Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 11 of 15
Previous Record Next Record
E-Book/E-Doc
Author Goransson, Paul.

Title Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw.

Imprint Amsterdam ; Boston : Newnes/Elsevier, ©2007.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxiv, 343 pages) : illustrations, maps
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Communications engineering series
Communications engineering series.
Summary This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and cant, in its pure form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well. * Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques * Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities * Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered
Bibliography Includes bibliographical references and index.
Note Print version record.
Contents Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts
2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance
4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11
6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary
Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience
Language English.
Subject Wireless LANs -- Security measures.
IEEE 802.11 (Standard)
Réseaux locaux sans fil -- Sécurité -- Mesures.
IEEE 802.11 (Norme)
TECHNOLOGY & ENGINEERING -- Radio.
TECHNOLOGY & ENGINEERING -- Mobile & Wireless Communications.
IEEE 802.11 (Standard)
Wireless LANs -- Security measures
Genre/Form dissertations.
Academic theses
Academic theses.
Thèses et écrits académiques.
Added Author Greenlaw, Raymond.
Other Form: Print version: Goransson, Paul. Secure roaming in 802.11 networks. Amsterdam ; Boston : Newnes/Elsevier, ©2007 9780750682114 0750682116 (DLC) 2007009361 (OCoLC)85892296
ISBN 9780750682114
0750682116
9780080548944 (electronic bk.)
0080548946 (electronic bk.)
1281120316
9781281120311
9786611120313
6611120319
Standard No. AU@ 000043265151
AU@ 000048756941
AU@ 000051555043
AU@ 000051860812
CHNEW 001006865
DEBBG BV039828913
DEBBG BV041120024
DEBBG BV042314222
DEBBG BV043044731
DEBBG BV044125222
DEBSZ 367757303
DEBSZ 396679137
DEBSZ 422184225
DEBSZ 430427778
DKDLA 820120-katalog:999916253705765
NZ1 11778588
NZ1 14540384
NZ1 15189263

 
    
Available items only