|
Part I Making Connections by Cutting the Cables |
|
|
|
Wi--Fi: What, Why, Where, Who, and How? |
|
|
3 | (18) |
|
|
4 | (1) |
|
A Drive-By Wi-Fi Overview |
|
|
5 | (6) |
|
|
7 | (1) |
|
IEEE 802.11: How It Came About |
|
|
7 | (1) |
|
The Magic of (IEEE) Numbers |
|
|
8 | (1) |
|
|
9 | (1) |
|
Apple Pioneers Consumer Wi-Fi |
|
|
10 | (1) |
|
Internet Connection Sharing |
|
|
11 | (1) |
|
Sharing Printers and Other Wi-Fi Gadgetry |
|
|
12 | (1) |
|
How Fast? Bit Rate vs. Throughput |
|
|
13 | (2) |
|
|
15 | (1) |
|
Is Wi-Fi Effective on PDA's? |
|
|
16 | (1) |
|
The 2.4 GHz ISM (Industrial, Scientific, & Medical) Band |
|
|
16 | (3) |
|
How Products Become Wi-Fi Certified |
|
|
19 | (1) |
|
Wi-Fi5 and Logo Confusion |
|
|
19 | (1) |
|
|
20 | (1) |
|
Networking, Ethernet-Style |
|
|
21 | (20) |
|
Networking from Square One |
|
|
22 | (1) |
|
|
22 | (6) |
|
|
24 | (2) |
|
|
26 | (2) |
|
Bogging Down on Bandwidth: Switching to Switched |
|
|
28 | (2) |
|
Switches, Ports, and Addresses |
|
|
30 | (3) |
|
Media Access Control (MAC) Addresses |
|
|
31 | (2) |
|
|
33 | (3) |
|
|
34 | (2) |
|
|
36 | (3) |
|
Just Like Ol' Grand-Dad: Ad-Hoc Mode |
|
|
37 | (2) |
|
|
39 | (2) |
|
Your Net and the Internet |
|
|
41 | (24) |
|
|
42 | (3) |
|
Backbones and Interstates |
|
|
43 | (1) |
|
|
44 | (1) |
|
Your Place on the Internet |
|
|
45 | (1) |
|
|
46 | (11) |
|
|
47 | (2) |
|
IP Addresses and TCP Ports |
|
|
49 | (1) |
|
How to Determine Your IP Address |
|
|
50 | (1) |
|
Running out of IP Addresses |
|
|
50 | (2) |
|
Static vs. Dynamic IP Addresses |
|
|
52 | (1) |
|
DHCP and Dynamic IP Addresses |
|
|
52 | (1) |
|
|
53 | (1) |
|
Network Address Translation (NAT) and Home Office Routers |
|
|
54 | (3) |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
60 | (3) |
|
When Routers and Access Points Fight |
|
|
60 | (3) |
|
|
63 | (1) |
|
Barely Scratching the Surface |
|
|
64 | (1) |
|
Designing Your Wi-Fi Network |
|
|
65 | (20) |
|
|
66 | (2) |
|
Sketching Network Usage Patterns |
|
|
67 | (1) |
|
The 85% Design for Very Simple Home Networks |
|
|
68 | (1) |
|
Choosing a Wireless Technology |
|
|
69 | (13) |
|
|
70 | (3) |
|
|
73 | (2) |
|
One Access Point or Several? |
|
|
75 | (1) |
|
Basic Service Set (BSS) vs. Extended Service Set (ESS) |
|
|
76 | (3) |
|
|
79 | (1) |
|
Positioning Access Points |
|
|
80 | (2) |
|
As Design Bleeds Into Implementation |
|
|
82 | (3) |
|
|
85 | (24) |
|
Spontaneous Community: Ad-Hoc Networks |
|
|
86 | (4) |
|
An Ad-Hoc Scenario: A Family Genealogy Meeting |
|
|
87 | (1) |
|
How to Create an Ad-Hoc Network |
|
|
87 | (2) |
|
The Curse of the Ad-Hoc People |
|
|
89 | (1) |
|
The Dream of Community Hotspots |
|
|
90 | (6) |
|
The ``Last Mile'' Problem |
|
|
90 | (1) |
|
ISPs and Connection Sharing |
|
|
91 | (2) |
|
|
93 | (1) |
|
The Tragedy of the Commons |
|
|
94 | (2) |
|
|
96 | (4) |
|
|
97 | (1) |
|
Creating Your Own Captive Portal |
|
|
98 | (2) |
|
|
100 | (1) |
|
The Dream of Mesh Communities |
|
|
101 | (8) |
|
|
102 | (1) |
|
Challenges Facing Mesh Communities |
|
|
103 | (6) |
|
Part II What You Need and What You Need to Do With It |
|
|
|
Access Points and Gateways |
|
|
109 | (30) |
|
Access Points: Broad Power, Limited Agenda |
|
|
110 | (7) |
|
|
110 | (2) |
|
Computer-Controlled Data Radios |
|
|
112 | (2) |
|
|
114 | (1) |
|
Talking to Your Access Point |
|
|
115 | (2) |
|
Wireless Residential Gateways |
|
|
117 | (3) |
|
``Dual-Mode'' Access Points and Gateways |
|
|
120 | (1) |
|
Diversity Reception and Dual Antennas |
|
|
121 | (1) |
|
Common Access Point Configuration Parameters |
|
|
122 | (7) |
|
|
126 | (3) |
|
Power Over Ethernet (PoE) |
|
|
129 | (6) |
|
|
130 | (1) |
|
|
130 | (1) |
|
Passive and Active Devices |
|
|
131 | (2) |
|
|
|
The Power Connector Problem |
|
|
133 | (1) |
|
|
134 | (1) |
|
Choosing an Access Point or Gateway |
|
|
135 | (4) |
|
|
136 | (3) |
|
|
139 | (22) |
|
What's Inside Client Adapters? |
|
|
139 | (5) |
|
|
140 | (1) |
|
Dual Antennas and Diversity Reception |
|
|
141 | (1) |
|
``High-Power'' Client Adapters |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
The Different Kinds of Client Adapters |
|
|
144 | (11) |
|
|
144 | (2) |
|
The Battle of the Bulge Antennas |
|
|
146 | (2) |
|
|
148 | (3) |
|
|
151 | (2) |
|
|
153 | (2) |
|
Which Client Adapter to Choose? |
|
|
155 | (4) |
|
PCMCIA (PC Card) Client Adapters |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
Antennas, Cables, and Connectors |
|
|
161 | (36) |
|
|
162 | (5) |
|
The Mythical Isotropic Antenna |
|
|
162 | (1) |
|
|
163 | (2) |
|
The Threat from the Third Dimension |
|
|
165 | (1) |
|
A Quick Word on Frequency and Wavelength |
|
|
166 | (1) |
|
The Different Families of Antennas |
|
|
167 | (12) |
|
Omnidirectional Vertical Antennas |
|
|
167 | (1) |
|
Omnidirectional Vertical Gain Antennas |
|
|
168 | (1) |
|
PC Card Integrated ``Bulge'' Antennas |
|
|
168 | (1) |
|
|
169 | (2) |
|
Ceiling Blister Omnidirectional Antennas |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
A Special Case: The Pringle's Can Antenna |
|
|
178 | (1) |
|
dB, dBi, dBm: The Decibel Family |
|
|
179 | (2) |
|
Eyeballing Gains and Losses |
|
|
180 | (1) |
|
|
181 | (2) |
|
|
181 | (2) |
|
|
183 | (3) |
|
|
183 | (1) |
|
Frequency, Power, and Loss |
|
|
184 | (1) |
|
Calculating Coaxial Cable Losses |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (7) |
|
Reverse-Polarity Connectors |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
RP-SMA (Reverse Polarity SMA) Connectors |
|
|
190 | (1) |
|
RP-TNC (Reverse Polarity TNC) Connectors |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (3) |
|
|
195 | (2) |
|
Putting It Together and Testing It Out |
|
|
197 | (40) |
|
|
198 | (1) |
|
Installing a Small Wi-Fi Network: Overview |
|
|
199 | (6) |
|
What You'll Need from Your Internet Service Provider |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (6) |
|
Configuring the Wireless Residential Gateway |
|
|
206 | (4) |
|
Installing Your Client Adapters |
|
|
210 | (1) |
|
Configuring Your Client Adapters |
|
|
211 | (7) |
|
|
211 | (3) |
|
Windows Versions Other than XP |
|
|
214 | (1) |
|
|
215 | (3) |
|
Building an Add-On Wi-Fi Network |
|
|
218 | (5) |
|
Cabling an Add-On Network |
|
|
218 | (1) |
|
Adding Additional Wired Ports through the Uplink Port |
|
|
219 | (1) |
|
Configuration Screen Subnet Conflicts |
|
|
220 | (2) |
|
Finishing off the Add-On Network |
|
|
222 | (1) |
|
Building the Multi-Zone Wi-Fi Network |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Cabling a Multi-Zone Network |
|
|
224 | (6) |
|
HomePlug Powerline Networking |
|
|
226 | (1) |
|
Access Point Configuration |
|
|
226 | (2) |
|
Configuring Client Adapters |
|
|
228 | (2) |
|
|
230 | (2) |
|
|
232 | (2) |
|
|
234 | (3) |
|
Wi-Fi Warriors on the Road |
|
|
237 | (18) |
|
|
237 | (7) |
|
|
240 | (2) |
|
Hotspot Networks and Aggregators |
|
|
242 | (1) |
|
Connection Costs and Plans |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (11) |
|
|
244 | (3) |
|
|
247 | (2) |
|
|
249 | (2) |
|
|
251 | (4) |
|
Part III Un-Wired Security |
|
|
|
The Problem of the Speckled Axe |
|
|
255 | (12) |
|
|
256 | (1) |
|
|
257 | (2) |
|
A Micrometer Is Not a C-Clamp |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (2) |
|
|
263 | (1) |
|
Don't Forget Original Sin |
|
|
264 | (1) |
|
Balancing Risk and Trust in a Complicated World |
|
|
265 | (2) |
|
What Hackers Can Do and How You Can Thwart Them |
|
|
267 | (12) |
|
|
267 | (2) |
|
Black Hats and White Hats |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (5) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Hijacking Via Trojan Horse |
|
|
271 | (1) |
|
Denial of Service Attacks |
|
|
272 | (1) |
|
|
272 | (2) |
|
What Measures You Should Take |
|
|
274 | (4) |
|
The Good News and the Bad News |
|
|
278 | (1) |
|
WEP (Wired Equivalent Privacy) |
|
|
279 | (1) |
|
What WEP Does---and Does Not Do |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (6) |
|
Weak Initialization Vector (IV) Values |
|
|
283 | (2) |
|
Defeating AirSnort with Key Rotation |
|
|
285 | (3) |
|
How Many Bits, and Does It Matter? |
|
|
288 | (2) |
|
|
290 | (2) |
|
Looking Ahead: Wi-Fi Protected Access (WPA) |
|
|
292 | |
|
Part IV Practice and Projects |
|
|
|
|
279 | (34) |
|
A Word on Mac Address Filtering |
|
|
297 | (3) |
|
Explain Twice, Succeed Once! |
|
|
300 | (1) |
|
Setting up Security---General Steps |
|
|
300 | (4) |
|
|
304 | (8) |
|
Setting Up WEP Using Windows XP's Built-In Wi-Fi Support |
|
|
308 | (4) |
|
Final Wi-Fi Security Tips |
|
|
312 | (1) |
|
The Tin Can Bandwidth Expander Project |
|
|
313 | (20) |
|
What Tin Can Antennas Are For |
|
|
314 | (4) |
|
Building the Bandwidth Expander |
|
|
318 | (10) |
|
|
318 | (3) |
|
The Overall Design and a Little More Math |
|
|
321 | (2) |
|
Drilling for the Connector |
|
|
323 | (2) |
|
Making the Probe Assembly |
|
|
325 | (3) |
|
Bad Ideas and Further Research |
|
|
328 | (5) |
|
|
329 | (2) |
|
PrimeStar TV Dish Antennas |
|
|
331 | (2) |
|
|
333 | (20) |
|
|
334 | (1) |
|
|
335 | (3) |
|
|
338 | (3) |
|
Switches, Routers, and DHCP |
|
|
340 | (1) |
|
A Real Example with Real Hardware |
|
|
341 | (4) |
|
|
342 | (1) |
|
|
342 | (2) |
|
Configuring the Farside Network |
|
|
344 | (1) |
|
Troubleshooting the Network Setup |
|
|
345 | (8) |
|
|
347 | (6) |
|
The Parabolic Mesh Reflector Project |
|
|
353 | (16) |
|
|
355 | (1) |
|
|
356 | (11) |
|
How Parabolic Reflectors Work |
|
|
359 | (1) |
|
|
360 | (2) |
|
Mounting the Access Point |
|
|
362 | (2) |
|
Adjusting the Mesh Reflector |
|
|
364 | (3) |
|
|
367 | (2) |
|
|
369 | (24) |
|
|
369 | (3) |
|
Taking the Pulse of Wireless Networking |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (5) |
|
|
374 | (3) |
|
What You'll Need for Wardriving |
|
|
377 | (13) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Installing and Configuring NetStumbler |
|
|
379 | (1) |
|
|
379 | (1) |
|
NetStumbler's Main Display |
|
|
380 | (4) |
|
NetStumbler Views and Filters |
|
|
384 | (2) |
|
The Signal Strength Display |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (2) |
|
|
390 | (3) |
|
|
391 | (2) |
|
|
393 | (14) |
|
NetStumbler's Native Data Files |
|
|
394 | (1) |
|
Merging NetStumber Log Files |
|
|
394 | (9) |
|
|
394 | (1) |
|
The Text File Field Structure |
|
|
395 | (1) |
|
|
396 | (5) |
|
|
401 | (2) |
|
Mapping Stumbled Stations with MapPoint and Stumbverter |
|
|
403 | (4) |
|
|
403 | (4) |
Appendix A Directory of Suppliers |
|
407 | (2) |
Appendix B FCC Regulations Governing Wi-Fi |
|
409 | (8) |
Appendix C Configuring Your TCP/IP Configuration Data |
|
417 | (6) |
Encyclopedia of 802.11 Standards |
|
423 | (16) |
Index |
|
439 | |