Facebook Twitter Pinterest
  • Alle Preisangaben inkl. MwSt.
Nur noch 2 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Controller-Based Wireless... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von Nearfine
Zustand: Gebraucht: Gut
Kommentar: Gelesene Ausgabe in gutem Zustand. Buch kann Gebrauchsspuren aufweisen oder Bibliotheksstempel enthalten. Lieferung voraussichtlich innerhalb von 2-3 Wochen.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Dieses Bild anzeigen

Controller-Based Wireless LAN Fundamentals: An End-to-End Reference Guide to Design, Deploy, Manage, and Secure 802.11 Wireless Networks (Fundamentals Series) (Englisch) Taschenbuch – 29. Oktober 2010

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 57,70
EUR 54,61 EUR 30,49
10 neu ab EUR 54,61 7 gebraucht ab EUR 30,49
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.




As wired networks are increasingly replaced with wireless connections based on the new 802.11n standard, the enterprise wireless market is shifting to centralized, next-generation architectures that utilize wireless controllers. These networks will run business-critical voice, data, and video applications that formerly required wired Ethernet. In this book, two senior Cisco wireless experts bring together all the practical and conceptual knowledge professionals need to confidently design, configure, deploy, manage, and troubleshoot these advanced wireless networks with Cisco Unified Wireless Network technologies. The authors first introduce the core principles, components, and advantages of next-generation wireless networks built with Cisco technologies. Drawing on their pioneering experience, they present tips, insights, and best practices for network design and implementation, as well as detailed configuration examples. They illuminate key technologies ranging from wireless controllers to LWAPP and CAPWAP, 802.11n, Fixed Mobile Convergence, and WiFi Voice. The authors also show how to take advantage of the Cisco Unified Wireless Network's end-to-end security features; and simplify management by using its automatic configuration, self-healing, and integrated management capabilities. This book will serve as a practical, hands-on reference for the entire project lifecycle, as well as an authoritative comprehensive learning tool for new wireless certification programs.

  • Covers the principles and components of next-generation wireless networks built with Cisco wireless controllers and Cisco 802.11n AP
  • Contains valuable tips, insights, and best practices for designing and implementing next generation networks, direct from Cisco experts with extensive first-hand experience
  • Presents configuration examples for common deployment scenarios

Über den Autor und weitere Mitwirkende

Jeff Smith is a wireless consulting systems engineer in the Cisco Systems Borderless Networking Organization. His 25 years of experience include the planning, analysis, design, implementation, installation, and support of numerous wireless network-based solutions for enterprises, municipalities, hospitals, universities, airports, warehouses, mines, and product manufacturers worldwide. He has developed and instructed dozens of training courses on wireless networking topics. Prior to joining Cisco Systems, Jeff was an early employee at several wireless and security startup companies. Jeff s education includes a bachelor s degree in electrical engineering and a master s degree in telecommunications with emphasis on wireless communications. Jeff s certifications include CWNE (Certified Wireless Network Expert), IEEE WCET (Wireless Communications Engineering Technology Certification), and CISSP (Certified Information Systems Security Professional). Jake Woodhams is a senior manager of technical marketing in the Cisco Wireless Networking Business Unit. In this role, he is responsible for technical product definition and systems architecture, focusing on Cisco Unified Wireless LAN architecture. He hass been working with wireless technology at Cisco for seven years and has an intimate knowledge of the protocols and products in the Cisco wireless portfolio. As a writer, he s the author of numerous white papers and design and deployment guides as well as several contributed articles. Robert Marg is a wireless consulting systems engineer in the Cisco Systems Borderless Networks Organization. As a technical leader in wireless, Robert is responsible for planning, designing, and supporting numerous wireless network based solutions for enterprises, hospitals, universities, manufacturers, and K 12 customers. Prior to his role as a wireless consulting systems engineer, Robert spent time as a member of the federal, public sector, enterprise, and commercial sales organizations as a systems engineer, helping customers solve business challenges with technical solutions. Mr. Marg holds a bachelor s degree in bacteriology from the University of Wisconsin Madison. As a writer, Robert has been the author of numerous white papers and a technical editor for the Cisco Press "CCNA Exam Certification Guide." "


Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: HASH(0x9ff5d1c8) von 5 Sternen 4 Rezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
HASH(0x9ff8a90c) von 5 Sternen Almost entirely worthless 13. Mai 2013
Von Erik R. Carlseen - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
I've been in the IT business for over 20 years and have purchased and read literally hundreds of books on various related subjects during that time. This has got to rank among the absolute worst of them. To begin with, I cannot detect even the slightest touch of an editor to this material. Information is repeated incessantly, often with identical wording, and occasionally on the same page. Sentence structure is often somewhere between awkward and outright ungrammatical, especially in the first few chapters. There are also plenty of typos - traffic glows instead of traffic flows was kind of funny, but it gets old after a bit. It gets to the point where at some points I couldn't figure out if the authors were directly contradicting themselves or simply couldn't crank out a coherent sentence. Thank goodness for Google. Between the deeply annoying repetition and obtuse writing style, the book reads like the authors were pressured to hit some specific length or word count and then just padded the pages until they hit it, randomly bludgeoning the English language as they went. If "data deduplication" were applied to this book, its page count would likely drop from about 300 pages to somewhere around 75.

This would be something one could, with a great deal of patience, look past if the book in fact imparted the knowledge necessary to (as the title implies) design, deploy, manage, and secure 802.11 wireless networks based on Cisco's Wireless Access Controllers. While I'm normally loathe to deliver spoilers in book reviews, I must in this case warn you that at the end the answer is "no." You will certainly know the names of the various pieces of the puzzle (how could you not after all of the repetition?) and have a fairly generic idea of how they will fit together, but as soon as "the rubber hits the road" and something has to actually be specified or assembled, you will be left scratching your head and searching for another piece of documentation. In the age of Google, the only reason to buy a book like this is to get a dense, thorough, and well-organized summation of information on a specific subject. The content, while decently organized, is the opposite of thorough (with the minor exception of the chapter on 802.11n, which wasn't really what I bought the book for), and the only thing that felt dense after reading it was me for shelling out $27.35 for the purchase.

Finally, to add insult to injury, the figures and screen captures in the Kindle edition are of such incredibly low resolution as to be either nearly or completely illegible. Save your money. If you happen to know the authors, please give them dirty looks for me.
HASH(0x9ff9436c) von 5 Sternen better wireless security 9. November 2010
Von W Boudville - Veröffentlicht auf Amazon.com
Format: Taschenbuch
There are several nice features about this book. The first is a chapter that gives a high level explanation of 802.11n, which is the latest and highest bandwidth wireless standard. The chapter refers to some 500 pages of the actual formal standard, but only hard core people in the wireless field will ever directly use the standard. Instead, we see that 802.11n can give 100Mb/s wireless bandwidth. Which is pretty fantastic, compared to the earlier 802.11a/b/g standards. So how is this possible? In short, thru the use of multiple antennas for transmission and receiving. The catchy acronym MIMO summarises this idea. The chapter has several neat diagrams that illustrate the antenna configurations. Typically, the diagrams have boxes that say DSP [digital signal processor], that are hooked to the antennas. As you might expect, even if you are not an electrical engineer, these conceal a vast amount of rapid and complex number crunching. The ongoing march of Moore's Law is what enables the building in silicon of these new DSPs that can handle multiple antennas. The chapter also refers to various antenna parameters that can be tweaked, but does not go into any details.

Perhaps only a few readers will actually need to adjust those parameters. I suspect that the typical network sysadmin does not do much or know much about antenna design. So the chapter's level of discussion is adequate for most readers.

Another chapter looks at Cisco's implementation of wireless LAN security. This is at a more detailed pace than the 802.11n chapter. The algorithms are covered in some depth, and take as their starting point and motivation the inadequacies of Wired Equivalent Privacy [WEP]. (The book cautions you to never use WEP.)

The difference between these 2 chapters is telling. As a network sysadmin, you are far more likely to be involved in maintaining security than optimising bandwidth access. So you need a strong understanding of the overall security mechanisms in Cisco's protocols and hardware. The narrative shows that Cisco has put much effort into making a formidable security apparatus.
HASH(0x9ff92840) von 5 Sternen Five Stars 7. Januar 2015
Von David W. Ellis - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Good fundamentals book.
0 von 4 Kunden fanden die folgende Rezension hilfreich
HASH(0x9ff9257c) von 5 Sternen Excellent wireless reference. 19. Dezember 2011
Von Jason Westlund - Veröffentlicht auf Amazon.com
Format: Taschenbuch
If you have an enterprise wireless network you'll benefit from this book. From spectrum and architecture to more advanced topics this book will will serve as a guide. As a CCIE with 20 years of wireless experience I've seen just how wireless has gone from a someday technology to an everyday requirement for doing business. As iPads and other mobile devices continue to explode and businesses allow bring your own device (BYOD) it's critical that you addressed the wireless fundamentals.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.