New wireless book trio from Cisco


Three separate books give readers insights on the practical application of the wireless spectrum—from site surveys through networking and security.

802.11 Wireless Network Site Surveying and Installation

Performing a wireless LAN (WLAN) site survey before installing a wireless network is key in a successful WLAN deployment. Each location and company have unique needs that must be taken into account. The book delineates challenges of site surveys, including multipath mitigation, reflection, absorption, and radio wave interference, plus the added complexity of user and application demands. The guide addresses site survey components:

  • Architecture of access points, cable routes, and electrical needs;

  • Proper survey technique and usage of appropriate utilities;

  • Structural and installation obstacles, including building construction, transmission coverage area, building contents, present cable configuration, area regulations, and building codes; and

  • Documentation outlines necessary parts and equipment, and diagrams exhibiting the proper placement of the equipment

The author: Bruce Alexander, a technical marketing manager for Cisco Systems’ Wireless Networking Business Unit, has worked in the RF technology area for over 30 years and has been involved with RF WLAN technology over the past 18 years.

Cisco 802.11 Wireless Networking Quick Reference

Users want the most out of wireless gear, but memorizing every product and protocol is daunting given a myriad of solutions and options. The book is, a time-saver for the office, field, or classroom—a memory-refresher or a quick-tip guide on maximizing a wireless network. Divided into three easy-to-follow sections, Part I describes and provides ways for Cisco wireless LAN (WLAN) equipment offerings to be integrated into an existing network. Part II covers configuring access points and clients and setting up and managing a secure wireless network. Lastly, Part III shows how to maintain a wireless network and troubleshoot common wireless issues. Meant to be used in a hands-on fashion, this transportable guide is a practical tool when performing a variety of tasks on your wireless network. The author:

  • Toby J. Velte, Ph.D., MCSE+I, CCN, CCD, is associated with Accenture's North American Consumer and Industrial practice.

  • Anthony T. Velte, CISSP, an information systems security expert, leads a multitude of network, security, and disaster-recovery initiatives for large banking and healthcare institutions..

Cisco Wireless LAN Security

The book is an in-depth guide to wireless LAN technology and security, introducing key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect an entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security.

It covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a combination of theory and practice, it addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. Also included are generic wireless deployment-patterns based on real-world customer installations and functional examples of architecture, design, and best practices.

The authors:

  • Krishna Sankar, an engineer at Cisco Systems', Inc., has held positions in software architecture and development and industrial engineering for 20 years.

  • Sri Sundaralingam, a technical marketing manager in the Wireless Networking Business Unit at Cisco Systems, has extensive customer contact and is responsible for developing and marketing enterprise and carrier networking solutions using the Cisco Aironet' Series of wireless LAN products.

  • Andrew Balinsky, a network security test engineer at Cisco Systems, had his introduction to computer security was through the Air Force Information Warfare Center, where his involvement ranged from tracking hackers to developing security software.

  • Darrin Miller, a security researcher at Cisco Systems, has been in the networking industry for over 15 years, authoring several white papers on network security.

For more information visit:

Richard Phelps , senior editor, Control Engineering

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security