Books & Videos

Table of Contents

  1. Chapter 1 Introduction to Wireless Networking

    1. Why Wireless?

    2. What Makes Wireless Networks Different

    3. A Network by Any Other Name...

  2. Chapter 2 Overview of 802.11 Networks

    1. IEEE 802 Network Technology Family Tree

    2. 802.11 Nomenclature and Design

    3. 802.11 Network Operations

    4. Mobility Support

  3. Chapter 3 802.11 MAC Fundamentals

    1. Challenges for the MAC

    2. MAC Access Modes and Timing

    3. Contention-Based Access Using the DCF

    4. Fragmentation and Reassembly

    5. Frame Format

    6. Encapsulation of Higher-Layer Protocols Within 802.11

    7. Contention-Based Data Service

    8. Frame Processing and Bridging

  4. Chapter 4 802.11 Framing in Detail

    1. Data Frames

    2. Control Frames

    3. Management Frames

    4. Frame Transmission and Association and Authentication States

  5. Chapter 5 Wired Equivalent Privacy (WEP)

    1. Cryptographic Background to WEP

    2. WEP Cryptographic Operations

    3. Problems with WEP

    4. Dynamic WEP

  6. Chapter 6 User Authentication with 802.1X

    1. The Extensible Authentication Protocol

    2. EAP Methods

    3. 802.1X: Network Port Authentication

    4. 802.1X on Wireless LANs

  7. Chapter 7 802.11i: Robust Security Networks, TKIP, and CCMP

    1. The Temporal Key Integrity Protocol (TKIP)

    2. Counter Mode with CBC-MAC (CCMP)

    3. Robust Security Network (RSN) Operations

  8. Chapter 8 Management Operations

    1. Management Architecture

    2. Scanning

    3. Authentication

    4. Preauthentication

    5. Association

    6. Power Conservation

    7. Timer Synchronization

    8. Spectrum Management

  9. Chapter 9 Contention-Free Service with the PCF

    1. Contention-Free Access Using the PCF

    2. Detailed PCF Framing

    3. Power Management and the PCF

  10. Chapter 10 Physical Layer Overview

    1. Physical-Layer Architecture

    2. The Radio Link

    3. RF Propagation with 802.11

    4. RF Engineering for 802.11

  11. Chapter 11 The Frequency-Hopping (FH) PHY

    1. Frequency-Hopping Transmission

    2. Gaussian Frequency Shift Keying (GFSK)

    3. FH PHY Convergence Procedure (PLCP)

    4. Frequency-Hopping PMD Sublayer

    5. Characteristics of the FH PHY

  12. Chapter 12 The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)

    1. Direct Sequence Transmission

    2. Differential Phase Shift Keying (DPSK)

    3. The “Original” Direct Sequence PHY

    4. Complementary Code Keying

    5. High Rate Direct Sequence PHY

  13. Chapter 13 802.11a and 802.11j: 5-GHz OFDM PHY

    1. Orthogonal Frequency Division Multiplexing (OFDM)

    2. OFDM as Applied by 802.11a

    3. OFDM PLCP

    4. OFDM PMD

    5. Characteristics of the OFDM PHY

  14. Chapter 14 802.11g: The Extended-Rate PHY (ERP)

    1. 802.11g Components

    2. ERP Physical Layer Convergence (PLCP)

    3. ERP Physical Medium Dependent (PMD) Layer

  15. Chapter 15 A Peek Ahead at 802.11n: MIMO-OFDM

    1. Common Features

    2. WWiSE

    3. TGnSync

    4. Comparison and Conclusions

  16. Chapter 16 802.11 Hardware

    1. General Structure of an 802.11 Interface

    2. Implementation-Specific Behavior

    3. Reading the Specification Sheet

  17. Chapter 17 Using 802.11 on Windows

    1. Windows XP

    2. Windows 2000

    3. Windows Computer Authentication

  18. Chapter 18 802.11 on the Macintosh

    1. The AirPort Extreme Card

    2. 802.1X on the AirPort

  19. Chapter 19 Using 802.11 on Linux

    1. PCMCIA Support on Linux

    2. Linux Wireless Extensions and Tools

    3. Agere (Lucent) Orinoco

    4. Atheros-Based cards and MADwifi

    5. 802.1X on Linux with xsupplicant

  20. Chapter 20 Using 802.11 Access Points

    1. General Functions of an Access Point

    2. Power over Ethernet (PoE)

    3. Selecting Access Points

    4. Cisco 1200 Access Point

    5. Apple AirPort

  21. Chapter 21 Logical Wireless Network Architecture

    1. Evaluating a Logical Architecture

    2. Topology Examples

    3. Choosing Your Logical Architecture

  22. Chapter 22 Security Architecture

    1. Security Definition and Analysis

    2. Authentication and Access Control

    3. Ensuring Secrecy Through Encryption

    4. Selecting Security Protocols

    5. Rogue Access Points

  23. Chapter 23 Site Planning and Project Management

    1. Project Planning and Requirements

    2. Network Requirements

    3. Physical Layer Selection and Design

    4. Planning Access-Point Placement

    5. Using Antennas to Tailor Coverage

  24. Chapter 24 802.11 Network Analysis

    1. Network Analyzers

    2. Ethereal

    3. 802.11 Network Analysis Checklist

    4. Other Tools

  25. Chapter 25 802.11 Performance Tuning

    1. 802.11 Performance Calculations

    2. Improving Performance

    3. Tunable 802.11 Parameters

  26. Chapter 26 Conclusions and Predictions

    1. Standards Work

    2. Current Trends in Wireless Networking

    3. The End

  1. Glossary

  2. Colophon