8022.11 Wifi networks.pdf

(5469 KB) Pobierz
645493363 UNPDF
645493363.001.png
Alan Holt
Chi-Yu Huang
802.11 Wireless
Networks
Security and Analysis
645493363.002.png
Dr. Alan Holt
IP Performance
1-3 Merietts Court
Long Ashton Business Park
Long Ashton
Bristol BS41 9LW
UK
Dr. Chi-Yu Huang
Tata Technologies Ltd
6 Monarch Court
Emerald Park
Emersons Green
Bristol BS16 7FH
UK
Series Editor
Professor A.J. Sammes, BSc, MPhil, PhD, FBCS, CEng
Centre for Forensic Computing
Cranfield University
DCMT, Shrivenham
Swindon SN6 8LA
UK
ISSN 1617-7975
ISBN 978-1-84996-274-2
e-ISBN 978-1-84996-275-9
DOI 10.1007/978-1-84996-275-9
Springer London Dordrecht Heidelberg New York
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Control Number: 2010930228
© Springer-Verlag London Limited 2010
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as per-
mitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced,
stored or transmitted, in any form or by any means, with the prior permission in writing of the publish-
ers, or in the case of reprographic reproduction in accordance with the terms of licenses issued by the
Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to
the publishers.
The use of registered names, trademarks, etc., in this publication does not imply, even in the absence of a
specific statement, that such names are exempt from the relevant laws and regulations and therefore free
for general use.
The publisher makes no representation, express or implied, with regard to the accuracy of the information
contained in this book and cannot accept any legal responsibility or liability for any errors or omissions
that may be made.
Cover design : VTEX, Vilnius
Printed on acid-free paper
Springer is part of Springer Science+Business Media ( www.springer.com )
Preface
This book is about wireless local area networks (WLANs) based upon the IEEE
802.11 standards. It has three primary objectives:
To introduce the principles of 802.11 wireless networks and show how to config-
ure equipment in order to implement various network solutions.
To provide an understanding of the security implications of wireless networks and
demonstrate how vulnerabilities can be mitigated.
To introduce the underlying 802.11 protocols and build mathematical models in
order to analyse performance in a WLAN environment.
The book is aimed at industry professionals as well as undergraduate and gradu-
ate level students. It is intended as a companion for a university course on wireless
networking.
A practical approach is adopted in this book; examples are provided throughout,
supported by detailed instructions. We cover a number of wireless vendors; namely,
Cisco’s Aironet, Alactel-Lucent’s Omniaccess and Meru Networks. While separate
vendors, all three systems have a Cisco IOS-like command-line interface.
The GNU/Linux operating system is used extensively throughout this book.
GNU/Linux systems have gained considerable popularity in the server and em-
bedded system market (indeed, both Alcatel-Lucent and Meru Network’s wireless
equipment are based upon GNU/Linux). As well as the core GNU/Linux software
we also use a number of open source applications. Wireless equipment does not op-
erate in isolation. There are times when other network services are required, such as
RADIUS. FreeRADIUS, in conjunction with a MySQL database server, is used to
demonstrate an enterprise secutity WLAN. For convenience, the Xen virtualisation
application is employed to emulate a multi-server environment. We show how to
build and configure these systems.
There are many GNU/Linux distributions available. In this book, we use Debian
and its derivative, Ubuntu. Debian and Debian like distributions have APT, a power-
ful package management application that greatly simplifies software installation and
maintenance. Other distributions will have their advocates and supporters and if you
wish to replicate the examples in this book we suggest you use the distribution with
vii
viii
Preface
which you are most familiar. However, you will have to translate the instructions to
suit your distribution where they differ from Ubuntu/Debian.
We present a number of mathematical models in this book for analysing the per-
formance of 802.11. We show how to build these models using the commercial
application computer algebra, Maple. The examples presented in this book were
developed on Maple version 11, but all the examples should work on older versions.
Acknowledgments
The authors would like to thank the following people for the valuable contribu-
tion they made to this book: Dr Adrian Davies, Dr Sue Casson (Leeds University),
Michael Dewsnip (DL Consulting), Wayne Look (IP Performance), and Damien
Parker (IP Performance).
Thanks also to Simon Rees of Spinger for all his support in helping us through
this process.
Bristol, UK
Alan Holt
Hamilton, New Zealand
Chi-Yu Huang
Zgłoś jeśli naruszono regulamin