SlideShare a Scribd company logo
1 of 14
Wireless LAN
infrastructure II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Basic WLAN topologies.
– WLAN concepts and terms.
Page 4
Wireless LAN infrastructure II.
Page 5
Wireless LAN infrastructure II.
– Ad hoc topology.
» A very basic wireless local area network (WLAN) that
does not require the use of a wireless access point
(WAP)—also known as an access point (AP).
» Devices negotiate the wireless connection between
themselves (e.g., laptops connect wirelessly without the
use of a WAP).
– Infrastructure topology.
» A more common type of WLAN that uses a WAP or
WAPs to create a connection point for wireless devices.
• Most often connects a WLAN to a more traditional wired
network, but it is not absolutely required.
– Mesh topology.
» A type of infrastructure topology that employs the use of
multiple APs to create a larger seamless network
coverage area.
• Commonly deployed with wireless controllers and
WAPs.
Page 6
Something to remember is
that the higher the wireless
device density, the more
WAPs that will be required
to handle the load.
Like any other network device, APs only have a
certain amount of capacity. As the workload
increases, the amount of throughput will decrease
as each device contends for access to the WAP.
Adding more WAPs and/or adding more WAPs and
a wireless controller can greatly ease the load and
increase the efficiency of the network.
Wireless LAN infrastructure II.
Page 7
Wireless LAN infrastructure II.
Page 8
Wireless LAN infrastructure II.
IBSS.
Independent basic
service set.
An IBSS is created when an ad hoc
network topology is created. The
devices use the IBSS in order to
control the communication that
occurs between connected devices.
BSS.
Basic service set.
When a single WAP is in
infrastructure mode, it will create a
BSS. This means that it can control
the flow of communication between
every device that connects to the
SSIDs under its control.
ESS.
Extended service set.
An ESS is created when two or
more APs share a common SSID
and have overlapping coverage.
Through the ESS, the WAPs will
negotiate how to hand off a wireless
device between them as it roams the
network.
Page 9
The service set identifier
(SSID) plays a key role in
the WLAN environment.
All active WAPs will use a beacon transmission to advertise the
networks that they belong to. What they advertise is their
SSIDs—their network names. Those beacons are how devices
know which networks they can connect to.
Even when the AP is set to hide the beacon, the broadcasts are
still occurring. Although hiding the SSID broadcast may make it
more difficult to join a wireless network, it is not a true security
measure.
Wireless LAN infrastructure II.
Page 10
Wireless LAN infrastructure II.
– 802.11a-ht and 802.11g-ht.
» Both terms relate to the 802.11n standard.
• Denote the type of connection—high throughput, and the
radio frequency—either 2.4 GHz or 5GHz of the connection.
– Goodput.
» The actual amount of application data passed through a
connection with the overhead removed, measured in bytes per
second.
» It is different than throughput.
• Throughput measures the total amount of data capable of
being passed through a connection.
– Signal strength.
» A measure of the strength of the RF signal from an AP, which
can help to determine coverage area.
• As a general rule, the closer a device is to the WAP, the
stronger the signal received.
» The strength of a signal can be affected by WAP or antenna
placement, type of antenna, and interference sources, etc.
Page 11
A wireless site survey with
heat mapping tools can help
in the set up of a WLAN or it
can help to pinpoint problem
areas.
Heat mapping software builds a visual map by
measuring received signal strength indicator (RSSI)
and signal to noise ratio (SNR), which can be
directly correlated to data throughput.
Using these tools allows the administrator to find
gaps in coverage as well as areas where the
coverage extends beyond the desired boundaries.
Wireless LAN infrastructure II.
Page 12
Wireless LAN infrastructure II.
In an ad hoc network, wireless devices connect without an AP, using an
IBSS. In an infrastructure network, one or more WAPs control access to the
network through a BSS. A mesh network is a type of infrastructure wireless
network that uses multiple APs to seamlessly provide network coverage
over a larger area through the use of an ESS. As device density increases,
more WAPs can be added to distribute the load.
Topic
Basic WLAN topologies.
Summary
WAPs send out a beacon that contains the SSID (the network name).
Hiding the SSID doesn’t stop the beacon from being broadcast and is not
an effective security measure. Goodput is a measure, in bytes per second,
of actual application data that can be transmitted. The closer to the AP that
a wireless device gets, the stronger the signal. Site surveys and heat maps
can be used to set up efficient wireless networks and to pinpoint problem
areas.
WLAN concepts and terms.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

What's hot (20)

PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
 
PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006
 
PACE-IT: Firewall Basics
PACE-IT: Firewall BasicsPACE-IT: Firewall Basics
PACE-IT: Firewall Basics
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With UtilitiesPACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With Utilities
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 

Viewers also liked

PT Eigen Network - Network Planning & Overview
PT Eigen Network - Network Planning & OverviewPT Eigen Network - Network Planning & Overview
PT Eigen Network - Network Planning & OverviewEM Archieve
 
Asset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich OrganizationsAsset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich OrganizationsCapgemini
 
Microsoft Partner Network Overview June 2010
Microsoft Partner Network Overview June 2010Microsoft Partner Network Overview June 2010
Microsoft Partner Network Overview June 2010gosako
 
Find your Passion at HUB International
Find your Passion at HUB InternationalFind your Passion at HUB International
Find your Passion at HUB InternationalRene Critelli
 
2009 Node XL Overview: Social Network Analysis in Excel 2007
2009 Node XL Overview: Social Network Analysis in Excel 20072009 Node XL Overview: Social Network Analysis in Excel 2007
2009 Node XL Overview: Social Network Analysis in Excel 2007Marc Smith
 
The Network Hub- StartUP Guide
The Network Hub- StartUP GuideThe Network Hub- StartUP Guide
The Network Hub- StartUP GuideAngie Barnard
 
Optical fibers physics project
Optical fibers physics projectOptical fibers physics project
Optical fibers physics projectmenna94
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableHareem Naz
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Coaxial Cable
Coaxial CableCoaxial Cable
Coaxial CableMissAnam
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableilakkiya
 
Types of wires and cables
Types of wires and cablesTypes of wires and cables
Types of wires and cablesDhruvit Kardani
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
OER Hub: An Overview
OER Hub: An OverviewOER Hub: An Overview
OER Hub: An OverviewOER Hub
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?Likan Patra
 

Viewers also liked (20)

eTwinning - Diferences Routers and switch
eTwinning - Diferences Routers and switcheTwinning - Diferences Routers and switch
eTwinning - Diferences Routers and switch
 
PT Eigen Network - Network Planning & Overview
PT Eigen Network - Network Planning & OverviewPT Eigen Network - Network Planning & Overview
PT Eigen Network - Network Planning & Overview
 
Asset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich OrganizationsAsset Hub - Asset Data Management in Infrastructure-Rich Organizations
Asset Hub - Asset Data Management in Infrastructure-Rich Organizations
 
Microsoft Partner Network Overview June 2010
Microsoft Partner Network Overview June 2010Microsoft Partner Network Overview June 2010
Microsoft Partner Network Overview June 2010
 
Find your Passion at HUB International
Find your Passion at HUB InternationalFind your Passion at HUB International
Find your Passion at HUB International
 
2009 Node XL Overview: Social Network Analysis in Excel 2007
2009 Node XL Overview: Social Network Analysis in Excel 20072009 Node XL Overview: Social Network Analysis in Excel 2007
2009 Node XL Overview: Social Network Analysis in Excel 2007
 
The Network Hub- StartUP Guide
The Network Hub- StartUP GuideThe Network Hub- StartUP Guide
The Network Hub- StartUP Guide
 
Optical fibers physics project
Optical fibers physics projectOptical fibers physics project
Optical fibers physics project
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Coaxial Cable
Coaxial CableCoaxial Cable
Coaxial Cable
 
SlideShare Networks
SlideShare NetworksSlideShare Networks
SlideShare Networks
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
Optical fibres
Optical fibresOptical fibres
Optical fibres
 
Types of wires and cables
Types of wires and cablesTypes of wires and cables
Types of wires and cables
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
OER Hub: An Overview
OER Hub: An OverviewOER Hub: An Overview
OER Hub: An Overview
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Network security
Network securityNetwork security
Network security
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 2)

Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Projectedwardlong
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & TypesShefa Idrees
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayApril Dillard
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)vishalmotwani
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 2) (20)

PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Wi fi
Wi fiWi fi
Wi fi
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Project
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
 
CCNA 1 Chapter 1 v5.0 2014
CCNA 1 Chapter 1 v5.0 2014CCNA 1 Chapter 1 v5.0 2014
CCNA 1 Chapter 1 v5.0 2014
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
Computer networks
Computer networksComputer networks
Computer networks
 
Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

PACE-IT: Wireless LAN Infrastructure (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Basic WLAN topologies. – WLAN concepts and terms.
  • 4. Page 4 Wireless LAN infrastructure II.
  • 5. Page 5 Wireless LAN infrastructure II. – Ad hoc topology. » A very basic wireless local area network (WLAN) that does not require the use of a wireless access point (WAP)—also known as an access point (AP). » Devices negotiate the wireless connection between themselves (e.g., laptops connect wirelessly without the use of a WAP). – Infrastructure topology. » A more common type of WLAN that uses a WAP or WAPs to create a connection point for wireless devices. • Most often connects a WLAN to a more traditional wired network, but it is not absolutely required. – Mesh topology. » A type of infrastructure topology that employs the use of multiple APs to create a larger seamless network coverage area. • Commonly deployed with wireless controllers and WAPs.
  • 6. Page 6 Something to remember is that the higher the wireless device density, the more WAPs that will be required to handle the load. Like any other network device, APs only have a certain amount of capacity. As the workload increases, the amount of throughput will decrease as each device contends for access to the WAP. Adding more WAPs and/or adding more WAPs and a wireless controller can greatly ease the load and increase the efficiency of the network. Wireless LAN infrastructure II.
  • 7. Page 7 Wireless LAN infrastructure II.
  • 8. Page 8 Wireless LAN infrastructure II. IBSS. Independent basic service set. An IBSS is created when an ad hoc network topology is created. The devices use the IBSS in order to control the communication that occurs between connected devices. BSS. Basic service set. When a single WAP is in infrastructure mode, it will create a BSS. This means that it can control the flow of communication between every device that connects to the SSIDs under its control. ESS. Extended service set. An ESS is created when two or more APs share a common SSID and have overlapping coverage. Through the ESS, the WAPs will negotiate how to hand off a wireless device between them as it roams the network.
  • 9. Page 9 The service set identifier (SSID) plays a key role in the WLAN environment. All active WAPs will use a beacon transmission to advertise the networks that they belong to. What they advertise is their SSIDs—their network names. Those beacons are how devices know which networks they can connect to. Even when the AP is set to hide the beacon, the broadcasts are still occurring. Although hiding the SSID broadcast may make it more difficult to join a wireless network, it is not a true security measure. Wireless LAN infrastructure II.
  • 10. Page 10 Wireless LAN infrastructure II. – 802.11a-ht and 802.11g-ht. » Both terms relate to the 802.11n standard. • Denote the type of connection—high throughput, and the radio frequency—either 2.4 GHz or 5GHz of the connection. – Goodput. » The actual amount of application data passed through a connection with the overhead removed, measured in bytes per second. » It is different than throughput. • Throughput measures the total amount of data capable of being passed through a connection. – Signal strength. » A measure of the strength of the RF signal from an AP, which can help to determine coverage area. • As a general rule, the closer a device is to the WAP, the stronger the signal received. » The strength of a signal can be affected by WAP or antenna placement, type of antenna, and interference sources, etc.
  • 11. Page 11 A wireless site survey with heat mapping tools can help in the set up of a WLAN or it can help to pinpoint problem areas. Heat mapping software builds a visual map by measuring received signal strength indicator (RSSI) and signal to noise ratio (SNR), which can be directly correlated to data throughput. Using these tools allows the administrator to find gaps in coverage as well as areas where the coverage extends beyond the desired boundaries. Wireless LAN infrastructure II.
  • 12. Page 12 Wireless LAN infrastructure II. In an ad hoc network, wireless devices connect without an AP, using an IBSS. In an infrastructure network, one or more WAPs control access to the network through a BSS. A mesh network is a type of infrastructure wireless network that uses multiple APs to seamlessly provide network coverage over a larger area through the use of an ESS. As device density increases, more WAPs can be added to distribute the load. Topic Basic WLAN topologies. Summary WAPs send out a beacon that contains the SSID (the network name). Hiding the SSID doesn’t stop the beacon from being broadcast and is not an effective security measure. Goodput is a measure, in bytes per second, of actual application data that can be transmitted. The closer to the AP that a wireless device gets, the stronger the signal. Site surveys and heat maps can be used to set up efficient wireless networks and to pinpoint problem areas. WLAN concepts and terms.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.