Skip to content

802.11 Wireless Networks

Best in textbook rentals since 2012!

ISBN-10: 0596100523

ISBN-13: 9780596100520

Edition: 2nd 2005

Authors: Matthew S. Gast

List price: $44.95
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with…    
Customers also bought

Book details

List price: $44.95
Edition: 2nd
Copyright year: 2005
Publisher: O'Reilly Media, Incorporated
Publication date: 5/5/2005
Binding: Paperback
Pages: 672
Size: 6.75" wide x 8.75" long x 1.25" tall
Weight: 2.046
Language: English

Foreword
Preface
Introduction to Wireless Networking
Why Wireless?
What Makes Wireless Networks Different
A Network by Any Other Name
Overview of 80 2.11
Networks
IEEE 802 Network Technology Family Tree
802.11 Nomenclature and Design
802.11Network Operations
Mobility Support
802.11 MAC Fundamentals
Challenges for the MACMAC Access Modes and Timing
Contention-Based Access Using the DCF
Fragmentation and Reassembly
Frame Format
Encapsulation of Higher-Layer Protocols Within 80 2.11
Contention-Based Data Service
Frame Processing and Bridging
802.11 Framing in Detail
Data Frames
Control Frames
Management Frames
Frame Transmission and Association and Authentication States
Wired Equivalent Privacy (WEP)
Cryptographic Background to WEPWEP Cryptographic Operations
Problems with WEP
Dynamic WEP
User Authentication with 802.1X
The Extensible Authentication Protoco
lEAP Methods
802.1X Network Port Authentication
802.1X on Wireless LANs
802.11i
Robust Security Networks, TKIP, and CCMPThe Temporal Key Integrity Protocol (TKIP)Counter Mode with CBC-MAC (CCMP)Robust Security Network (RSN) Operations
Management Operations
Management Architecture
Scanning
Authentication
Preauthentication
Association
Power Conservation
Timer Synchronization
Spectrum Management
Contention-Free Service with the PCF
Contention-Free Access Using the PCF
Detailed PCF Framing
Power Management and the PCF
Physical Layer Overview
Physical-Layer Architecture
The Radio Link
RF Propagation with 802.11
RF Engineering for 802.11
The Frequency-Hopping (FH) PHY
Frequency-Hopping Transmission
Gaussian Frequency Shift Keying (GFSK)
FH PHY Convergence Procedure (PLCP)
Frequency-Hopping PMD Sublayer
Characteristics of the FH PHY
The Direct Sequence PHYs
DSSS and HR/DSSS (802.11b)
Direct Sequence Transmission
Differential Phase Shift Keying (DPSK)
The "Original" Direct Sequence PHY
Complementary Code Keying
High Rate Direct Sequence PHY
802.11a and 802.11j 5-GHz OFDM PHY
Orthogonal Frequency Division Multiplexing (OFDM)
OFDM as Applied by 802.11aOFDM PLCPOFDM PMD
Characteristics of the OFDM PHY
802.11g The Extended-Rate PHY (ERP)
802.11g Components
ERP Physical Layer Convergence (PLCP)
ERP Physical Medium Dependent (PMD) Layer
A Peek Ahead at 802.11n MIMO-OFDMCommon Features
WWiSETGnSync
Comparison and Conclusions
802.11
General Structure of an 802.11
Implementation-Specific Behavior
Reading the Specification Sheet
Using 80 2.11 on Windows
Windows XPWindows 2000
Windows Computer Authentication
802.11 on the Macintosh
The Air Port Extreme Card
802.1X on the Air Port
Using 80 2.11 on Linux
PCMCIA Support on Linux
Linux Wireless Extensions and Tools
Agere (Lucent) Orinoco
Atheros-Based cards and MADwifi
802.1X on Linux with xsupplicant
Using 80 2.11 Access Points
General Functions of an Access Point
Power over Ethernet (PoE)
Selecting Access Points
Cisco 1200 Access Point
Apple AirPort
Logical Wireless Network Architecture
Evaluating a Logical Architecture
Topology Examples
Choosing Your Logical Architecture
Security Architecture
Security Definition and Analysis
Authentication and Access Control
Ensuring Secrecy Through Encryption
Selecting Security Protocols
Rogue Access Points
Site Planning and Project Managemen
Project Planning and Requirements
Network Requirements
Physical Layer Selection and Design
Planning Access-Point Placement
Using Antennas to Tailor Coverage
802.11 Network Analysis
Network Analyzers
Ethereal 80 2.11 Network Analysis Checklist
Other Tools
802.11 Performance Tuning
80 2.11 Performance Calculations
Improving Performance
Tunable 802.11 Parameters
Conclusions and Predictions
Standards Work
Current Trends in Wireless Networking
The End
Glossary
Index