-multipoint systems      
Point-to-point systems      
Polarization      
policies      
porpagation      
power save mode      
preparing for      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
Presentation layer (Layer 6), OSI Reference Model      
Printing      2nd
Propagation      
Protocols      
PSK (phase shift-keying)      2nd
Public key cryptography      2nd
Public key encryption      2nd 3rd 4th 5th
public networks      
public wireless LANs      
QAM (Quadrature Amplitude Modulation)      2nd
radio frequency (RF) signals      [See RF (radio frequency) signals]
radio NICs      
radio wave propagation      
Radio waves      
RADIUS (Remote Authentication Dial-In User Service)      
real estate offices      
Receivers      
recommending      
reducing      
Remote Authentication Dial-In User Service (RADIUS)      
repeaters      
reporting      
residential gateways      
residential routers      
reviewing      
RF
RF signals      2nd 3rd 4th 5th
RF site surveys      
rogue access points      2nd
rogue base station identification      
rogue base stations      
routers      
routing tables      
RTS/CTS      
SanDisk Corporation      
Satellites      
Scanning      
1 2
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2017
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте