CWNP CWNA – Spread Spectrum Technologies Part 2
U-NII Review So when we talked about uni, as I said, was kind of a grouping of channels in a different frequency range that we could use for different purposes, whether it was data or TV. And so you see that we have uni one which is really at the start of the 5. 0 GHz that took up the first four channels. Most often we use that for data communications, but like I said, we could send other transmissions over these unlicensed bands. The uni two of course, was…
CWNP CWNA – Spread Spectrum Technologies
Spread Spectrum Technologies This module is on the spread spectrum technologies that we’re going to look at. And that means we’re going to talk about things like the Ism bands, the ones that are unlicensed, calling them the industrial, scientific and medical. We’ll talk about the uni bands that exist within those unlicensed portions. Then we’ll look at concepts like narrow band, spread spectrum. Then we’ll look at some of the encoding methods that we use, like the FHSS, the DSS, the OFDM, and how those apply to the different…
Site Survey Tools In this module, we’re going to take a look at some of the tools that you can use to help you with a site survey. So we’ll talk about really the definition of what you should be doing in a site survey. We’ll look at those tools and how they can help us with what we call a coverage analysis. Protocol and Spectrum Analysis When we take a look at history, like ten years ago, if you were going to plan or design for a wireless network,…
Robust Security Part7 So protecting data privacy on a wired network is a lot easier because of the physical access to the wired medium. In other words, it’s not radiating radio frequency for anybody with an antenna to be able to hear. So it’s a little more restricted. In fact, you actually probably have to be into the server room. For some of you. With smaller networks, you might call it the closet, but it’s much more restricted, whereas wireless transmissions are available to anybody who is close enough to…
802.11 Security Basics Part5 Now, when we continue to talk about security, something else we should look at is segmentation. And that’s what happens when we get on the wired network. segmentation is our best method, the most chosen method of separating user traffic while inside of a network. We most often do that with what we call a virtual local area network. And so it’s a layer to switching technology to make sure that traffic gets isolated lated from one part of the network to another part. Now, you…
Security Now in this module we’re going to take a look at security when it comes to the wireless networks. So we’re going to first give you the security basics. We’ll talk about some of the legacy. Not a lot because it’s legacy for a reason. It doesn’t work anymore. We’ll look at this thing called the rsn, the robust security network which is really important to us. And then after we leave the wireless network and get into the wired network we’re going to talk traffic segmentation, infrastructure security…
PoE So in this module, we’re going to have a discussion about power over ethernet and why that’s important to us in our wireless setup. First, I’ll give you a little bit of a history about poe that’s again the Power over ethernet. We’ll talk about the devices as an overview and what we can do to plan and deploy having power over ethernet. Non –Standard So as with most of our technologies, the initial poe products were proprietary solutions created by the different companies that recognized that there had…
CWNP CWNA – MAC Architecture Part 2
Beacon Frame Types So, as I was just saying, some of the things that we see with the beacon, well, things I didn’t even mention yet, the timestamp to synchronize to make sure we know what time of day it is and it’s not some weird repeated traffic or something like that. The type of again, spread spectrum am I supporting? FHSS, DSS OFDM ERP, all these things we’ve talked about, the channel that I’m using, the data, data rates, the ones that I have, basic rates, ones that were…
MAC Architecture In this module, we’re going to talk about the Mac architecture. So we’re going to go back to the wired network, or actually the OSI, and talk about what packets, frames and bits are, and then how layer two breaks down into the data link. And the Mac layers, how we work with the physical layer, in this case, physical not being a wire, but being radio frequency. Then we’ll take a look at how we get the wireless and the wired to work together. We’ll talk about…
IEEE 802.11 So in this module, we’re going to talk about the IEEE standards for wireless communications under 800 and 211. We’ll look at the original standards, and then we’ll see over time how we’ve continued to increase the standards to get better wireless communications and security. So then we’re going to look at the 8211 2007 Amendments, the 8211 2012 Ratified Amendments, and maybe if we get the opportunity, we’ll look at some of those what they call post 2012 Ratified Amendments, meaning we’re not ready. To, you know,…