日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)網(wǎng)絡(luò)與數(shù)據(jù)通信網(wǎng)絡(luò)通信綜合802.11無線網(wǎng)絡(luò)權(quán)威指南(影印版)

802.11無線網(wǎng)絡(luò)權(quán)威指南(影印版)

802.11無線網(wǎng)絡(luò)權(quán)威指南(影印版)

定 價:¥82.00

作 者: (美)加斯特
出版社: 東南大學(xué)出版社
叢編項: 東南大學(xué)出版社O'REILLY圖書系列
標 簽: 暫缺

ISBN: 9787564103163 出版時間: 2006-04-01 包裝: 平裝
開本: 16開 頁數(shù): 630 字數(shù):  

內(nèi)容簡介

  使用無線網(wǎng)絡(luò)是一種獲得解放的、自由的經(jīng)歷。但是在這種經(jīng)歷的背后存在著一個復(fù)雜的協(xié)議,并且當數(shù)據(jù)不只限于在物理線路上傳輸時,甚至?xí)a(chǎn)生一些更為復(fù)雜的問題。怎樣構(gòu)造網(wǎng)絡(luò)才能讓移動用戶活動自如?怎樣擴展無線網(wǎng)絡(luò)才能讓它在任何需要的地方都可用?無線網(wǎng)絡(luò)會產(chǎn)生哪些安全問題?怎樣把無線網(wǎng)絡(luò)調(diào)整到最佳性能?怎樣提供足夠的容量來支持最初希望的用戶?怎樣處理更多的用戶接入網(wǎng)絡(luò)所帶來的各種問題?.《802.11無線網(wǎng)絡(luò)權(quán)威指南》第二版討論了上述所有問題及其他相關(guān)問題。本書主要是為部署或維護無線網(wǎng)絡(luò)的嚴謹?shù)南到y(tǒng)管理員或網(wǎng)絡(luò)管理員編寫的。書中廣泛討論了無線網(wǎng)絡(luò)的安全問題,包括使用WEP標準的安全問題,并討論了動態(tài)WEP和802.1X、802.11i安全標準。由于對于任何嚴謹?shù)木W(wǎng)絡(luò)管理員來說,網(wǎng)絡(luò)監(jiān)視都是一項必須的工作,因此本書有專門的章節(jié)闡述如何使用Ethereal及其他工具進行網(wǎng)絡(luò)分析和排錯。..《802.11無線網(wǎng)絡(luò)權(quán)威指南》同時還介紹了無線網(wǎng)絡(luò)的最新發(fā)展。除了802.11b和11a標準之外,本書同時涵蓋802.11g,并前瞻了正在成為標準的802.11n協(xié)議。這個新的版本擴展了網(wǎng)絡(luò)規(guī)劃架構(gòu)的討論,并特別關(guān)注了訪問點之間的移動性、頻譜管理和功率控制。本書是目前唯一的講述了如何衡量無線網(wǎng)絡(luò)性能及如何調(diào)整網(wǎng)絡(luò)到最佳性能的工具書。最后,《802.11無線網(wǎng)絡(luò)權(quán)威指南》展示了怎樣配置無線網(wǎng)卡和Linux、Windows和MAC OS X系統(tǒng),以及怎樣處理訪問點。很少有一本書能夠把你需要掌握的理論和完成工作所需要的實際經(jīng)驗和建議有機地結(jié)合在一起?!?02.11無線網(wǎng)絡(luò)權(quán)威指南》就是這樣的一本好書。如果你負責管理無線網(wǎng)絡(luò),你就需要這本書。Matthew S. Gast是無線網(wǎng)絡(luò)規(guī)劃和部署方面的權(quán)威作者。...

作者簡介

  MatthewS.Gast是無線網(wǎng)絡(luò)規(guī)劃和部署方面的權(quán)威作者。

圖書目錄

Foreword
Preface
1. Introduction to Wireless Networking
Why Wireless?
What Makes Wireless Networks Different
A Network by Any Other Name...
2. Overview of 802.11 Networks
IEEE 802 Network Technology Family Tree
802.11 Nomenclature and Design
802.11 Network Operations
Mobility Support
3. 802.11 MAC Fundamentals
Challenges for the MAC
MAC Access Modes and Timing
Contention-Based Access Using the DCF
Fragmentation and Reassembly
Frame Format
Encapsulation of Higher-Layer Protocols Within 802.11
Contention-Based Data Service
Frame Processing and Bridging
4. 802.11 Framing in Detail
Data Frames
Control Frames
Management Frames
Frame Transmission and Association and Authentication States
5. Wired Equivalent Privacy (WEP)
Cryptographic Background to WEP
WEP Cryptographic Operations
Problems with WEP
Dynamic WEP
6. User Authentication with 802.1X
The Extensible Authentication Protocol
EAP Methods
802.1X: Network Port Authentication
802.1X on Wireless LANs
7. 802.11i: Robust Security Networks, TKIP, and CCMP
The Temporal Key Integrity Protocol (TKIP)
Counter Mode with CBC-MAC (CCMP)
Robust Security Network (RSN) Operations
8. Management Operations
Management Architecture
Scanning
Authentication
Preauthentication
Association
Power Conservation
Timer Synchronization
Spectrum Management
9. Contention-Free Service with the PCF
Contention-Free Access Using the PCF
Detailed PCF Framing
Power Management and the PCF
10. Physical Layer Overview
Physical-Layer Architecture
The Radio Link
RF Propagation with 802.11
RF Engineering for 802.11
11. The Frequency-Hopping (FH) PHY
Frequency-Hopping Transmission
Gaussian Frequency Shift Keying (GFSK)
FH PHY Convergence Procedure (PLCP)
Frequency-Hopping PMD Sublayer
Characteristics of the FH PHY
12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
Direct Sequence Transmission
Differential Phase Shift Keying (DPSK)
The "Original" Direct Sequence PHY
Complementary Code Keying
High Rate Direct Sequence PHY
13. 802.11a and 802.11j: 5-GHz OFDM PHY
Orthogonal Frequency Division Multiplexing (OFDM)
OFDM as Applied by 802.11a
OFDM PLCP
OFDM PMD
Characteristics of the OFDM PHY
14. 802.11g: The Extended-Rate PHY (ERP)
802.11g Components
ERP Physical Layer Convergence (PLCP)
ERP Physical Medium Dependent (PMD) Layer
15. A Peek Ahead at 802.11n: MIMO-OFDM
Common Features
WWiSE
TGnSync
Comparison and Conclusions
16. 802.11 Hardware
General Structure of an 802.11 Interface
Implementation-Specific Behavior
Reading the Specification Sheet
17. Using 802.11 on Windows
Windows XP
Windows 2000
Windows Computer Authentication
18. 802.11 on the Macintosh
The AirPort Extreme Card
802.1X on the AirPort
19. Using 802.11 on Linux
PCMCIA Support on Linux
Linux Wireless Extensions and Tools
Agere (Lucent) Orinoco
Atheros-Based cards and MADwifi
802.1X on Linux with xsupplicant
20. Using 802.11 Access Points
General Functions of an Access Point
Power over Ethernet (PoE)
Selecting Access Points
Cisco 1200 Access Point
Apple AirPort
21. Logical Wireless Network Architecture
Evaluating a Logical Architecture
Topology Examples
Choosing Your Logical Architecture
22. Security Architecture
Security Definition and Analysis
Authentication and Access Control
Ensuring Secrecy Through Encryption
Selecting Security Protocols
Rogue Access Points
23. Site Planning and Project Management
Project Planning and Requirements
Network Requirements
Physical Layer Selection and Design
Planning Access-Point Placement
Using Antennas to Tailor Coverage
24. 802.11 Network Analysis
Network Analyzers
Ethereal
802.11 Network Analysis Checklist
Other Tools
25. 802.11 Performance Tuning
802.11 Performance Calculations
Improving Performance
Tunable 802.11 Parameters
26. Conclusions and Predictions
Standards Work
Current Trends in Wireless Networking
The End
Glossary
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號