802.11 Wireless Networks: The Definitive Guide: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 1-5 of 82
... configuration examples. Chapter 21, Logical Wireless Network Architecture, marks the third transition in the book, from the implementation of 802.11 on the scale of an individual device, to how to build 802.11 networks on a larger scale ...
... configuration (moving or changing bits) while adding a user to a fixed network requires making physical connections (moving atoms), and mov- ing bits is easier than moving atoms. 2 | Chapter1: Introduction toWireless Networking * The ...
... , with its own ESSID, 802.11NomenclatureandDesign | 19 MAC address, authentication configuration, and encryption settings. Virtual APs are. This is the Title of the Book, eMatter Edition Multi-BSS environments: “virtual APs”
... configuration that will be discussed in Chapter 22. Current 802.11 radio chipsets have the ability to create 32 or even 64 BSSes, which is adequate for nearly every configuration. Robust security networks (RSNs) Early wireless LANs ...
... configuration is often called a “wireless bridge” configuration because it allows network engineers to connect two LANs at the link layer. Wireless bridges can be used to quickly connect distinct physical locations and are well-suited ...
Contents
1 | |
12 | |
32 | |
67 | |
Wired Equivalent Privacy WEP | 114 |
User Authentication with 8021X | 129 |
Robust Security Networks TKIP and CCMP | 149 |
Management Operations | 170 |
80211 Hardware | 343 |
Using 80211 on Windows | 353 |
80211 on the Macintosh | 373 |
Using 80211 on Linux | 387 |
Using 80211 Access Points | 415 |
Logical Wireless Network Architecture | 438 |
Security Architecture | 476 |
Site Planning and Project Management | 518 |
ContentionFree Service with the PCF | 214 |
Physical Layer Overview | 225 |
The FrequencyHopping FH PHY | 241 |
DSSS and HRDSSS 80211b | 253 |
5GHz OFDM PHY | 276 |
The ExtendedRate PHY ERP | 298 |
MIMOOFDM | 311 |
80211 Network Analysis | 553 |
80211 Performance Tuning | 573 |
Conclusions and Predictions | 585 |
Glossary | 597 |
Index | 598 |