802.11 Wireless Networks: The Definitive Guide: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 6-10 of 93
... bytes bits 2 Protocol Type=data Subtype ToDS 2 4 1 0 0 0 1 0 1 FromDS 0 1 More Frag 1 Retry 1 Pwr Mgmt 1 More Data 1 Protected frame 1 Order 0000, Data 0010,Null Figure 4-8. IBSS data frame IBSS data frames have the subtype data or Null ...
... bytes bits 1000:Data+ CF-ACK 0100:Data+ CF-Poll 1100:Data+ CF-ACK+ CF-Poll 1010:CF-ACK 0110:CF-Poll 1110:CF-ACK+CF-Poll Figure 4-9. Data frames from the AP Nothing in the 802.11 specification forbids an access point from transmitting ...
... bytes bits 2 Frame Control Duration ID RA TA DA Seq- ctl Frame Body FCS 2 2 6 6 6 4 0–2,312 SA 6 bytes 2 Protocol Type = data Sub type To DS 2 4 1 0 0 1 0 1 1 From DS 1 1 More Frag 1 Retry 1 Pwr Mgmt 1 More Data 1 Protected frame 1 ...
... bytes Frame Control Duration Receiver Address Transmitter Address FCS bits 2 Protocol Type =control Sub type =RTS ToDS 2 4 1 0 0 1 0 0 1 From DS 0 1 More Frag 1 Retry 1 Pwr Mgmt 1 More Data 11 Order 1234567891011121314150 1 1 0 1 0 0 0 ...
... bytes 2 2 6 4 MAC header Frame Duration Receiver Address FCS bits 2 Protocol Type=control Subtype=CTS To DS 2 4 1 0 0 1 0 0 1 From DS 0 1 More Frag 1 Retry 1 Pwr Mgmt 1 More Data 11 Order 0 0 1 1 0 0 0 0 0 Control Protected Frame Figure ...
Contents
1 | |
12 | |
32 | |
67 | |
Wired Equivalent Privacy WEP | 114 |
User Authentication with 8021X | 129 |
Robust Security Networks TKIP and CCMP | 149 |
Management Operations | 170 |
80211 Hardware | 343 |
Using 80211 on Windows | 353 |
80211 on the Macintosh | 373 |
Using 80211 on Linux | 387 |
Using 80211 Access Points | 415 |
Logical Wireless Network Architecture | 438 |
Security Architecture | 476 |
Site Planning and Project Management | 518 |
ContentionFree Service with the PCF | 214 |
Physical Layer Overview | 225 |
The FrequencyHopping FH PHY | 241 |
DSSS and HRDSSS 80211b | 253 |
5GHz OFDM PHY | 276 |
The ExtendedRate PHY ERP | 298 |
MIMOOFDM | 311 |
80211 Network Analysis | 553 |
80211 Performance Tuning | 573 |
Conclusions and Predictions | 585 |
Glossary | 597 |
Index | 598 |