WiFi Technology Principles and Operation Training

WiFi Technology Principles and Operation Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

WiFi Technology Principles and Operation Training Hands-on

This three-day WIFI Technology Principles and Operation Training course offers in-depth coverage of the principles and operation of IEEE 802.11 (“WiFi”) short-range wireless communications. We will begin by looking at the indoor propagation characteristics and how to estimate range limits. You will review the government regulations and learn the techniques used by 802.11 to meet those regulations. You will then examine and compare the modulation schemes employed by the various forms of 802.11. Next, you will study in depth the operation of 802.11a, 802.11b, and 802.11g along with the IEEE 802.11n proposals to enhance throughput. We will undertake a detailed analysis of how security is implemented, followed by a look at countermeasures to various attack strategies. We will conclude the course by discussing the coexistence of 802.11 and other wireless networks such as Bluetooth and a study of the interference solutions.

Customize It:

• If you are familiar with some aspects of this WiFi Technology Principles and Operation Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

WiFi LAN Operation and Security Training
WiFi Technology Training In Depth

What You Will Learn:

Upon completing this WiFi Technology Principles and Operation Training course, learners will be able to meet these objectives:

• Calculate signal range using large scale path loss models for the 2.4 and 5 GHz bands
• Describe solutions to the impairments caused by multipath
• Show how 802.11 signaling meets various government regulations
• Compare the 802.11 a, b, g, and proposed 802.11n modulation processes
• Describe the channel-access methods used by 802.11
• Demonstrate the strengths and weakness of 802.11 security
• Show how coexistence can be improved between 802.11 and other wireless systems

WiFi Technology Principles and Operation Training – Course Syllabus:

Day One

◾Introduction to WiFI and Short-Range Systems
◾Wired vs wireless communications
◾Categories of information transmission
◾Overview of 802.11
◾The Wi-Fi Alliance and IEEE 802.11 task groups
◾Other short-range wireless systems
◾Propagation and Range Limit
◾Review of decibels
◾Link budget equation and path loss model
◾Calculating maximum range
◾Partition attenuation and primary ray tracing
◾Eavesdropping and jamming vulnerabilities
◾Multipath characteristics and mitigation
◾Data Communications
◾Advanced modulation methods for faster data rates
◾Direct sequence spread spectrum
◾Complementary coded keying (CCK)
◾Orthogonal Frequency Division Multiplexing (OFDM)
◾Error control coding
◾Frequency regulation and administration

Day Two

◾11 Physical Layer (PHY) Operations
◾11b channel sets and modulation
◾The 802.11b radio and its performance
◾11b PHY packet structure and data rates
◾11g channel sets and modulation
◾11g PHY packet structure and data rates
◾11a channel sets and comparison to 802.11g
◾11 Medium Access Control (MAC) Operations
◾Carrier-sense multiple-access operation and throughput
◾Distributed coordination function (DCF) operation
◾Point coordination function (PCF) operation
◾MAC frame construction and examples
◾Throughput and frame transmission times
◾11 management operations

Day Three

◾11 Upgrades and Enhancements
◾Types of security threats
◾Operation of 802.11 Wired Equivalent Privacy (WEP)
◾11 WEP weaknesses
◾Temporal Key Integrity Protocol (TKIP)
◾Advanced Encryption Standard (AES)
◾1X port-based network access control
◾IEEE 802.11e quality-of-service (QoS)
◾IEEE 802.11n higher data rates
◾Consequences of interference
◾Wi-Fi deployment for interference-free operations
◾Coexisting with other wireless networks
◾Collocated Wi-Fi and Bluetooth nodes
◾Microwave ovens
◾Operation aboard commercial aircraft

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email