Secure roaming in 802.11 networks /:
This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections wh...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Newnes/Elsevier,
©2007.
|
Schriftenreihe: | Communications engineering series.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and cant, in its pure form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well. * Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques * Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities * Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered |
Beschreibung: | 1 online resource (xxiv, 343 pages) : illustrations, maps |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780750682114 0750682116 9780080548944 0080548946 1281120316 9781281120311 9786611120313 6611120319 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162593979 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2007 ne ab ob 001 0 eng d | ||
010 | |z 2007009361 | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d OCLCO |d N$T |d YDXCP |d EBLCP |d BTCTA |d MERUC |d UBY |d ZCU |d E7B |d IDEBK |d DKDLA |d OCLCQ |d UMI |d OCLCO |d DEBSZ |d OCLCQ |d OCLCO |d AU@ |d OCLCF |d UKDOC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d OCLCQ |d JBG |d U3W |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d HS0 |d OCLCQ |d UKCRE |d VLY |d AJS |d OCLCQ |d OCLCO |d M8D |d OCLCQ |d OCLCO |d KSU |d OCLCQ |d OCLCO |d EZC |d OCLCL |d INARC | ||
019 | |a 173511666 |a 173607070 |a 271808216 |a 437186456 |a 441818443 |a 488430891 |a 505139255 |a 507525090 |a 648315826 |a 815542560 |a 827290126 |a 856952350 |a 961513144 |a 962681812 |a 984785202 |a 988434957 |a 992061731 |a 1034973903 |a 1037754057 |a 1038660387 |a 1055387502 |a 1064859063 |a 1081228598 |a 1152975820 |a 1153488301 |a 1162024866 |a 1192346197 |a 1202536426 |a 1228555057 |a 1262670636 |a 1311135430 | ||
020 | |a 9780750682114 | ||
020 | |a 0750682116 | ||
020 | |a 9780080548944 |q (electronic bk.) | ||
020 | |a 0080548946 |q (electronic bk.) | ||
020 | |a 1281120316 | ||
020 | |a 9781281120311 | ||
020 | |a 9786611120313 | ||
020 | |a 6611120319 | ||
035 | |a (OCoLC)162593979 |z (OCoLC)173511666 |z (OCoLC)173607070 |z (OCoLC)271808216 |z (OCoLC)437186456 |z (OCoLC)441818443 |z (OCoLC)488430891 |z (OCoLC)505139255 |z (OCoLC)507525090 |z (OCoLC)648315826 |z (OCoLC)815542560 |z (OCoLC)827290126 |z (OCoLC)856952350 |z (OCoLC)961513144 |z (OCoLC)962681812 |z (OCoLC)984785202 |z (OCoLC)988434957 |z (OCoLC)992061731 |z (OCoLC)1034973903 |z (OCoLC)1037754057 |z (OCoLC)1038660387 |z (OCoLC)1055387502 |z (OCoLC)1064859063 |z (OCoLC)1081228598 |z (OCoLC)1152975820 |z (OCoLC)1153488301 |z (OCoLC)1162024866 |z (OCoLC)1192346197 |z (OCoLC)1202536426 |z (OCoLC)1228555057 |z (OCoLC)1262670636 |z (OCoLC)1311135430 | ||
037 | |a 132283:132391 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.78 |b .G67 2007eb | |
072 | 7 | |a TEC |x 034000 |2 bisacsh | |
072 | 7 | |a TEC |x 061000 |2 bisacsh | |
082 | 7 | |a 621.384 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Goransson, Paul. |0 http://id.loc.gov/authorities/names/n2007015566 | |
245 | 1 | 0 | |a Secure roaming in 802.11 networks / |c by Paul Goransson and Raymond Greenlaw. |
260 | |a Amsterdam ; |a Boston : |b Newnes/Elsevier, |c ©2007. | ||
300 | |a 1 online resource (xxiv, 343 pages) : |b illustrations, maps | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Communications engineering series | |
520 | |a This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and cant, in its pure form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well. * Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques * Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities * Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts | |
505 | 8 | |a 2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance | |
505 | 8 | |a 4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 | |
505 | 8 | |a 6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary | |
505 | 8 | |a Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience | |
546 | |a English. | ||
650 | 0 | |a Wireless LANs |x Security measures. | |
650 | 0 | |a IEEE 802.11 (Standard) |0 http://id.loc.gov/authorities/subjects/sh2003001289 | |
650 | 6 | |a Réseaux locaux sans fil |x Sécurité |x Mesures. | |
650 | 6 | |a IEEE 802.11 (Norme) | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Radio. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Mobile & Wireless Communications. |2 bisacsh | |
650 | 7 | |a IEEE 802.11 (Standard) |2 fast | |
650 | 7 | |a Wireless LANs |x Security measures |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Greenlaw, Raymond. |0 http://id.loc.gov/authorities/names/n94078706 | |
758 | |i has work: |a Secure roaming in 802.11 networks (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGQt8cTTRcQMPTGKw8ybFq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Goransson, Paul. |t Secure roaming in 802.11 networks. |d Amsterdam ; Boston : Newnes/Elsevier, ©2007 |z 9780750682114 |z 0750682116 |w (DLC) 2007009361 |w (OCoLC)85892296 |
830 | 0 | |a Communications engineering series. |0 http://id.loc.gov/authorities/names/no2004015741 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203415 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780750682114 |3 Volltext |
938 | |a 123Library |b 123L |n 35081 | ||
938 | |a Baker and Taylor |b BTCP |n BK0007476643 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL305653 | ||
938 | |a ebrary |b EBRY |n ebr10188588 | ||
938 | |a EBSCOhost |b EBSC |n 203415 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 112031 | ||
938 | |a YBP Library Services |b YANK |n 2614860 | ||
938 | |a Internet Archive |b INAR |n secureroamingin80000gora | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162593979 |
---|---|
_version_ | 1816881652623736832 |
adam_text | |
any_adam_object | |
author | Goransson, Paul |
author2 | Greenlaw, Raymond |
author2_role | |
author2_variant | r g rg |
author_GND | http://id.loc.gov/authorities/names/n2007015566 http://id.loc.gov/authorities/names/n94078706 |
author_facet | Goransson, Paul Greenlaw, Raymond |
author_role | |
author_sort | Goransson, Paul |
author_variant | p g pg |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.78 .G67 2007eb |
callnumber-search | TK5105.78 .G67 2007eb |
callnumber-sort | TK 45105.78 G67 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts 2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience |
ctrlnum | (OCoLC)162593979 |
dewey-full | 621.384 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.384 |
dewey-search | 621.384 |
dewey-sort | 3621.384 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09029cam a2200841 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162593979</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2007 ne ab ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007009361</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">BTCTA</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">STF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">U3W</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">KSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EZC</subfield><subfield code="d">OCLCL</subfield><subfield code="d">INARC</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">173511666</subfield><subfield code="a">173607070</subfield><subfield code="a">271808216</subfield><subfield code="a">437186456</subfield><subfield code="a">441818443</subfield><subfield code="a">488430891</subfield><subfield code="a">505139255</subfield><subfield code="a">507525090</subfield><subfield code="a">648315826</subfield><subfield code="a">815542560</subfield><subfield code="a">827290126</subfield><subfield code="a">856952350</subfield><subfield code="a">961513144</subfield><subfield code="a">962681812</subfield><subfield code="a">984785202</subfield><subfield code="a">988434957</subfield><subfield code="a">992061731</subfield><subfield code="a">1034973903</subfield><subfield code="a">1037754057</subfield><subfield code="a">1038660387</subfield><subfield code="a">1055387502</subfield><subfield code="a">1064859063</subfield><subfield code="a">1081228598</subfield><subfield code="a">1152975820</subfield><subfield code="a">1153488301</subfield><subfield code="a">1162024866</subfield><subfield code="a">1192346197</subfield><subfield code="a">1202536426</subfield><subfield code="a">1228555057</subfield><subfield code="a">1262670636</subfield><subfield code="a">1311135430</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750682114</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750682116</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080548944</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080548946</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281120316</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281120311</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611120313</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611120319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162593979</subfield><subfield code="z">(OCoLC)173511666</subfield><subfield code="z">(OCoLC)173607070</subfield><subfield code="z">(OCoLC)271808216</subfield><subfield code="z">(OCoLC)437186456</subfield><subfield code="z">(OCoLC)441818443</subfield><subfield code="z">(OCoLC)488430891</subfield><subfield code="z">(OCoLC)505139255</subfield><subfield code="z">(OCoLC)507525090</subfield><subfield code="z">(OCoLC)648315826</subfield><subfield code="z">(OCoLC)815542560</subfield><subfield code="z">(OCoLC)827290126</subfield><subfield code="z">(OCoLC)856952350</subfield><subfield code="z">(OCoLC)961513144</subfield><subfield code="z">(OCoLC)962681812</subfield><subfield code="z">(OCoLC)984785202</subfield><subfield code="z">(OCoLC)988434957</subfield><subfield code="z">(OCoLC)992061731</subfield><subfield code="z">(OCoLC)1034973903</subfield><subfield code="z">(OCoLC)1037754057</subfield><subfield code="z">(OCoLC)1038660387</subfield><subfield code="z">(OCoLC)1055387502</subfield><subfield code="z">(OCoLC)1064859063</subfield><subfield code="z">(OCoLC)1081228598</subfield><subfield code="z">(OCoLC)1152975820</subfield><subfield code="z">(OCoLC)1153488301</subfield><subfield code="z">(OCoLC)1162024866</subfield><subfield code="z">(OCoLC)1192346197</subfield><subfield code="z">(OCoLC)1202536426</subfield><subfield code="z">(OCoLC)1228555057</subfield><subfield code="z">(OCoLC)1262670636</subfield><subfield code="z">(OCoLC)1311135430</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">132283:132391</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.78</subfield><subfield code="b">.G67 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">034000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">061000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.384</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Goransson, Paul.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007015566</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure roaming in 802.11 networks /</subfield><subfield code="c">by Paul Goransson and Raymond Greenlaw.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Newnes/Elsevier,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 343 pages) :</subfield><subfield code="b">illustrations, maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications engineering series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and cant, in its pure form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well. * Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques * Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities * Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IEEE 802.11 (Standard)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2003001289</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux locaux sans fil</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">IEEE 802.11 (Norme)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Radio.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Mobile & Wireless Communications.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IEEE 802.11 (Standard)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greenlaw, Raymond.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94078706</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Secure roaming in 802.11 networks (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGQt8cTTRcQMPTGKw8ybFq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Goransson, Paul.</subfield><subfield code="t">Secure roaming in 802.11 networks.</subfield><subfield code="d">Amsterdam ; Boston : Newnes/Elsevier, ©2007</subfield><subfield code="z">9780750682114</subfield><subfield code="z">0750682116</subfield><subfield code="w">(DLC) 2007009361</subfield><subfield code="w">(OCoLC)85892296</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications engineering series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004015741</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203415</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780750682114</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">35081</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0007476643</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL305653</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10188588</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">203415</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">112031</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2614860</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">secureroamingin80000gora</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn162593979 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9780750682114 0750682116 9780080548944 0080548946 1281120316 9781281120311 9786611120313 6611120319 |
language | English |
oclc_num | 162593979 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxiv, 343 pages) : illustrations, maps |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Newnes/Elsevier, |
record_format | marc |
series | Communications engineering series. |
series2 | Communications engineering series |
spelling | Goransson, Paul. http://id.loc.gov/authorities/names/n2007015566 Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw. Amsterdam ; Boston : Newnes/Elsevier, ©2007. 1 online resource (xxiv, 343 pages) : illustrations, maps text txt rdacontent computer c rdamedia online resource cr rdacarrier Communications engineering series This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and cant, in its pure form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. Coverage of User Authentication in 802.11 is reviewed as is roaming between 802.11 and other wireless technologies. Wireless technologies and application programming interfaces are given their due with generous coverage as well. * Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques * Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities * Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered Includes bibliographical references and index. Print version record. Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts 2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience English. Wireless LANs Security measures. IEEE 802.11 (Standard) http://id.loc.gov/authorities/subjects/sh2003001289 Réseaux locaux sans fil Sécurité Mesures. IEEE 802.11 (Norme) TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh IEEE 802.11 (Standard) fast Wireless LANs Security measures fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Greenlaw, Raymond. http://id.loc.gov/authorities/names/n94078706 has work: Secure roaming in 802.11 networks (Text) https://id.oclc.org/worldcat/entity/E39PCGQt8cTTRcQMPTGKw8ybFq https://id.oclc.org/worldcat/ontology/hasWork Print version: Goransson, Paul. Secure roaming in 802.11 networks. Amsterdam ; Boston : Newnes/Elsevier, ©2007 9780750682114 0750682116 (DLC) 2007009361 (OCoLC)85892296 Communications engineering series. http://id.loc.gov/authorities/names/no2004015741 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203415 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780750682114 Volltext |
spellingShingle | Goransson, Paul Secure roaming in 802.11 networks / Communications engineering series. Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts 2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience Wireless LANs Security measures. IEEE 802.11 (Standard) http://id.loc.gov/authorities/subjects/sh2003001289 Réseaux locaux sans fil Sécurité Mesures. IEEE 802.11 (Norme) TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh IEEE 802.11 (Standard) fast Wireless LANs Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2003001289 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Secure roaming in 802.11 networks / |
title_auth | Secure roaming in 802.11 networks / |
title_exact_search | Secure roaming in 802.11 networks / |
title_full | Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw. |
title_fullStr | Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw. |
title_full_unstemmed | Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw. |
title_short | Secure roaming in 802.11 networks / |
title_sort | secure roaming in 802 11 networks |
topic | Wireless LANs Security measures. IEEE 802.11 (Standard) http://id.loc.gov/authorities/subjects/sh2003001289 Réseaux locaux sans fil Sécurité Mesures. IEEE 802.11 (Norme) TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh IEEE 802.11 (Standard) fast Wireless LANs Security measures fast |
topic_facet | Wireless LANs Security measures. IEEE 802.11 (Standard) Réseaux locaux sans fil Sécurité Mesures. IEEE 802.11 (Norme) TECHNOLOGY & ENGINEERING Radio. TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. Wireless LANs Security measures dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203415 https://www.sciencedirect.com/science/book/9780750682114 |
work_keys_str_mv | AT goranssonpaul secureroamingin80211networks AT greenlawraymond secureroamingin80211networks |