Index

Symbols

128-bit encryption implementations, Security
3D map, plotting points on, Plotting the Points on a 3-D Map
40-bit encryption, Security
802 specifications web site, The Standards
802.11, The Standards, Introduction to the Technology
deployment issues, Disclaimer, Conclusions
FCC regulations explained, Regulations Affecting 802.11 Deployment, Conclusions
infrared, The Standards
overview, The Standards
security website, 802.1x
specification, Why Now?
web site, The Standards
802.11a, New in This Edition, The Standards, Introduction to the Technology
802.11b, New in This Edition, The Standards, Introduction to the Technology
applications, Other Applications, In Closing
beyond the 300-meter limit, Long-Range Networking
channel allocations, Devices that Fall into Part 15 of the ISM Band (2400 to 2483 MHz)
channel frequencies, 802.11b Channels and Interference
network tools, Software
802.11g, New in This Edition, The Standards
802.16, The Standards
802.1x, New in This Edition, The Standards, 802.1x
open source, 802.1x
Port Based Network Access Control (specification), 802.1x
security methods web site, 802.1x
9913 cable, Cabling

A

access point (AP), Access Point Hardware, Software
caveats, Access Point Caveats
defined, Hardware Requirements, Using Access Points
host-based, Hardware
management software, Access Point Management Software
placement, The WISP Approach
repeater, Two APs Back-to-Back
sectorizing, Point-to-Multipoint Links
ad-hoc (or peer-to-peer), The Standards
adapters, proprietary-to-standard, Antenna ...

Get Building Wireless Community Networks, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.