Home > Store

Deploying Voice over Wireless LANs

Register your product to gain access to bonus material or receive a coupon.

Deploying Voice over Wireless LANs

eBook (Watermarked)

  • Your Price: $46.39
  • List Price: $57.99
  • About Watermarked eBooks
  • This PDF will be accessible from your Account page after purchase and requires PDF reading software, such as Acrobat® Reader®.

    The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ

Description

  • Copyright 2007
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 1-58714-136-1
  • ISBN-13: 978-1-58714-136-2

Deploying Voice over Wireless LANs

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly wired telephone and video surveillance systems and dramatically reducing support costs. However, today’s new voice over WLAN (VoWLAN) technologies require fundamentally different skills and techniques from those used in traditional voice and video systems. Now, there’s a complete guide to every facet of VoWLAN deployment: planning, design, installation, security, maintenance, and troubleshooting.

Authored by wireless industry expert and leader Jim Geier, Deploying Voice over Wireless LANs draws on Geier’s extensive experience with real-world VoWLAN deployments. Geier brings together state-of-the-art insights into VoWLAN technologies, standards, products, services, implementation strategies, and much more.

Geier begins by introducing key components of today’s VoWLAN systems, including phones, client software, and voice encoders/decoders, as well as VoWLAN signaling essentials such as analog-to-digital (A/D) conversion and compression. Using examples drawn from actual enterprise settings, you’ll learn exactly how VoWLAN products integrate with existing IP infrastructure.

Next, he introduces crucial emerging 802.11 standards for effective VoWLAN deployment, including 802.11e quality of service (QoS) standards, 802.11r to minimize packet loss between access points, and 802.11k network discovery. He carefully reviews the security implications of VoWLAN voice, systematically covering both risks and countermeasures. Finally, Geier walks through implementation from start to finish, thoroughly covering analysis, design, installation, configuration, testing, and support.

Whatever your role in planning, delivering, managing, or creating wireless voice and video solutions, Deploying Voice over Wireless LANs is your most comprehensive, authoritative resource.

Jim Geier founded Wireless-Nets, Ltd., and serves as its principal consultant. His 25 years of experience includes the analysis, design, software development, installation, and support of numerous wireless networking systems. He has been active within the Wi-Fi Alliance and the IEEE 802.11 Working Group and helped develop international standards for WLANs. His books include Wireless Networks First Step (Cisco Press), Wireless LANs (Sams), Wireless Networking Handbook (MTP), and Network Reengineering.

  • Understand VoWLAN components, applications, and benefits
  • See VoWLAN at work in actual enterprise environments
  • Master VoWLAN signaling, including voice signal characteristics, A/D conversion, and compression
  • Discover the latest 802.11 VoWLAN standards, including 802.11e, 802.11r, and 802.11k
  • Secure IP-based VoWLAN systems against intrusion and compromise
  • Analyze your organization’s requirements and design an optimal VoWLAN solution
  • Plan for capacity, roaming, and integration with cellular systems
  • Install, configure, test, verify, and validate your VoWLAN system
  • Plan for operational support and implement appropriate administration tools and methods
  • Includes a complete VoWLAN glossary

Part I Fundamental Elements

Chapter 1 VoWLAN Applications and Benefits

Chapter 2 VoWLAN System Components

Chapter 3 VoWLAN Signaling Fundamentals


Part II Critical Technologies

Chapter 4 Wireless LAN Technologies

Chapter 5 VoWLAN Security Solutions


Part III Implementation Steps

Chapter 6 Analyzing VoWLAN Requirements

Chapter 7 Designing a VoWLAN Solution

Chapter 8 Installing, Configuring, and Testing a VoWLAN System

Chapter 9 Supporting a VoWLAN System

Appendix A Answers to Chapter Review Questions

Glossary



This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Category: Cisco Press–Networking

Covers: Voice over Wireless LAN Solutions

Sample Content

Table of Contents

Part I Fundamental Elements

Chapter 1 VoWLAN Applications and Benefits

The Role of VoWLAN Solutions

History of VoWLANs

    VoIP

    Wireless LANs

Healthcare

Enterprises

Universities

Retail

Warehouses

Manufacturing

Small Offices and Homes

Security Systems

Determining ROI

    Initial Analysis

    Costs

    Savings

    Payback Period

Chapter Summary

Chapter Review Questions

Chapter 2 VoWLAN System Components

VoWLAN System Overview

Cisco 7920 Wireless IP Phone

Cisco IP Softphone

Cisco CallManager

Cisco CallManager Express

Linksys Wi-Fi Video Cameras

Wireless Network Infrastructures

    Traditional Access Point Networks

    Wireless Switched Networks

    Mesh Networks

Chapter Summary

Chapter Review Questions

Chapter 3 VoWLAN Signaling Fundamentals

Voice Attributes

Video Attributes

VoIP Call Flow

    H.323

    Skinny Client Control Protocol (SCCP)

    Session Initiation Protocol (SIP)

Radio Frequency (RF) Signals

    Modulation

    RF Signal Characteristics

    Gain

    Signal-to-Noise Ratio

    Spread Spectrum

    Orthogonal Frequency Division Multiplexing (OFDM)

    FCC Rules

Wireless Impairments

    Poor Signal Coverage

    Latency

    RF Interference

    Limited Capacity

    Multipath

Chapter Summary

Chapter Review Questions

Part II Critical Technologies

Chapter 4 Wireless LAN Technologies

Infrastructure Mode

    Scanning

    Data Transfer

    Roaming

Ad Hoc Mode

Wireless Medium Access

    DCF

    PCF

802.11 Physical Layer Standards

    802.11a

    802.11b

    802.11g

    802.11n

    Comparison of 802.11 Standards

Wireless Configuration Parameters

    SSID

    RF Channels

    Transmit Power

    Data Rates

    Power-Save Mode

    RTS/CTS

    Fragmentation

    RTS/CTS and Fragmentation Summary

Chapter Summary

Chapter Review Questions

Chapter 5 VoWLAN Security Solutions

Security Implications

    Passive Monitoring

    Unauthorized Access

    Denial of Service

Encryption

    WEP

    TKIP

    AES

    WPA

    802.11i

    Virtual Private Networks

Authentication

    Open System Authentication

    Shared Key Authentication

    IEEE 802.1X

    Cisco LEAP

Tips for Enhancing Security

    SSID Broadcasting

    Systems Management

    Access Point Installation

    Rogue Access Points

    Signal Propagation

Chapter Summary

Chapter Review Questions

Part III Implementation Steps

Chapter 6 Analyzing VoWLAN Requirements

Overall Requirements Analysis Steps

Identifying Potential Requirements

    Applications

    Users

    Utilization

    Coverage Areas

    Roaming

    Environment

    Security

    Client Devices

    Existing Systems

    Policies and Preferences

    Budget

    Schedules

Verifying and Validating Requirements

Documenting Requirements

Chapter Summary

Chapter Review Questions

Chapter 7 Designing a VoWLAN Solution

Overall Design Steps

Deployment Models

    Single-Site Architecture

    Multisite WAN with Centralized Call Processing

    Multisite WAN with Distributed Call Processing

Roaming

Security

Network Infrastructure

    Virtual LANs

    Multicasting

    Switch Recommendations

    Quality of Service

Placement of Access Points

    Wireless Capacity Analysis

    RF Site Survey

Document Findings

Chapter Summary

Chapter Review Questions

Chapter 8 Installing, Configuring, and Testing a VoWLAN System

Installing Access Points

    Getting Started

    Mounting Practices

    Antenna Alignment

    Electrical Power Distribution

Configuring Access Points

    Configuration Setting Access

    Firmware

    VLANs

    SSID

    Transmit Power

    RF Channel

    Data Rates

    Filtering

    Protection Mechanisms

Installing and Configuring Cisco CallManager Software

    Cisco CallManager Software Installation

    System Parameters

    Subscriber Setup

    Device Mobility Issues

Configuring Wireless IP Phones

    Firmware

    Network Settings

    RF Settings

    Phone Settings

Verifying System Operation

    Association Tests

    Authentication Tests

    Registration Tests

    Phone Call Tests

    Load Tests

    Follow-up Tests

    Battery Life Issues

Chapter Summary

Chapter Review Questions

Chapter 9 Supporting a VoWLAN System

Configuration Management

    RF Channel Changes

    Transmit Power Changes

    New Applications

    Signal Coverage

    Firmware Version

    Security Improvement

Network Monitoring

    Performance Monitoring

    Coverage Monitoring

    Configuration Monitoring

    Security Policy Management

Security Assessment Steps

    Review Existing Security Policies

    Review the System Architecture

    Review Operational Support Tools and Procedures

    Interview Users

    Verify Configurations of Wireless Devices

    Investigate Physical Installations of Access Points

    Identify Rogue Access Points

    Perform Penetration Tests

    Analyze Security Gaps

    Recommend Improvements

Maintenance Functions

    Inoperative Access Points

    Poor Performance

    Poor Signal Coverage

    Broken Hardware

    Keep Firmware Up to Date

    Monitor Performance

    Verify Coverage

    Inspect Access Points

Engineering Functions

    Advanced Problem Resolution

    Coverage Expansion

    Capacity Increases

    Firmware Review

    Technology Upgrade

    Design Review

Help Desk Planning

    Connection Problems

    Poor Signal Coverage

    Poor Performance

    System Status

    Additional Considerations

CiscoWorks Wireless LAN Solution Engine

    Automatic Access Point Configuration

    Assisted Site Surveys

    Centralized Firmware Updates

    Dynamic Grouping

    VLAN Configuration

    Multiple SSID Support

    Customizable Thresholds

    Fault Status

    Intrusion Detection System

    Security Policy Monitoring

    Secure User Interface

    Air/RF Scanning and Monitoring

    Self-healing Functions

    Reporting, Trending, Planning, and Troubleshooting

Chapter Summary

Chapter Review Questions

Appendix A Answers to Chapter Review Questions

Glossary

1587052318    TOC    2/12/2007

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020