© 2010

802.11 Wireless Networks

Security and Analysis


Part of the Computer Communications and Networks book series (CCN)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Alan Holt, Chi-Yu Huang
    Pages 1-13
  3. Alan Holt, Chi-Yu Huang
    Pages 15-34
  4. Alan Holt, Chi-Yu Huang
    Pages 35-50
  5. Alan Holt, Chi-Yu Huang
    Pages 53-74
  6. Alan Holt, Chi-Yu Huang
    Pages 75-99
  7. Alan Holt, Chi-Yu Huang
    Pages 101-110
  8. Alan Holt, Chi-Yu Huang
    Pages 111-134
  9. Alan Holt, Chi-Yu Huang
    Pages 139-158
  10. Alan Holt, Chi-Yu Huang
    Pages 159-170
  11. Alan Holt, Chi-Yu Huang
    Pages 171-188
  12. Back Matter
    Pages 185-212

About this book


Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11.

This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment.

Topics and Features:

  • Presents a practical approach supported by the extensive use of examples and detailed instructions
  • Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks
  • Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple
  • Examines issues of wireless security and describes how to implement a wireless network with enterprise security
  • Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer
  • Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment.

A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking.

Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language.

Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.


802.11 Kismet Openssl Security Standards WLAN WiSpy Wireless Networks wireless network

Authors and affiliations

  1. 1.IP PerformanceLong Ashton, BristolUnited Kingdom
  2. 2.Tata Technologies Ltd.BristolUnited Kingdom

Bibliographic information

  • Book Title 802.11 Wireless Networks
  • Book Subtitle Security and Analysis
  • Authors Alan Holt
    Chi-Yu Huang
  • Series Title Computer Communications and Networks
  • Series Abbreviated Title Computer Communications, Networks
  • DOI
  • Copyright Information Springer-Verlag London Limited 2010
  • Publisher Name Springer, London
  • eBook Packages Computer Science Computer Science (R0)
  • Hardcover ISBN 978-1-84996-274-2
  • Softcover ISBN 978-1-4471-2575-4
  • eBook ISBN 978-1-84996-275-9
  • Series ISSN 1617-7975
  • Edition Number 1
  • Number of Pages XXI, 212
  • Number of Illustrations 0 b/w illustrations, 0 illustrations in colour
  • Topics Computer Communication Networks
    Theory of Computation
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences


From the reviews:

“It is hard to find a brief work that includes the scientific bases and history and the performance, implementation, configuration, and installation scripts for a widespread technology. It was therefore a pleasure to discover this pragmatic, up-to-date book on the ubiquitous IEEE 802.11 wireless communications standards, including their security features. … The content is logically organized. … the book provides excellent value from an engineering and design perspective; it can also be used in training programs.” (L-F Pau, ACM Computing Reviews, December, 2010)