If you are involved or getting involved in 802.11 Wireless LAN systems and services, this book is for you. This book explains the functional parts of a Wireless LAN system and their basic operation. You will learn how WLANs can use access points to connect to each other or how they can directly connect between two computers. Explained is the basic operation of WLAN systems and how the performance may vary based on a variety of controllable and uncontrollable events.
This book will explain the key differences between the WLAN system versions such as frequency and data rates along with which versions are compatible with each other. Tips are included on how to install a WLAN system along with common problems you may encounter and solutions you may use.
Included is an overview of Ethernet technology and how it applies to 802.11 Wireless LAN. The fundamentals of frequency hopping and spread spectrum technology that are used in 802.11 systems will help you to understand how 802.11 systems will help you to understand how 802.11 systems can co-exist with devices that use the same ISM frequency band. Covered are the differences between 802.11, 802.11a, 802.11b, and 802.11g.
You will learn how 802.11 systems can use independent DCF “Ad-hoc” and/or controlled PCF “non-contention” based operation. The different types of antennas that are commonly used in WLAN systems are explained and you will discover the typical range for WLAN systems and how to extend the range of WLAN systems through the use of directional antennas.
Discussed are the basic steps for equipment configuration and options you may want to consider to maintain system security. Also included are brief overviews of 802.16 UWB and the use of proprietary protocols.
This Book Provides:
- The Functional parts of Wireless LAN systems
- Basic WLAN Operation
- How to Connect WLAN Devices without an Access Point
- Key WLAN industry Market Numbers
- Comparison of Different WLAN System Versions
- How to Install WLAN Systems
- WLAN Equipment Configuration Options
- WLAN Technology Evolution
- Important Security Issues