Synopses & Reviews
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide explains how WLAN roaming works and how to implement it.
This book explains roaming techniques by using the well-known cellular roaming model as an example. It then discusses the various IEEE efforts to develop a roaming standard for WLANs, especially the 802.11r standards. There is also extensive treatment of roaming topics and concepts such as service set IDs (SSIDs), local roaming, nomadic roaming, and mobile IP addressing. The mechanism of how a 802.11 device can switch from one wireless access point to another is discussed in detail.
There is also coverage of roaming WLAN security, including user authentication techniques and a discussion of roaming WLAN vulnerabilities. And youll also find coverage of these essential topics:
*General principles of roaming within WLANs
*User authentication and verification issues
*Security issues and mechanisms
*The 802.11r and 802.11k standards and their application to roaming
*Roaming between 802.11 networks and other wireless networks such as Bluetooth, WiMax, etc
*Proprietary approaches to security
Clearly written and profusely illustrated, this book is an essential reference for any network or IT professional who needs to understand how to add roaming capabilities to their WLANs.
Synopsis
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide explains how WLAN roaming works and how to implement it.
This book explains roaming techniques by using the well-known cellular roaming model as an example. It then discusses the various IEEE efforts to develop a roaming standard for WLANs, especially the 802.11r standards. There is also extensive treatment of roaming topics and concepts such as service set IDs (SSIDs), local roaming, nomadic roaming, and mobile IP addressing. The mechanism of how a 802.11 device can switch from one wireless access point to another is discussed in detail.
There is also coverage of roaming WLAN security, including user authentication techniques and a discussion of roaming WLAN vulnerabilities. And you’ll also find coverage of these essential topics:
*General principles of roaming within WLANs
*User authentication and verification issues
*Security issues and mechanisms
*The 802.11r and 802.11k standards and their application to roaming
*Roaming between 802.11 networks and other wireless networks such as Bluetooth, WiMax, etc
*Proprietary approaches to security
Clearly written and profusely illustrated, this book is an essential reference for any network or IT professional who needs to understand how to add roaming capabilities to their WLANs.
Synopsis
Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices.
Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we're mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can't, in its "pure" form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces.
This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.
* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques
* Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities
* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered
Synopsis
This book helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices.
Synopsis
This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we’re mobile and using 802.11 WLANs.
However, 802.11 was not originally designed with roaming capabilities and can’t, in its “pure” form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well.
* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques
* Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities
* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered
About the Author
Dr. Paul Goransson has over 28 years of experience in the data communications field. He was the founder and President of Meetinghouse, which developed network access security software products for wireless and wired environments. Meetinghouse was acquired by Cisco Systems in 2006, where Paul currently serves as a Director of Engineering in the Wireless Networking Business Unit. He is also the owner/operator of Bondgarden Farm, a commercial beef and hay farm in southern Maine. Paul previously founded Qosnetics and QARobotics, which were later merged and subsequently acquired by Hewlett-Packard in 1999. Dr. Goransson has published technical articles in the fields of bandwidth reservation and wireless security. He received his Bachelor of Arts in Psychology from Brandeis University in 1975, his Masters of Science in Computer Engineering from Boston University in 1981, and his Ph.D. in Computer Science from the University of New Hampshire in 1994. Dr. Goransson has previously served as an adjunct Professor at the School of Computing at Armstrong Atlantic State University.
Dr. Raymond Greenlaw is the Founder and Dean of the School of Computing and Professor of Computer Science at Armstrong Atlantic State University in Savannah, Georgia. Ray is the Distinguished Professor of Computer Science at Chiang Mai University in Thailand and a Distinguished Visiting Professor at the College of Management and Technology in Kuala Lumpur, Malaysia. He is the author of 13 books in the field of computer science. His books cover complexity theory, graph theory, the Internet, networking, operating systems, parallel computing, the theory of computation, and the World Wide Web. Dr. Greenlaw has published 60 research papers and given over 155 invited lectures throughout the world. As a PI or co-PI, Ray has been awarded over $6,000,000 in grants and contracts, and his research has been supported by the following countries: Germany, Hong Kong, Iceland, Italy, Japan, Malaysia, Spain, Taiwan, Thailand, and the United States. He has won numerous international awards including three Senior Fulbright Fellowships, a Humboldt Fellowship, a Japanese Society for Promotion of Science Fellowship, two visiting Professor Fellowships from Italy, a Sasakawa Fellowship for Japanese Studios, and a Spanish Fellowship for Science and Technology. Dr. Greenlaw served as the Regional Coordinator for the State of Georgia’s $100,000,000 Yamacraw Project, which was designed to make the state of Georgia a leader in the telecommunications field. Ray serves as a Commissioner for the Computing Accreditation Commission (CAC) of the Accreditation Board for Engineering Technology (ABET). He received a Bachelor of Arts in Mathematics from Pomona College in 1983, a Master of Science in Computer Science from the University of Washington in 1986, and a Ph.D. in Computer Science from the University of Washington in 1988.
Armstrong Atlantic State University