802.11 Wireless Networks: Security and Analysis by Alan Holt

By Alan Holt

Wireless conversation has the good thing about mobility and obviates the necessity for cabling, yet is inherently much less safe and is topic to the heavy legislation of the radio frequency spectrum. however, the allocation of unlicensed components of the spectrum has facilitated the expansion in instant neighborhood zone networks (WLANs). WLAN know-how is progressing at a quick velocity, however the most generally authorized WLAN ordinary is the IEEE 802.11.

This specific and hugely useful textual content introduces the rules of WLANs dependent upon the IEEE 802.11 criteria, demonstrating how you can configure gear which will enforce a number of community recommendations. Readers will achieve realizing of the protection implications of instant networks and learn the way vulnerabilities will be mitigated. also, the booklet examines the underlying 802.11 protocols and explains tips to construct mathematical versions with the intention to examine functionality in a WLAN environment.

Topics and Features:

  • Presents a realistic method supported through the broad use of examples and exact instructions
  • Discusses quite a few instant community suggestions throughout a few assorted seller structures, together with Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks
  • Provides a number of mathematical versions for reading the functionality of IEEE 802.11 criteria, and exhibits the best way to construct those versions utilizing Maple
  • Examines problems with instant safety and describes tips on how to enforce a instant community with company security
  • Investigates the medium entry keep an eye on sub-layer, and types for functionality research of the MAC layer
  • Reviews the actual sub-layers of 802.11, describing modulation recommendations and studying how units adapt to alterations within the RF environment.

A hugely important text/reference for pros, undergraduate and graduate-level scholars also will locate this booklet an awesome better half to a school path on instant networking.

Dr. Alan Holt is leader Technical Officer on the community consultancy corporation IP functionality Ltd., established in Bristol, united kingdom. he's writer of the preferred Springer textual content Network functionality research: utilizing the J Programming Language.

Dr. Chi-Yu Huang works for Tata applied sciences Ltd., and is presently a software program advisor at the Airbus undertaking in Bristol. She used to be previously Operations supervisor for DL Consulting, New Zealand.

Show description

Read or Download 802.11 Wireless Networks: Security and Analysis PDF

Best systems analysis & design books

The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk

A accomplished advent to fuzzy common sense, this booklet leads the reader throughout the whole strategy of designing, developing, enforcing, verifying and preserving a platform-independent fuzzy process version. it really is written in an educational variety that assumes no historical past in fuzzy common sense at the reader's half.

DSDM: Business Focused Development, Second Edition

The Dynamic structures improvement procedure is a method that's used to carry new software program platforms. * Practitioner's consultant addressing concerns reminiscent of tips on how to get humans from assorted disciplines to interact as a group, easy methods to achieve dedication and the way to control tasks inside of general company constraints.

Developing and Evaluating Security-Aware Software Systems

As computing device applied sciences proceed to conform and new safeguard threats emerge, secure-aware software program advancements are crucial within the software program engineering box. constructing and comparing Security-Aware software program structures presents cutting edge principles and strategies at the improvement, operation, and upkeep of safe software program structures and goals to focus on the development of a sensible software program method and a safe process concurrently.

The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructure

Here’s an attractive revelation . .. throughout the plague of Athens in 430 BC, the Greeks discovered that individuals who had formerly survived smallpox didn't agreement the affliction a moment time. actually, those survivors have been known as upon to take care of these bothered with smallpox. examine this e-book because the continuum of the Immunization legacy as utilized to the electronic international.

Additional resources for 802.11 Wireless Networks: Security and Analysis

Sample text

1) Once the RTS/CTS exchange has been successfully completed, data and ACK frames are sent in the same way as the basic access method. 3 Inter-frame Spacing Devices must wait for a period called an inter-frame space (IFS) before transmitting a frame. 11 MAC implements frame prioritisation using IFS intervals of different lengths. The IFS times, defined in the (original) standard, are: • Short IFS (SIFS). 42 3 Medium Access Control • PCF IFS (PIFS). • DCF IFS (DIFS). • Extended IFS (EIFS). The IFSes above are listed in order of priority; thus: SIFS < PIFS < DIFS < EIFS.

Like BTMA, SRMA uses a data channel for transmitting data and a separate control channel for exchanging handshakes. Multiple access collision avoidance (MACA) [23] was the first CSMA/CA-like protocol. It uses an RTS/CTS mechanism influenced by the Appletalk protocol. The transmission of a data frame is preceded by a ready-to-send (RTS) and a clear-tosend (CTS) exchange between the sender and receiver. Unlike SRMA, RTS and CTS frames are sent over the same channel as data frames. The surrounding neighbours in range of the RTS or CTS frames defer any pending transmissions.

Power mgmt: If the sending device is in power save mode, this bit is set to 1 (and 0 otherwise). Fig. 4 MAC header Fig. 3 Distributed Coordination Function 39 • More data: When a device is in power save mode, the access-point can buffer the frames destined for it. This bit is set to 1 to indicate that the access-point has one or more frames for a sleeping device. • WEP: This field is set to 1 to indicate that WEP was used to encrypt the frame body. • Other: Set to 1 if strict ordering is enabled.

Download PDF sample

Rated 4.48 of 5 – based on 49 votes