当前位置:文档之家› wifi,协议详解

wifi,协议详解

竭诚为您提供优质文档/双击可除

wifi,协议详解

篇一:802.11无线wifi协议学习手册--无线网络权威指南(第二版全)

802.11无线网络权威指南

802.11无线网络权威指南

(第2版)

802.11无线网络权威指南

第1页,共508页

802.11无线网络权威指南

文档密级

目录

802.11无线网络权威指南................................................. ................................................... (1)

(第2版)................................................ ...................................................

(1)

目录................................................. ................................................... . (3)

序................................................. ................................................... .........................................14前言................................................. ................................................... ......................................16第1章无线网络导论................................................. ................................................... . (24)

1.1为何需要无线?

1.1.1无线频谱:关键资源................................................. .........................251.2无线网络的特色

1.2.1没有实体界限................................................. (27)

1.2.2动态实体介质................................................. (27)

2427

1.2.3安全性................................................. .. (28)

1.2.4标准的好处................................................. . (29)

第2章802.11网络概论................................................. ................................................... .. (31)

2.1ieee802网络技术规格2.2802.11相关术语及其设计33

2.2.1网络类型................................................. . (34)

31

2.2.2再论传输系统.................................................

(37)

2.2.3网络界限................................................. . (38)

2.3802.11网络的运作方式

2.3.1网络服务................................................. ...........................................402.4移动性的支持

2.4.1移动性网络设计................................................. .. (45)

第3章

802.11mac.......................................... ................................................... (47)

3.1mac所面临的挑战48

3.1.1射频链路质量................................................. (48)

4044

3.1.2隐藏节点的问

题................................................. ................................493.2mac访问控制与时钟

3.2.2帧间隔................................................. .. (52)

3.2.3帧间隔与优先程度................................................. .. (53)

50

3.2.1载波监听功能与网络分配矢量................................................. .. (51)

3.3利用dcF进行竞争式访问

3.3.1dcF与错误复原................................................. .. (55)

3.3.2使用重传计数器................................................. ................................553.3.3dcF与延迟................................................. (55)

54

802.11无线网络权威指南

文档密级

3.3.4spectralink语音优先性................................................. (56)

3.3.5帧的分段与重组................................................. .. (57)

3.3.6帧格式................................................. ...............................................583.

3.7Framecontrol

3.3.9address

位................................................. (58)

3.3.8duration/id 位................................................. .. (62)

位.................................................

(62)

3.3.10basicservicesetid(bssid)..................... (63)

3.3.11顺序控制位................................................. ......................................633.3.12帧主体................................................. .............................................643.3. 13帧检验序列(Fcs)............................................ ............................643.4802.11对上层协议的封装653.5竞争式数据服务

3.5.1广播与组播数据或管理帧................................................. ..................663.5.2单点传播帧................................................. ........................................673.5.3省电程序................................................. ...........................................693.5.4多种速率支持

(multiratesupport)............................... ...................713.6帧的处理与桥接

72

3.6.1无线介质到有线介质(802.11至以太网)........................................733.6.2有线介质至无线介质(wiredmediumtowirelessmedium)...........743.6.3服务质量延伸功能................................................. .. (75)

第4章802.11帧封装细节................................................. ................................................... .76

66

4.1数据帧

4.1.1Framecontrol(帧控制)............................................... . (77)

4.1.2duration(持续时间)............................................... . (77)

76

4.1.3地址与dsbit.............................................. .......................................794.1.4数据帧的次类型................................................. ................................814.1.5数据帧的封装................................................. ....................................824.2控制帧

4.2.1一般的帧控制位................................................. .. (85)

4.2.2Rts(请求发送)............................................... ................................864.2.3cts(允许发送)............................................... .. (87)

85

4.2.4ack(应答)............................................... .......................................884.2.5ps-po ll(省电模式一轮

................894.3管理帧

4.3.1管理帧的结构................................................. ....................................904.3.2长度固定的管理帧元件................................................. ......................914.3.3管理帧的信息元素................................................. .............................994.3.4管理帧的类型................................................. ..................................1124.4帧发送以及连接与身份认证状态

4.4.1帧等级................................................. (117)

第4页,共508页

90

116

802.11无线网络权威指南

第5章有线等级隐私(wep)............................................

文档密级

5.1wep的密码学背景119

5.1.1串流密码锁的安全性................................................. .......................1205.1.2密码政治学................................................. ......................................1215.2wep的加密机制

5.2.1wep的数据处理................................................. .. (122)

5.2.2wep的帧格式................................................. (125)

121

5.3关于wep的各种问题

5.3.1Rc4在密码学上的性质................................................. . (126)

5.3.2wep

统设计上的瑕

(126)

5.3.3针对wep密钥的还原攻击................................................. .............1275.3.4防范密钥还原攻击................................................. (128)

126

5.4动态wep

第6章802.1x使用者身份认证................................................. . (130)

129

6.1可延伸身份认证协议(eap)

6.1.1eap的封包格式................................................. (131)

6.1.2eap的要求与回复................................................. ...........................1326.1.3eap身份认证方式................................................. ...........................1336.1.4eap认证的成功或

失败................................................. ...................1346.1.5eap交换程序范例................................................. (134)

131

6.2eap认证方式(eapmethod)

6.2.1加密的方式................................................. .. (135)

135

6.2.2非加密式eap认证方式................................................. ..................1376.2.3其他的内层身份认证方式................................................. ................1386.3802.1x:网络连接埠的身份认证139

6.3.1802.1x的架构及相关术语................................................. ...............1406.3.2802.1x的帧过滤................................................. ..............................1416.3.3eapol的封装格

相关主题