CWNA (Cisco Wireless Network Associate)
Radio
Frequency: Radio frequency is high frequency alternating current
(AC) signals that are passed along a copper conductor and then radiated into
the air via an antenna. An antenna converts/transforms a wired signal to a
wireless signal and vice versa. When the high frequency AC signal is radiated
into the air, it forms radio waves. These radio waves propagate (move) away
from the source (the antenna) in a straight line in all directions at once.
Antenna: Antennas
convert electrical energy into RF waves in the case of a transmitting antenna,
or RF waves into electrical energy in the case of a receiving antenna. The
physical dimensions of an antenna, such as its lenght, are directly related to the
frequency at which the antenna can propagate waves or receive propagated waves.
Bandwidth: Bandwidth
equal Frequency weight.
SSID
Information: Stations look in beacons for the SSID of the network they
wish to join. When this information is found, the station looks at the MAC
address of where the beacon originated and sends an authentication request in
hopes of associating with that access point.
If a station is set to accept any SSID, then the station will
attempt to join the network through the first access point that sends a beacon
or the one with the strongest signal strength if there are multiple access
points
Wireless
operation: Client and Access point Association:
- AP Signals: Beacon
- Client Signals: Probe
- Authentication: A. Open authentication. B. Share key authentication
- Association
Hop time: Hop time is
a time which is use between one frequency to another frequency, when jumping.
Dwell time: When
discussing frequency hopping systems, we are discussing systems that must transmit
on a specified frequency for a time, and then hop to a different frequency to
continue transmitting.
When a frequency hopping system transmits on a frequency, it
must do so for a specified amount of time. This time is called the dwell
time. Once the dwell time has expired, the system will switch to a
different frequency and begin to transmit again. Suppose a frequency hopping
system transmits on only two frequencies, 2.401 GHz and 2.402 GHz. The system
will transmit on the 2.401 GHz frequency for the duration of the dwell time—100
milliseconds (ms), for example.
After 100ms the radio must change its transmitter frequency
to 2.402 GHz and send information at that frequency for 100ms.
Co-location:
To use DSSS systems with overlapping channels in the same physical space
would cause interference between the systems. DSSS systems with overlapping
channels should not be co-located because there will almost always be a drastic
or complete reduction in throughput. Because the center frequencies are 5 MHz apart
and the channels are 22 MHz wide, channels should be co-located only if the
channel numbers are at least five apart: channels 1 and 6 do not overlap,
channels 2 and 7 do not overlap, etc. There is a maximum of three co-located
direct sequence systems possible because channels 1, 6 and 11 are the only
theoretically non-overlapping channels.
ISM and UNII Bands: The FCC
establishes rules limiting which frequencies wireless LANs can use and the
output power on each of those frequency bands. The FCC has specified that
wireless LANs can use the ISM (Industrial Scientific and Medical) bands, which
are license free. The ISM bands are located starting at 902 MHz, 2.4 GHz, and
5.8 GHz and vary in width from about 26 MHz to 150 MHz. In addition to the ISM
bands, the FCC specifies three Unlicensed National Information Infrastructure
(UNII) bands. Each one of these UNII bands is in the 5 GHz range and is 100 MHz
wide.
Unlicensed National Information Infrastructure (UNII) Bands:
The 5 GHz UNII bands are made up of three separate 100
MHz-wide bands, which are used by 802.11 -compliant devices. The three bands
are known as the lower, middle, and upper bands. Within each of these three
bands, there are four non-overlapping DSSS channels, each separated by 5 MHz.
The FCC mandates that the lower band be used indoors, the middle band be used
indoors or outdoors, and the upper band be allocated for outdoor use. Since
access points are mostly mounted indoors, the 5 GHz UNII bands would allow for
8 non-overlapping access points indoors using both the lower and middle.
Frequency
Hopping Spread Spectrum (FHSS): Frequency hopping spread spectrum
is a spread spectrum technique that uses frequency agility to spread the data
over more than 83 MHz. Frequency agility refers to the radio’s ability to
change transmission frequency abruptly within the usable RF frequency band. In
the case of frequency hopping wireless LANs, the usable portion of the 2.4 GHz
ISM band is 83.5 MHz, per FCC regulation and the IEEE 802.11 standard.
Direct Sequence
Spread Spectrum (DSSS): Direct sequence spread spectrum is very widely known and the most used
of the spread spectrum types, owing most of its popularity to its ease of implementation
and high data rates. The majority of wireless LAN equipment on the market today
uses DSSS technology. DSSS is a method of sending data in which the
transmitting and receiving systems are both on a 22 MHz-wide set of
frequencies. The wide channel
enables devices to transmit more information at a higher data rate than current
FHSS systems.
Direct
Sequence Systems
In the 2.4 GHz ISM band, the IEEE specifies the use of DSSS
at a data rate of 1 or 2Mbps under the 802.11 standard. Under the 802.11b
standard—sometimes called high rate wireless—data rates of 5.5 and 11 Mbps are
specified. IEEE 802.11b devices operating at 5.5 or 11 Mbps are able to
communicate with 802.11 devices operating at 1 or 2 Mbps because the 802.11b
standard provides for backward compatibility. A recent addition to the list of
devices using direct sequence technology is the IEEE 802.11a standard, which
specifies units that can operate at up to 54 Mbps. Unfortunately , 802.11a is wholly
incompatible with 802.11b because it does not use the 2.4 GHz band, but instead
uses the 5 GHz UNII bands. Recently the IEEE 802.11g standard was approved to
specify direct sequence systems operating in the 2.4 GHz ISM band that can
deliver up to 54 Mbps data rate. The 802.11g technology became the first 54
Mbps technology that was backward compatible with 802.11 and 802.11b devices.
WLAN Standards: The Institute of
Electrical and Electronics Engineers (IEEE) is the key standards maker
for most things related to information technology in the United States. The
IEEE creates its standards within the laws created by the FCC. The IEEE
specifies many technology standards such as Public Key Cryptography (IEEE
1363), Ethernet (IEEE 802.3), and Wireless LANs (IEEE 802.11). It is part of
the mission of the IEEE to develop standards for wireless LAN operation within
the framework
of the FCC rules and regulations. Following are the four main IEEE standards
for WLAN.
- IEEE 802.11
- IEEE 802.11b
- IEEE 802.11a
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.11e
802.11 compliant products operate
strictly in the 2.4 GHz ISM band between 2.4000 and 2.4835 GHz. Infrared, also
covered by 802.11, is light-based technology and does not fall into the 2.4 GHz
ISM band.
IEEE 802.11b: DSSS
systems that operate at 1, 2, 5.5 and 11 Mbps. The 802.11b standard does not
describe any FHSS systems. 802.11b-compliant devices are also
802.11-compliant by default, meaning they are backward compatible and support
both 2 and 1 Mbps data rates. Backward compatibility is very important because
it allows a wireless LAN to be upgraded without the cost of replacing the core
hardware.
IEEE 802.11a: Describe
WLAN operation in the “UNII” band. Operation in a different frequency band.
Compatibale with 802.11b, 5GHz frequency band. Max data rate of 54Mbps
(Typically 20-25Mbps), 12 Non-overlapping chanels, 8 outdor, 4 PTP.
IEEE 802.11g: 802.11g
provides the same maximum speed of 802.11a, coupled with backwards compatibility
for 802.11b devices. This backwards compatibility will make upgrading wireless
LANs simple and inexpensive. IEEE 802.11g specifies operation in the 2.4 GHz
ISM band. To achieve the higher data rates found in 802.11a, 802.11g compliant
devices utilize Orthogonal Frequency Division Multiplexing (OFDM) modulation
technology. These devices can automatically switch to QPSK modulation in order
to communicate with the slower 802.11b- and 802.11-compatable devices.
IEEE 802.11n: IEEE
802.11n-2009, commonly shortened to 802.11n, is a wireless networking standard
that uses multiple antennas to increase data rates. It is an amendment to the
IEEE 802.11-2007 wireless networking standard. Its purpose is to improve
network throughput over the two previous standards—802.11a and 802.11g—with a
significant increase in the maximum net data rate from 54 Mbit/s to 600 Mbit/s.
with the use of four spatial streams at a channel width of 40 MHz. 802.11n
standardized support for multiple-input multiple-output and frame aggregation,
and security improvements, among other features. It can be used in the 2.4 GHz
or 5 GHz frequency bands.
WIMAX Technology: IEEE
802.16e standard broadband wireless access (BWA) working group.
Blutooth Technology: IEEE
802.15.1 Standard.
RF
Behaviors
Loss: Loss describes a decrease in
signal strength. Many things can cause RF signal loss, both while the signal is
still in the cable as a high frequency AC electrical signal and when the signal
is propagated as radio waves through the air by the antenna.
Resistance of cables and connectors
causes loss due to the converting of the AC signal to heat. Impedance
mismatches in the cables and connectors can cause power to be reflected back
toward the source, which can cause signal degradation. Objects directly in the
propagated wave's transmission path can absorb, reflect, or destroy RF signals.
Loss can be intentionally injected into a circuit with an RF attenuator. RF
attenuators are accurate resistors that convert high frequency AC to heat in
order to reduce signal amplitude at that point in the circuit.
Gain: Gain is the term used to
describe an increase in an RF signal's amplitude. Gain is usually an active
process; meaning that an external power source, such as an RF amplifier, is
used to amplify the signal or a high-gain antenna is used to focus the
beamwidth of a signal to increase its signal amplitude.
Reflection: Reflection
occurs when a propagating electromagnetic wave impinges upon an object that has
very large dimensions when compared to the wavelength of the propagating wave.
Reflections occur from the surface of the earth, buildings, walls, and many
other obstacles. RF signal reflection can cause serious problems for wireless
LANs. This reflecting of the main signal from many objects in the area of the
transmission is referred to as multipath.
Multipath can have severe adverse affects on a
wireless LAN, such as degrading or, canceling the main signal and causing holes
or gaps in the RF coverage area. Surfaces such as lakes, metal roofs, metal
blinds, metal doors, and others can cause severe reflection, and hence,
multipath. Reflection of this magnitude is never desirable and typically requires special functionality (antenna diversity)
within the wireless LAN hardware to compensate for it.
Refraction: Refraction
describes the bending of a radio wave as it passes through a medium of different
density. As an RF wave passes into a denser medium (like a pool of cold air
lying in a valley) the wave will be bent such that its direction changes. When
passing through such a medium, some of the wave will be reflected away from the
intended signal path, and some will be bent through the medium in another
direction.
Diffraction: Diffraction
occurs when the radio path between the transmitter and receiver is obstructed
by a surface that has sharp irregularities or an otherwise rough surface. At
high frequencies, diffraction, like reflection, depends on the geometry of the
obstructing object and the amplitude, phase, and polarization of the incident
wave at the point of diffraction.
Scattering: Scattering
occurs when the medium through which the wave travels consists of objects with
dimensions that are small compared to the wavelength of the signal, and the
number of obstacles per unit volume is large. Scattered waves are produced by
rough surfaces, small objects, or by other irregularities in the signal path.
Voltage Standing Wave Ratio (VSWR): VSWR occurs when there is mismatched impedance (resistance to
current flow, measured in Ohms) between devices in an RF system. VSWR is caused
by an RF signal reflected at a point of impedance mismatch in the signal path.
VSWR causes return loss,
which is defined as the loss of forward energy through a system due to some of
the power being reflected back towards the transmitter. If the impedances of
the ends of a connection do not match, then the maximum amount of the
transmitted power will not be received at the antenna. When part of the RF
signal is reflected back toward the transmitter, the signal level on the line
varies instead of being steady. This variance is an indicator of VSWR.
Line of Sight (LOS):
With visible light, visual LOS (also called simply ‘LOS’) is defined as
the apparently straight line from the object in sight (the transmitter) to the
observer's eye (the receiver). The LOS is an apparently straight line
because light waves are subject to changes in direction due to refraction, diffraction, and reflection in the same
way as RF frequencies.Fresnel Zone:
The Fresnel Zone occupies a series of concentric ellipsoid-shaped areas around the LOS path, The Fresnel Zone is important to the integrity of the RF link because it defines an area around the LOS that can introduce RF signal interference. if blocked. Objects in the Fresnel Zone such as trees, hilltops, and buildings can diffract or reflect the main signal away from the receiver, changing the RF LOS. These same objects can absorb or scatter the main RF signal, causing degradation or complete signal loss.
WLAN Infrastructure Devices
Access
Point: The access point, or “AP”, is probably the most common
wireless LAN device with which you will work as a wireless LAN administrator.
As its name suggests, the access point provides clients with a point of access
into a network. An access point is a half-duplex device with intelligence
equivalent to that of a sophisticated Ethernet switch.
Access Point Modes: Access
points communicate with their wireless clients, with the wired network, and
with other access points. There are three modes in which an access point can be
configured:
- Root Mode
- Repeater Mode
- Bridge Mode
Root Mode: Root Mode
is used when the access point is connected to a wired backbone through its
wired interface. Most access points that
support modes other than root mode come configured in root mode by default.
When an access point is connected to the wired segment through its Ethernet
port, it will normally be configured for root mode. When in root mode, access
points that are connected to the same wired distribution system can talk to
each other over the wired segment. Access points talk to each other to
coordinate roaming functionality such as reassociation. Wireless clients can
communicate with other wireless clients that are located in different cells
through their respective access points across the wired segment.
Bridge Mode: In bridge
mode, access points act exactly like wireless bridges. In fact, they become
wireless bridges while configured in this manner.
Repeater Mode:
In repeater mode, access points
have the ability to provide a wireless upstream link into the wired network rather
than the normal wired link. One access point serves as the root access point
and the other serves as a wireless repeater. The access point in repeater mode
connects to clients as an access point and connects to the upstream root access
point as a client itself. Using an access point in repeater mode is not
suggested unless absolutely necessary because cells around each access point in
this scenario must overlap by a minimum of 50%. Additionally, the repeater
access point is communicating with the clients as well as the upstream access
point over the wireless link, reducing throughput on the wireless segment.
Users attached to the repeater access point will likely experience low
throughput and high latencies in this scenario.
Scanning: When you install, configure, and finally start up a wireless LAN client
device the client will automatically “listen" to see if there is a
wireless LAN within range. The client is also discovering if it can associate
with that wireless LAN. This process of listening is called scanning. Scanning
occurs before any other process, since scanning is how the client finds the
network.
Passive Scanning: Passive scanning is the process of listening
for beacons on each channel for a specific period of time after the station is
initialized. These beacons are sent by access points (infrastructure mode) or
client stations (ad hoc mode), and the scanning station catalogs characteristics
about the access points or stations based on these beacons. The station
searching for a network listens for beacons until it hears a beacon listing the
SSID of the network it wishes to join. The station then attempts to join the
network through the access point that sent the beacon. In configurations where
there are multiple access points, the SSID of the network the station wishes to
join may be broadcast by more than one of these access points. In this
situation, the station will attempt to join the network through the
access point with the strongest signal strength and the lowest bit error rate. Stations continue passive scanning even after associating to
an access point. Passive scanning saves time reconnecting to the network if the
client is disconnected (disassociated) from the access point to which the
client is currently connected. By maintaining a list of available access points
and their characteristics (channel, signal strength, SSID, etc), the station
can quickly locate the best access point should its current connection be
broken for any reason. Stations will roam from one access point to another
after the radio signal from the access point where the station is connected
gets to a certain low level of signal strength. Roaming is implemented so that
the station can stay connected to the network. Stations use the information
obtained through passive scanning for locating the next best access point (or
ad hoc network) to use for connectivity back into the network. For this reason, overlap between access point cells is
usually specified at approximately 20-30%. This overlap allows stations to
seamlessly roam between access points while disconnecting and reconnecting
without the user’s knowledge.
Active
scanning: Active scanning involves the sending of a probe request frame
from a wireless station. Stations send this probe frame when they are actively
seeking a network to join. The probe frame will contain either the SSID of the
network they wish to join or a broadcast SSID. If a probe request is sent
specifying an SSID, then only access points that are servicing that SSID will
respond with a probe response frame. If a probe request frame is sent with a
broadcast SSID, then all access points within reach will respond with a probe
response frame. The point of probing in this manner is to locate access
points through which the station can attach to the network. Once an access
point with the proper SSID is found, the station initiates the authentication
and association steps of joining the network through that access point.
Authentication & Association: The process
of connecting to a wireless LAN consists of two separate sub-processes. These
sub-processes always occur in the same order, and are called authentication and
association. For example, when we speak of a wireless PC card connecting to a wireless LAN, we say that the PC card has
been authenticated by and has associated with a certain access point.
Authentication: The first
step in connecting to a wireless LAN is authentication. Authentication is the
process through which a wireless node (PC Card, USB Client, etc.) has its
identity verified by the network (usually the access point) to which the node
is attempting to connect.
This verification occurs when the
access point to which the client is connecting verifies that the client is who
it says it is.
Association: Once a
wireless client has been authenticated, the client then associates with the
access point. Associated is the state at which a client is allowed to
pass data through an access point.
If your PC card is associated to an
access point, you are connected to that access point, and hence, the network. The
process of becoming associated is as follows. When a client wishes to connect,
the client sends an authentication request to the access point and receives
back an authentication response. After authentication is completed, the station
sends an association request frame to the access point who replies to the client
with an association response frame either allowing or disallowing association.
No comments:
Post a Comment