802.11 Wireless Networks: The Definitive Guide: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 1-5 of 79
... WEP 114 WEP Cryptographic Operations 117 Problems with WEP 123 Dynamic WEP 127 6. User Authentication with 802.1X ... Key Integrity Protocol (TKIP) 149 Counter Mode with CBC-MAC (CCMP) 159 Robust Security Network (RSN) Operations 163 8 ...
... (WEP) protocol. In addition to new encryption schemes, 802.11i augments the confidentiality ser- vice by providing user-based authentication and key management services, two critical issues that WEP failed to address. MSDU delivery ...
... key management. Authentication and key management (AKM) Cryptographic integrity is worthless if it does not prevent ... WEP algorithm, using 40- or 104-bit secret keys, the Temporal Key Integrity Protocol (TKIP), or the Counter Mode CBC ...
... WEP-40 00-0F-AC 2 TKIP 00-0F-AC 3 Reserved 00-0F-AC 4 CCMPa 00-0F-AC 5 WEP-104 VendorOUI Anyvalue Defined byvendor a ... Key Management (AKM) suites (count + list) Like the pairwise cipher suite selector, there may be multiple ...
... WEP key for broadcast data in conjunction with a stronger unicast key. Although supported by the standard, this configuration should not be used unless absolutely necessary. Pairwise Replay Counter and Group Replay Counter Separate ...
Contents
1 | |
12 | |
32 | |
67 | |
Wired Equivalent Privacy WEP | 114 |
User Authentication with 8021X | 129 |
Robust Security Networks TKIP and CCMP | 149 |
Management Operations | 170 |
80211 Hardware | 343 |
Using 80211 on Windows | 353 |
80211 on the Macintosh | 373 |
Using 80211 on Linux | 387 |
Using 80211 Access Points | 415 |
Logical Wireless Network Architecture | 438 |
Security Architecture | 476 |
Site Planning and Project Management | 518 |
ContentionFree Service with the PCF | 214 |
Physical Layer Overview | 225 |
The FrequencyHopping FH PHY | 241 |
DSSS and HRDSSS 80211b | 253 |
5GHz OFDM PHY | 276 |
The ExtendedRate PHY ERP | 298 |
MIMOOFDM | 311 |
80211 Network Analysis | 553 |
80211 Performance Tuning | 573 |
Conclusions and Predictions | 585 |
Glossary | 597 |
Index | 598 |