Hotspot Networks(c) Wi-Fi for Public Access Locations
2017-07-07 02:10:07
Chapter 1: Introduction to Wireless Personal Area Networks (WPANs), Public Access Locations (PALs), and Hotspot Services
1-1: Technologies addressed in this book 1-2: Anticipated growth of mobile data/3G users in the United States (Source: Dresdner Kleinwort & Siemens Mobile Network marketing data) 1-3: Anticipated growth of wireless users worldwide (Source: UMTS Forum) 1-4: Data-enabled wireless units will equal the number of PCs in the near future. (Source: Nokia) 1-5: Interest in location-based and other wireless/nomadic services (Source: Siemens Mobile Networks [2001 data]) 1-6: Revenues for location-based and other wireless/nomadic data services 1-7: Continuum of wireless technologies 1-8: Wireless technologies by Locus 1-9: Ranges of various technologies 1-10: Comparison of line rate and throughput 1-11: Typical cell layout 1-12: Advantages of 802.11a based on cell topology 1-13: WLAN versus WPAN 1-14: The evolution of WWLAN over three decades 1-15: Nominal/actual data rates for various technologies 1-16: Taxonomy of WWANs 1-17: Standards bodies involved in 3G 1-18: Examples of portable terminals supporting hotspot services (Source: GSM World, http://www.gsmworld.com) 1-19: Wireless data evolution possibilities 1-20: 3G examples 1-21: Bandwidth requirements based on applications 1-22: Future all-IP wireless WWANs (Source: Nortel Networks) 1-23: Hotspot services need not wait for complex evolution scenarios. 1-24: Worldwide revenues and percentage allocation 1-25: Example of hotspot network (indoor application) 1-26: Example of hotspot network (outdoor application)
Chapter 2: Standards for Hotspots
2-1: Standardization efforts Figure 2-2. 802.15 protocol view 2-3: Routing datagrams 2-4: Mobile IP 2-5: Levels of security in practical implementations of IEEE 802.11b technology (Source: Cisco Systems)
Chapter 3: Technologies for Hotspots
3-1: Nonoverlapping channels 3-2: IBSS 3-3: ESS 3-4: FHSS 3-5: DSSS 3-6: DSSS signal operation 3-7: DCF procedure 3-8: Basics of encryption 3-9: WEP 3-10: Bluetooth applications Source: Tom Siep, TI, and Chatschik Bisdikian, IBM 3-11: Circuit-mode data over cellular phone 3-12: GPRS architecture 3-13: GPRS protocol stack 3-14: CDMA2000 network architecture 3-15: CDMA2000 reference model and protocol stack 3-16: Typical 2G network 3-17: Cell hierarchy of a next-generation network 3-18: An all-IP wireless/mobile network 3-19: Relative importance/ penetration of various technologies for hotspot services
Chapter 4: Security Considerations for Hotspot Services
4-1: TLS handshake 4-2: Protected EAP authentication phase 4-3: Roaming in protected EAP 4-4: The setup using the IEEE 802.1X port- based authentication mechanism 4-5: General topology of IEEE 802.1X 4-6: IEEE 802.1X 4-7: Initial Cisco implementation of IEEE 802.1X 4-8: An infrastructure mode network 4-9: Typical message exchange 4-10: Central user administration 4-11: Authentication- protocol configuration option format 4-12: EAP packet format 4-13: Request and response packet format 4-14: Success and failure packet format 4-15: Contents of the Type- Data field 4-16: AAA servers in home and local domains 4-17: Security associations 4-18: AAA Servers with Mobile IP Agents 4-19: Home agent allocated by AAAL 4-20: Local payment for local Mobile IP services 4-21: AAA servers using a broker 4-22: RADIUS application 4-23: RADIUS data format
Chapter 5: IEEE 802.11
5-1: Basic protocol model, IEEE 802.11 5-2: BSSs 5-3: DSs and APs 5-4: ESS 5-5: Connecting to other IEEE 802 LANs 5-6: Complete IEEE 802.11 architecture 5-7: IEEE 802.11 architecture (again) 5-8: 802.11 IBSS 5-9: Portion of the ISO/IEC basic reference model covered in the 802.11 standard 5-10: MAC frame format 5-11: Frame Control field 5-12: Sequence Control field 5-13: Frame Control field subfield values within control frames 5-14: RTS frame 5-15: CTS frame 5-16: ACK frame 5-17: PS-Poll frame 5-18: CF-End frame 5-19: CF-End+CF-Ack frame 5-20: Data frame 5-21: Management frame Figure 5-22. Authentication Algorithm Number fixed field Figure 5-23. Authentication Transaction Sequence Number fixed field Figure 5-24. Beacon Interval fixed field 5-25: Capability Information field 5-26: Current AP Address field 5-27: Listen Interval fixed field 5-28: Reason Code fixed field 5-29: AID fixed field 5-30: Status Code fixed field 5-31: Timestamp fixed field 5-32: Element format 5-33: MAC architecture
Chapter 6: IEEE 802.11b and IEEE 802.11a
6-1: Layer reference model 6-2: Long PLCP PDU format Figure 6-3: PLCP transmit procedure Figure 6-4: PMD layer reference model Figure 6-5: PPDU frame format Figure 6-6: OFDM training structure Figure 6-7: SIGNAL field bit assignment Figure 6-8: SERVICE field bit assignment Figure 6-9: BPSK, QPSK, 16-QAM, and 64-QAM constellation bit encoding Figure 6-10: Transmitter and receiver block diagram for the OFDM PHY Figure 6-11: OFDM PHY frequency channel plan for the United States Figure 6-12: PLCP transmit procedure Figure 6-13: Primitives
Chapter 7: Wireless Application Protocol (WAP)
7-1: World-wide-web programming model 7-2: WAP programming model 7-3: Feature/performance-enhancing proxy 7-4: Supporting services 7-5: A WAP network example 7-6: WAP client architecture 7-7: WAP stack architecture 7-8: An example of WAP 1.x gateway 7-9: An example of WAP HTTP proxy with profiled TCP and HTTP 7-10: An example of WAP proxy support for TLS tunneling 7-11: An example of direct access 7-12: Dual stack support 7-13: Interoperability and compliance
Chapter 8: Designing Nomadic and Hotspot Networks
8-1: Example of hotspot service configuration 8-2: Typical AP 8-3: Typical setup screen 8-4: Antenna types 8-5: Example of propagation 8-6: Wireless bridging using Cisco products 8-7: Coverage examples 8-8: Examples of hotspot outdoor topologies 8-9: Examples of Prefabricated Hotspot node/repeater 8-10: Indoor coverage 8-11: Indoors WLAN coverage options (Source: Cisco Systems) 8-12: One AP configuration 8-13: One AP with a bridge 8-14: Multiple AP configuration 8-15: Multiple APs with a bridge 8-16: Connections back to Internet resources 8-17: Example of hotspot installation process 8-18: Specific topological example of hotspot installation 8-19: Traditional NAT configuration 8-20: Basic NAT operation 8-21: Network address port translation (NAPT) operation 8-22: DHCP mechanism 8-23: Format of a DHCP message 8-24: Format of the flags field 8-25: Timeline diagram of messages exchanged between the DHCP client and servers when allocating a new network address 8-26: Timeline diagram of messages exchanged between DHCP client and servers when reusing a previously allocated network address 8-27: State transition diagram for DHCP clients A-1: Cisco offers a complete range of antennas for client adapter, AP, and bridge equipment that enable a customized wireless solution for almost any installation. A-2: Optional, higher-gain antennas can be used to extend the range of APs. A-3: With Cisco Aironet bridge antennas, the correct mounting hardware, and qualified installation, wireless links over great distances and obstacles are possible. A-4: Cisco Aironet antenna accessories
Chapter 9: Migrating to 3G WWANs
9-1: Evolution paths for WWAN voice and data 9-2: The transition of architecture in future networks 9-3: An all-IP network 9-4: Control plane (signaling) of an all-IP wireless network (Source: Nortel Networks) 9-5: Movement to an all-IP networks (Source: Mark Tubinis Water Cove Network) 9-6: IMT-2000: ITU’s concept for future networks 9-7: 2.5G/3G-to-WLAN interworking