| |
| |
Introduction | |
| |
| |
| |
Network Fundamentals Review | |
| |
| |
Introduction to Networks | |
| |
| |
Protocols and the OSI Model | |
| |
| |
OSI Model | |
| |
| |
Protocols | |
| |
| |
OSI Layers | |
| |
| |
Physical Layer: Layer 1 | |
| |
| |
Data Link Layer: Layer 2 | |
| |
| |
Network Layer: Layer 3 | |
| |
| |
Transport Layer: Layer 4 | |
| |
| |
Upper Layers: Layers 5 Through 7 | |
| |
| |
Communication Among OSI Layers | |
| |
| |
LANs and WANs | |
| |
| |
Network Devices | |
| |
| |
Terminology: Domains, Bandwidth, Unicast, Broadcast, and Multicast | |
| |
| |
Hubs | |
| |
| |
Physical Interfaces and Ports | |
| |
| |
Switches | |
| |
| |
Switches Versus Bridges | |
| |
| |
Routers | |
| |
| |
Introduction to the TCP/IP Suite | |
| |
| |
TCP/IP Transport Layer Protocols | |
| |
| |
Port Numbers | |
| |
| |
TCP Sequencing, Acknowledgment, and Windowing | |
| |
| |
TCP/IP Internet Layer Protocols | |
| |
| |
Protocols | |
| |
| |
IPv4 Datagrams | |
| |
| |
IPv6 Datagrams | |
| |
| |
Routing | |
| |
| |
Routers Work at the Lower Three OSI Layers | |
| |
| |
Routing Tables | |
| |
| |
Routing Protocols | |
| |
| |
Addressing | |
| |
| |
Physical Addresses | |
| |
| |
Logical Addresses | |
| |
| |
Routing and Network Layer Addresses | |
| |
| |
IPv4 Addresses | |
| |
| |
IPv4 Address Classes | |
| |
| |
Private and Public IPv4 Addresses | |
| |
| |
IPv4 Subnets | |
| |
| |
IPv6 Addresses | |
| |
| |
IPv6 Address Types | |
| |
| |
Switching Types | |
| |
| |
Layer 2 Switching | |
| |
| |
Layer 3 Switching | |
| |
| |
Spanning Tree Protocol | |
| |
| |
Redundancy in Layer 2 Switched Networks | |
| |
| |
STP Terminology and Operation | |
| |
| |
STP Terminology | |
| |
| |
STP States | |
| |
| |
Rapid STP | |
| |
| |
Virtual LANs | |
| |
| |
VLAN Membership | |
| |
| |
Trunks | |
| |
| |
STP and VLANs | |
| |
| |
Inter-VLAN Routing | |
| |
| |
Comprehensive Example | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
| |
Network Design Methodology | |
| |
| |
Understanding the Network Architectures for the Enterprise | |
| |
| |
Business Drivers for a New Network Framework | |
| |
| |
Business Forces | |
| |
| |
Technology-Related Forces | |
| |
| |
IT Challenges | |
| |
| |
Cisco Network Architectures for the Enterprise | |
| |
| |
Borderless Networks Architecture | |
| |
| |
Borderless Networks Architecture Approach | |
| |
| |
Collaboration Architecture Approach | |
| |
| |
Data Center/Virtualization Architecture Approach | |
| |
| |
Identifying Design Requirements | |
| |
| |
Using the PPDIOO Approach for Networks | |
| |
| |
Benefits of the Lifecycle Approach | |
| |
| |
Design Methodology | |
| |
| |
Identifying Customer Design Requirements | |
| |
| |
Identifying Network Applications and Network Services | |
| |
| |
Defining Organizational Goals | |
| |
| |
Identifying Organizational Constraints | |
| |
| |
Identifying Technical Goals | |
| |
| |
Assessing Technical Constraints | |
| |
| |
Characterizing the Existing Network and Sites | |
| |
| |
Identifying Major Features of the Network | |
| |
| |
Sample Site Contact Information | |
| |
| |
Sample High-Level Network Diagram | |
| |
| |
Auditing the Existing Network | |
| |
| |
Using Tools for Auditing the Network | |
| |
| |
RSPAN with VACLs for Granular Traffic Analysis | |
| |
| |
Analyzing Network Traffic and Applications | |
| |
| |
Using Tools for Analyzing Network Traffic | |
| |
| |
Reviewing Network Traffic Information | |
| |
| |
Analyzing Network Health | |
| |
| |
Creating a Draft Design Document | |
| |
| |
Time Estimates for Performing Network Characterization | |
| |
| |
Using the Top-Down Approach to Network Design | |
| |
| |
Top-Down Approach to Network Design | |
| |
| |
Top-Down Design Example | |
| |
| |
Decision Tables in Network Design | |
| |
| |
Assessing the Scope of the Network Design Project | |
| |
| |
Using Structured Design Principles | |
| |
| |
Logical Structure | |
| |
| |
Physical Structure | |
| |
| |
Network Design Tools | |
| |
| |
Testing the Design | |
| |
| |
Planning an Implementation | |
| |
| |
Documenting the Design | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Structuring and Modularizing the Network | |
| |
| |
Designing the Network Hierarchy | |
| |
| |
Introducing the Hierarchical Network Model | |
| |
| |
Describing Access Layer Functionality | |
| |
| |
Campus Access Layer Connectivity | |
| |
| |
Describing Distribution Layer Functionality | |
| |
| |
Virtual Switches | |
| |
| |
Describing Core Layer Functionality | |
| |
| |
Using a Modular Approach in Network Design | |
| |
| |
Describing the Enterprise Campus Functional Area | |
| |
| |
Enterprise Campus Infrastructure Module | |
| |
| |
Data Center Module | |
| |
| |
Describing the Enterprise Edge Area | |
| |
| |
E-Commerce Module | |
| |
| |
Internet Connectivity Module | |
| |
| |
WAN and MAN and Site-to-Site VPN Module | |
| |
| |
Remote Access and VPN Module | |
| |
| |
Describing the Service Provider Area | |
| |
| |
ISP Module | |
| |
| |
Public Switched Telephone Network Module | |
| |
| |
Frame Relay and ATM Module | |
| |
| |
Describing the Remote Area | |
| |
| |
Enterprise Branch Module | |
| |
| |
Enterprise Data Center Module | |
| |
| |
Enterprise Teleworker Module | |
| |
| |
Supporting Services on Borderless Networks | |
| |
| |
Explaining the Role of Borderless Network Services | |
| |
| |
Mobility Considerations | |
| |
| |
Security Infrastructure Services | |
| |
| |
Designing Security to Protect Against External Threats | |
| |
| |
Application Performance Considerations | |
| |
| |
Resolving Application Issues with Cisco Application Network Services | |
| |
| |
Cisco ANS Components | |
| |
| |
IP Communications | |
| |
| |
Voice Transport | |
| |
| |
High-Availability Network Services | |
| |
| |
Full-Mesh Versus Partial-Mesh Redundancy | |
| |
| |
Identifying Network Management Protocols and Features | |
| |
| |
Network Management Overview | |
| |
| |
SNMP | |
| |
| |
SNMP Message Types | |
| |
| |
SNMP Version 2 | |
| |
| |
SNMP Version 3 | |
| |
| |
MIB Characteristics | |
| |
| |
MIB Variable Retrieval | |
| |
| |
Using RMON | |
| |
| |
NetFlow Characteristics | |
| |
| |
NetFlow Versus RMON Information Gathering | |
| |
| |
Applications Using NetFlow | |
| |
| |
Cisco Discovery Protocol Features | |
| |
| |
Syslog Features | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Designing Basic Campus and Data Center Networks | |
| |
| |
Describing Campus Design Considerations | |
| |
| |
Campus Design Factors | |
| |
| |
Network Application Characteristics and Considerations | |
| |
| |
Peer-Peer Applications | |
| |
| |
Client-Local Server Applications | |
| |
| |
Client-Data Center Applications | |
| |
| |
Client-Enterprise Edge Applications | |
| |
| |
Application Requirements | |
| |
| |
Environmental Characteristics and Considerations | |
| |
| |
Intrabuilding Structure | |
| |
| |
Interbuilding Structure | |
| |
| |
Distant Remote Building Structure | |
| |
| |
Transmission Media Considerations | |
| |
| |
Copper | |
| |
| |
Optical Fiber | |
| |
| |
Wireless | |
| |
| |
Campus Transmission Media Comparison | |
| |
| |
Transmission Media Cabling Example | |
| |
| |
Infrastructure Device Characteristics and Considerations | |
| |
| |
Quality of Service (QoS) | |
| |
| |
Designing the Campus Infrastructure Module | |
| |
| |
Design Considerations for the Campus Network | |
| |
| |
Design Considerations for the Building Access Layer | |
| |
| |
Managing VLANs and STP | |
| |
| |
Managing Trunks Between Switches | |
| |
| |
Managing Default PAgP Settings | |
| |
| |
Consider Implementing Routing in the Building Access Layer | |
| |
| |
Design Considerations for the Building Distribution Layer | |
| |
| |
Best Practices in the Distribution Layer | |
| |
| |
Using First-Hop Redundancy Protocols | |
| |
| |
Deploying Layer 3 Routing Protocols | |
| |
| |
Using the Virtual Switching System at the Distribution Layer | |
| |
| |
Campus Core Design Considerations | |
| |
| |
Small and Medium Campus Design Options | |
| |
| |
Edge Distribution at the Campus Core | |
| |
| |
Describing Enterprise Data Center Considerations | |
| |
| |
Describing the Enterprise Data Center Architectures | |
| |
| |
Cisco Enterprise Data Center Architecture Framework | |
| |
| |
Server Challenges | |
| |
| |
Data Center Facility Aspects | |
| |
| |
Enterprise Data Center Infrastructure | |
| |
| |
Data Center Access Layer | |
| |
| |
Data Center Aggregation Layer | |
| |
| |
Data Center Core Layer | |
| |
| |
Describing Enterprise Network Virtualization Tools | |
| |
| |
Virtualization Challenges | |
| |
| |
What Is Virtualization? | |
| |
| |
Types of Virtualization | |
| |
| |
Virtualization Technologies | |
| |
| |
Network Virtualization Design Considerations | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Designing Remote Connectivity | |
| |
| |
Identifying WAN Technology Considerations | |
| |
| |
Review of WAN Features | |
| |
| |
Comparison of WAN Transport Technologies | |
| |
| |
Time-Division Multiplexing | |
| |
| |
ISDN Connectivity | |
| |
| |
Frame Relay | |
| |
| |
Multiprotocol Label Switching | |
| |
| |
Metro Ethernet | |
| |
| |
DSL Technology | |
| |
| |
Cable Technology | |
| |
| |
Wireless Technology | |
| |
| |
SONET and SDH Technology | |
| |
| |
DWDM Technology | |
| |
| |
Dark Fiber | |
| |
| |
WAN Link Categories | |
| |
| |
WAN Transport Technology Pricing and Contract Considerations | |
| |
| |
WAN Design Requirements | |
| |
| |
Response Time | |
| |
| |
Throughput | |
| |
| |
Packet Loss | |
| |
| |
Reliability | |
| |
| |
QoS Considerations for Bandwidth Constraints | |
| |
| |
Classification | |
| |
| |
Congestion Management | |
| |
| |
Traffic Shaping and Policing | |
| |
| |
Link Efficiency | |
| |
| |
Window Size | |
| |
| |
Designing the Enterprise WAN | |
| |
| |
Traditional WAN Designs | |
| |
| |
Star Topology | |
| |
| |
Fully Meshed Topology | |
| |
| |
Partially Meshed Topology | |
| |
| |
Remote-Access Network Design | |
| |
| |
VPN Design | |
| |
| |
Enterprise Versus Service Provider-Managed VPNs | |
| |
| |
Enterprise Managed VPN: IPsec | |
| |
| |
Service Provider-Managed VPNs: MPLS | |
| |
| |
Service Provider-Managed VPNs: Metro Ethernet | |
| |
| |
Service Provider-Managed VPNs: VPLS | |
| |
| |
WAN Backup Strategy Design | |
| |
| |
Using the Internet as a WAN Backup | |
| |
| |
Selecting the Enterprise WAN Architecture | |
| |
| |
Cisco Enterprise MAN and WAN Architecture | |
| |
| |
Selecting Enterprise WAN Components | |
| |
| |
Hardware Selection | |
| |
| |
Designing the Enterprise Branch | |
| |
| |
Enterprise Branch Architecture | |
| |
| |
Enterprise Branch Design | |
| |
| |
New Features on the ISR G2 Routers | |
| |
| |
Small Branch Office Design | |
| |
| |
Medium Branch Office Design | |
| |
| |
Large Branch Office Design | |
| |
| |
Enterprise Teleworker (Cisco Virtual Office Solution) Design | |
| |
| |
New ISRs for Small Offices and Teleworkers | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Designing IP Addressing | |
| |
| |
Designing IPv4 Addressing | |
| |
| |
IPv4 Addressing | |
| |
| |
Private and Public Addressing Guidelines | |
| |
| |
Recommended Practices for NAT | |
| |
| |
Developing an Addressing Plan | |
| |
| |
Planning the IP Addressing Hierarchy | |
| |
| |
Design Consideration: Route Summarization Groups | |
| |
| |
Address Blocks by Location | |
| |
| |
Hierarchical IP Addressing Plan | |
| |
| |
Recommended Practices for Name Resolution | |
| |
| |
Locating DHCP and DNS Servers in the Network | |
| |
| |
IP Address Space Planning Road Map | |
| |
| |
Designing IPv6 Addressing | |
| |
| |
IPv6 Addressing | |
| |
| |
Benefits of IPv6 Addressing | |
| |
| |
IPv6 Address Types | |
| |
| |
IPv6 Address Assignment Strategies | |
| |
| |
Identifying IPv6 Name Resolution | |
| |
| |
Making the Transition from IPv4 to IPv6 | |
| |
| |
Strategies for IPv6 Deployment | |
| |
| |
Dual-Stack Model | |
| |
| |
Hybrid Model | |
| |
| |
Service Block Model | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Designing and Selecting Routing Protocols | |
| |
| |
Reviewing Enterprise Routing Protocols | |
| |
| |
Reviewing Routing Protocol Fundamentals | |
| |
| |
Differentiating Between Distance Vector and Link-State Routing Protocols | |
| |
| |
Differentiating Between Interior and Exterior Routing Protocols | |
| |
| |
Differentiating Between Hierarchical and Flat Routing Protocols | |
| |
| |
Routing Protocol Convergence | |
| |
| |
Routing Protocols for the Enterprise | |
| |
| |
EIGRP | |
| |
| |
Open Shortest Path First | |
| |
| |
Border Gateway Protocol | |
| |
| |
IPv6 Routing | |
| |
| |
Selecting an Enterprise Routing Protocol | |
| |
| |
When to Choose EIGRP | |
| |
| |
When to Choose OSPF | |
| |
| |
Designing a Routing Protocol Deployment | |
| |
| |
Applying Routing Protocols to a Hierarchical Network Structure | |
| |
| |
Routing in the Campus Core | |
| |
| |
Routing in the Building Distribution Layer | |
| |
| |
Routing in the Enterprise Edge Functional Area | |
| |
| |
Route Redistribution | |
| |
| |
Route Redistribution Planning | |
| |
| |
Remote-Access and VPN and Internet Connectivity Module Route Redistribution | |
| |
| |
Route Filtering | |
| |
| |
Route Filtering and Internet Connectivity | |
| |
| |
Route Summarization | |
| |
| |
Recommended Practice: Summarize at the Distribution Layer | |
| |
| |
Recommended Practice: Passive Interfaces for IGP at the Access Layer | |
| |
| |
IPv6 Route Summarization | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
| |
Evaluating Security Solutions for the Network | |
| |
| |
Defining Network Security | |
| |
| |
Network Security Background | |
| |
| |
Security Legislation | |
| |
| |
Threats and Risks | |
| |
| |
Reconnaissance Attacks | |
| |
| |
Vulnerability Assessment | |
| |
| |
Example Threat: Gaining Unauthorized Access to Systems | |
| |
| |
Example Risk: Loss of Availability | |
| |
| |
Everything Is a Potential Target | |
| |
| |
Understanding Network Security Policy and Processes | |
| |
| |
Definition of a Security Policy | |
| |
| |
Risk Assessment and Management | |
| |
| |
Example: Security Policy | |
| |
| |
Network Security Is a Continuous Process | |
| |
| |
Integrating Security Design and Network Design | |
| |
| |
Understanding the Cisco SAFE Approach | |
| |
| |
Cisco SAFE Architecture | |
| |
| |
The Network as a Platform for Security | |
| |
| |
Cisco Security Control Framework | |
| |
| |
Trust and Identity Management | |
| |
| |
Trust | |
| |
| |
Identity | |
| |
| |
Access Control | |
| |
| |
Trust and Identity Management Technologies | |
| |
| |
Example: Cisco IBNS | |
| |
| |
Example: Firewall Filtering Using ACLs | |
| |
| |
Example: Cisco NAC Appliance | |
| |
| |
Identity and Access Control Deployment Locations | |
| |
| |
Threat Defense | |
| |
| |
Incorporating Physical Security | |
| |
| |
Infrastructure Protection | |
| |
| |
Threat Detection and Mitigation | |
| |
| |
Threat Detection and Mitigation Solutions | |
| |
| |
Example: Cisco IronPort ESA | |
| |
| |
Example: Cisco IronPort WSA | |
| |
| |
Secure Connectivity | |
| |
| |
Encryption Fundamentals | |
| |
| |
VPN Protocols | |
| |
| |
Ensuring Privacy | |
| |
| |
Example: Providing Confidentiality over the Internet | |
| |
| |
Example: Protecting Communication over the Public Infrastructure | |
| |
| |
Example: Network Authentication over a VPN | |
| |
| |
Maintaining Data Integrity | |
| |
| |
Example: VPN Tunneling for Data Integrity | |
| |
| |
Example: Implementation of Digital Signatures | |
| |
| |
Security Management | |
| |
| |
Selecting Network Security Solutions | |
| |
| |
Security Integration in Network Devices | |
| |
| |
Cisco IOS Security | |
| |
| |
Security Appliances | |
| |
| |
Intrusion Prevention System | |
| |
| |
Cisco Catalyst Services Modules | |
| |
| |
Endpoint Security Solutions | |
| |
| |
Securing the Enterprise Network | |
| |
| |
Example: Deploying Identity and Access Control in the Enterprise Campus | |
| |
| |
Example: Deploying Threat Detection and Mitigation in the Enterprise Campus | |
| |
| |
Example: Deploying Infrastructure Protection in the Enterprise Campus | |
| |
| |
Example: Deploying Security in the Enterprise Campus | |
| |
| |
Example: Deploying Identity and Access Control in the Enterprise Data Center | |
| |
| |
Example: Deploying Threat Detection and Mitigation in the Enterprise Data Center | |
| |
| |
Example: Deploying Infrastructure Protection in the Enterprise Data Center | |
| |
| |
Example: Deploying Security in the Data Center | |
| |
| |
Example: Deploying Identity and Access Control in the Enterprise Edge | |
| |
| |
Example: Deploying Threat Detection and Mitigation in the Enterprise Edge | |
| |
| |
Example: Deploying Infrastructure Protection in the Enterprise Edge | |
| |
| |
Example: Deploying Security in the Enterprise Edge | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Identifying Voice and Video Networking Considerations | |
| |
| |
Integrating Voice and Video Architectures | |
| |
| |
Differentiating Between Analog and Digital Signaling | |
| |
| |
Introducing Voice and Video over IP | |
| |
| |
Voice and Video Standards | |
| |
| |
Terminals | |
| |
| |
Gateways | |
| |
| |
Gatekeepers | |
| |
| |
Multipoint Control Units | |
| |
| |
H.264 | |
| |
| |
Introducing VoIP | |
| |
| |
IP Telephony Design Models | |
| |
| |
Introducing Video Considerations | |
| |
| |
Media Application Models | |
| |
| |
Delivery of Media Application | |
| |
| |
Architectural Framework for Media Services | |
| |
| |
Call Control and Transport Protocols | |
| |
| |
Call Control Functions with H.323 | |
| |
| |
Voice Conversation with RTP | |
| |
| |
Call Control Functions with SSCP | |
| |
| |
Call Control Functions with SIP | |
| |
| |
Call Control Functions with MGCP | |
| |
| |
Identifying the Requirements of Voice and Video Technologies | |
| |
| |
Minimizing Delay, Jitter, and Loss | |
| |
| |
One-Way Network Delay Recommendations | |
| |
| |
Propagation Delay | |
| |
| |
Serialization Delay | |
| |
| |
Processing Delay | |
| |
| |
Queuing Delay | |
| |
| |
Dejitter Buffers | |
| |
| |
Packet Loss | |
| |
| |
Preventing Echo | |
| |
| |
Echo Canceller Example | |
| |
| |
Echo Cancellation Guidelines | |
| |
| |
Voice Coding and Compression | |
| |
| |
Codec Complexity, DSPs, and Voice Calls | |
| |
| |
Bandwidth Considerations | |
| |
| |
Reducing Voice Traffic with cRTP | |
| |
| |
Reducing Voice Traffic with VAD | |
| |
| |
Voice Bandwidth Calculation | |
| |
| |
Typical Video Resolution and Bandwidth | |
| |
| |
Using QoS for Voice and Video | |
| |
| |
QoS Considerations for Voice and Video in the WAN | |
| |
| |
Call Rerouting Alternatives | |
| |
| |
Call Admission Control Examples | |
| |
| |
Implementing CAC with RSVP | |
| |
| |
Voice Traffic Engineering Overview | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Identifying Design Considerations for Basic Wireless Networking | |
| |
| |
Cisco Unified Wireless Network Review | |
| |
| |
Cisco Unified Wireless Network Architecture | |
| |
| |
Cisco Unified Wireless Network Elements | |
| |
| |
CAPWAP and LWAPP Fundamentals | |
| |
| |
Split Media Access Control | |
| |
| |
Local Media Access Control | |
| |
| |
Access Point Modes | |
| |
| |
Wireless Infrastructure | |
| |
| |
Wireless Authentication | |
| |
| |
Overview of WLAN Controllers | |
| |
| |
Access Point Support and Scaling | |
| |
| |
Access Point Scalability Considerations | |
| |
| |
Multiple AP Manager Interface Example | |
| |
| |
Link Aggregation (LAG) with a Single AP Manager Interface Example | |
| |
| |
Wireless Network Controller Technology | |
| |
| |
Lightweight Access Point Connectivity to a WLC | |
| |
| |
WLC Selection | |
| |
| |
Lightweight Access Point Operations | |
| |
| |
Mobility in the Cisco Unified Wireless Network | |
| |
| |
Intracontroller Roaming | |
| |
| |
Intercontroller Roaming-Layer 2 | |
| |
| |
Intercontroller Roaming-Layer 3 | |
| |
| |
Mobility Groups | |
| |
| |
Mobility Group Requirement Example | |
| |
| |
Recommended Practices for Supporting Roaming | |
| |
| |
Controller Redundancy Design | |
| |
| |
Deterministic Controller Redundancy | |
| |
| |
Dynamic Controller Redundancy | |
| |
| |
N + 1 Redundancy Design | |
| |
| |
N + N Redundancy Design | |
| |
| |
N + N + 1 Redundancy Design | |
| |
| |
Radio Resource Management (RRM) and RF Groups | |
| |
| |
RF Grouping | |
| |
| |
Access Point Self-Healing | |
| |
| |
Designing Wireless Networks Using Controllers | |
| |
| |
RF Site Survey | |
| |
| |
RF Site Survey Process | |
| |
| |
Design Considerations for Campus Wireless Networks | |
| |
| |
CAPWAP Access Point Feature Summary | |
| |
| |
Controller Placement Design | |
| |
| |
Campus Cisco Wireless LAN Controller Options | |
| |
| |
Design Considerations for Branch Wireless Networks | |
| |
| |
Hybrid REAP | |
| |
| |
Branch Office Cisco Wireless LAN Controller Options | |
| |
| |
Design Considerations for Guest Services in Wireless Networks | |
| |
| |
Design Considerations for Outdoor Wireless Networks | |
| |
| |
Wireless Mesh Components | |
| |
| |
Mesh Design Recommendations | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Review Questions | |
| |
| |
| |
Answers to Review Questions | |
| |
| |
| |
Acronyms and Abbreviations | |