Advanced Wi-Fi Training: Technology, Security, Deployment; Coexistence with LTE and 5G

Onsite Training: M2M, WiFi, Bluetooth, Zig Bee, IoT
  • Course:Advanced Wi-Fi Training: Technology, Security, Deployment; Coexistence with LTE and 5G
  • Course ID:WIFI-ADV Duration:2-3 days Where: Your Office (7+ Persons)
  • Available as a private, customized course for your group at your offices or ours and in some cases as a WebLive(TM) class.

  • Download Course Description (PDF)

Course Outline

Advanced WiFi Training Part 1: IEEE 802.11 Overview

  • WiFi: Market Landscape
  • Short-Range Wireless Characteristics
    • Wired vs wireless
      • Comparison of networks
      • Comparison of security challenges
      • Short-range wireless systems
    • Categories of Information Transmission
      • Asynchronous, isochronous, and synchronous requirements
      • Voice and data
    • IEEE 802.11 Network Architecture
      • General IEEE 802.11 architecture
      • Basic, extended, and independent service sets
      • Examples of implementations

Advanced WiFi Training Part 2: IEEE 802.11 Physical Link

  • Radio Frequency (RF) Basics
    • The electromagnetic spectrum
    • RF propagation and fading
    • RF modulation techniques
    • Reflection, refraction, and diffraction
    • Basics of digital RF communication
    • Free space loss
  • Link Budget and Path Loss
    • Review of decibels
    • Calculating maximum range
    • Multipath characteristics and mitigation
  • Multipath
    • Doppler and delay spread
    • Diversity combining
  • Basic Modulation Techniques
    • Amplitude, frequency, and phase shift keying (ASK, FSK, PSK)
    • Complementary Code Keying (CCK)
    • Quadrature Amplitude Modulation (QAM)
  • OFDM
    • What is OFDM
    • OFDM Advantages and Challenges
    • OFDM parameters
  • Error Control
    • Error characteristics
    • Cyclic Redundancy Check(CRC)
    • Convolutional coding
    • Automatic Repeat ReQuest (ARQ)

Advanced WiFi Training Part 3: IEEE 802.11 MAC

  • MAC Methods
    • Carrier-sense multiple access
      • Basic concept and operation
      • Avoiding network instability
      • CSMA and Denial-of-Service (DoS) attacks
    • Distributed Coordination Function (DCF) operation
      • Channel access and backoff
      • DCF and Man-in-the-Middle (MITM) attacks
    • Point Coordination Function (PCF) operation
      • Channel access and scheduling
    • Operation in an independent basic service set (ad-hoc)
  •  IEEE 802.11e Quality-of-Service (QoS) operation

Advanced WiFi Training Part 4: IEEE 802.11ah

  • Introduction to IEEE 802.11ah
    • IEEE 802.11ah use cases
    • Issues for sub-one-gigahertz (900MHz) band
    • IEEE 802.11ah requirements
      • Functional requirements
      • System performance
      • Supporting band
      • Coverage and data rate
      • Coexistence
      • Enhanced power saving
    • Internet of Things (IoT) and Machine to Machine (M2M) communications
    • One-hop network topologies
    • Short and infrequent data transmissions
    • Dense AP deployment number of stations
      • Traffic Indication Map (TIM) stations
      • Non-TIM stations
  • IEEE 802.11ah PHY and MAC
    • Extended range Wi-Fi by IEEE 802.11ah
    • IEEE 802.11ah global ISM spectrum allocation
    • IEEE 802.11ah bandwidths
    • Downlink Multi-User MIMO-OFDM (DL MU-MIMO)
    • IEEE 802.11ah PHY optimization
      • Extended range
      • Power efficiency
      • Scalable operation
    • IEEE 802.11ah link-budget
      • Transmission range and data rates

Advanced WiFi Training Part 5: Wi-Fi Security

  • Wired Equivalent Privacy (WEP)
    • Shared key and public key cryptography
    • Cryptanalysis attack methods
    • WEP encryption process and weaknesses
    • WEP data integrity process and weaknesses
    • WEP access control process and weaknesses
    • Denial-of-service (DoS) attack methods
  • IEEE 802.11i Access Control and Key Management
    • Wired Equivalent Privacy (WEP) weaknesses
      • Weaknesses: Authentication, data confidentiality, data integrity
    • Introduction to Robust Security Network (RSN)
      • RSN security layers
      • Methods of authentication
      • IEEE 802.11i operational phases
    • IEEE 802.1X Port-Based Network Access Control
      • IEEE 802.1X authentication and key distribution
      • Digital certificate
      • Challenge-response using a RADIUS server
    • Extensible Authentication Protocol (EAP)
      • EAP request/response
      • EAP over LAN (EAPOL)
      • Key derivation and exchange
    • Transport Layer Security (TLS)
      • TLS handshake exchange
      • TLS and IEEE 802.11i
      • TLS over EAP
  • Advanced WiFi IEEE 802.11i Encryption
    • Temporal Key Integrity Protocol (TKIP)
      • TKIP implementation
      • Encapsulation and de-capsulation processes
      • TKIP message integrity
      • TKIP attack countermeasures
    • Advanced Encryption Standard (AES)
      • Requirements for WEP replacement
      • AES operation
      • AES modes and algorithms
      • 802.11i counter/cipher block chaining with message authentication code (CCM) protocol
  • Advanced WiFi Wi-Fi Protected Access (WPA)
    • IEEE 802.11i and Wi-Fi Protected Access (WPA)
      • Comparison of 802.11i and WPA
    • Versions of WPA
      • WPA Personal vs WPA Enterprise
      • WPA vs WPA2
    • WPA and RSN key hierarchy
      • Pairwise and group keys
      • Key hierarchy
      • Key derivation
    • WPA implementation requirements
      • Access points
      • Network adaptors
      • Client software
    • WPA certification

Advanced WiFi Training Part 6: Wi-Fi Deployment and Optimization

  • Operating Frequencies and Signal Spectrum
    • Frequency hopping
  • Key Performance Indicators (KPI)
    • Range
    • Data rate and throughput
    • Latency
    • Security
    • Others
  • Project Planning
    • Requirements
    • Site Survey
    • Coverage vs. Capacity
    • AP Installation
    • Network Traffic Analysis

Advanced WiFi Training Part 7: WiFi Coexistence with LTE, and 5G

  • LTE vs Wi-Fi
    • Scenarios where Wi-Fi is best
    • Scenarios where LTE is best
  • LTE-WiFi Aggregation (LWA)
  • WiFi vs. Unlicensed LTE (LAA/eLAA/MulteFire)
    • Listen Before Talk (LBT)
  • WiFi and Spectrum Sharing
  • WiFi in 5G

Advanced WiFi Training Wrap-up: Recap and Discussion

DCN PnTM-f