pdf_gross.gifWiFi from A-Z

[2-day training course, Euro 2,350.- per participant or optional 2-day training course + 1 optional day trace analysis, Euro 3,450.- per participant]

backtotop.gifIntroduction and Fundamentals

Course Description

  • IEEE 802.11 Architecture Overview
  • IEEE 802.11 Specification ABC
  • IEEE 802.11 Protocol Stack Architecture
  • Physical Layer Overview
    • TDD operation in an IEEE 802.11 Network
    • Current IEEE 802.11 Physical Layer Access Technologies
    • Frequency Bands being used for IEEE 802.11 Standards
  • Lessons Learned / Conclusions

backtotop.gifPhysical Layer procedures

  • General PLCP Burst
  • FHSS Physical Layer
    • FHSS PLCP Burst
    • GFSK Modulatio
    • FHSS Signal Processing Chain
  • IR Physical Layer
    • IR PLCP Burst
  • DSSS Physical Layer
    • DSSS PLCP Burst
    • DBPSK and DQPSK Modulation
    • DSSS Signal Processing Chain
  • OFDM Physical Layer
    • Introduction OFDM Technology
      - Impact of Orthogonality in the Frequency Domain – 3 Steps
      - Practical Exercise: Physical Basics of OFDM
      - OFDM and IFFT
      - Using different Modulation Schemes on Different Subcarriers
      - Tackling Inter-Symbol Interference (ISI)
      - Introduction
      - Cyclic Prefix or Guard Interval
    • OFDM PLCP Burst
      - Normal OFDM Symbol
      - Long OFDM Sync Symbol
      - Short OFDM Sync Symbol
    • Modulation and Data Rates of the OFDM Physical Layer
    • OFDM Signal Processing Chain
      - Modulation Schemes for OFDM
      - OFDM Convolutional Encoder
      - OFDM Physical Layer Puncturin
  • HS-DSSS Physical Layer
    • HS-DSSS PLCP Burst
    • CCK Modulation
    • Details of CCK
    • PBCC Signal Processing Chain
  • DSSS-OFDM Hybrid Physical Layer
    • DSSS-OFDM PLCP Burst
    • ERP-PBCC Processing Enhancements
  • Agility
  • Lessons Learned / Conclusions

backtotop.gifMedium Access Control

  • Basic MAC Functions
    • Overview
    • MAC Frames
      - Generic MAC Frame (Data Frame)
      - Details of the Frame Control Field
      - Control Frame Subtypes
      - Management Frame Subtypes
      - Data Frame Subtypes
      - Usage of the Address Fields in Data Frames
      - Data Frame Body
    • Fragmentation of MSDU's
    • MAC Access Coordination Functions
    • MAC Procedures
      - Timing governing the Access: SIFS, PIFS, and DIFS
      - EIFS and AIFS
      - Scanning and Attachment Procedure
      - Coexistence of PCF and DCF
      - DCF- Sensing Procedures
      - DCA & Random Back off Procedure
      - DCF & Transmission of Fragments
      - Contention Free Period Procedures – Example 1
      - Contention Free Period Procedures – Example 2
      - Power Saving Procedure in the CP
      - Power Saving Procedure in CFP
    • Control Frames
      - RTS Frame
      - CTS + ACK Frame
      - PS-Poll Frame
      - CF-End (+ACK) Frame
  • Additional MAC Functions for later Standard Versions
    • Overview
    • DFS
    • TPC
    • Action Frames
    • Qos
      - User Priorities
      - Contents of the QoS Control Field
    • Block Ack
      - Overview Ack Policies
      - Immediate Block Ack Procedure
      - Delayed Block Ack Procedure
      - Block ACK Request Frame
      - Block ACK Frame
    • EDCA & HCCA
      - Changes Introduced by EDCA
      - Changes Introduced by HCCA
      - Coexistence of DCF, PCF, and HCF
      - EDCA Procedure
      - HCCA Procedures – Example 1
      - HCCA Procedures – Example 2
      - Termination of the HCCA Procedure
  • Lessons Learned / Conclusions

backtotop.gifSecurity

  • Security Challenges
  • Overview Security
  • Security Technologies in and over IEEE 802.11
    • Overview
    • Pre-RSNA Procedures
      - Open System Authentication
      - Shared Key Authentication
      - The “Wired Equivalent Privacy” Procedure
    • RSNA Procedures
      - RSNA Policy Selection
      - Key Hierarchy – How to Create the TK's
      - Types of Security Association
      - RSNA Encryption and Integrity Protection Protocols
      - The TKIP Encryption and Integrity Protection Procedure
      - The CCMP Encryption and Integrity Protection Procedure
    • Advanced Authentication
      - Authentication and Key Generation with an Authentication Server
      - Essentials on the IEEE 802.1x Protocol
      - EAP Derivatives
    • Secure Session
      - Phases of a Session
      - Session Phase 1: Probing & Association
      - Session Phase 2: EAP Authentication
      - Session Phase 3: Generation of IEEE 802.11 Keys
      - Session Phase 4 & 5: Active Session & Disassociation
    • Accessing External Resources using the VPN Approach
    • Security Association in the Roaming Case
  • Lessons Learned / Conclusions

backtotop.gifPlanning a Wireless LAN Deployment

  • Planning a WLAN
  • Lessons Learned / Conclusions

backtotop.gifFuture / Recent Developments

  • New and Coming IEEE 802.11 Standards
  • IEEE 802.11 and Bluetooth coexistence
  • WLAN's Accessing a Mobile Radio Network Core
    • I-WLAN Direct IP-Access
    • Details of I-WLAN 3GPP IP-Access
    • Details of GAN/UMAN-Access
    • MIP in Wireless Standards
  • IEEE 802.11n
    • Practical Exercise: Scaling of OFDM / OFDMA-Systems
    • Key Changes in IEEE 802.11n
    • HT PPDU's
    • Smart Antenna Technology in IEEE 802.11
      - Categorization of Smart Antenna Technologies
      - The Basics: Signal Fading Physics between TX and RX
      - Multipath Diversity
      - The Transmission Diversity Problem
      - The Wrong Way to Implement TX Diversity
      - Beamforming
      - Beamforming in IEEE 802.11
      - Practical Exercise: Draw the Antenna Diagram of Beamforming
      - CSD
      - STBC
      - MIMO
      - Multiple Input Multiple Output (MIMO)
      - MIMO General Operation
      - MIMO Details
      - Motivation of MIMO combined with Beamforming
      - Multiple Rank Beamforming Procedure
    • How to Calculate the Data Rate of HT
    • Signal Processing Chain for the HT-SIGNAL Field
    • Signal Processing Chain for the HT-SERVICE and HT-data Fields
    • The optional LDPC encoder
  • Lessons Learned / Conclusions

backtotop.gifVoice over WiFi

  • How to deliver VoIP Services
  • QoS Issues
  • Other Initial Obstacles for Vo802.11
  • Deployment Examples
  • Operation of Vo802.11 with a Softswitch
  • Lessons Learned / Conclusions

backtotop.gifThe WiFi Alliance

  • The WiFi Forum and IEEE - Overview and Responsibilities
  • WiFi Certification Programs
    • Features of WPA and WPA2
    • Features of WMM
  • Lessons Learned / Conclusions

v1.500

pdf_gross.gif

Search:

Advanced Search

More Info:

General Information to this course
Schedule of this course
Buy this book


INACON eBooks

Please have a look at our full offer

ebook_covers_small.jpg

Read more ...