did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596100520

802.11 Wireless Networks

by
  • ISBN13:

    9780596100520

  • ISBN10:

    0596100523

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2005-04-01
  • Publisher: Oreilly & Associates Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.95 Save up to $11.24
  • Buy Used
    $33.71

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Go to a coffee house or airport lounge, and one thing is immediately apparent: the world has gone mobile. Many of the laptops in these places communicate with company LANs via Wi- Fi, the wireless standard known as 802.11b. Those who want to deploy their own wireless network- including network architects, system administrators, security professionals and home users- first need to understand the capabilities and risks associated with the 802.11 protocols. This 2nd Edition is the perfect place to start. It is a clear, no- nonsense guide for setting up 802.11 on Windows and Linux, including how to use and select access points, making deployment considerations, and seeing to 802.11 network monitoring and performance tuning. The book also includes extensive discussion of wireless security issues, network monitoring essentials, and wireless card configuration- everything a reader needs to run a network without wires.

Author Biography

Matthew Gast works in the Office of the CTO at Trapeze Networks, where he leads the development of open wireless network standards and their application to the Trapeze architecture. He is a member of the IEEE 802.11 working group, and serves as chair of 802.11 Task Group M. As chair of the Wi-Fi Alliance's Wireless Network Management marketing task group, he is leading the investigation of certification requirements for power saving, performance optimization, and location and timing services. Matthew also chairs the Security Technical task group, which is extending Wi-Fi protected Access (WPA) certification to incorporate newly-developed security mechanisms so that it remains the strongest form of protection available for Wi-Fi networking. In 2007, Matthew was a founder of the OpenSEA Alliance, a group organized to support the development of open-source network security solutions. He currently serves on the engineering steering committee, the organization's board of directors, and as its corporate secretary. Matthew's most recent book, 802.11 Wireless Networks: The Definitive Guide (O'Reilly Media), now in its second edition, is the top selling reference work in the field and has been translated into six languages.

Table of Contents

Foreword
Preface
Introduction to Wireless Networking
Why Wireless?
What Makes Wireless Networks Different
A Network by Any Other Name
Overview of 80 2.11
Networks
IEEE 802 Network Technology Family Tree
802.11 Nomenclature and Design
802.11Network Operations
Mobility Support
802.11 MAC Fundamentals
Challenges for the MACMAC Access Modes and Timing
Contention-Based Access Using the DCF
Fragmentation and Reassembly
Frame Format
Encapsulation of Higher-Layer Protocols Within 80 2.11
Contention-Based Data Service
Frame Processing and Bridging
802.11 Framing in Detail
Data Frames
Control Frames
Management Frames
Frame Transmission and Association and Authentication States
Wired Equivalent Privacy (WEP)
Cryptographic Background to WEPWEP Cryptographic Operations
Problems with WEP
Dynamic WEP
User Authentication with 802.1X
The Extensible Authentication Protoco
lEAP Methods
802.1X Network Port Authentication
802.1X on Wireless LANs
802.11i
Robust Security Networks, TKIP, and CCMPThe Temporal Key Integrity Protocol (TKIP)Counter Mode with CBC-MAC (CCMP)Robust Security Network (RSN) Operations
Management Operations
Management Architecture
Scanning
Authentication
Preauthentication
Association
Power Conservation
Timer Synchronization
Spectrum Management
Contention-Free Service with the PCF
Contention-Free Access Using the PCF
Detailed PCF Framing
Power Management and the PCF
Physical Layer Overview
Physical-Layer Architecture
The Radio Link
RF Propagation with 802.11
RF Engineering for 802.11
The Frequency-Hopping (FH) PHY
Frequency-Hopping Transmission
Gaussian Frequency Shift Keying (GFSK)
FH PHY Convergence Procedure (PLCP)
Frequency-Hopping PMD Sublayer
Characteristics of the FH PHY
The Direct Sequence PHYs
DSSS and HR/DSSS (802.11b)
Direct Sequence Transmission
Differential Phase Shift Keying (DPSK)
The "Original" Direct Sequence PHY
Complementary Code Keying
High Rate Direct Sequence PHY
802.11a and 802.11j 5-GHz OFDM PHY
Orthogonal Frequency Division Multiplexing (OFDM)
OFDM as Applied by 802.11aOFDM PLCPOFDM PMD
Characteristics of the OFDM PHY
802.11g The Extended-Rate PHY (ERP)
802.11g Components
ERP Physical Layer Convergence (PLCP)
ERP Physical Medium Dependent (PMD) Layer
A Peek Ahead at 802.11n MIMO-OFDMCommon Features
WWiSETGnSync
Comparison and Conclusions
802.11
General Structure of an 802.11
Implementation-Specific Behavior
Reading the Specification Sheet
Using 80 2.11 on Windows
Windows XPWindows 2000
Windows Computer Authentication
802.11 on the Macintosh
The Air Port Extreme Card
802.1X on the Air Port
Using 80 2.11 on Linux
PCMCIA Support on Linux
Linux Wireless Extensions and Tools
Agere (Lucent) Orinoco
Atheros-Based cards and MADwifi
802.1X on Linux with xsupplicant
Using 80 2.11 Access Points
General Functions of an Access Point
Power over Ethernet (PoE)
Selecting Access Points
Cisco 1200 Access Point
Apple AirPort
Logical Wireless Network Architecture
Evaluating a Logical Architecture
Topology Examples
Choosing Your Logical Architecture
Security Architecture
Security Definition and Analysis
Authentication and Access Control
Ensuring Secrecy Through Encryption
Selecting Security Protocols
Rogue Access Points
Site Planning and Project Managemen
Project Planning and Requirements
Network Requirements
Physical Layer Selection and Design
Planning Access-Point Placement
Using Antennas to Tailor Coverage
802.11 Network Analysis
Network Analyzers
Ethereal 80 2.11 Network Analysis Checklist
Other Tools
802.11 Performance Tuning
80 2.11 Performance Calculations
Improving Performance
Tunable 802.11 Parameters
Conclusions and Predictions
Standards Work
Current Trends in Wireless Networking
The End
Glossary
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program