Wireless Guest Services
This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 143 |
---|---|
container_issue | |
container_start_page | 129 |
container_title | |
container_volume | |
creator | Linton, Jon Zemke, Bob McDonald II, Douglas Earle, Aaron Youssef, Ali |
description | This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network. |
doi_str_mv | 10.1201/b16580-5 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_infor</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_7245680_126_148</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC1582416_126_148</sourcerecordid><originalsourceid>FETCH-LOGICAL-i266t-27e2f81e5b4bb72c96cc986578705b91e62273764b8886064fccffc81baa02e33</originalsourceid><addsrcrecordid>eNqNkEFLAzEQhSOiWGvBm9f-gdWZbDKb3JSiVSh4UPEYkpjF4LqpyVrx37ulHjx6Gt7h-95jGDtFOEcOeOGQpIJK7rFjBACOGhXtj0EQSQIBeMgmijQJkKiP2KyU6ECg4JoIJ-zsOebQhVLmy89QhvlDyJvoQzlhB63tSpj93il7url-XNxWq_vl3eJqVUVONFS8CbxVGKQTzjXca_JeK5KNakA6jYE4b-qGhFNKEZBovW9br9BZCzzU9ZSJnXed08d2gQkupTcf-iHbzr_a9RByMQ0XkhQY5GRQqP9iKBUXSH-wyx0W-zbld_uVcvdiBvvdpdxm2_tYtpoR3FYBmt17jTSbURdTz-sfdndsVw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC1582416_126_148</pqid></control><display><type>book_chapter</type><title>Wireless Guest Services</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><source>Taylor & Francis eBooks Open Access</source><creator>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</creator><creatorcontrib>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</creatorcontrib><description>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</description><edition>1</edition><identifier>ISBN: 1466560401</identifier><identifier>ISBN: 9781466560406</identifier><identifier>EISBN: 1000219186</identifier><identifier>EISBN: 1000218708</identifier><identifier>EISBN: 9781466560413</identifier><identifier>EISBN: 146656041X</identifier><identifier>EISBN: 9780429087394</identifier><identifier>EISBN: 9781000218701</identifier><identifier>EISBN: 9781000219180</identifier><identifier>EISBN: 042908739X</identifier><identifier>DOI: 10.1201/b16580-5</identifier><identifier>OCLC: 869640519</identifier><identifier>OCLC: 872619775</identifier><identifier>LCCallNum: R119.95.W545 2014eb</identifier><language>eng</language><publisher>United States: CRC Press</publisher><subject>COMPUTER COMMUNICATIONS & NETWORKING ; Health systems & services ; WAP (wireless) technology</subject><ispartof>Wi-Fi Enabled Healthcare, 2014, p.129-143</ispartof><rights>2014 by Taylor & Francis Group, LLC</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/1582416-l.jpg</thumbnail><link.rule.ids>779,780,784,793,27925</link.rule.ids></links><search><creatorcontrib>Linton, Jon</creatorcontrib><creatorcontrib>Zemke, Bob</creatorcontrib><creatorcontrib>McDonald II, Douglas</creatorcontrib><creatorcontrib>Earle, Aaron</creatorcontrib><creatorcontrib>Youssef, Ali</creatorcontrib><title>Wireless Guest Services</title><title>Wi-Fi Enabled Healthcare</title><description>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</description><subject>COMPUTER COMMUNICATIONS & NETWORKING</subject><subject>Health systems & services</subject><subject>WAP (wireless) technology</subject><isbn>1466560401</isbn><isbn>9781466560406</isbn><isbn>1000219186</isbn><isbn>1000218708</isbn><isbn>9781466560413</isbn><isbn>146656041X</isbn><isbn>9780429087394</isbn><isbn>9781000218701</isbn><isbn>9781000219180</isbn><isbn>042908739X</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2014</creationdate><recordtype>book_chapter</recordtype><recordid>eNqNkEFLAzEQhSOiWGvBm9f-gdWZbDKb3JSiVSh4UPEYkpjF4LqpyVrx37ulHjx6Gt7h-95jGDtFOEcOeOGQpIJK7rFjBACOGhXtj0EQSQIBeMgmijQJkKiP2KyU6ECg4JoIJ-zsOebQhVLmy89QhvlDyJvoQzlhB63tSpj93il7url-XNxWq_vl3eJqVUVONFS8CbxVGKQTzjXca_JeK5KNakA6jYE4b-qGhFNKEZBovW9br9BZCzzU9ZSJnXed08d2gQkupTcf-iHbzr_a9RByMQ0XkhQY5GRQqP9iKBUXSH-wyx0W-zbld_uVcvdiBvvdpdxm2_tYtpoR3FYBmt17jTSbURdTz-sfdndsVw</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Linton, Jon</creator><creator>Zemke, Bob</creator><creator>McDonald II, Douglas</creator><creator>Earle, Aaron</creator><creator>Youssef, Ali</creator><general>CRC Press</general><general>Auerbach Publishers, Incorporated</general><scope>FFUUA</scope></search><sort><creationdate>2014</creationdate><title>Wireless Guest Services</title><author>Linton, Jon ; Zemke, Bob ; McDonald II, Douglas ; Earle, Aaron ; Youssef, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i266t-27e2f81e5b4bb72c96cc986578705b91e62273764b8886064fccffc81baa02e33</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2014</creationdate><topic>COMPUTER COMMUNICATIONS & NETWORKING</topic><topic>Health systems & services</topic><topic>WAP (wireless) technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Linton, Jon</creatorcontrib><creatorcontrib>Zemke, Bob</creatorcontrib><creatorcontrib>McDonald II, Douglas</creatorcontrib><creatorcontrib>Earle, Aaron</creatorcontrib><creatorcontrib>Youssef, Ali</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Linton, Jon</au><au>Zemke, Bob</au><au>McDonald II, Douglas</au><au>Earle, Aaron</au><au>Youssef, Ali</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Wireless Guest Services</atitle><btitle>Wi-Fi Enabled Healthcare</btitle><date>2014</date><risdate>2014</risdate><spage>129</spage><epage>143</epage><pages>129-143</pages><isbn>1466560401</isbn><isbn>9781466560406</isbn><eisbn>1000219186</eisbn><eisbn>1000218708</eisbn><eisbn>9781466560413</eisbn><eisbn>146656041X</eisbn><eisbn>9780429087394</eisbn><eisbn>9781000218701</eisbn><eisbn>9781000219180</eisbn><eisbn>042908739X</eisbn><abstract>This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network.</abstract><cop>United States</cop><pub>CRC Press</pub><doi>10.1201/b16580-5</doi><oclcid>869640519</oclcid><oclcid>872619775</oclcid><tpages>15</tpages><edition>1</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISBN: 1466560401 |
ispartof | Wi-Fi Enabled Healthcare, 2014, p.129-143 |
issn | |
language | eng |
recordid | cdi_proquest_ebookcentralchapters_7245680_126_148 |
source | O'Reilly Online Learning: Academic/Public Library Edition; Taylor & Francis eBooks Open Access |
subjects | COMPUTER COMMUNICATIONS & NETWORKING Health systems & services WAP (wireless) technology |
title | Wireless Guest Services |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A27%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_infor&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Wireless%20Guest%20Services&rft.btitle=Wi-Fi%20Enabled%20Healthcare&rft.au=Linton,%20Jon&rft.date=2014&rft.spage=129&rft.epage=143&rft.pages=129-143&rft.isbn=1466560401&rft.isbn_list=9781466560406&rft_id=info:doi/10.1201/b16580-5&rft_dat=%3Cproquest_infor%3EEBC1582416_126_148%3C/proquest_infor%3E%3Curl%3E%3C/url%3E&rft.eisbn=1000219186&rft.eisbn_list=1000218708&rft.eisbn_list=9781466560413&rft.eisbn_list=146656041X&rft.eisbn_list=9780429087394&rft.eisbn_list=9781000218701&rft.eisbn_list=9781000219180&rft.eisbn_list=042908739X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC1582416_126_148&rft_id=info:pmid/&rfr_iscdi=true |