This chapter covered the basic types of packets used in 802.11 networks. The unique features as well as the motivation for their inclusion in the 802.11 MAC were covered briefly. The methods that wireless clients use to locate and associate to networks were also covered in some detail.
When trying to understand all the features that 802.11i provides, determining the responsibilities of the other protocols it depends on can be a stumbling block. These protocols were presented in a historical context that helps explain why 802.11i works the way it does. The protocols that 802.11i builds on (EAP, 802.1X, and RADIUS) were covered in enough detail to relate them to wireless security. All of the features that 802.11 brings to wireless networks were also covered. These include robust authentication, integrity, confidentiality, and replay protection schemes.