2 802.11 Physical (PHY) Layer Frame Format.
3 802.11 MAC Sub-layer Frame Format.
4 802.11 Management Frames.
5 802.11 Control Frames.
6 802.11 Data Frames.
7 802.11 Medium Contention.
8 802.11 Power Management.
9 802.11 Security.
10 802.11n - HT analysis.
11 Spectrum Analysis - Layer 1.
12 Protocol Analyzer Operation & Troubleshooting.
Due to a formatting error, several of the flashcards on the CD that shipped with the first printing of the book have incorrect questions and answers.
Question: What data frames do carry data?
Answer: Data, Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll, Qos Data, Qos Data+CF-Ack, Qos Data+CF-Poll, QoS Data+CF-Ack+CF-Poll
Question: How many address fields are in an 802.11 frame?
Answer: Three, sometimes four
Question: What are the names of the 4 802.11 address fields?
Answer: Address1, Address2, Address3, Address4
Question: What are the five logical uses of the address fields?
Answer: Source address, destination address, transmitter address, receiver address, basic service set identifier (BSSID)
|1||24||White Papers missing from CD: Wi-Fi Alliance and Wi-Fi CERTIFIED|
In the sidebar titled ?Wi-Fi Alliance and Wi-Fi CERTIFIED? there is reference to a number of White Papers included on the CD. These White Papers were mistakenly left off the first printing CD. They can be downloaded from this book?s Resources & Downloads page.
|2||52||Omission in Figure 2.11|
ISM Channel 165, referred to in the preceeding paragraph, was left out of the figure. The center frequency of Channel 165 is 5.825 GHz.
|4||145-6||Correction to Exercises 4.1 and 4.2: instructions for downloading and installing Wireshark|
The Wireshark application is not included on the CD as indicated in the book. For the explanation and steps 1-4 of Exercise 4.1, Viewing an Association Sequence, on pages 145-146, please replace the text in the book with the following:
In this exercise, you will use a protocol analyzer to view 802.11 data frames encrypted with CCMP. The following directions should assist you with locating, downloading, and install- ing Wireshark. If you are familiar with another protocol analyzing software, feel free to use it to perform this lab. If you have already installed Wireshark, you can skip steps 1?4.
|4||146||Missing files on the CD: Exercise 4.1|
In step 4 of Exercise 4.1, reference is made to the following file on the companion CD: ch04_capture1.PCAP. The file was mistakenly left off the CD, and can be found at this book?s Resources and Downloads page.
|4||152||Missing files on the CD: Exercise 4.2|
In step 4 of Exercise 4.2, reference is made to the following file on the companion CD: ch04_capture2.PCAP. The file was mistakenly left off the CD, and can be found at this book?s Resources and Downloads page.
|9||295-7||Missing PCAP Files: Exercise 9.1|
In Exercise 9.1, there is mention of a number of PCAP files on the companion CD: OPEN_SYSTEM_AUTHENTICATION.PCAP, SHARED_KEY_AUTHENTICATION_ENCRYPTED.PCAP, and SHARED_KEY_AUTHENTICATION_DECRYPTED.PCAP. These files were mistakenly left off the CD, and can be found at this book?s Resources and Downloads page.
|11||441||Images missing from files on CD|
On page 441, there is mention of color images of spectrum analyzers included on the CD. Those images were mistakenly left off the first printing's CD. The can be found on this book's Resources and Downloads page.
|12||535||Correction to Exercise 12.1: instructions for downloading OmniPeak Enterprise|
In Exercise 12.1, there is a reference to a demo version of OmniPeak Enterprise included on the CD. Due to permission issues, OmniPeak Enterprise cannot be included on the demo. Users are asked to download the software from WildPackets? website at www.wildpackets.com. Follow these steps:
|12||536||Text correction: Incorrectly named file in Exercise 12.1|
In step 13 of Exercise 12.1, there is a reference to a file called EAPauth2.apc. That file should actually be called LEAPauth2.apc.