...
now.
A-1
GUIDE TO SECURING LEGACY IEEE 802.11 WIRELESS NETWORKS
2. Overview of IEEE 802.11 Wireless Local Area Networks
Wireless local area networks (WLAN) are groups of wireless networking ...
http://grouper .ieee. org/groups/802/11/QuickGuide _IEEE_ 802_WG_and_Activities.htm and
http://standards .ieee. org/getieee802.
2-1
GUIDE TO SECURING LEG...
... Beacon
1
802.11 Wireless Networks: The Definitive Guide ISBN: 0-5 9 6-0 018 3-5
100
transmitting the frame, the mobile station processes the frame with WEP. The header identifying the
frame ... dial-up
network. Both the supplicant and the authenticator are referred to as Port Authentication Entities
(PAEs) in the specification. The authenticator termin...
... developments of the early to mid-1990s. The alphabet soup of the first edition was
gruel compared to the mulligatawny of 2005.
Matthew filled the gap between the book and contemporary wireless reality ... introduces the acronyms used
throughout the book. With 802.11, the introduction serves another important purpose. 802.11 is
superficially similar to Ethernet. Unders...
... reserve the medium for a fixed
time period. The NAV is a timer that indicates the amount of time the medium will be
reserved. Stations set the NAV to the time for which they expect to use the medium, ... represented by the bars on the NAV line at
the bottom of the figure. The NAV is carried in the frame headers on the RTS and CTS
frames; it is depicted on its ow...
... speaking,
there are many other facets to a task.
Ant: The Definitive Guide
84
The Project class
The Project class is available in every task as a public instance variable. The class
represents ... detailed list of the actions Ant
performs on a task during parse-time:
1. Instantiate the task's class.
Ant, using the name of the XML element and introspection...
... (all, String, Y)
Specifies the target to execute when no target is specified on the ant command line.
Ant: The Definitive Guide
1 24
7 .4 Core Task Reference
The remainder of this chapter ... sets the ant. file property in the newly created Project object to the same value
as the calling project, which is the name of the buildfile.
Attributes
antfile (all...
...
Override the usual location for Java installed optional packages.
Ant: The Definitive Guide
164
gcj
The gcj compiler from gcc.
sj Symantec
The Symantec compiler.
extJavac
Run either ... in place of the refid attribute.
Ant: The Definitive Guide
166
Works only when fork=true. Specifies the maximum memory size for the VM.
nowarn (1.4, boolean, N)...
... elements (1.4)
The path element overriding the SOURCEPATH environment variable.
Ant: The Definitive Guide
256
event (1.4, String, Y)
The event that triggers the action. Must be either enter ...
Specifies the p4 -u option. Defaults to the value of the p4.user property, if set.
Ant: The Definitive Guide
284
Content
0,1 nested <fail> elements (1.3,...
...
Section 12 .1. Nokia C 110 /C 111
Section 12 .2. Lucent ORiNOCO
Chapter 13 . Using 802 .11 on Linux
Section 13 .1. A Few Words on 802 .11 Hardware
Section 13 .2. PCMCIA ...
Section 11 .2. OFDM as Applied by 802 .11 a
Section 11 .3. OFDM PLCP
Section 11 .4. OFDM PMD
Section 11 .5. Characteristics of the OFDM PHY
Chapter...
... which is the reverse of the
order used in Figure 3-10. Therefore, the frame type is the third bit in the frame control
field followed by the second bit (b3 b2), and the subtype is the seventh ... the figure, the "MAC headers" for 8 02. 1h and RFC 10 42 might be the 12 bytes
of source and destination MAC address information on Ethernet or the long 8 02. 1...
... the destination MAC address and the source MAC address. On a
wireless network, the MAC header would be the 24- to 30 -byte header described
in Chapter 3.
Ethernet Type
As with any other Ethernet ... use the source address of frames as the identity of the
sender; no fields within the frame are used to further identify the sender.
There are two information elements in...
... on the access point; therefore, the Listen
Interval is one of the key parameters used in estimating the resources required to support
an association. The Listen Interval is a contract with the ... TIM. The lines above the station base lines indicate the ramp-up process of the
receiver to listen for the TIM.
Figure 7-11. Buffered frame retrieval process
At the fi...
... classify them any further. Brave, stout-hearted
readers can order the specification from the PCMCIA and use the dump_cis tool
on Linux to read the CIS of inserted cards.
The CIS assists the host ... script on the wireless station to
send traffic periodically to prevent the association from timing out.
13.3 .6. 6 "MAC initialization failure, result=xxx"
The fi...