Secure Roaming in 802.11 Networks -  Paul Goransson,  Raymond Greenlaw

Secure Roaming in 802.11 Networks (eBook)

eBook Download: PDF
2011 | 1. Auflage
368 Seiten
Elsevier Science (Verlag)
978-0-08-054894-4 (ISBN)
Systemvoraussetzungen
54,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices.

Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we're mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can't, in its 'pure' form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces.

This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.

* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques
* Emerges as a 'one stop' resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities
* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered

Dr. Paul Goransson has over 28 years of experience in the data communications field. He was the founder and President of Meetinghouse, which developed network access security software products for wireless and wired environments. Meetinghouse was acquired by Cisco Systems in 2006, where Paul currently serves as a Director of Engineering in the Wireless Networking Business Unit. He is also the owner/operator of Bondgarden Farm, a commercial beef and hay farm in southern Maine. Paul previously founded Qosnetics and QARobotics, which were later merged and subsequently acquired by Hewlett-Packard in 1999. Dr. Goransson has published technical articles in the fields of bandwidth reservation and wireless security. He received his Bachelor of Arts in Psychology from Brandeis University in 1975, his Masters of Science in Computer Engineering from Boston University in 1981, and his Ph.D. in Computer Science from the University of New Hampshire in 1994. Dr. Goransson has previously served as an adjunct Professor at the School of Computing at Armstrong Atlantic State University.
Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we're mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can't, in its "e;pure"e; form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces. This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques* Emerges as a "e;one stop"e; resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered

Front Cover 1
Secure Roaming In 802.11 Networks 4
Copyright Page 5
Table of Contents 8
Preface 16
Acknowledgments 20
About the Authors 24
Chapter 1. Introduction 26
1.1 Introduction 26
1.2 Basic Networking Terminology and Conventions 28
1.3 Setting the Scene 30
1.4 Different Notions of Roaming 33
1.5 Big Cells, Little Cells 37
1.6 Authentication, Authorization, Accounting, and Roaming 42
1.7 How Fast Do We Roam on the Range? 44
1.8 Taxonomy for Roaming 46
1.9 Organization of the Book 52
Chapter 2. Cellular Telephony: Wireless Roaming Pioneers 54
2.1 Introduction 54
2.2 The Future of Computing 55
2.3 Basic Concepts 56
2.4 Early History of Radio Telephony 57
2.5 The Digital Revolution 65
2.6 Soft Versus Hard Handoffs in Various Cellular Technologies 75
2.7 The Quest for Convergence 76
2.8 Summary 85
Chapter 3. Roaming in 802.11 WLANs:General Principles 88
3.1 Introduction 88
3.2 Primer on the 802.11 Standard 89
3.3 Introduction to 802.11 Roaming 104
3.4 Local Roaming 111
3.5 Global Roaming 113
3.6 Mobile IP and Its Role in 802.11 Roaming 117
3.7 Those Pesky Laws of Physics 122
Chapter 4. Dynamics of 802.11 Task Groups 126
4.1 Introduction 126
4.2 Evolution of an IEEE Standard 127
4.3 Battle for Speed, Cost, and Market Dominance 131
4.4 The 802.11 Standard’s Physical Layer 133
4.5 Fast Secure Roaming Task Groups 136
4.6 802.11i Security 137
4.7 802.11e Quality of Service 142
4.8 802.11k Radio Resource Measurement Enhancements 145
4.9 802.11r Roaming 149
4.10 Other 802.11 Subgroups 152
4.11 Wi-Fi Alliance Versus IEEE 802.11 153
Chapter 5. Practical Aspects of Basic 802.11 Roaming 158
5.1 Introduction 158
5.2 The Driver and Client in an 802.11 Station 159
5.3 Detailed Analyses of Real-Life Roams 178
5.4 Dissection of a Global Roam 181
5.5 Dissection of a Local Roam 184
5.6 Access-Point Placement Methodologies 189
Chapter 6. Fundamentals of User Authentication in 802.11 194
6.1 Introduction 194
6.2 802.1X Port-Level Authentication 195
6.3 The AAA Server 198
6.4 The Extensible Authentication Protocol 202
6.5 Flexible and Strong Authentication in 802.11 209
6.6 Other 802.11 Authentication Methodologies 212
6.7 Network Access Control 213
6.8 Summary 217
Chapter 7. Roaming Securely in 802.11 220
7.1 Introduction 220
7.2 The 802.11 Security Staircase 221
7.3 Preauthentication in 802.11i 223
7.4 Detailed Analysis of Real-Life Secured Roams 225
7.5 Dissection of a WPA-PSK Protected Roam 226
7.6 Dissection of a WPA2 Enterprise Roam 228
7.7 Dissection of an 802.11i Preauthentication 235
7.8 Summary 243
Chapter 8. Optimizing Beyond the 802.11 Standard 244
8.1 Introduction 244
8.2 Voice over Wireless IP Roaming 245
8.3 Opportunistic Key Caching 252
8.4 Centralized Wireless Switch Architectures 254
Chapter 9. The 802.11 Workgroups’ Solutions for Fast Secure Roaming 260
9.1 Introduction 260
9.2 Overview of the 802.11r Standard 261
9.3 Detailed Concepts and Terminology of 802.11r 263
9.4 Protocol Exchanges in 802.11r 275
9.5 The 802.11k Standard Applied to Roaming 282
9.6 Concluding Remarks 289
Chapter 10. Roaming between 802.11 and Other Wireless Technologies 292
10.1 Introduction 292
10.2 Ideal Roaming Experience 295
10.3 IEEE 802.16: WiMAX 296
10.4 IEEE 802.15.1: Bluetooth 298
10.5 Relevant Standards Bodies and Industry Organizations 299
10.6 Third Generation Partnership Program 301
10.7 UMA: A Transitional Step for 3GPP 311
10.8 Third Generation Partnership Program 2 312
10.9 The 802.21 Standard 314
10.10 Summary 319
Chapter 11. Future Directions 322
11.1 Introduction 322
11.2 Survey of Ongoing Work Related to 802.11 323
11.3 A Mobility Model for Studying Wireless Communication 332
11.4 Conclusions 337
Appendix A. Acronyms and Abbreviations 340
Appendix B. List of Figures 352
Appendix C. List of Tables 357
Index 358

Erscheint lt. Verlag 1.4.2011
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 0-08-054894-6 / 0080548946
ISBN-13 978-0-08-054894-4 / 9780080548944
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 7,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90