802.11 Wireless Networks

Security and Analysis

By Alan Holt , Chi-Yu Huang

802.11 Wireless Networks Cover Image

This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions.  The text is supported by examples and detailed instructions.

Full Description

  • ISBN13: 978-1-8499-6274-2
  • 236 Pages
  • User Level: Science
  • Publication Date: June 25, 2010
  • Available eBook Formats: PDF
  • eBook Price: $119.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyze performance in a WLAN environment. Topics and Features: presents a practical approach supported by the extensive use of examples and detailed instructions; discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks; provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple; examines issues of wireless security and describes how to implement a wireless network with enterprise security; investigates the medium access control sub-layer, and models for performance analysis of the MAC layer; reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
Table of Contents

Table of Contents

  1. Introduction.
  2. Radio Frequencies.
  3. Medium Access Control.
  4. Physical Layer.
  5. Cryptography.
  6. Wireless Security.
  7. Configuring Wireless Networks.
  8. Robust Security Network.
  9. MAC Layer Performance Analysis.
  10. Link Rate Adaptation.
  11. Build a Xen Server.
  12. Initial Configuration of Access
  13. point Controllers.
Errata

Please Login to submit errata.

No errata are currently published