- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
This title in other editions
Other titles in the Computer Communications and Networks series:
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)by Alan Holt
Synopses & Reviews
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions.
This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every component of the network, from the client supplicant and the access-points, through to the supporting servers (e.g. RADIUS). Much of the infrastructure is based upon Linux and open source software, but the book also addresses configuration of equipment from three of the largest wireless network equipment providers: Cisco, Alacatel-Lucent (Aruba) and Meru. Furthermore, the book contains coverage of more theoretical topics on performance analysis and monitoring wireless LANs, including the new 802.11n standard.
Table of Contents
IntroductionRadio FrequenciesMedium Access ControlPhysical LayerCryptographyWireless SecurityConfiguring Wireless NetworksRobust Security NetworkMAC Layer Performance AnalysisLink Rate AdaptationBuild a Xen ServerInitial Configuration of Access-point Controllers
What Our Readers Are Saying
Computers and Internet » Computers Reference » General