000 04023nam a22004335i 4500
001 u372878
003 SIRSI
005 20160812084119.0
007 cr nn 008mamaa
008 100628s2010 xxk| s |||| 0|eng d
020 _a9781849962759
_9978-1-84996-275-9
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aHolt, Alan.
_eauthor.
245 1 0 _a802.11 Wireless Networks
_h[recurso electrónico] :
_bSecurity and Analysis /
_cby Alan Holt, Chi-Yu Huang.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2010.
300 _aXXI, 212 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Communications and Networks,
_x1617-7975
505 0 _aRadio Frequencies -- Medium Access Control -- Physical Layer -- Cryptography -- Wireless Security -- Configuring Wireless Networks -- Robust Security Network -- MAC Layer Performance Analysis -- Link Rate Adaptation.
520 _aWireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
700 1 _aHuang, Chi-Yu.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781849962742
830 0 _aComputer Communications and Networks,
_x1617-7975
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-84996-275-9
596 _a19
942 _cLIBRO_ELEC
999 _c200758
_d200758