Introduction |
|
xvii | |
Assessment Test |
|
xl | |
Chapter 1 Computer Networking Fundamentals |
|
1 | (34) |
|
|
2 | (5) |
|
|
3 | (1) |
|
|
3 | (1) |
|
The Metropolitan Area Network |
|
|
4 | (1) |
|
|
5 | (1) |
|
The Personal Area Network |
|
|
6 | (1) |
|
|
7 | (7) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Point-to-Point Connections |
|
|
13 | (1) |
|
Point-to-Multipoint Connections |
|
|
13 | (1) |
|
|
14 | (7) |
|
Layer 1 The Physical Layer |
|
|
15 | (1) |
|
Layer 2 The Data Link Layer |
|
|
16 | (1) |
|
Layer 3 The Network Layer |
|
|
17 | (1) |
|
Layer 4 The Transport Layer |
|
|
17 | (1) |
|
Layer 5 The Session Layer |
|
|
18 | (1) |
|
Layer 6 The Presentation Layer |
|
|
18 | (1) |
|
Layer 7 The Application Layer |
|
|
18 | (1) |
|
How the Layers Work Together |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (6) |
|
|
22 | (1) |
|
|
23 | (2) |
|
Network Address Translation |
|
|
25 | (2) |
|
|
27 | (1) |
|
|
28 | (2) |
|
|
30 | (5) |
Chapter 2 Wireless Local Area Networking, Standards, and Certifications |
|
35 | (42) |
|
The Wireless Computer Network |
|
|
36 | (2) |
|
The Wireless Personal Area Network |
|
|
36 | (1) |
|
The Wireless Local Area Network |
|
|
37 | (1) |
|
The Wireless Metropolitan Area Network |
|
|
37 | (1) |
|
The Wireless Wide Area Network |
|
|
38 | (1) |
|
Building-to-Building Connectivity Using Wireless LAN Technology |
|
|
38 | (2) |
|
Wireless Point-to-Point Connections |
|
|
38 | (1) |
|
Wireless Point-to-Multipoint Connections |
|
|
39 | (1) |
|
Radio Frequency Regulatory Domain Governing Bodies and Local Regulatory Authorities |
|
|
40 | (2) |
|
United States: Federal Communications Commission |
|
|
41 | (1) |
|
Europe: European Telecommunications Standards Institute |
|
|
42 | (1) |
|
|
42 | (13) |
|
|
43 | (1) |
|
The IEEE 802.11a Amendment |
|
|
44 | (1) |
|
The IEEE 802.11b Amendment |
|
|
45 | (1) |
|
The IEEE 802.11g Amendment |
|
|
46 | (3) |
|
The IEEE 802.11n Amendment |
|
|
49 | (1) |
|
The IEEE 802.11ac Amendment |
|
|
50 | (2) |
|
Summary of IEEE 802.11 Communications Standards and Amendments |
|
|
52 | (1) |
|
Additional IEEE 802.11 Amendments |
|
|
53 | (2) |
|
Interoperability Certifications |
|
|
55 | (4) |
|
|
56 | (1) |
|
The Wi-Fi Protected Access Certification |
|
|
56 | (1) |
|
The Wi-Fi Protected Access 2 Certification |
|
|
57 | (1) |
|
The Wi-Fi Multimedia Certification |
|
|
58 | (1) |
|
Wi-Fi Multimedia Power Save Certification |
|
|
58 | (1) |
|
Wi-Fi Protected Setup Certification Overview |
|
|
58 | (1) |
|
Common Wireless Local Area Network Deployment Scenarios |
|
|
59 | (12) |
|
|
60 | (1) |
|
Enterprise Deployments: Corporate Data Access and End-User Mobility |
|
|
61 | (1) |
|
Extension of Existing Networks into Remote Locations |
|
|
62 | (1) |
|
Public Wireless Hotspots (Public Wi-Fi) and Hospitality |
|
|
62 | (2) |
|
Office (Carpeted) Deployments |
|
|
64 | (1) |
|
Educational Institution Deployments |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
67 | (2) |
|
Last-Mile Data Delivery: Wireless ISP |
|
|
69 | (1) |
|
High-Density Deployments Including Conference Centers |
|
|
70 | (1) |
|
Municipal, Law Enforcement, and Transportation Networks |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (4) |
Chapter 3 Infrastructure and Client Devices Used with Wireless Networking |
|
77 | (54) |
|
The Wireless Access Point |
|
|
80 | (15) |
|
|
82 | (9) |
|
Controller-Managed Access Points |
|
|
91 | (2) |
|
Cloud-Managed Access Points |
|
|
93 | (1) |
|
Wireless Branch Router/Remote Access Point |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Wireless Repeaters/Range Extenders |
|
|
97 | (1) |
|
Wireless LAN Controllers and Cloud-Managed Architectures |
|
|
98 | (6) |
|
Centralized Administration |
|
|
99 | (1) |
|
Virtual Local Area Networks |
|
|
99 | (1) |
|
Power over Ethernet Capability |
|
|
99 | (1) |
|
Improved Mobile Device Transition |
|
|
100 | (1) |
|
Wireless LAN Profiles and Virtual Wireless LANs |
|
|
100 | (1) |
|
Advanced Security Features |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
Predictive Modeling Site Survey Tools |
|
|
101 | (1) |
|
Radio Frequency Spectrum Management |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
Infrastructure Device Redundancy |
|
|
102 | (1) |
|
Wireless Intrusion Prevention System |
|
|
102 | (1) |
|
Direct and Distributed Access Point Connectivity |
|
|
102 | (1) |
|
Layer 2 and Layer 3 Access Point Connectivity |
|
|
102 | (1) |
|
Distributed and Centralized Data Forwarding |
|
|
103 | (1) |
|
|
104 | (4) |
|
|
105 | (1) |
|
Powered Devices and Classification Signatures |
|
|
106 | (1) |
|
|
107 | (1) |
|
Radio Hardware Used with Wireless LAN Technology |
|
|
108 | (1) |
|
USB 1.0, USB 1.1, USB 2.0, and USB 3.0 |
|
|
108 | (4) |
|
|
109 | (1) |
|
Installation and Configuration of USB Devices |
|
|
110 | (2) |
|
Peripheral Component Interconnect |
|
|
112 | (3) |
|
|
112 | (1) |
|
Installation and Configuration of PCI Cards |
|
|
113 | (2) |
|
Mini-PCI, Mini-PCIe, and Half Mini-PCIe |
|
|
115 | (3) |
|
Features of Mini-PCI, Mini-PCIe, and Half Mini-PCIe Cards |
|
|
116 | (1) |
|
Installation and Configuration of Mini-PCI, Full Mini-PCIe, and Half Mini-PCIe Cards |
|
|
117 | (1) |
|
Wireless Workgroup Bridges |
|
|
118 | (3) |
|
Features of Wireless Workgroup Bridges |
|
|
119 | (1) |
|
Installation and Configuration of Wireless Workgroup Bridges |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (3) |
|
Manufacturer-Specific Client Utilities |
|
|
122 | (1) |
|
Third-Party Client Utilities |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (5) |
Chapter 4 Radio Frequency Fundamentals for Wireless Networking |
|
131 | (40) |
|
Understanding Radio Frequency |
|
|
133 | (10) |
|
Wavelength in Wireless LANs |
|
|
136 | (1) |
|
Frequency in Wireless LANs |
|
|
137 | (1) |
|
Amplitude in Wireless LANs |
|
|
138 | (1) |
|
|
138 | (1) |
|
Radio Frequency Used in Wireless LANs |
|
|
139 | (4) |
|
Wireless LAN Coverage and Capacity |
|
|
143 | (7) |
|
|
144 | (2) |
|
|
146 | (3) |
|
Radio Frequency Channel Reuse and Device Co-location |
|
|
149 | (1) |
|
Radio Frequency Range and Speed |
|
|
150 | (2) |
|
Line of Sight in Wireless Networking |
|
|
150 | (2) |
|
Wi-Fi and Non-Wi-Fi Interference |
|
|
152 | (6) |
|
Adjacent Channel and Co-channel Interference |
|
|
152 | (2) |
|
|
154 | (1) |
|
Environment: Radio Frequency Behavior |
|
|
155 | (3) |
|
Basic Units of Radio Frequency Measurement |
|
|
158 | (8) |
|
Absolute Measurements of Radio Frequency Power |
|
|
158 | (2) |
|
Relative Measurements of Radio Frequency Power |
|
|
160 | (2) |
|
Radio Frequency Signal Measurements |
|
|
162 | (4) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (3) |
Chapter 5 Antenna Technology for Wireless Networking |
|
171 | (44) |
|
Basic Radio Frequency Antenna Concepts |
|
|
172 | (8) |
|
|
173 | (1) |
|
|
173 | (3) |
|
|
176 | (1) |
|
|
176 | (2) |
|
|
178 | (1) |
|
|
178 | (2) |
|
Wireless LAN Antenna Types |
|
|
180 | (15) |
|
|
180 | (2) |
|
Omnidirectional Antenna Specifications |
|
|
182 | (2) |
|
|
184 | (9) |
|
Highly Directional Antennas |
|
|
193 | (1) |
|
Highly Directional Antenna Specifications |
|
|
194 | (1) |
|
Radio Frequency Cables and Connectors |
|
|
195 | (4) |
|
Radio Frequency Cable Types |
|
|
196 | (1) |
|
Radio Frequency Cable Length |
|
|
196 | (1) |
|
Radio Frequency Cable Cost |
|
|
197 | (1) |
|
|
197 | (1) |
|
Radio Frequency Connectors |
|
|
198 | (1) |
|
Factors in Antenna Installation |
|
|
199 | (1) |
|
Addressing the Effects of Earth Curvature |
|
|
199 | (1) |
|
|
199 | (1) |
|
Minimizing the Effects of Multipath Using Antenna Diversity |
|
|
200 | (1) |
|
Combating Effects of Wind and Lightning in Wireless LAN Installations |
|
|
201 | (2) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (3) |
|
Internal and External (to the Access Point) Antennas |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Maintaining Clear Communications |
|
|
206 | (2) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
211 | (4) |
Chapter 6 Communication for Wireless Networking |
|
215 | (46) |
|
Wireless LAN Operation Methods |
|
|
216 | (11) |
|
The Independent Basic Service Set |
|
|
217 | (5) |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Connecting to an IEEE 802.11 Wireless Network |
|
|
227 | (10) |
|
|
227 | (1) |
|
Wireless Network Discovery |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
IEEE 802.11 Authentication |
|
|
231 | (4) |
|
|
235 | (1) |
|
IEEE 802.11 Deauthentication and Disassociation |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (2) |
|
|
240 | (6) |
|
|
246 | (1) |
|
Wireless LAN Transitioning/Roaming |
|
|
247 | (2) |
|
IEEE 802.11 Power Save Operations |
|
|
249 | (2) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Automatic Power Save Delivery |
|
|
251 | (1) |
|
IEEE 802.11 Protection Mechanisms |
|
|
251 | (3) |
|
IEEE 802.11g Extended Rate Physical Protection Mechanisms |
|
|
252 | (1) |
|
IEEE 802.11n High-Throughput Protection Mechanisms |
|
|
253 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
|
257 | (4) |
Chapter 7 Modulation Technology for Wireless Networking |
|
261 | (32) |
|
|
262 | (7) |
|
Detecting Network Traffic Collisions with CSMA/CD |
|
|
263 | (1) |
|
Avoiding Network Traffic Collisions with CSMA/CA |
|
|
264 | (1) |
|
Reserving Time for Data Transmission Using Distributed Coordination Function |
|
|
265 | (1) |
|
Effects of Half-Duplex on Wireless Throughput |
|
|
266 | (1) |
|
Narrowband vs. Spread-Spectrum Communication |
|
|
267 | (2) |
|
Spread-Spectrum Technology |
|
|
269 | (4) |
|
Frequency-Hopping Spread Spectrum |
|
|
269 | (1) |
|
802.11 Direct-Sequence Spread Spectrum |
|
|
270 | (1) |
|
802.11b High Rate/Direct-Sequence Spread Spectrum |
|
|
271 | (1) |
|
IEEE 802.11 DSSS and HR/DSSS Channels |
|
|
271 | (2) |
|
IEEE 802.11g Extended Rate Physical |
|
|
273 | (2) |
|
IEEE 802.11n High Throughput |
|
|
275 | (1) |
|
IEEE 802.11a, 802.11g, 802.11n, and 802.11ac OFDM |
|
|
275 | (12) |
|
IEEE 802.11a, 802.11g, 802.11n, and 802.11ac OFDM Channels |
|
|
276 | (2) |
|
IEEE 802.11n/ac Multiple Input/Multiple Output Technology |
|
|
278 | (2) |
|
IEEE 802.11n/ac MIMO Channels |
|
|
280 | (2) |
|
Co-location of IEEE 802.116 HR/DSSS and IEEE 802.11a/g/n OFDM Systems |
|
|
282 | (2) |
|
Adjacent-Channel and Co-channel Interference |
|
|
284 | (1) |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (4) |
Chapter 8 Security Fundamentals for Wireless Networking |
|
293 | (54) |
|
Introducing IEEE 802.11 Wireless LAN Security |
|
|
295 | (1) |
|
Wireless LAN Threats and Intrusion |
|
|
295 | (2) |
|
IEEE 802.11 Standard Security |
|
|
297 | (1) |
|
IEEE 802.11 Open System Authentication |
|
|
298 | (1) |
|
IEEE 802.11 Shared-Key Authentication |
|
|
298 | (1) |
|
Early Wireless LAN Security Methods |
|
|
298 | (3) |
|
The Service Set Identifier |
|
|
299 | (1) |
|
|
299 | (1) |
|
The Media Access Control Address |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
IEEE 802.11 Authentication and Data Encryption |
|
|
302 | (2) |
|
About Wired Equivalent Privacy |
|
|
303 | (1) |
|
How Wired Equivalent Privacy Was Used |
|
|
303 | (1) |
|
IEEE 802.11 SOHO and Enterprise Security Technologies |
|
|
304 | (3) |
|
Wi-Fi Protected Setup PIN-Based or Push-Button Configuration Wireless Security |
|
|
304 | (1) |
|
|
305 | (1) |
|
Push-Button Configuration Security |
|
|
306 | (1) |
|
Wi-Fi Protected Access and WPA2 Personal Security |
|
|
307 | (1) |
|
Passphrase Characteristics |
|
|
307 | (1) |
|
WPA and WPA2 Enterprise Security |
|
|
308 | (1) |
|
|
308 | (5) |
|
|
309 | (1) |
|
Extensible Authentication Protocol |
|
|
310 | (1) |
|
IEEE 802.1X and EAP Together: IEEE 802.1X/EAP |
|
|
310 | (1) |
|
Remote Authentication Dial-In User Service |
|
|
310 | (2) |
|
Authentication, Authorization, and Accounting |
|
|
312 | (1) |
|
IEEE 802.11 Encryption Methods |
|
|
313 | (4) |
|
|
314 | (1) |
|
Temporal Key Integrity Protocol |
|
|
315 | (1) |
|
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
|
|
316 | (1) |
|
Role-Based Access Control |
|
|
317 | (1) |
|
Virtual Private Networking |
|
|
318 | (10) |
|
Point-to-Point Tunneling Protocol |
|
|
320 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
320 | (1) |
|
Components of a VPN Solution |
|
|
320 | (8) |
|
The Wireless Intrusion Prevention System |
|
|
328 | (6) |
|
WIPS Configuration and Maintenance |
|
|
330 | (1) |
|
Overlay and Integrated WIPS Technology |
|
|
331 | (3) |
|
|
334 | (1) |
|
Wireless Network Management and Monitoring Systems |
|
|
334 | (5) |
|
WNMS: Software, Hardware, or Cloud? |
|
|
335 | (2) |
|
Wireless Network Monitoring |
|
|
337 | (2) |
|
Industry Regulatory Compliance |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (2) |
|
|
343 | (4) |
Chapter 9 Design for Wireless Networking |
|
347 | (78) |
|
|
349 | (7) |
|
Size of the Physical Location |
|
|
351 | (1) |
|
Intended Use of the Wireless Network |
|
|
351 | (1) |
|
Number of Wireless Devices |
|
|
352 | (1) |
|
Wireless Client Device Capabilities |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
Bring Your Own Device Acceptance |
|
|
354 | (1) |
|
Building Age and Construction Materials |
|
|
355 | (1) |
|
Network Infrastructure Devices |
|
|
355 | (1) |
|
Gathering Business Requirements |
|
|
356 | (2) |
|
General Office/Enterprise |
|
|
357 | (1) |
|
Interviewing Stakeholders |
|
|
358 | (4) |
|
Manufacturer Guidelines and Deployment Guides |
|
|
362 | (1) |
|
Gathering Site-Specific Documentation |
|
|
362 | (4) |
|
Floor Plans and Blueprints |
|
|
362 | (1) |
|
|
363 | (1) |
|
Electrical Specifications |
|
|
364 | (1) |
|
Existing Network Characteristics |
|
|
364 | (2) |
|
Identifying Infrastructure Connectivity and Power Requirements |
|
|
366 | (2) |
|
Understanding Application Requirements |
|
|
368 | (1) |
|
Understanding Radio Frequency Coverage and Capacity Requirements |
|
|
369 | (1) |
|
Client Connectivity Requirements |
|
|
369 | (1) |
|
Antenna Use Considerations |
|
|
370 | (4) |
|
The Physical Radio Frequency Site Survey Process |
|
|
374 | (1) |
|
Radio Frequency Spectrum Analysis |
|
|
375 | (10) |
|
Spectrum Analysis for IEEE 802.11 Wireless Networks |
|
|
375 | (3) |
|
Wi-Fi and Non-Wi-Fi Interference Sources |
|
|
378 | (6) |
|
|
384 | (1) |
|
|
385 | (2) |
|
Performing a Manual Radio Frequency Wireless Site Survey |
|
|
387 | (13) |
|
Obtaining a Floor Plan or Blueprint |
|
|
388 | (1) |
|
Identifying Existing Wireless Networks |
|
|
388 | (2) |
|
Testing Access Point Placement |
|
|
390 | (1) |
|
|
391 | (1) |
|
Considering the Advantages and Disadvantages of Manual Site Surveys |
|
|
391 | (1) |
|
Performing a Software-Assisted Manual Site Survey |
|
|
392 | (6) |
|
Using a Manual Site Survey Toolkit |
|
|
398 | (2) |
|
Performing a Predictive Modeling Site Survey |
|
|
400 | (3) |
|
Internet-Based Predictive Modeling Site Survey |
|
|
402 | (1) |
|
Performing a Post-Deployment Site Survey |
|
|
403 | (1) |
|
|
403 | (7) |
|
|
410 | (1) |
|
Infrastructure Hardware Selection and Placement |
|
|
410 | (1) |
|
Testing Different Antennas |
|
|
411 | (2) |
|
Testing Multiple Antenna Types |
|
|
411 | (1) |
|
Choosing the Correct Antennas |
|
|
412 | (1) |
|
Wireless Channel Architectures |
|
|
413 | (1) |
|
Multiple-Channel Architecture |
|
|
413 | (1) |
|
Single-Channel Architecture |
|
|
414 | (1) |
|
Wireless Device Installation Limitations |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
418 | (2) |
|
|
420 | (5) |
Chapter 10 Mobile Device Management and BYOD Fundamentals |
|
425 | (36) |
|
Mobile Device Management Solutions |
|
|
427 | (3) |
|
The Software as a Service Solution |
|
|
428 | (1) |
|
|
428 | (2) |
|
Common Mobile Device Operating System Platforms |
|
|
430 | (1) |
|
The Mobile Application Store |
|
|
431 | (4) |
|
Pushing Content to Mobile Devices |
|
|
435 | (1) |
|
Mobile Device Management Administrative Permissions |
|
|
436 | (1) |
|
Understanding Mobile Device Management High Availability and Redundancy |
|
|
436 | (1) |
|
Mobile Device Management Device Groups |
|
|
437 | (1) |
|
|
438 | (2) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Mobile Device Telecommunications Expense Management |
|
|
440 | (1) |
|
Captive and Self-Service Portals |
|
|
440 | (2) |
|
|
440 | (1) |
|
|
441 | (1) |
|
General Technology Network and Security Policy |
|
|
442 | (1) |
|
Security Policy Framework |
|
|
443 | (1) |
|
Information Technology and Security Policy Implementation and Adherence |
|
|
443 | (2) |
|
|
445 | (1) |
|
Balancing Security and Usability |
|
|
445 | (1) |
|
Backup, Restore, and Recovery Policies |
|
|
445 | (1) |
|
Operating System Modifications and Customization |
|
|
446 | (2) |
|
|
446 | (1) |
|
Original Equipment Manufacturer |
|
|
447 | (1) |
|
Vendor-Default Device Applications |
|
|
447 | (1) |
|
|
448 | (3) |
|
|
448 | (1) |
|
Directory Services Integration |
|
|
449 | (1) |
|
Issuing Digital Certificates |
|
|
450 | (1) |
|
End-User License Agreement |
|
|
450 | (1) |
|
Understanding Group Profiles |
|
|
451 | (2) |
|
Corporate-Owned Mobile Device Profiles |
|
|
452 | (1) |
|
Employee-Owned Mobile Device Profiles |
|
|
452 | (1) |
|
Outside Consultants' and Visitors' Mobile Device Profiles |
|
|
453 | (1) |
|
Policy and Profile Pilot Testing |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
|
456 | (5) |
Chapter 11 Troubleshooting for Wireless Networking |
|
461 | (44) |
|
Identifying Wireless LAN Problems |
|
|
462 | (3) |
|
Radio Frequency Transmitters and Receivers |
|
|
464 | (1) |
|
Wireless LAN Connectivity-Coverage and Capacity Problems |
|
|
465 | (15) |
|
|
465 | (8) |
|
Intermittent Wireless Connectivity Problems |
|
|
473 | (4) |
|
|
477 | (3) |
|
Application Performance Problems |
|
|
480 | (8) |
|
Wireless Device Software and Hardware Upgrades |
|
|
481 | (7) |
|
Optimizing Wireless Networks |
|
|
488 | (10) |
|
Wireless Infrastructure Hardware Selection and Placement |
|
|
488 | (1) |
|
Identifying, Locating, and Removing Sources of Wi-Fi and Non-Wi-Fi Interference |
|
|
489 | (1) |
|
Wireless Client Device Load Balancing and Infrastructure Device Redundancy |
|
|
490 | (1) |
|
Wireless Infrastructure Device Redundancy |
|
|
491 | (1) |
|
Analyzing Wireless Infrastructure Capacity and Utilization |
|
|
492 | (1) |
|
Radio Frequency Performance Problems: Multipath |
|
|
492 | (1) |
|
Radio Frequency Performance Problems: Hidden Node |
|
|
493 | (4) |
|
Quality of Service Considerations |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
500 | (5) |
Appendix Answers to Review Questions |
|
505 | (24) |
|
Chapter 1: Computer Networking Fundamentals |
|
|
506 | (2) |
|
Chapter 2: Wireless Local Area Networking, Standards, and Certifications |
|
|
508 | (1) |
|
Chapter 3: Infrastructure and Client Devices Used with Wireless Networking |
|
|
509 | (2) |
|
Chapter 4: Radio Frequency Fundamentals for Wireless Networking |
|
|
511 | (1) |
|
Chapter 5: Antenna Technology for Wireless Networking |
|
|
512 | (2) |
|
Chapter 6: Communication for Wireless Networking |
|
|
514 | (2) |
|
Chapter 7: Modulation Technology for Wireless Networking |
|
|
516 | (1) |
|
Chapter 8: Security Fundamentals for Wireless Networking |
|
|
517 | (2) |
|
Chapter 9: Design for Wireless Networking |
|
|
519 | (6) |
|
Chapter 10: Mobile Device Management and BYOD Fundamentals S |
|
|
S21 | |
|
Chapter 11: Troubleshooting for Wireless Networking |
|
|
525 | (4) |
Index |
|
529 | |