802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition
- Autor:
- Matthew S. Gast
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 672
- Dostępne formaty:
-
ePubMobi
Opis ebooka: 802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition
As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
- deployment considerations
- network monitoring and performance tuning
- wireless security issues
- how to use and select access points
- network monitoring essentials
- wireless card configuration
- security issues unique to wireless networks
Wybrane bestsellery
-
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.Author Matthew Gast...(55.24 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of t...(55.24 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
High-precision location information is increasingly useful for mobile application developers, since it allows devices to interact with the world around them. This practical book shows you how to achieve arm’s reach accuracy with iBeacons, simple transmitters that enable your applications to...
Building Applications with iBeacon. Proximity and Location Services with Bluetooth Low Energy Building Applications with iBeacon. Proximity and Location Services with Bluetooth Low Energy
(72.24 zł najniższa cena z 30 dni)76.42 zł
89.90 zł(-15%) -
Oto uzupełnione i zaktualizowane wydanie bestsellerowego przewodnika dla inżynierów sieci. Dzięki niemu przejdziesz trudną (ale ekscytującą!) drogę od tradycyjnej platformy do platformy sieciowej opartej na najlepszych praktykach programistycznych. Zaczniesz od zagadnień podstawowych, aby następn...
Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV
(77.40 zł najniższa cena z 30 dni)83.85 zł
129.00 zł(-35%) -
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(24.90 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł(-50%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
Ebooka "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-1952-6, 9781449319526
- Data wydania ebooka:
- 2005-04-25 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 25.5MB
- Rozmiar pliku Mobi:
- 50.5MB
Spis treści ebooka
- 802.11 Wireless Networks: The Definitive Guide
- Foreword
- Preface
- Prometheus Untethered: The Possibilities of Wireless LANs
- Audience
- Overture for Book in Black and White, Opus 2
- Major Changes from the First Edition
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- How to Contact Us
- Acknowledgments
- 1. Introduction to Wireless Networking
- Why Wireless?
- Radio Spectrum: The Key Resource
- The ISM bands
- Radio Spectrum: The Key Resource
- Why Wireless?
- What Makes Wireless Networks Different
- Lack of Physical Boundary
- Dynamic Physical Medium
- Security
- A Network by Any Other Name...
- The Wonderful Thing About Standards...
- 2. Overview of 802.11 Networks
- IEEE 802 Network Technology Family Tree
- 802.11 Nomenclature and Design
- Types of Networks
- Independent networks
- Infrastructure networks
- Extended service areas
- Multi-BSS environments: virtual APs
- Robust security networks (RSNs)
- Types of Networks
- The Distribution System, Revisited
- Interaccess point communication as part of the distribution system
- Wireless bridges and the distribution system
- Network Boundaries
- 802.11 Network Operations
- Network Services
- Station services
- Distribution system services
- Confidentiality and access control
- Spectrum management services
- Network Services
- Mobility Support
- Designing Networks for Mobility
- Proprietary mobility systems
- Designing Networks for Mobility
- 3. 802.11 MAC Fundamentals
- Challenges for the MAC
- RF Link Quality
- The Hidden Node Problem
- Challenges for the MAC
- MAC Access Modes and Timing
- Carrier-Sensing Functions and the Network Allocation Vector
- Interframe Spacing
- Interframe spacing and priority
- Contention-Based Access Using the DCF
- Error Recovery with the DCF
- Using the retry counters
- Error Recovery with the DCF
- Backoff with the DCF
- Fragmentation and Reassembly
- Frame Format
- Frame Control
- Duration/ID Field
- Duration: setting the NAV
- Frames transmitted during contention-free periods
- PS-Poll frames
- Address Fields
- Sequence Control Field
- Frame Body
- Frame Check Sequence
- Encapsulation of Higher-Layer Protocols Within 802.11
- Contention-Based Data Service
- Broadcast and Multicast Data or Management Frames
- Unicast Frames
- Basic positive acknowledgment (final fragment)
- Fragmentation
- RTS/CTS
- RTS/CTS with fragmentation
- Powersaving Sequences
- Immediate response
- Deferred response
- Multirate Support
- Rate selection and fallback
- Frame Processing and Bridging
- Wireless Medium to Wired Medium (802.11 to Ethernet)
- Wired Medium to Wireless Medium (Ethernet to 802.11)
- Quality of Service Extensions
- 4. 802.11 Framing in Detail
- Data Frames
- Frame Control
- Duration
- Addressing and DS Bits
- Variations on the Data Frame Theme
- Applied Data Framing
- IBSS frames
- Frames from the AP
- Frames to the AP
- Frames in a WDS
- Encrypted frames
- Data Frames
- Control Frames
- Common Frame Control Field
- Request to Send (RTS)
- Clear to Send (CTS)
- Acknowledgment (ACK)
- Power-Save Poll (PS-Poll)
- Management Frames
- The Structure of Management Frames
- Address fields
- Duration calculations
- Frame body
- The Structure of Management Frames
- Fixed-Length Management Frame Components
- Authentication Algorithm Number
- Authentication Transaction Sequence Number
- Beacon interval
- Capability Information
- Current AP Address
- Listen interval
- Association ID
- Timestamp
- Reason Code
- Status Code
- Management Frame Information Elements
- Service Set Identity (SSID)
- Supported Rates
- FH Parameter Set
- DS Parameter Set
- Traffic Indication Map (TIM)
- CF Parameter Set
- IBSS Parameter Set
- Country
- Hopping Pattern Parameters and Hopping Pattern Table
- Request
- Challenge Text
- Power Constraint
- Power Capability
- TPC Request
- TPC Report
- Supported Channels
- Channel Switch Announcement
- Measurement Request and Measurement Report
- Quiet
- IBSS DFS
- ERP Information
- Robust Security Network
- Extended Supported Rates
- Wi-Fi Protected Access (WPA)
- Types of Management Frames
- Beacon
- Probe Request
- Probe Response
- IBSS announcement traffic indication map (ATIM)
- Disassociation and Deauthentication
- Association Request
- Reassociation Request
- Association Response and Reassociation Response
- Authentication
- Action frame
- Frame Transmission and Association and Authentication States
- Frame Classes
- Class 1 frames
- Class 2 frames
- Class 3 frames
- Frame Classes
- 5. Wired Equivalent Privacy (WEP)
- Cryptographic Background to WEP
- Stream Cipher Security
- Cryptographic Politics
- Cryptographic Background to WEP
- WEP Cryptographic Operations
- WEP Data Processing
- WEP data transmission
- WEP key length
- Types of WEP keys
- Manual (static) versus automatic (dynamic) WEP
- WEP key numbering and storage
- WEP Data Processing
- WEP Encapsulation
- Problems with WEP
- Cryptographic Properties of RC4
- Design Flaws of the WEP System
- Key Recovery Attacks Against WEP
- Key recovery defenses
- Dynamic WEP
- 6. User Authentication with 802.1X
- The Extensible Authentication Protocol
- EAP Packet Format
- EAP Requests and Responses
- Type code 1: Identity
- Type code 2: Notification
- Type code 3: NAK
- EAP Authentication Methods
- EAP Success and Failure
- A Sample EAP Exchange
- The Extensible Authentication Protocol
- EAP Methods
- Cryptographic Methods
- LEAP
- Code 13: EAP-TLS
- Code 21: EAP-TTLS and Code 25: EAP-PEAP
- Cryptographic Methods
- Noncryptographic EAP Methods
- Code 4: MD-5 Challenge
- Code 6: Generic Token Card
- Code 29: EAP-MSCHAP-V2
- Code 18: EAP-SIM and Code 23: EAP-AKA
- Other Inner Authentication Methods
- Password Authentication Protocol (PAP)
- Challenge Handshake Authentication Protocol (CHAP)
- MS-CHAP, version 1
- 802.1X: Network Port Authentication
- 802.1X Architecture and Nomenclature
- 802.1X frame filtering
- 802.1X Architecture and Nomenclature
- EAPOL Encapsulation
- Addressing
- 802.1X on Wireless LANs
- Sample 802.1X Exchange on 802.11
- Dynamic keying
- Sample 802.1X Exchange on 802.11
- 7. 802.11i: Robust Security Networks, TKIP, and CCMP
- The Temporal Key Integrity Protocol (TKIP)
- TKIP Differences from WEP
- TKIP initialization vector use and key mixing
- TKIP sequence counter and replay protection
- The Michael integrity check and countermeasures
- TKIP Differences from WEP
- TKIP Data Processing and Operation
- TKIP key mixing and key construction
- TKI P data transmission
- TKIP reception
- The Temporal Key Integrity Protocol (TKIP)
- The Michael Integrity Check
- Michael data processing
- Michael countermeasures
- Counter Mode with CBC-MAC (CCMP)
- CCMP Data Processing
- CCMP data transmission
- CCMP reception
- CCMP Data Processing
- Robust Security Network (RSN) Operations
- 802.11i Key Hierarchy
- Pairwise key hierarchy
- Group key hierarchy
- 802.11i Key Hierarchy
- 802.11i Key Derivation and Distribution
- Updating pairwise keys: the four-way handshake
- Updating group keys: the group key handshake
- Mixing Encryption Types
- Key Caching
- 8. Management Operations
- Management Architecture
- Scanning
- Passive Scanning
- Active Scanning
- Scan Report
- Joining
- Authentication
- 802.11 Authentication
- Open-system authentication
- The legacy of shared-key authentication
- Defeating shared-key authentication
- 802.11 Authentication
- Preauthentication
- 802.11 Preauthentication
- 802.11i Preauthentication and Key Caching
- Association
- Association Procedure
- Reassociation Procedure
- Power Conservation
- Power Management in Infrastructure Networks
- Unicast frame buffering and delivery using the Traffic Indication Map (TIM)
- Delivering multicast and broadcast frames: the Delivery TIM (DTIM)
- Power Management in Infrastructure Networks
- IBSS Power Management
- Timer Synchronization
- Infrastructure Timing Synchronization
- IBSS Timing Synchronization
- Spectrum Management
- Transmit Power Control (TPC)
- Basic operation of transmit power control
- Changes to the association process
- Changing the transmission power
- Transmit Power Control (TPC)
- Dynamic Frequency Selection (DFS)
- Basic operation of DFS
- Quieting the channel
- Measuring
- Radar scan
- IBSS operation
- Action Frames
- Measurement Request frame
- Measurement Report
- TPC Request and Report
- Channel Switch Announcement
- 9. Contention-Free Service with the PCF
- Contention-Free Access Using the PCF
- PCF Operation
- Reserving the medium during the contention-free period
- The polling list
- PCF Operation
- Transmissions from the Access Point
- Contention-Free Period Duration
- Contention-Free Access Using the PCF
- Detailed PCF Framing
- Contention-Free End (CF-End)
- CF-End+CF-Ack
- CF Parameter Set
- Power Management and the PCF
- 10. Physical Layer Overview
- Physical-Layer Architecture
- The Radio Link
- Licensing and Regulation
- Frequency allocation and unlicensed frequency bands
- Other unlicensed bands
- Licensing and Regulation
- Spread Spectrum
- Types of spread spectrum
- RF Propagation with 802.11
- Signal Reception and Performance
- The Shannon limit
- Signal Reception and Performance
- Path Loss, Range, and Throughput
- Multipath Interference
- Inter-Symbol Interference (ISI)
- RF Engineering for 802.11
- RF Components
- Antennas
- Amplifiers
- RF Components
- 11. The Frequency-Hopping (FH) PHY
- Frequency-Hopping Transmission
- 802.11 FH Details
- 802.11 Hop Sequences
- Joining an 802.11 Frequency-Hopping Network
- ISM Emission Rules and Maximum Throughput
- Effect of Interference
- Frequency-Hopping Transmission
- Gaussian Frequency Shift Keying (GFSK)
- 2-Level GFSK
- 4-Level GFSK
- FH PHY Convergence Procedure (PLCP)
- Framing and Whitening
- Frequency-Hopping PMD Sublayer
- PMD for 1.0-Mbps FH PHY
- PMD for 2.0-Mbps FH PHY
- Carrier sense/clear channel assessment (CS/CCA)
- Characteristics of the FH PHY
- 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
- Direct Sequence Transmission
- Encoding in 802.11 Direct Sequence Networks
- Radio Spectrum Usage in 802.11 Direct Sequence Networks
- Channel energy spread
- Adjacent channel rejection and channel separation
- Maximum theoretical throughput
- Interference response
- Direct Sequence Transmission
- Differential Phase Shift Keying (DPSK)
- Differential Binary Phase Shift Keying (DBPSK)
- Differential Quadrature Phase Shift Keying (DQPSK)
- The Original Direct Sequence PHY
- PLCP Framing and Processing
- DS Physical Medium Dependent Sublayer
- Transmission at 1.0 Mbps
- Transmission at 2.0 Mbps
- CS/CCA for the DS PHY
- Characteristics of the DS PHY
- Complementary Code Keying
- High Rate Direct Sequence PHY
- PLCP Framing and Scrambling
- HR/DSSS PMD
- Transmission at 1.0 Mbps or 2.0 Mbps
- Transmission at 5.5 Mbps with CCK
- Transmission at 11 Mbps with CCK
- Clear channel assessment
- Optional Features of the 802.11b PHY
- Characteristics of the HR/DSSS PHY
- 13. 802.11a and 802.11j: 5-GHz OFDM PHY
- Orthogonal Frequency Division Multiplexing (OFDM)
- Carrier Multiplexing
- Orthogonality Explained (Without Calculus)
- Guard Time
- Cyclic Extensions (Cyclic Prefixes)
- Windowing
- Orthogonal Frequency Division Multiplexing (OFDM)
- OFDM as Applied by 802.11a
- OFDM Parameter Choice for 802.11a
- Structure of an Operating Channel
- Subchannel modulation techniques
- Forward error correction with convolutional coding
- Subchannel interleaving
- Operating Channels
- OFDM PLCP
- Framing
- Preamble
- Header
- Data
- Trailer
- Framing
- OFDM PMD
- Encoding and Modulation
- Radio Performance: Sensitivity and Channel Rejection
- Clear Channel Assessment
- Transmission and Reception
- Acknowledgment
- An example of OFDM encoding
- Characteristics of the OFDM PHY
- 14. 802.11g: The Extended-Rate PHY (ERP)
- 802.11g Components
- Compatibility Changes
- Protection
- 802.11g Components
- ERP Physical Layer Convergence (PLCP)
- ERP-OFDM Framing
- Single-Carrier Framing with 802.11g
- PBCC coding
- DSSS-OFDM framing
- ERP Physical Medium Dependent (PMD) Layer
- Clear Channel Assessment (CCA)
- Reception Procedure
- Characteristics of the ERP PHY
- 15. A Peek Ahead at 802.11n: MIMO-OFDM
- Common Features
- Multiple-Input/Multiple-Output (MIMO)
- Channel Width
- MAC Efficiency Enhancements
- Common Features
- WWiSE
- MAC Enhancements
- Channels and radio modes
- Protection
- Aggregation, bursting, and acknowledgment
- MAC Enhancements
- The WWiSE MIMO PHY
- Structure of an operating channel
- Modulation and encoding
- Interleaver
- Space-time block coding
- Modulation rates
- MIMO and transmission modes
- WWiSE PLCP
- The SIGNAL-N field
- WWiSE PMD
- Characteristics of the WWiSE PHY
- TGnSync
- TGnSync MAC Enhancements
- Channels, radio modes, and coexistence
- Aggregation and bursting
- Protection
- Powersaving
- TGnSync MAC Enhancements
- TGnSync PHY Enhancements
- Structure of a channel
- Basic MIMO rates
- Transmit modes
- Optional coding
- Optional short guard interval
- TGnSync Physical Transmission (PLCP and PMD)
- Legacy header
- High Throughput header
- High-Throughput training fields
- Data, tail, and padding
- TGnSync PMD
- Comparison and Conclusions
- 16. 802.11 Hardware
- General Structure of an 802.11 Interface
- Software-Defined Radios: A Digression
- A Few Words on 802.11 Hardware Implementations
- Learning more about cards: FCC filings
- General Structure of an 802.11 Interface
- Implementation-Specific Behavior
- Rebooting Interface Cards
- Scanning and Roaming
- Rate Selection
- Reading the Specification Sheet
- Sensitivity Comparison
- Delay Spread
- 17. Using 802.11 on Windows
- Windows XP
- Card Installation
- Third-party 802.1X stacks and the driver update process
- Cisco client software
- Card Installation
- Choosing a Network
- Configuring Security Parameters and 802.1X
- Configuring EAP Methods
- EAP-TLS
- PEAP version 0
- Clearing credentials from the registry
- SecureW2: TTLS with ZeroConfig
- Windows XP
- WPA Configuration and Installation
- Windows 2000
- Dynamic WEP Configuration
- Windows Computer Authentication
- How It Works
- 18. 802.11 on the Macintosh
- The AirPort Extreme Card
- Software Installation
- Configuring and Monitoring an AirPort Interface
- Basic configuration with the AirPort status icon
- Configuration with the System Preferences application
- Monitoring the wireless interface
- The AirPort Extreme Card
- 802.1X on the AirPort
- Configuring EAP Methods
- TTLS configuration
- PEAP configuration
- Configuring EAP Methods
- The Keychain
- Adding to the keychain
- Troubleshooting
- 19. Using 802.11 on Linux
- PCMCIA Support on Linux
- PCMCIA Card Services Overview
- Interface names in Linux
- Hotplug system for automatic configuration
- PCMCIA Card Services Overview
- PCMCIA Card Services Installation
- Monitoring the Cards
- The lights are not useful
- PCMCIA Support on Linux
- Troubleshooting Resource Conflicts
- IRQs
- I/O ports
- Linux Wireless Extensions and Tools
- Compiling and Installing
- Interface Configuration with Wireless Tools and iwconfig
- Finding networks
- Setting the network name
- Setting the network channel
- Setting the network mode and associating with an access point
- Setting the data rate
- Configuring static WEP keys
- Tuning 802.11 parameters
- Agere (Lucent) Orinoco
- Compiling and Installing
- PCMCIA configuration
- Doing it yourself
- Compiling and Installing
- Configuring the orinoco_cs Interface
- Atheros-Based cards and MADwifi
- Driver Architecture and the Hardware Access Layer (HAL)
- Requirements
- Building the Driver
- Using the Driver
- 802.1X on Linux with xsupplicant
- Requirements
- Compiling and Installing xsupplicant
- Configuring xsupplicant
- Pseudorandom number generation
- Connecting and Authenticating to a Network
- WPA on Linux
- 20. Using 802.11 Access Points
- General Functions of an Access Point
- Types of Access Points
- For the home: residential gateways
- For the office: enterprise access points
- For the large office: wireless switches
- Types of Access Points
- General Functions of an Access Point
- Power over Ethernet (PoE)
- Types of PoE
- Selecting Access Points
- Are Access Points Really Necessary?
- Cisco 1200 Access Point
- Setting Up the 1200
- Configuring Radio Interfaces
- Internetworking
- Configuring Security
- Configuring WPA-PSK
- Monitoring
- Troubleshooting
- Apple AirPort
- First-Time Setup
- The Management Interface
- Configuring the wireless interface
- Configuration of the LAN interface
- Access control
- 21. Logical Wireless Network Architecture
- Evaluating a Logical Architecture
- Mobility
- Defining mobility
- Mobility
- Security
- Performance
- Backbone Engineering
- Beacons, BSSIDs, and VLAN integration
- IP addressing
- Evaluating a Logical Architecture
- Network Services
- DHCP
- Operating system login
- Client Integration
- Topology Examples
- Topology 1: The Monolithic Single-Subnet Network
- Mobility
- Address assignment through DHCP
- Security
- Backbone engineering
- Performance
- Client integration
- Topology 1: The Monolithic Single-Subnet Network
- Topology 2: E.T. Phone Home or Island Paradise
- Mobility
- Security
- Performance
- Backbone
- Client
- Topology 3: Dynamic VLAN Assignment
- Mobility
- Security
- Performance
- Backbone
- Client
- Topology 4: Virtual Access Points
- Mobility
- Security
- Performance
- Backbone
- Client
- Choosing Your Logical Architecture
- 22. Security Architecture
- Security Definition and Analysis
- Wireless LAN Security Problems
- Your credentials, please: authentication
- Secrecy over the air: encryption
- Secrecy and integrity of the whole network: rogue access points
- Network integrity: traffic injection
- Network availability: denial of service
- Network integrity and availability: rogue clients
- Network integrity: traffic separation
- Wireless LAN Security Problems
- Security Definition and Analysis
- Authentication and Access Control
- Station Authentication and Association
- Link-Layer Authentication
- WPA Personal (preshared key)
- 802.1X-based EAP authentication
- Network Layer Authentication
- Integrating User Authentication Through RADIUS
- RADIUS authentication and Microsoft Windows databases
- Ensuring Secrecy Through Encryption
- Static WEP
- Dynamic WEP Keying with 802.1X
- Improved RC4-Based Encryption: TKIP
- CCMP: Encryption with AES
- Higher Layer Security Protocols (IPsec, SSL, and SSH)
- Selecting Security Protocols
- Applying Security in the Protocol Stack
- Compound binding vulnerabilities
- Encryption
- Security certifications
- Network support
- Applying Security in the Protocol Stack
- Choose Authentication
- Choosing an EAP method
- Authentication architecture
- Choose Encryption
- Multiple SSID support
- Rogue Access Points
- Detection
- Physical Location
- Disabling Rogue APs
- And now, a word from your lawyers
- 23. Site Planning and Project Management
- Project Planning and Requirements
- Network Requirements
- Coverage Requirements
- Coverage and physical installation restrictions
- Coverage Requirements
- Performance Requirements
- Exploring the coverage/quality trade-off and total area throughput
- Client limitations
- Realistic throughput expectations
- Number of users per access point
- Mobility Requirements
- Network Integration Requirements
- Physical integration
- Logical integration
- Physical Layer Selection and Design
- 2.4 GHz (802.11b/g) Channel Layout
- Limitations of the 2.4 GHz channel layout
- 2.4 GHz (802.11b/g) Channel Layout
- 5 GHz (802.11a) Channel Layout
- Mixed Channel Layouts (802.11a+b/g Networks)
- Planning Access-Point Placement
- The Building
- Constraints on AP placement
- Buildings in progress
- The Building
- The Preliminary Plan
- The preliminary report
- Radio Resource Management and Channel Layout
- Refining and Testing the Plan
- Validation and test tools
- RF fingerprint collection
- Preparing the Final Report
- Using Antennas to Tailor Coverage
- Antenna Types
- Antenna cabling
- Antenna diversity
- Amplifiers: bring on the heat
- Antenna Types
- 24. 802.11 Network Analysis
- Network Analyzers
- 802.11 Network Analyzers
- Network Analyzers
- Ethereal
- Compilation and Installation
- Setting the Wireless Interface for Monitor Mode
- Cisco Aironet cards
- Prism cards
- Orinoco cards
- Atheros-based cards
- Running Ethereal
- Capturing data
- Data Reduction
- Capture filters
- Display filters
- Using Ethereal for 802.11 Analysis
- Display filters
- Understanding the LLC header to isolate a protocol
- 802.11 Network Analysis Checklist
- Display Filter Primitives
- Excluding Beacon frames
- Isolating traffic from one station
- Isolating a protocol
- Display Filter Primitives
- Common Troubleshooting Tasks
- Authentication troubleshooting
- Key distribution troubleshooting
- Performance troubleshooting
- Decrypting WEP traffic
- RADIUS analysis
- Other Tools
- Finding, Measuring, and Mapping Networks
- WEP Key Recovery
- Key recovery time estimates
- Authentication
- 25. 802.11 Performance Tuning
- 802.11 Performance Calculations
- Example Calculation
- Other components to a performance model
- Block acknowledgments
- Example Calculation
- 802.11 Performance Calculations
- Improving Performance
- Tunable 802.11 Parameters
- Radio Management
- Beacon interval
- RTS threshold
- Fragmentation threshold
- Retry limits
- Radio Management
- Tuning Power Management
- Listen interval
- DTIM Period
- ATIM window
- Timing Operations
- Scan timing
- Timers related to joining the network
- Dwell time (frequency-hopping networks only)
- Summary of Tunable Parameters
- 26. Conclusions and Predictions
- Standards Work
- New Standards
- Task group E: quality of service extensions
- Task group K: radio resources
- Task group N: high-throughput (100+ Mbps) MIMO PHY
- More distant standards
- Related standards
- New Standards
- Standards Work
- Current Trends in Wireless Networking
- Security
- Authentication protocols
- Admission control
- Rogue device control
- Security
- Deployment and Management
- Planning a network
- Backhaul
- Mini-"regulators and arbitrators
- Guest access
- Applications
- Location
- Voice
- Datacasting
- Protocol Architecture
- Federations and mobility
- Future protocols
- The End
- Glossary
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: 802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition Matthew S. Gast (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.