Wireless LANs were originally meant to be deployed in protected locations such as corporate offices; But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network adapter. We explain how easily this can be performed,in particular with the new generation of adapters. We then present a new enhanced system to detection greedy behavior in the MAC layer IEEE 802.11.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Wireless LANs were originally meant to be deployed in protected locations such as corporate offices; But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network adapter. We explain how easily this can be performed,in particular with the new generation of adapters. We then present a new enhanced system to detection greedy behavior in the MAC layer IEEE 802.11. 128 pp. Englisch. N° de réf. du vendeur 9783846534779
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26357491219
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Alsahag Alkazmi AliAli M. Alshahg Alkazmi is a lecturer at the engineering faculty of Aden University,has obtained his Master degree in computer networks from University Putra Malaysia in 2008,Since then he pursuing his Ph.D. on the . N° de réf. du vendeur 5497335
Quantité disponible : Plus de 20 disponibles
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 356081100
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18357491225
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Wireless LANs were originally meant to be deployed in protected locations such as corporate offices; But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network adapter. We explain how easily this can be performed,in particular with the new generation of adapters. We then present a new enhanced system to detection greedy behavior in the MAC layer IEEE 802.11.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 128 pp. Englisch. N° de réf. du vendeur 9783846534779
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless LANs were originally meant to be deployed in protected locations such as corporate offices; But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network adapter. We explain how easily this can be performed,in particular with the new generation of adapters. We then present a new enhanced system to detection greedy behavior in the MAC layer IEEE 802.11. N° de réf. du vendeur 9783846534779
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Greedy Behavior in Wireless Network Hotspots | Enhancing MAC Layer Misbehavior Detection System in Wi-Fi Networks | Ali Alsahag Alkazmi (u. a.) | Taschenbuch | 128 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846534779 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. N° de réf. du vendeur 106742637
Quantité disponible : 5 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 128 pages. 8.66x5.91x0.29 inches. In Stock. N° de réf. du vendeur __3846534773
Quantité disponible : 1 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
paperback. Etat : New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA82938465347736
Quantité disponible : 1 disponible(s)