O'Reilly logo

Hacking Wireless Access Points by Jennifer Kurtz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1

Wireless Technology Overview

Abstract

Wireless access points—whether fixed, mobile, or hybrid—have proliferated in the 21st century. Using them responsibly is essential to ensure the confidentiality, integrity, and availability of our communications content and networks.

Successful communication over wireless devices relies on common understanding about the processes or layers involved in interconnection, defined as the open systems interconnection reference model. It also relies on agreement over the rules of engagement, which correspond generally to the way we negotiate the spoken or written language rules: the allocation of radio spectrum frequency bands, identification of devices sending or receiving communications, message packet ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required