top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
Soggetto genere / forma Electronic books.
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910457082903321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910784359303321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910824458503321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wi-Fi telephony [[electronic resource] ] : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Wi-Fi telephony [[electronic resource] ] : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Descrizione fisica 1 online resource (289 p.)
Disciplina 004.69
Altri autori (Persone) LideDavid R. <1928->
Collana Communications engineering series
Soggetto topico Internet telephony
Wireless LANs
Soggetto genere / forma Electronic books.
ISBN 1-281-02248-9
9786611022488
0-08-052169-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs; Copyright Page; Contents; Acknowledgments; Acronyms; About the Authors; Chapter 1. The Telephony World; 1.1 The Basics; 1.2 Digitizing Speech; 1.3 PSTN Architecture; 1.4 Signaling; 1.5 Voice and Wireless Networks; 1.6 Summary; Chapter 2. The Data World; 2.1 Introduction; 2.2 Brief History; 2.3 The OSI Seven-Layer Model; 2.4 The IP Protocol; 2.5 The TCP/IP Transport Layer; 2.6 Other TCP/IP-Based Protocols; 2.7 Conclusion; References; Chapter 3. Voice over IP; 3.1 Introduction; 3.2 Putting Voice Over Internet
3.3 VoIP Architectures3.4 Signaling Protocols; 3.5 Voice-over-IP Media; 3.6 The Overall Picture; References; Chapter 4. Wireless Local Area Networks; 4.1 Introduction; 4.2 The Alphabet Soup; 4.3 Network Architecture; 4.4 802.11 Framing; 4.5 Accessing the Medium; 4.6 802.11 PHY; 4.7 Power Save in 802.11; 4.8 Conclusion; Chapter 5. VoWLAN Challenges; 5.1 Introduction; 5.2 VoWLAN; 5.3 System Capacity and QoS; 5.4 PCF; 5.5 Admission Control; 5.6 Security; 5.7 Power Save; 5.8 Roaming/Handoffs in 802.11; 5.9 Summary; Chapter 6. QoS and System Capacity; 6.1 Introduction
6.2 802.11e, WME and "Vanilla" WLANs6.3 Traffic Categories; 6.4 Transmission Opportunity; 6.5 EDCF; 6.6 HCF; 6.7 Voice Data Coexistence; 6.8 Achieving QoS for VoWLAN; 6.9 System Capacity; 6.10 Admission Control; 6.11 Summary; Chapter 7. Security; 7.1 Introduction; 7.2 Key Establishment in 802.11; 7.3 Anonymity in 802.11; 7.4 Authentication in 802.11; 7.5 Confidentiality in 802.11; 7.6 Data Integrity in 802.11; 7.7 Loopholes in 802.11 Security; 7.8 WPA; 7.9 WPA2 (802.11i); 7.10 Beyond 802.11 Security; 7.11 Conclusion; Chapter 8. Roaming; 8.1 The Need for Roaming; 8.2 Types of Roaming
8.3 Roaming Issues8.4 Roaming and Voice; 8.5 Preparing to Roam: Scanning; 8.6 When to Roam; 8.7 Where to Roam; 8.8 Reauthentication Delays; 8.9 Inter-ESS Roaming; 8.10 Future Enhancements; 8.11 Conclusion; Chapter 9. Power Management; 9.1 The Need for Power Management; 9.2 Underlying Philosophy of Power Management; 9.3 Designing for Power Management; 9.4 Implementing Power Management; 9.5 An Operational Perspective; 9.6 Summary; Chapter 10. Voice over Wi-Fi and Other Wireless Technologies; 10.1 Introduction; 10.2 Ongoing 802.11 Standard Work; 10.3 Wi-Fi and Cellular Networks; 10.4 WiMax
10.5 VoWi-Fi and Bluetooth10.6 VoWi-Fi and DECT; 10.7 VoWi-Fi and Other Ongoing 802.x Wireless Projects; 10.8 Conclusion; References; Index
Record Nr. UNINA-9910457341303321
Chandra Praphul  
Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wi-Fi telephony [[electronic resource] ] : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Wi-Fi telephony [[electronic resource] ] : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Descrizione fisica 1 online resource (289 p.)
Disciplina 004.69
Altri autori (Persone) LideDavid R. <1928->
Collana Communications engineering series
Soggetto topico Internet telephony
Wireless LANs
ISBN 1-281-02248-9
9786611022488
0-08-052169-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs; Copyright Page; Contents; Acknowledgments; Acronyms; About the Authors; Chapter 1. The Telephony World; 1.1 The Basics; 1.2 Digitizing Speech; 1.3 PSTN Architecture; 1.4 Signaling; 1.5 Voice and Wireless Networks; 1.6 Summary; Chapter 2. The Data World; 2.1 Introduction; 2.2 Brief History; 2.3 The OSI Seven-Layer Model; 2.4 The IP Protocol; 2.5 The TCP/IP Transport Layer; 2.6 Other TCP/IP-Based Protocols; 2.7 Conclusion; References; Chapter 3. Voice over IP; 3.1 Introduction; 3.2 Putting Voice Over Internet
3.3 VoIP Architectures3.4 Signaling Protocols; 3.5 Voice-over-IP Media; 3.6 The Overall Picture; References; Chapter 4. Wireless Local Area Networks; 4.1 Introduction; 4.2 The Alphabet Soup; 4.3 Network Architecture; 4.4 802.11 Framing; 4.5 Accessing the Medium; 4.6 802.11 PHY; 4.7 Power Save in 802.11; 4.8 Conclusion; Chapter 5. VoWLAN Challenges; 5.1 Introduction; 5.2 VoWLAN; 5.3 System Capacity and QoS; 5.4 PCF; 5.5 Admission Control; 5.6 Security; 5.7 Power Save; 5.8 Roaming/Handoffs in 802.11; 5.9 Summary; Chapter 6. QoS and System Capacity; 6.1 Introduction
6.2 802.11e, WME and "Vanilla" WLANs6.3 Traffic Categories; 6.4 Transmission Opportunity; 6.5 EDCF; 6.6 HCF; 6.7 Voice Data Coexistence; 6.8 Achieving QoS for VoWLAN; 6.9 System Capacity; 6.10 Admission Control; 6.11 Summary; Chapter 7. Security; 7.1 Introduction; 7.2 Key Establishment in 802.11; 7.3 Anonymity in 802.11; 7.4 Authentication in 802.11; 7.5 Confidentiality in 802.11; 7.6 Data Integrity in 802.11; 7.7 Loopholes in 802.11 Security; 7.8 WPA; 7.9 WPA2 (802.11i); 7.10 Beyond 802.11 Security; 7.11 Conclusion; Chapter 8. Roaming; 8.1 The Need for Roaming; 8.2 Types of Roaming
8.3 Roaming Issues8.4 Roaming and Voice; 8.5 Preparing to Roam: Scanning; 8.6 When to Roam; 8.7 Where to Roam; 8.8 Reauthentication Delays; 8.9 Inter-ESS Roaming; 8.10 Future Enhancements; 8.11 Conclusion; Chapter 9. Power Management; 9.1 The Need for Power Management; 9.2 Underlying Philosophy of Power Management; 9.3 Designing for Power Management; 9.4 Implementing Power Management; 9.5 An Operational Perspective; 9.6 Summary; Chapter 10. Voice over Wi-Fi and Other Wireless Technologies; 10.1 Introduction; 10.2 Ongoing 802.11 Standard Work; 10.3 Wi-Fi and Cellular Networks; 10.4 WiMax
10.5 VoWi-Fi and Bluetooth10.6 VoWi-Fi and DECT; 10.7 VoWi-Fi and Other Ongoing 802.x Wireless Projects; 10.8 Conclusion; References; Index
Record Nr. UNINA-9910784355803321
Chandra Praphul  
Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wi-Fi telephony : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Wi-Fi telephony : challenges and solutions for voice over WLANs / / by Praphul Chandra and David Lide
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Descrizione fisica 1 online resource (289 p.)
Disciplina 004.69
Altri autori (Persone) LideDavid R. <1928->
Collana Communications engineering series
Soggetto topico Internet telephony
Wireless LANs
ISBN 1-281-02248-9
9786611022488
0-08-052169-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs; Copyright Page; Contents; Acknowledgments; Acronyms; About the Authors; Chapter 1. The Telephony World; 1.1 The Basics; 1.2 Digitizing Speech; 1.3 PSTN Architecture; 1.4 Signaling; 1.5 Voice and Wireless Networks; 1.6 Summary; Chapter 2. The Data World; 2.1 Introduction; 2.2 Brief History; 2.3 The OSI Seven-Layer Model; 2.4 The IP Protocol; 2.5 The TCP/IP Transport Layer; 2.6 Other TCP/IP-Based Protocols; 2.7 Conclusion; References; Chapter 3. Voice over IP; 3.1 Introduction; 3.2 Putting Voice Over Internet
3.3 VoIP Architectures3.4 Signaling Protocols; 3.5 Voice-over-IP Media; 3.6 The Overall Picture; References; Chapter 4. Wireless Local Area Networks; 4.1 Introduction; 4.2 The Alphabet Soup; 4.3 Network Architecture; 4.4 802.11 Framing; 4.5 Accessing the Medium; 4.6 802.11 PHY; 4.7 Power Save in 802.11; 4.8 Conclusion; Chapter 5. VoWLAN Challenges; 5.1 Introduction; 5.2 VoWLAN; 5.3 System Capacity and QoS; 5.4 PCF; 5.5 Admission Control; 5.6 Security; 5.7 Power Save; 5.8 Roaming/Handoffs in 802.11; 5.9 Summary; Chapter 6. QoS and System Capacity; 6.1 Introduction
6.2 802.11e, WME and "Vanilla" WLANs6.3 Traffic Categories; 6.4 Transmission Opportunity; 6.5 EDCF; 6.6 HCF; 6.7 Voice Data Coexistence; 6.8 Achieving QoS for VoWLAN; 6.9 System Capacity; 6.10 Admission Control; 6.11 Summary; Chapter 7. Security; 7.1 Introduction; 7.2 Key Establishment in 802.11; 7.3 Anonymity in 802.11; 7.4 Authentication in 802.11; 7.5 Confidentiality in 802.11; 7.6 Data Integrity in 802.11; 7.7 Loopholes in 802.11 Security; 7.8 WPA; 7.9 WPA2 (802.11i); 7.10 Beyond 802.11 Security; 7.11 Conclusion; Chapter 8. Roaming; 8.1 The Need for Roaming; 8.2 Types of Roaming
8.3 Roaming Issues8.4 Roaming and Voice; 8.5 Preparing to Roam: Scanning; 8.6 When to Roam; 8.7 Where to Roam; 8.8 Reauthentication Delays; 8.9 Inter-ESS Roaming; 8.10 Future Enhancements; 8.11 Conclusion; Chapter 9. Power Management; 9.1 The Need for Power Management; 9.2 Underlying Philosophy of Power Management; 9.3 Designing for Power Management; 9.4 Implementing Power Management; 9.5 An Operational Perspective; 9.6 Summary; Chapter 10. Voice over Wi-Fi and Other Wireless Technologies; 10.1 Introduction; 10.2 Ongoing 802.11 Standard Work; 10.3 Wi-Fi and Cellular Networks; 10.4 WiMax
10.5 VoWi-Fi and Bluetooth10.6 VoWi-Fi and DECT; 10.7 VoWi-Fi and Other Ongoing 802.x Wireless Projects; 10.8 Conclusion; References; Index
Altri titoli varianti Challenges and solutions for voice over WLANs
Record Nr. UNINA-9910806894703321
Chandra Praphul  
Amsterdam ; ; Boston, : Elsevier/Newnes, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui