Field Guide to Wireless LANs for Administrators and Power Users, A |
By Thomas Maufer |
| |
Publisher | : Prentice Hall PTR |
Pub Date | : October 17, 2003 |
ISBN | : 0-13-101406-4 |
Pages | : 368 |
| | Copyright |
| | Prentice Hall PTR Series in Computer Networking and Distributed Systems |
| | About Prentice Hall Professional Technical Reference |
| | Preface |
| | | Acknowledgments |
|
| | Chapter 1. Wireless LAN Preliminaries |
| | | Why Wireless? |
| | | WLANs Arrive on the Scene |
| | | Components of IEEE 802.11 LANs |
| | | Where Do Wireless LAN Standards Come From? |
| | | What Is Wi-Fi™? Is It the Same as IEEE 802.11? |
| | | Summary |
|
| | Chapter 2. A Brief History of Networking Standards |
| | | The Mother of All Networking Standards |
| | | Aside: The IETF and TCP/IP Standards |
| | | IEEE LAN Standards |
| | | Introduction to IEEE 802.11's MAC Sub-layer Frame Structure |
| | | Summary |
|
| | Chapter 3. Speeds and Feeds |
| | | Overview of IEEE 802.11 PHYs |
| | | Summary of IEEE 802.11 PHYs |
| | | The Future's So Bright… |
|
| | Chapter 4. IEEE 802.11's MAC Sub-layer Protocol Frames, etc. |
| | | IEEE 802.11 MAC Sub-layer Frame Structure |
| | | Structure of the IEEE 802.11 MAC Sub-layer Frame |
| | | Structure of the IEEE 802.11 MAC Frames |
| | | IEEE 802.11 Data Exchange Interfaces |
| | | Higher-Layer Protocol Encapsulation |
| | | Modes of Operation |
| | | Summary |
|
| | Chapter 5. Dissection of a Probe Response MMPDU |
| | | Reprise of IEEE 802.11's MMPDU Structure |
| | | What Causes a Probe Response? |
| | | Dissection of an Actual Probe Response |
| | | Summary |
|
| | Chapter 6. IEEE 802.11's MAC Sub-layer Protocol Access, etc. |
| | | Building Blocks: Joining a Wireless LAN |
| | | IEEE 802.11 WLAN Components |
| | | MAC/PLCP Interactions |
| | | DCF, PCF, Time, and Power Management |
| | | Summary |
|
| | Chapter 7. Security Mechanisms for Wireless LANs |
| | | Introduction to Wireless LAN Security |
| | | Security and the OSI Model |
| | | Introduction to Wireless LAN Security |
| | | Wired-Equivalent Privacy (WEP) |
| | | IEEE 802.11i Robust Security Network |
|
| | Chapter 8. Applications and Deployment of Wireless Technology |
| | | IEEE 802.11: Wireless LANs and Beyond |
| | | Bluetooth® and IEEE 802.15.1: Wireless Personal Area Networks (WPANs) |
| | | IEEE 802.16: Fixed Broadband Wireless Access |
| | | IEEE 802.11 Wireless LAN Devices |
| | | Wireless LANs at Home |
| | | WLANs in Medium-to-Large Enterprise Networks |
| | | Wireless LANs in Public Places |
| | | Deploying WLANs at Home: A Case Study |
| | | Summary |
|