Advanced WiFi Training Part 1: IEEE 802.11 Overview
- WiFi: Market Landscape
- Short-Range Wireless Characteristics
- Wired vs wireless
- Comparison of networks
- Comparison of security challenges
- Short-range wireless systems
- Categories of Information Transmission
- Asynchronous, isochronous, and synchronous requirements
- Voice and data
- IEEE 802.11 Network Architecture
- General IEEE 802.11 architecture
- Basic, extended, and independent service sets
- Examples of implementations
- Wired vs wireless
Advanced WiFi Training Part 2: IEEE 802.11 Physical Link
- Radio Frequency (RF) Basics
- The electromagnetic spectrum
- RF propagation and fading
- RF modulation techniques
- Reflection, refraction, and diffraction
- Basics of digital RF communication
- Free space loss
- Link Budget and Path Loss
- Review of decibels
- Calculating maximum range
- Multipath characteristics and mitigation
- Multipath
- Doppler and delay spread
- Diversity combining
- Basic Modulation Techniques
- Amplitude, frequency, and phase shift keying (ASK, FSK, PSK)
- Complementary Code Keying (CCK)
- Quadrature Amplitude Modulation (QAM)
- OFDM
- What is OFDM
- OFDM Advantages and Challenges
- OFDM parameters
- Error Control
- Error characteristics
- Cyclic Redundancy Check(CRC)
- Convolutional coding
- Automatic Repeat ReQuest (ARQ)
Advanced WiFi Training Part 3: IEEE 802.11 MAC
- MAC Methods
- Carrier-sense multiple access
- Basic concept and operation
- Avoiding network instability
- CSMA and Denial-of-Service (DoS) attacks
- Distributed Coordination Function (DCF) operation
- Channel access and backoff
- DCF and Man-in-the-Middle (MITM) attacks
- Point Coordination Function (PCF) operation
- Channel access and scheduling
- Operation in an independent basic service set (ad-hoc)
- Carrier-sense multiple access
- IEEE 802.11e Quality-of-Service (QoS) operation
Advanced WiFi Training Part 4: IEEE 802.11ah
- Introduction to IEEE 802.11ah
- IEEE 802.11ah use cases
- Issues for sub-one-gigahertz (900MHz) band
- IEEE 802.11ah requirements
- Functional requirements
- System performance
- Supporting band
- Coverage and data rate
- Coexistence
- Enhanced power saving
- Internet of Things (IoT) and Machine to Machine (M2M) communications
- One-hop network topologies
- Short and infrequent data transmissions
- Dense AP deployment number of stations
- Traffic Indication Map (TIM) stations
- Non-TIM stations
- IEEE 802.11ah PHY and MAC
- Extended range Wi-Fi by IEEE 802.11ah
- IEEE 802.11ah global ISM spectrum allocation
- IEEE 802.11ah bandwidths
- Downlink Multi-User MIMO-OFDM (DL MU-MIMO)
- IEEE 802.11ah PHY optimization
- Extended range
- Power efficiency
- Scalable operation
- IEEE 802.11ah link-budget
- Transmission range and data rates
Advanced WiFi Training Part 5: Wi-Fi Security
- Wired Equivalent Privacy (WEP)
- Shared key and public key cryptography
- Cryptanalysis attack methods
- WEP encryption process and weaknesses
- WEP data integrity process and weaknesses
- WEP access control process and weaknesses
- Denial-of-service (DoS) attack methods
- IEEE 802.11i Access Control and Key Management
- Wired Equivalent Privacy (WEP) weaknesses
- Weaknesses: Authentication, data confidentiality, data integrity
- Introduction to Robust Security Network (RSN)
- RSN security layers
- Methods of authentication
- IEEE 802.11i operational phases
- IEEE 802.1X Port-Based Network Access Control
- IEEE 802.1X authentication and key distribution
- Digital certificate
- Challenge-response using a RADIUS server
- Extensible Authentication Protocol (EAP)
- EAP request/response
- EAP over LAN (EAPOL)
- Key derivation and exchange
- Transport Layer Security (TLS)
- TLS handshake exchange
- TLS and IEEE 802.11i
- TLS over EAP
- Wired Equivalent Privacy (WEP) weaknesses
- Advanced WiFi IEEE 802.11i Encryption
- Temporal Key Integrity Protocol (TKIP)
- TKIP implementation
- Encapsulation and de-capsulation processes
- TKIP message integrity
- TKIP attack countermeasures
- Advanced Encryption Standard (AES)
- Requirements for WEP replacement
- AES operation
- AES modes and algorithms
- 802.11i counter/cipher block chaining with message authentication code (CCM) protocol
- Temporal Key Integrity Protocol (TKIP)
- Advanced WiFi Wi-Fi Protected Access (WPA)
- IEEE 802.11i and Wi-Fi Protected Access (WPA)
- Comparison of 802.11i and WPA
- Versions of WPA
- WPA Personal vs WPA Enterprise
- WPA vs WPA2
- WPA and RSN key hierarchy
- Pairwise and group keys
- Key hierarchy
- Key derivation
- WPA implementation requirements
- Access points
- Network adaptors
- Client software
- WPA certification
- IEEE 802.11i and Wi-Fi Protected Access (WPA)
Advanced WiFi Training Part 6: Wi-Fi Deployment and Optimization
- Operating Frequencies and Signal Spectrum
- Frequency hopping
- Key Performance Indicators (KPI)
- Range
- Data rate and throughput
- Latency
- Security
- Others
- Project Planning
- Requirements
- Site Survey
- Coverage vs. Capacity
- AP Installation
- Network Traffic Analysis
Advanced WiFi Training Part 7: WiFi Coexistence with LTE, and 5G
- LTE vs Wi-Fi
- Scenarios where Wi-Fi is best
- Scenarios where LTE is best
- LTE-WiFi Aggregation (LWA)
- WiFi vs. Unlicensed LTE (LAA/eLAA/MulteFire)
- Listen Before Talk (LBT)
- WiFi and Spectrum Sharing
- WiFi in 5G
Advanced WiFi Training Wrap-up: Recap and Discussion
DCN PnTM-f