The Bottom Line
- Covers a broad range of wireless network technologies
- Clearly defines all key technical terms in a Glossary
- Contains review questions at the end of each chapter to reinforce learning
- Does not define or mention "WiMAX"
- Does not mention the proprietary extensions to 802.11b/g
- Only about 200 pages in length; some readers will want more in-depth treatment
- Chapter 1 introduces PANs, LANs, MANs and WANs and describes applications and benefits of wireless.
- Chapter 2 covers wireless system architectures including hardware/software components and data flow.
- In Chapter 3, the mechanisms of radio frequency and light signaling for networking are discussed.
- Personal Area Network systems with technologies like Bluetooth and IrDA are described in Chapter 4.
- Chapter 5 reviews home, enterprise, and public wireless LANs and the hardware gear they employ.
- In Chapter 6, wireless MAN systems, components and technology are explored.
- Wireless WANs are covered in Chapter 7.
- Chapter 8 discusses security issues and policies for wireless networks.
- The Appendix contains answers to chapter review questions. A Glossary defines key technical terms.
Guide Review - "Wireless Networks first-step" by Jim Geier
This book divides the study of wireless into four main areas: Personal, Local, Metropolitan, and Wide-Area. The idea of segmenting network architectures by their range is common in the networking field. Personal Area Networks (PANs) cover very short distances, often only a few feet or meters. Wireless Local Area Networks (LANs) may span a home, a school, or office buildings. Metropolitan Area Networks (MANs) and Wide-Area Networks (WANs) in turn span progressively larger geographic areas. The nature of wireless signaling, required equipment, and limitations varies greatly depending on the type and range of network involved.
Before diving into the details of wireless architectures, the book first describes the basic goals and concepts of wireless networking. In the long term, wireless will be the most efficient, powerful means for computing devices to communicate, though some technical obstacles must be overcome to make this a reality. The book concludes with a chapter on wireless security. By its nature, wireless communications are more susceptible to attack by spies, and careful management of the technology is required to maintain data privacy.