802.11 Wireless Networks

Security and Analysis

  • Alan Holt
  • Chi-Yu Huang

Part of the Computer Communications and Networks book series (CCN)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Alan Holt, Chi-Yu Huang
    Pages 1-13
  3. Alan Holt, Chi-Yu Huang
    Pages 15-34
  4. Alan Holt, Chi-Yu Huang
    Pages 35-50
  5. Alan Holt, Chi-Yu Huang
    Pages 53-74
  6. Alan Holt, Chi-Yu Huang
    Pages 75-99
  7. Alan Holt, Chi-Yu Huang
    Pages 101-110
  8. Alan Holt, Chi-Yu Huang
    Pages 111-134
  9. Alan Holt, Chi-Yu Huang
    Pages 139-158
  10. Alan Holt, Chi-Yu Huang
    Pages 159-170
  11. Alan Holt, Chi-Yu Huang
    Pages 171-188
  12. Back Matter
    Pages 185-212

About this book


Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11.

This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment.

Topics and Features:

  • Presents a practical approach supported by the extensive use of examples and detailed instructions
  • Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks
  • Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple
  • Examines issues of wireless security and describes how to implement a wireless network with enterprise security
  • Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer
  • Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment.

A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking.

Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language.

Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.


802.11 Kismet Openssl Security Standards WLAN WiSpy Wireless Networks wireless network

Authors and affiliations

  • Alan Holt
    • 1
  • Chi-Yu Huang
    • 2
  1. 1.IP PerformanceLong Ashton, BristolUnited Kingdom
  2. 2.Tata Technologies Ltd.BristolUnited Kingdom

Bibliographic information