Location:
Search - 802.11-20
Search list
Description: IEEE 802.11e-2005, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements-IEEE 802.11e-2005, IEEE Standard for Information technology猅elecommunications and information exchange between systems狶ocal and metropolitan area networks猄pecific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements
Platform: |
Size: 1832960 |
Author: 周金喜 |
Hits:
Description: IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements
Platform: |
Size: 1651712 |
Author: 周金喜 |
Hits:
Description: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
Platform: |
Size: 8561664 |
Author: bailixia |
Hits:
Description: Implementing 802.11, 802.16,
and 802.20 Wireless Networks
Platform: |
Size: 3289088 |
Author: Macedonia |
Hits:
Description: it is used to calculate BER IN 802.11 MODEL.
Platform: |
Size: 28672 |
Author: prashant |
Hits:
Description: 介绍了网络分析的基础知识和原理,wireshark工具的使用以及网络包分析的方法。
Chapter 1: The World of Network Analysis
Chapter 2: Introduction to Wireshark
Chapter 3: Capture Traffic
Chapter 4: Create and Apply Capture Filters
Chapter 5: Define Global and Personal Preferences
Chapter 6: Colorize Traffic
Chapter 7: Define Time Values and Interpret Summaries
Chapter 8: Interpret Basic Trace File Statistics
Chapter 9: Create and Apply Display Filters
Chapter 10: Follow Streams and Reassemble Data
Chapter 11: Customize Wireshark Profiles
Chapter 12: Annotate, Save, Export and Print Packets
Chapter 13: Use Wireshark’s Expert System
Chapter 14: TCP/IP Analysis Overview
Chapter 15: Analyze Domain Name System (DNS) Traffic
Chapter 16: Analyze Address Resolution Protocol (ARP) Traffic
Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic
Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6) Traffic
Chapter 19: Analyze User Datagram Protocol (UDP) Traffic
Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic
Chapter 21: Graph IO Rates and TCP Trends
Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6) Traffic
Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic
Chapter 24: Analyze File Transfer Protocol (FTP) Traffic
Chapter 25: Analyze Email Traffic
Chapter 26: Introduction to 802.11 (WLAN) Analysis
Chapter 27: Introduction to Voice over IP (VoIP) Analysis
Chapter 28: Baseline "Normal" Traffic Patterns
Chapter 29: Find the Top Causes of Performance Problems
Chapter 30: Network Forensics Overview
Chapter 31: Detect Network Scanning and Discovery Processes
Chapter 32: Analyze Suspect Traffic
Chapter 33: Effective Use of Command Line Tools
Platform: |
Size: 9437184 |
Author: windtear_pp@163.com |
Hits: