Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Matthew Gast works in the Office of the CTO at Trapeze Networks, where he leads the development of open wireless network standards and their application to the Trapeze architecture. He is a member of the IEEE 802.11 working group, and serves as chair of 802.11 Task Group M. As chair of the Wi-Fi Alliance's Wireless Network Management marketing task group, he is leading the investigation of certification requirements for power saving, performance optimization, and location and timing services. Matthew also chairs the Security Technical task group, which is extending Wi-Fi protected Access (WPA) certification to incorporate newly-developed security mechanisms so that it remains the strongest form of protection available for Wi-Fi networking. In 2007, Matthew was a founder of the OpenSEA Alliance, a group organized to support the development of open-source network security solutions. He currently serves on the engineering steering committee, the organization's board of directors, and as its corporate secretary. Matthew's most recent book, 802.11 Wireless Networks: The Definitive Guide (O'Reilly Media), now in its second edition, is the top selling reference work in the field and has been translated into six languages.
Foreword | |
Preface | |
Introduction to Wireless Networking | |
Why Wireless? | |
What Makes Wireless Networks Different | |
A Network by Any Other Name | |
Overview of 80 2.11 | |
Networks | |
IEEE 802 Network Technology Family Tree | |
802.11 Nomenclature and Design | |
802.11Network Operations | |
Mobility Support | |
802.11 MAC Fundamentals | |
Challenges for the MACMAC Access Modes and Timing | |
Contention-Based Access Using the DCF | |
Fragmentation and Reassembly | |
Frame Format | |
Encapsulation of Higher-Layer Protocols Within 80 2.11 | |
Contention-Based Data Service | |
Frame Processing and Bridging | |
802.11 Framing in Detail | |
Data Frames | |
Control Frames | |
Management Frames | |
Frame Transmission and Association and Authentication States | |
Wired Equivalent Privacy (WEP) | |
Cryptographic Background to WEPWEP Cryptographic Operations | |
Problems with WEP | |
Dynamic WEP | |
User Authentication with 802.1X | |
The Extensible Authentication Protoco | |
lEAP Methods | |
802.1X Network Port Authentication | |
802.1X on Wireless LANs | |
802.11i | |
Robust Security Networks, TKIP, and CCMPThe Temporal Key Integrity Protocol (TKIP)Counter Mode with CBC-MAC (CCMP)Robust Security Network (RSN) Operations | |
Management Operations | |
Management Architecture | |
Scanning | |
Authentication | |
Preauthentication | |
Association | |
Power Conservation | |
Timer Synchronization | |
Spectrum Management | |
Contention-Free Service with the PCF | |
Contention-Free Access Using the PCF | |
Detailed PCF Framing | |
Power Management and the PCF | |
Physical Layer Overview | |
Physical-Layer Architecture | |
The Radio Link | |
RF Propagation with 802.11 | |
RF Engineering for 802.11 | |
The Frequency-Hopping (FH) PHY | |
Frequency-Hopping Transmission | |
Gaussian Frequency Shift Keying (GFSK) | |
FH PHY Convergence Procedure (PLCP) | |
Frequency-Hopping PMD Sublayer | |
Characteristics of the FH PHY | |
The Direct Sequence PHYs | |
DSSS and HR/DSSS (802.11b) | |
Direct Sequence Transmission | |
Differential Phase Shift Keying (DPSK) | |
The "Original" Direct Sequence PHY | |
Complementary Code Keying | |
High Rate Direct Sequence PHY | |
802.11a and 802.11j 5-GHz OFDM PHY | |
Orthogonal Frequency Division Multiplexing (OFDM) | |
OFDM as Applied by 802.11aOFDM PLCPOFDM PMD | |
Characteristics of the OFDM PHY | |
802.11g The Extended-Rate PHY (ERP) | |
802.11g Components | |
ERP Physical Layer Convergence (PLCP) | |
ERP Physical Medium Dependent (PMD) Layer | |
A Peek Ahead at 802.11n MIMO-OFDMCommon Features | |
WWiSETGnSync | |
Comparison and Conclusions | |
802.11 | |
General Structure of an 802.11 | |
Implementation-Specific Behavior | |
Reading the Specification Sheet | |
Using 80 2.11 on Windows | |
Windows XPWindows 2000 | |
Windows Computer Authentication | |
802.11 on the Macintosh | |
The Air Port Extreme Card | |
802.1X on the Air Port | |
Using 80 2.11 on Linux | |
PCMCIA Support on Linux | |
Linux Wireless Extensions and Tools | |
Agere (Lucent) Orinoco | |
Atheros-Based cards and MADwifi | |
802.1X on Linux with xsupplicant | |
Using 80 2.11 Access Points | |
General Functions of an Access Point | |
Power over Ethernet (PoE) | |
Selecting Access Points | |
Cisco 1200 Access Point | |
Apple AirPort | |
Logical Wireless Network Architecture | |
Evaluating a Logical Architecture | |
Topology Examples | |
Choosing Your Logical Architecture | |
Security Architecture | |
Security Definition and Analysis | |
Authentication and Access Control | |
Ensuring Secrecy Through Encryption | |
Selecting Security Protocols | |
Rogue Access Points | |
Site Planning and Project Managemen | |
Project Planning and Requirements | |
Network Requirements | |
Physical Layer Selection and Design | |
Planning Access-Point Placement | |
Using Antennas to Tailor Coverage | |
802.11 Network Analysis | |
Network Analyzers | |
Ethereal 80 2.11 Network Analysis Checklist | |
Other Tools | |
802.11 Performance Tuning | |
80 2.11 Performance Calculations | |
Improving Performance | |
Tunable 802.11 Parameters | |
Conclusions and Predictions | |
Standards Work | |
Current Trends in Wireless Networking | |
The End | |
Glossary | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.