Welcome![Sign In][Sign Up]
Location:
Search - 802.11-20

Search list

[Other802.11e-2005

Description: IEEE 802.11e-2005, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements-IEEE 802.11e-2005, IEEE Standard for Information technology猅elecommunications and information exchange between systems狶ocal and metropolitan area networks猄pecific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements
Platform: | Size: 1832960 | Author: 周金喜 | Hits:

[Other802.11i-2004

Description: IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements
Platform: | Size: 1651712 | Author: 周金喜 | Hits:

[Software Engineering802.11-2007

Description: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
Platform: | Size: 8561664 | Author: bailixia | Hits:

[Program doc0750678089

Description: Implementing 802.11, 802.16, and 802.20 Wireless Networks
Platform: | Size: 3289088 | Author: Macedonia | Hits:

[matlab20

Description: it is used to calculate BER IN 802.11 MODEL.
Platform: | Size: 28672 | Author: prashant | Hits:

[OtherWireshark Network Analysis

Description: 介绍了网络分析的基础知识和原理,wireshark工具的使用以及网络包分析的方法。 Chapter 1: The World of Network Analysis Chapter 2: Introduction to Wireshark Chapter 3: Capture Traffic Chapter 4: Create and Apply Capture Filters Chapter 5: Define Global and Personal Preferences Chapter 6: Colorize Traffic Chapter 7: Define Time Values and Interpret Summaries Chapter 8: Interpret Basic Trace File Statistics Chapter 9: Create and Apply Display Filters Chapter 10: Follow Streams and Reassemble Data Chapter 11: Customize Wireshark Profiles Chapter 12: Annotate, Save, Export and Print Packets Chapter 13: Use Wireshark’s Expert System Chapter 14: TCP/IP Analysis Overview Chapter 15: Analyze Domain Name System (DNS) Traffic Chapter 16: Analyze Address Resolution Protocol (ARP) Traffic Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6) Traffic Chapter 19: Analyze User Datagram Protocol (UDP) Traffic Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic Chapter 21: Graph IO Rates and TCP Trends Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6) Traffic Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic Chapter 24: Analyze File Transfer Protocol (FTP) Traffic Chapter 25: Analyze Email Traffic Chapter 26: Introduction to 802.11 (WLAN) Analysis Chapter 27: Introduction to Voice over IP (VoIP) Analysis Chapter 28: Baseline "Normal" Traffic Patterns Chapter 29: Find the Top Causes of Performance Problems Chapter 30: Network Forensics Overview Chapter 31: Detect Network Scanning and Discovery Processes Chapter 32: Analyze Suspect Traffic Chapter 33: Effective Use of Command Line Tools
Platform: | Size: 9437184 | Author: windtear_pp@163.com | Hits:

CodeBus www.codebus.net