找回密码
 注册
搜索
查看: 696|回复: 2

[WiFi资料] 802.11 Wireless Network -- The Definitive Guide(2nd)

[复制链接]
发表于 2007-5-28 16:46:25 | 显示全部楼层 |阅读模式
A good book (first part)
 楼主| 发表于 2007-5-28 16:56:42 | 显示全部楼层

re sent

【文件名】:07528@52RD_The Definitive Guidepart1.rar
【格 式】:rar
【大 小】:4000K
【简 介】:OReilly Book.
【目 录】:Copyright
   Foreword
   Preface
     Prometheus Untethered: The Possibilities of Wireless LANs
     Audience
     Overture for Book in Black and White, Opus 2
     Conventions Used in This Book
     How to Contact Us
     Safari Enabled
     Acknowledgments
       Chapter 1.  Introduction to Wireless Networking
     Why Wireless?
     What Makes Wireless Networks Different
     A Network by Any Other Name...
       Chapter 2.  Overview of 802.11 Networks
     IEEE 802 Network Technology Family Tree
     802.11 Nomenclature and Design
     802.11 Network Operations
     Mobility Support
       Chapter 3.  802.11 MAC Fundamentals
     Challenges for the MAC
     MAC Access Modes and Timing
     Contention-Based Access Using the DCF
     Fragmentation and Reassembly
     Frame Format
     Encapsulation of Higher-Layer Protocols Within 802.11
     Contention-Based Data Service
     Frame Processing and Bridging
       Chapter 4.  802.11 Framing in Detail
     Data Frames
     Control Frames
     Management Frames
     Frame Transmission and Association and Authentication States
       Chapter 5.  Wired Equivalent Privacy (WEP)
     Cryptographic Background to WEP
     WEP Cryptographic Operations
     Problems with WEP
     Dynamic WEP
       Chapter 6.  User Authentication with 802.1X
     The Extensible Authentication Protocol
     EAP Methods
     802.1X: Network Port Authentication
     802.1X on Wireless LANs
       Chapter 7.  802.11i: Robust Security Networks, TKIP, and CCMP
     The Temporal Key Integrity Protocol (TKIP)
     Counter Mode with CBC-MAC (CCMP)
     Robust Security Network (RSN) Operations
       Chapter 8.  Management Operations
     Management Architecture
     Scanning
     Authentication
     Preauthentication
     Association
     Power Conservation
     Timer Synchronization
     Spectrum Management
       Chapter 9.  Contention-Free Service with the PCF
     Contention-Free Access Using the PCF
     Detailed PCF Framing
     Power Management and the PCF
       Chapter 10.  Physical Layer Overview
     Physical-Layer Architecture
     The Radio Link
     RF Propagation with 802.11
     RF Engineering for 802.11
       Chapter 11.  The Frequency-Hopping (FH) PHY
     Frequency-Hopping Transmission
     Gaussian Frequency Shift Keying (GFSK)
     FH PHY Convergence Procedure (PLCP)
     Frequency-Hopping PMD Sublayer
     Characteristics of the FH PHY
       Chapter 12.  The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
     Direct Sequence Transmission
     Differential Phase Shift Keying (DPSK)
     The "Original" Direct Sequence PHY
     Complementary Code Keying
     High Rate Direct Sequence PHY
       Chapter 13.  802.11a and 802.11j: 5-GHz OFDM PHY
     Orthogonal Frequency Division Multiplexing (OFDM)
     OFDM as Applied by 802.11a
     OFDM PLCP
     OFDM PMD
     Characteristics of the OFDM PHY
       Chapter 14.  802.11g: The Extended-Rate PHY (ERP)
     802.11g Components
     ERP Physical Layer Convergence (PLCP)
     ERP Physical Medium Dependent (PMD) Layer
       Chapter 15.  A Peek Ahead at 802.11n: MIMO-OFDM
     Common Features
     WWiSE
     TGnSync
     Comparison and Conclusions
       Chapter 16.  802.11 Hardware
     General Structure of an 802.11 Interface
     Implementation-Specific Behavior
     Reading the Specification Sheet
       Chapter 17.  Using 802.11 on Windows
     Windows XP
     Windows 2000
     Windows Computer Authentication
       Chapter 18.  802.11 on the Macintosh
     The AirPort Extreme Card
     802.1X on the AirPort
       Chapter 19.  Using 802.11 on Linux
     PCMCIA Support on Linux
     Linux Wireless Extensions and Tools
     Agere (Lucent) Orinoco
     Atheros-Based cards and MADwifi
     802.1X on Linux with xsupplicant
       Chapter 20.  Using 802.11 Access Points
     General Functions of an Access Point
     Power over Ethernet (PoE)
     Selecting Access Points
     Cisco 1200 Access Point
     Apple AirPort
       Chapter 21.  Logical Wireless Network Architecture
     Evaluating a Logical Architecture
     Topology Examples
     Choosing Your Logical Architecture
       Chapter 22.  Security Architecture
     Security Definition and Analysis
     Authentication and Access Control
     Ensuring Secrecy Through Encryption
     Selecting Security Protocols
     Rogue Access Points
       Chapter 23.  Site Planning and Project Management
     Project Planning and Requirements
     Network Requirements
     Physical Layer Selection and Design
     Planning Access-Point Placement
     Using Antennas to Tailor Coverage
       Chapter 24.  802.11 Network Analysis
     Network Analyzers
     Ethereal
     802.11 Network Analysis Checklist
     Other Tools
       Chapter 25.  802.11 Performance Tuning
     802.11 Performance Calculations
     Improving Performance
     Tunable 802.11 Parameters
       Chapter 26.  Conclusions and Predictions
     Standards Work
     Current Trends in Wireless Networking
     The End

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
点评回复

使用道具 举报

 楼主| 发表于 2007-5-28 17:00:02 | 显示全部楼层
【文件名】:07528@52RD_The Definitive Guide(2nd Edition)part2.rar
【格 式】:rar
【大 小】:3825K
【简 介】:Part 2 of the Book
【目 录】: Same as part 1

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
点评回复

使用道具 举报

高级模式
B Color Image Link Quote Code Smilies

本版积分规则

Archiver|手机版|小黑屋|52RD我爱研发网 ( 沪ICP备2022007804号-2 )

GMT+8, 2024-10-8 02:17 , Processed in 0.046588 second(s), 18 queries , Gzip On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表