Wireless Guest Services

This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Linton, Jon, Zemke, Bob, McDonald II, Douglas, Earle, Aaron, Youssef, Ali
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 143
container_issue
container_start_page 129
container_title
container_volume
creator Linton, Jon
Zemke, Bob
McDonald II, Douglas
Earle, Aaron
Youssef, Ali
description This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.
doi_str_mv 10.1201/b16580-5
format Book Chapter
fullrecord <record><control><sourceid>proquest_infor</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_7245680_126_148</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC1582416_126_148</sourcerecordid><originalsourceid>FETCH-LOGICAL-i266t-27e2f81e5b4bb72c96cc986578705b91e62273764b8886064fccffc81baa02e33</originalsourceid><addsrcrecordid>eNqNkEFLAzEQhSOiWGvBm9f-gdWZbDKb3JSiVSh4UPEYkpjF4LqpyVrx37ulHjx6Gt7h-95jGDtFOEcOeOGQpIJK7rFjBACOGhXtj0EQSQIBeMgmijQJkKiP2KyU6ECg4JoIJ-zsOebQhVLmy89QhvlDyJvoQzlhB63tSpj93il7url-XNxWq_vl3eJqVUVONFS8CbxVGKQTzjXca_JeK5KNakA6jYE4b-qGhFNKEZBovW9br9BZCzzU9ZSJnXed08d2gQkupTcf-iHbzr_a9RByMQ0XkhQY5GRQqP9iKBUXSH-wyx0W-zbld_uVcvdiBvvdpdxm2_tYtpoR3FYBmt17jTSbURdTz-sfdndsVw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC1582416_126_148</pqid></control><display><type>book_chapter</type><title>Wireless Guest Services</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><source>Taylor &amp; Francis eBooks Open Access</source><creator>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</creator><creatorcontrib>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</creatorcontrib><description>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</description><edition>1</edition><identifier>ISBN: 1466560401</identifier><identifier>ISBN: 9781466560406</identifier><identifier>EISBN: 1000219186</identifier><identifier>EISBN: 1000218708</identifier><identifier>EISBN: 9781466560413</identifier><identifier>EISBN: 146656041X</identifier><identifier>EISBN: 9780429087394</identifier><identifier>EISBN: 9781000218701</identifier><identifier>EISBN: 9781000219180</identifier><identifier>EISBN: 042908739X</identifier><identifier>DOI: 10.1201/b16580-5</identifier><identifier>OCLC: 869640519</identifier><identifier>OCLC: 872619775</identifier><identifier>LCCallNum: R119.95.W545 2014eb</identifier><language>eng</language><publisher>United States: CRC Press</publisher><subject>COMPUTER COMMUNICATIONS &amp; NETWORKING ; Health systems &amp; services ; WAP (wireless) technology</subject><ispartof>Wi-Fi Enabled Healthcare, 2014, p.129-143</ispartof><rights>2014 by Taylor &amp; Francis Group, LLC</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/1582416-l.jpg</thumbnail><link.rule.ids>779,780,784,793,27925</link.rule.ids></links><search><creatorcontrib>Linton, Jon</creatorcontrib><creatorcontrib>Zemke, Bob</creatorcontrib><creatorcontrib>McDonald II, Douglas</creatorcontrib><creatorcontrib>Earle, Aaron</creatorcontrib><creatorcontrib>Youssef, Ali</creatorcontrib><title>Wireless Guest Services</title><title>Wi-Fi Enabled Healthcare</title><description>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</description><subject>COMPUTER COMMUNICATIONS &amp; NETWORKING</subject><subject>Health systems &amp; services</subject><subject>WAP (wireless) technology</subject><isbn>1466560401</isbn><isbn>9781466560406</isbn><isbn>1000219186</isbn><isbn>1000218708</isbn><isbn>9781466560413</isbn><isbn>146656041X</isbn><isbn>9780429087394</isbn><isbn>9781000218701</isbn><isbn>9781000219180</isbn><isbn>042908739X</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2014</creationdate><recordtype>book_chapter</recordtype><recordid>eNqNkEFLAzEQhSOiWGvBm9f-gdWZbDKb3JSiVSh4UPEYkpjF4LqpyVrx37ulHjx6Gt7h-95jGDtFOEcOeOGQpIJK7rFjBACOGhXtj0EQSQIBeMgmijQJkKiP2KyU6ECg4JoIJ-zsOebQhVLmy89QhvlDyJvoQzlhB63tSpj93il7url-XNxWq_vl3eJqVUVONFS8CbxVGKQTzjXca_JeK5KNakA6jYE4b-qGhFNKEZBovW9br9BZCzzU9ZSJnXed08d2gQkupTcf-iHbzr_a9RByMQ0XkhQY5GRQqP9iKBUXSH-wyx0W-zbld_uVcvdiBvvdpdxm2_tYtpoR3FYBmt17jTSbURdTz-sfdndsVw</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Linton, Jon</creator><creator>Zemke, Bob</creator><creator>McDonald II, Douglas</creator><creator>Earle, Aaron</creator><creator>Youssef, Ali</creator><general>CRC Press</general><general>Auerbach Publishers, Incorporated</general><scope>FFUUA</scope></search><sort><creationdate>2014</creationdate><title>Wireless Guest Services</title><author>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i266t-27e2f81e5b4bb72c96cc986578705b91e62273764b8886064fccffc81baa02e33</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2014</creationdate><topic>COMPUTER COMMUNICATIONS &amp; NETWORKING</topic><topic>Health systems &amp; services</topic><topic>WAP (wireless) technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Linton, Jon</creatorcontrib><creatorcontrib>Zemke, Bob</creatorcontrib><creatorcontrib>McDonald II, Douglas</creatorcontrib><creatorcontrib>Earle, Aaron</creatorcontrib><creatorcontrib>Youssef, Ali</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Linton, Jon</au><au>Zemke, Bob</au><au>McDonald II, Douglas</au><au>Earle, Aaron</au><au>Youssef, Ali</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Wireless Guest Services</atitle><btitle>Wi-Fi Enabled Healthcare</btitle><date>2014</date><risdate>2014</risdate><spage>129</spage><epage>143</epage><pages>129-143</pages><isbn>1466560401</isbn><isbn>9781466560406</isbn><eisbn>1000219186</eisbn><eisbn>1000218708</eisbn><eisbn>9781466560413</eisbn><eisbn>146656041X</eisbn><eisbn>9780429087394</eisbn><eisbn>9781000218701</eisbn><eisbn>9781000219180</eisbn><eisbn>042908739X</eisbn><abstract>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</abstract><cop>United States</cop><pub>CRC Press</pub><doi>10.1201/b16580-5</doi><oclcid>869640519</oclcid><oclcid>872619775</oclcid><tpages>15</tpages><edition>1</edition><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISBN: 1466560401
ispartof Wi-Fi Enabled Healthcare, 2014, p.129-143
issn
language eng
recordid cdi_proquest_ebookcentralchapters_7245680_126_148
source O'Reilly Online Learning: Academic/Public Library Edition; Taylor & Francis eBooks Open Access
subjects COMPUTER COMMUNICATIONS & NETWORKING
Health systems & services
WAP (wireless) technology
title Wireless Guest Services
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A27%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_infor&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Wireless%20Guest%20Services&rft.btitle=Wi-Fi%20Enabled%20Healthcare&rft.au=Linton,%20Jon&rft.date=2014&rft.spage=129&rft.epage=143&rft.pages=129-143&rft.isbn=1466560401&rft.isbn_list=9781466560406&rft_id=info:doi/10.1201/b16580-5&rft_dat=%3Cproquest_infor%3EEBC1582416_126_148%3C/proquest_infor%3E%3Curl%3E%3C/url%3E&rft.eisbn=1000219186&rft.eisbn_list=1000218708&rft.eisbn_list=9781466560413&rft.eisbn_list=146656041X&rft.eisbn_list=9780429087394&rft.eisbn_list=9781000218701&rft.eisbn_list=9781000219180&rft.eisbn_list=042908739X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC1582416_126_148&rft_id=info:pmid/&rfr_iscdi=true