๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

802.11 Wireless Networks: Security and Analysis

โœ Scribed by Alan Holt, Chi-Yu Huang (auth.)


Publisher
Springer-Verlag London
Year
2010
Tongue
English
Leaves
224
Series
Computer Communications and Networks
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11.

This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment.

Topics and Features:

  • Presents a practical approach supported by the extensive use of examples and detailed instructions
  • Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks
  • Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple
  • Examines issues of wireless security and describes how to implement a wireless network with enterprise security
  • Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer
  • Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment.

A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking.

Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language.

Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.

โœฆ Table of Contents


Front Matter....Pages I-XXI
Introduction....Pages 1-13
Radio Frequencies....Pages 15-34
Medium Access Control....Pages 35-50
Physical Layer....Pages 53-74
Cryptography....Pages 75-99
Wireless Security....Pages 101-110
Configuring Wireless Networks....Pages 111-134
Robust Security Network....Pages 139-158
MAC Layer Performance Analysis....Pages 159-170
Link Rate Adaptation....Pages 171-188
Back Matter....Pages 185-212

โœฆ Subjects


Computer Communication Networks


๐Ÿ“œ SIMILAR VOLUMES


802.11 Wireless Networks: Security and A
โœ Alan Holt, Chi-Yu Huang (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p><p>Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless

802.11 Wireless Networks: Security and A
โœ Alan Holt, Chi-Yu Huang (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p><p>Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless

Building Secure Wireless Networks with 8
โœ Jahanzeb Khan, Anis Khwaja ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley ๐ŸŒ English

<ul><li>Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology<li>Authors are Wi-Fi security experts who are able to address the firestorm of concerns about security for 802.11b networks<li>Offers a clear perspective of inte

Building Secure Wireless Networks with 8
โœ Jahanzeb Khan, Anis Khwaja ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley Pub ๐ŸŒ English

* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * Authors are Wi-Fi security experts who are able to address the firestorm of concerns about security for 802.11b networks * Offers a clear perspective of inter

Build ing Secure Wireless Networks with
โœ Jahanzeb Khan, Anis Khwaja ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley ๐ŸŒ English

* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * Authors are Wi-Fi security experts who are able to address the firestorm of concerns about security for 802.11b networks * Offers a clear perspective of interoperabi