Introduction |
|
xiii | |
Chapter 1 Introduction to Wireless Communications |
|
1 | (28) |
|
Wireless Communications Technologies |
|
|
2 | (13) |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (2) |
|
Wireless Metropolitan Area and Wide Area Networks |
|
|
10 | (4) |
|
|
14 | (1) |
|
Digital Convergence and Future Trends |
|
|
15 | (1) |
|
Wireless Advantages and Challenges |
|
|
16 | (4) |
|
Advantages of Wireless Networking |
|
|
16 | (2) |
|
Challenges of Wireless Networking |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
23 | (3) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
Chapter 2 Wireless Data Transmission |
|
29 | (42) |
|
|
30 | (7) |
|
|
32 | (4) |
|
|
36 | (1) |
|
How Data Is Transmitted Using Radio Waves |
|
|
37 | (18) |
|
|
38 | (1) |
|
|
39 | (3) |
|
|
42 | (2) |
|
|
44 | (3) |
|
|
47 | (8) |
|
|
55 | (6) |
|
Frequency Hopping Spread Spectrum (FHSS) |
|
|
56 | (3) |
|
Direct Sequence Spread Spectrum (DSSS) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (3) |
|
|
65 | (2) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
Chapter 3 Radio Frequency Communications |
|
71 | (42) |
|
Components of a Radio System |
|
|
72 | (5) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (15) |
|
|
77 | (5) |
|
|
82 | (2) |
|
|
84 | (3) |
|
|
87 | (5) |
|
|
92 | (6) |
|
|
92 | (1) |
|
Advantages and Disadvantages of Standards |
|
|
93 | (1) |
|
|
94 | (1) |
|
Telecommunications Standards Organizations |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
101 | (2) |
|
|
103 | (2) |
|
|
105 | (2) |
|
|
107 | (4) |
|
|
111 | (1) |
|
|
112 | (1) |
Chapter 4 How Antennas Work |
|
113 | (38) |
|
|
114 | (5) |
|
|
116 | (3) |
|
|
119 | (6) |
|
|
119 | (1) |
|
|
120 | (4) |
|
Signal Strength and Direction |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (9) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (2) |
|
|
131 | (4) |
|
Antenna System Implementation |
|
|
135 | (7) |
|
|
135 | (2) |
|
|
137 | (1) |
|
Point-to-Multipoint Links |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Other Challenges of Outdoor Links |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (3) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
Chapter 5 Wireless Personal Area Networks |
|
151 | (44) |
|
What Is a Wireless Personal Area Network? |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Relationship Between the OSI Model and IEEE Project 802 |
|
|
153 | (1) |
|
|
154 | (23) |
|
IEEE 802.15.1 and Bluetooth |
|
|
154 | (1) |
|
|
155 | (8) |
|
Bluetooth Link Manager Layer |
|
|
163 | (2) |
|
Other Bluetooth Protocol Layers and Their Functions |
|
|
165 | (1) |
|
|
165 | (12) |
|
Other Technologies Using IEEE 802.15.4 |
|
|
177 | (1) |
|
|
177 | (3) |
|
Security in Bluetooth WPANs |
|
|
178 | (1) |
|
Security in ZigBee and IEEE 802.15.4 WPANs |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (4) |
|
|
185 | (2) |
|
|
187 | (5) |
|
|
192 | (1) |
|
|
192 | (3) |
Chapter 6 Introduction to Wi-Fi WLANs |
|
195 | (38) |
|
|
196 | (2) |
|
Wireless Network Interface Card |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (3) |
|
|
198 | (1) |
|
|
199 | (2) |
|
|
201 | (4) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Coordinating Communications in the Shared Wireless Medium |
|
|
205 | (5) |
|
|
206 | (3) |
|
Point Coordination Function |
|
|
209 | (1) |
|
Association and Reassociation |
|
|
210 | (2) |
|
|
212 | (2) |
|
|
214 | (4) |
|
|
215 | (3) |
|
|
218 | (2) |
|
|
220 | (2) |
|
|
222 | (3) |
|
|
225 | (6) |
|
|
231 | (1) |
|
|
232 | (1) |
Chapter 7 Enhancing WLAN Performance |
|
233 | (38) |
|
|
234 | (4) |
|
|
234 | (2) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
238 | (6) |
|
|
239 | (1) |
|
Channel Allocation in 802.11a |
|
|
240 | (2) |
|
|
242 | (2) |
|
Error Correction in 802.11a/g |
|
|
244 | (1) |
|
|
245 | (7) |
|
|
246 | (2) |
|
|
248 | (4) |
|
|
252 | (2) |
|
|
254 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Other Amendments and Amendments Currently Under Development |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (3) |
|
|
262 | (3) |
|
|
265 | (4) |
|
|
269 | (1) |
|
|
269 | (2) |
Chapter 8 Expanding WLANs and WLAN Security |
|
271 | (26) |
|
Wireless Bridges and Repeaters |
|
|
272 | (3) |
|
|
272 | (1) |
|
WLAN Range Extenders (Repeaters) |
|
|
273 | (2) |
|
|
275 | (1) |
|
WLAN Design Considerations |
|
|
276 | (1) |
|
|
277 | (1) |
|
WLANs and Multimedia Distribution |
|
|
277 | (2) |
|
|
278 | (1) |
|
|
279 | (8) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Introduction to Enterprise WLAN Security |
|
|
281 | (2) |
|
Wi-Fi Protected Setup (Push-Button Wireless Security) |
|
|
283 | (1) |
|
|
283 | (2) |
|
Intrusion Detection and Intrusion Prevention |
|
|
285 | (1) |
|
Additional WLAN Security Tactics |
|
|
285 | (1) |
|
|
285 | (1) |
|
Using MAC Filters to Enhance Security |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (2) |
|
|
290 | (3) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
296 | (1) |
Chapter 9 Wireless Metropolitan Area Networks |
|
297 | (36) |
|
|
298 | (5) |
|
Last Mile Wired Connections |
|
|
298 | (2) |
|
Last Mile Wireless Connections |
|
|
300 | (2) |
|
|
302 | (1) |
|
Land-Based Fixed Broadband Wireless |
|
|
303 | (6) |
|
|
303 | (4) |
|
|
307 | (2) |
|
|
309 | (12) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (9) |
|
|
321 | (2) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (2) |
|
|
325 | (2) |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (3) |
Chapter 10 Wireless Wide Area Networks |
|
333 | (34) |
|
|
334 | (7) |
|
Cellular Telephone Technology |
|
|
335 | (1) |
|
How Cellular Telephony Works |
|
|
335 | (6) |
|
Evolution of Cellular Technology |
|
|
341 | (8) |
|
Digital Cellular Challenges and Outlook |
|
|
349 | (1) |
|
Satellite Broadband Wireless |
|
|
349 | (9) |
|
|
350 | (2) |
|
|
352 | (5) |
|
Experimental Technologies |
|
|
357 | (1) |
|
Satellite Technology Outlook |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (2) |
|
|
361 | (3) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (2) |
Chapter 11 Radio Frequency Identification and Near Field Communication |
|
367 | (32) |
|
|
368 | (10) |
|
|
369 | (9) |
|
|
378 | (5) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
Tag and Reader Collisions |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (4) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (4) |
|
RFID Impact on Corporate Networks |
|
|
387 | (2) |
|
Security Considerations for RFID and NFC |
|
|
389 | (2) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (3) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
Chapter 12 Wireless Communications Everywhere |
|
399 | (26) |
|
|
400 | (3) |
|
|
401 | (2) |
|
Applications of Wireless Data Communications |
|
|
403 | (14) |
|
|
403 | (2) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
411 | (2) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
423 | (2) |
Appendix A Completing Hands-On Projects Using Windows 10 |
|
425 | (4) |
|
Chapter 5-Configuring Bluetooth |
|
|
425 | (2) |
|
|
425 | (2) |
|
Chapter 6-Configuring an Ad Hoc WLAN |
|
|
427 | (1) |
|
|
427 | (1) |
|
Chapter 7-Configuring a Wireless Router or Gateway |
|
|
428 | (1) |
|
|
428 | (1) |
Glossary |
|
429 | (16) |
Index |
|
445 | |