802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition
![Język publikacji: angielski Język publikacji: angielski](https://static01.helion.com.pl/global/flagi/1.png)
- Autor:
- Matthew S. Gast
![802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition Matthew S. Gast - okładka ebooka](https://static01.helion.com.pl/global/okladki/326x466/e_2gd4.png)
![802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition Matthew S. Gast - tył okładki ebooka](https://static01.helion.com.pl/global/okladki-tyl/326x466/e_2gd4.png)
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 672
- Dostępne formaty:
-
ePubMobi
Opis ebooka: 802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition
As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
- deployment considerations
- network monitoring and performance tuning
- wireless security issues
- how to use and select access points
- network monitoring essentials
- wireless card configuration
- security issues unique to wireless networks
Wybrane bestsellery
-
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.Author Matthew Gast...(52.67 zł najniższa cena z 30 dni)
52.57 zł
64.99 zł(-19%) -
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of t...(52.23 zł najniższa cena z 30 dni)
51.73 zł
64.99 zł(-20%) -
High-precision location information is increasingly useful for mobile application developers, since it allows devices to interact with the world around them. This practical book shows you how to achieve arm’s reach accuracy with iBeacons, simple transmitters that enable your applications to...
Building Applications with iBeacon. Proximity and Location Services with Bluetooth Low Energy Building Applications with iBeacon. Proximity and Location Services with Bluetooth Low Energy
(72.12 zł najniższa cena z 30 dni)72.07 zł
84.99 zł(-15%) -
This book offers a holistic view of edge computing and the IoT space, helping you develop a foundational set of skills and learn terminologies to explore the subject in greater depth.
Edge Computing Simplified. Explore all aspects of edge computing for business leaders and technologists Edge Computing Simplified. Explore all aspects of edge computing for business leaders and technologists
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę...
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska
(71.99 zł najniższa cena z 30 dni)71.89 zł
92.00 zł(-22%) -
This book will help you understand why a network source of truth is needed for long-term network automation success, which will in turn save you hundreds of hours in deploying and integrating Nautobot into network automation.
Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking
Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken Celenza, Christian Adell, Brad Haas
-
Мова Python сьогодні відома у всьому світі. Вона з...
Head First. Python. Легкий для сприйняття довідник Head First. Python. Легкий для сприйняття довідник
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
Ця книжка познайомить вас з особливостями Jav...
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
Ebooka "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-1952-6, 9781449319526
- Data wydania ebooka:
-
2005-04-25
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 25.5MB
- Rozmiar pliku Mobi:
- 50.5MB
Spis treści ebooka
- 802.11 Wireless Networks: The Definitive Guide
- Foreword
- Preface
- Prometheus Untethered: The Possibilities of Wireless LANs
- Audience
- Overture for Book in Black and White, Opus 2
- Major Changes from the First Edition
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- How to Contact Us
- Acknowledgments
- 1. Introduction to Wireless Networking
- Why Wireless?
- Radio Spectrum: The Key Resource
- The ISM bands
- Radio Spectrum: The Key Resource
- Why Wireless?
- What Makes Wireless Networks Different
- Lack of Physical Boundary
- Dynamic Physical Medium
- Security
- A Network by Any Other Name...
- The Wonderful Thing About Standards...
- 2. Overview of 802.11 Networks
- IEEE 802 Network Technology Family Tree
- 802.11 Nomenclature and Design
- Types of Networks
- Independent networks
- Infrastructure networks
- Extended service areas
- Multi-BSS environments: virtual APs
- Robust security networks (RSNs)
- Types of Networks
- The Distribution System, Revisited
- Interaccess point communication as part of the distribution system
- Wireless bridges and the distribution system
- Network Boundaries
- 802.11 Network Operations
- Network Services
- Station services
- Distribution system services
- Confidentiality and access control
- Spectrum management services
- Network Services
- Mobility Support
- Designing Networks for Mobility
- Proprietary mobility systems
- Designing Networks for Mobility
- 3. 802.11 MAC Fundamentals
- Challenges for the MAC
- RF Link Quality
- The Hidden Node Problem
- Challenges for the MAC
- MAC Access Modes and Timing
- Carrier-Sensing Functions and the Network Allocation Vector
- Interframe Spacing
- Interframe spacing and priority
- Contention-Based Access Using the DCF
- Error Recovery with the DCF
- Using the retry counters
- Error Recovery with the DCF
- Backoff with the DCF
- Fragmentation and Reassembly
- Frame Format
- Frame Control
- Duration/ID Field
- Duration: setting the NAV
- Frames transmitted during contention-free periods
- PS-Poll frames
- Address Fields
- Sequence Control Field
- Frame Body
- Frame Check Sequence
- Encapsulation of Higher-Layer Protocols Within 802.11
- Contention-Based Data Service
- Broadcast and Multicast Data or Management Frames
- Unicast Frames
- Basic positive acknowledgment (final fragment)
- Fragmentation
- RTS/CTS
- RTS/CTS with fragmentation
- Powersaving Sequences
- Immediate response
- Deferred response
- Multirate Support
- Rate selection and fallback
- Frame Processing and Bridging
- Wireless Medium to Wired Medium (802.11 to Ethernet)
- Wired Medium to Wireless Medium (Ethernet to 802.11)
- Quality of Service Extensions
- 4. 802.11 Framing in Detail
- Data Frames
- Frame Control
- Duration
- Addressing and DS Bits
- Variations on the Data Frame Theme
- Applied Data Framing
- IBSS frames
- Frames from the AP
- Frames to the AP
- Frames in a WDS
- Encrypted frames
- Data Frames
- Control Frames
- Common Frame Control Field
- Request to Send (RTS)
- Clear to Send (CTS)
- Acknowledgment (ACK)
- Power-Save Poll (PS-Poll)
- Management Frames
- The Structure of Management Frames
- Address fields
- Duration calculations
- Frame body
- The Structure of Management Frames
- Fixed-Length Management Frame Components
- Authentication Algorithm Number
- Authentication Transaction Sequence Number
- Beacon interval
- Capability Information
- Current AP Address
- Listen interval
- Association ID
- Timestamp
- Reason Code
- Status Code
- Management Frame Information Elements
- Service Set Identity (SSID)
- Supported Rates
- FH Parameter Set
- DS Parameter Set
- Traffic Indication Map (TIM)
- CF Parameter Set
- IBSS Parameter Set
- Country
- Hopping Pattern Parameters and Hopping Pattern Table
- Request
- Challenge Text
- Power Constraint
- Power Capability
- TPC Request
- TPC Report
- Supported Channels
- Channel Switch Announcement
- Measurement Request and Measurement Report
- Quiet
- IBSS DFS
- ERP Information
- Robust Security Network
- Extended Supported Rates
- Wi-Fi Protected Access (WPA)
- Types of Management Frames
- Beacon
- Probe Request
- Probe Response
- IBSS announcement traffic indication map (ATIM)
- Disassociation and Deauthentication
- Association Request
- Reassociation Request
- Association Response and Reassociation Response
- Authentication
- Action frame
- Frame Transmission and Association and Authentication States
- Frame Classes
- Class 1 frames
- Class 2 frames
- Class 3 frames
- Frame Classes
- 5. Wired Equivalent Privacy (WEP)
- Cryptographic Background to WEP
- Stream Cipher Security
- Cryptographic Politics
- Cryptographic Background to WEP
- WEP Cryptographic Operations
- WEP Data Processing
- WEP data transmission
- WEP key length
- Types of WEP keys
- Manual (static) versus automatic (dynamic) WEP
- WEP key numbering and storage
- WEP Data Processing
- WEP Encapsulation
- Problems with WEP
- Cryptographic Properties of RC4
- Design Flaws of the WEP System
- Key Recovery Attacks Against WEP
- Key recovery defenses
- Dynamic WEP
- 6. User Authentication with 802.1X
- The Extensible Authentication Protocol
- EAP Packet Format
- EAP Requests and Responses
- Type code 1: Identity
- Type code 2: Notification
- Type code 3: NAK
- EAP Authentication Methods
- EAP Success and Failure
- A Sample EAP Exchange
- The Extensible Authentication Protocol
- EAP Methods
- Cryptographic Methods
- LEAP
- Code 13: EAP-TLS
- Code 21: EAP-TTLS and Code 25: EAP-PEAP
- Cryptographic Methods
- Noncryptographic EAP Methods
- Code 4: MD-5 Challenge
- Code 6: Generic Token Card
- Code 29: EAP-MSCHAP-V2
- Code 18: EAP-SIM and Code 23: EAP-AKA
- Other Inner Authentication Methods
- Password Authentication Protocol (PAP)
- Challenge Handshake Authentication Protocol (CHAP)
- MS-CHAP, version 1
- 802.1X: Network Port Authentication
- 802.1X Architecture and Nomenclature
- 802.1X frame filtering
- 802.1X Architecture and Nomenclature
- EAPOL Encapsulation
- Addressing
- 802.1X on Wireless LANs
- Sample 802.1X Exchange on 802.11
- Dynamic keying
- Sample 802.1X Exchange on 802.11
- 7. 802.11i: Robust Security Networks, TKIP, and CCMP
- The Temporal Key Integrity Protocol (TKIP)
- TKIP Differences from WEP
- TKIP initialization vector use and key mixing
- TKIP sequence counter and replay protection
- The Michael integrity check and countermeasures
- TKIP Differences from WEP
- TKIP Data Processing and Operation
- TKIP key mixing and key construction
- TKI P data transmission
- TKIP reception
- The Temporal Key Integrity Protocol (TKIP)
- The Michael Integrity Check
- Michael data processing
- Michael countermeasures
- Counter Mode with CBC-MAC (CCMP)
- CCMP Data Processing
- CCMP data transmission
- CCMP reception
- CCMP Data Processing
- Robust Security Network (RSN) Operations
- 802.11i Key Hierarchy
- Pairwise key hierarchy
- Group key hierarchy
- 802.11i Key Hierarchy
- 802.11i Key Derivation and Distribution
- Updating pairwise keys: the four-way handshake
- Updating group keys: the group key handshake
- Mixing Encryption Types
- Key Caching
- 8. Management Operations
- Management Architecture
- Scanning
- Passive Scanning
- Active Scanning
- Scan Report
- Joining
- Authentication
- 802.11 Authentication
- Open-system authentication
- The legacy of shared-key authentication
- Defeating shared-key authentication
- 802.11 Authentication
- Preauthentication
- 802.11 Preauthentication
- 802.11i Preauthentication and Key Caching
- Association
- Association Procedure
- Reassociation Procedure
- Power Conservation
- Power Management in Infrastructure Networks
- Unicast frame buffering and delivery using the Traffic Indication Map (TIM)
- Delivering multicast and broadcast frames: the Delivery TIM (DTIM)
- Power Management in Infrastructure Networks
- IBSS Power Management
- Timer Synchronization
- Infrastructure Timing Synchronization
- IBSS Timing Synchronization
- Spectrum Management
- Transmit Power Control (TPC)
- Basic operation of transmit power control
- Changes to the association process
- Changing the transmission power
- Transmit Power Control (TPC)
- Dynamic Frequency Selection (DFS)
- Basic operation of DFS
- Quieting the channel
- Measuring
- Radar scan
- IBSS operation
- Action Frames
- Measurement Request frame
- Measurement Report
- TPC Request and Report
- Channel Switch Announcement
- 9. Contention-Free Service with the PCF
- Contention-Free Access Using the PCF
- PCF Operation
- Reserving the medium during the contention-free period
- The polling list
- PCF Operation
- Transmissions from the Access Point
- Contention-Free Period Duration
- Contention-Free Access Using the PCF
- Detailed PCF Framing
- Contention-Free End (CF-End)
- CF-End+CF-Ack
- CF Parameter Set
- Power Management and the PCF
- 10. Physical Layer Overview
- Physical-Layer Architecture
- The Radio Link
- Licensing and Regulation
- Frequency allocation and unlicensed frequency bands
- Other unlicensed bands
- Licensing and Regulation
- Spread Spectrum
- Types of spread spectrum
- RF Propagation with 802.11
- Signal Reception and Performance
- The Shannon limit
- Signal Reception and Performance
- Path Loss, Range, and Throughput
- Multipath Interference
- Inter-Symbol Interference (ISI)
- RF Engineering for 802.11
- RF Components
- Antennas
- Amplifiers
- RF Components
- 11. The Frequency-Hopping (FH) PHY
- Frequency-Hopping Transmission
- 802.11 FH Details
- 802.11 Hop Sequences
- Joining an 802.11 Frequency-Hopping Network
- ISM Emission Rules and Maximum Throughput
- Effect of Interference
- Frequency-Hopping Transmission
- Gaussian Frequency Shift Keying (GFSK)
- 2-Level GFSK
- 4-Level GFSK
- FH PHY Convergence Procedure (PLCP)
- Framing and Whitening
- Frequency-Hopping PMD Sublayer
- PMD for 1.0-Mbps FH PHY
- PMD for 2.0-Mbps FH PHY
- Carrier sense/clear channel assessment (CS/CCA)
- Characteristics of the FH PHY
- 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
- Direct Sequence Transmission
- Encoding in 802.11 Direct Sequence Networks
- Radio Spectrum Usage in 802.11 Direct Sequence Networks
- Channel energy spread
- Adjacent channel rejection and channel separation
- Maximum theoretical throughput
- Interference response
- Direct Sequence Transmission
- Differential Phase Shift Keying (DPSK)
- Differential Binary Phase Shift Keying (DBPSK)
- Differential Quadrature Phase Shift Keying (DQPSK)
- The Original Direct Sequence PHY
- PLCP Framing and Processing
- DS Physical Medium Dependent Sublayer
- Transmission at 1.0 Mbps
- Transmission at 2.0 Mbps
- CS/CCA for the DS PHY
- Characteristics of the DS PHY
- Complementary Code Keying
- High Rate Direct Sequence PHY
- PLCP Framing and Scrambling
- HR/DSSS PMD
- Transmission at 1.0 Mbps or 2.0 Mbps
- Transmission at 5.5 Mbps with CCK
- Transmission at 11 Mbps with CCK
- Clear channel assessment
- Optional Features of the 802.11b PHY
- Characteristics of the HR/DSSS PHY
- 13. 802.11a and 802.11j: 5-GHz OFDM PHY
- Orthogonal Frequency Division Multiplexing (OFDM)
- Carrier Multiplexing
- Orthogonality Explained (Without Calculus)
- Guard Time
- Cyclic Extensions (Cyclic Prefixes)
- Windowing
- Orthogonal Frequency Division Multiplexing (OFDM)
- OFDM as Applied by 802.11a
- OFDM Parameter Choice for 802.11a
- Structure of an Operating Channel
- Subchannel modulation techniques
- Forward error correction with convolutional coding
- Subchannel interleaving
- Operating Channels
- OFDM PLCP
- Framing
- Preamble
- Header
- Data
- Trailer
- Framing
- OFDM PMD
- Encoding and Modulation
- Radio Performance: Sensitivity and Channel Rejection
- Clear Channel Assessment
- Transmission and Reception
- Acknowledgment
- An example of OFDM encoding
- Characteristics of the OFDM PHY
- 14. 802.11g: The Extended-Rate PHY (ERP)
- 802.11g Components
- Compatibility Changes
- Protection
- 802.11g Components
- ERP Physical Layer Convergence (PLCP)
- ERP-OFDM Framing
- Single-Carrier Framing with 802.11g
- PBCC coding
- DSSS-OFDM framing
- ERP Physical Medium Dependent (PMD) Layer
- Clear Channel Assessment (CCA)
- Reception Procedure
- Characteristics of the ERP PHY
- 15. A Peek Ahead at 802.11n: MIMO-OFDM
- Common Features
- Multiple-Input/Multiple-Output (MIMO)
- Channel Width
- MAC Efficiency Enhancements
- Common Features
- WWiSE
- MAC Enhancements
- Channels and radio modes
- Protection
- Aggregation, bursting, and acknowledgment
- MAC Enhancements
- The WWiSE MIMO PHY
- Structure of an operating channel
- Modulation and encoding
- Interleaver
- Space-time block coding
- Modulation rates
- MIMO and transmission modes
- WWiSE PLCP
- The SIGNAL-N field
- WWiSE PMD
- Characteristics of the WWiSE PHY
- TGnSync
- TGnSync MAC Enhancements
- Channels, radio modes, and coexistence
- Aggregation and bursting
- Protection
- Powersaving
- TGnSync MAC Enhancements
- TGnSync PHY Enhancements
- Structure of a channel
- Basic MIMO rates
- Transmit modes
- Optional coding
- Optional short guard interval
- TGnSync Physical Transmission (PLCP and PMD)
- Legacy header
- High Throughput header
- High-Throughput training fields
- Data, tail, and padding
- TGnSync PMD
- Comparison and Conclusions
- 16. 802.11 Hardware
- General Structure of an 802.11 Interface
- Software-Defined Radios: A Digression
- A Few Words on 802.11 Hardware Implementations
- Learning more about cards: FCC filings
- General Structure of an 802.11 Interface
- Implementation-Specific Behavior
- Rebooting Interface Cards
- Scanning and Roaming
- Rate Selection
- Reading the Specification Sheet
- Sensitivity Comparison
- Delay Spread
- 17. Using 802.11 on Windows
- Windows XP
- Card Installation
- Third-party 802.1X stacks and the driver update process
- Cisco client software
- Card Installation
- Choosing a Network
- Configuring Security Parameters and 802.1X
- Configuring EAP Methods
- EAP-TLS
- PEAP version 0
- Clearing credentials from the registry
- SecureW2: TTLS with ZeroConfig
- Windows XP
- WPA Configuration and Installation
- Windows 2000
- Dynamic WEP Configuration
- Windows Computer Authentication
- How It Works
- 18. 802.11 on the Macintosh
- The AirPort Extreme Card
- Software Installation
- Configuring and Monitoring an AirPort Interface
- Basic configuration with the AirPort status icon
- Configuration with the System Preferences application
- Monitoring the wireless interface
- The AirPort Extreme Card
- 802.1X on the AirPort
- Configuring EAP Methods
- TTLS configuration
- PEAP configuration
- Configuring EAP Methods
- The Keychain
- Adding to the keychain
- Troubleshooting
- 19. Using 802.11 on Linux
- PCMCIA Support on Linux
- PCMCIA Card Services Overview
- Interface names in Linux
- Hotplug system for automatic configuration
- PCMCIA Card Services Overview
- PCMCIA Card Services Installation
- Monitoring the Cards
- The lights are not useful
- PCMCIA Support on Linux
- Troubleshooting Resource Conflicts
- IRQs
- I/O ports
- Linux Wireless Extensions and Tools
- Compiling and Installing
- Interface Configuration with Wireless Tools and iwconfig
- Finding networks
- Setting the network name
- Setting the network channel
- Setting the network mode and associating with an access point
- Setting the data rate
- Configuring static WEP keys
- Tuning 802.11 parameters
- Agere (Lucent) Orinoco
- Compiling and Installing
- PCMCIA configuration
- Doing it yourself
- Compiling and Installing
- Configuring the orinoco_cs Interface
- Atheros-Based cards and MADwifi
- Driver Architecture and the Hardware Access Layer (HAL)
- Requirements
- Building the Driver
- Using the Driver
- 802.1X on Linux with xsupplicant
- Requirements
- Compiling and Installing xsupplicant
- Configuring xsupplicant
- Pseudorandom number generation
- Connecting and Authenticating to a Network
- WPA on Linux
- 20. Using 802.11 Access Points
- General Functions of an Access Point
- Types of Access Points
- For the home: residential gateways
- For the office: enterprise access points
- For the large office: wireless switches
- Types of Access Points
- General Functions of an Access Point
- Power over Ethernet (PoE)
- Types of PoE
- Selecting Access Points
- Are Access Points Really Necessary?
- Cisco 1200 Access Point
- Setting Up the 1200
- Configuring Radio Interfaces
- Internetworking
- Configuring Security
- Configuring WPA-PSK
- Monitoring
- Troubleshooting
- Apple AirPort
- First-Time Setup
- The Management Interface
- Configuring the wireless interface
- Configuration of the LAN interface
- Access control
- 21. Logical Wireless Network Architecture
- Evaluating a Logical Architecture
- Mobility
- Defining mobility
- Mobility
- Security
- Performance
- Backbone Engineering
- Beacons, BSSIDs, and VLAN integration
- IP addressing
- Evaluating a Logical Architecture
- Network Services
- DHCP
- Operating system login
- Client Integration
- Topology Examples
- Topology 1: The Monolithic Single-Subnet Network
- Mobility
- Address assignment through DHCP
- Security
- Backbone engineering
- Performance
- Client integration
- Topology 1: The Monolithic Single-Subnet Network
- Topology 2: E.T. Phone Home or Island Paradise
- Mobility
- Security
- Performance
- Backbone
- Client
- Topology 3: Dynamic VLAN Assignment
- Mobility
- Security
- Performance
- Backbone
- Client
- Topology 4: Virtual Access Points
- Mobility
- Security
- Performance
- Backbone
- Client
- Choosing Your Logical Architecture
- 22. Security Architecture
- Security Definition and Analysis
- Wireless LAN Security Problems
- Your credentials, please: authentication
- Secrecy over the air: encryption
- Secrecy and integrity of the whole network: rogue access points
- Network integrity: traffic injection
- Network availability: denial of service
- Network integrity and availability: rogue clients
- Network integrity: traffic separation
- Wireless LAN Security Problems
- Security Definition and Analysis
- Authentication and Access Control
- Station Authentication and Association
- Link-Layer Authentication
- WPA Personal (preshared key)
- 802.1X-based EAP authentication
- Network Layer Authentication
- Integrating User Authentication Through RADIUS
- RADIUS authentication and Microsoft Windows databases
- Ensuring Secrecy Through Encryption
- Static WEP
- Dynamic WEP Keying with 802.1X
- Improved RC4-Based Encryption: TKIP
- CCMP: Encryption with AES
- Higher Layer Security Protocols (IPsec, SSL, and SSH)
- Selecting Security Protocols
- Applying Security in the Protocol Stack
- Compound binding vulnerabilities
- Encryption
- Security certifications
- Network support
- Applying Security in the Protocol Stack
- Choose Authentication
- Choosing an EAP method
- Authentication architecture
- Choose Encryption
- Multiple SSID support
- Rogue Access Points
- Detection
- Physical Location
- Disabling Rogue APs
- And now, a word from your lawyers
- 23. Site Planning and Project Management
- Project Planning and Requirements
- Network Requirements
- Coverage Requirements
- Coverage and physical installation restrictions
- Coverage Requirements
- Performance Requirements
- Exploring the coverage/quality trade-off and total area throughput
- Client limitations
- Realistic throughput expectations
- Number of users per access point
- Mobility Requirements
- Network Integration Requirements
- Physical integration
- Logical integration
- Physical Layer Selection and Design
- 2.4 GHz (802.11b/g) Channel Layout
- Limitations of the 2.4 GHz channel layout
- 2.4 GHz (802.11b/g) Channel Layout
- 5 GHz (802.11a) Channel Layout
- Mixed Channel Layouts (802.11a+b/g Networks)
- Planning Access-Point Placement
- The Building
- Constraints on AP placement
- Buildings in progress
- The Building
- The Preliminary Plan
- The preliminary report
- Radio Resource Management and Channel Layout
- Refining and Testing the Plan
- Validation and test tools
- RF fingerprint collection
- Preparing the Final Report
- Using Antennas to Tailor Coverage
- Antenna Types
- Antenna cabling
- Antenna diversity
- Amplifiers: bring on the heat
- Antenna Types
- 24. 802.11 Network Analysis
- Network Analyzers
- 802.11 Network Analyzers
- Network Analyzers
- Ethereal
- Compilation and Installation
- Setting the Wireless Interface for Monitor Mode
- Cisco Aironet cards
- Prism cards
- Orinoco cards
- Atheros-based cards
- Running Ethereal
- Capturing data
- Data Reduction
- Capture filters
- Display filters
- Using Ethereal for 802.11 Analysis
- Display filters
- Understanding the LLC header to isolate a protocol
- 802.11 Network Analysis Checklist
- Display Filter Primitives
- Excluding Beacon frames
- Isolating traffic from one station
- Isolating a protocol
- Display Filter Primitives
- Common Troubleshooting Tasks
- Authentication troubleshooting
- Key distribution troubleshooting
- Performance troubleshooting
- Decrypting WEP traffic
- RADIUS analysis
- Other Tools
- Finding, Measuring, and Mapping Networks
- WEP Key Recovery
- Key recovery time estimates
- Authentication
- 25. 802.11 Performance Tuning
- 802.11 Performance Calculations
- Example Calculation
- Other components to a performance model
- Block acknowledgments
- Example Calculation
- 802.11 Performance Calculations
- Improving Performance
- Tunable 802.11 Parameters
- Radio Management
- Beacon interval
- RTS threshold
- Fragmentation threshold
- Retry limits
- Radio Management
- Tuning Power Management
- Listen interval
- DTIM Period
- ATIM window
- Timing Operations
- Scan timing
- Timers related to joining the network
- Dwell time (frequency-hopping networks only)
- Summary of Tunable Parameters
- 26. Conclusions and Predictions
- Standards Work
- New Standards
- Task group E: quality of service extensions
- Task group K: radio resources
- Task group N: high-throughput (100+ Mbps) MIMO PHY
- More distant standards
- Related standards
- New Standards
- Standards Work
- Current Trends in Wireless Networking
- Security
- Authentication protocols
- Admission control
- Rogue device control
- Security
- Deployment and Management
- Planning a network
- Backhaul
- Mini-"regulators and arbitrators
- Guest access
- Applications
- Location
- Voice
- Datacasting
- Protocol Architecture
- Federations and mobility
- Future protocols
- The End
- Glossary
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(203.15 zł najniższa cena z 30 dni)
209.34 zł
249.00 zł(-16%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(237.15 zł najniższa cena z 30 dni)
250.75 zł
289.00 zł(-13%) -
Frontend developers have to consider many things: browser compatibility, usability, performance, scalability, SEO, and other best practices. But the most fundamental aspect of creating websites is one that often falls short: accessibility. Accessibility is the cornerstone of any website, and if a...(194.65 zł najniższa cena z 30 dni)
208.35 zł
249.00 zł(-16%) -
In this insightful and comprehensive guide, Addy Osmani shares more than a decade of experience working on the Chrome team at Google, uncovering secrets to engineering effectiveness, efficiency, and team success. Engineers and engineering leaders looking to scale their effectiveness and drive tra...(118.15 zł najniższa cena z 30 dni)
122.29 zł
149.00 zł(-18%) -
Data modeling is the single most overlooked feature in Power BI Desktop, yet it's what sets Power BI apart from other tools on the market. This practical book serves as your fast-forward button for data modeling with Power BI, Analysis Services tabular, and SQL databases. It serves as a starting ...(194.65 zł najniższa cena z 30 dni)
207.75 zł
249.00 zł(-17%) -
C# is undeniably one of the most versatile programming languages available to engineers today. With this comprehensive guide, you'll learn just how powerful the combination of C# and .NET can be. Author Ian Griffiths guides you through C# 12.0 and .NET 8 fundamentals and techniques for building c...(228.65 zł najniższa cena z 30 dni)
251.14 zł
289.00 zł(-13%) -
Learn how to get started with Futures Thinking. With this practical guide, Phil Balagtas, founder of the Design Futures Initiative and the global Speculative Futures network, shows you how designers and futurists have made futures work at companies such as Atari, IBM, Apple, Disney, Autodesk, Luf...(152.15 zł najniższa cena z 30 dni)
156.85 zł
189.00 zł(-17%) -
Augmented Analytics isn't just another book on data and analytics; it's a holistic resource for reimagining the way your entire organization interacts with information to become insight-driven.Moving beyond traditional, limited ways of making sense of data, Augmented Analytics provides a dynamic,...(177.65 zł najniższa cena z 30 dni)
182.55 zł
219.00 zł(-17%) -
Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez ...
Kubernetes and Cloud Native Associate (KCNA) Study Guide Kubernetes and Cloud Native Associate (KCNA) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
209.00 zł(-15%) -
Python is an excellent way to get started in programming, and this clear, concise guide walks you through Python a step at a time—beginning with basic programming concepts before moving on to functions, data structures, and object-oriented design. This revised third edition reflects the gro...(150.02 zł najniższa cena z 30 dni)
149.92 zł
179.00 zł(-16%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
![Loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
![ajax-loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
Oceny i opinie klientów: 802.11 Wireless Networks: The Definitive Guide. The Definitive Guide. 2nd Edition Matthew S. Gast (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.