使用無線網(wǎng)絡(luò)是一種獲得解放的、自由的經(jīng)歷。但是在這種經(jīng)歷的背后存在著一個復(fù)雜的協(xié)議,并且當數(shù)據(jù)不只限于在物理線路上傳輸時,甚至?xí)a(chǎn)生一些更為復(fù)雜的問題。怎樣構(gòu)造網(wǎng)絡(luò)才能讓移動用戶活動自如?怎樣擴展無線網(wǎng)絡(luò)才能讓它在任何需要的地方都可用?無線網(wǎng)絡(luò)會產(chǎn)生哪些安全問題?怎樣把無線網(wǎng)絡(luò)調(diào)整到最佳性能?怎樣提供足夠的容量來支持最初希望的用戶?怎樣處理更多的用戶接入網(wǎng)絡(luò)所帶來的各種問題?.《802.11無線網(wǎng)絡(luò)權(quán)威指南》第二版討論了上述所有問題及其他相關(guān)問題。本書主要是為部署或維護無線網(wǎng)絡(luò)的嚴謹?shù)南到y(tǒng)管理員或網(wǎng)絡(luò)管理員編寫的。書中廣泛討論了無線網(wǎng)絡(luò)的安全問題,包括使用WEP標準的安全問題,并討論了動態(tài)WEP和802.1X、802.11i安全標準。由于對于任何嚴謹?shù)木W(wǎng)絡(luò)管理員來說,網(wǎng)絡(luò)監(jiān)視都是一項必須的工作,因此本書有專門的章節(jié)闡述如何使用Ethereal及其他工具進行網(wǎng)絡(luò)分析和排錯。..《802.11無線網(wǎng)絡(luò)權(quán)威指南》同時還介紹了無線網(wǎng)絡(luò)的最新發(fā)展。除了802.11b和11a標準之外,本書同時涵蓋802.11g,并前瞻了正在成為標準的802.11n協(xié)議。這個新的版本擴展了網(wǎng)絡(luò)規(guī)劃架構(gòu)的討論,并特別關(guān)注了訪問點之間的移動性、頻譜管理和功率控制。本書是目前唯一的講述了如何衡量無線網(wǎng)絡(luò)性能及如何調(diào)整網(wǎng)絡(luò)到最佳性能的工具書。最后,《802.11無線網(wǎng)絡(luò)權(quán)威指南》展示了怎樣配置無線網(wǎng)卡和Linux、Windows和MAC OS X系統(tǒng),以及怎樣處理訪問點。很少有一本書能夠把你需要掌握的理論和完成工作所需要的實際經(jīng)驗和建議有機地結(jié)合在一起?!?02.11無線網(wǎng)絡(luò)權(quán)威指南》就是這樣的一本好書。如果你負責管理無線網(wǎng)絡(luò),你就需要這本書。Matthew S. Gast是無線網(wǎng)絡(luò)規(guī)劃和部署方面的權(quán)威作者。...
Foreword Preface 1. Introduction to Wireless Networking Why Wireless? What Makes Wireless Networks Different A Network by Any Other Name... 2. Overview of 802.11 Networks IEEE 802 Network Technology Family Tree 802.11 Nomenclature and Design 802.11 Network Operations Mobility Support 3. 802.11 MAC Fundamentals Challenges for the MAC MAC Access Modes and Timing Contention-Based Access Using the DCF Fragmentation and Reassembly Frame Format Encapsulation of Higher-Layer Protocols Within 802.11 Contention-Based Data Service Frame Processing and Bridging 4. 802.11 Framing in Detail Data Frames Control Frames Management Frames Frame Transmission and Association and Authentication States 5. Wired Equivalent Privacy (WEP) Cryptographic Background to WEP WEP Cryptographic Operations Problems with WEP Dynamic WEP 6. User Authentication with 802.1X The Extensible Authentication Protocol EAP Methods 802.1X: Network Port Authentication 802.1X on Wireless LANs 7. 802.11i: Robust Security Networks, TKIP, and CCMP The Temporal Key Integrity Protocol (TKIP) Counter Mode with CBC-MAC (CCMP) Robust Security Network (RSN) Operations 8. Management Operations Management Architecture Scanning Authentication Preauthentication Association Power Conservation Timer Synchronization Spectrum Management 9. Contention-Free Service with the PCF Contention-Free Access Using the PCF Detailed PCF Framing Power Management and the PCF 10. Physical Layer Overview Physical-Layer Architecture The Radio Link RF Propagation with 802.11 RF Engineering for 802.11 11. The Frequency-Hopping (FH) PHY Frequency-Hopping Transmission Gaussian Frequency Shift Keying (GFSK) FH PHY Convergence Procedure (PLCP) Frequency-Hopping PMD Sublayer Characteristics of the FH PHY 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b) Direct Sequence Transmission Differential Phase Shift Keying (DPSK) The "Original" Direct Sequence PHY Complementary Code Keying High Rate Direct Sequence PHY 13. 802.11a and 802.11j: 5-GHz OFDM PHY Orthogonal Frequency Division Multiplexing (OFDM) OFDM as Applied by 802.11a OFDM PLCP OFDM PMD Characteristics of the OFDM PHY 14. 802.11g: The Extended-Rate PHY (ERP) 802.11g Components ERP Physical Layer Convergence (PLCP) ERP Physical Medium Dependent (PMD) Layer 15. A Peek Ahead at 802.11n: MIMO-OFDM Common Features WWiSE TGnSync Comparison and Conclusions 16. 802.11 Hardware General Structure of an 802.11 Interface Implementation-Specific Behavior Reading the Specification Sheet 17. Using 802.11 on Windows Windows XP Windows 2000 Windows Computer Authentication 18. 802.11 on the Macintosh The AirPort Extreme Card 802.1X on the AirPort 19. Using 802.11 on Linux PCMCIA Support on Linux Linux Wireless Extensions and Tools Agere (Lucent) Orinoco Atheros-Based cards and MADwifi 802.1X on Linux with xsupplicant 20. Using 802.11 Access Points General Functions of an Access Point Power over Ethernet (PoE) Selecting Access Points Cisco 1200 Access Point Apple AirPort 21. Logical Wireless Network Architecture Evaluating a Logical Architecture Topology Examples Choosing Your Logical Architecture 22. Security Architecture Security Definition and Analysis Authentication and Access Control Ensuring Secrecy Through Encryption Selecting Security Protocols Rogue Access Points 23. Site Planning and Project Management Project Planning and Requirements Network Requirements Physical Layer Selection and Design Planning Access-Point Placement Using Antennas to Tailor Coverage 24. 802.11 Network Analysis Network Analyzers Ethereal 802.11 Network Analysis Checklist Other Tools 25. 802.11 Performance Tuning 802.11 Performance Calculations Improving Performance Tunable 802.11 Parameters 26. Conclusions and Predictions Standards Work Current Trends in Wireless Networking The End Glossary Index