Foreword | |
Preface | |
Introduction to Wireless Networking | |
Why Wireless? | |
What Makes Wireless Networks Different | |
A Network by Any Other Name | |
Overview of 80 2.11 | |
Networks | |
IEEE 802 Network Technology Family Tree | |
802.11 Nomenclature and Design | |
802.11Network Operations | |
Mobility Support | |
802.11 MAC Fundamentals | |
Challenges for the MACMAC Access Modes and Timing | |
Contention-Based Access Using the DCF | |
Fragmentation and Reassembly | |
Frame Format | |
Encapsulation of Higher-Layer Protocols Within 80 2.11 | |
Contention-Based Data Service | |
Frame Processing and Bridging | |
802.11 Framing in Detail | |
Data Frames | |
Control Frames | |
Management Frames | |
Frame Transmission and Association and Authentication States | |
Wired Equivalent Privacy (WEP) | |
Cryptographic Background to WEPWEP Cryptographic Operations | |
Problems with WEP | |
Dynamic WEP | |
User Authentication with 802.1X | |
The Extensible Authentication Protoco | |
lEAP Methods | |
802.1X Network Port Authentication | |
802.1X on Wireless LANs | |
802.11i | |
Robust Security Networks, TKIP, and CCMPThe Temporal Key Integrity Protocol (TKIP)Counter Mode with CBC-MAC (CCMP)Robust Security Network (RSN) Operations | |
Management Operations | |
Management Architecture | |
Scanning | |
Authentication | |
Preauthentication | |
Association | |
Power Conservation | |
Timer Synchronization | |
Spectrum Management | |
Contention-Free Service with the PCF | |
Contention-Free Access Using the PCF | |
Detailed PCF Framing | |
Power Management and the PCF | |
Physical Layer Overview | |
Physical-Layer Architecture | |
The Radio Link | |
RF Propagation with 802.11 | |
RF Engineering for 802.11 | |
The Frequency-Hopping (FH) PHY | |
Frequency-Hopping Transmission | |
Gaussian Frequency Shift Keying (GFSK) | |
FH PHY Convergence Procedure (PLCP) | |
Frequency-Hopping PMD Sublayer | |
Characteristics of the FH PHY | |
The Direct Sequence PHYs | |
DSSS and HR/DSSS (802.11b) | |
Direct Sequence Transmission | |
Differential Phase Shift Keying (DPSK) | |
The "Original" Direct Sequence PHY | |
Complementary Code Keying | |
High Rate Direct Sequence PHY | |
802.11a and 802.11j 5-GHz OFDM PHY | |
Orthogonal Frequency Division Multiplexing (OFDM) | |
OFDM as Applied by 802.11aOFDM PLCPOFDM PMD | |
Characteristics of the OFDM PHY | |
802.11g The Extended-Rate PHY (ERP) | |
802.11g Components | |
ERP Physical Layer Convergence (PLCP) | |
ERP Physical Medium Dependent (PMD) Layer | |
A Peek Ahead at 802.11n MIMO-OFDMCommon Features | |
WWiSETGnSync | |
Comparison and Conclusions | |
802.11 | |
General Structure of an 802.11 | |
Implementation-Specific Behavior | |
Reading the Specification Sheet | |
Using 80 2.11 on Windows | |
Windows XPWindows 2000 | |
Windows Computer Authentication | |
802.11 on the Macintosh | |
The Air Port Extreme Card | |
802.1X on the Air Port | |
Using 80 2.11 on Linux | |
PCMCIA Support on Linux | |
Linux Wireless Extensions and Tools | |
Agere (Lucent) Orinoco | |
Atheros-Based cards and MADwifi | |
802.1X on Linux with xsupplicant | |
Using 80 2.11 Access Points | |
General Functions of an Access Point | |
Power over Ethernet (PoE) | |
Selecting Access Points | |
Cisco 1200 Access Point | |
Apple AirPort | |
Logical Wireless Network Architecture | |
Evaluating a Logical Architecture | |
Topology Examples | |
Choosing Your Logical Architecture | |
Security Architecture | |
Security Definition and Analysis | |
Authentication and Access Control | |
Ensuring Secrecy Through Encryption | |
Selecting Security Protocols | |
Rogue Access Points | |
Site Planning and Project Managemen | |
Project Planning and Requirements | |
Network Requirements | |
Physical Layer Selection and Design | |
Planning Access-Point Placement | |
Using Antennas to Tailor Coverage | |
802.11 Network Analysis | |
Network Analyzers | |
Ethereal 80 2.11 Network Analysis Checklist | |
Other Tools | |
802.11 Performance Tuning | |
80 2.11 Performance Calculations | |
Improving Performance | |
Tunable 802.11 Parameters | |
Conclusions and Predictions | |
Standards Work | |
Current Trends in Wireless Networking | |
The End | |
Glossary | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |