You are here: IT-Observer » Articles » Reviews RSS | White Papers |   

Building Wireless Community Networks 2/e





Nowadays, with Wireless enabled computers almost as common as Ethernet, it makes sense to more people and organizations to make the next step and connect their networks using wireless technology. If you or your community is planning to get online using wireless network technology, Flickenger’s book “Building Wireless Community Networks” is exactly where you need to start.

Author: Rob Flickenger
Pages: 182
Publisher: O'Reilly & Associates
ISBN: 4



Available for download sample chapter number 3 - "Network Layout".


About the author

Rob Flickenger has been hacking as long as he can remember. He is the author of two other books: Linux Server Hacks and Building Wireless Community Networks 2/e. He is currently working on prompting community wireless networking through efforts like NoCat (http://nocat.net) and Seattle Wireless (http://seattlewireless.net)

The Book

The opening chapters of the book introduce the reader to the basic wireless concepts and essential wireless services, which are relevant to the subject of the book. Later chapters focus on specific aspects of building, owning and maintaining a wireless network.

The book is organized in a way that allows experienced reader to skip around rather than reading chapter by chapter.

As stated above, the first three chapters provide the intro to wireless concepts.

The first chapter describes the idea and the history behind wireless connectivity and the problems it raises.

Chapter two provides brief information on the 802.11 family, wireless network design considerations, hardware components, physical properties of radio signals and 802.11b channel overlapping.

Next, the author provides a detailed description of critical network components and services and talks about security considerations such as encryption, authentication, firewalls and tunnels.

In the next chapter, Flickenger deals with wireless access points and particularly focuses on the popular Apple AirPort. In this chapter, the readers learn how to tweak their own access point from Linux, how to configure an access point to act as a transparent bridge to a wired network and other various things.

In continuation to chapter four, Wireless access points, in chapter five, the author gives a good introduction on how to turn an old computer to a wireless access point and setup DHCP and masquerading services.

Chapters six through nine provide a wealth of information on various exotic - the term used by Flickenger – 802.11b applications, repeaters, antennas, cables, the correct placement of antennas and a nice guide with instructions and photos that explains how to make your own antenna. In the question of authentication, the author provides a partial answer in the form of introduction to NoCatAuth authentication system.

My Opinion

The combination of Rob Flickenger’s enthusiasm on the Wireless technology and vast hands-on experience makes this thin but information-dense book essential to anyone who’s looking for his ticket into wireless-based networks, no matter if he is an experienced or a newbie user.



GFI LANguard Network Security Scanner - Is your network open to attack? Find out with the #1 sold network security scanner: GFI LANguard Network Security Scanner! Download your FREE trial version today.

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

GFI LANguard N.S.S. NEW v8 out now!
Complete network vulnerability management, providing powerful vulnerability scanning, patch management and auditing solution. DOWNLOAD A 30-DAY TRIAL TODAY!

 

Latest News

eEye released integer overflow auditing tool
16.02.07  Vulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.

AES Password Manager 2.3 released
16.02.07  AES software has announced the availability of AES Password Manager 2,3, the latest version of their password management application that allows users automatically access password-protected web sites and email accounts.

IBM safeguards against Microsoft vulnerabilities
16.02.07  IBM’s security division, Internet Security Systems, offers protection from several critical vulnerabilities announced by Microsoft.

Firefox cookie-stealing vulnerability
15.02.07  A new zero-day vulnerability in Mozilla Firefox allows malicious web sites to forge authentication cookies for certain web sites.

Valentine’s Day: a powerful lure for spreading malware
09.02.07  As Valentine´s Day approaches, users should keep a wary eye on any romantic messages received by email, as many of them could contain malicious code.

Skype reads out your BIOS data
09.02.07  The Windows version of the Voice-over-IP software Skype reads and stores the BIOS and motherboard serial number of a user’s computer.

Utimaco SafeGuard Enterprise supports BitLocker
09.02.07  Utimaco has announced that its SafeGuard Enterprise now supports Windows Vista BitLocker drive encryption.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter