WiFi from A-Z
[2-day training course, Euro 2,350.- per participant or optional 2-day training course + 1 optional day trace analysis, Euro 3,450.- per participant]
Introduction and Fundamentals
- IEEE 802.11 Architecture Overview
- IEEE 802.11 Specification ABC
- IEEE 802.11 Protocol Stack Architecture
- Physical Layer Overview
- TDD operation in an IEEE 802.11 Network
- Current IEEE 802.11 Physical Layer Access Technologies
- Frequency Bands being used for IEEE 802.11 Standards
- Lessons Learned / Conclusions
Physical Layer procedures
- General PLCP Burst
- FHSS Physical Layer
- FHSS PLCP Burst
- GFSK Modulatio
- FHSS Signal Processing Chain
- IR Physical Layer
- IR PLCP Burst
- DSSS Physical Layer
- DSSS PLCP Burst
- DBPSK and DQPSK Modulation
- DSSS Signal Processing Chain
- OFDM Physical Layer
- Introduction OFDM Technology
- Impact of Orthogonality in the Frequency Domain – 3 Steps
- Practical Exercise: Physical Basics of OFDM
- OFDM and IFFT
- Using different Modulation Schemes on Different Subcarriers
- Tackling Inter-Symbol Interference (ISI)
- Introduction
- Cyclic Prefix or Guard Interval - OFDM PLCP Burst
- Normal OFDM Symbol
- Long OFDM Sync Symbol
- Short OFDM Sync Symbol - Modulation and Data Rates of the OFDM Physical Layer
- OFDM Signal Processing Chain
- Modulation Schemes for OFDM
- OFDM Convolutional Encoder
- OFDM Physical Layer Puncturin
- Introduction OFDM Technology
- HS-DSSS Physical Layer
- HS-DSSS PLCP Burst
- CCK Modulation
- Details of CCK
- PBCC Signal Processing Chain
- DSSS-OFDM Hybrid Physical Layer
- DSSS-OFDM PLCP Burst
- ERP-PBCC Processing Enhancements
- Agility
- Lessons Learned / Conclusions
Medium Access Control
- Basic MAC Functions
- Overview
- MAC Frames
- Generic MAC Frame (Data Frame)
- Details of the Frame Control Field
- Control Frame Subtypes
- Management Frame Subtypes
- Data Frame Subtypes
- Usage of the Address Fields in Data Frames
- Data Frame Body - Fragmentation of MSDU's
- MAC Access Coordination Functions
- MAC Procedures
- Timing governing the Access: SIFS, PIFS, and DIFS
- EIFS and AIFS
- Scanning and Attachment Procedure
- Coexistence of PCF and DCF
- DCF- Sensing Procedures
- DCA & Random Back off Procedure
- DCF & Transmission of Fragments
- Contention Free Period Procedures – Example 1
- Contention Free Period Procedures – Example 2
- Power Saving Procedure in the CP
- Power Saving Procedure in CFP - Control Frames
- RTS Frame
- CTS + ACK Frame
- PS-Poll Frame
- CF-End (+ACK) Frame
- Additional MAC Functions for later Standard Versions
- Overview
- DFS
- TPC
- Action Frames
- Qos
- User Priorities
- Contents of the QoS Control Field - Block Ack
- Overview Ack Policies
- Immediate Block Ack Procedure
- Delayed Block Ack Procedure
- Block ACK Request Frame
- Block ACK Frame - EDCA & HCCA
- Changes Introduced by EDCA
- Changes Introduced by HCCA
- Coexistence of DCF, PCF, and HCF
- EDCA Procedure
- HCCA Procedures – Example 1
- HCCA Procedures – Example 2
- Termination of the HCCA Procedure
- Lessons Learned / Conclusions
Security
- Security Challenges
- Overview Security
- Security Technologies in and over IEEE 802.11
- Overview
- Pre-RSNA Procedures
- Open System Authentication
- Shared Key Authentication
- The “Wired Equivalent Privacy” Procedure - RSNA Procedures
- RSNA Policy Selection
- Key Hierarchy – How to Create the TK's
- Types of Security Association
- RSNA Encryption and Integrity Protection Protocols
- The TKIP Encryption and Integrity Protection Procedure
- The CCMP Encryption and Integrity Protection Procedure - Advanced Authentication
- Authentication and Key Generation with an Authentication Server
- Essentials on the IEEE 802.1x Protocol
- EAP Derivatives - Secure Session
- Phases of a Session
- Session Phase 1: Probing & Association
- Session Phase 2: EAP Authentication
- Session Phase 3: Generation of IEEE 802.11 Keys
- Session Phase 4 & 5: Active Session & Disassociation - Accessing External Resources using the VPN Approach
- Security Association in the Roaming Case
- Lessons Learned / Conclusions
Planning a Wireless LAN Deployment
- Planning a WLAN
- Lessons Learned / Conclusions
Future / Recent Developments
- New and Coming IEEE 802.11 Standards
- IEEE 802.11 and Bluetooth coexistence
- WLAN's Accessing a Mobile Radio Network Core
- I-WLAN Direct IP-Access
- Details of I-WLAN 3GPP IP-Access
- Details of GAN/UMAN-Access
- MIP in Wireless Standards
- IEEE 802.11n
- Practical Exercise: Scaling of OFDM / OFDMA-Systems
- Key Changes in IEEE 802.11n
- HT PPDU's
- Smart Antenna Technology in IEEE 802.11
- Categorization of Smart Antenna Technologies
- The Basics: Signal Fading Physics between TX and RX
- Multipath Diversity
- The Transmission Diversity Problem
- The Wrong Way to Implement TX Diversity
- Beamforming
- Beamforming in IEEE 802.11
- Practical Exercise: Draw the Antenna Diagram of Beamforming
- CSD
- STBC
- MIMO
- Multiple Input Multiple Output (MIMO)
- MIMO General Operation
- MIMO Details
- Motivation of MIMO combined with Beamforming
- Multiple Rank Beamforming Procedure - How to Calculate the Data Rate of HT
- Signal Processing Chain for the HT-SIGNAL Field
- Signal Processing Chain for the HT-SERVICE and HT-data Fields
- The optional LDPC encoder
- Lessons Learned / Conclusions
Voice over WiFi
- How to deliver VoIP Services
- QoS Issues
- Other Initial Obstacles for Vo802.11
- Deployment Examples
- Operation of Vo802.11 with a Softswitch
- Lessons Learned / Conclusions
The WiFi Alliance
- The WiFi Forum and IEEE - Overview and Responsibilities
- WiFi Certification Programs
- Features of WPA and WPA2
- Features of WMM
- Lessons Learned / Conclusions
v1.500
Search:
Advanced SearchMore Info:
General Information to this course
Schedule of this course
Buy this book
INACON eBooks
Please have a look at our full offer