In this chapter, we looked at the various IEEE 802.11 standards pertaining to wireless technologies, including their various attributes and access methods. We discussed factors that would influence our planning of wireless networks, and the two modes available, ad hoc and infrastructure mode. We talked about the configuration of these networks, before moving onto security, emphasizing the main methods for protecting our data.
From this chapter, you will have gained the ability to deploy a basic wireless network, ensuring that you have considered factors that would impact the performance of the network. You also learned how to configure a wireless access point with appropriate security settings for your environment.
In the next chapter, we will look at the various network topologies available to us. We will describe the use cases and highlight the pros and cons of each...