802.11 Wireless Networks: The Definitive Guide: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 6-10 of 79
... MAC header and CRC PLCP header Replay detection Integrity validation Defragmentation (Reassembly) Decryption Duplicate frame/ fragment filtering MAC header and CRC validation PLCP validation Ethernet header translation FCS calculation ...
... MAC detects and removes duplicate frames. Frames may be duplicated for a variety of reasons, but one of the most ... header is translated into the simple Ether- net MAC header. a. The destination address, which is found in the Address 3 ...
... MAC header is constructed from the Ethernet MAC header. a. The Ethernet destination address is copied to the Address 1 field of the 802.11 MAC header. b. The BSSID is placed in the Address 2 field of the MAC header, as the sender of the ...
... MAC header, though. Most notable are the address fields, which depend on the value of the ToDS and FromDS bits. Duration. The Duration field carries the value of the Network Allocation Vector (NAV). Access to the medium is restricted for ...
... MAC address is the source address for frames. When frames are relayed through the access point, the access point uses its wireless interface as the transmitter address ... MAC header of a CTS. This is the Title of the Book, eMatter Edition.
Contents
1 | |
12 | |
32 | |
67 | |
Wired Equivalent Privacy WEP | 114 |
User Authentication with 8021X | 129 |
Robust Security Networks TKIP and CCMP | 149 |
Management Operations | 170 |
80211 Hardware | 343 |
Using 80211 on Windows | 353 |
80211 on the Macintosh | 373 |
Using 80211 on Linux | 387 |
Using 80211 Access Points | 415 |
Logical Wireless Network Architecture | 438 |
Security Architecture | 476 |
Site Planning and Project Management | 518 |
ContentionFree Service with the PCF | 214 |
Physical Layer Overview | 225 |
The FrequencyHopping FH PHY | 241 |
DSSS and HRDSSS 80211b | 253 |
5GHz OFDM PHY | 276 |
The ExtendedRate PHY ERP | 298 |
MIMOOFDM | 311 |
80211 Network Analysis | 553 |
80211 Performance Tuning | 573 |
Conclusions and Predictions | 585 |
Glossary | 597 |
Index | 598 |