Index_S

S

Sage Research, productivity study, 270

Satellite Broadcasting and Communications Association (SBCA), 316

satellite communications, 314

school wireless networks, 256–257

Script Kiddiez, 66–67

secure sockets layer (SSL)

802.11x and, 93

virtual private networks (VPN) and, 98

security, 9, 61–103, 287, 288, 331–332

802.11x and, 87–94, 88

access control in, 85

access points (AP) in, 75

Advanced encryption standard (AES) in, 86

authentication, authorization, accounting (AAA) systems in, 90

Best Buy cards and, 62

brute force password attacks in, 75

classes of attack, 67

denial of service (DoS) attacks in, 79–80

domain name service (DNS) in, 74

eavesdropping in, 69–72

extensible authentication protocol (EAP) in, 82, 87–94

fabrication attacks, 67, 72–75, 72

firewalls and DMZs in, 81–83, 81, 82

handoffs and, 83

insertion attacks in, 75

interception vs. normal flow, 67, 68–72, 68

interruption attacks, 67, 79–80, 79

invasion and resource stealing in, 78

IP addressing and, 74

IPSec in, 97

Kerberos in, 99–102, 100

key management and, 63–65

logs for, 265

loss of equipment and, 76

MAC address filtering and, 62, 66, 73, 265

man-in-the-middle attack in, 74

model for, 67

modification attacks, 67, 75–77, 76

network architecture for, 81–83, 81

personal digital assistant (PDA) and, 71

policies for, 83–102, 84

problems with, in 802.11, 63–66

public access and, 85

reaction attacks, 67, 78, 78

remote authentication dial in user service (RADIUS) in, 82, 87, 90, 91–92, 167, 235, 288

replay attacks, 67, 77–78, 77

repudiation attacks, 67, 80, 81

risk identification in, 66–67

rogue APs, 265

rogue networks and station redirection in, 80

service set ID (SSID) and, 62, 63, 85

small office/home office (SOHO), 74, 87

sniffing in, 69–72

spoofing in, 74

spread spectrum technology and, 189

standards for, 62

temporal key integrity protocol (TKIP) in, 86

threats to, 66–81

traffic redirection in, 77–78

virtual private network (VPN) in, 62, 82–83, 94–99, 96

virus infection and, 76–77

voice over IP (VoIP) and, 189–190

war driving, LAN jacking vs., 62

WiFi Protected Access (WPA) in, 85–86

wired equivalent privacy (WEP) and, 62, 63–65

wireless LANs (WLAN) and, 62

security logs, 265

self-healing networks, 202

service level agreements (SLAs), 106, 235

service set identifier (SSID), 9, 62, 63, 85, 255, 257, 265

session announcement protocol (SAP), 166

session description protocol (SDP), 166

session initiation protocol (SIP), 163, 165–168, 166, 169, 302

session key (SK), Kerberos, 100–101

Shannon's channel capacity theory, 116

shared key authentication, 28, 64–65

ShareWave, 213

short interframe space (SIFS), 33–34, 146–147

short message service (SMS), voice over IP (VoIP) and, 194

Siemens, 234

signal strength, 215–215

signal to noise ratio (SNR), 18–19, 45–46, 112, 204, 225, 226

signaling gateway, softswitches and, 170

signaling protocols, voice over IP (VoIP) and, 163–167, 164

signaling system 7 (SS7), 168, 170

silence suppression or voice activation detection (VAD), 126

SIM chips, 93

simple mail transfer protocol (SMTP), 166–167

simple network management protocol (SNMP), 72

site plan prediction tools, 224

site survey, 224–226

SitePlanner, 224

small office/home office (SOHO), 10, 74, 87, 198, 261–262, 262, 330–331

smurfs, 79

sniffing, 69–72

social rewards of wireless technology, 340–345

SOCKS network security protocol, 98–99

softswitches, 6, 159, 167–170, 170

application server for, 171

media gateway controller (MGC) in, 168

media gateway in, 171

signaling gateway in, 170

voice over IP (VoIP) and, 192

SpectraLink Secure Radio technology, 189–190

SpectraLink VoIP telephone 193–194, 193

spectrum (see frequency spectrum; unlicensed spectrum)

speech coding, voice over IP (VoIP) and, 179

speech processing software, voice over IP (VoIP) and, 185–186

spoofing, 74

spread spectrum technologies, 16–21, 18, 209–211, 316

interference and, 115

RAKE receivers, 249–250, 250

security and, 189

spreading codes, 16–17

star topology, 202, 203

Starbuck's, 280

stations, media access control (MAC) and, 26–27

steerable antennas, 112, 243

subnets, 39

subscriber identity module (SIM), 257

supplicants, 802.11x and, 90

switches and switching, 2, 3–5, 3, 278

Class 4 and Class 5, 4–5, 5,167, 171

soft-, 6, 159, 167–170, 170, 192

voice over IP (VoIP) and, 167–172

Sylvania Electronic Systems (FHSS development), 21

Symbol, 193, 251

synchronization (see time synchronization)

synchronous optical network (SONET), 53

synk, 4, 79

system operating margin (see fade margin), 114



Wi-Fi Handbook(c) Building 802.11b Wireless Networks
Wi-Fi Handbook : Building 802.11b Wireless Networks
ISBN: 0071412514
EAN: 2147483647
Year: 2003
Pages: 96

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net