|
|
|||
|
||||
OverviewThis book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: * To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. * To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. * To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and gra- ate level students. It is intended as a companion for a university course on wireless networking. A practical approach is adopted in this book; examples are provided throughout, supported by detailed instructions. We cover a number of wireless vendors; namely, Cisco's Aironet, Alactel-Lucent's Omniaccess and Meru Networks. While separate vendors, all three systems have a Cisco IOS-like command-line interface. The GNU/Linux operating system is used extensively throughout this book. Full Product DetailsAuthor: Alan Holt , Chi-Yu HuangPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: 2010 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 1.120kg ISBN: 9781849962742ISBN 10: 184996274 Pages: 212 Publication Date: 05 July 2010 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsRadio Frequencies.- Medium Access Control.- Physical Layer.- Cryptography.- Wireless Security.- Configuring Wireless Networks.- Robust Security Network.- MAC Layer Performance Analysis.- Link Rate Adaptation.ReviewsFrom the reviews: It is hard to find a brief work that includes the scientific bases and history and the performance, implementation, configuration, and installation scripts for a widespread technology. It was therefore a pleasure to discover this pragmatic, up-to-date book on the ubiquitous IEEE 802.11 wireless communications standards, including their security features. The content is logically organized. the book provides excellent value from an engineering and design perspective; it can also be used in training programs. (L-F Pau, ACM Computing Reviews, December, 2010) From the reviews: It is hard to find a brief work that includes the scientific bases and history and the performance, implementation, configuration, and installation scripts for a widespread technology. It was therefore a pleasure to discover this pragmatic, up-to-date book on the ubiquitous IEEE 802.11 wireless communications standards, including their security features. ... The content is logically organized. ... the book provides excellent value from an engineering and design perspective; it can also be used in training programs. (L-F Pau, ACM Computing Reviews, December, 2010) From the reviews: It is hard to find a brief work that includes the scientific bases and history and the performance, implementation, configuration, and installation scripts for a widespread technology. It was therefore a pleasure to discover this pragmatic, up-to-date book on the ubiquitous IEEE 802.11 wireless communications standards, including their security features. ... The content is logically organized. ... the book provides excellent value from an engineering and design perspective; it can also be used in training programs. (L-F Pau, ACM Computing Reviews, December, 2010) From the reviews: It is hard to find a brief work that includes the scientific bases and history and the performance, implementation, configuration, and installation scripts for a widespread technology. It was therefore a pleasure to discover this pragmatic, up-to-date book on the ubiquitous IEEE 802.11 wireless communications standards, including their security features. ! The content is logically organized. ! the book provides excellent value from an engineering and design perspective; it can also be used in training programs. (L-F Pau, ACM Computing Reviews, December, 2010) Author InformationTab Content 6Author Website:Countries AvailableAll regions |