Enterprise wireless local area network architectures and technologies / Rihai Wu [et al.]

Author
Wu, Rihai [Browse]
Format
Book
Language
English
Εdition
First edition.
Published/​Created
Boca Raton, FL : CRC Press, 2021.
Description
1 online resource (446 pages) : illustrations (black and white)

Details

Subject(s)
Series
Data Communication. [More in this series]
Summary note
"This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. The book first covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment. This is a practical and easy-to-understand guide to WLAN design, and is written for WLAN technical support and planning engineers, network administrators, and enthusiasts of network technology"-- Provided by publisher.
Source of description
Description based on print version record.
Contents
  • Cover
  • Half Title
  • Series Page
  • Title Page
  • Copyright Page
  • Table of Contents
  • Summary
  • Introduction
  • Acknowledgments
  • Authors
  • Chapter 1 Enterprise WLAN Overview
  • 1.1 HISTORY OF ENTERPRISE WLAN DEVELOPMENT
  • 1.1.1 Phase 1: Initial Mobile Office Era - Wireless Networks As a Supplement to Wired Networks
  • 1.1.2 Phase 2: Wireless Office Era - Integration of Wired and Wireless Networks
  • 1.1.3 Phase 3: All-Wireless Office Era - All-Wireless Office, Wireless-Centric
  • 1.2 CHALLENGES FACED BY ENTERPRISE WLANS
  • 1.2.1 WLAN Services Require Ultra-Large Bandwidth
  • 1.2.2 Wi-Fi Technology Bottlenecks Affect User Experiences
  • 1.2.3 The Security of WLAN Services Is Questioned
  • 1.2.4 The Growth of Network Devices Leads to More Complex Planning, Deployment, and Maintenance
  • 1.2.5 Challenges Regarding WLAN and IoT Convergence
  • 1.3 NEXT-GENERATION ENTERPRISE WLAN SOLUTIONS
  • 1.3.1 Support for 802.11ax to Meet Ultra-High Bandwidth Requirements
  • 1.3.2 Innovative Wireless Air Interface Technology, Providing Excellent User Experience
  • 1.3.3 Integrated Security Technologies to Enable Comprehensive Wireless Protection
  • 1.3.4 Scenario-Based Network Planning, Deployment, and Maintenance
  • 1.3.5 WLAN and IoT Convergence Solution
  • Chapter 2 WLAN Technology Basics
  • 2.1 CONCEPT OF WIRELESS COMMUNICATION
  • 2.1.1 Radio Waves
  • 2.1.2 Wireless Communications System
  • 2.1.2.1 Source Coding
  • 2.1.2.2 Channel Coding
  • 2.1.2.3 Modulation
  • 2.1.2.4 Channel
  • 2.1.3 Channel Rate and Bandwidth
  • 2.2 WLAN KEY TECHNOLOGIES
  • 2.2.1 Modulation Technology
  • 2.2.2 OFDM
  • 2.2.2.1 Principles
  • 2.2.2.2 Advantages and Disadvantages
  • 2.2.2.3 Applications
  • 2.2.3 Channel Bonding
  • 2.2.4 MIMO
  • 2.2.4.1 Basic Concepts
  • 2.2.4.2 Relationship between Spatial Streams and the Number of Antennas
  • 2.2.4.3 Beamforming
  • 2.2.4.4 MU-MIMO.
  • 2.2.5 OFDMA
  • 2.2.6 CSMA/CA
  • 2.2.6.1 CS
  • 2.2.6.2 IFS
  • 2.2.6.3 RB
  • 2.3 802.11 STANDARDS
  • 2.3.1 Origin (802.11-1997)
  • 2.3.2 Enhancement (802.11b and 802.11 a)
  • 2.3.3 Standard Extension and Compatibility (802.11g)
  • 2.3.4 MIMO-OFDM-Based HT (802.11n)
  • 2.3.5 VHT (802.11ac)
  • 2.3.6 HEW (802.11ax)
  • 2.3.7 Comparisons between 802.11 Standards
  • 2.4 802.11AX STANDARDS
  • 2.4.1 802.11ax Overview
  • 2.4.1.1 Physical-Layer Technology of 802.11ax
  • 2.4.1.2 MAC-Layer Technology of 802.11ax
  • 2.4.2 High Efficiency PPDU
  • 2.4.2.1 Pre-HE Modulated Fields
  • 2.4.2.2 HE Modulated Fields
  • 2.4.3 Throughput Improvement
  • 2.4.3.1 High-Order Modulation Scheme
  • 2.4.3.2 OFDM Subcarrier Division
  • 2.4.3.3 Preamble Puncturing
  • 2.4.4 Novel Multiuser Features
  • 2.4.4.1 Introduction to Multiuser Features
  • 2.4.4.2 Multiuser Transmission
  • 2.4.4.3 BSR
  • 2.4.4.4 Fragment Transmission and A-MPDU Enhancement
  • 2.4.4.5 Channel Measurement
  • 2.4.4.6 Channel Protection
  • 2.4.4.7 MU EDCA
  • 2.4.4.8 OFDMA-Based Random Access
  • 2.4.4.9 NDP Feedback
  • 2.4.5 Anti-interference and Spatial Reuse
  • 2.4.5.1 OBSS-PD-Based Spatial Reuse
  • 2.4.5.2 SRP-Based Spatial Reuse
  • 2.4.5.3 Two NAVs
  • 2.4.6 Energy Saving
  • 2.4.6.1 TWT
  • 2.4.6.2 OMI
  • 2.4.6.3 20 MHz-Only STAs
  • 2.4.6.4 Others
  • 2.5 802.11AX PERFORMANCE EVALUATION
  • 2.5.1 Impact of Different Transmission Modes on Uplink Throughput
  • 2.5.2 Test on Uplink Throughput Improvement Using the AP Scheduling Algorithms
  • 2.5.3 Test on Throughput Improvement Using Various Technologies
  • 2.6 802.11AX STANDARD ACCELERATES INDUSTRY DEVELOPMENT
  • 2.6.1 Enterprise Offices
  • 2.6.2 Education
  • 2.6.3 Healthcare
  • 2.6.4 Finance
  • 2.6.5 Airports
  • 2.6.6 Manufacturing
  • 2.6.7 Next-Generation Wi-Fi
  • Chapter 3 Air Interface Performance and User Experience Improvement.
  • 3.1 KEY FACTORS AFFECTING WLAN PERFORMANCE
  • 3.1.1 Usable Bandwidth Per User Decreases
  • 3.1.2 User Collision Is Unavoidable
  • 3.1.3 Hidden Nodes Cause Failures in the CSMA/CA Mechanism
  • 3.2 OPTIMIZATION METHODS FOR WLAN PERFORMANCE
  • 3.2.1 Radio Calibration
  • 3.2.2 STA Roaming and Scheduling
  • 3.2.3 Anti-interference Technology
  • 3.2.4 Air-Interface QoS
  • 3.2.5 Antenna Technology
  • 3.3 RADIO CALIBRATION
  • 3.3.1 Technological Background
  • 3.3.2 Automatic Radio Calibration Techno logy
  • 3.3.2.1 Obtaining Network Status Information
  • 3.3.2.2 Automatic Transmit Power Control
  • 3.3.2.3 Automatic Band Adjustment
  • 3.3.2.4 Automatic Adjustment of Channels and Bandwidth
  • 3.3.3 Applications and Benefits
  • 3.3.3.1 Manual Radio Calibration
  • 3.3.3.2 Scheduled Radio Calibration
  • 3.3.3.3 Event-Triggered Radio Calibration
  • 3.4 STA ROAMING AND SCHEDULING
  • 3.4.1 Roaming Overview
  • 3.4.1.1 Technological Background
  • 3.4.1.2 Fast Roaming Principles
  • 3.4.1.3 Principles of 802.11k Assisted Roaming
  • 3.4.2 Smart Roaming
  • 3.4.2.1 Principles of Smart Roaming
  • 3.4.2.2 Applications of Smart Roaming
  • 3.4.3 Band Steering
  • 3.4.3.1 Technological Background
  • 3.4.3.2 Band Steering Principles
  • 3.4.3.3 Applications of Band Steering
  • 3.4.4 Load Balancing
  • 3.4.4.1 Technological Background
  • 3.4.4.2 Load Balancing Principles
  • 3.4.4.3 Applications of Load Balancing
  • 3.5 ANTI-INTERFERENCE TECHNOLOGY
  • 3.5.1 Spectrum Analysis
  • 3.5.1.1 Technological Background
  • 3.5.1.2 Huawei's Spectrum Analysis Principles
  • 3.5.1.3 Applications of Spectrum Analysis
  • 3.5.2 Clear Channel Assessment
  • 3.5.2.1 Technological Background
  • 3.5.2.2 Working Principles
  • 3.5.2.3 Applications of CCA
  • 3.5.3 Request To Send/Clear to Send
  • 3.5.3.1 Technological Background
  • 3.5.3.2 Working Principles
  • 3.5.3.3 Applications of RTS/CTS.
  • 3.5.4 AMC Algorithm
  • 3.5.4.1 Background
  • 3.5.4.2 Principles
  • 3.5.4.3 Applications
  • 3.6 AIR INTERFACE QOS
  • 3.6.1 Dynamic EDCA
  • 3.6.1.1 Technological Background
  • 3.6.1.2 Principles of Huawei's Dynamic EDCA
  • 3.6.1.3 Applications and Benefits of Dynamic EDCA
  • 3.6.2 Voice and Video Packet Identification
  • 3.6.2.1 Technological Background
  • 3.6.2.2 Technological Principles
  • 3.6.2.3 Applications and Benefits
  • 3.6.3 Airtime Scheduling
  • 3.6.3.1 Technological Background
  • 3.6.3.2 Technological Principles
  • 3.6.3.3 Applications and Benefits
  • 3.7 ANTENNA TECHNOLOGIES
  • 3.7.1 Types and Main Specifications
  • 3.7.1.1 Antenna Types
  • 3.7.1.2 Main Specifications
  • 3.7.2 Smart Antenna Technologies
  • 3.7.2.1 Principles
  • 3.7.2.2 Beam Selection
  • 3.7.2.3 Applications of Smart Antennas
  • 3.7.3 High-Density Antenna Technologies
  • 3.8 AI-POWERED IMPROVEMENT IN RADIO PERFORMANCE
  • Chapter 4 WLAN Security and Defense
  • 4.1 WLAN SECURITY THREATS
  • 4.2 WLAN SECURITY MECHANISMS
  • 4.2.1 Common WLAN Access Authentication Modes
  • 4.2.1.1 WEP
  • 4.2.1.2 WPA/WPA2
  • 4.2.1.3 WPA3
  • 4.2.1.4 WAPI
  • 4.2.2 WLAN User Authentication Modes
  • 4.2.3 Wireless Attack Detection and Countermeasure
  • 4.2.3.1 Basic Concepts
  • 4.2.3.2 WIDS
  • 4.2.3.3 Rogue Device Containment
  • Chapter 5 WLAN and IoT Convergence
  • 5.1 WIRELESS IoT TECHNOLOGIES
  • 5.1.1 Overview of Wireless IoT Technologies
  • 5.1.2 Multinetwork Convergence of Wireless Communications Technologies
  • 5.2 APPLICATION SCENARIOS OF IoT APS
  • 5.2.1 Enterprise IoT
  • 5.2.2 Internet of Medical Things (IoMT)
  • 5.2.3 Shopping Mall and Supermarket IoT
  • Chapter 6 WLAN Positioning Technologies
  • 6.1 DEVELOPMENT BACKGROUND OF WIRELESS POSITIONING TECHNOLOGIES
  • 6.2 TECHNICAL PRINCIPLES OF WIRELESS POSITIONING
  • 6.2.1 RF Pattern Matching
  • 6.2.1.1 RSSI-Based RF Pattern Matching.
  • 6.2.1.2 CSI-Based RF Pattern Matching
  • 6.2.2 Geometric Positioning
  • 6.2.2.1 Propagation Distance Measurement
  • 6.2.2.2 AoA Measurement
  • 6.2.2.3 Trilateration
  • 6.2.2.4 Triangulation
  • 6.2.2.5 Hyperbolic Localization
  • 6.3 SHORT-RANGE WIRELESS POSITIONING TECHNOLOGY IMPLEMENTATION METHODS
  • 6.3.1 Application of Indoor Positioning Technologies in Short-Range Wireless Communications Systems
  • 6.3.1.1 Wi-Fi
  • 6.3.1.2 Bluetooth
  • 6.3.1.3 UWB
  • 6.3.2 Evaluation Counters of Indoor Positioning Solutions
  • 6.3.2.1 Precision
  • 6.3.2.2 Power Consumption
  • 6.3.2.3 Cost
  • 6.3.3 Comparison of Short-Range Wireless Positioning Solutions
  • 6.4 REQUIREMENT-BASED POSITIONING SYSTEM DESIGN
  • 6.4.1 Introduction to Positioning Systems
  • 6.4.2 Network-Side Positioning Solutions
  • 6.4.3 Terminal-Side Positioning Solutions
  • Chapter 7 Enterprise WLAN Networking Design
  • 7.1 WLAN COMPOSITION
  • 7.1.1 Basic Units of a WLAN
  • 7.1.2 Distribution System
  • 7.2 WLAN NETWORKING ARCHITECTURE
  • 7.2.1 Fat AP Architecture
  • 7.2.2 WAC+Fit AP Architecture
  • 7.2.2.1 Networking Mode
  • 7.2.2.2 Data Forwarding Mode
  • 7.2.2.3 VLAN Planning
  • 7.2.2.4 IP Address Planning
  • 7.2.2.5 Comparison of Typical WAC+Fit AP Networking Modes
  • 7.2.2.6 WAC Backup
  • 7.2.2.7 Inter-WAC Roaming
  • 7.2.2.8 Navi WAC
  • 7.2.3 Cloud Management Architecture
  • 7.2.4 Leader AP Architecture
  • 7.2.5 Agile Distributed Architecture
  • 7.2.6 Development of Next-Generation Networking Architecture
  • 7.2.6.1 Network Layer
  • 7.2.6.2 Management Layer
  • 7.2.6.3 Application Layer
  • 7.2.6.4 WLAN for Intent-Driven Campus
  • 7.3 TYPICAL WLAN NETWORKING SOLUTIONS
  • 7.3.1 Networking Solutions for Large Campuses
  • 7.3.1.1 Independent WAC Solution
  • 7.3.1.2 Native WAC Solution
  • 7.3.2 Enterprise Branch Networking Solution
  • 7.3.2.1 Large-Sized Enterprise Branch WLAN Networking.
  • 7.3.2.2 Small-Sized Branch WLAN Networking.
ISBN
  • 1-00-314365-2
  • 1-003-14365-2
  • 1-000-37944-2
  • 1-000-37945-0
OCLC
  • 1240582288
  • 1221017203
Statement on responsible collection description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view