SlideShare a Scribd company logo
1 of 16
Wireless LAN
infrastructure I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Introduction to wireless network standards.
– Antenna technology.
– Wireless access points.
PACE-IT.
Page 4
Wireless LAN infrastructure I.
Page 5
– Introduction to IEEE 802.11.
» A set of specifications at the data link (Layer 2) layer and the
physical layer (Layer 1) of the Open System Interconnection
(OSI) model that establishes how wireless network
communication can occur.
• Specifies the use of unlicensed radio frequency (RF) bands
as the carrier for network traffic.
» Specifies half-duplex network communication through the use
of carrier sense multiple access with collision avoidance
(CSMA/CA) as the method of access.
• CSMA/CA technology requires that devices only transmit data
when no other data transmission signal is present on the
carrier wave.
» The specifications have been amended over time to become
common standards.
Wireless LAN infrastructure I.
Page 6
– IEEE 802.11 standards.
» 802.11b: commercially released in 1997 and operates within
the 2.4 GHz industrial, scientific, and medical (ISM) RF band.
• With a bandwidth of 22 MHz, it offers up to 11 separate
channels, of which three do not overlap.
• Has a theoretical throughput of 11 Mbps.
• It is compatible with 802.11g/n.
» 802.11a: commercially released in 1997 and operates within
the 5 GHz Unlicensed National Information Infrastructure (U-
NII) band.
• With a bandwidth of 20 MHz, it offers up to 23 separate
channels, none of which overlap.
• Has a theoretical throughput of 54 Mbps.
• It is not compatible with any other standard.
» 802.11g: commercially released in 2003 and operates within
the 2.4 GHz RF band.
• With a bandwidth of 20 MHz it offers up to 11 separate
channels, of which three do not overlap.
• Has a theoretical throughput of 54 Mbps.
• It is compatible with 802.11b/n/ac.
Wireless LAN infrastructure I.
Page 7
– IEEE 802.11 standards continued.
» 802.11n: commercially released in 2009 and can operate on
both the 2.4 GHz or 5 GHz RF bands at the same time.
• Uses a 20 MHz wide channel within the 2.4 GHz band and a
40 MHz wide channel within the 5 GHz band.
• Has a theoretical throughput of 600 Mbps through the
introduction of multiple-input and multiple-output (MIMO)
technology and beamforming.
• It is compatible with 802.11b/g/ac.
» 802.11ac: commercially released in 2013 and operates on the
5 GHz RF band.
• Available bandwidth varies by administrative setting and can
be dynamically changed by the wireless access point (WAP),
based on how much radio frequency interference (RFI) is
present and how many users are on the wireless network.
• Has a theoretical throughput of over 1 Gbps through the
introduction of multi-user multiple-input and multiple-output
(MU-MIMO) technology and beamforming.
• It is compatible with 802.11g/n.
Wireless LAN infrastructure I.
Page 8
Why broadcast a wide
signal to a specific device
when it is possible to target
that device specifically?
That is the question that beamforming answered. Once a device
makes a connection to an access point (AP) that is capable of
beamforming, the AP will auto-tune its antenna and transmitter to
more specifically target the device when communication occurs.
This can reduce RFI and increase throughput on the WLAN.
While 802.11n allowed for beamforming, it was not a
standardized option until the implementation of 802.11ac.
Wireless LAN infrastructure I.
Page 9
Wireless LAN infrastructure I.
Page 10
– The basics.
» Antennas are used to broadcast and receive RF signals and
they fall into two basic categories.
• Omnidirectional antennas are designed to broadcast and
receive signals in all directions.
• Unidirectional antennas are designed to broadcast and
receive signals in a specific direction.
» Antenna placement and type will have an impact on
performance.
– MIMO/MU-MIMO.
» A technology that allows for more than one spatial stream to be
transmitted and received by a single device through the use of
multiple antennas.
• MIMO allows for up to four spatial channels, while MU-MIMO
allows for up to eight spatial channels.
• MU-MIMO also allows for a single signal to be spread across
multiple transmitters—this accounts for the multiple user part
of the name.
Wireless LAN infrastructure I.
Page 11
Wireless LAN infrastructure I.
Page 12
– A foundation of the wireless LAN (WLAN).
» The wireless access point (WAP), also known as just an
access point (AP) can create a point of entry for wireless to
enter the more traditional wired networking environment.
• It can also be used to join other types of networks.
» WAPs, in most cases, use unlicensed radio frequency (RF)
bands in order to communicate with devices.
» One or more antenna is used in order to radiate and receive RF
signals in a half-duplex manner.
» Wireless routers are common in the small office/home office
(SOHO) environment. They are WAPs that have a router built
into them, reducing the need for networking components.
» Wireless bridges are APs that can bridge wired network
segments together in certain situations.
» WAP performance is impacted by the number of wireless
devices that are attempting to access the network.
• This can be mitigated by adding additional APs to the
network.
» Strategically adding WAPs to the WLAN can allow users to
migrate from one wireless signal to the next—this is called
roaming.
Wireless LAN infrastructure I.
Page 13
– Wireless controllers.
» Are commonly found in wireless networks of medium sized and
larger businesses.
» They are used to control WLANs that have multiple WAPs that
all function as part of a larger WLAN through the use of special
protocols and can increase the usability of the WLAN.
• LWAPP (Lightweight Access Point Protocol) is a Cisco
proprietary protocol that is used by Cisco wireless controllers.
» Dynamic or static VLAN pooling can be established with a
wireless controller.
• Taking the WLAN signals and creating (and controlling)
VLANs to allow more devices to connect to a single AP.
» Wireless controllers are often used to create a wireless network
mesh that seamlessly spans more area than is normally
possible.
• Mobile wireless devices are seamlessly handed off from one
access point to another when they reach the edges of the
signal.
Wireless LAN infrastructure I.
Page 14
Wireless LAN infrastructure I.
The IEEE 802.11 standards are the specifications that establish how
wireless communications can occur on a network. The 802.11 standards
require that specific RF bands and CSMA/CA technology be used. The
standards have evolved over time and include: 802.11b, 802.11a, 802.11g,
802.11n and 802.11ac. Beamforming was introduced with 802.11n.
Topic
Introduction to wireless
network standards.
Summary
Antennas are used to send and receive RF signals. They may be
omnidirectional or unidirectional in design. Antenna type and placement will
have an impact on WLAN performance. MIMO uses up to four antennas to
provide up to four spatial streams. MU-MIMO can use multiple antennas
and transmitters to spread a signal over up to eight spatial streams.
Antenna technology.
The WAP is a foundational component of the WLAN. It can create an entry
point to the more traditional wired network, or it can be used on its own. It
commonly uses the unlicensed RF to send and receive network traffic.
SOHO APs may have a router built into them. WAPs may be used to bridge
wired networks together. In larger wireless environments, wireless
controllers are used to seamlessly transfer devices from AP to AP.
Wireless access points.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 Pace IT at Edmonds Community College
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006Pace IT at Edmonds Community College
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 

What's hot (20)

PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and UpgradesPACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and Upgrades
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Firewall Basics
PACE-IT: Firewall BasicsPACE-IT: Firewall Basics
PACE-IT: Firewall Basics
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 

Viewers also liked

Wireless survey
Wireless surveyWireless survey
Wireless surveyashrawi92
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrumSushant Burde
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIAKak Yong
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless TransmissionJoe Christensen
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lanParthipan Parthi
 

Viewers also liked (12)

Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless survey
Wireless surveyWireless survey
Wireless survey
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 1)

Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptabenimelos
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...IJCSIS Research Publications
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi TechnologyHasanMaster
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyAjay Chawda
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR ProtocolRajesh Karumanchi
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technologySALMAN SHAIKH
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technologySALMAN SHAIKH
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranetNasrunnissa Aziz
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary ApplicationsControlEng
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyRAVIKIRAN ANANDE
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 

Similar to PACE-IT: Wireless LAN Infrastructure (part 1) (20)

What is wlan?
What is wlan?What is wlan?
What is wlan?
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
 
Lect3
Lect3Lect3
Lect3
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
Wireless
WirelessWireless
Wireless
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
WLAN considerations v2.2
WLAN considerations v2.2WLAN considerations v2.2
WLAN considerations v2.2
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary Applications
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...Pooja Nehwal
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

PACE-IT: Wireless LAN Infrastructure (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Introduction to wireless network standards. – Antenna technology. – Wireless access points. PACE-IT.
  • 4. Page 4 Wireless LAN infrastructure I.
  • 5. Page 5 – Introduction to IEEE 802.11. » A set of specifications at the data link (Layer 2) layer and the physical layer (Layer 1) of the Open System Interconnection (OSI) model that establishes how wireless network communication can occur. • Specifies the use of unlicensed radio frequency (RF) bands as the carrier for network traffic. » Specifies half-duplex network communication through the use of carrier sense multiple access with collision avoidance (CSMA/CA) as the method of access. • CSMA/CA technology requires that devices only transmit data when no other data transmission signal is present on the carrier wave. » The specifications have been amended over time to become common standards. Wireless LAN infrastructure I.
  • 6. Page 6 – IEEE 802.11 standards. » 802.11b: commercially released in 1997 and operates within the 2.4 GHz industrial, scientific, and medical (ISM) RF band. • With a bandwidth of 22 MHz, it offers up to 11 separate channels, of which three do not overlap. • Has a theoretical throughput of 11 Mbps. • It is compatible with 802.11g/n. » 802.11a: commercially released in 1997 and operates within the 5 GHz Unlicensed National Information Infrastructure (U- NII) band. • With a bandwidth of 20 MHz, it offers up to 23 separate channels, none of which overlap. • Has a theoretical throughput of 54 Mbps. • It is not compatible with any other standard. » 802.11g: commercially released in 2003 and operates within the 2.4 GHz RF band. • With a bandwidth of 20 MHz it offers up to 11 separate channels, of which three do not overlap. • Has a theoretical throughput of 54 Mbps. • It is compatible with 802.11b/n/ac. Wireless LAN infrastructure I.
  • 7. Page 7 – IEEE 802.11 standards continued. » 802.11n: commercially released in 2009 and can operate on both the 2.4 GHz or 5 GHz RF bands at the same time. • Uses a 20 MHz wide channel within the 2.4 GHz band and a 40 MHz wide channel within the 5 GHz band. • Has a theoretical throughput of 600 Mbps through the introduction of multiple-input and multiple-output (MIMO) technology and beamforming. • It is compatible with 802.11b/g/ac. » 802.11ac: commercially released in 2013 and operates on the 5 GHz RF band. • Available bandwidth varies by administrative setting and can be dynamically changed by the wireless access point (WAP), based on how much radio frequency interference (RFI) is present and how many users are on the wireless network. • Has a theoretical throughput of over 1 Gbps through the introduction of multi-user multiple-input and multiple-output (MU-MIMO) technology and beamforming. • It is compatible with 802.11g/n. Wireless LAN infrastructure I.
  • 8. Page 8 Why broadcast a wide signal to a specific device when it is possible to target that device specifically? That is the question that beamforming answered. Once a device makes a connection to an access point (AP) that is capable of beamforming, the AP will auto-tune its antenna and transmitter to more specifically target the device when communication occurs. This can reduce RFI and increase throughput on the WLAN. While 802.11n allowed for beamforming, it was not a standardized option until the implementation of 802.11ac. Wireless LAN infrastructure I.
  • 9. Page 9 Wireless LAN infrastructure I.
  • 10. Page 10 – The basics. » Antennas are used to broadcast and receive RF signals and they fall into two basic categories. • Omnidirectional antennas are designed to broadcast and receive signals in all directions. • Unidirectional antennas are designed to broadcast and receive signals in a specific direction. » Antenna placement and type will have an impact on performance. – MIMO/MU-MIMO. » A technology that allows for more than one spatial stream to be transmitted and received by a single device through the use of multiple antennas. • MIMO allows for up to four spatial channels, while MU-MIMO allows for up to eight spatial channels. • MU-MIMO also allows for a single signal to be spread across multiple transmitters—this accounts for the multiple user part of the name. Wireless LAN infrastructure I.
  • 11. Page 11 Wireless LAN infrastructure I.
  • 12. Page 12 – A foundation of the wireless LAN (WLAN). » The wireless access point (WAP), also known as just an access point (AP) can create a point of entry for wireless to enter the more traditional wired networking environment. • It can also be used to join other types of networks. » WAPs, in most cases, use unlicensed radio frequency (RF) bands in order to communicate with devices. » One or more antenna is used in order to radiate and receive RF signals in a half-duplex manner. » Wireless routers are common in the small office/home office (SOHO) environment. They are WAPs that have a router built into them, reducing the need for networking components. » Wireless bridges are APs that can bridge wired network segments together in certain situations. » WAP performance is impacted by the number of wireless devices that are attempting to access the network. • This can be mitigated by adding additional APs to the network. » Strategically adding WAPs to the WLAN can allow users to migrate from one wireless signal to the next—this is called roaming. Wireless LAN infrastructure I.
  • 13. Page 13 – Wireless controllers. » Are commonly found in wireless networks of medium sized and larger businesses. » They are used to control WLANs that have multiple WAPs that all function as part of a larger WLAN through the use of special protocols and can increase the usability of the WLAN. • LWAPP (Lightweight Access Point Protocol) is a Cisco proprietary protocol that is used by Cisco wireless controllers. » Dynamic or static VLAN pooling can be established with a wireless controller. • Taking the WLAN signals and creating (and controlling) VLANs to allow more devices to connect to a single AP. » Wireless controllers are often used to create a wireless network mesh that seamlessly spans more area than is normally possible. • Mobile wireless devices are seamlessly handed off from one access point to another when they reach the edges of the signal. Wireless LAN infrastructure I.
  • 14. Page 14 Wireless LAN infrastructure I. The IEEE 802.11 standards are the specifications that establish how wireless communications can occur on a network. The 802.11 standards require that specific RF bands and CSMA/CA technology be used. The standards have evolved over time and include: 802.11b, 802.11a, 802.11g, 802.11n and 802.11ac. Beamforming was introduced with 802.11n. Topic Introduction to wireless network standards. Summary Antennas are used to send and receive RF signals. They may be omnidirectional or unidirectional in design. Antenna type and placement will have an impact on WLAN performance. MIMO uses up to four antennas to provide up to four spatial streams. MU-MIMO can use multiple antennas and transmitters to spread a signal over up to eight spatial streams. Antenna technology. The WAP is a foundational component of the WLAN. It can create an entry point to the more traditional wired network, or it can be used on its own. It commonly uses the unlicensed RF to send and receive network traffic. SOHO APs may have a router built into them. WAPs may be used to bridge wired networks together. In larger wireless environments, wireless controllers are used to seamlessly transfer devices from AP to AP. Wireless access points.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.