This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
A home wireless network allows multiple digital devices in a home, like computers, laptops, tablets, phones, and printers, to connect and communicate with each other over Wi-Fi. A wireless router broadcasts the Wi-Fi signal, which devices can detect and connect to wirelessly using built-in Wi-Fi adapters or external USB adapters. Common wireless network standards are 802.11b providing speeds up to 11 Mbps and 802.11g providing speeds up to 54 Mbps. The router's firewall, network address translation, and ability to share a single internet connection allow multiple devices on the home network to securely access the internet simultaneously.
The MathWorks network connects multiple semi-independent networks across locations using wide-area networking technologies like VPN and MPLS. It uses a three-tier architecture at its main campuses with access, distribution, and core layers for flexibility and security. Regional offices have redundant connectivity to hub locations and a collapsed core design. Future considerations include increased virtualization, IP bridging technologies, and software-defined networking.
This document proposes a network plan for a new school building. It discusses infrastructure considerations like data closets, a main distribution facility (MDF), intermediate distribution facilities (IDFs), bandwidth needs, cabling, wireless access points, testing, documentation, budget, and rationale. The goal is to seamlessly integrate technology into teaching and learning through a flexible and easy-to-use network.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
This deck introduces the Panduit Signature Core Fiber Optic Cabling System, a complete end-to-end solution for high speed applications that enables users to implement 40G in virtually any data center using multimode optics.
Basic Campus Network Design - Network Cabling SystemMd. Abdul Awal
This document provides an overview of basic campus network design and structured cabling. It discusses network cabling systems, transmission media like twisted pair and optical fiber cables. It describes categories of unshielded twisted pair cables and their applications. The document outlines considerations for proper cable installation, including bend radius, tension, and termination. It also discusses components of structured cabling like patch panels, cable management, and documentation standards. The goal is to understand standard cabling processes and best practices for campus network design.
Networking Concepts Lesson 07 - Architectures - Eric VanderburgEric Vanderburg
This document discusses various network architectures and technologies. It describes Ethernet standards including 10Mbps, 100Mbps, Gigabit Ethernet and 10 Gigabit Ethernet. It also covers other architectures like Token Ring, AppleTalk, FDDI, broadband technologies, ISDN, DSL, wireless networks, ATM, SONET, and optical carriers. Key aspects like topology, media, access methods, speed and distance limitations are provided for many of the architectures.
A home wireless network allows multiple digital devices in a home, like computers, laptops, tablets, phones, and printers, to connect and communicate with each other over Wi-Fi. A wireless router broadcasts the Wi-Fi signal, which devices can detect and connect to wirelessly using built-in Wi-Fi adapters or external USB adapters. Common wireless network standards are 802.11b providing speeds up to 11 Mbps and 802.11g providing speeds up to 54 Mbps. The router's firewall, network address translation, and ability to share a single internet connection allow multiple devices on the home network to securely access the internet simultaneously.
The MathWorks network connects multiple semi-independent networks across locations using wide-area networking technologies like VPN and MPLS. It uses a three-tier architecture at its main campuses with access, distribution, and core layers for flexibility and security. Regional offices have redundant connectivity to hub locations and a collapsed core design. Future considerations include increased virtualization, IP bridging technologies, and software-defined networking.
This document proposes a network plan for a new school building. It discusses infrastructure considerations like data closets, a main distribution facility (MDF), intermediate distribution facilities (IDFs), bandwidth needs, cabling, wireless access points, testing, documentation, budget, and rationale. The goal is to seamlessly integrate technology into teaching and learning through a flexible and easy-to-use network.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
This deck introduces the Panduit Signature Core Fiber Optic Cabling System, a complete end-to-end solution for high speed applications that enables users to implement 40G in virtually any data center using multimode optics.
Basic Campus Network Design - Network Cabling SystemMd. Abdul Awal
This document provides an overview of basic campus network design and structured cabling. It discusses network cabling systems, transmission media like twisted pair and optical fiber cables. It describes categories of unshielded twisted pair cables and their applications. The document outlines considerations for proper cable installation, including bend radius, tension, and termination. It also discusses components of structured cabling like patch panels, cable management, and documentation standards. The goal is to understand standard cabling processes and best practices for campus network design.
Networking Concepts Lesson 07 - Architectures - Eric VanderburgEric Vanderburg
This document discusses various network architectures and technologies. It describes Ethernet standards including 10Mbps, 100Mbps, Gigabit Ethernet and 10 Gigabit Ethernet. It also covers other architectures like Token Ring, AppleTalk, FDDI, broadband technologies, ISDN, DSL, wireless networks, ATM, SONET, and optical carriers. Key aspects like topology, media, access methods, speed and distance limitations are provided for many of the architectures.
Networking Concepts Lesson 12 - WANs - Eric VanderburgEric Vanderburg
This document discusses wide area networks (WANs) and the various technologies used to connect locations over long distances. It covers both analog technologies like PSTN lines as well digital technologies including T-carrier lines, frame relay, ATM, and packet switching networks. Specific details are provided on connection speeds, reliability, and costs to consider for each technology. Equipment required at each location is also outlined, such as CPE, DCE, DTE, and wiring closets.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
Wireless networks operate using radio waves to connect devices within a building or campus without cables. There are three main types of wireless network connections: point-to-point links between two devices, point-to-multipoint connecting multiple devices to a central access point, and multipoint-to-multipoint allowing any device to connect to any other. While wireless networks provide mobility and convenience, security measures must be implemented like changing default passwords, filtering devices, and enabling firewalls to prevent unauthorized access to the network.
A wireless local area network (WLAN) allows devices to connect to a local area network through radio waves instead of cables. WLANs use Wi-Fi or Bluetooth protocols and can connect many device types within a range of hundreds of feet. They utilize wireless access points that connect clients to the network and can bridge to wired networks. WLANs offer mobility over wired LANs but have disadvantages like slower speeds, weaker security, and interference issues compared to wired connections.
The document provides information about networking including:
1. It defines what a network is and discusses the early origins and development of networking beginning in the 1960s for military purposes.
2. It outlines the key exams, certifications, and topics covered in the CCNP certification for networking professionals.
3. It discusses different types of network topologies including bus, star, ring, and mesh, and compares their advantages and disadvantages for different networking situations and needs.
An experience is a personal and emotional event we remember. Every experience is established based upon pre-determined expectations we conceive and create in our minds. It’s personal, and therefore, remains a moving and evolving target in every scenario. When our experience concludes and the moment has passed, the outcome remains in our memory. Think about what makes you happy when connecting with your own device and then think about what makes you really upset when things are hard, complicated, and slow. If the user has a bad experience in anyone of these areas (simple, fast, and smart), they are likely to leave, share their negative experience, and potentially never return. Users might forget facts or details about their computing environment but they find it difficult to forgot the feeling behind a bad network experience. When something goes wrong with the network or an application, do you always get the blame?
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Large venues like stadiums or concert halls are challenging environments for Wi-Fi deployments. Most of today’s phones and tablets carry Wi-Fi interfaces. A safe assumption is that at least one device per person in a stadium carry a Wi-Fi interface. Monetizing those Wi-Fi interfaces with real time information of the event in the venue, targeted advertising, internet access, multimedia and social applications can create new revenues to the owner of the venue, if executed properly.
The network provides 100Mbps bandwidth with the ability to upgrade to 1000Mbps. Wireless access is provided via 802.11g. Three servers provide Active Directory, file sharing, intranet, email, and more. Switches support 10/100/1000Mbps Ethernet with fiber optic and wireless connectivity. Wireless devices support 108Mbps throughput with high-gain antennas providing coverage up to 2 miles. Dell servers run Windows Server 2003 and include a file/web server with RAID5 storage. Workstations have Core 2 Duo CPUs and run Windows Vista with Office 2003. Point of sale terminals have Celeron CPUs and run Windows with barcode scanners. Installation will take 10 days to set up wiring and systems
The document discusses LANs (local area networks), including their purpose of sharing hardware, software, and information within a small area. Key points include:
LANs allow cheaper and more efficient sharing of resources than mainframes. They make software updates and backups easier to manage. Common network types are server-based or peer-to-peer. Setting up a LAN requires workstations, servers, networking hardware like network interface cards, cabling, and a network operating system. Common cabling types are twisted pair and fiber optics. Wireless networks are also an alternative to cabling. Proper staffing is important for administration and troubleshooting of the LAN.
A router could connect multiple CCTV cameras over a local area network (LAN) and provide access to the camera feeds from outside the LAN. The router would assign IP addresses to the cameras, allow remote access through port forwarding, and provide network address translation (NAT) to share a public IP address. It could also segment the CCTV network from other devices for improved security and prioritize camera traffic to ensure smooth video streaming. Properly configured, a router is key infrastructure to network multiple IP cameras and monitor their feeds remotely over the internet.
Giridharan has over 6 years of experience in IT networking. He has worked as a network engineer for several companies supporting their Cisco router, switch, and firewall infrastructure. He is proficient in technologies like Cisco IOS, OSPF, BGP, firewall configuration, and network monitoring tools. His experience includes roles supporting large networks for clients such as Vodafone, IBM, and banks.
Networking Concepts Lesson 01 - Intro - Eric VanderburgEric Vanderburg
This document provides an introduction and overview of key networking concepts. It discusses the instructor's background and certifications. Some key points covered include how networks can reduce redundancy, enhance capabilities, share resources, and allow communication. Important acronyms like LAN, WAN, MAN, and NIC are defined. The document also summarizes network basics, types including client/server and peer-to-peer, advantages and disadvantages of each, and different server needs, vendors, and types.
Access point or wireless router general questions tell youIT Tech
A wireless access point, or AP, adds Wi-Fi capability to a wired network by bridging traffic from workstations onto an Ethernet LAN.
A wireless router combines broadband router capabilities--such as acting as the gateway between the internet and a local area network--as well as wireless AP features, inside a single device.
...
Dell networking optics and cables connectivity guideDavid Pasek
This document provides a connectivity guide for Dell Networking optics and cables. It discusses key factors to consider when selecting optics and cables for different use cases like server to switch, storage to switch, and switch to switch connectivity. It also includes a quick reference guide listing Dell optics and cable models with specifications like standard, receptacle, power, wavelength, distance, fiber mode, and a frequently asked questions section.
The document proposes improving wireless network coverage at the Jackson Avenue Warehouse facility by taking control of unused IT infrastructure from a departed company, installing additional access points, and upgrading switches and cabling to expand network access across problematic areas of the warehouse and storage locations. A list of specific equipment and access point placements is provided, along with diagrams and total estimated costs to implement the wireless upgrades.
Our school network consists of five servers that serve different functions like managing user access, storing files and programs, and hosting websites. Switches connect client computers, printers and the servers. Information travels from servers through switches to reach devices. The firewall protects the network from unauthorized access, and a router and modem connect our local network to the internet.
WiFi or wireless fidelity allows devices to connect to the Internet without wires. It uses wireless technology to send and receive data within the range of a wireless access point. Typical users of WiFi include travelers, businesspeople, students and anyone with a laptop. Common places to install WiFi access points include airports, hotels, coffee shops and malls to provide Internet access to mobile users. Key components of a WiFi network include wireless cards or adapters, access points, routers, and an Internet connection. WiFi standards like 802.11b, 802.11g and 802.11a define specifications for wireless networking.
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
This document proposes a network design to connect an online ordering system to two suppliers. It includes a firewall, router, web server and database server at the company. Each supplier will have its own router connected to the internet. The bill of materials lists the required server, router, category 5 cables and DSL internet connection. The total cost is around PHP 40,864.
Wireless networking enables sharing of resources like internet access and printers between computers without wiring. It provides flexibility in computer placement and mobility for laptop users. Reasons to choose wireless include not having to run wires, flexibility of locations, and the ability to add users simply by installing new wireless adapters. Wireless standards like 802.11b, 802.11a and upcoming 802.11g specify frequencies and data rates. Wireless networks can operate in ad-hoc peer-to-peer mode or infrastructure mode using an access point to connect to a wired network.
Networking Concepts Lesson 13 - Troubleshooting - Eric VanderburgEric Vanderburg
This document discusses various proactive measures for network troubleshooting including establishing naming conventions and policies, creating network documentation through diagrams and inventories, implementing regular backups and change management procedures, enabling logging and auditing, utilizing monitoring tools, developing customer service skills, and following a structured troubleshooting process. It emphasizes the importance of planning, documentation, testing, and establishing guidelines to facilitate smooth network operations and rapid problem resolution.
The document discusses 3G networks and their capabilities. 3G networks provide high-speed mobile access to the internet and IP-based services. They enable data speeds of 144 kbps for vehicular use, 384 kbps for pedestrian use, and 2 Mbps for indoor use. 3G networks support both circuit-switched and packet-switched transmission and allow for convergence of mobile telephony and internet technologies.
El documento describe el programa de formación Cisco Certified Network Professional (CCNP) v6.0. El programa sigue fielmente el currículo oficial de Cisco Networking Academy y prepara a los estudiantes para obtener la certificación CCNP altamente valorada. El currículo cubre temas avanzados de redes como enrutamiento, conmutación, redes inalámbricas, seguridad y voz a través de tres exámenes de certificación.
Networking Concepts Lesson 12 - WANs - Eric VanderburgEric Vanderburg
This document discusses wide area networks (WANs) and the various technologies used to connect locations over long distances. It covers both analog technologies like PSTN lines as well digital technologies including T-carrier lines, frame relay, ATM, and packet switching networks. Specific details are provided on connection speeds, reliability, and costs to consider for each technology. Equipment required at each location is also outlined, such as CPE, DCE, DTE, and wiring closets.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
Wireless networks operate using radio waves to connect devices within a building or campus without cables. There are three main types of wireless network connections: point-to-point links between two devices, point-to-multipoint connecting multiple devices to a central access point, and multipoint-to-multipoint allowing any device to connect to any other. While wireless networks provide mobility and convenience, security measures must be implemented like changing default passwords, filtering devices, and enabling firewalls to prevent unauthorized access to the network.
A wireless local area network (WLAN) allows devices to connect to a local area network through radio waves instead of cables. WLANs use Wi-Fi or Bluetooth protocols and can connect many device types within a range of hundreds of feet. They utilize wireless access points that connect clients to the network and can bridge to wired networks. WLANs offer mobility over wired LANs but have disadvantages like slower speeds, weaker security, and interference issues compared to wired connections.
The document provides information about networking including:
1. It defines what a network is and discusses the early origins and development of networking beginning in the 1960s for military purposes.
2. It outlines the key exams, certifications, and topics covered in the CCNP certification for networking professionals.
3. It discusses different types of network topologies including bus, star, ring, and mesh, and compares their advantages and disadvantages for different networking situations and needs.
An experience is a personal and emotional event we remember. Every experience is established based upon pre-determined expectations we conceive and create in our minds. It’s personal, and therefore, remains a moving and evolving target in every scenario. When our experience concludes and the moment has passed, the outcome remains in our memory. Think about what makes you happy when connecting with your own device and then think about what makes you really upset when things are hard, complicated, and slow. If the user has a bad experience in anyone of these areas (simple, fast, and smart), they are likely to leave, share their negative experience, and potentially never return. Users might forget facts or details about their computing environment but they find it difficult to forgot the feeling behind a bad network experience. When something goes wrong with the network or an application, do you always get the blame?
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Large venues like stadiums or concert halls are challenging environments for Wi-Fi deployments. Most of today’s phones and tablets carry Wi-Fi interfaces. A safe assumption is that at least one device per person in a stadium carry a Wi-Fi interface. Monetizing those Wi-Fi interfaces with real time information of the event in the venue, targeted advertising, internet access, multimedia and social applications can create new revenues to the owner of the venue, if executed properly.
The network provides 100Mbps bandwidth with the ability to upgrade to 1000Mbps. Wireless access is provided via 802.11g. Three servers provide Active Directory, file sharing, intranet, email, and more. Switches support 10/100/1000Mbps Ethernet with fiber optic and wireless connectivity. Wireless devices support 108Mbps throughput with high-gain antennas providing coverage up to 2 miles. Dell servers run Windows Server 2003 and include a file/web server with RAID5 storage. Workstations have Core 2 Duo CPUs and run Windows Vista with Office 2003. Point of sale terminals have Celeron CPUs and run Windows with barcode scanners. Installation will take 10 days to set up wiring and systems
The document discusses LANs (local area networks), including their purpose of sharing hardware, software, and information within a small area. Key points include:
LANs allow cheaper and more efficient sharing of resources than mainframes. They make software updates and backups easier to manage. Common network types are server-based or peer-to-peer. Setting up a LAN requires workstations, servers, networking hardware like network interface cards, cabling, and a network operating system. Common cabling types are twisted pair and fiber optics. Wireless networks are also an alternative to cabling. Proper staffing is important for administration and troubleshooting of the LAN.
A router could connect multiple CCTV cameras over a local area network (LAN) and provide access to the camera feeds from outside the LAN. The router would assign IP addresses to the cameras, allow remote access through port forwarding, and provide network address translation (NAT) to share a public IP address. It could also segment the CCTV network from other devices for improved security and prioritize camera traffic to ensure smooth video streaming. Properly configured, a router is key infrastructure to network multiple IP cameras and monitor their feeds remotely over the internet.
Giridharan has over 6 years of experience in IT networking. He has worked as a network engineer for several companies supporting their Cisco router, switch, and firewall infrastructure. He is proficient in technologies like Cisco IOS, OSPF, BGP, firewall configuration, and network monitoring tools. His experience includes roles supporting large networks for clients such as Vodafone, IBM, and banks.
Networking Concepts Lesson 01 - Intro - Eric VanderburgEric Vanderburg
This document provides an introduction and overview of key networking concepts. It discusses the instructor's background and certifications. Some key points covered include how networks can reduce redundancy, enhance capabilities, share resources, and allow communication. Important acronyms like LAN, WAN, MAN, and NIC are defined. The document also summarizes network basics, types including client/server and peer-to-peer, advantages and disadvantages of each, and different server needs, vendors, and types.
Access point or wireless router general questions tell youIT Tech
A wireless access point, or AP, adds Wi-Fi capability to a wired network by bridging traffic from workstations onto an Ethernet LAN.
A wireless router combines broadband router capabilities--such as acting as the gateway between the internet and a local area network--as well as wireless AP features, inside a single device.
...
Dell networking optics and cables connectivity guideDavid Pasek
This document provides a connectivity guide for Dell Networking optics and cables. It discusses key factors to consider when selecting optics and cables for different use cases like server to switch, storage to switch, and switch to switch connectivity. It also includes a quick reference guide listing Dell optics and cable models with specifications like standard, receptacle, power, wavelength, distance, fiber mode, and a frequently asked questions section.
The document proposes improving wireless network coverage at the Jackson Avenue Warehouse facility by taking control of unused IT infrastructure from a departed company, installing additional access points, and upgrading switches and cabling to expand network access across problematic areas of the warehouse and storage locations. A list of specific equipment and access point placements is provided, along with diagrams and total estimated costs to implement the wireless upgrades.
Our school network consists of five servers that serve different functions like managing user access, storing files and programs, and hosting websites. Switches connect client computers, printers and the servers. Information travels from servers through switches to reach devices. The firewall protects the network from unauthorized access, and a router and modem connect our local network to the internet.
WiFi or wireless fidelity allows devices to connect to the Internet without wires. It uses wireless technology to send and receive data within the range of a wireless access point. Typical users of WiFi include travelers, businesspeople, students and anyone with a laptop. Common places to install WiFi access points include airports, hotels, coffee shops and malls to provide Internet access to mobile users. Key components of a WiFi network include wireless cards or adapters, access points, routers, and an Internet connection. WiFi standards like 802.11b, 802.11g and 802.11a define specifications for wireless networking.
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
This document proposes a network design to connect an online ordering system to two suppliers. It includes a firewall, router, web server and database server at the company. Each supplier will have its own router connected to the internet. The bill of materials lists the required server, router, category 5 cables and DSL internet connection. The total cost is around PHP 40,864.
Wireless networking enables sharing of resources like internet access and printers between computers without wiring. It provides flexibility in computer placement and mobility for laptop users. Reasons to choose wireless include not having to run wires, flexibility of locations, and the ability to add users simply by installing new wireless adapters. Wireless standards like 802.11b, 802.11a and upcoming 802.11g specify frequencies and data rates. Wireless networks can operate in ad-hoc peer-to-peer mode or infrastructure mode using an access point to connect to a wired network.
Networking Concepts Lesson 13 - Troubleshooting - Eric VanderburgEric Vanderburg
This document discusses various proactive measures for network troubleshooting including establishing naming conventions and policies, creating network documentation through diagrams and inventories, implementing regular backups and change management procedures, enabling logging and auditing, utilizing monitoring tools, developing customer service skills, and following a structured troubleshooting process. It emphasizes the importance of planning, documentation, testing, and establishing guidelines to facilitate smooth network operations and rapid problem resolution.
The document discusses 3G networks and their capabilities. 3G networks provide high-speed mobile access to the internet and IP-based services. They enable data speeds of 144 kbps for vehicular use, 384 kbps for pedestrian use, and 2 Mbps for indoor use. 3G networks support both circuit-switched and packet-switched transmission and allow for convergence of mobile telephony and internet technologies.
El documento describe el programa de formación Cisco Certified Network Professional (CCNP) v6.0. El programa sigue fielmente el currículo oficial de Cisco Networking Academy y prepara a los estudiantes para obtener la certificación CCNP altamente valorada. El currículo cubre temas avanzados de redes como enrutamiento, conmutación, redes inalámbricas, seguridad y voz a través de tres exámenes de certificación.
This document provides an overview of topics covered in a two-day LTE training session, including:
1. An introduction to LTE radio procedures such as initial access, downlink physical channels, and cell search.
2. Details on synchronization signals like the primary and secondary synchronization signals that help devices find and synchronize to cells.
3. Descriptions of downlink reference signals and the system information broadcast channel that provide essential configuration details to devices.
Este documento resume la pedagogía crítica de Henry Giroux. Señala que Giroux combina el postmodernismo crítico y la pedagogía crítica para formular su enfoque de la "pedagogía fronteriza". Los fines de esta pedagogía incluyen desarrollar formas de transgresión y crear espacios para producir nuevos conocimientos e identidades. El contenido educativo se centra en el conocimiento y las habilidades que permitan cuestionar los límites culturales. Los docentes deben legitimar la diferencia y los estudiant
The document compares the Cisco ASA 5505 and Juniper SSG 5 firewall appliances. The Cisco ASA 5505 has better throughput and hardware specifications, but the Juniper SSG 5 supports more VPN tunnels, VLANs, and unified threat management. The Cisco ASA 5505 is about 50% more expensive than the Juniper SSG 5 based on retail prices. Both devices can be managed through a web-based interface and have similar default configurations out of the box.
The document discusses key trends in the global Unified Communications and Collaboration (UC&C) market seen by the International Data Corporation (IDC). IDC sees the market transitioning from legacy telephony and messaging platforms to new UC&C platforms and solutions. This is driven by increased interest in collaborating across web, video, social, contact center and business process applications. Some trends noted include the consumerization of IT bringing user-owned devices into enterprises, virtualized communications architectures, growth in hosted and UC as a service models, and UC&C adoption among small and medium businesses.
The document discusses Cisco's next-generation firewall called Cisco ASA CX Context-Aware Security. It blends traditional stateful inspection firewall capabilities with additional network-based security controls like application visibility and control, web security, and IPS. It uses device awareness, user identity, network reputation, and other context to apply differentiated security policies. The firewall provides high performance with increased throughput and connections compared to previous Cisco firewall models.
This document provides instructions for basic configuration of Huawei routers, including commands to display device information, configure interfaces and IP addresses, set the host name and password, enable routing protocols like RIP and OSPF, and configure static and dynamic routing. It also provides examples of extended access list configuration and address translation. Additional links are included for VPN configuration, PPPOE client setup, and information on purchasing Huawei networking equipment from a distributor.
List of usernames and passwords for Huawei routersHuanetwork
This document provides instructions for finding usernames and passwords for Huawei routers by looking up the router model number in a list. It describes a three step process: 1) Find the router model number, 2) Look up the username, 3) Look up the password. It also explains how to log into a Huawei router once the username and password are obtained. Contact information is provided for a company that distributes Huawei networking products.
This document provides information about the PASOLINK family of digital microwave relay systems from NEC, including:
- The PASOLINK systems operate at frequency bands between 3.6-40 GHz and provide PDH, SDH, and LAN interfaces.
- The systems consist of indoor and outdoor units connected by coaxial cable and antennas. Configurations include non-protected 1+0 and protected 1+1 hot standby and twin path systems.
- Key features include high reliability, low power consumption, flexible interfaces, frequency agility, system flexibility, and maintenance facilities. Interface options include E1, E3, STM-1, and Ethernet.
This document introduces and promotes several innovative ICT solutions from Huawei, including their Agile Wi-Fi solution, eLTE broadband solution, high-end storage, high-end server, and data center solutions. It highlights key benefits such as unified authentication and management, high performance exceeding traditional alternatives, intelligent planning and automation tools, and support for critical systems. The overall message is that Huawei's enterprise ICT solutions can help businesses get prepared for fast and stable growth with leading technologies that ensure critical systems run smoothly.
This document discusses switch security configuration and common security attacks. It covers topics such as configuring passwords, console access, virtual terminal access, banners, telnet/SSH, and port security. Various security attacks are also described like MAC address flooding, spoofing attacks, CDP attacks, and telnet attacks. The document provides configuration examples for securing switch access and interfaces using passwords, banners, telnet/SSH, and port security features.
The document discusses wireless local area networks (WLANs). It describes how an access point is used to connect wireless devices like laptops and desktops to a wired local area network. The access point bridges the wireless and wired networks. It also discusses the benefits of WLANs like providing mobility and reducing installation costs compared to wired networks.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
This is the second part of my 5G project which consists of the architecture structure of 5G. What all it consists of, what all technologies it uses, what all layers it contain etc.
We are looking at the future of technology that has the structure of Nanocore, beneficial for future applications.
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. Zigbee technology was developed for a Wireless Personal Area Networks (WPAN), aimed at control and military applications with low data rate and low power consumption. Zigbee is a standard defines the set of communication protocols for low-data-rate short-range wireless networking. Zigbee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands. The maximum data rate is 250K bits per second. Zigbee is mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements. This paper explores Verilog design for various blocks in Zigbee Transmitter architecture for an acknowledgement frame. The word digital has made a dramatic impact on our society. Developments of digital solutions have been possible due to good digital system design and modeling techniques. Further developments have been made and introduced VLSI in order to reduce size of the architecture, to improve speed of operation, improvements in predictability of the circuit behavior. Digital Zigbee Transmitter comprises of Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-chip block, Modulator and Pulse shaping block. The work here is to show how we can design Zigbee transmitter with its specifications by using Verilog with less number of slices and Look up tables (LUTs).
This document discusses Software Defined Networking (SDN), Segment Routing (SR), Network Functions Virtualization (NFV), and Mobile Edge Computing (MEC) as essential technologies for 5G networks. It explains that SDN and SR are needed to dynamically set up network slices to guarantee quality of service, while NFV and MEC are needed to instantiate virtual network functions. It then provides more detailed explanations of why SDN and NFV are important technologies, focusing on the trends of blurred lines between computation and communications, and declining profitability of traditional network providers.
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses, We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
A wireless network uses radio waves to connect devices like laptops to the internet and business networks without cables. It provides mobility and flexibility compared to wired networks. Common benefits of wireless networks for small businesses include convenience, mobility, productivity gains, low installation costs, and the ability to easily expand network access points. Wireless standards like 802.11 have continually improved network speeds and security.
Computer Networking – CSE290 is a course that covers basic concepts of networks including LANs, WANs, the internet, and common network devices. It discusses how networks allow sharing of resources and backups. The document defines what a computer network is and its basic components. It provides details on network media like wired and wireless technologies. Common networking devices like switches, routers, and firewalls are explained. Finally, it discusses different types of networks including LANs, WANs, SANs, and others.
LAN Architecture Over Fiber Optics.pdfVERSITRONINC
LAN is a type of networking architecture that helps to connect multiple computers in a single network. This can be done using fiber optic cable. This article describes fiber-optic LAN architecture, common types of fiber optic LAN network, and its advantages.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
This document discusses how companies' wide area networks are at risk without proper security measures. It explains that internet service providers prioritize cost and performance over security. This leaves companies exposed to threats. The document recommends using a SonicWALL security appliance to create a highly available network with layers of protection, including application controls, traffic scanning, and encryption inspection. For a low monthly fee, this solution provides security, reliability, and regulatory compliance that traditional networks lack.
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
The document discusses how companies' wide area networks are at risk without proper security measures. It describes how internet service providers typically configure networks with a focus on cost and performance over security. This leaves companies exposed to threats. The document recommends using a SonicWALL security appliance to create a high availability network with layers of protection, including application controls, traffic scanning, and encryption inspection. This provides critical network and endpoint security missing from typical ISP configurations.
A Modem is somewhat a more interesting network device in our daily life. So if you have noticed around, you get an internet connection through a wire (there are different types of wires) to your house. This wire is used to carry our internet data outside to the internet world.
However, our computer generates binary data or digital data in forms of 1s and 0s and on the other hand, a wire carries an analog signal and that’s where a modem comes in.
A modem stands for (Modulator+Demodulator). That means it modulates and demodulates the signal between the digital data of a computer and the analog signal of a telephone line.
CONTACT INFORMATION
Network Data
#3A,3rd floor, Sri Gem plaza,
Sankaranpillai street,
S.R.C college road
Near Chatram Bus Stand,
Trichy -620002
Phone: +91 80721 11436, +91 80567 75503
hkumarasamy@gmail.com
http://www.networkdata.in
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
The document discusses various topics related to networking infrastructure and protocols:
1. It describes the components of a structured cabling system and benefits of an extended star topology used for cabling.
2. It explains several key protocols used at different layers of the OSI model including SMTP, ARP, FTP, and SSL and their functions.
3. It discusses wireless networking components like wireless routers/modems and adapters and how Wi-Fi works based on IEEE 802.11 standards at the physical and data link layers.
4. It covers Wi-Fi standards, advantages and disadvantages of wireless networking, and factors to consider for wired vs wireless implementation in a LAN.
The document discusses plans to implement a wireless network at Morrisville College Library to allow students with laptops to access library resources anywhere in the building. It describes the hardware used, including Cisco access points and wireless network cards, and the benefits of a wireless network for a laptop-focused student body. Case studies from other academic libraries that implemented wireless networks are also presented to demonstrate how wireless can enhance the library experience for mobile users.
Similar to Expl sw chapter_07_wireless rev.01 (20)
Bab 7-1 membahas tentang jarak antara titik A dan P yang sama dengan jarak antara titik B dan P dengan mengubah nilai panjang gelombang. Persamaan dijelaskan untuk menghitung nilai maksimum radius zon Fresnel pertama dengan mengkonversi frekuensi dan jarak total ke GHz dan Km. Diuraikan pula tentang grid antenna vertikal dan horizontal serta gelombang vertikal dan horizontal. Terakhir dijelaskan tentang radio point to point tanpa gangguan dan dengan gangguan p
This document discusses inter-VLAN routing and different methods for implementing it. It introduces inter-VLAN routing as a process of forwarding traffic between VLANs using a router. There are three main methods discussed: traditional routing using one interface per VLAN, router-on-a-stick using subinterfaces on a single router interface, and switch-based routing using switch virtual interfaces. The document provides detailed explanations and configurations for router-on-a-stick inter-VLAN routing.
Redundant layer 2 topologies can create loops in the network. Spanning Tree Protocol (STP) controls this by logically blocking ports on switches to ensure only a single path exists between devices. STP elects a root bridge and designates root, designated and blocked ports to break up loops while maintaining connectivity. It prevents issues like broadcast storms and duplicate unicast frames that can occur due to loops in the network.
VTP allows VLAN configurations to be synchronized across multiple switches, simplifying network management. It operates by electing a switch as the VTP server, where VLANs can be created and modified. This information is then propagated through VTP advertisements to other switches operating as clients or in transparent mode. Troubleshooting may involve checking the VTP domain name, revision number, and that at least one switch is operating as a server.
VLAN trunking allows traffic from multiple VLANs to travel across the same link between two switches. This reduces the number of required physical links and saves on infrastructure costs. VLAN trunks use tagging to identify which VLAN each frame belongs to as switches forward frames based on MAC addresses only. Common trunking modes are 802.1Q, which is now the standard, and ISL, which was used in older Cisco switches but is no longer recommended. Dynamic Trunking Protocol (DTP) can be used to automatically negotiate trunking settings between switches.
Dokumen tersebut membahas tentang VLAN (Virtual Local Area Network) yang merupakan teknologi jaringan untuk membagi logis jaringan switch menjadi beberapa subnet virtual. VLAN memungkinkan pembagian jaringan berdasarkan fungsi, tim proyek, aplikasi, atau koneksi ke jaringan lain. Komunikasi antar VLAN memerlukan router namun hanya membutuhkan satu koneksi fisik. Dokumen juga menjelaskan tipe-tipe VLAN seperti data VLAN, default VLAN
This document discusses key concepts of Ethernet and switch configuration. It describes Ethernet frame formats, MAC addresses, switch port settings including auto-negotiation and auto-MDIX. It explains how switches use MAC address tables to forward traffic, providing examples of entries being added to the table. Design considerations for Ethernet like bandwidth and collisions are also covered.
1. CCNA3-1 Chapter 7-1
Basic Wireless Concepts and ConfigurationBasic Wireless Concepts and Configuration
The Wireless LANThe Wireless LAN
2. CCNA3-2 Chapter 7-1
• Perkembang Networking saat ini sudah dapat mendukung aktifitasPerkembang Networking saat ini sudah dapat mendukung aktifitas
kita secara mobile/bergerak.kita secara mobile/bergerak.
• Sehingga produktifitas kita saat iniSehingga produktifitas kita saat ini no longer restrictedno longer restricted lokasilokasi
kerja yang tetap ataupun dibatasi oleh waktu.kerja yang tetap ataupun dibatasi oleh waktu.
• Kita saat ini membutuhkan suatu network yang selaluKita saat ini membutuhkan suatu network yang selalu
terkoneksi untuk dapat melakukan komunikasi dan aktifitasterkoneksi untuk dapat melakukan komunikasi dan aktifitas
kita setiap saat dan setiap tempat atau dimana saja.kita setiap saat dan setiap tempat atau dimana saja.
• Dengan networking yang dapat mendukung aktifitas kitaDengan networking yang dapat mendukung aktifitas kita
secara mobile, maka saat ini kita dapat melakukan pekerjaansecara mobile, maka saat ini kita dapat melakukan pekerjaan
seperti checkseperti check e-mail, voice mail, and the status of productse-mail, voice mail, and the status of products
menggunakan personal digital assistants (PDAs) ataumenggunakan personal digital assistants (PDAs) atau
handphone maupun pc tablet dari lokasi diluar kantor.handphone maupun pc tablet dari lokasi diluar kantor.
• Access InternetAccess Internet dirumah-rumah saat ini sudah beralih daridirumah-rumah saat ini sudah beralih dari
modem dial-up lama ke dedicated DSL atau cable servicemodem dial-up lama ke dedicated DSL atau cable service
maupun handphone.maupun handphone.
Why Use Wireless?Why Use Wireless?
3. CCNA3-3 Chapter 7-1
Why Use Wireless?Why Use Wireless?
• Pada awalnya networks komunikasi terbatas hanya padaPada awalnya networks komunikasi terbatas hanya pada
pertukaran informasi character based.pertukaran informasi character based.
• Communications antar computers (cross) tidak mudahCommunications antar computers (cross) tidak mudah
dilakukan dan memerlukan host/pc untuk keperluandilakukan dan memerlukan host/pc untuk keperluan
komunikasi transfer data sederhana.komunikasi transfer data sederhana.
4. CCNA3-4 Chapter 7-1
Why Use Wireless?Why Use Wireless?
• Saat ini networks dapat membawa berbagai jenis tipe dataSaat ini networks dapat membawa berbagai jenis tipe data
information melalui banyak jenis device secarainformation melalui banyak jenis device secara
SSIMULTANEOUSLY/bersamaanIMULTANEOUSLY/bersamaan..
• Kita mendapatkan response secara langsung dari lawanKita mendapatkan response secara langsung dari lawan
komunikasi kita dimanapun kita berada.komunikasi kita dimanapun kita berada.
Silver and Diamond
Cell Phone $1.3Million
Wind Energy Cell Phone Charger
5. CCNA3-5 Chapter 7-1
• Selain flexibility yang disediakan teknologi WLANs,Selain flexibility yang disediakan teknologi WLANs,
keuntungan lainnya adalahkeuntungan lainnya adalah reduced costsreduced costs..
• Moving persons within a building with a wirelessMoving persons within a building with a wireless
infrastructure.infrastructure.
• Moving into a new building with no wired infrastructure.Moving into a new building with no wired infrastructure.
Why Use Wireless?Why Use Wireless?
Wired NetworkWired Network Wireless NetworkWireless Network
ComponentComponent QtyQty CostCost TotalTotal QtyQty CostCost TotalTotal
Switches,Switches,
cabinets, etc.cabinets, etc.
167167 3,3503,350 559,450559,450 2525 4,4044,404 110,100110,100
CablingCabling 7,5007,500 4545 337,500337,500 430430 7575 61,92061,920
Network AdaptersNetwork Adapters 2,5002,500 5757 142,500142,500 2,5002,500 7777 192,500192,500
Wireless AccessWireless Access
PointsPoints
250250 1,0341,034 258,500258,500
POE AdaptersPOE Adapters 4040 6767 2,6802,680
TotalTotal 1,039,4501,039,450 364,520364,520
Note: Values are estimates and do not reflect actual pricing.Note: Values are estimates and do not reflect actual pricing.Note: Values are estimates and do not reflect actual pricing.Note: Values are estimates and do not reflect actual pricing.
6. CCNA3-6 Chapter 7-1
• Kebanyakan network dalam suatu perusahaan menggunakan Switch-Kebanyakan network dalam suatu perusahaan menggunakan Switch-
Based LANs untuk operasional sehari-hari didalam gedung kantor.Based LANs untuk operasional sehari-hari didalam gedung kantor.
• Namun saat ini pekerja banyak melakukan pekerjaan secara mobile danNamun saat ini pekerja banyak melakukan pekerjaan secara mobile dan
ingin dapat mengakses ke network perusahaan untuk melakukan aktifitasingin dapat mengakses ke network perusahaan untuk melakukan aktifitas
kerja yang tidak hanya dapat dilakukan dari meja kerjanya saja.kerja yang tidak hanya dapat dilakukan dari meja kerjanya saja.
Wireless LANsWireless LANs
7. CCNA3-7 Chapter 7-1
• Wireless LAN dapat menjadi pilihan yang efektif, sebagaiWireless LAN dapat menjadi pilihan yang efektif, sebagai
perpanjangan/yang menghubungkan kita ke Ethernet LAN.perpanjangan/yang menghubungkan kita ke Ethernet LAN.
Wireless LANsWireless LANs
8. CCNA3-8 Chapter 7-1
Comparing a WLAN to a LANComparing a WLAN to a LAN
Network Architecture StandardsNetwork Architecture StandardsNetwork Architecture StandardsNetwork Architecture Standards
Physical MediaPhysical MediaPhysical MediaPhysical Media
9. CCNA3-9 Chapter 7-1
Comparing a WLAN to a LANComparing a WLAN to a LAN
Wireless Access Points (AP)Wireless Access Points (AP)
instead of a switch.instead of a switch.
Wireless Access Points (AP)Wireless Access Points (AP)
instead of a switch.instead of a switch.
PrivacyPrivacy
IssuesIssues
PrivacyPrivacy
IssuesIssues
10. CCNA3-10 Chapter 7-1
Comparing a WLAN to a LANComparing a WLAN to a LAN
• CSMA/CD (Collision Detection)
• Proses awal, perangkat memantau media untuk keberadaan sinyal
data.
• Jika tidak ada sinyal data, atau media dalam kondisi bebas, maka
perangkat dapat melakukan transmisi data.
• Tetapi jika ada sinyal yang terdeteksi, ini menunjukkan perangkat lain
sedang melakukan transmisi data dan semua perangkat lain harus
menghentikan pengiriman dan akan mencoba lagi diwaktu berikutnya.
• Metode ini digunakan oleh jaringan Ethernet 802.3
• CSMA/CA (Collision Avoidance)
• Proses awal, melakukan pemeriksaan perangkat media, dan
keberadaan dari sinyal data.
• Kemudian perangkat mengirim pemberitahuan kepada semua node
akan melakukan pengiriman data, permintaan untuk melakukan
pengiriman, dengan maksud untuk menggunakan media penghantar
• Setelah itu perangkat kemudian melakukan pengiriman data
• Metode ini digunakan oleh jaringan Nirkabel/Wireless 802.11
11. CCNA3-11 Chapter 7-1
• Additional components and protocolsAdditional components and protocols yang digunakan pada 802.11yang digunakan pada 802.11
wireless connections sebagai extend dari 802.3 Ethernet LAN.wireless connections sebagai extend dari 802.3 Ethernet LAN.
Wireless LAN ComponentsWireless LAN Components
Wireless AccessWireless Access
Point (AP)Point (AP)
Wireless AccessWireless Access
Point (AP)Point (AP)
12. CCNA3-12 Chapter 7-1
• 802.11 wireless LAN802.11 wireless LAN::
• IEEE standard menentukan radio frequency (RF) untukIEEE standard menentukan radio frequency (RF) untuk
kebutuhan unlicensed Industrial, Scientific, and Medicalkebutuhan unlicensed Industrial, Scientific, and Medical
(ISM)(ISM) berdasarkan frequency bands yang digunakan olehberdasarkan frequency bands yang digunakan oleh
Physical layerPhysical layer dandan MAC sub-layerMAC sub-layer dari wireless links.dari wireless links.
• Typically frequency bands ini, dipilih berdasarkanTypically frequency bands ini, dipilih berdasarkan
standart daristandart dari data ratedata rate-nya.-nya.
Wireless LAN StandardsWireless LAN Standards
Final ratificationFinal ratification
expected inexpected in
November, 2009November, 2009
Final ratificationFinal ratification
expected inexpected in
November, 2009November, 2009
13. CCNA3-13 Chapter 7-1
• Data Rates dipengaruhi oleh teknik modulation yang digunakan:
1. Direct Sequence Spread Spectrum (DSSS):
Juga dikenal sebagai Direct Sequence Code Division Multiple Access
(DS-CDMA), DSSS adalah salah satu jenis dari modulasi spread
spectrum untuk pengiriman data digital kecepatan tinggi melalui radio.
Umumnya peralatan IEEE 802.11b menggunakan DSSS untuk
memancarkan data-nya yang memberikan kecepatan sekitar 11Mbps.
Pada saat dikirim, seluruh data akan digabungkan dengan sebuah data
berurut kecepatan tinggi (yang dikenal sebagai chipping code) yang
akan mendefinisikan perbandingan spreading dari data.
Chipping code akan menolong me-reduce interferensi dan juga
merecover data menjadi data aslinya kembali jika terjadi kerusakan pada
saat dikirim.
• Simpler of the two methods.
• Less expensive to implement.
• 802.11b and 802.11g.
Wireless LAN StandardsWireless LAN Standards
14. CCNA3-14 Chapter 7-1
2. Orthogonal Frequency Division Multiplexing (OFDM):2. Orthogonal Frequency Division Multiplexing (OFDM):
Merupakan teknik mudulasi untuk komunikasi wireless broadbandMerupakan teknik mudulasi untuk komunikasi wireless broadband
dimasa yang akan datang, karena OFDM ini tahan melawan frekuensidimasa yang akan datang, karena OFDM ini tahan melawan frekuensi
selective fading dan interferensi narrowband dan efisien menghadapiselective fading dan interferensi narrowband dan efisien menghadapi
multi-path delay spread. Untuk mencapai hal tersebut, OFDM membagimulti-path delay spread. Untuk mencapai hal tersebut, OFDM membagi
aliran data high-rate menjadi aliran rate yang lebih rendah, yangaliran data high-rate menjadi aliran rate yang lebih rendah, yang
kemudian dikirimkan secara bersama pada beberapa sub-carrier.kemudian dikirimkan secara bersama pada beberapa sub-carrier.
Sub-carrier dimodulasikan sendiri dengan menggunakanSub-carrier dimodulasikan sendiri dengan menggunakan Phase ShiftPhase Shift
Keying (PSK) atau Quadrature Amplitude Modulation (QAM).Keying (PSK) atau Quadrature Amplitude Modulation (QAM).
• Data rates lebih cepat dibandingkan dengan DSSS.Data rates lebih cepat dibandingkan dengan DSSS.
• 802.11a, 802.11g, 802.11n.802.11a, 802.11g, 802.11n.
Wireless LAN StandardsWireless LAN Standards
17. CCNA3-17 Chapter 7-1
• 802.11a Standard:802.11a Standard:
• OFDMOFDM modulation & menggunakan Frekusensimodulation & menggunakan Frekusensi 5 GHz5 GHz..
• Less likely to experience interferenceLess likely to experience interference than devicesthan devices
that operate in the 2.4 GHz band because there arethat operate in the 2.4 GHz band because there are
fewer consumer devices that use the 5 GHz band.fewer consumer devices that use the 5 GHz band.
Wireless LAN StandardsWireless LAN Standards
18. CCNA3-18 Chapter 7-1
• 802.11a Standard:802.11a Standard:
• Disadvantages/kerugianDisadvantages/kerugian menggunakan frekuensi 5GHz.menggunakan frekuensi 5GHz.
• More easily absorbed by walls (obstructions).More easily absorbed by walls (obstructions).
• Jangkauannya lebih pendek dibanding 802.11g.Jangkauannya lebih pendek dibanding 802.11g.
• Dibeberapa negara dilarang digunakanDibeberapa negara dilarang digunakan
Wireless LAN StandardsWireless LAN Standards
19. CCNA3-19 Chapter 7-1
• 802.11b and 802.11g Standard:802.11b and 802.11g Standard:
• Both use the 2.4 GHz band.Both use the 2.4 GHz band.
• 802.11b:802.11b:
• Up toUp to 1111 Mb/s usingMb/s using DSSSDSSS..
• 802.11g:802.11g:
• Up toUp to 5454 Mb/s usingMb/s using OFDMOFDM..
Wireless LAN StandardsWireless LAN Standards
20. CCNA3-20 Chapter 7-1
• 2.4 GHz band:2.4 GHz band:
• Advantage:Advantage:
• Jangkauan yang lebih baik dibanding band 5GHz karenaJangkauan yang lebih baik dibanding band 5GHz karena
sinyalnya tidak mudah terhalang.sinyalnya tidak mudah terhalang.
• Disadvantage:Disadvantage:
• Banyak perangkat lain menggunakan band ini sehinggaBanyak perangkat lain menggunakan band ini sehingga
sangat rentan terhadap gangguan (microwave oven,sangat rentan terhadap gangguan (microwave oven,
monitor bayi, Bluetooth, telepon cordless).monitor bayi, Bluetooth, telepon cordless).
Wireless LAN StandardsWireless LAN Standards
21. CCNA3-21 Chapter 7-1
• 802.11n: (November 2009)802.11n: (November 2009)
• Didesign untuk meningkatkan kecepatan data WLAN dan jangkauanDidesign untuk meningkatkan kecepatan data WLAN dan jangkauan
tanpa memerlukan daya tambahan atau alokasi RF band.tanpa memerlukan daya tambahan atau alokasi RF band.
• MenggunakanMenggunakan multiple radios and antenna at endpointsmultiple radios and antenna at endpoints, dan, dan
masing-masing melakukan broadcasting dengan frequency yangmasing-masing melakukan broadcasting dengan frequency yang
sama untuk membentuk multiple streams.sama untuk membentuk multiple streams.
• Multiple Input / Multiple OutputMultiple Input / Multiple Output (MIMO) and OFDM(MIMO) and OFDM..
• Theoretical maximum of 248 Mb/s.Theoretical maximum of 248 Mb/s.
Wireless LAN StandardsWireless LAN Standards
22. CCNA3-22 Chapter 7-1
• Wireless NICs:Wireless NICs:
• The device that makes a client station capable of sendingThe device that makes a client station capable of sending
and receiving RF signals is the wireless NIC.and receiving RF signals is the wireless NIC.
• Like an Ethernet NIC, the wireless NIC, using theLike an Ethernet NIC, the wireless NIC, using the
modulation technique it is configured to use,modulation technique it is configured to use, encodes aencodes a
data stream onto an RF signaldata stream onto an RF signal..
• Wireless NICs are most often associated with mobileWireless NICs are most often associated with mobile
devices, such as laptop computers.devices, such as laptop computers.
Wireless Infrastructure ComponentsWireless Infrastructure Components
23. CCNA3-23 Chapter 7-1
Wireless Infrastructure ComponentsWireless Infrastructure Components
• Wireless Access Points:Wireless Access Points:
• An access point is a Layer 2 device that functions like anAn access point is a Layer 2 device that functions like an
802.3 Ethernet hub.802.3 Ethernet hub.
• Connects wireless clients (or stations) to the wired LAN.Connects wireless clients (or stations) to the wired LAN.
• Client devices communicate with the AP – not each other.Client devices communicate with the AP – not each other.
• Converts the TCP/IP data packets from their 802.11Converts the TCP/IP data packets from their 802.11
frame encapsulation to the 802.3 Ethernet frame format.frame encapsulation to the 802.3 Ethernet frame format.
• Clients mustClients must associateassociate with an access point to obtainwith an access point to obtain
network services.network services.
• Association:Association:
• Process wireless client join ke 802.11(AP) network,Process wireless client join ke 802.11(AP) network,
ini sama dengan seperti mengkoneksikan host/pcini sama dengan seperti mengkoneksikan host/pc
menggunakan kabel ke switch LAN.menggunakan kabel ke switch LAN.
24. CCNA3-24 Chapter 7-1
Wireless Infrastructure ComponentsWireless Infrastructure Components
• Wireless Routers:Wireless Routers:
• Wireless routers merupakan penggabungan fungsi dariWireless routers merupakan penggabungan fungsi dari
access point, Ethernet switch, dan router.access point, Ethernet switch, dan router.
• The Linksys WRT54GL is most commonly used as aThe Linksys WRT54GL is most commonly used as a
small business or residential wireless access device.small business or residential wireless access device.
• Beban pada perangkat diusahakan cukup rendahBeban pada perangkat diusahakan cukup rendah
sehingga akan dapat mengelola penyediaan WLAN,sehingga akan dapat mengelola penyediaan WLAN,
802,3 Ethernet, dan terhubung ke ISP dengan baik .802,3 Ethernet, dan terhubung ke ISP dengan baik .
26. CCNA3-26 Chapter 7-1
Wireless OperationWireless Operation
• Configurable Wireless Parameters:Configurable Wireless Parameters:
AA shared service set identifier (SSID)shared service set identifier (SSID) is a uniqueis a unique
identifier that client devices use to distinguish betweenidentifier that client devices use to distinguish between
multiple wireless networks in the same vicinity.multiple wireless networks in the same vicinity.
AA shared service set identifier (SSID)shared service set identifier (SSID) is a uniqueis a unique
identifier that client devices use to distinguish betweenidentifier that client devices use to distinguish between
multiple wireless networks in the same vicinity.multiple wireless networks in the same vicinity.
Several access pointsSeveral access points
can share an SSID.can share an SSID.
Several access pointsSeveral access points
can share an SSID.can share an SSID.
Alphanumeric, case-sensitive,Alphanumeric, case-sensitive,
from 2 to 32 characters.from 2 to 32 characters.
Alphanumeric, case-sensitive,Alphanumeric, case-sensitive,
from 2 to 32 characters.from 2 to 32 characters.
27. CCNA3-27 Chapter 7-1
Wireless OperationWireless Operation
• Configurable Wireless Parameters:Configurable Wireless Parameters:
The IEEE 802.11 standard establishes theThe IEEE 802.11 standard establishes the
channelization schemechannelization scheme for the usefor the use
of the unlicensedof the unlicensed ISM RF bandsISM RF bands in WLANs.in WLANs.
TheThe 2.4 GHz2.4 GHz band is broken down intoband is broken down into
11 channels11 channels for North Americafor North America
andand 13 channels13 channels for Europe.for Europe.
The IEEE 802.11 standard establishes theThe IEEE 802.11 standard establishes the
channelization schemechannelization scheme for the usefor the use
of the unlicensedof the unlicensed ISM RF bandsISM RF bands in WLANs.in WLANs.
TheThe 2.4 GHz2.4 GHz band is broken down intoband is broken down into
11 channels11 channels for North Americafor North America
andand 13 channels13 channels for Europe.for Europe.
Each arc represents 1 channel.Each arc represents 1 channel.Each arc represents 1 channel.Each arc represents 1 channel.
5 MHz overlap5 MHz overlap5 MHz overlap5 MHz overlap
Best practices for WLANs that requireBest practices for WLANs that require
multiple access points are set to usemultiple access points are set to use
non-overlapping channelsnon-overlapping channels..
Best practices for WLANs that requireBest practices for WLANs that require
multiple access points are set to usemultiple access points are set to use
non-overlapping channelsnon-overlapping channels..
3 Access Points3 Access Points3 Access Points3 Access Points
Many access points can automatically select aMany access points can automatically select a
channel based on adjacent channel use.channel based on adjacent channel use.
Some products continuously monitor the radio spaceSome products continuously monitor the radio space
to adjust the channel settings dynamically in responseto adjust the channel settings dynamically in response
to environmental changes.to environmental changes.
Many access points can automatically select aMany access points can automatically select a
channel based on adjacent channel use.channel based on adjacent channel use.
Some products continuously monitor the radio spaceSome products continuously monitor the radio space
to adjust the channel settings dynamically in responseto adjust the channel settings dynamically in response
to environmental changes.to environmental changes.
28. CCNA3-28 Chapter 7-1
Wireless TopologiesWireless Topologies
• WLANsWLANs dapat mengakomodasi berbagai jaringan topologi.dapat mengakomodasi berbagai jaringan topologi. ..
• When describing these topologies, theWhen describing these topologies, the fundamentalfundamental
building blockbuilding block of the IEEE 802.11 WLAN architecture isof the IEEE 802.11 WLAN architecture is
thethe basic service setbasic service set (BSS).(BSS).
• BSS:BSS:
• Sekelompok stations yang dapat salingSekelompok stations yang dapat saling
berkomunikasi satu sama lainnya.berkomunikasi satu sama lainnya.
• Three Types:Three Types:
• Ad Hoc (Independent Basic Service Set –Ad Hoc (Independent Basic Service Set – IBSSIBSS))
• Basic Service Set (Basic Service Set (BSSBSS))
• Extended Service Set (Extended Service Set (ESSESS))
29. CCNA3-29 Chapter 7-1
Wireless TopologiesWireless Topologies
• Ad Hoc:Ad Hoc:
• Wireless networks can operate without access points.Wireless networks can operate without access points.
• Client stations which are configured to operate in ad hocClient stations which are configured to operate in ad hoc
modemode configure the wireless parameters betweenconfigure the wireless parameters between
themselvesthemselves..
30. CCNA3-30 Chapter 7-1
Wireless TopologiesWireless Topologies
• Basic Service Sets (BSS):Basic Service Sets (BSS):
• Access points provide an infrastructure that adds servicesAccess points provide an infrastructure that adds services
and improves the range for clients.and improves the range for clients.
• A single access point in infrastructure mode manages theA single access point in infrastructure mode manages the
wireless parameters and the topology is simply a BSS.wireless parameters and the topology is simply a BSS.
• The coverage area forThe coverage area for both an IBSS or a BSSboth an IBSS or a BSS is theis the
basic service area (BSA)basic service area (BSA)..
Basic Service AreaBasic Service AreaBasic Service AreaBasic Service Area
31. CCNA3-31 Chapter 7-1
Wireless TopologiesWireless Topologies
• Extended Service Sets (ESS):Extended Service Sets (ESS):
• When a single BSS provides insufficient RF coverage,When a single BSS provides insufficient RF coverage,
one or more can be joined through a common distributionone or more can be joined through a common distribution
system into an extended service set (ESS).system into an extended service set (ESS).
• One BSS is differentiated from another by theOne BSS is differentiated from another by the BSSBSS
identifier (BSSID)identifier (BSSID)..
• The MAC address of the access point.The MAC address of the access point.
• The coverage area is theThe coverage area is the extended service area (ESA)extended service area (ESA)..
Different MAC AddressesDifferent MAC Addresses
= different BSSIDs.= different BSSIDs.
Different MAC AddressesDifferent MAC Addresses
= different BSSIDs.= different BSSIDs.
32. CCNA3-32 Chapter 7-1
Wireless TopologiesWireless Topologies
• Common Distribution System:Common Distribution System:
• AllowsAllows multiple access pointsmultiple access points dalam ESS untuk menjadidalam ESS untuk menjadi
single BSSsingle BSS..
• An ESS generally includes aAn ESS generally includes a common SSIDcommon SSID to allow ato allow a
user touser to roamroam from access point to access point.from access point to access point.
• CellsCells represent the coverage area provided by a singlerepresent the coverage area provided by a single
channel.channel.
• An ESS should have 10 to 15 percent overlapAn ESS should have 10 to 15 percent overlap
between cells.between cells.
• Roaming capability created by using non-overlappingRoaming capability created by using non-overlapping
channels (e.g. one cell on channel 1 and the other onchannels (e.g. one cell on channel 1 and the other on
channel 6).channel 6).
33. CCNA3-33 Chapter 7-1
Wireless AssociationWireless Association
• Bagian terpenting dari proses 802.11 adalah process
discovering WLAN & melakukan koneksi ke WLAN tersebut.
• Primary componentsnya adalah:
• Beacons: Frame yang digunakan oleh jaringan WLAN
untuk mengiklankan keberadaannya.
• Probes: Frame yang digunakan oleh klien WLAN untuk
menemukan jaringan mereka.
• Authentication: Left over from the original 802.11
standard, but still required.
• Association: Membangun data link antara jalur akses
WLAN dan klien/user.
34. CCNA3-34 Chapter 7-1
Wireless AssociationWireless Association
• Beacons:Beacons:
• Frames used by the WLAN network to advertise itsFrames used by the WLAN network to advertise its
presence.presence.
Satu-satunya bagian dari prosesSatu-satunya bagian dari proses
yang dapat disiarkan secarayang dapat disiarkan secara
teratur.teratur. Not necessarily enabled.Not necessarily enabled.
Satu-satunya bagian dari prosesSatu-satunya bagian dari proses
yang dapat disiarkan secarayang dapat disiarkan secara
teratur.teratur. Not necessarily enabled.Not necessarily enabled.
35. CCNA3-35 Chapter 7-1
Wireless AssociationWireless Association
• Before an 802.11 client can send data over a WLAN network,Before an 802.11 client can send data over a WLAN network,
it goes through the followingit goes through the following three-stagethree-stage process:process:
• Step 1:Step 1: 802.11 Probing.802.11 Probing.
• Step 2:Step 2: Authentication.Authentication.
• Step 3:Step 3: Association.Association.
36. CCNA3-36 Chapter 7-1
Wireless AssociationWireless Association
• Step 1:Step 1: 802.11 Probing802.11 Probing
• Clients search for aClients search for a specificspecific network by:network by:
• Sending aSending a probe request out on multiple channelsprobe request out on multiple channels..
• Specifies the network nameSpecifies the network name (SSID)(SSID) and bit rates.and bit rates.
• A typical WLAN client is configured with a desiredA typical WLAN client is configured with a desired
SSID.SSID.
• Client is simply trying toClient is simply trying to discoverdiscover available WLANs:available WLANs:
• Sends out a probe request withSends out a probe request with no SSIDno SSID..
• All access points that areAll access points that are configured to respondconfigured to respond to thisto this
type of query respond.type of query respond.
• WLANs denganWLANs dengan broadcast SSID feature disabledbroadcast SSID feature disabled tidaktidak
akan meresponakan merespon
37. CCNA3-37 Chapter 7-1
Wireless AssociationWireless Association
• Step 2:Step 2: AuthenticationAuthentication
• 802.11 was originally developed with 2 authentication802.11 was originally developed with 2 authentication
mechanisms.mechanisms.
1.1. Open Authentication:Open Authentication:
• A NULL authenticationA NULL authentication
• The client says "authenticate me“.The client says "authenticate me“.
• The access point responds with "yes“.The access point responds with "yes“.
• Ini merupakan mechanism yang digunakanIni merupakan mechanism yang digunakan
secara umum oleh 802.11 deployments.secara umum oleh 802.11 deployments.
38. CCNA3-38 Chapter 7-1
Wireless AssociationWireless Association
2.2. Shared Key Authentication:Shared Key Authentication:
• Based on a key that is shared between the clientBased on a key that is shared between the client
station and the access point called the Wiredstation and the access point called the Wired
Equivalency ProtectionEquivalency Protection (WEP)(WEP) key.key.
• Bentuk perlindungan ini pada dasarnya menggunakanBentuk perlindungan ini pada dasarnya menggunakan
kunci enkripsi untuk melindungi data yang dikirim darikunci enkripsi untuk melindungi data yang dikirim dari
dan ke jaringan WLAN untuk mencegah penggunadan ke jaringan WLAN untuk mencegah pengguna
tanpa izin dapat mengakses jaringan.tanpa izin dapat mengakses jaringan.
• WEP needs to be included in client and access pointWEP needs to be included in client and access point
implementations for standards compliance but it isimplementations for standards compliance but it is notnot
used or recommendedused or recommended..
39. CCNA3-39 Chapter 7-1
Wireless AssociationWireless Association
• Step 3:Step 3: 802.11 Association802.11 Association
• Finalizes theFinalizes the security and bit rate optionssecurity and bit rate options..
• Establishes the data linkEstablishes the data link between the WLAN client andbetween the WLAN client and
the access point.the access point.
• The client learns theThe client learns the BSSID (MAC Address)BSSID (MAC Address) of the accessof the access
point.point.
• Access point maps a logical port known as theAccess point maps a logical port known as the
association identifier (AID)association identifier (AID) to the WLAN client.to the WLAN client.
• AID is equivalent to a port on a switch.AID is equivalent to a port on a switch.
• Association identifier (AID)Association identifier (AID) allows the infrastructureallows the infrastructure
switch to keep track of frames destined for the WLANswitch to keep track of frames destined for the WLAN
client so that they can be forwarded.client so that they can be forwarded.
41. CCNA3-41 Chapter 7-1
Planning the Wireless LANPlanning the Wireless LAN
Perlu ada rencana yang terdokumentasi dengan baikPerlu ada rencana yang terdokumentasi dengan baik
sebelum jaringan nirkabel dapat diimplementasikan. .sebelum jaringan nirkabel dapat diimplementasikan. .
1.1. Number of Users:Number of Users:
• Ini bukanlah perhitungan jumlah user secara sederhana.Ini bukanlah perhitungan jumlah user secara sederhana.
• Karena akan dipengaruhi lokasi geographical layoutKarena akan dipengaruhi lokasi geographical layout
dimana user berada.dimana user berada.
1.1. Data Rates:Data Rates:
• RF merupakan shared medium dan jika semakinRF merupakan shared medium dan jika semakin
banyak pengguna maka akan mempengaruhi RFbanyak pengguna maka akan mempengaruhi RF
tersebut.tersebut.
• Untuk itu “Untuk itu “Use non-overlapping channelsUse non-overlapping channels” in an ESS.” in an ESS.
1.1. Rencanakan jaringan Anda untuk cakupan RF yang tepatRencanakan jaringan Anda untuk cakupan RF yang tepat
dalam sebuah network ESS .dalam sebuah network ESS .
42. CCNA3-42 Chapter 7-1
Planning the Wireless LANPlanning the Wireless LAN
4.4. Location of Access Points:Location of Access Points:
• You may not be able to simply draw coverage areaYou may not be able to simply draw coverage area
circles and drop them over a plan.circles and drop them over a plan.
• Do access points use existing wiring?Do access points use existing wiring?
• Position access points:Position access points:
• Above obstructions.Above obstructions.
• Vertically near the ceiling in the center of eachVertically near the ceiling in the center of each
coverage area, if possible.coverage area, if possible.
• Lokasi dimana user akan bekerja. For example,Lokasi dimana user akan bekerja. For example,
conference rooms are typically a better location forconference rooms are typically a better location for
access points than a hallway.access points than a hallway.
43. CCNA3-43 Chapter 7-1
Planning the Wireless LANPlanning the Wireless LAN
5.5. Coverage Area of Access Points:Coverage Area of Access Points:
• Memperkirakan cakupan area access point yangMemperkirakan cakupan area access point yang
diharapkan.diharapkan.
• This value varies depending on:This value varies depending on:
• The WLAN standard or mix of standards that you areThe WLAN standard or mix of standards that you are
deploying.deploying.
• The nature of the facility.The nature of the facility.
• The transmit power that the access point.The transmit power that the access point.
6.6. Based on your plan, tempatkan access points agar coverageBased on your plan, tempatkan access points agar coverage
circles tidak terdapat banyak overlapping.circles tidak terdapat banyak overlapping.
45. CCNA3-45 Chapter 7-1
Number of Access PointsNumber of Access PointsNumber of Access PointsNumber of Access Points
Planning the Wireless LANPlanning the Wireless LAN
20,000 Sq. Ft.20,000 Sq. Ft.
(1860 Sq. Meters)(1860 Sq. Meters)
20,000 Sq. Ft.20,000 Sq. Ft.
(1860 Sq. Meters)(1860 Sq. Meters)
Minimum ofMinimum of 6 Mbps6 Mbps
802.11b throughput802.11b throughput forfor
each Basic Serviceeach Basic Service
Area (BSA)Area (BSA)
Minimum ofMinimum of 6 Mbps6 Mbps
802.11b throughput802.11b throughput forfor
each Basic Serviceeach Basic Service
Area (BSA)Area (BSA)
Can be achieved with aCan be achieved with a
coverage area ofcoverage area of 5,000 Sq. Ft.5,000 Sq. Ft.
(465 Sq. Meters)(465 Sq. Meters)
Can be achieved with aCan be achieved with a
coverage area ofcoverage area of 5,000 Sq. Ft.5,000 Sq. Ft.
(465 Sq. Meters)(465 Sq. Meters)
20,000 Sq. Ft. with a20,000 Sq. Ft. with a
coverage of 5,000 Sq. Ft.coverage of 5,000 Sq. Ft.
results inresults in 4 Access4 Access
PointsPoints..
20,000 Sq. Ft. with a20,000 Sq. Ft. with a
coverage of 5,000 Sq. Ft.coverage of 5,000 Sq. Ft.
results inresults in 4 Access4 Access
PointsPoints..
46. CCNA3-46 Chapter 7-1
Planning the Wireless LANPlanning the Wireless LAN
50 foot (15 Meter) Radius50 foot (15 Meter) Radius50 foot (15 Meter) Radius50 foot (15 Meter) Radius
71 foot (22 Meter) Square71 foot (22 Meter) Square71 foot (22 Meter) Square71 foot (22 Meter) Square
Dimension of Coverage AreaDimension of Coverage AreaDimension of Coverage AreaDimension of Coverage Area
47. CCNA3-47 Chapter 7-1
Planning the Wireless LANPlanning the Wireless LAN
Location of Access PointsLocation of Access PointsLocation of Access PointsLocation of Access Points