SlideShare a Scribd company logo
1 of 43
This document is customized and covers basic wireless information and Knowledge for group of users who
are very new to wireless technology.
 Need of Wireless
 Wireless Fundamentals
 Regulatory Bodies
 Wireless Topologies
 Adhoc VS Infrastructure network
 Service Set
 Wireless Network Types
 Cisco Unified Wireless Network Components
 Cisco Unified Controller- Based Solution
 Access points Models
 Wireless LAN Controller Models
 Access Points Types
 FAQs
Need of Wireless
 Convenience: All notebook computers and many mobile phones today come equipped
with the WiFi technology required to connect directly to a wireless LAN.
Mobility: Employees can stay connected to the network even when they're not at their
desks. People in meetings can access documents and applications. Salespeople can check
the network for important details from any location.
Ease of setup: When you don't have to run physical cables through a location,
installation can be quick and cost-effective. Wireless LANs also make it easier to bring
network connectivity to hard-to-reach locations, such as a warehouse or factory floor.
Scalability: As your business operations grow, you may need to quickly expand your
network. Wireless networks can typically expand with existing equipment, while a wired
network might require additional wiring.
Security: Controlling and managing access to your wireless network is important to its
success. Advances in WiFi technology provide robust security protections so your data is
easily available to only the people you allow access.
Cost: It can cost less to operate a wireless LAN, which eliminates or reduces wiring costs
during office moves, reconfigurations, or expansions.
RF Principles
 Wavelength: The physical distance from one point of the cycle to the same point in the
next cycle is called a wavelength , which is usually represented by the Greek symbol λ
(lambda).
 Frequency : Number of times radio waves repeat their pattern per second. It is
measured in Hertz.
 Reflection: When the radio wave hits the obstacle at a low angle, the wave (the entire
wave, or part of it) might bounce on the obstacle. This phenomenon is called reflection.
 Multipath: A signal sent to a station travels in a straight line and reaches the
destination. A few microseconds later, copies of the same signal reflected on walls,
ceiling, and obstacles also reach the destination.
 Refraction: Refraction occurs when a wave changes direction. This change in direction
usually happens when a wave passes from one medium to another (from air to water, for
example).
 Scattering: Reflection also occurs in the air itself, bouncing on dust or micro drops of
water (humidity). These multiple reflections are described as scattering .
 Free Path Loss: Even without obstacles, a radio wave gets weaker as it moves away
from the emitting source because the energy of the wave spreads .
 RSSI: Because the RF wave might have been affected by obstacles in its path, it is
important to determine how much signal is received by the other endpoint. The value
that indicates the amount of power received is called Received Signal Strength Indicator
(RSSI).
Regulatory Bodies
 IEEE : It defines how the signal is sent carrying data over unlicensed frequency band.
IEEE maintains and creates technical standards and protocols used by wireless LAN
devices.
 Federal Communications Commission (FCC): In America and other countries in
America continents, FCC restrict the power and frequency can be used in that region.
 ETSI (European Telecommunications Standards Institute): Controls Frequency
and power in Europe and other countries like Israel and some other countries.
 Wi-Fi Alliance: It ensures that wireless products that are available to consumers
provide the features that the products claim to have.
Wireless Topologies
 Wireless personal-area networks (WPAN): Have a short range (up to 5–10 meters),
commonly use the 802.15 family of specifications to connect two or a few devices with low
power consumption. Bluetooth is an example of WPAN protocol.
 Wireless local-area networks (WLAN): Consume more power but extend the connection
to about 300 feet (100 meters).
 Wireless metropolitan-area network (WMAN): Extend the range to a larger geographic
area, such as a city or suburb. WMANs typically use licensed frequencies . Although
implementations in the ISM bands can also be found. WiMAX is an example of WMAN
protocol.
 Wireless wide-area network (WWAN): Provide connectivity over a wide geographical area.
Usually, WWANs are networks used for mobile phone and data service and are operated by
carriers. WWANs typically use licensed frequencies.
Adhoc Vs Infrastructure Network
 Adhoc Mode:
◦ Also known as Peer-to-Peer network.
◦ A first station defines the radio parameters and a connection name; the other stations
just need to detect the connection and adjust their own parameters to connect to the
first station and to each other.
◦ As soon as wireless devices connect to each other over a wireless network, a Basic
Service Set (BSS) is formed.
◦ The wireless network they form is called an Independent Basic Service Set (IBSS).
 Infrastructure Mode: The AP functions as a translational bridge between 802.3 wired
media and 802.11 wireless media.
◦ BSS is the service provided by the AP.
Service Set
 Basic Service Area (BSA) :
 Wireless Cell created by an AP – CISCO term.
 Independent basic service set ( IBSSD):
 Wireless network created by a Laptop.
 Used in ADHOC Connection.
 Basic service set – (BSS):
 As soon as wireless devices (called “stations” in the 802.11 standard) connect to each
other over a wireless network a BSS is formed.
 Distribution System (DS):
 The wired section of the network that can be reached through the AP.
 Extended service set – (ESS):
 When the distribution system links two APs, or two cells, the group is called extended
service set.
 Allows mobility roaming of wireless devices within a distributed system.
 Service Set Identifier – (SSID):
 Wireless Workgroup or Domain Name or simply a wireless network.
 ASCI string providing a name to a wireless network.
 Basic Service Set Identifier –(BSSID):
 AP Radio MAC address associated with a SSID.
 Multiple Basic Service Set Identifier –(MBSSID):
 Having multiple SSIDs configured.
Wireless Network Types
19
 The first version of the 802.11 standard, released in 1997,
 It described FHSS 1 Mbps, and DSSS 1 Mbps and 2 Mbps in the 2.4 GHz spectrum,
describing 14 channels.
 802.11 is a rich family of protocols.
 The standard was revised in 2007 to integrate all the amendments published over the
previous years (integrating 802.11a, b, d, e, g, h, i, and j). This cumulative version of
the standard is called 802.11-2007
802.11 continue…
 802.11 was modified almost as soon as it was created to allow for faster speeds.
 802.11b was published in 1999
 It described CCK to bring the data rate to 5.5 Mbps and 11 Mbps.
802.11b continue…
 802.11b was also too slow. A new amendment was published in 2003 introducing
OFDM to the 2.4 GHz band, and effectively. It allowing rates up to 54 Mbps.
 802.11g is built to be backward compatible with 802.11b
 When an 802.11b station is detected in the cell, the AP informs the cell in its
information broadcasts. These broadcasts contain 2 bits set to 1: “non-ERP (that is,
non-802.11g) present” and “use protection.
 The downside of this protection mechanism is wasted time before each 802.11g
frame. This protection mechanism typically divides the overall throughput of the cell
by 3.
802.11g continue…
 The 802.11a amendment was published in 1999.
 802.11a uses OFDM only (6 Mbps to 54 Mbps).
 802.11a offers up to 23 nonoverlapping channels.
 Channels are 20 MHz apart.
802.11a continue…
Primary 802.11n Components
40-MHz Channels Improved MAC
Efficiency
Multiple-Input, Multiple-
Output (MIMO)
Two adjacent 20-MHz
channels are
combined to create a
single 40-MHz
channel.
MAC aggregation packs
smaller packets into a
single unit.
Block acknowledgment
improves throughput.
Maximal Ratio Combining
(MRC)
Beam forming
Spatial multiplexing
 802.11g and 802.11a use 20-
Mhz channels.
 802.11n aggregates
two carriers to increase the
throughput
 802.11 requires acknowledgment of each frame.
 802.11n uses block acknowledgment for constituent frames.
802.11
Header
Packet
802.11
ACK
802.11n
ACK
802.11n
Header
Packet 802.11n
Header
Packet 802.11n
Header
Packet
 MRC is used by the receiver with multiple antennas to optimally combine
energies from multiple receive chains. An algorithm eliminates out-of-
phase signal degradation.
 The emitter can send the same signal from several antennas. By carefully
coordinating these signals based on the feedback transmitted by the 802.11n
receiving station, the emitter aims at making these signals be received in phase, thus
increasing the signal power level at the receiving station, allowing for longer range or
higher throughput.
 The emitter can send different simultaneous signals from different radios. The
802.11n receiver will receive these signals on all its radios. Each of the receive radios
independently decode the arriving signals. Then, each receive signal is combined
with the signals from the other radios. This results in additional throughput.
Network Services
Network Management
Network Unification
Access Points
Client Devices
1-21
1-21
Access Points Types
 Extends the AP
coverage
 Dual radio can
create dual half-
duplex
 Overlap of 50%
required
 Throughput
impacted when
single frequency
used
1-19
 A WGB provides wireless
connection from Ethernet port.
 Several devices can benefit if
the WGB is connected to a hub
or a switch.
1-18
 Extend the LAN by
linking LANs
 Usually a few miles
range
 Point to point or hub
and spoke
1-20
 Devices are connected with redundant connection between nodes; no
single point of failure
1-21
 What is a Wireless Network?
A wireless local-area network (WLAN) uses radio waves to connect devices, such as
laptops, to the Internet and to your business network and applications
 How Far Does the Signal Reach?
A wireless router or access point's signal typically extends up to approximately 300
feet.
 Who Uses WLANs?
WLANs are frequently offered in public places such as cafes, hotels, and airport
lounges. In addition, many businesses have wireless networks throughout their
office buildings or campuses for employee and guest use.
 What Equipment Do I Need?
Most laptops have built-in wireless networking. If yours doesn't, you'll need a
wireless network adapter card, which is typically inexpensive and easy to install.
Many routers act as WLAN access points. They connect multiple computers (and
wireless-capable printers) to a single WLAN and to the Internet.
You can extend WLANs throughout an area by placing additional wireless access
points in various locations. The access points extend the wireless signal's range and
strength.
1-21
 How Can I Secure a WLAN?
There are many ways to secure your WLAN, including:
◦ Data encryption, which only gives authorized users access to information over
your wireless network
◦ User authentication, which identifies computers trying to access the network
◦ Secure access for visitors and guests
◦ Control systems, which protect the laptops and other devices that use the
network
 Can two computers communicate using the wireless client cards without
an access point (AP)?
◦ Yes, two computers can communicate using the wireless client cards without an
AP. Connect the PC cards in Ad Hoc mode. This step eliminates peer interaction,
and one PC becomes the master.
 Can you share the internet between two computers?
◦ No, you cannot share the internet. You need to install additional software to share
an internet connection.
1-21
Questions ????
Drop an email to
EMEA&APAC_MSI_ENS@hcl.com

More Related Content

What's hot

Lte radio network planning huawei
Lte radio network planning huaweiLte radio network planning huawei
Lte radio network planning huawei
tharinduwije
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
mrtheodisthorne2
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 

What's hot (20)

Lte radio network planning huawei
Lte radio network planning huaweiLte radio network planning huawei
Lte radio network planning huawei
 
Ccna
CcnaCcna
Ccna
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
MIMO in 4G Wireless
MIMO in 4G WirelessMIMO in 4G Wireless
MIMO in 4G Wireless
 
Antenna Installation Engineering.
Antenna Installation Engineering.Antenna Installation Engineering.
Antenna Installation Engineering.
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
IBS Training
IBS TrainingIBS Training
IBS Training
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
 

Similar to Introduction to cisco wireless

Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
Darpan Patel
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineers
himanshu yadav
 

Similar to Introduction to cisco wireless (20)

Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineers
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
computer network
computer networkcomputer network
computer network
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Introduction to cisco wireless

  • 1. This document is customized and covers basic wireless information and Knowledge for group of users who are very new to wireless technology.
  • 2.  Need of Wireless  Wireless Fundamentals  Regulatory Bodies  Wireless Topologies  Adhoc VS Infrastructure network  Service Set  Wireless Network Types  Cisco Unified Wireless Network Components  Cisco Unified Controller- Based Solution  Access points Models  Wireless LAN Controller Models  Access Points Types  FAQs
  • 4.  Convenience: All notebook computers and many mobile phones today come equipped with the WiFi technology required to connect directly to a wireless LAN. Mobility: Employees can stay connected to the network even when they're not at their desks. People in meetings can access documents and applications. Salespeople can check the network for important details from any location. Ease of setup: When you don't have to run physical cables through a location, installation can be quick and cost-effective. Wireless LANs also make it easier to bring network connectivity to hard-to-reach locations, such as a warehouse or factory floor. Scalability: As your business operations grow, you may need to quickly expand your network. Wireless networks can typically expand with existing equipment, while a wired network might require additional wiring. Security: Controlling and managing access to your wireless network is important to its success. Advances in WiFi technology provide robust security protections so your data is easily available to only the people you allow access. Cost: It can cost less to operate a wireless LAN, which eliminates or reduces wiring costs during office moves, reconfigurations, or expansions.
  • 6.  Wavelength: The physical distance from one point of the cycle to the same point in the next cycle is called a wavelength , which is usually represented by the Greek symbol λ (lambda).  Frequency : Number of times radio waves repeat their pattern per second. It is measured in Hertz.  Reflection: When the radio wave hits the obstacle at a low angle, the wave (the entire wave, or part of it) might bounce on the obstacle. This phenomenon is called reflection.  Multipath: A signal sent to a station travels in a straight line and reaches the destination. A few microseconds later, copies of the same signal reflected on walls, ceiling, and obstacles also reach the destination.  Refraction: Refraction occurs when a wave changes direction. This change in direction usually happens when a wave passes from one medium to another (from air to water, for example).  Scattering: Reflection also occurs in the air itself, bouncing on dust or micro drops of water (humidity). These multiple reflections are described as scattering .
  • 7.  Free Path Loss: Even without obstacles, a radio wave gets weaker as it moves away from the emitting source because the energy of the wave spreads .  RSSI: Because the RF wave might have been affected by obstacles in its path, it is important to determine how much signal is received by the other endpoint. The value that indicates the amount of power received is called Received Signal Strength Indicator (RSSI).
  • 9.  IEEE : It defines how the signal is sent carrying data over unlicensed frequency band. IEEE maintains and creates technical standards and protocols used by wireless LAN devices.  Federal Communications Commission (FCC): In America and other countries in America continents, FCC restrict the power and frequency can be used in that region.  ETSI (European Telecommunications Standards Institute): Controls Frequency and power in Europe and other countries like Israel and some other countries.  Wi-Fi Alliance: It ensures that wireless products that are available to consumers provide the features that the products claim to have.
  • 11.  Wireless personal-area networks (WPAN): Have a short range (up to 5–10 meters), commonly use the 802.15 family of specifications to connect two or a few devices with low power consumption. Bluetooth is an example of WPAN protocol.  Wireless local-area networks (WLAN): Consume more power but extend the connection to about 300 feet (100 meters).  Wireless metropolitan-area network (WMAN): Extend the range to a larger geographic area, such as a city or suburb. WMANs typically use licensed frequencies . Although implementations in the ISM bands can also be found. WiMAX is an example of WMAN protocol.  Wireless wide-area network (WWAN): Provide connectivity over a wide geographical area. Usually, WWANs are networks used for mobile phone and data service and are operated by carriers. WWANs typically use licensed frequencies.
  • 13.  Adhoc Mode: ◦ Also known as Peer-to-Peer network. ◦ A first station defines the radio parameters and a connection name; the other stations just need to detect the connection and adjust their own parameters to connect to the first station and to each other. ◦ As soon as wireless devices connect to each other over a wireless network, a Basic Service Set (BSS) is formed. ◦ The wireless network they form is called an Independent Basic Service Set (IBSS).
  • 14.  Infrastructure Mode: The AP functions as a translational bridge between 802.3 wired media and 802.11 wireless media. ◦ BSS is the service provided by the AP.
  • 16.  Basic Service Area (BSA) :  Wireless Cell created by an AP – CISCO term.  Independent basic service set ( IBSSD):  Wireless network created by a Laptop.  Used in ADHOC Connection.  Basic service set – (BSS):  As soon as wireless devices (called “stations” in the 802.11 standard) connect to each other over a wireless network a BSS is formed.  Distribution System (DS):  The wired section of the network that can be reached through the AP.  Extended service set – (ESS):  When the distribution system links two APs, or two cells, the group is called extended service set.  Allows mobility roaming of wireless devices within a distributed system.  Service Set Identifier – (SSID):  Wireless Workgroup or Domain Name or simply a wireless network.  ASCI string providing a name to a wireless network.
  • 17.  Basic Service Set Identifier –(BSSID):  AP Radio MAC address associated with a SSID.  Multiple Basic Service Set Identifier –(MBSSID):  Having multiple SSIDs configured.
  • 19. 19
  • 20.  The first version of the 802.11 standard, released in 1997,  It described FHSS 1 Mbps, and DSSS 1 Mbps and 2 Mbps in the 2.4 GHz spectrum, describing 14 channels.  802.11 is a rich family of protocols.  The standard was revised in 2007 to integrate all the amendments published over the previous years (integrating 802.11a, b, d, e, g, h, i, and j). This cumulative version of the standard is called 802.11-2007 802.11 continue…
  • 21.  802.11 was modified almost as soon as it was created to allow for faster speeds.  802.11b was published in 1999  It described CCK to bring the data rate to 5.5 Mbps and 11 Mbps. 802.11b continue…
  • 22.  802.11b was also too slow. A new amendment was published in 2003 introducing OFDM to the 2.4 GHz band, and effectively. It allowing rates up to 54 Mbps.  802.11g is built to be backward compatible with 802.11b  When an 802.11b station is detected in the cell, the AP informs the cell in its information broadcasts. These broadcasts contain 2 bits set to 1: “non-ERP (that is, non-802.11g) present” and “use protection.  The downside of this protection mechanism is wasted time before each 802.11g frame. This protection mechanism typically divides the overall throughput of the cell by 3. 802.11g continue…
  • 23.  The 802.11a amendment was published in 1999.  802.11a uses OFDM only (6 Mbps to 54 Mbps).  802.11a offers up to 23 nonoverlapping channels.  Channels are 20 MHz apart. 802.11a continue…
  • 24. Primary 802.11n Components 40-MHz Channels Improved MAC Efficiency Multiple-Input, Multiple- Output (MIMO) Two adjacent 20-MHz channels are combined to create a single 40-MHz channel. MAC aggregation packs smaller packets into a single unit. Block acknowledgment improves throughput. Maximal Ratio Combining (MRC) Beam forming Spatial multiplexing
  • 25.  802.11g and 802.11a use 20- Mhz channels.  802.11n aggregates two carriers to increase the throughput
  • 26.  802.11 requires acknowledgment of each frame.  802.11n uses block acknowledgment for constituent frames. 802.11 Header Packet 802.11 ACK 802.11n ACK 802.11n Header Packet 802.11n Header Packet 802.11n Header Packet
  • 27.  MRC is used by the receiver with multiple antennas to optimally combine energies from multiple receive chains. An algorithm eliminates out-of- phase signal degradation.
  • 28.  The emitter can send the same signal from several antennas. By carefully coordinating these signals based on the feedback transmitted by the 802.11n receiving station, the emitter aims at making these signals be received in phase, thus increasing the signal power level at the receiving station, allowing for longer range or higher throughput.
  • 29.  The emitter can send different simultaneous signals from different radios. The 802.11n receiver will receive these signals on all its radios. Each of the receive radios independently decode the arriving signals. Then, each receive signal is combined with the signals from the other radios. This results in additional throughput.
  • 30.
  • 31. Network Services Network Management Network Unification Access Points Client Devices
  • 32.
  • 33. 1-21
  • 34. 1-21
  • 36.
  • 37.  Extends the AP coverage  Dual radio can create dual half- duplex  Overlap of 50% required  Throughput impacted when single frequency used 1-19
  • 38.  A WGB provides wireless connection from Ethernet port.  Several devices can benefit if the WGB is connected to a hub or a switch. 1-18
  • 39.  Extend the LAN by linking LANs  Usually a few miles range  Point to point or hub and spoke 1-20
  • 40.  Devices are connected with redundant connection between nodes; no single point of failure 1-21
  • 41.  What is a Wireless Network? A wireless local-area network (WLAN) uses radio waves to connect devices, such as laptops, to the Internet and to your business network and applications  How Far Does the Signal Reach? A wireless router or access point's signal typically extends up to approximately 300 feet.  Who Uses WLANs? WLANs are frequently offered in public places such as cafes, hotels, and airport lounges. In addition, many businesses have wireless networks throughout their office buildings or campuses for employee and guest use.  What Equipment Do I Need? Most laptops have built-in wireless networking. If yours doesn't, you'll need a wireless network adapter card, which is typically inexpensive and easy to install. Many routers act as WLAN access points. They connect multiple computers (and wireless-capable printers) to a single WLAN and to the Internet. You can extend WLANs throughout an area by placing additional wireless access points in various locations. The access points extend the wireless signal's range and strength. 1-21
  • 42.  How Can I Secure a WLAN? There are many ways to secure your WLAN, including: ◦ Data encryption, which only gives authorized users access to information over your wireless network ◦ User authentication, which identifies computers trying to access the network ◦ Secure access for visitors and guests ◦ Control systems, which protect the laptops and other devices that use the network  Can two computers communicate using the wireless client cards without an access point (AP)? ◦ Yes, two computers can communicate using the wireless client cards without an AP. Connect the PC cards in Ad Hoc mode. This step eliminates peer interaction, and one PC becomes the master.  Can you share the internet between two computers? ◦ No, you cannot share the internet. You need to install additional software to share an internet connection. 1-21
  • 43. Questions ???? Drop an email to EMEA&APAC_MSI_ENS@hcl.com