Not a member?     Existing members login below:

Building Wireless Community Networks

Building Wireless Community Networks
TABLE OF CONTENTS
Preface .................................................................................................................................... 4
Audience ............................................................................................................................. 4
Organization........................................................................................................................ 4
Typographical Conventions ................................................................................................ 5
Acknowledgments............................................................................................................... 6
Chapter 1. Wireless Community Networks........................................................................ 7
1.1 The Problem .................................................................................................................. 8
1.2 How ISPs Are Attempting a Solution........................................................................... 9
1.3 How Cooperatives Are Making It Happen ................................................................. 10
1.4 About This Book......................................................................................................... 11
Chapter 2. Defining Project Scope .................................................................................... 12
2.1 Hardware Requirements.............................................................................................. 13
2.2 Hot Spots.....................................................................................................................14
2.3 Potential Coverage Problem Areas ............................................................................. 15
2.4 Topographical Mapping 101....................................................................................... 16
Chapter 3. Network Layout ............................................................................................... 17
3.1 Wireless Infrastructure: Cathedral Versus Bazaar...................................................... 17
3.2 Vital Services ..............................................................................................................20
3.3 Security Considerations .............................................................................................. 24
3.4 Summary .....................................................................................................................28
Chapter 4. Using Access Points.......................................................................................... 28
4.1 Access Point Caveats .................................................................................................. 30
4.2 The Apple AirPort Base Station ................................................................................. 31
Chapter 5. Peer-to-Peer (Ad-Hoc) Networking ............................................................... 37
5.1 Building a Wireless Gateway with Linux................................................................... 37
Chapter 6. Wide Area Network Saturation...................................................................... 50
6.1 Topo Maps 102: Dealing with Geographical Diversity..............................................51
6.2 Antenna Characteristics and Placement...................................................................... 54
6.3 Power Amps and the Law ........................................................................................... 66
Chapter 7. Other Applications........................................................................................... 67
7.1 Point-to-Point Links.................................................................................................... 68
7.2 The Pringles Can ......................................................................................................... 69
7.3 Redundant Links ......................................................................................................... 74
7.4 Repeaters .....................................................................................................................75
7.5 Security Concerns ....................................................................................................... 78
7.6 Captive "Catch and Release" Portal............................................................................ 79
7.7 In Closing ....................................................................................................................82
Page 2
Remove