New wireless book trio from Cisco


Three separate books give readers insights on the practical application of the wireless spectrum—from site surveys through networking and security.

802.11 Wireless Network Site Surveying and Installation

Performing a wireless LAN (WLAN) site survey before installing a wireless network is key in a successful WLAN deployment. Each location and company have unique needs that must be taken into account. The book delineates challenges of site surveys, including multipath mitigation, reflection, absorption, and radio wave interference, plus the added complexity of user and application demands. The guide addresses site survey components:

  • Architecture of access points, cable routes, and electrical needs;

  • Proper survey technique and usage of appropriate utilities;

  • Structural and installation obstacles, including building construction, transmission coverage area, building contents, present cable configuration, area regulations, and building codes; and

  • Documentation outlines necessary parts and equipment, and diagrams exhibiting the proper placement of the equipment

The author: Bruce Alexander, a technical marketing manager for Cisco Systems’ Wireless Networking Business Unit, has worked in the RF technology area for over 30 years and has been involved with RF WLAN technology over the past 18 years.

Cisco 802.11 Wireless Networking Quick Reference

Users want the most out of wireless gear, but memorizing every product and protocol is daunting given a myriad of solutions and options. The book is, a time-saver for the office, field, or classroom—a memory-refresher or a quick-tip guide on maximizing a wireless network. Divided into three easy-to-follow sections, Part I describes and provides ways for Cisco wireless LAN (WLAN) equipment offerings to be integrated into an existing network. Part II covers configuring access points and clients and setting up and managing a secure wireless network. Lastly, Part III shows how to maintain a wireless network and troubleshoot common wireless issues. Meant to be used in a hands-on fashion, this transportable guide is a practical tool when performing a variety of tasks on your wireless network. The author:

  • Toby J. Velte, Ph.D., MCSE+I, CCN, CCD, is associated with Accenture's North American Consumer and Industrial practice.

  • Anthony T. Velte, CISSP, an information systems security expert, leads a multitude of network, security, and disaster-recovery initiatives for large banking and healthcare institutions..

Cisco Wireless LAN Security

The book is an in-depth guide to wireless LAN technology and security, introducing key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect an entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security.

It covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a combination of theory and practice, it addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. Also included are generic wireless deployment-patterns based on real-world customer installations and functional examples of architecture, design, and best practices.

The authors:

  • Krishna Sankar, an engineer at Cisco Systems', Inc., has held positions in software architecture and development and industrial engineering for 20 years.

  • Sri Sundaralingam, a technical marketing manager in the Wireless Networking Business Unit at Cisco Systems, has extensive customer contact and is responsible for developing and marketing enterprise and carrier networking solutions using the Cisco Aironet' Series of wireless LAN products.

  • Andrew Balinsky, a network security test engineer at Cisco Systems, had his introduction to computer security was through the Air Force Information Warfare Center, where his involvement ranged from tracking hackers to developing security software.

  • Darrin Miller, a security researcher at Cisco Systems, has been in the networking industry for over 15 years, authoring several white papers on network security.

For more information visit:

Richard Phelps , senior editor, Control Engineering

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me