Flylib.com
802.11 Wireless Networks: The Definitive Guide, Second Edition
ISBN: 0596100523
EAN: 2147483647
Year: 2003
Pages: 179
Authors:
Matthew Gast
BUY ON AMAZON
Introduction to Wireless Networking
Introduction to Wireless Networking
Why Wireless?
What Makes Wireless Networks Different
A Network by Any Other Name...
Overview of 802.11 Networks
Overview of 802.11 Networks
IEEE 802 Network Technology Family Tree
11 Nomenclature and Design
11 Network Operations
Mobility Support
11 MAC Fundamentals
11 MAC Fundamentals
Challenges for the MAC
MAC Access Modes and Timing
Contention-Based Access Using the DCF
Fragmentation and Reassembly
Frame Format
Encapsulation of Higher-Layer Protocols Within 802.11
Contention-Based Data Service
Frame Processing and Bridging
11 Framing in Detail
11 Framing in Detail
Data Frames
Control Frames
Management Frames
Frame Transmission and Association and Authentication States
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP)
Cryptographic Background to WEP
WEP Cryptographic Operations
Problems with WEP
Dynamic WEP
User Authentication with 802.1X
User Authentication with 802.1X
The Extensible Authentication Protocol
EAP Methods
1X: Network Port Authentication
1X on Wireless LANs
11i: Robust Security Networks, TKIP, and CCMP
11i: Robust Security Networks, TKIP, and CCMP
The Temporal Key Integrity Protocol (TKIP)
Counter Mode with CBC-MAC (CCMP)
Robust Security Network (RSN) Operations
Management Operations
Management Operations
Management Architecture
Scanning
Authentication
Preauthentication
Association
Power Conservation
Timer Synchronization
Spectrum Management
Contention-Free Service with the PCF
Contention-Free Service with the PCF
Contention-Free Access Using the PCF
Detailed PCF Framing
Power Management and the PCF
Physical Layer Overview
Physical Layer Overview
Physical-Layer Architecture
The Radio Link
RF Propagation with 802.11
RF Engineering for 802.11
The Frequency-Hopping (FH) PHY
The Frequency-Hopping (FH) PHY
Frequency-Hopping Transmission
Gaussian Frequency Shift Keying (GFSK)
FH PHY Convergence Procedure (PLCP)
Frequency-Hopping PMD Sublayer
Characteristics of the FH PHY
The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
Direct Sequence Transmission
Differential Phase Shift Keying (DPSK)
The Original Direct Sequence PHY
Complementary Code Keying
High Rate Direct Sequence PHY
11a and 802.11j: 5-GHz OFDM PHY
11a and 802.11j: 5-GHz OFDM PHY
Orthogonal Frequency Division Multiplexing (OFDM)
OFDM as Applied by 802.11a
OFDM PLCP
OFDM PMD
Characteristics of the OFDM PHY
11g: The Extended-Rate PHY (ERP)
11g: The Extended-Rate PHY (ERP)
11g Components
ERP Physical Layer Convergence (PLCP)
ERP Physical Medium Dependent (PMD) Layer
A Peek Ahead at 802.11n: MIMO-OFDM
A Peek Ahead at 802.11n: MIMO-OFDM
Common Features
WWiSE
TGnSync
Comparison and Conclusions
11 Hardware
11 Hardware
General Structure of an 802.11 Interface
Implementation-Specific Behavior
Reading the Specification Sheet
Using 802.11 on Windows
Using 802.11 on Windows
Windows XP
Windows 2000
Windows Computer Authentication
11 on the Macintosh
11 on the Macintosh
The AirPort Extreme Card
1X on the AirPort
Using 802.11 on Linux
Using 802.11 on Linux
PCMCIA Support on Linux
Linux Wireless Extensions and Tools
Agere (Lucent) Orinoco
Atheros-Based cards and MADwifi
1X on Linux with xsupplicant
Using 802.11 Access Points
Using 802.11 Access Points
General Functions of an Access Point
Power over Ethernet (PoE)
Selecting Access Points
Cisco 1200 Access Point
Apple AirPort
Logical Wireless Network Architecture
Logical Wireless Network Architecture
Evaluating a Logical Architecture
Topology Examples
Choosing Your Logical Architecture
Security Architecture
Security Architecture
Security Definition and Analysis
Authentication and Access Control
Ensuring Secrecy Through Encryption
Selecting Security Protocols
Rogue Access Points
Site Planning and Project Management
Site Planning and Project Management
Project Planning and Requirements
Network Requirements
Physical Layer Selection and Design
Planning Access-Point Placement
Using Antennas to Tailor Coverage
11 Network Analysis
11 Network Analysis
Network Analyzers
Ethereal
11 Network Analysis Checklist
Other Tools
11 Performance Tuning
11 Performance Tuning
11 Performance Calculations
Improving Performance
Tunable 802.11 Parameters
Conclusions and Predictions
Conclusions and Predictions
Standards Work
Current Trends in Wireless Networking
802.11 Wireless Networks: The Definitive Guide, Second Edition
ISBN: 0596100523
EAN: 2147483647
Year: 2003
Pages: 179
Authors:
Matthew Gast
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Second Wave ERP Market: An Australian Viewpoint
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Context Management of ERP Processes in Virtual Communities
Data Mining for Business Process Reengineering
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Best Practices for Quantitative and Qualitative Risk Assessment
Level I Assessments
Building the Final Report
General Security Websites
Lotus Notes and Domino 6 Development (2nd Edition)
Using Templates to Replicate Design Changes
Advanced Form Design
Working with Special Forms
Real-World Example 1: Dynamic Drop-Down Lists on the Web
Writing Java Servlets
Java for RPG Programmers, 2nd Edition
The World Of Java
Structured Operations And Statements
User Interface
More Java
Appendix C Obtaining The Code Samples
The Java Tutorial: A Short Course on the Basics, 4th Edition
Specifying the Exceptions Thrown by a Method
How to Throw Exceptions
What Is a Thread?
Questions and Exercises
Practical Consideration of Writing Applets
Comparing, Designing, and Deploying VPNs
Scaling and Optimizing IPsec VPNs
Review Questions
Appendix A. VPLS and IPLS Layer 2 VPNs
Summary: Comparing VPLS and IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies