SlideShare a Scribd company logo
1 of 16
Wireless LAN
infrastructure I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Introduction to wireless network standards.
– Antenna technology.
– Wireless access points.
PACE-IT.
Page 4
Wireless LAN infrastructure I.
Page 5
– Introduction to IEEE 802.11.
» A set of specifications at the data link (Layer 2) layer and the
physical layer (Layer 1) of the Open System Interconnection
(OSI) model that establishes how wireless network
communication can occur.
• Specifies the use of unlicensed radio frequency (RF) bands
as the carrier for network traffic.
» Specifies half-duplex network communication through the use
of carrier sense multiple access with collision avoidance
(CSMA/CA) as the method of access.
• CSMA/CA technology requires that devices only transmit data
when no other data transmission signal is present on the
carrier wave.
» The specifications have been amended over time to become
common standards.
Wireless LAN infrastructure I.
Page 6
– IEEE 802.11 standards.
» 802.11b: commercially released in 1997 and operates within
the 2.4 GHz industrial, scientific, and medical (ISM) RF band.
• With a bandwidth of 22 MHz, it offers up to 11 separate
channels, of which three do not overlap.
• Has a theoretical throughput of 11 Mbps.
• It is compatible with 802.11g/n.
» 802.11a: commercially released in 1997 and operates within
the 5 GHz Unlicensed National Information Infrastructure (U-
NII) band.
• With a bandwidth of 20 MHz, it offers up to 23 separate
channels, none of which overlap.
• Has a theoretical throughput of 54 Mbps.
• It is not compatible with any other standard.
» 802.11g: commercially released in 2003 and operates within
the 2.4 GHz RF band.
• With a bandwidth of 20 MHz it offers up to 11 separate
channels, of which three do not overlap.
• Has a theoretical throughput of 54 Mbps.
• It is compatible with 802.11b/n/ac.
Wireless LAN infrastructure I.
Page 7
– IEEE 802.11 standards continued.
» 802.11n: commercially released in 2009 and can operate on
both the 2.4 GHz or 5 GHz RF bands at the same time.
• Uses a 20 MHz wide channel within the 2.4 GHz band and a
40 MHz wide channel within the 5 GHz band.
• Has a theoretical throughput of 600 Mbps through the
introduction of multiple-input and multiple-output (MIMO)
technology and beamforming.
• It is compatible with 802.11b/g/ac.
» 802.11ac: commercially released in 2013 and operates on the
5 GHz RF band.
• Available bandwidth varies by administrative setting and can
be dynamically changed by the wireless access point (WAP),
based on how much radio frequency interference (RFI) is
present and how many users are on the wireless network.
• Has a theoretical throughput of over 1 Gbps through the
introduction of multi-user multiple-input and multiple-output
(MU-MIMO) technology and beamforming.
• It is compatible with 802.11g/n.
Wireless LAN infrastructure I.
Page 8
Why broadcast a wide
signal to a specific device
when it is possible to target
that device specifically?
That is the question that beamforming answered. Once a device
makes a connection to an access point (AP) that is capable of
beamforming, the AP will auto-tune its antenna and transmitter to
more specifically target the device when communication occurs.
This can reduce RFI and increase throughput on the WLAN.
While 802.11n allowed for beamforming, it was not a
standardized option until the implementation of 802.11ac.
Wireless LAN infrastructure I.
Page 9
Wireless LAN infrastructure I.
Page 10
– The basics.
» Antennas are used to broadcast and receive RF signals and
they fall into two basic categories.
• Omnidirectional antennas are designed to broadcast and
receive signals in all directions.
• Unidirectional antennas are designed to broadcast and
receive signals in a specific direction.
» Antenna placement and type will have an impact on
performance.
– MIMO/MU-MIMO.
» A technology that allows for more than one spatial stream to be
transmitted and received by a single device through the use of
multiple antennas.
• MIMO allows for up to four spatial channels, while MU-MIMO
allows for up to eight spatial channels.
• MU-MIMO also allows for a single signal to be spread across
multiple transmitters—this accounts for the multiple user part
of the name.
Wireless LAN infrastructure I.
Page 11
Wireless LAN infrastructure I.
Page 12
– A foundation of the wireless LAN (WLAN).
» The wireless access point (WAP), also known as just an
access point (AP) can create a point of entry for wireless to
enter the more traditional wired networking environment.
• It can also be used to join other types of networks.
» WAPs, in most cases, use unlicensed radio frequency (RF)
bands in order to communicate with devices.
» One or more antenna is used in order to radiate and receive RF
signals in a half-duplex manner.
» Wireless routers are common in the small office/home office
(SOHO) environment. They are WAPs that have a router built
into them, reducing the need for networking components.
» Wireless bridges are APs that can bridge wired network
segments together in certain situations.
» WAP performance is impacted by the number of wireless
devices that are attempting to access the network.
• This can be mitigated by adding additional APs to the
network.
» Strategically adding WAPs to the WLAN can allow users to
migrate from one wireless signal to the next—this is called
roaming.
Wireless LAN infrastructure I.
Page 13
– Wireless controllers.
» Are commonly found in wireless networks of medium sized and
larger businesses.
» They are used to control WLANs that have multiple WAPs that
all function as part of a larger WLAN through the use of special
protocols and can increase the usability of the WLAN.
• LWAPP (Lightweight Access Point Protocol) is a Cisco
proprietary protocol that is used by Cisco wireless controllers.
» Dynamic or static VLAN pooling can be established with a
wireless controller.
• Taking the WLAN signals and creating (and controlling)
VLANs to allow more devices to connect to a single AP.
» Wireless controllers are often used to create a wireless network
mesh that seamlessly spans more area than is normally
possible.
• Mobile wireless devices are seamlessly handed off from one
access point to another when they reach the edges of the
signal.
Wireless LAN infrastructure I.
Page 14
Wireless LAN infrastructure I.
The IEEE 802.11 standards are the specifications that establish how
wireless communications can occur on a network. The 802.11 standards
require that specific RF bands and CSMA/CA technology be used. The
standards have evolved over time and include: 802.11b, 802.11a, 802.11g,
802.11n and 802.11ac. Beamforming was introduced with 802.11n.
Topic
Introduction to wireless
network standards.
Summary
Antennas are used to send and receive RF signals. They may be
omnidirectional or unidirectional in design. Antenna type and placement will
have an impact on WLAN performance. MIMO uses up to four antennas to
provide up to four spatial streams. MU-MIMO can use multiple antennas
and transmitters to spread a signal over up to eight spatial streams.
Antenna technology.
The WAP is a foundational component of the WLAN. It can create an entry
point to the more traditional wired network, or it can be used on its own. It
commonly uses the unlicensed RF to send and receive network traffic.
SOHO APs may have a router built into them. WAPs may be used to bridge
wired networks together. In larger wireless environments, wireless
controllers are used to seamlessly transfer devices from AP to AP.
Wireless access points.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 

What's hot (20)

PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and UpgradesPACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and Upgrades
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Firewall Basics
PACE-IT: Firewall BasicsPACE-IT: Firewall Basics
PACE-IT: Firewall Basics
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 

Viewers also liked

Wireless survey
Wireless surveyWireless survey
Wireless surveyashrawi92
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIAKak Yong
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless TransmissionJoe Christensen
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

Viewers also liked (12)

Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless survey
Wireless surveyWireless survey
Wireless survey
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 1)

Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...IJCSIS Research Publications
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyAjay Chawda
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary ApplicationsControlEng
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyRAVIKIRAN ANANDE
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXcscpconf
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 1) (20)

What is wlan?
What is wlan?What is wlan?
What is wlan?
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
 
Lect3
Lect3Lect3
Lect3
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
Wireless
WirelessWireless
Wireless
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
WLAN considerations v2.2
WLAN considerations v2.2WLAN considerations v2.2
WLAN considerations v2.2
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary Applications
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

PACE-IT: Wireless LAN Infrastructure (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Introduction to wireless network standards. – Antenna technology. – Wireless access points. PACE-IT.
  • 4. Page 4 Wireless LAN infrastructure I.
  • 5. Page 5 – Introduction to IEEE 802.11. » A set of specifications at the data link (Layer 2) layer and the physical layer (Layer 1) of the Open System Interconnection (OSI) model that establishes how wireless network communication can occur. • Specifies the use of unlicensed radio frequency (RF) bands as the carrier for network traffic. » Specifies half-duplex network communication through the use of carrier sense multiple access with collision avoidance (CSMA/CA) as the method of access. • CSMA/CA technology requires that devices only transmit data when no other data transmission signal is present on the carrier wave. » The specifications have been amended over time to become common standards. Wireless LAN infrastructure I.
  • 6. Page 6 – IEEE 802.11 standards. » 802.11b: commercially released in 1997 and operates within the 2.4 GHz industrial, scientific, and medical (ISM) RF band. • With a bandwidth of 22 MHz, it offers up to 11 separate channels, of which three do not overlap. • Has a theoretical throughput of 11 Mbps. • It is compatible with 802.11g/n. » 802.11a: commercially released in 1997 and operates within the 5 GHz Unlicensed National Information Infrastructure (U- NII) band. • With a bandwidth of 20 MHz, it offers up to 23 separate channels, none of which overlap. • Has a theoretical throughput of 54 Mbps. • It is not compatible with any other standard. » 802.11g: commercially released in 2003 and operates within the 2.4 GHz RF band. • With a bandwidth of 20 MHz it offers up to 11 separate channels, of which three do not overlap. • Has a theoretical throughput of 54 Mbps. • It is compatible with 802.11b/n/ac. Wireless LAN infrastructure I.
  • 7. Page 7 – IEEE 802.11 standards continued. » 802.11n: commercially released in 2009 and can operate on both the 2.4 GHz or 5 GHz RF bands at the same time. • Uses a 20 MHz wide channel within the 2.4 GHz band and a 40 MHz wide channel within the 5 GHz band. • Has a theoretical throughput of 600 Mbps through the introduction of multiple-input and multiple-output (MIMO) technology and beamforming. • It is compatible with 802.11b/g/ac. » 802.11ac: commercially released in 2013 and operates on the 5 GHz RF band. • Available bandwidth varies by administrative setting and can be dynamically changed by the wireless access point (WAP), based on how much radio frequency interference (RFI) is present and how many users are on the wireless network. • Has a theoretical throughput of over 1 Gbps through the introduction of multi-user multiple-input and multiple-output (MU-MIMO) technology and beamforming. • It is compatible with 802.11g/n. Wireless LAN infrastructure I.
  • 8. Page 8 Why broadcast a wide signal to a specific device when it is possible to target that device specifically? That is the question that beamforming answered. Once a device makes a connection to an access point (AP) that is capable of beamforming, the AP will auto-tune its antenna and transmitter to more specifically target the device when communication occurs. This can reduce RFI and increase throughput on the WLAN. While 802.11n allowed for beamforming, it was not a standardized option until the implementation of 802.11ac. Wireless LAN infrastructure I.
  • 9. Page 9 Wireless LAN infrastructure I.
  • 10. Page 10 – The basics. » Antennas are used to broadcast and receive RF signals and they fall into two basic categories. • Omnidirectional antennas are designed to broadcast and receive signals in all directions. • Unidirectional antennas are designed to broadcast and receive signals in a specific direction. » Antenna placement and type will have an impact on performance. – MIMO/MU-MIMO. » A technology that allows for more than one spatial stream to be transmitted and received by a single device through the use of multiple antennas. • MIMO allows for up to four spatial channels, while MU-MIMO allows for up to eight spatial channels. • MU-MIMO also allows for a single signal to be spread across multiple transmitters—this accounts for the multiple user part of the name. Wireless LAN infrastructure I.
  • 11. Page 11 Wireless LAN infrastructure I.
  • 12. Page 12 – A foundation of the wireless LAN (WLAN). » The wireless access point (WAP), also known as just an access point (AP) can create a point of entry for wireless to enter the more traditional wired networking environment. • It can also be used to join other types of networks. » WAPs, in most cases, use unlicensed radio frequency (RF) bands in order to communicate with devices. » One or more antenna is used in order to radiate and receive RF signals in a half-duplex manner. » Wireless routers are common in the small office/home office (SOHO) environment. They are WAPs that have a router built into them, reducing the need for networking components. » Wireless bridges are APs that can bridge wired network segments together in certain situations. » WAP performance is impacted by the number of wireless devices that are attempting to access the network. • This can be mitigated by adding additional APs to the network. » Strategically adding WAPs to the WLAN can allow users to migrate from one wireless signal to the next—this is called roaming. Wireless LAN infrastructure I.
  • 13. Page 13 – Wireless controllers. » Are commonly found in wireless networks of medium sized and larger businesses. » They are used to control WLANs that have multiple WAPs that all function as part of a larger WLAN through the use of special protocols and can increase the usability of the WLAN. • LWAPP (Lightweight Access Point Protocol) is a Cisco proprietary protocol that is used by Cisco wireless controllers. » Dynamic or static VLAN pooling can be established with a wireless controller. • Taking the WLAN signals and creating (and controlling) VLANs to allow more devices to connect to a single AP. » Wireless controllers are often used to create a wireless network mesh that seamlessly spans more area than is normally possible. • Mobile wireless devices are seamlessly handed off from one access point to another when they reach the edges of the signal. Wireless LAN infrastructure I.
  • 14. Page 14 Wireless LAN infrastructure I. The IEEE 802.11 standards are the specifications that establish how wireless communications can occur on a network. The 802.11 standards require that specific RF bands and CSMA/CA technology be used. The standards have evolved over time and include: 802.11b, 802.11a, 802.11g, 802.11n and 802.11ac. Beamforming was introduced with 802.11n. Topic Introduction to wireless network standards. Summary Antennas are used to send and receive RF signals. They may be omnidirectional or unidirectional in design. Antenna type and placement will have an impact on WLAN performance. MIMO uses up to four antennas to provide up to four spatial streams. MU-MIMO can use multiple antennas and transmitters to spread a signal over up to eight spatial streams. Antenna technology. The WAP is a foundational component of the WLAN. It can create an entry point to the more traditional wired network, or it can be used on its own. It commonly uses the unlicensed RF to send and receive network traffic. SOHO APs may have a router built into them. WAPs may be used to bridge wired networks together. In larger wireless environments, wireless controllers are used to seamlessly transfer devices from AP to AP. Wireless access points.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.