| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
| |
Introduction to Wireless Networking | |
| |
| |
Why Wireless? | |
| |
| |
What Makes Wireless Networks Different | |
| |
| |
A Network by Any Other Name | |
| |
| |
| |
Overview of 80 2.11 | |
| |
| |
Networks | |
| |
| |
IEEE 802 Network Technology Family Tree | |
| |
| |
802.11 Nomenclature and Design | |
| |
| |
802.11Network Operations | |
| |
| |
Mobility Support | |
| |
| |
| |
802.11 MAC Fundamentals | |
| |
| |
Challenges for the MACMAC Access Modes and Timing | |
| |
| |
Contention-Based Access Using the DCF | |
| |
| |
Fragmentation and Reassembly | |
| |
| |
Frame Format | |
| |
| |
Encapsulation of Higher-Layer Protocols Within 80 2.11 | |
| |
| |
Contention-Based Data Service | |
| |
| |
Frame Processing and Bridging | |
| |
| |
| |
802.11 Framing in Detail | |
| |
| |
Data Frames | |
| |
| |
Control Frames | |
| |
| |
Management Frames | |
| |
| |
Frame Transmission and Association and Authentication States | |
| |
| |
| |
Wired Equivalent Privacy (WEP) | |
| |
| |
Cryptographic Background to WEPWEP Cryptographic Operations | |
| |
| |
Problems with WEP | |
| |
| |
Dynamic WEP | |
| |
| |
| |
User Authentication with 802.1X | |
| |
| |
The Extensible Authentication Protoco | |
| |
| |
lEAP Methods | |
| |
| |
802.1X Network Port Authentication | |
| |
| |
802.1X on Wireless LANs | |
| |
| |
| |
802.11i | |
| |
| |
Robust Security Networks, TKIP, and CCMPThe Temporal Key Integrity Protocol (TKIP)Counter Mode with CBC-MAC (CCMP)Robust Security Network (RSN) Operations | |
| |
| |
| |
Management Operations | |
| |
| |
Management Architecture | |
| |
| |
Scanning | |
| |
| |
Authentication | |
| |
| |
Preauthentication | |
| |
| |
Association | |
| |
| |
Power Conservation | |
| |
| |
Timer Synchronization | |
| |
| |
Spectrum Management | |
| |
| |
| |
Contention-Free Service with the PCF | |
| |
| |
Contention-Free Access Using the PCF | |
| |
| |
Detailed PCF Framing | |
| |
| |
Power Management and the PCF | |
| |
| |
| |
Physical Layer Overview | |
| |
| |
Physical-Layer Architecture | |
| |
| |
The Radio Link | |
| |
| |
RF Propagation with 802.11 | |
| |
| |
RF Engineering for 802.11 | |
| |
| |
| |
The Frequency-Hopping (FH) PHY | |
| |
| |
Frequency-Hopping Transmission | |
| |
| |
Gaussian Frequency Shift Keying (GFSK) | |
| |
| |
FH PHY Convergence Procedure (PLCP) | |
| |
| |
Frequency-Hopping PMD Sublayer | |
| |
| |
Characteristics of the FH PHY | |
| |
| |
| |
The Direct Sequence PHYs | |
| |
| |
DSSS and HR/DSSS (802.11b) | |
| |
| |
Direct Sequence Transmission | |
| |
| |
Differential Phase Shift Keying (DPSK) | |
| |
| |
The "Original" Direct Sequence PHY | |
| |
| |
Complementary Code Keying | |
| |
| |
High Rate Direct Sequence PHY | |
| |
| |
| |
802.11a and 802.11j 5-GHz OFDM PHY | |
| |
| |
Orthogonal Frequency Division Multiplexing (OFDM) | |
| |
| |
OFDM as Applied by 802.11aOFDM PLCPOFDM PMD | |
| |
| |
Characteristics of the OFDM PHY | |
| |
| |
| |
802.11g The Extended-Rate PHY (ERP) | |
| |
| |
802.11g Components | |
| |
| |
ERP Physical Layer Convergence (PLCP) | |
| |
| |
ERP Physical Medium Dependent (PMD) Layer | |
| |
| |
| |
A Peek Ahead at 802.11n MIMO-OFDMCommon Features | |
| |
| |
WWiSETGnSync | |
| |
| |
Comparison and Conclusions | |
| |
| |
| |
802.11 | |
| |
| |
General Structure of an 802.11 | |
| |
| |
Implementation-Specific Behavior | |
| |
| |
Reading the Specification Sheet | |
| |
| |
| |
Using 80 2.11 on Windows | |
| |
| |
Windows XPWindows 2000 | |
| |
| |
Windows Computer Authentication | |
| |
| |
| |
802.11 on the Macintosh | |
| |
| |
The Air Port Extreme Card | |
| |
| |
802.1X on the Air Port | |
| |
| |
| |
Using 80 2.11 on Linux | |
| |
| |
PCMCIA Support on Linux | |
| |
| |
Linux Wireless Extensions and Tools | |
| |
| |
Agere (Lucent) Orinoco | |
| |
| |
Atheros-Based cards and MADwifi | |
| |
| |
802.1X on Linux with xsupplicant | |
| |
| |
| |
Using 80 2.11 Access Points | |
| |
| |
General Functions of an Access Point | |
| |
| |
Power over Ethernet (PoE) | |
| |
| |
Selecting Access Points | |
| |
| |
Cisco 1200 Access Point | |
| |
| |
Apple AirPort | |
| |
| |
| |
Logical Wireless Network Architecture | |
| |
| |
Evaluating a Logical Architecture | |
| |
| |
Topology Examples | |
| |
| |
Choosing Your Logical Architecture | |
| |
| |
| |
Security Architecture | |
| |
| |
Security Definition and Analysis | |
| |
| |
Authentication and Access Control | |
| |
| |
Ensuring Secrecy Through Encryption | |
| |
| |
Selecting Security Protocols | |
| |
| |
Rogue Access Points | |
| |
| |
| |
Site Planning and Project Managemen | |
| |
| |
Project Planning and Requirements | |
| |
| |
Network Requirements | |
| |
| |
Physical Layer Selection and Design | |
| |
| |
Planning Access-Point Placement | |
| |
| |
Using Antennas to Tailor Coverage | |
| |
| |
| |
802.11 Network Analysis | |
| |
| |
Network Analyzers | |
| |
| |
Ethereal 80 2.11 Network Analysis Checklist | |
| |
| |
Other Tools | |
| |
| |
| |
802.11 Performance Tuning | |
| |
| |
80 2.11 Performance Calculations | |
| |
| |
Improving Performance | |
| |
| |
Tunable 802.11 Parameters | |
| |
| |
| |
Conclusions and Predictions | |
| |
| |
Standards Work | |
| |
| |
Current Trends in Wireless Networking | |
| |
| |
The End | |
| |
| |
Glossary | |
| |
| |
Index | |