802.11 Wireless Networks The Definitive Guide



Similar documents
Chapter 7 Low-Speed Wireless Local Area Networks

Wireless Networks: The Definitive Guide. By Matthew Gast. Publisher : O'Reilly Pub Date : April 2002 ISBN: Pages : 464

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Overview of Networks and Standards

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

How To Understand The Latest Wireless Networking Technology

Analyzing Wireless LAN Security Overhead

Cisco Aironet 1130G Series IEEE g Access Point

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

How To Secure Wireless Networks

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

CS 356 Lecture 29 Wireless Security. Spring 2013

The next generation of knowledge and expertise Wireless Security Basics

HP AP8760 Dual Radio a/b/g Access Point Overview

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

How To Analyze The Security On An Ipa Wireless Sensor Network

Research In Motion D. Stanley, Ed. Aruba Networks March 2009

How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless)

Lecture 17: Wireless Networking"

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Basic processes in IEEE networks

How To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup

This tutorial has been prepared for readers to help them understand the concepts related to WiFi.

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Adjacent Overlapping Channel / Adjacent Non-overlapping Channel - The IEEE standard defines the following terms:

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

How To Get A Power Station To Work With A Power Generator Without A Substation

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Certified Wireless Security Professional (CWSP) Course Overview

IEEE Wireless LAN Standard. Updated: 5/10/2011

Wireless Technology Seminar

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Wireless Network Standard

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

chap18.wireless Network Security

Configure WorkGroup Bridge on the WAP131 Access Point

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Getting the Most from Your Wireless Network

Main Ways to Enhance Throughput

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Securing WLANs using i

CS549: Cryptography and Network Security

QuickSpecs. HP M n Access Point Series. Models HP M n WW Access Point. Key features

Next Generation Wireless Local Area Networks

RoamAbout Wireless Networking Guide

Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points

Introduction to Ad hoc Networks

IEEE frame format

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

11/22/

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Local Area Networking For Device Monitoring

Introduction. Voice over WLAN Challenges

Wireless Client Configuration Guide. for third-party wireless Ethernet adapters

CWNA Instructor Led Course Outline

Cisco Aironet A/B/G Wireless CardBus Adapter

Getting the Most from Your Wireless Network

Best Practices for Deploying Wireless LANs

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Configuring Security Solutions

Chapter 3: Spread Spectrum Technologies

Chapter 2 Wireless Networking Basics

Concurrent 2.4 and 5 GHz Performance. Backward Compatible. Fast Roaming through 802.1X PMK Caching. Power over Ethernet Port. Secure Communications

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

Lecture 3. WPA and i

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Chapter 2 Configuring Your Wireless Network and Security Settings

Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANS)

Your Wireless Network has No Clothes

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

USER GUIDE Cisco Small Business

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE standard.

Cisco Aironet 1520 Series Lightweight Outdoor Access Points

HP M n Access Point Series

EFFECT OF SECURITY MECHANISMS ON THE PERFORMANCE OF WIRELESS LOCAL AREA NETWORK NAME: EVANS M. OTIENO FIT /047556/06

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CWNA Certified Wireless Network Administrator Official Deluxe Study Guide. Exam CWNA-106

Wireless Network Standard and Guidelines

Wireless Local Area Networks and the Standard

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Security in Wireless Local Area Network

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

P r o t o l ck w fi ma a n ger User s Guide

How To Manage An Wireless Network At A University

The OSI and TCP/IP Models. Lesson 2

Product Specifications

Transcription:

SECOND EDITION 802.11 Wireless Networks The Definitive Guide Matthew S. Gast ULB Darmstadt Illlllllllllllllllllllll,., s b f 17555820 m ' Koln " Sebastopol Tokyo

Table of Contents Foreword Preface ix xi 1. Introduction to Wireless Networking 1 Why Wireless? 1 What Makes Wireless Networks Different 5 A Network by Any Other Name... 8 2. Overview of 802.11 Networks 12 IEEE 802 Network Technology Family Tree 13 802.11 Nomenclature and Design 14 802.11 Network Operations 23 Mobility Support 28 3. 802.11 MAC Fundamentals 32 Challenges for the MAC 34 MAC Access Modes and Timing 37 Contention-Based Access Using the DCF 41 Fragmentation and Reassembly 44 Frame Format 46 Encapsulation of Higher-Layer Protocols Within 802.11 54 Contention-Based Data Service 55 Frame Processing and Bridging 63

4. 802.11 Framing in Detail 67 Data Frames 67 Control Frames 76 Management Frames 82 Frame Transmission and Association and Authentication States 111 5. Wired Equivalent Privacy (WEP) 114 Cryptographic Background to WEP 114 WEP Cryptographic Operations 117 Problems with WEP 123 Dynamic WEP 127 6. User Authentication with 802.1 X 129 The Extensible Authentication Protocol 130 EAP Methods 135 802.IX: Network Port Authentication 141 802. IX on Wireless LANs 145 7. 802.11i: Robust Security Networks, TKIP, and CCMP 149 The Temporal Key Integrity Protocol (TKIP) 149 Counter Mode with CBC-MAC (CCMP) 159 Robust Security Network (RSN) Operations 163 8. Management Operations 170 Management Architecture *-- 170 Scanning 171 Authentication 176 Preauthentication 180 Association 184 Power Conservation 188 Timer Synchronization 197 Spectrum Management 199 9. Contention-Free Service with the PCF 214 Contention-Free Access Using the PCF 214 Detailed PCF Framing 218 Power Management and the PCF 223 Table of Contents

10. Physical Layer Overview 225 Physical-Layer Architecture 225 The Radio Link 226 RF Propagation with 802.11 232 RF Engineering for 802.11 238 11. The Frequency-Hopping (FH) PHY 241 Frequency-Hopping Transmission 241 Gaussian Frequency Shift Keying (GFSK) 246 FH PHY Convergence Procedure (PLCP) 249 Frequency-Hopping PMD Sublayer 250 Characteristics of the FH PHY 252 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b) 253 Direct Sequence Transmission 253 Differential Phase Shift Keying (DPSK) 260 The "Original" Direct Sequence PHY 263 Complementary Code Keying 267 High Rate Direct Sequence PHY 268 13. 802.11a and 802.11j: 5-GHz0FDM PHY 276 Orthogonal Frequency Division Multiplexing (OFDM) 277 OFDM as Applied by 802.11a 282 OFDM PLCP *.. 290 OFDM PMD 293 Characteristics of the OFDM PHY 297 14. 802.11g: The Extended-Rate PHY (ERP) 298 802.1 lg Components 298 ERP Physical Layer Convergence (PLCP) 304 ERP Physical Medium Dependent (PMD) Layer 307 15. A Peek Ahead at802.11n: MIM0-0FDM 311 Common Features 312 WWiSE 314 TGnSync 325 Comparison and Conclusions 340 Table of Contents

16. 802.11 Hardware 343 General Structure of an 802.11 Interface 343 Implementation-Specific Behavior 348 Reading the Specification Sheet 350 17. Using 802.11 on Windows 353 Windows XP 353 Windows 2000 368 Windows Computer Authentication 369 18. 802.11 on the Macintosh 373 The AirPort Extreme Card 373 802.1XontheAirPort 378 19. Using802.11 on Linux 387 PCMCIA Support on Linux 387 Linux Wireless Extensions and Tools 395 Agere (Lucent) Orinoco 402 Atheros-Based cards and MADwifi 404 802. IX on Linux with xsupplicant 407 20. Using 802.11 Access Points 415 General Functions of an Access Point 416 Power over Ethernet (PoE) 422 Selecting Access Points *. 424 Cisco 1200 Access Point 427 Apple AirPort 434 21. Logical Wireless Network Architecture 438 Evaluating a Logical Architecture 438 Topology Examples 452 Choosing Your Logical Architecture 474 22. Security Architecture 476 Security Definition and Analysis 477 Authentication and Access Control 482 Ensuring Secrecy Through Encryption 492 vi Table of Contents

Selecting Security Protocols 500 Rogue Access Points 510 23. Site Planning and Project Management 518 Project Planning and Requirements 519 Network Requirements 521 Physical Layer Selection and Design 532 Planning Access-Point Placement 537 Using Antennas to Tailor Coverage 546 24. 802.11 Network Analysis 553 Network Analyzers 553 Ethereal 556 802.11 Network Analysis Checklist 566 Other Tools 570 25. 802.11 Performance Tuning 573 802.11 Performance Calculations 573 Improving Performance 576 Tunable 802.11 Parameters 578 26. Conclusions and Predictions 585 Standards Work 585 Current Trends in Wireless Networking 587 The End,. 596 Glossary 597 Index 607 Table of Contents I vii