802.11 Wireless Networks: The Definitive Guide: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 1-5 of 48
... TKIP, and CCMP . . . . . . . . . . . . . . . . . . . 149 The Temporal Key Integrity Protocol (TKIP) 149 Counter Mode with CBC-MAC (CCMP) 159 Robust Security Network (RSN) Operations 163 8. Management Operations ...
... TKIP, and CCMP, describes the 802.11i standard for wireless LAN security. In recognition of the fundamental flaws of WEP, two new link-layer encryption protocols were designed, complete with new mecha- nisms to derive and distribute ...
... (TKIP), or the Counter Mode CBC-MAC Protocol (CCMP). All of these algorithms are discussed in detail in Chapters 5 and 7. Origin authenticity TKIP and CCMP allow the receiver to validate the sender's MAC address to pre- vent spoofing ...
... TKIP to the market more quickly. It is identical to the Robust Security Net- work information element in Figure 4-50, but with the following changes: Management Frames | 105 • The element ID is 221, not 48. • A. This is the Title of the ...
... TKIP is the default cipher, rather than CCMP. • Preauthentication is not supported in WPA, so the preauthentication capabili- ties bit is always zero. Types. of. Management. Frames. The fixed fields and information elements are used in the ...
Contents
1 | |
12 | |
32 | |
67 | |
Wired Equivalent Privacy WEP | 114 |
User Authentication with 8021X | 129 |
Robust Security Networks TKIP and CCMP | 149 |
Management Operations | 170 |
80211 Hardware | 343 |
Using 80211 on Windows | 353 |
80211 on the Macintosh | 373 |
Using 80211 on Linux | 387 |
Using 80211 Access Points | 415 |
Logical Wireless Network Architecture | 438 |
Security Architecture | 476 |
Site Planning and Project Management | 518 |
ContentionFree Service with the PCF | 214 |
Physical Layer Overview | 225 |
The FrequencyHopping FH PHY | 241 |
DSSS and HRDSSS 80211b | 253 |
5GHz OFDM PHY | 276 |
The ExtendedRate PHY ERP | 298 |
MIMOOFDM | 311 |
80211 Network Analysis | 553 |
80211 Performance Tuning | 573 |
Conclusions and Predictions | 585 |
Glossary | 597 |
Index | 598 |