Index
Symbols
- 128-bit encryption implementations, Security
- 3D map, plotting points on, Plotting the Points on a 3-D Map
- 40-bit encryption, Security
- 802 specifications web site, The Standards
- 802.11, The Standards, Introduction to the Technology
- deployment issues, Disclaimer, Conclusions
- FCC regulations explained, Regulations Affecting 802.11 Deployment, Conclusions
- infrared, The Standards
- overview, The Standards
- security website, 802.1x
- specification, Why Now?
- web site, The Standards
- 802.11a, New in This Edition, The Standards, Introduction to the Technology
- 802.11b, New in This Edition, The Standards, Introduction to the Technology
- applications, Other Applications, In Closing
- beyond the 300-meter limit, Long-Range Networking
- channel allocations, Devices that Fall into Part 15 of the ISM Band (2400 to 2483 MHz)
- channel frequencies, 802.11b Channels and Interference
- network tools, Software
- 802.11g, New in This Edition, The Standards
- 802.16, The Standards
- 802.1x, New in This Edition, The Standards, 802.1x
- 9913 cable, Cabling
A
- access point (AP), Access Point Hardware, Software
- caveats, Access Point Caveats
- defined, Hardware Requirements, Using Access Points
- host-based, Hardware
- management software, Access Point Management Software
- placement, The WISP Approach
- repeater, Two APs Back-to-Back
- sectorizing, Point-to-Multipoint Links
- ad-hoc (or peer-to-peer), The Standards
- adapters, proprietary-to-standard, Antenna ...
Get Building Wireless Community Networks, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.