802.11无线网络权威指南(第二版,影印版)
802.11无线网络权威指南(第二版,影印版)
Matthew S. Gast
出版时间:2006年04月
页数:654
使用无线网络是一种获得解放的、自由的经历。但是在这种经历的背后存在着一个复杂的协议,并且当数据不只限于在物理线路上传输时甚至会产生一些更为复杂的问题。怎样构造网络才能让移动用户活动自如?怎样扩展无线网络才能让它在任何需要的地方都可用?无线网络会产生哪些安全问题?怎样把无线网络调整到最佳性能?怎样提供足够的容量来支持最初希望的用户?怎样处理更多的用户接入网络所带来的各种问题?
《802.11无线网络权威指南》第二版讨论了上述所有问题及其他相关问题。本书主要是为部署或维护无线网络的严谨的系统管理员或网络管理员编写的。书中广泛讨论了无线网络的安全问题,包括使用WEP标准的安全问题,并讨论了动态WEP和802.1X、802.11i安全标准。由于对于任何严谨的网络管理员来说网络监视都是一项必须的工作,因此本书有专门的章节阐述如何使用Ethereal及其他工具进行网络分析和排错。
《802.11无线网络权威指南》同时还介绍了无线网络的最新发展。除了802.11b和11a标准之外,本书同时涵盖802.11g,并前瞻了正在成为标准的802.11n协议。这个新的版本扩展了网络规划架构的讨论,并特别关注了访问点之间的移动性、频谱管理和功率控制。本书是目前唯一的讲述了如何衡量无线网络性能及如何调整网络到最佳性能的工具书。
最后,《802.11无线网络权威指南》展示了怎样配置无线网卡和Linux、Windows和MAC OS X系统,以及怎样处理访问点。很少有一本书能够把你需要掌握的理论和完成工作所需要的实际经验和建议有机地结合在一起。《802.11无线网络权威指南》就是这样的一本好书。如果你负责管理无线网络,你就需要这本书。
Matthew S. Gast是无线网络规划和部署方面的权威作者。
  1. Foreword
  2. Preface
  3. 1. Introduction to Wireless Networking
  4. Why Wireless?
  5. What Makes Wireless Networks Different
  6. A Network by Any Other Name...
  7. 2. Overview of 802.11 Networks
  8. IEEE 802 Network Technology Family Tree
  9. 802.11 Nomenclature and Design
  10. 802.11 Network Operations
  11. Mobility Support
  12. 3. 802.11 MAC Fundamentals
  13. Challenges for the MAC
  14. MAC Access Modes and Timing
  15. Contention-Based Access Using the DCF
  16. Fragmentation and Reassembly
  17. Frame Format
  18. Encapsulation of Higher-Layer Protocols Within 802.11
  19. Contention-Based Data Service
  20. Frame Processing and Bridging
  21. 4. 802.11 Framing in Detail
  22. Data Frames
  23. Control Frames
  24. Management Frames
  25. Frame Transmission and Association and Authentication States
  26. 5. Wired Equivalent Privacy (WEP)
  27. Cryptographic Background to WEP
  28. WEP Cryptographic Operations
  29. Problems with WEP
  30. Dynamic WEP
  31. 6. User Authentication with 802.1X
  32. The Extensible Authentication Protocol
  33. EAP Methods
  34. 802.1X: Network Port Authentication
  35. 802.1X on Wireless LANs
  36. 7. 802.11i: Robust Security Networks, TKIP, and CCMP
  37. The Temporal Key Integrity Protocol (TKIP)
  38. Counter Mode with CBC-MAC (CCMP)
  39. Robust Security Network (RSN) Operations
  40. 8. Management Operations
  41. Management Architecture
  42. Scanning
  43. Authentication
  44. Preauthentication
  45. Association
  46. Power Conservation
  47. Timer Synchronization
  48. Spectrum Management
  49. 9. Contention-Free Service with the PCF
  50. Contention-Free Access Using the PCF
  51. Detailed PCF Framing
  52. Power Management and the PCF
  53. 10. Physical Layer Overview
  54. Physical-Layer Architecture
  55. The Radio Link
  56. RF Propagation with 802.11
  57. RF Engineering for 802.11
  58. 11. The Frequency-Hopping (FH) PHY
  59. Frequency-Hopping Transmission
  60. Gaussian Frequency Shift Keying (GFSK)
  61. FH PHY Convergence Procedure (PLCP)
  62. Frequency-Hopping PMD Sublayer
  63. Characteristics of the FH PHY
  64. 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b) .
  65. Direct Sequence Transmission
  66. Differential Phase Shift Keying (DPSK)
  67. The “Original” Direct Sequence PHY
  68. Complementary Code Keying
  69. High Rate Direct Sequence PHY
  70. 13. 802.11a and 802.11j: 5-GHz OFDM PHY
  71. Orthogonal Frequency Division Multiplexing (OFDM)
  72. OFDM as Applied by 802.11a
  73. OFDM PLCP
  74. OFDM PMD
  75. Characteristics of the OFDM PHY
  76. 14. 802.11g: The Extended-Rate PHY (ERP)
  77. 802.11g Components
  78. ERP Physical Layer Convergence (PLCP)
  79. ERP Physical Medium Dependent (PMD) Layer
  80. 15. A Peek Ahead at 802.11n: MIMO-OFDM
  81. Common Features
  82. WWiSE
  83. TGnSync
  84. Comparison and Conclusions
  85. 16. 802.11 Hardware
  86. General Structure of an 802.11 Interface
  87. Implementation-Specific Behavior
  88. Reading the Specification Sheet
  89. 17. Using 802.11 on Windows
  90. Windows XP
  91. Windows 2000
  92. Windows Computer Authentication
  93. 18. 802.11 on the Macintosh
  94. The AirPort Extreme Card
  95. 802.1X on the AirPort
  96. 19. Using 802.11 on Linux
  97. PCMCIA Support on Linux
  98. Linux Wireless Extensions and Tools
  99. Agere (Lucent) Orinoco
  100. Atheros-Based cards and MADwifi
  101. 802.1X on Linux with xsupplicant
  102. 20. Using 802.11 Access Points
  103. General Functions of an Access Point
  104. Power over Ethernet (PoE)
  105. Selecting Access Points
  106. Cisco 1200 Access Point
  107. Apple AirPort
  108. 21. Logical Wireless Network Architecture
  109. Evaluating a Logical Architecture
  110. Topology Examples
  111. Choosing Your Logical Architecture
  112. 22. Security Architecture
  113. Security Definition and Analysis
  114. Authentication and Access Control
  115. Ensuring Secrecy Through Encryption
  116. Selecting Security Protocols
  117. Rogue Access Points
  118. 23. Site Planning and Project Management
  119. Project Planning and Requirements
  120. Network Requirements
  121. Physical Layer Selection and Design
  122. Planning Access-Point Placement
  123. Using Antennas to Tailor Coverage
  124. 24. 802.11 Network Analysis
  125. Network Analyzers
  126. Ethereal
  127. 802.11 Network Analysis Checklist
  128. Other Tools
  129. 25. 802.11 Performance Tuning
  130. 802.11 Performance Calculations
  131. Improving Performance
  132. Tunable 802.11 Parameters
  133. 26. Conclusions and Predictions
  134. Standards Work
  135. Current Trends in Wireless Networking
  136. The End
  137. Glossary
  138. Index
书名:802.11无线网络权威指南(第二版,影印版)
作者:Matthew S. Gast
国内出版社:东南大学出版社
出版时间:2006年04月
页数:654
书号:7-5641-0316-7
原版书出版商:O'Reilly Media
Matthew S. Gast
 
Matthew S. Gast 曾协助各种组织了解无线网络技术,建设具有扩充性的、基于标准的安全无线局域网络。过去这几年,他自愿在 Interop Labs 担任工程师与讲师,他在那里与许多顶尖的工程师共事,学到了各种先进的网络安全协议并在研讨会中传达给其他与会者。Matthew 参加过的研讨会不计其数,范围横跨各大陆,他在研讨会上所连接过的无线网络比他在撰写本书第二版时所连接过的还多。他在加入目前所任职的无线局域网络系统公司之前,曾在数家网络安全公司工作过几年。
Matthew S.Gast is a renaissance technologist.In addition to his demonstrated expertise on a variety of network technologies,he is relentlessly inquisitive about the interconnected and interdependent world around him.After graduating from college,his interests in routing,security,and cryptography pulled him towards Silicon Valley to participate in scaling the mountainous network engineering challenge called the Internet.In addition to his technology interests,Matthew is a voracious reader on science and economics and a lifelong supporter of the scientific method.
Matthew is also a Registered Patent Agent before the United States Patent and Trademark Office.Patent agents assist in the drafting and prosecution of patent applications,which has been called the most demanding task in the United States legal system by the Supreme Court.Matthew has co-written two patent applications,one of which was for his own invention.
 
 
The animal on the cover of 802.11 Wireless Networks: The Definitive Guide, Second
Edition, is a horseshoe bat (Rhinolophus hipposideros). This rare and globally endangered
species is the smallest of the European horseshoe bats; they typically weigh
only 4 to 10 grams and have a wingspan of 19 to 25 centimeters. Horseshoe bats get
their name from the horseshoe-shaped, leaflike plate of skin around their noses. This
nose-leaf helps modify and direct the ultrasonic sounds they emit through their
nostrils (a method of sensory perception known as echolocation) to orient themselves
to their surroundings, detect obstacles, communicate with each other, and
find food. Bats’ echolocation systems are so accurate that they can detect insects the
size of gnats and objects as fine as a human hair.
Lesser horseshoe bats are found in a variety of habitats, ranging fromthe British Isles
to the Arabian Peninsula and Central Asia, and fromMorocco to Sudan. The lesser
horseshoe bat was originally a cave-roosting bat, but many summer maternity colonies
now occupy the roofs of old rural houses and farmbuildings. These bats also
sometimes roost in hedgerows and hollow trees. Maternity colonies of 30 to 70 are
normal, but roosting mothers have been known to form colonies of as many as 200
bats. Lesser horseshoe bats hibernate, sometimes in large groups, from October until
late April or early May. Their winter roosts are usually underground, in caves or
tunnels. They hang by their feet with their wings wrapped around their bodies, often
in open and exposed positions but rarely in large clusters.