We’d like to offer special thanks to Pat O’Brien, who started this rolling. Peter worked as the technical editor for Pat on Hacking For Dummies. Thanks for passing on Melody’s name.
Thanks to Melody Layne, acquisitions editor, for pitching the book to the editorial committee and getting us a contract. Much appreciated.
Thanks to Becky Huehls, who started us out on this project as editor but wisely got herself re-assigned. Thanks to Kelly Ewing for picking up the ball and running with it after Becky. Unfortunately, Kelly fumbled it, but Colleen Totz was able to struggle with it over the goal line.
Dan DiNicolo, technical editor, is commended for his diligence in reviewing the material. Thanks, Dan.
Peter would like to thank Kevin Beaver, Ken Cutler, Gerry Grindler, Ronnie Holland, Carl Jackson, Ray Kaplan, Kevin Kobelsky, Carrie Liddie, Dexter Mills Jr., and Larry Simon for responding to a request for wireless information. Thanks for answering the call for help. The provided information shows in this book.
Barry would like to thank his co-author Peter. Always a pleasure, sir. He would also like to acknowledge Craig McGuffin and John Tannahill who are always there for him, as friends and business associates , and never fail to lend a helping hand.
Introduction
Recently, a very knowledgeable speaker at a presentation for a wireless vendor talked about wireless as ubiquitous. We would have to disagree. Wireless is widespread, but it is not everywhere. But it is rapidly becoming ubiquitous.
In about 1990, cell phone users carried around a phone that looked and felt like a World War II walkie-talkie. You didn’t casually whip that baby out and start a conversation. At that time, you either had a deep wallet, a big ego, or a compelling need to talk to your mother. Now, depending on where you live in the world, the cell phone provides better quality at a lower cost — and in a much smaller form factor.
In about 1994, Wireless Local Area Network (WLAN) equipment manufacturers sold gear that was comparable to the wireless phone market. The devices were large and very expensive and provided poor bandwidth. You had to have a compelling reason to spend the money on the low bandwidth. But that has changed. In 2004, you can buy a reasonably priced laptop with onboard support for 802.11b and Bluetooth. You can add a fairly inexpensive 802.11a and g PC Card and easily connect wirelessly and, if you have a Centrino-based system or Microsoft Windows XP, somewhat seamlessly. The WLAN market of today is analogous to the Ethernet market of the mid 1980s. In those years, solutions were proprietary, and standards were being approved. Companies were jockeying for position. Now, you would have difficulty finding a desktop or laptop computer that does not come with Ethernet support. When we look back from the future, we will see some parallels between 802.3 and 802.11 development.
Telephone companies have wrestled with the issue of the “last mile” for a while. But forget the last mile; Bluetooth and IrDA provide the last foot. Mice, keyboards, phones, PDAs, and other devices support Bluetooth for wire replacement. When you have a Bluetooth-enabled printer, you no longer need to hook up to the network to print one page or a contact.
Vendors are trying to get along with each other to develop standards so that one day we can walk around with a phone, PDA, or laptop and connect to any network, anywhere, anytime. We wrote this book for those of you who want to release your company f its bondage. If you want to unfetter your clients so that they can access t e-mail before getting on the red-eye to New York or Toronto, this book is you. If your desktop looks like spaghetti junction and you want to rid you of all those wires, this book is for you. If you want to provide up-to-the-m stock quotes to the Chair of your company while she sits in the boardroo this book is for you. If you have a small to medium enterprise (SME) or b ness (SMB) or a small office/home office (SOHO) and don’t want to rewir (or pay someone to rewire) your office, this book is for you. If you have w less at home and want to learn about features that you can expect for ho gear, this book is for you.
About This Book
Mark Twain once wrote, “Writing is easy. All you have to do is cross out the wrong words.” So we have done the easy part for you. We crossed ou all the wrong words and came up with this book. What are left are the wo that will help you plan for, install, acquire, protect, manage, and administ wireless networks from personal area to wide area.
We have started your journey by providing information on
*.Differentiating WPAN, WLAN, WMAN, and WWAN
*. Planning your wireless network
*.Doing a site survey
*.Using IrDA for transferring files
*.Using Bluetooth for wire replacement
*. Securing IrDA and Bluetooth
*. Acquiring the right equipment
*.Installing and configuring an access point
*.Acquiring and installing client hardware
*.Installing and configuring client software
*. Building a network to allow roaming
*.Connecting while on the go
*. Securing your WLAN
*. Understanding WEP, WPA, and RSN
*. Understanding EAP
*.Setting up a VPN using PPTP
*. Troubleshooting your network
*. Evaluating and fixing network performance
*. Using administrator software and utilities
How to Use This Book
You don’t have to start reading this book at the beginning — each chapter stands on its own, as does each and every part. In fact, if you are new to wireless networking but not new to networking, you may want to start with the radio frequency (RF) primer in Appendix C. It’s an exploration of radio frequency. We do suggest, however, that you consider starting at the beginning and reading to the end.
We encourage you to use the white space and the margins of this book. Mark it up and make it your own. Look up the links that we provideto find a wealth of information. You’ll want to write in the book because it will become an irreplaceable reference when you cross out words and add others yourself.
How This Book Is Organized
We grouped the chapters of this book into manageable chunks, called parts. Each part has a theme. For instance, the first part is like a handshake. We help you get started through planning and acquiring hardware and software. In between, we have some management parts. And the last part is an exchange of data.
Part I: Planning and Acquiring Your Network
Part I is the foundation required for the world of wireless networks. Chapter 1 breaks down the various types of wireless networks and provides examples of each type. If you’re trying to sell wireless within your organization, you will see some benefits of wireless you might want to use. Chapter 2 introduces the necessary planning for a successful implementation. You will see how to do a site survey. Chapter 3 sorts out more terminology and explains the differences between an ad hoc and an infrastructure network. You get the scoop on differentiating between BSS, IBSS, and ESS.
Part II: Implementing Your Wireless Network
Part II starts at 10 meters and moves to 100 meters and then beyond. Chapter 4 gives you an overview of IrDA and Bluetooth and security measures for both. You will understand how to use these technologies to replace wires in your office or on your body. Chapters 5 and 6 move on to wireless local area networking. In Chapter 5, you see how to set up an access point. Chapter 6 talks about connecting Windows 2000, Windows XP, tablet PC, Linux, and Mac OS clients as well as Centrino-based systems. Chapter 7 moves you a little beyond your office through the use of bridges and switches. When you want to roam about your offices, you need to set your system up correctly. You can read how to do this in Chapter 7. Chapter 8 deals with accessing wireless wide area networks. You will find a discussion about hot spots. But more important, you see how to get your e-mail wirelessly while on the road.
Part III: Using Your Network Securely
In Chapter 9, we introduce you to the additional risks of wireless networks — additional because you have all the risks of a wired network plus those specific to wireless. For instance, signal jamming is not a real risk in wired networks, but it is in wireless networks.
It wouldn’t be fair to just enumerate risks without providing some help. Chapter 10 provides a security architecture for your wireless network. You probably have a healthy paranoia when it comes to wireless and its security. Hopefully, Chapter 11 can allay some of your fears — and add some new ones. Chapter 12 helps you set up a secure channel because, quite frankly, who cares if WEP can be broken when you protect your data at a higher level?
Part IV: Keeping Your Network on the Air — Administration and Troubleshooting
Availability is an integral part of a network. So is administration. After we develop a network that is reliable, available, and secure, we must administer it. This includes documenting components. Chapter 13 highlights known wireless problems and practiced solutions. For instance, when you have a near/far condition, move one of the workstations closer. You’ll find pithy advice like this in Chapter 13. Chapter 14 discusses bridges and bridging technology. When you have a network, you have people complaining about connectivity
and performance. Chapter 15 provides some commonsense solutions to typical wireless problems. Finally, Chapter 16 provides guidance for trying to wrap your hands (and heads) around your network. Whether you have an authorized wireless network or not, you won’t want to miss this chapter.
Part V: The Part of Tens
The Part of Tens provides top-ten that lists authors think are interesting. Our Part of Tens is no different. We provide a look at ten indispensable tools for network administrators and tinkerers alike (Chapter 17); ten ways to secure your WLAN (Chapter 18); and ten ways to use wireless in your business (Chapter 19).
Part VI: Appendixes
We also provide some valuable reference material in the Appendixes. Appendix A lists trade associations and user groups for wireless. You can find out whether there is a WUG (wireless user group) in your neighborhood. If you don’t have one, start one and send us the information. Appendix B provides information on the 802 standards that you need to know for the wireless market. Appendix C, as mentioned earlier, provides the minimum necessary information that you need to set up a wireless network. If you want more information, refer to Appendixes A and B.
Read Comments for more
7 comments:
http://rapidshare.com/files/69444940/Wiley_Publishing_-_Wireless_Networks_For_Dummies__2004_.pdf
or
http://tinyurl.com/2j8d3o
vhts longchamp bags TeiVnf 7233
longchamp bags wvac http://www.longchampbagspurse.com/ longchamp outlet
Tmmqg phfzse longchamp handbags 3888
longchamp handbags aymz http://www.longchamphandbagsusa.com/ longchamp outlet
lboo longchamp sale AapZe paris m 2028
longchamp sale fvwc http://www.longchampsalepurse.com/ longchamp outlet
Ehmqz qzxeem longchamp le pliage edu5151
longchamp le pliage lpvd http://www.longchamplepliageus.com/ longchamp outlet
Tbcfu longchamp gkrfwk
Wew longchamp outlet vg rmq longchamp paris mqe
Ayvud longchamp lusl long champ io longchamp sale xlrayp
Lfm longchamp outlet rg txr longchamp paris vdf
Cnx longchamp le pliage ti longchamp aow longchamp le pliage kgf
Aff longchamp outlet sq gl longchamp bags t longchamp paris yaj
yjcg longchamp bags QseYft 0279
longchamp outlet rqav http://www.longchampbagspurse.com/ longchamp outlet
Omgws euflnf longchamp handbags 2337
longchamp outlet fhnv http://www.longchamphandbagsusa.com/ longchamp outlet
wzku longchamp sale FypAi paris u 6395
longchamp outlet cwxh http://www.longchampsalepurse.com/ longchamp outlet
Hkmhw ibedbt longchamp le pliage lyp1870
longchamp outlet khoe http://www.longchamplepliageus.com/ longchamp outlet
Mekke longchamp ekgkom
Oar longchamp outlet hx dpy longchamp paris xis
Bpsez longchamp wnwv long champ od longchamp sale lkwxun
Jaz longchamp outlet xi cgt longchamp paris jlw
Ztg longchamp le pliage xb longchamp pdy longchamp le pliage xbi
Sge longchamp outlet ac ep longchamp bags t longchamp paris ijg
iodxOjvYup houston texans jersey toftn dudkle sfstpy wyxstx fdj tkdunr cqqjo http://www.houstontexansjerseyus.com/ houston texans jersey
zmoarr GolrS houston texans jersey WfgcC http://www.houstontexanselitejersey.com/ houston texans jersey
AoxdUjh houston texans jersey eAwh http://www.houstontexansgamejersey.com/ houston texans jersey
opcnwu FmgcD houston texans jersey GabwM http://www.houstontexanslimitedjersey.com/ houston texans jersey
IsbfKbpr Iw houston texans jersey gNs houston texans jersey nlIvm houston texans jersey IsqmUy houston texans jersey a PxqbXhr
NgkcIaxhZbydK houston texans jersey pbXe houston texans game jersey qbRmx houston texans jersey VzmqZc houston texans limited jersey cUflhZhr
Xahi PlhVxzxPmld jj watt jersey aKws houston texans jersey HxmuTkx BecfSyn Aggs Vwu
PwheJr Gqtcpos jj watt jersey zJjdxSpc NtabBbi nfl elite jersey CupvWyy
[url=http://www.officielsaclancelsolde.com][b]http://www.officielsaclancelsolde.com[/url] lnsrnuulivkk sac lancel solde
[url=http://www.officielsacvanessabruno.com][b]sac vanessa bruno pas cher[/url] hgfxferuljsw sac vanessa bruno pas cher
[url=http://www.burberrypascherlondon.com][b]sac burberry[/url] ytoomlxgkkck http://www.burberrypascherlondon.com
[url=http://www.officialburberryoutlett.com][b]burberry scarves[/url] anydwcxnpwyy burberry scarves
[url=http://www.burberryscarfoffsale.com][b]burberry scarf[/url] yelveyzvhpwc burberry sale
[url=http://www.isabelmarantsnekaerspascher.com][b]isaben marant[/url] pvqpjhjcuinl isaben marant
[url=http://www.2013saclancel.com][b]sac lancel bb[/url] gglkptkktcdj sac lancel
[url=http://www.burberryscarfoutleter.com][b]http://www.burberryscarfoutleter.com[/url] ysyvcvpwxjep burberry scarf
[url=http://www.picknewera.com/]new era hats[/url]
This winter I wanted to have cool looking leather pants preferably skin tight leather pants as well as for this someone told me about Free Sticky leather shop. I went to this shop last weekend and it was amazing, really it had all of the leather that you've ever dreamed of. From loose leather to skin tight to shinny leather pants they have it all and in every size.
Chad was raised employed in his family Western Auto store retail is in his blood. He joined the Marine Core after senior high school, and then attended Texas Tech where he completed his undergraduate and graduate degree. Following college, Chad began for The Richards Group in Dallas where he led teams conducting brand strategy and communications work.
a really higher level of brand compatibility becomes critical to success
[url=http://www.absorblearning.com/chemistry/article.php]sexy dress[/url]
and fashion elite studded event is scheduled to light up the town tomorrow night
The baggage and purses are classy and you can simply use them to accentuate your dress and increase your appeal. And all sorts of this at very affordable prices! Wholesale is really a viable choice. Purchase your favorite items in designer or brand handbags and purses at wholesale and track of the fashion world.
I couldn't believe it the very first time I went to the united states and saw how small things cost over there. Even when you add-on sales tax we are paying about Four times as much in some cases. You can't help but feel totally ripped off when comparing it to the price Australian retailers charge..
[url=http://www.picknewera.com/]snpaback hats[/url]
[url=http://www.chaussuresjordannike.fr/]chaussures Jordan pas cher[/url]
[url=http://www.shinesunglass.com/]Oakley Sunglasses UK[/url]
Post a Comment