Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cwna

Download as pdf or txt
Download as pdf or txt
You are on page 1of 92
At a glance
Powered by AI
Some of the key topics covered in the document include wireless users, technologies, applications, advantages and disadvantages of wireless networks, wireless devices and standards, how wireless technology works, IEEE 802.11 physical and MAC layer standards.

The document covers topics related to wireless LAN administration including about the manual, setting student expectations, classroom setup, support, wireless users, technologies, applications, advantages and disadvantages. It also discusses wireless devices, standards, organizations, types of wireless LANs.

According to the document, some limitations of infrared WLAN systems include lack of mobility, limited range of coverage, confinement to indoor use, and slow speed of transmission.

PR

EV

IE

CWNA: Wireless LAN


Administration
Instructors Edition

NOT FOR PRINTING OR INSTRUCTIONAL USE

COPYRIGHT Axzo Press LLC

For more information go to www.axzopress.com.

Trademarks
ILT Series is a trademark of Axzo Press.

ALL RIGHTS RESERVED. No part of this work may be reproduced, transcribed, or used in any form or by any
meansgraphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution, or
information storage and retrieval systemswithout the prior written permission of the publisher.

Some of the product names and company names used in this book have been used for identification purposes only and
may be trademarks or registered trademarks of their respective manufacturers and sellers.

Disclaimer

PR

EV

IE

We reserve the right to revise this publication and make changes from time to time in its content
without notice.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction
Topic A:
Topic B:
Topic C:
Topic D:

Contents
v

About the manual............................................................................... vi


Setting student expectations .............................................................. xi
Classroom setup.................................................................................xv
Support............................................................................................. xviii

The wireless world

1-1

IE

Topic A: Wireless users ................................................................................... 1-2


Topic B: Wireless technologies ....................................................................... 1-5
Topic C: Wireless LAN applications.............................................................. 1-13
Topic D: Wireless advantages and disadvantages .......................................... 1-20
Unit summary: The wireless world ................................................................. 1-25

Wireless LAN devices and standards

2-1

EV

Topic A: WLAN devices ................................................................................. 2-2


Topic B: Standards ......................................................................................... 2-22
Topic C: Wireless organizations and agencies ............................................... 2-26
Topic D: Types of wireless LANs .................................................................. 2-32
Unit summary: Wireless LAN devices and standards..................................... 2-38

How wireless technology works

3-1

Topic A: Radio wave transmission principles ................................................. 3-2


Topic B: Radio frequency behavior and measurement................................... 3-12
Topic C: Antennas .......................................................................................... 3-24
Unit summary: How wireless technology works............................................. 3-35

IEEE 802.11 Physical layer standards

4-1

Topic A: Wireless modulation schemes........................................................... 4-2


Topic B: Physical layer standards................................................................... 4-18
Unit summary: IEEE 802.11 Physical layer standards.................................... 4-36

IEEE 802.11 MAC and Network layer standards

5-1

PR

Topic A: IEEE wireless LAN configurations .................................................. 5-2


Topic B: MAC layer standards ........................................................................ 5-7
Topic C: WLAN Network layer standards ..................................................... 5-33
Unit summary: IEEE 802.11 MAC and Network layer standards .................. 5-36

Planning and deploying a wireless LAN

6-1

Topic A: Planning for a wireless network ....................................................... 6-2


Topic B: Designing the wireless LAN............................................................ 6-12
Topic C: Deploying a wireless network ......................................................... 6-25
Topic D: Providing user support..................................................................... 6-28
Unit summary: Planning and deploying a wireless LAN ................................ 6-30

Conducting a site survey

7-1

Topic A: Site survey tools................................................................................ 7-2


Topic B: Performing a site survey .................................................................. 7-16
Unit summary: Conducting a site survey ........................................................ 7-30

NOT FOR PRINTING OR INSTRUCTIONAL USE

ii

CWNA: Wireless LAN Administration

Wireless LAN security and vulnerabilities

8-1

Topic A: Security principles............................................................................ 8-2


Topic B: Basic IEEE 802.11 security protections ........................................... 8-8
Topic C: Vulnerabilities of IEEE 802.11 security.......................................... 8-19
Topic D: Other wireless attacks...................................................................... 8-30
Unit summary: Wireless LAN security and vulnerabilities ............................ 8-34

Implementing wireless LAN security

9-1

Topic A: Wireless security solutions............................................................... 9-2


Topic B: Transitional security model............................................................. 9-12
Topic C: Personal security model .................................................................. 9-16
Topic D: Enterprise security model................................................................ 9-22
Unit summary: Implementing wireless LAN security .................................... 9-31

IE

Managing a wireless LAN

10-1

Topic A: Monitoring the wireless network..................................................... 10-2


Topic B: Maintaining the wireless network .................................................. 10-13
Topic C: Establishing a wireless security policy........................................... 10-25
Unit summary: Managing a wireless LAN .................................................... 10-31

Network settings and wireless LAN troubleshooting

11-1

EV

Topic A: Wired network settings and wireless LAN troubleshooting............ 11-2


Topic B: Troubleshooting wireless networks................................................ 11-12
Unit summary: Network settings and wireless LAN troubleshooting ........... 11-29

Personal, metropolitan, and wide area wireless networks

12-1

Topic A: Wireless personal area networks ..................................................... 12-2


Topic B: Wireless metropolitan area networks ............................................. 12-19
Topic C: Wireless wide area networks.......................................................... 12-26
Topic D: The future of wireless networks ..................................................... 12-29
Unit summary: Personal, metropolitan, and wide area wireless networks .... 12-31

CWNA exam objectives map

A-1

Topic A: Comprehensive exam objectives ...................................................... A-2

Setup options for Cisco Aironet access points

B-1

Topic A: Setup options.................................................................................... B-2

PR

Cisco access point configuration settings

C-1

Topic A: Configuration settings ...................................................................... C-2

Linksys access point configuration settings

D-1

Topic A: Configuration settings ...................................................................... D-2

Wireless Web sites

E-1

Topic A: Wireless Web sites ........................................................................... E-2

IEEE committees

F-1

Topic A: IEEE committees.............................................................................. F-2

Course summary

S-1

Topic A: Course summary............................................................................... S-2


Topic B: Continued learning after class .......................................................... S-5

NOT FOR PRINTING OR INSTRUCTIONAL USE

iii
G-1

Index

I-1

PR

EV

IE

Glossary

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

PR

EV

IE

iv

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

After reading this introduction, you will know


how to:

IE

A Use Course Technology ILT manuals in

general.

B Use prerequisites, a target student

description, course objectives, and a skills


inventory to properly set students
expectations for the course.

EV

C Set up a classroom to teach this course.


D Get support for setting up and teaching this

PR

course.

NOT FOR PRINTING OR INSTRUCTIONAL USE

vi

CWNA: Wireless LAN Administration

Topic A: About the manual

Course Technology ILT philosophy

Our goal at Course Technology is to make you, the instructor, as successful as possible.
To that end, our manuals facilitate students learning by providing structured interaction
with the software itself. While we provide text to help you explain difficult concepts,
the hands-on activities are the focus of our courses. Leading the students through these
activities will teach the skills and concepts effectively.

IE

We believe strongly in the instructor-led class. For many students, having a thinking,
feeling instructor in front of them will always be the most comfortable way to learn.
Because the students focus should be on you, our manuals are designed and written to
facilitate your interaction with the students, and not to call attention to manuals
themselves.

We believe in the basic approach of setting expectations, then teaching, and providing
summary and review afterwards. For this reason, lessons begin with objectives and end
with summaries. We also provide overall course objectives and a course summary to
provide both an introduction to and closure on the entire course.
Our goal is your success. We encourage your feedback in helping us to continually
improve our manuals to meet your needs.

EV

Manual components

The manuals contain these major components:


Table of contents
Introduction
Units

Appendices
Course summary
Glossary
Index

PR

Each element is described below.

Table of contents

The table of contents acts as a learning roadmap for you and the students.

Introduction

The introduction contains information about our training philosophy and our manual
components, features, and conventions. It contains target student, prerequisite,
objective, and setup information for the specific course. Finally, the introduction
contains support information.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

vii

Units

Units are the largest structural component of the actual course content. A unit begins
with a title page that lists objectives for each major subdivision, or topic, within the unit.
Within each topic, conceptual and explanatory information alternates with hands-on
activities. Units conclude with a summary comprising one paragraph for each topic, and
an independent practice activity that gives students an opportunity to practice the skills
theyve learned.
The conceptual information takes the form of text paragraphs, exhibits, lists, and tables.
The activities are structured in two columns, one telling students what to do, the other
providing explanations, descriptions, and graphics. Throughout a unit, instructor notes
are found in the left margin.
Appendices

IE

An appendix is similar to a unit in that it contains objectives and conceptual


explanations. However, an appendix does not include hands-on activities, a summary, or
an independent practice activity. We have also provided an appendix that lists all
CWNA exam objectives along with references to corresponding coverage in this
manual.
Course summary

EV

This section provides a text summary of the entire course. It is useful for providing
closure at the end of the course. The course summary also indicates the next course in
this series, if there is one, and lists additional resources students might find useful as
they continue to learn about the software.

Glossary

The glossary provides definitions for all of the key terms used in this course.

Index

PR

The index at the end of this manual makes it easy for you and your students to find
information about a particular software component, feature, or concept.

NOT FOR PRINTING OR INSTRUCTIONAL USE

viii

CWNA: Wireless LAN Administration

Manual conventions

Item

Description

Italic text

In conceptual text, indicates a new term or feature.

Bold text

In unit summaries, indicates a key term or concept. In


an independent practice activity, indicates an explicit
item that you select, choose, or type.

Code font

Indicates code or syntax.

IE

Instructor note/icon

Weve tried to keep the number of elements and the types of formatting to a minimum
in the manuals. We think this aids in clarity and makes the manuals more classically
elegant looking. But there are some conventions and icons you should know about.

Longer strings of
code will look
like this.

Instructor notes.

In the hands-on activities, any code thats too long to fit


on a single line is divided into segments by one or more
continuation characters (). This code should be
entered as a continuous string of text.
In the left margin, provide tips, hints, and warnings for
the instructor.

In the left column of hands-on activities, bold sans-serif


text indicates an explicit item that you select, choose,
or type.

EV

Select bold item

Keycaps like e

Indicate a key on the keyboard you must press.

Warning icon.

Warnings prepare instructors for potential classroom


management problems.

Tip icon.

Tips give extra information the instructor can share


with students.

PR

Setup icon.

Projector icon.

Setup notes provide a realistic business context for


instructors to share with students, or indicate additional
setup steps required for the current activity.
Projector notes indicate that there is a PowerPoint slide
for the adjacent content.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

ix

Hands-on activities

Do it!

A-1:

Creating a commission formula

Heres how
1 Open Sales

Heres why

This is an oversimplified sales compensation


worksheet. It shows sales totals, commissions,
and incentives for five sales reps.

IE

Take the time to make


sure your students
understand this
worksheet. Well be here a
while.

The hands-on activities are the most important parts of our manuals. They are divided
into two primary columns. The Heres how column gives short directions to the
students. The Heres why column provides explanations, graphics, and clarifications.
To the left, instructor notes provide tips, warnings, setups, and other information for the
instructor only. Heres a sample:

2 Observe the contents of cell F4

The commission rate formulas use the name


C_Rate instead of a value for the commission
rate.

EV

For these activities, we have provided a collection of data files designed to help students
learn each skill in a real-world business context. As students work through the activities,
they will modify and update these files. Of course, students might make a mistake and
therefore want to re-key the activity starting from scratch. To make it easy to start over,
students will rename each data file at the end of the first activity in which the file is
modified. Our convention for renaming files is to add the word My to the beginning
of the file name. In the above activity, for example, students are using a file called
Sales for the first time. At the end of this activity, they would save the file as My
sales, thus leaving the Sales file unchanged. If students make mistakes, they can start
over using the original Sales file.

PR

In some activities, however, it might not be practical to rename the data file. Such
exceptions are indicated with an instructor note. If students want to retry one of these
activities, you will need to provide a fresh copy of the original data file.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

PowerPoint presentations

The Course ILT PowerPoint add-in

Each unit in this course has an accompanying PowerPoint presentation. These slide
shows are designed to support your classroom instruction while providing students with
a visual focus. Each presentation begins with a list of unit objectives and ends with a
unit summary slide. We strongly recommend that you run these presentations from the
instructors station as you teach this course. A copy of PowerPoint Viewer is included,
so it is not necessary to have PowerPoint installed on your computer.

The CD also contains a PowerPoint add-in that enables you to do two things:
Create slide notes for the class

Display a control panel for the Flash movies embedded in the presentations

EV

IE

To load the PowerPoint add-in:


1 Copy the Course_ILT.ppa file to a convenient location on your hard drive.
2 Start PowerPoint.
3 Choose Tools, Macro, Security to open the Security dialog box. On the Security
Level tab, select Medium (if necessary), and then click OK.
4 Choose Tools, Add-Ins to open the Add-Ins dialog box. Then, click Add New.
5 Browse to and select the Course_ILT.ppa file, and then click OK. A message
box will appear, warning you that macros can contain viruses.
6 Click Enable Macros. The Course_ILT add-in should now appear in the
Available Add-Ins list (in the Add-Ins dialog box). The x in front of
Course_ILT indicates that the add-in is loaded.
7 Click Close to close the Add-Ins dialog box.

After you complete this procedure, a new toolbar will be available at the top of the
PowerPoint window. This toolbar contains a single button labeled Create SlideNotes.
Click this button to generate slide-notes files in both text (.txt) and Excel (.xls) format.
By default, these files will be saved to the folder that contains the presentation. If the
PowerPoint file is on a CD-ROM or in some other location to which the slide-notes files
cannot be saved, you will be prompted to save the presentation to your hard drive and
try again.

PR

When you run a presentation and come to a slide that contains a Flash movie, you will
see a small control panel in the lower-left corner of the screen. You can use this panel to
start, stop, and rewind the movie, or to play it again.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

xi

Topic B: Setting student expectations

Properly setting students expectations is essential to your success. This topic will help
you do that by providing:
Prerequisites for this course
A description of the target student

A list of the objectives for the course


A skills assessment for the course

Course prerequisites

IE

Students taking this course should be familiar with personal computers and the use of a
keyboard and a mouse. Furthermore, this course assumes that students have basic
knowledge of computer networks.

Target student

This book is intended to meet the needs of students and professionals who want to
master wireless local area networks. It is also designed to prepare students for the
Certified Wireless Network Administrator (CWNA) exam.

EV

Course objectives

You should share these overall course objectives with your students at the beginning of
the day. This will give the students an idea about what to expect, and it will help you
identify students who might be misplaced. Students are considered misplaced when they
lack the prerequisite knowledge or when they already know most of the subject matter
to be covered.
Note: In addition to the general objectives listed below, specific CWNA exam
objectives are listed at the beginning of each topic. For a complete mapping of exam
objectives to course content, see Appendix A.
After completing this course, students will know how to:

PR

Explain how wireless technology is used every day in education, business,


travel, and a variety of industries, and identify the advantages and disadvantages
of wireless networks.
List and explain the types of devices that are used in a wireless network, and
describe wireless standards organizations and regulatory agencies.
Describe the principles of radio wave transmission, describe how radio
frequency works and can be measured, and identify antennas and the role they
play in wireless transmissions.
Identify wireless modulation schemes, and identify the Physical layer standards
of the IEEE 802.11b/a/g/pre-N networks.
Identify the different types of WLAN configurations, and explain how IEEE
802.11 MAC and Network layers are implemented.
Plan for a WLAN, design and deploy the network, and provide user support.
Explain the process of surveying a site for a WLAN, and identify the tools and
procedures used to gather data and perform the survey.

NOT FOR PRINTING OR INSTRUCTIONAL USE

xii

CWNA: Wireless LAN Administration


Define wireless security and basic security protections of the IEEE 802.11
standard, identify the vulnerabilities of the IEEE 802.11 standard, and identify
types of attacks that are launched against wireless networks.
Identify the three models that should be used for securing a WLAN.

Monitor and maintain a WLAN, and explain the importance of a wireless


security policy.

PR

EV

IE

Identify the wired network connection between a wireless network and a wired
network, and troubleshoot and solve problems with WLANs.
Identify types of wireless networks besides LANs, and identify trends in the
future of wireless networks.

NOT FOR PRINTING OR INSTRUCTIONAL USE

xiii

Introduction

Skills inventory

Use the following form to gauge students skill levels entering the class (students have
copies in the introductions of their student manuals). For each skill listed, have students
rate their familiarity from 1 to 5, with five being the most familiar. Emphasize that this
is not a test. Rather, it is intended to provide students with an idea of where theyre
starting from at the beginning of class. If a student is wholly unfamiliar with all the
skills, he or she might not be ready for the class. A student who seems to understand all
of the skills, on the other hand, might need to move on to the next course in the series.
Skill

Identifying how wireless technology is used in education.

IE

Identifying how wireless technology is used in business.


Identifying how wireless technology is used in travel.

Identifying how wireless technology is used in industry.


Identifying advantages of wireless networks.

Identifying disadvantages of wireless networks.

EV

Listing the types of devices that are used in a wireless network.


Identifying wireless standards organizations.
Identifying wireless regulatory agencies.
Explaining different types of WLANs.

Describing radio wave transmission principles.


Describing how radio frequency works.
Measuring radio frequency.
Identifying antennas.

PR

Describing the role that antennas play in wireless transmissions.


Identifying wireless modulation schemes.
Identifying the Physical layer standards of the IEEE
802.11b/a/g/pre-N networks.
Identifying the different types of WLAN configurations.
Describing the MAC layer of the IEEE 802.11 standards.
Describing the Network layer of the IEEE 802.11 standards.
Planning for a WLAN.

NOT FOR PRINTING OR INSTRUCTIONAL USE

xiv

CWNA: Wireless LAN Administration


Skill

Deploying a wireless network.

Designing a wireless network.

Identifying ways to provide support for users of wireless networks.


Describing the process of surveying a site for a WLAN.

Identifying the tools and procedures used to gather data for a


WLAN site survey.
Performing a site survey for a WLAN.

IE

Defining wireless security.

Identifying basic security protections of the IEEE 802.11 standard.


Identifying vulnerabilities of the IEEE 802.11 standard.

Listing the types of attacks that are launched against wireless


networks.

EV

Identifying the three security models that should be used for


securing a WLAN.
Monitoring a WLAN.

Maintaining a WLAN.

Implementing a wireless security policy.

Describing the wired network connection between a wireless


network and a wired network.
Troubleshooting and solving problems with WLANs.

Identifying other types of wireless networks besides LANs.

PR

Describing the future of wireless networks.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

xv

Topic C: Classroom setup

All our courses assume that each student has a personal computer to use during the
class. Our hands-on approach to learning requires they do. This topic gives information
on how to set up the classroom to teach this course. It includes minimum requirements
for the students personal computers, setup information for the first time you teach the
class, and setup information for each time that you teach after the first time you set up
the classroom.

Hardware requirements

Each students personal computer should have:

IE

A keyboard and a mouse


At least 256 MB RAM

Hard-disk space requirement


Monitor requirement (SVGA at 1024768)

Cisco Aironet 1100 or 1200 series access point with an 802.11b, a, or g radio
installed
Linksys G Wireless-G router

EV

Wi-Fi certified IEEE 802.11b, a, or g wireless network adapter (the adapter


standard must match that of the access point)
In addition to the above components, following specialized hardware is required in the
units indicated:
Cisco Aironet IEEE 802.11b, a, or g Wireless CardBus Adapter (for the unit
titled How wireless technology works)
USB flash drive (for the unit titled Network settings and wireless LAN
troubleshooting)
Network computers with IrDA ports (for the unit titled Personal, metropolitan,
and wide area wireless networks)

Software requirements

You will need the following software:

PR

Windows XP Professional or Home Edition


Free downloadable software is required in the following units. Instructions for
downloading the software are given in each unit.
Unit titled The wireless world: Gelon Wapalizer
Unit titled Wireless LAN devices and standards: Cisco IP Setup Utility
Unit titled How wireless technology works: Cisco Aironet Utilities
Unit titled IEEE 802.11 Physical layer standards: NetStumbler
Unit titled Planning and deploying a wireless LAN: Wi-Fi WLAN
Benefits Calculator
Unit titled Wireless LAN security and vulnerabilities: KLC Consulting
SMAC

NOT FOR PRINTING OR INSTRUCTIONAL USE

xvi

CWNA: Wireless LAN Administration

Network requirements
The following network components and connectivity are also required for this course:

First-time setup instructions

Internet access, for the following purposes:


Downloading the latest critical updates and service packs from
www.windowsupdate.com
Completing activities
Downloading the Student Data files from www.courseilt.com (if necessary)

EV

IE

The first time you teach this course, you will need to perform the following steps to set
up each student computer.
1 Install Windows XP on an NTFS partition according to the software
manufacturers instructions. If the student machines have Internet access, and
they are behind a software or hardware firewall, install the latest critical updates
and service packs from www.windowsupdate.com.
2 If necessary, create Internet accounts for the students for Web access.
3 If you dont have the data CD that came with this manual, download the Student
Data files for the course. You can download the data directly to student
machines, to a central location on your network, or to a disk.
a Connect to www.courseilt.com/instructor_tools.html.
b Click the link for Networking to display a page of course listings, and then
click the link for CWNA: Wireless LAN Administration.
c Click the link for downloading the Student Data files, and follow the
instructions that appear on your screen.

Setup instructions for every class

Every time you teach this course (including the first time), you will need to perform the
following steps to set up each student computer.
1 If necessary, reset any defaults that have been changed in previous classes.
Refer to the appendix titled Setup options for Cisco Aironet access points
for information on resetting the Cisco AP.

PR

Refer to the documentation for the Linksys AP for resetting it to defaults.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Introduction

xvii

CertBlaster exam preparation for CWNA certification

PR

EV

IE

Students interested in attaining CWNA certification can download CertBlaster exam


preparation software from the Course ILT Web site. To do so:
1 Go to www.courseilt.com/certblaster.
2 Click the link for CWNA.
3 Save the .EXE file to a folder on your hard drive. (Note: If you skip this step, the
CertBlaster software will not install correctly.)
4 Click Start and choose Run.
5 Click Browse and then navigate to the folder that contains the .EXE file.
6 Select the .EXE file and click Open.
7 Click OK and follow the on-screen instructions.

NOT FOR PRINTING OR INSTRUCTIONAL USE

xviii

CWNA: Wireless LAN Administration

Topic D: Support

Phone support

Your success is our primary concern. If you need help setting up this class or teaching a
particular unit, topic, or activity, please dont hesitate to get in touch with us. Please
have the name of the course available when you call, and be as specific as possible
about the kind of help you need.

You can call for support 24 hours a day at (888) 672-7500. If you do not connect to a
live operator, you can leave a message, and we pledge to return your call within 24
hours (except on Saturday and Sunday).

IE

Web-based support

PR

EV

The Course ILT Web site provides several instructors tools for each course, including
course outlines and answers to frequently asked questions. To download these files, go
to www.courseilt.com/instructor_tools.html. For additional Course ILT resources,
including our online catalog and contact information, go to http://www.course.com/ilt.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Unit 1
The wireless world

11

Unit time: 60 minutes

Complete this unit, and youll know how to:

IE

A Identify how wireless technology is used in

everyday life.

B Identify some popular wireless

technologies.

C Identify how different sectors of the

economy are using wireless technology.

D Identify advantages and disadvantages of

PR

EV

wireless technologies.

NOT FOR PRINTING OR INSTRUCTIONAL USE

12

CWNA: Wireless LAN Administration

Topic A: Wireless users

This topic covers the following CWNA exam objective:


#

Objective

4.1.1

Identify technology roles for which wireless LAN technology is appropriate:


Corporate data access and end-user mobility

Mobile office networking

Network extension to remote areas

Educational/classroom use

Building-to-building connectivitybridging

Industrialwarehousing and manufacturing

Last-mile data deliverywireless ISP

Healthcarehospitals and offices


Hotspotspublic network access

IE

Small office/home office (SOHO) use

A day in the life of a typical user


Explanation

Sometimes its easy to overlook the extent to which wireless devices are used today. A
day in the life of a typical user, Amanda Lomax, can reveal just how widespread the use
of wireless technology has become.
At home

EV

Amanda heads back to her house after an early morning workout at the gym. As a
pharmaceutical sales representative, she has a busy day ahead. She grabs her laptop
computer to check her e-mail while she drinks her coffee on the deck. Amandas home
laptop computer is connected to the other computers in the house and even to the
Internet through a wireless local area network (WLAN).

PR

A WLAN is essentially identical to a standard local area network (LAN) except that in a
WLAN, the devices are not connected by wires. With a WLAN, Amanda can access the
Internet and her home network from any room in her house without any cables between
her computer and the Internet connection. She can even use her laptop computer on the
back deck or in the yard. This flexibility makes Amanda more productive because she
can take her work with her. Last week while a repairperson was replacing a window in
her study, she was able to participate in a videoconference session while sitting at the
kitchen table. Without a WLAN, Amanda would have been forced to cancel the session.
As she finishes her coffee, Amanda hears the front doorbell ring. Because she and her
husband have installed a tiny wireless camera over each door, she can open a Web
browser and see whos at the door.
Note: The American Airlines Center in Dallas, an indoor arena, provides its security
personnel with wireless handheld devices. As the security guards move around the
arena, they can access any of the 180 WLAN security cameras that cover more than 1
million square feet of the facility.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

13

In the car

As Amanda drives to her office, she needs to make a quick phone call to confirm her
morning appointment. Amandas car is equipped with hands-free cellular calling based
on the Bluetooth wireless standard. Amanda first turns on her Bluetooth-enabled cell
phone to pair it with the Bluetooth device in the car. She can then control the phone with
buttons on her steering wheel. Amanda presses the Talk button on the steering wheel
and says aloud the name of the person shes calling. Her cell phone dials the number
that is stored in the cars phone book. The dialing and caller information, as well as
signal and battery strength indicators, appears on her cars instrument panel. Once the
person answers the call, Amanda can talk hands-free. The Bluetooth system also works
with the cars navigation system, so Amanda can auto-dial phone numbers associated
with local points of interest, such as hotels and restaurants.

IE

Note: Over 2,000 computer, telephone, and peripheral vendors have agreed to create
products based on the Bluetooth standard.
At the office

Amanda checks in at the main office before calling on her clients. She needs some
information stored on a server at another, smaller office, situated about 25 miles away.
She opens up her wireless laptop at her desk, and when the screen prompts her, she
places her index finger on a small scanner that checks her fingerprint to ensure that she
has the right to access the corporate network. She logs on, finds the information she
needs, and prints it.

EV

The two offices are connected by fixed broadband wireless technology for data
communications. Unlike many wireless technologies that allow for mobility, fixed
wireless refers to wireless transmissions occurring between devices that cannot be
mobiletypically between two or more office buildings that obviously cannot be
moved. A small customized antenna is located on the roof of both the main building and
the smaller office building. Each antenna serves as a relay point between the two
buildings. Because the fixed broadband wireless system is part of the computer network
in each building, users can transparently access data from remote locations by using
their office computers or even portable laptops that are part of the WLAN.

Because of recent growth, Amandas company had to lease temporary office space in a
building across the street from the main office. To connect these two buildings,
Amandas company installed a technology known as free space optics (FSO). FSO is an
alternative to high-speed fiber-optic transmissions.

PR

In the field

Amanda heads out to her first appointment. She parks her car in front of the medical
center, and as she walks toward the front door she pulls her handheld device out of her
purse to see if she received an e-mail message with additional information she requested
earlier that morning. The device connects to the nearest cell tower, which then connects
to the local telephone company and then calls her local Internet provider to complete the
connection to the e-mail server. The e-mail messages are sent back to Amanda and
displayed on her device.

NOT FOR PRINTING OR INSTRUCTIONAL USE

14

CWNA: Wireless LAN Administration


On site

Amanda is visiting the medical centers director to discuss a new technology her
pharmaceutical company is implementing. Drugs will now be shipped from the
pharmaceutical warehouse to the medical center in large containers that have radio
frequency identification (RFID) tags affixed to them. RFID has been called an
electronic barcode. Like traditional barcodes, RFID tags are used to identify items.
Unlike barcodes, which must be right next to the scanner and perfectly aligned to be
read, RFID tags can be read if they are anywhere within the range of a transmitted radio
signal, depending on the device.

Do it!

A-1:

IE

Not only will Amandas pharmaceutical company be using RFID tags to identify
shipping containers, but it will also be embedding these tags on the underside of
individual labels on its drug products. In this way, the company hopes to identify
counterfeit drugs and to more precisely keep track of its products as they move through
the supply chain.

Viewing a WAP emulator

Heres how

1 Open a Web browser

You will use a WAP emulator to see what a


typical Web page might look like on a WAP cell
phone.
To access the Web page.

EV

Enter the following URL:

Heres why

gelon.net/about/wapalizer.html

2 In the Wapalizer box, enter http://www.Microsoft.com


3 Click Wapalize

A window opens that shows how the Web site


will look on a WAP-enabled cell phone.

4 Click the cell-phone buttons in the


image

To navigate through the Web site. Notice that it


is more difficult to navigate this way than by
using a computer-based Web browser.

5 Close the window

PR

Enter another address in the


Wapalizer box

Be aware that not all Web sites have been


designed with WAP in mind.

6 Close all open windows

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

15

Topic B: Wireless technologies


Wireless technology is woven throughout Amandas day. Many of Amandas tasks
could not have been completedmuch less attemptedwithout wireless technology.
This section introduces some of the wireless technologies that supported Amandas
tasks. Before you learn details about wireless LANs, it will be useful to get an overview
of some of the current wireless technologies.

Explanation

Wireless local area networks (WLANs)

IE

Amandas home WLAN, also known as Wi-Fi (Wireless Fidelity), is based on a


standard that transmits at up to 11 Mbps (millions of bits per second) over a distance of
up to 112 meters (375 feet). Amanda and her husband Brian want to upgrade to a newer
standard that will allow their network to transmit up to 108 Mbps and will not receive
interference from their portable telephones. (Youll learn about these standards in
another unit.)

PR

EV

The list of equipment needed for a wireless LAN is actually very short. Each computer
on the WLAN must have a wireless network interface card (wireless NIC, also called a
wireless adapter) installed. This card performs the same basic functions as a standard
NIC in that it allows the device to communicate on the network. Yet there are some
differences between a wireless NIC and a wired NIC. Instead of an RJ-45 connection
used to accept a patch cable, a wireless NIC contains an antenna to send and receive the
wireless signals. Also, a wireless NIC performs additional tasks, such as encrypting and
decrypting data. A wireless NIC is shown in Exhibit 1-1.

Exhibit 1-1: Wireless network interface card

NOT FOR PRINTING OR INSTRUCTIONAL USE

16

CWNA: Wireless LAN Administration

IE

The wireless NIC sends its signals through radio waves to an access point (AP). The
access point acts as a base station to receive the signals and to transmit signals back to
the wireless NICs in the other wireless devices. An access point is shown in Exhibit 1-2.

Exhibit 1-2: Access point

PR

EV

A patch cable connects the access point to a wired LAN or to the Internet. Through this
wired connection, the access point and the wireless devices associated with it can
communicate with the devices connected to the wired network, such as servers, printers,
and even other access points and the wireless devices connected to them. The access
point is fixed in one place (although it can be moved when necessary). The devices with
wireless NICs can move around while remaining connected. A WLAN is illustrated in
Exhibit 1-3.

Exhibit 1-3: Wireless LAN

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

17

Amandas WLAN connects her laptop computer, her husbands desktop computer, and
the laser printer. The WLAN also connects them to the Internet, so Amanda can check
her e-mail from any room in the house. When Amanda and Brian upgrade to the faster
WLAN, they will also wirelessly connect their stereo system and television to the
network.

EV

IE

This will allow them to view pictures stored on their computer on the larger TV screen
and to play MP3 music stored on their computer through the stereo system. Amandas
home WLAN is illustrated in Exhibit 1-4.

PR

Exhibit 1-4: Home wireless LAN

NOT FOR PRINTING OR INSTRUCTIONAL USE

18

CWNA: Wireless LAN Administration

Bluetooth

IE

Amanda used a Bluetooth cell phone in her car. Bluetooth is a low-power wireless
technology for data and voice transmission. Bluetooth can be used anywhere a small
stream of data needs to flow. Bluetooth devices communicate using small radio
transceivers called radio modules built onto microprocessor chips. Each Bluetooth
device also uses a link manager, which is software that helps identify other Bluetooth
devices, creates the links between the devices, and sends and receives data. A Bluetooth
device can transmit data at up to 1 Mbps over a distance of 10 meters (33 feet).
Bluetooth devices can send data through physical barriers, like walls, and can send data
to one or more devices at the same time. The devices dont even have to be aimed at
each other. Exhibit 1-5 shows a Bluetooth device.

EV

Exhibit 1-5: Bluetooth device

Bluetooth is named after the tenth-century Danish king Harald Bluetooth, who was
responsible for unifying Scandinavia.

When two Bluetooth devices come within range of each other, they automatically make
a connection. One device is called the master, which controls all of the wireless traffic.
The other device is known as a slave, which is controlled by the master. A Bluetooth
network that contains one master and at least one slave forms a piconet.
Bluetooth support is integrated into Microsoft Windows XP Service Pack 2 (SP2).

Telecommunications links

PR

Through the years, Amandas company tried a variety of connections to link its offices.
In the early days, the company used telephone modems, but those were too slow. Next,
expensive transmission lines were leased from the local telephone company. Integrated
Services Digital Networks (ISDN), which transmit at 256 Kbps (kilobit, or thousand
bits, per second), were soon replaced with T-1 lines, which transmit at 1.544 Mbps.
However, these lines had to be leased at a cost of several thousand dollars per month.
Technologies such as cable modems, which use a television cable connection, and
digital subscriber lines (DSL), which use telephone lines, were available only in
residential areas.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

19

Amandas company currently uses two main wireless technologies: fixed broadband and
free space optics (FSO).

With fixed broadband, also known as WiMax, the signal is transmitted between
the antennas of the buildings at speeds of up to 75 Mbps and at distances of up
to 53 kilometers (35 miles).

IE

FSO can transmit at speeds of up to 1.25 Gbps (gigabits, or billion bits, per
second) over a distance of 6.4 kilometers (4 miles). Transmissions are sent
through the open air by low-powered infrared beams. These beams, which do
not harm the human eye, are received by transceivers, shown in Exhibit 1-6.

Exhibit 1-6: Free space optics transceiver

PR

EV

Because FSO is a line-of-sight technology, the transceivers are mounted in the middle
or upper floors of office buildings to provide a clear transmission path. However, unlike
other wireless technologies, such as WiMax, that require the units to be located on an
open roof, FSO transceivers can be mounted behind a window in the offices. Amandas
office wireless technologies are illustrated in Exhibit 1-7.

Exhibit 1-7: Wireless office technologies

NOT FOR PRINTING OR INSTRUCTIONAL USE

110

CWNA: Wireless LAN Administration

Cellular telephony

IE

Messages sent to Amandas handheld device are based on Global Systems for Mobile
(GSM) communications technology. GSM coverage includes most of the United States
as well as parts of Europe and Japan and provides transmission speeds of up to 9.6
Kbps. The information transmitted is based on the Wireless Application Protocol
(WAP). WAP provides a standard way to transmit, format, and display Internet data for
devices like cell phones and handheld devices. With traditional computers, software
known as a Web browser runs on a local computer to display Internet data. The Web
browser requests a Web page from the World Wide Web file server. That page is
transmitted back to the Web browser in Hypertext Markup Language (HTML), which is
the standard language for displaying content on the Internet. This model is illustrated in
Exhibit 1-8.

EV

Exhibit 1-8: Browsing the World Wide Web

When a Web server sends a Web page back to a PC, the server is only sending HTML
code. The Web browser is responsible for interpreting that code and displaying the
results.

PR

WAP follows this standard Internet model with a few variations. A WAP cell phone
runs a tiny browser program called a microbrowser that uses Wireless Markup
Language (WML) instead of HTML. WML is designed to display text-based Web
content on the small screen of a cell phone or handheld device. However, because the
Internet standard is HTML, a WAP gateway (sometimes called a WAP proxy) must
translate between WML and HTML. The WAP gateway takes the Web page sent from
the Web server in HTML code and changes it to WML before forwarding it to the cell
phone. This WAP model is illustrated in Exhibit 1-9.

Exhibit 1-9: WAP communications

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

111

Radio frequency identification (RFID)

As noted earlier, radio frequency identification (RFID) is like an electronic barcode,


used to relay information about an object. However, there are several differences
between RFID and barcodes. Barcodes contain information that can only identify the
product and its manufacturer. For a barcode to be read, it must be aligned precisely with
a barcode reader. RFID tags can contain larger amounts of information about an item,
such as where it was manufactured, its expiration date, and where it was purchased. And
unlike printed barcodes, RFID information can be updated. In addition, this information
is transmitted via radio waves, so the tag does not have to be precisely aligned with a
reader for the information to be collected.

EV

IE

An RFID tag is tiny. Exhibit 1-10 shows an RFID tag relative to the size of a penny.
Depending on the type of RFID tag, the range at which it transmits signals is typically
about 0.3 meters (1 foot) at 5 Mbps.

Exhibit 1-10: RFID tag

PR

The Mexico City attorney generals office has implanted RFID tags in the upper arm of
each staff member, just under the persons skin. The tag is used to restrict access to the
attorney generals headquarters. As a staff member nears a locked door, the tag emits a
special code that causes the door to open.

NOT FOR PRINTING OR INSTRUCTIONAL USE

112

CWNA: Wireless LAN Administration

Wireless technology categories

Wireless technologies are generally classified into three categories, based on


transmission distance. Wireless personal area networks (WPANs) cover technologies
where the transmission generally extends up to 3 meters (10 feet). The transmission for
wireless local area networks (WLANs) is generally restricted to 112 meters (375 feet).
Wireless wide area networks (WWANs) transmit from 152 meters (500 feet) to 120
kilometers (75 miles). The following table summarizes the wireless technologies that
Amanda uses in a typical day.
Category

Transmission
distance

Speed

Bluetooth

WPAN

10 meters/33 feet

1 Mbps

Free space optics

WWAN

6.4 kilometers/4 miles

1.25 Gbps

Global Systems for Mobile communication

WWAN

Nationwide

9.6 Kbps

Radio frequency identification

WPAN

.3 meter/1 foot

5 Mbps

WiMax

WWAN

53 kilometers/35 miles

75 Mbps

WLAN

112 meters/375 feet

11 Mbps

IE

Wireless technology

Wireless local area network

Do it!

EV

All of the categories of wireless telecommunicationsWPANs, WLANs, and


WWANsare important in todays world and cover a broad range of technologies. In
this course, we will focus on the most common wireless telecommunications
technology: wireless LANs.

B-1:

Identifying wireless technologies

Questions and answers

1 Which wireless technologies fall into the WPAN category?


Bluetooth and RFID.

PR

2 WiMax is a line-of-sight technology. True or false?

False. FSO is a line-of-sight technology that uses infrared beams, but WiMax uses antennas.

3 GSM communications transmit information based on what porotocol?


WAP.

4 RFID uses infrared technology to transmit information. True or false?


False. RFID uses radio waves.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

113

Topic C: Wireless LAN applications

This topic covers the following CWNA exam objectives:


#

Objective

2.1.1

Identify some of the uses for spread spectrum technologies:


Wireless LANs
Wireless PANs
Wireless MANs
Wireless WANs

IE

Identify technology roles for which wireless LAN technology is appropriate:


Corporate data access and end-user mobility

Mobile office networking

Network extension to remote areas

Educational/classroom use

Building-to-building connectivitybridging

Industrialwarehousing and
manufacturing

Last-mile data deliverywireless ISP

Healthcarehospitals and offices

Small office/home office (SOHO) use

Hotspotspublic network access

EV

4.1.1

Examples of WLAN applications

Explanation

WLAN applications can be found in every industry with employees who need the
freedom to conduct business without being confined to a specific location. This section
describes how some leading industries use wireless technology.

Education

PR

Wireless LANs are an ideal technology for colleges and schools. In fact, educational
institutions were some of the first adopters of WLANs because of their dramatic
advantages in teaching and learning. Teachers can create classroom presentations on the
laptop computers in their offices and then carry the computers right into the classroom.
The teachers do not have to spend time plugging and unplugging cables to attach to the
campus data network. Instead, their laptop devices automatically make the wireless
connection as the teachers walk into the classrooms. In settings where students bring
their own wireless devices to class, teachers can send handouts directly to students
sitting in the classroom.
WLAN connections also offer students an important degree of freedom. Students no
longer have to go to a specific computer lab or the library in order to access the schools
computer network. Instead, they can access the school network wirelessly from almost
any location on campus. And as they move to different classrooms in different
buildings, students can remain connected to the network.

NOT FOR PRINTING OR INSTRUCTIONAL USE

114

CWNA: Wireless LAN Administration

EV

IE

Most schools publish maps, like that shown in Exhibit 1-11, that show the location of
wireless access points and the coverage areas in buildings across campus. Schools that
require students to own a laptop computer are now requiring that those computers have
wireless network interface cards. This wireless education model makes computing
resources available from anywhere and at any time.

Exhibit 1-11: Locations of campus access points

WLAN technology can help colleges save money. Traditional classrooms become fully
accessible computer labs without the expense of additional wiring and infrastructure.
And colleges no longer have to consider the expense of adding multiple open computer
labs for students, because everyone can access the resources no matter where they are
on campus.

PR

One university issued a policy prohibiting students from running their own private WiFi networks in the schools campus housing. These unregulated hotspots were
interfering with the universitys own wireless service, according to the university. The
policy was later lifted because it was not clear that the university had the legal right to
ban the private equipment.

Business

WLAN technologies have significantly changed how business is conducted. No longer


are meetings held only in conference rooms, where employees are away from the data
they need to make decisions. With wireless technologies, employees dont have to
remember to bring a patch cable or try to find a free port to connect to the network.
Instead, they can bring their wireless laptop computers to the conference room and
remain connected to the network and their data. The ability to access data to make
decisions whenever and wherever the need arises is critical.
Wireless technologies also allow businesses to create an office in a space where the
traditional infrastructure doesnt exist. Typically, for an office space to be useful, it
must be wired with computer cables for network connections. With WLANs, this
expensive cabling infrastructure is no longer necessary.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

115

This means that usable office space can be created almost immediately with little
expense. For example, a hotel conference room that might not have the infrastructure to
support a wired network can quickly be turned into a wireless networked office
environment.

Because WLANs are becoming so widespread, computer giant IBM and cell-phone
vendor Nokia are teaming up to make it easier for a companys employees to move
from a WLAN hotspot to an area of GSM coverage while remaining connected to the
network.
Travel

IE

Because traveling is all about mobility, the travel industry has perhaps adopted wireless
technologies more than any other sector of the economy. Most large airport terminals
provide wireless hotspots. For free or for a nominal fee, waiting passengers with
wireless laptops can surf the Internet or read e-mail. Several major airports are also
using RFID technology to keep track of passenger luggage. One airport reported that the
number of lost bags in the airport terminal was reduced by 96% by using RFID
technology.
The U.S. airports with the most wireless hotspots are (in order) Dallas-Fort Worth, New
York (LaGuardia), Atlanta, Chicago (OHare), and Baltimore/Washington.

EV

Even the airplanes themselves are offering wireless connection. Several large airlines
are now providing wireless capabilities to passengers during flights. Like their earthbound counterparts, these passengers can access the Internet or view their corporate data
from their seats at 30,000 feet.
Wireless technology, however, goes beyond serving just the passenger. Some airlines
use WLAN technology to communicate with the aircraft after it has parked or when its
taxiing on the ground. This allows the airline to automatically upload and install
software updates for onboard computers or the avionics system before the next flight.
Other airlines are using WLAN technology for flight maintenance information. Aircraft
maintenance personnel with a WLAN laptop can have immediate access to an online
database that stores important information about each type of aircraft and maintenance
procedures. This information is much more current than that found in printed manuals.

PR

The communications between air traffic controllers and aircraft typically use voice radio
systems that havent changed much in 50 years. Important communications about the
weather or route changes between pilots and company dispatchers or air traffic
controllers use overcrowded voice radio circuits that resemble an old-fashioned partyline telephone system. Many of these connections are of poor quality. Some airlines are
using a new wireless data service to send and receive messages.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

C-1:

Do it!

Locating area hotspots

Heres how

Heres why

1 Open a Web browser


Go to www.wi-fi.org
2 Click Wi-Fi Zone
3 Click Zone Finder

Or, if you are in another country, enter as much


information as necessary to find a hotspot.

IE

4 Under Search By Location, enter


your ZIP code

You will use the Wi-Fi.org Web site to locate


wireless hotspots in your area.

116

Specify a Distance Radius of 10


miles
Click Go!

Not all sites are registered with Wi-Fi.org, so


you might not find a hotspot there even if there
is one nearby. Therefore, you should try another
source if you didnt find any sites.

EV

5 If no sites were found, try


increasing the radius

6 Go to maps.yahoo.com
Enter your ZIP code

This is another source you can check for


hotspots.
Or enough information to display a map of the
area you want to search.

Click Get Map

7 Select Wi-Fi Hotspots

This radio button might be at the bottom of the


page or to the right of the map.

8 Point to a hotspot icon

The name of the business, school, or other entity


is shown.

Click the hotspot icon

To display the menu.

Click Wi-Fi- Hotspot Details

Information about the hotspot is listed if it was


provided by the establishment with the hotspot.
Otherwise, youll see only brief information
about the establishment that has the hotspot.

PR

If there are no hotspots in


your area, you can have
students enter 14623 for
the zip code. There are
several hotspots in that
area.

9 Compare the results of these two


tools

One probably has more information than the


other.

10 Close the Web browser

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

117

Construction

Although at first glance the construction industry might not seem to be a prime
candidate for wireless technologies, it benefits greatly. This is because one part of the
construction process must be completed before the next part can begin. For example, if
the concrete footings for a new building cannot be poured, then the entire project must
be put on hold. This often means idling construction employees or trying to reschedule
at a moments notice. In addition, construction employees often have to travel to several
job sites in one day. This makes paperwork management difficult. Pay sheets must be
manually filled out by several supervisors and dropped off at the office late at night. The
next day, payroll clerks often wrestle with scrawled or illegible notes and cannot contact
the supervisors for clarification.

IE

Wireless technology is a real plus for the construction industry. Supervisors can enter
timesheet information on a laptop computer and have the information immediately
transmitted via WLAN to the main office in the construction trailer on the job site.
Information from the job site, such as a problem with materials or a tardy subcontractor,
can be instantly relayed back to the main office for rescheduling of workers to other
sites to prevent idle time.

EV

In addition, construction equipment such as bulldozers and earth graders are being fitted
with wireless terminals to turn them into smart equipment. A GPS (global positioning
system) device on a bulldozer can provide location information to within centimeters.
The exact location of the bulldozer and where it should be digging can be transmitted to
a terminal on the bulldozer, which displays a color-coded map to guide the operator.
Also, smart equipment can be connected through wireless transmissions to the home
office, which tracks engine hours and equipment location. The engines diagnostic
system can send wireless alerts for maintenance tasks such as oil changes.

Warehouse management

Managing a warehouse stocked with inventory can be a nightmare. New products arrive
continuously and must be inventoried and stored. When products are shipped out of the
warehouse, they must be found and then transferred to the right loading dock so they
can be placed on the correct truck. A mistake in any one of these steps can result in a
warehouse stocked with products that it cannot find, customers receiving the wrong
items, or a store running out of goods to sell.

PR

Implementing wireless technology is essential for warehouse operations. Forklift trucks


in the warehouse are outfitted with a wireless device, and employees often have portable
wireless devices. All of these devices are connected to the WLAN. Warehouse
management system (WMS) software can manage all of the activities, from receiving
through shipping. And because this network is tied into the front-office computer
system, managers can have current statistics at any time.
Pallet loads arriving from other locations come with RFID or barcode pallet labels. The
information includes product identification numbers, product code dates or expiration
dates, originating plants and lines of manufacture, and sequentially assigned serial
numbers. As pallets arrive, a forklift truck operator scans the barcode label or receives
the RFID signal with a portable wireless device. This device sends the data to the
wireless network, where the warehouse software immediately designates a storage
location for the pallet and relays the information back to the computer on the forklift
truck. The computer then either prints a barcode that is affixed to the pallet or updates
the pallets RFID tag. Then, the forklift operator transports the pallet to a storage
location in the warehouse. An RFID tag attached to a rack face identifies every storage
location. The operator receives the wireless signal from the tag to confirm that the
pallets are being put in the correct location before depositing the load.

NOT FOR PRINTING OR INSTRUCTIONAL USE

118

CWNA: Wireless LAN Administration

In the front office, orders are received and entered into the computer that connects to the
WLAN in the warehouse. The WMS software manages order picking, balances
workloads, and selects pick sequences for lift truck operators. The dock-control module
then releases orders for picking. A forklift operator locates the correct storage location,
scans the barcode of the pallet or receives the RFID tag signal, and then ferries the
pallet to the shipping dock to be loaded onto a truck.
Public safety

IE

Vehicles owned by public safety departments are moving away from older
telecommunications systems and using newer wireless networks. These older networks
are being replaced by GSM cellular networks that are almost three times as fast. In
addition, WLAN technology is also being used. Although the GSM cellular network has
a broader range of coverage, its speed is much slower than a WLANs. WLAN access
points are installed on city-owned buildings or sites, such as municipal fuel pumps
where the patrol cars are refueled. Here, large volumes of datasuch as building floor
plans, photographs of criminal suspects, maps, and other informationcan be quickly
downloaded to the vehicle.
If a dispatch call requires a vehicle to immediately respond to a call before a WLAN
download is completed, the software sets a bookmark and will resume in that place
when the vehicle returns.
Health care

EV

Administering medication in a hospital is one of the major problem areas for the health
care industry. It is estimated that incorrectly dispensed medication results in hundreds of
thousands of medical emergencies annually. Typically, medication printouts are posted
at the medication area. As medications are given, they are crossed off the list and
initialed. However, because the paper record cannot always be updated immediately, its
possible that a patient could get an extra dose of medication before an order for a new or
changed medication is processed. This system also forces duplicate documentation.
Nurses first check the medication printout to determine the medication to be given.
Then, they document on paper that the medication was actually given and later enter the
data on the computer.

PR

However, WLAN point-of-care computer systems allow medical staff to access and
update patient records immediately. Many hospitals use laptop computers on mobile
carts with barcode scanners or RFID readers and a wireless network interface card.
Health care professionals can document a patients medication administration
immediately on the computer as they move from room to room, without connecting and
disconnecting cables. Nurses first identify themselves to the computer system by
scanning their own personal barcode ID badge or RFID tag. The patients barcode
armband or RFID tag is then scanned, and all medications currently needed for that
particular patient are displayed on the screen. The medications to be administered are
sealed in RFID-tagged pouches or barcoded bottles. Nurses scan this barcode or RFID
tag before opening the package. An alert immediately appears on the screen if the
wrong medication or incorrect amount is identified. After giving the medication, the
nurse indicates through the wireless network that the medication has been given,
essentially electronically signing the distribution form. A hard copy can be printed as
needed.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

119

The system immediately verifies that medication is being administered to the correct
patient in the correct dosage, eliminating potential errors and documentation
inefficiencies. The documentation process now takes place at the bedside where care is
delivered, thus improving accuracy. In addition, all hospital personnel now have realtime access to the latest medication and patient status information.

IE

Wireless technology is also used in other medical areas. A video pill can be swallowed
by patients who are experiencing digestive problems. This pill contains a tiny camera
and a wireless transmitter. As the pill works its way through the digestive system, it
takes two pictures each second and transmits those images to a receiving device worn
on the patients belt. After eight hours, the device is removed and the doctor can then
view the pictures without having to perform invasive surgery. A video pill is shown in
Exhibit 1-12.

EV

Exhibit 1-12: Video pill


Do it!

C-2:

Researching wireless technology uses

Exercise

1 As wireless technology has opened up new ways to be connected to the network,


it has created new job opportunities. Research the types of wireless jobs that are in
demand. List the job title, necessary education, and experience for each position.
Answers will vary.

PR

2 Select an area of the economy other than those listed in this topic, and determine
how this sector is using wireless technology.
Answers will vary. Finance, logistics, and military uses might be areas you could research.

NOT FOR PRINTING OR INSTRUCTIONAL USE

120

CWNA: Wireless LAN Administration

Explanation

Topic D: Wireless advantages and


disadvantages
With any technology, there are advantages and disadvantages to be considered. Wireless
LANs are no exception. The following is a summary of the advantages and
disadvantages of the technology.

Advantages

Mobility

IE

There are many advantages to using wireless technology. These include mobility, easier
and less expensive network installations, increased network reliability, and disaster
recovery.

The primary advantage of wireless technology is mobility, or the freedom to move about
without being tethered by wires. Mobility enables individuals to use a device like a
laptop computer thats always in contact with the network, no matter where the user
may roam within range of that network. Many occupations that require workers to be
mobile, such as field repair technicians or inventory clerks, find that wireless technology
is vital to their work.

EV

An increasingly mobile workforce is one characteristic of todays business world. Many


employees spend large portions of their time away from the office, and many workers
are using laptop computers and other portable communication devices. However, these
employees still need immediate access to data on the company network. WLANs fit
well in this work environment, giving mobile workers the freedom they need but
allowing them to access the network resources they also need. With a wireless network,
workers can access information from almost anywhere.

PR

Another characteristic of todays business world is flatter organizations. Much of an


employees work is done in teams that cross functional and organizational boundaries.
This means that employees are involved extensively in team meetings; during these
meetings, employees are away from their desks but still need access to network
resources. WLANs are again the solution to the problem. They give team-based workers
the ability to access the network resources they need while collaborating in a team
environment.

Easier and less expensive installation


Installing network cabling in older buildings can be difficult and costly. These buildings
were constructed long before personal computers and networks were ever thought of.
Its very difficult to run cable through thick masonry walls and plaster ceilings. Also,
older buildings sometimes have asbestos, which has to be completely removed before
any major cabling infrastructure can be installed. And often local or national restrictions
prevent the modification of older facilities with historical value.
In these instances, a wireless LAN is the ideal solution because the need to run cables is
eliminated. That means that historical buildings can be preserved, dangerous asbestos is
not disturbed, and difficult drilling can be avoided.
In addition, eliminating the need for installing cabling will result in significant cost
savings. With cable connections costing anywhere from $1 to $3 per drop (connection),
a wireless network can easily pay for itself by eliminating the need for a network
connection in each office.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

121

Also, the time required to install network cabling is usually significant. Installers must
pull wires through the ceiling and then drop cables down walls to network outlets. This
can usually take days or even weeks to complete. During that time, employees must
somehow continue their work in the midst of the construction zone, and this is often
difficult to do. Using a wireless LAN eliminates any such disruption because there are
no cables to be installed.
Wireless networks also make it easier for any officein an old or new buildingto be
modified with new cubicles or furniture. The design for a remodeled office no longer
has to consider the location of the computer jack in the wall. Instead, the focus can be
on creating the most effective work environment for the employees. No matter where in
the cubicle the computer is placed, it can still be connected to the network.
Increased reliability

IE

One of the most common sources of network problems is network cable failure.
Moisture from a leak during a thunderstorm or a coffee spill can erode metallic
conductors. A user who shifts the computer on his or her desk might break one or more
of the wires in a patch cable. A cable splice that is done incorrectly can cause problems
that result in intermittent errors that are difficult to identify. Using WLAN technology
eliminates these types of cable failures and increases the overall reliability of the
network.
Disaster recovery

EV

Because of risks such as fires, tornados, hurricanes, floods, and even terrorist attacks,
disaster recovery must be a prime concern of every business organization. A
documented disaster-recovery plan is vital to every business if it is to get back on its feet
quickly after a calamity. Any business that is not prepared to recover from these or other
disasters will find itself crippled or out of business.
Almost all organizations must have another site from which to run their operations if the
primary site is no longer available. A hot site is generally run by a commercial disasterrecovery service that enables a business to continue computer and network operations
needed to maintain business continuity. A hot site has all the equipment needed for an
organization to continue running, including office space and furniture, telephone jacks,
computer equipment, and a live telecommunications link. If the organizations dataprocessing center becomes inoperable, data-processing operations can be moved to a hot
site, often within an hour.

PR

However, the contract for maintaining a hot site is very expensive, and not all
businesses can easily afford this expense. An alternative is a cold site. A cold site
provides office space, but the customer must provide and install all the equipment
needed to continue operations. A cold site is less expensive, but it takes longer to get an
enterprise in full operation after the disaster. Many businesses are using cold sites and
WLANs as a major part of their disaster-recovery plans. Laptop computers with
wireless NIC adapters and access points are kept in reserve, along with backup network
servers. If a disaster occurs, operations are quickly moved to the cold site. Network
cabling doesnt need to be considered; instead, laptop computers are distributed to the
resettled employees, and access points are quickly installed. The network can be up and
running immediately so that business can proceed in as normal a fashion as possible.
Typically, a business has an annual contract with a company that offers hot site services
with a monthly service charge. Some services also offer data backup so that all
company data is available, regardless of whether a hot site or cold site is used.

NOT FOR PRINTING OR INSTRUCTIONAL USE

122

CWNA: Wireless LAN Administration

Disadvantages

Along with the many advantages of WLAN technology, there are disadvantages and
concerns. These include security, radio signal interference, and health risks.
Security

A wireless signal is not confined to a cable, as signals are in a traditional network.


Instead, the signal is broadcast in the open air, making security for wireless LANs a
prime concern. Wireless security presents a number of unique challenges. These include
the following:

IE

Unauthorized users might access the network. Because a wireless signal is


not confined to the four walls of the building in which the access point is
located, an unauthorized user can often pick up the signal outside the buildings
security perimeter. An intruder whos lurking in the parking lot with a laptop
computer and wireless NIC can intercept the signals and access the network.
Individuals who actively search for wireless signals to pick up, often by just
driving down the street, are participating in an activity known as war driving.

Attackers might view transmitted data. In a wired network, an attacker would


have to gain access to the cabling infrastructure to try to look at the data being
transmitted across the network or to gain access to a file server. With a wireless
network, an attacker only has to pick up the wireless signal to see whats being
transmitted or to gain access to the network.

PR

EV

Employees could install rogue access points. Many organizations have a


policy that prohibits employees from connecting their own personal equipment
to the network. This is primarily for security reasons. An employee who
purchases an access point and secretly brings it into the office to provide
personal wireless access has installed whats known as a rogue access point.
Typically these rogue access points have no security features implemented. This
means that an attacker can pick up the rogue access points wireless signal and
bypass all of the network security the organization has installed.
Attackers could easily crack existing wireless security. Early types of
wireless LANs had basic security features that could be enabled. However, these
features were not properly implemented and turned out to be easy to bypass.
Although current products have more robust security features, many older
products are still in use with very weak security features. Users sometimes
mistakenly believe that their data is protected because the security features are
turned on.

Because of the unique security challenges of a wireless LAN and because security
features of early WLANs could be easily defeated, wireless security is a major issue.
Although newer types of WLANs have improved security features, wireless security
must be properly addressed to ensure data integrity and privacy.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

123

Radio signal interference

Wireless devices operate using radio signals, creating the potential for two types of
signal interference. Signals from other devices can disrupt wireless transmissions, or the
wireless device might itself be the source of interference for other devices.
For example, several types of devices transmit radio signals that can interfere with a
WLAN. These devices include microwave ovens, elevator motors, photocopying
machines, certain types of outdoor lighting systems, theft protection devices, and
cordless telephones. These devices might cause errors or might completely prevent
transmission between a wireless device and an access point. And because WLAN
devices operate within the same radio frequency, they might return the favor and
interfere with other wireless devices.

IE

Interference is nothing new for a computer data network. Even when network devices
are connected by cables, interference from fluorescent light fixtures and electric motors
can sometimes disrupt data transmission. The solution for wireless devices is the same
as that for standard cabled network devices: find the source of the interference and
eliminate it. This is usually done by moving an access point away from a photocopying
machine or microwave oven. In addition, many wireless devices can identify
transmission errors and retransmit data as necessary.
Health risks

EV

WLAN devices contain radio transmitters and receivers that emit radio frequency (RF)
energy. These are similar to cellular telephones and other mobile wireless devices that
emit low levels of RF while being used. It is well documented that high levels of RF can
produce biological damage through heating effects (this is how a microwave oven cooks
food). However, it is not known if, or to what extent, lower levels of RF might cause
adverse health effects. Although some research has been done to address these
questions, no clear picture of the biological effects of this type of radiation has emerged
to date.
Most wireless devices also emit very low levels of RF energy, even when in stand-by
mode. However, these levels are considered non-significant and do not appear to have
health consequences.

PR

In the United States, the Food and Drug Administration (FDA) and the Federal
Communications Commission (FCC) set policies and procedures for some wireless
devices, such as cellular telephones. A recent FDA update stated that the available
science does not allow us to conclude that [wireless devices] are absolutely safe, or that
they are unsafe. However, the report went on to say that the available scientific
evidence does not demonstrate any adverse health effects associated with the use of
[wireless devices]. At the present time, no scientific studies have revealed health
problems associated with the absorption of low levels of RF energy by the human body.
Questions have been raised about the safety of handheld mobile phones that have a
built-in antenna positioned close to the users head when the user is speaking on the
phone. In mobile devices, the antenna is the primary source of RF energy. The safety of
cordless phones, which have a base unit connected to the telephone wiring in a house
and which operate at far lower power levels and frequencies, has not been questioned.

NOT FOR PRINTING OR INSTRUCTIONAL USE

124
Do it!

CWNA: Wireless LAN Administration

D-1:

Exploring advantages and disadvantages of wireless


technology

Exercise
1 Determine the cost savings that would result from establishing a disaster-recovery
cold site with WLAN technology, compared to maintaining a hot site. Using the
Internet and other resources, research the cost of purchasing 20 laptop computers,
20 wireless NICs, and two access points.
Then research approximate costs for leasing 1000 square feet of office space in
your area.

IE

Finally, use the Internet to research hot sites and approximate costs for the same
area.
The cost of a cold site with WLAN technology should be less expensive than the cost of
establishing a hot site. Details on the answers will vary.

2 Locate at least two studies on the health risks posed by wireless technology. How
can you minimize risks when using a cell phone or WLAN technology?

PR

EV

Answers will vary based on the studies cited.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

125

Unit summary: The wireless world


In this topic, you learned that we are in the midst of a wireless revolution. Wireless
devices and technologies enable users to roam almost anywhere and remain connected
to data and voice networks. The number of public hotspots is dramatically increasing
annually, as are the numbers of wireless laptop computers and other mobile devices.

Topic B

In this topic, you learned that a WLAN, also known as Wi-Fi, sends radio frequency
signals through the air. To function, a WLAN requires that a wireless network
interface card be installed in each device. These cards send and receive signals to an
access point (AP), which in turn is connected to a wired network or to the Internet. You
also learned that Bluetooth devices communicate by using small radio transceivers
called radio modules, which are built into microprocessor chips. Bluetooth devices
form a piconet. Next, you learned that many organizations are moving away from
expensive leased data-transmission lines and are replacing them with fixed broadband
wireless connections. Two popular technologies are WiMax and free space optics
(FSO). You also learned that handheld devices such as cell phones can send and receive
wireless signals by using the Global System for Mobile (GSM) communications
technology with Wireless Application Protocol (WAP). Finally, you learned that
radio frequency identification (RFID) tags serve as electronic barcodes. However,
RFID tags can contain much more information than can standard barcodes and can be
easily updated. In addition, because the information is transmitted via radio waves, an
RFID tag does not have to be precisely aligned with a reader for the information to be
collected.

EV

IE

Topic A

In this topic, you learned that wireless technologies are generally classified into three
categories. Wireless personal area networks (WPANs) cover technologies where the
transmission generally extends only a few meters or feet. Wireless local area networks
(WLANs) are generally restricted to 112 meters (375 feet). Wireless wide area
networks (WWANs) transmit over much longer distances. You also learned that
WLAN applications can be found in industries in which employees need the freedom
to conduct business without being confined to a specific location.

Topic D

In this topic, you learned that WLANs have significant advantages, including increased
mobility, easier and less expensive network installations, increased network reliability,
and disaster recovery. Some of the disadvantages of WLANs include security, radio
signal interference, and health concerns.

PR

Topic C

NOT FOR PRINTING OR INSTRUCTIONAL USE

126

CWNA: Wireless LAN Administration

Review questions
1 A location where wireless data services are available is known as a(n):

B GSAL.
C Access portal.
D

Hotspot.

2 A WLAN is also called:


A

Wi-Fi.

IE

B WWAN.

A Access spot.

C Wireless SWAN.
D AP.

3 The ________ acts as a base station to receive and transmit signals to and from
wireless NICs in other wireless devices. It also connects to a wired network.
A

Access point.

EV

B Wireless network interface card.


C FSO.

D WiPTG.

4 ______________ is a low-power wireless data- and voice-transmission technology


that can be used anywhere a small stream of data needs to flow.
A GSM.

B RFID.

Bluetooth.

D WAP.

PR

5 A Bluetooth link manager performs each of the following functions except:


A Identifying other Bluetooth devices.
B Creating links between the devices.
C Sending and receiving data.

Connecting to a wired network.

6 Bluetooth devices communicate by using small radio transceivers called radio


modules built onto microprocessor chips. True or false?
True.

7 Fixed broadband wireless systems use wireless transmissions for data


communications over distances less than 15 meters. True or false?
False. This system can transmit up to 53 kilometers.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

127

8 FSO is an alternative to high-speed fiber-optic transmissions that uses low-powered


infrared beams. True or false?
True

9 Bluetooth is the best technology for sending and receiving e-mail messages on a
handheld device. True or false?
False. GSM would be the best technology to use.

10 A WAP gateway is also called a GSM proxy. True or false?


False. A WAP gateway is also known as a WAP proxy.

WPAN.

IE

11 ____________ is a generic classification for network technologies in which the


transmissions generally do not extend past 3.3 meters.

12 A ______________ site can be used for disaster recovery, but it does not contain
any networking or computer equipment.
Cold.

13 A Bluetooth network that contains one master and at least one slave forms a(n)
____________.
Piconet.

EV

14 A WAP cell phone runs a small browser program called a(n)


_____________________, which uses WML instead of HTML.
Microbrowser.

15 ________________ is a fixed broadband wireless technology that can transmit up to


53 kilometers.
WiMax.

16 List and describe two differences between a wireless and a wired network interface
card.

PR

A wireless NIC performs the same basic functions as a standard NIC in that it allows the device to
communicate on the network. A wired NIC uses an RJ-45 connection to accept a patch cable,
whereas a wireless NIC contains an antenna to send and receive the wireless signals. Also, a
wireless NIC performs additional tasks such as encrypting and decrypting data packets.

17 What is the difference between a Bluetooth master and slave?


When two Bluetooth devices come within range of each other, they automatically make a
connection. The master controls all of the wireless traffic. The slave device takes commands from
the master. A Bluetooth network that contains one master and at least one slave forms a piconet.

NOT FOR PRINTING OR INSTRUCTIONAL USE

128

CWNA: Wireless LAN Administration


18 Explain what Wireless Application Protocol is and how it works.

The information transmitted to cellular telephones and handheld devices is often based on the
Wireless Application Protocol (WAP). WAP provides a standard way to transmit, format, and
display Internet data for devices like cell phones and handheld devices. With traditional
computers, Web browser software runs on a local computer to display Internet data. The Web
browser requests a Web page from the Web server. That page is transmitted back to the Web
browser in Hypertext Markup Language (HTML), which is the standard language for displaying
content on the Internet.

IE

WAP follows this standard Internet model with a few variations. A WAP cell phone runs a tiny
browser program called a microbrowser, which uses Wireless Markup Language (WML) instead
of HTML. WML is designed to display text-based Web content on the small screen of a cell phone
or handheld device. However, because the Internet standard is HTML, a WAP gateway (or WAP
proxy) must translate between WML and HTML. The WAP gateway takes the Web page sent
from the Web server in HTML code and changes it to WML language before forwarding it to the
cell phone.

19 List and describe the differences between radio frequency identification tags and
standard barcodes.
Barcodes can only identify the coded product and its manufacturer. For a barcode to be read, it
must be aligned precisely with a barcode reader.

EV

RFID tags can contain larger amounts of information about an item, such as where it was
manufactured, its expiration date, and where it was purchased. Unlike printed barcodes, RFID
information can be updated. In addition, this information is transmitted in radio waves, so the tag
does not have to be precisely aligned with a reader for the information to be collected.

20 Explain how wireless technology can increase the reliability of a network.

PR

One of the most common sources of network problems is network cable failure. Moisture from a
leak during a thunderstorm or a coffee spill can erode metallic conductors. A user who shifts the
computer on his or her desk might break one or more of the wires in a patch cable. An incorrect
cable splice can cause problems that result in intermittent errors that are difficult to identify. Using
WLAN technology eliminates these types of cable failures and increases the overall reliability of
the network.

NOT FOR PRINTING OR INSTRUCTIONAL USE

The wireless world

129

Independent practice activity

Northridge Consulting is a local firm that helps businesses solve their IT problems.
Northridge frequently looks to outside experts for assistance. Northridge has hired you
to help on a new project. Pickup Packages is a local pickup and delivery service that
will go to customers sites to pick up packages and letters and deliver them to other
places in the city within two hours. Out-of-town deliveries are also picked up and taken
to the companys main office, where they are transferred to a national package delivery
system.

IE

1 Pickup Packages has recently moved into an older building, which will be used for
offices and which will provide space for company vehicles, bicycles, and a central
location for pickup by the national package delivery systems. The service needs a
network of computers in the office and in the back work area. Northridge believes
that a WLAN might be a good application for this project. Create a PowerPoint
presentation about WLANs to deliver to Northridge. Create at least 10 slides, and be
sure to cover the following points:
Mobility
Ease and cost of installation

Easier network modifications


Increased network reliability
Speedier disaster recovery
Radio signal interference

EV

Security

2 After seeing your presentation, Pickup Packages is interested in WLANs, but the
president is concerned about the health risks of wireless LANs. Create another
presentation that looks at the issues of health risks with WLANs. Compare those
with health risks of other wireless technologies, such as cellular telephone and
microwave transmissions.

PR

3 Pickup Packages is also interested in giving its drivers and bikers another means of
communication besides pagers and analog cell phones. The management team
would like the carriers to receive their pickup and delivery messages from the
companys Web server. The managers have asked your opinion about using WAP
with cell phones or handheld devices. To prepare to present your recommendations
to Pickup Packages management team, write a one-page paper.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

PR

EV

IE

130

NOT FOR PRINTING OR INSTRUCTIONAL USE

21

Unit 2
Wireless LAN devices and standards

Unit time: 120 minutes

Complete this unit, and youll know how to:

IE

A List WLAN devices and describe their

basic functions.

B Explain the different types of

communication standards and why they are


important.

C List the three major wireless standards and

regulatory agencies and their functions.

EV

D Describe the different IEEE WLAN

PR

standards.

NOT FOR PRINTING OR INSTRUCTIONAL USE

22

CWNA: Wireless LAN Administration

Topic A: WLAN devices

This topic covers the following CWNA exam objectives:


#

Objective

1.1.1

Define and explain the basic concepts of RF behavior:


Return loss

Loss

Amplification

Reflection

Attenuation

Refraction

Absorption

Diffraction

Wave propagation

Scattering
VSRW

Free-space path loss


Delay spread

Identify the purpose of the following wireless LAN infrastructure devices and describe how
to install, configure, secure, and manage them:
Access points

Enterprise wireless gateways

Wireless LAN bridges

Enterprise encryption gateways

Wireless LAN switches

Wireless LAN routers

POE injectors and POE-enabled switches

Remote office wireless switches

Residential wireless gateways

Wireless LAN mesh routers

EV

3.3.1

IE

Gain

3.3.2

Describe the purpose of the following wireless LAN client devices and explain how to
install, configure, secure, and manage them:
PCMCIA cards

PCI and mini-PCI cards

USB, CF, and CD devices

Card adapters

Serial and Ethernet converters

Wireless workgroup bridges

Standard devices

Devices that are part of a WLAN are not entirely unique. Each wireless device has a
counterpart in a wired network. The uniqueness of the wireless device is that it typically
uses an antenna, instead of a cable, to send and receive signals. WLAN devices include
wireless client network interface cards, access points, bridges, and gateways.

PR

Explanation

Wireless network interface cards

The hardware that allows a client computer to be part of a wired network is called a
network interface card (NIC); this is also sometimes called a client network adapter. A
NIC is the device that connects the computer to the network so that it can send and
receive data. In a wired network, one end (or edge) of the NIC is connected to the
computer, while the other end has a port for a cable connection, as shown in Exhibit 2-1.
The cable connects the NIC to the network, thus establishing the link between the
computer and the network.

NOT FOR PRINTING OR INSTRUCTIONAL USE

23

Wireless LAN devices and standards

Exhibit 2-1: Network interface card for a wired network

IE

A wireless network interface card performs the same functions as a wired NIC, with one
major exception: a wireless NIC has no port for a wire connection to the network. In its
place is an antenna to send and receive signals. Specifically, when wireless NICs
transmit, they:
Change the computers internal data from parallel to serial transmission.
Divide the data into packets (smaller blocks of data), and attach the addresses of
the sending and receiving computers.
Determine when to send the packet.
Transmit the packet.

PR

EV

Unlike their wired counterparts, wireless NICs are available in a variety of shapes and
styles. For desktop computers, wireless NICs are available for a Peripheral Component
Interface (PCI) expansion slot inside the computer, as shown in Exhibit 2-2a. There are
also external wireless NICs that plug into the Universal Serial Bus (USB) port, as either
a standalone device (Exhibit 2-2b) or a key fob (Exhibit 2-2c).

Exhibit 2-2: Wireless NICs for desktop computers: (a) a PCI network interface card;
(b) a standalone USB device; (c) a USB key fob

NOT FOR PRINTING OR INSTRUCTIONAL USE

24

CWNA: Wireless LAN Administration


A standalone USB device has an advantage over a key fob because the standalone
device can be moved to improve reception.

EV

IE

For laptop computers, wireless NICs are also available in different types. One type is
the standard PC Card that a user can install. PC Card adapters are typically found on
laptop computers and come in different configurations, such as CardBus, PC Card Type
II, or PC Card Type III, as shown in Exhibit 2-3. Another type is the Mini PCI card,
which is a small card that is functionally equivalent to a standard PCI expansion card.
The Mini PCI card was developed specifically for integrating communications
peripherals, such as modems and NICs, with laptop computers. Most laptop computers
now come standard with a wireless Mini PCI card installed. Some vendors have
enhanced the Mini PCI slot by embedding an antenna in the laptop case that surrounds
the screen. When a wireless NIC Mini PCI card is used, it automatically activates the
antenna to improve the reception of the wireless signal.

Exhibit 2-3: Wireless NICs for laptop computers: (a) CardBus card; (b) Mini PCI card

A CardBus card improves input/output speed, compared to a PC Card, by increasing the


bus width to 32 bits. A CardBus card still supports lower-voltage PC Cards.

PR

For smaller devices like personal digital assistants (PDAs), there are several options for
wireless NICs, depending on the manufacturer. Some PDAs will accept standard
CardBus or Type II PC Card wireless NICs like those used in laptop computers.
However, sometimes an external attachment known as a sled must be purchased and
connected to the PDA. The sled contains a slot for a wireless NIC or similar device.
Another option is a CompactFlash (CF) card, shown in Exhibit 2-4. Flash memory is a
type of solid-state (microchip) technology in which there are no moving parts. A CF
card consists of a small circuit board that contains flash memory chips and a dedicated
controller chip. Compared to PC Cards, CF wireless NICs have two advantages: they
are smaller and they consume less power. Another option is to use a SDIO (Secure
Digital I/O) or SDIO NOW! card. SDIO cards provide high-speed data input/output
with low power consumption for mobile electronic devices.

NOT FOR PRINTING OR INSTRUCTIONAL USE

25

Wireless LAN devices and standards

IE

Exhibit 2-4: Wireless CompactFlash card

Due to the tremendous popularity of WLANs, separate wireless NICs could soon be a
thing of the past. Some vendors plan to integrate a wireless NIC onto a single chip that
could be included on the motherboard, eliminating the need for a separate card. Not all
vendors agree with this solution, however. Some manufacturers want to keep radio
signals farther from the motherboard to reduce the likelihood of interference with the
audio system. Instead of integrating the components of a wireless NIC on the
computers motherboard, they integrate a wireless NIC behind the LCD display, thus
keeping radio waves away from the motherboard.

PR

EV

The software that interfaces between the wireless NIC and the computer can be part of
the operating system or a separate program (driver) that is loaded onto the computer.
Beginning with Windows XP, all Microsoft desktop operating systems recognize a
wireless NIC without the need for any external software drivers; previous versions of
Windows require these external drivers. Incorporating them into the operating system
eases installation and provides additional features, such as the ability to connect
automatically to different WLANs as the user roams, instead of manually configuring
those settings. Some wireless NIC vendors include software drivers for operating
systems such as MS-DOS, Windows 3.x, and Linux. Current operating systems for
PDAs likewise will recognize a wireless NIC.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

A-1:

Do it!

Installing a wireless NIC

Heres how
Students should perform
this step only if a wireless
NIC is already installed in
their computers.

Heres why

1 Click Start

To temporarily disable any wireless card your


laptop computer already has installed, if a
wireless card is installed.

Choose Control Panel


Click Network and Internet
Connections

Click Network Connections


Connection

To display your wireless connections.

IE

Click Wireless Network

26

Click Disable this network


device

Minimize the window

The Found New Hardware dialog box opens,


and the Can Windows connect to Windows
Update to search for software? message is
displayed.

EV

2 Insert the Cisco wireless client


adapter

Click Cancel

You will manually install the drivers from the


Cisco installation CD.

3 Insert the installation CD into the


drive and browse its contents
Double-click Win-Client-

802.11a-b-c-Ins_WizardV1.exe

Depending on the type of Cisco adapter you are


using, the installation program might have a
slightly different name.

PR

4 When the Cisco Aironet


Installation Program appears,
click Next

Click Install Client Utilities


and Driver
(Recommended)

Click Next

You will be asked whether you want to


continue.

Click Yes

5 Click Next

To select the default destination folder.

6 Click Next

To accept the default program folder.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards


7 Click Next

27

To acknowledge the information screen about


the Aironet Desktop Utility.

Desktop Utility

Click Next
9 Click OK
10 Click OK

To reboot the computer. The Status light should


slowly blink green, and the Activity light should
rapidly blink amber.

IE

11 Maximize the Network


Connections window

8 Select Cisco Aironet

12 Click Wireless Network


Connection
This link is in the left pane
of the window.

13 Click View available


wireless networks

To see a list of all the wireless networks that


your computer can detect.

EV

Close the Wireless Network


Connections window

Students need to perform


this step only if they
disabled a previously
installed wireless NIC in
Step 1 of this activity.

14 Click

The Safely Remove Hardware icon is located in


the system tray.

Click Safely remove your


network card

Click Start

Choose Control Panel

Click Network and Internet


Connections

PR

Click Network Connections

Right-click Wireless Network


Connection

Click Enable
Close all open windows

NOT FOR PRINTING OR INSTRUCTIONAL USE

28

CWNA: Wireless LAN Administration

Access points
An access point (AP), shown in Exhibit 2-5, consists of three major parts. First, it
contains an antenna and a radio transmitter/receiver to send and receive signals. Second,
it has an RJ-45 wired network interface that allows it to connect by cable to a standard
wired network. Finally, the access point has special bridging software installed to
interface wireless devices to other devices.

IE

Explanation

Exhibit 2-5: Access point

EV

You can use a standard PC as an access point. To do so, you need to install a wireless
NIC (which functions as the transmitter/receiver), a standard NIC (which serves as the
wired network interface), and special AP control software.

PR

An access point has two basic functions. First, the access point acts as the base station
for the wireless network. All of the devices with a wireless NIC can transmit to the AP,
which in turn redirects the signals to the other wireless devices. Second, the AP acts as a
bridge between wireless and wired networks. The AP can be connected to the standard
network by a cable, allowing the wireless devices to access the data network through it,
as shown in Exhibit 2-6.

NOT FOR PRINTING OR INSTRUCTIONAL USE

29

IE

Wireless LAN devices and standards

Exhibit 2-6: An access point acts as a bridge between the wireless network and a wired
network

EV

The range of an access point acting as the base station depends on several factors. One
factor is the type of wireless network that is supported. Some wireless networks can
transmit up to 115 meters (375 feet), whereas other types can send and receive signals at
only half that distance. In addition, walls, doors, and other solid objects can reduce the
distance the signal can travel.
The number of wireless clients that a single access point can support varies as well. In
theory, some types of access points can support over 100 wireless clients. However,
because the radio signal is shared among users, most industry experts recommend one
access point for no more than 50 users if they are using basic e-mail functions, doing
some light Web surfing, and occasionally transferring medium-sized files. If the users
are constantly accessing the network and transferring large files, a preferred ratio is 20
users per AP.

PR

Access points are typically mounted on a ceiling or another area high off the ground to
reduce interference from surrounding objects. However, electrical power outlets are
generally not found in these locations. In these situations, Power over Ethernet (PoE)
has solved the problem. Instead of receiving power directly from an alternating-current
(AC) electrical outlet, direct-current (DC) power is delivered to the AP through the
unused wires in a standard unshielded twisted-pair (UTP) Ethernet cable that connects
the AP to the wired network. This setup eliminates the need for expensive electrical
wiring and makes mounting APs more flexible. Power over Ethernet is now an IEEE
standard known as 802.3af.

NOT FOR PRINTING OR INSTRUCTIONAL USE

210

CWNA: Wireless LAN Administration

Remote wireless bridges

A bridge is a device that is used to connect two network segments together, even if
those segments use different types of physical media, such as wired and wireless
connections. A remote wireless bridge is a wireless device designed to connect two or
more wired or wireless networks together. Remote wireless bridges have the same
essential characteristics as wireless LAN APs, with two major exceptions. First, remote
wireless bridges transmit at higher power than do WLAN APs. This enables the bridges
to transmit over longer distances than a WLAN can. Second, whereas a WLAN APs
radio signal transmits in all directions, remote wireless bridges use directional antennas
to focus transmission in a single direction.

IE

Most APs cannot be used in place of a remote wireless bridge. However, some
enterprise-level APs, such as the Cisco Aironet 1200, can also serve as a remote
wireless bridge.

PR

EV

A remote wireless bridge, shown in Exhibit 2-7, looks similar to a WLAN AP. A remote
wireless bridge typically has the same connections as an AP; these include a wired
network connection to connect the bridge to a standard wired Ethernet network. The
bridge also contains special software for transmitting and receiving signals. Most
bridges have whats known as delay spread, which minimizes the spread of the signal
so that it can reach farther distances. Bridges also have software that enables them to
select the clearest transmission channel and avoid noise and interference.

Exhibit 2-7: Remote wireless bridge


Remote wireless bridges support two types of connections. The first is a point-to-point
configuration. This configuration is used to connect two LAN segments, as shown in
Exhibit 2-8. The LAN segments can be either wired or wireless. The second
configuration is a point-to-multipoint configuration. This is used to connect multiple
LAN segments together, as shown in Exhibit 2-9.

NOT FOR PRINTING OR INSTRUCTIONAL USE

211

IE

Wireless LAN devices and standards

PR

EV

Exhibit 2-8: Point-to-point remote wireless bridge

Exhibit 2-9: Point-to-multipoint remote wireless bridge

NOT FOR PRINTING OR INSTRUCTIONAL USE

212

CWNA: Wireless LAN Administration


Modes
A remote wireless bridge can function in one of four modes: access point mode, root
mode, non-root mode, and repeater mode.

If a remote wireless bridge is in access point mode, it functions as a standard AP only


and does not communicate with other remote wireless bridges.

In root mode, the bridge, called the root bridge, can communicate only with other
bridges that are not in root mode. A root bridge cannot communicate with another root
bridge or any wireless clients.

PR

EV

IE

If a remote wireless bridge is set to non-root mode, it can only transmit to another
bridge in root mode. Some bridge manufacturers enable a remote wireless bridge to also
be configured as an access point. This allows the bridge to communicate with a remote
wireless root bridge while simultaneously sending and receiving signals with the
wireless clients. This is illustrated in Exhibit 2-10.

Exhibit 2-10: Root and non-root modes

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

213

EV

IE

If you want to extend the distance between LAN segments, you can place a remote
wireless bridge between two other bridges. This middle bridge is then in repeater mode,
as illustrated in Exhibit 2-11.

Exhibit 2-11: Repeater mode

PR

Remote wireless bridges are an excellent alternative to expensive leased wired options
for connecting remote buildings. Remote wireless bridges are ideal solutions for
connecting sites such as satellite offices, remote campus settings, or temporary office
locations when the sites are separated by obstaclessuch as bodies of water, freeways,
or railroadsthat make using a wired connection impractical or very expensive. The
distance between buildings using a remote wireless bridge can be up to 29 kilometers
(18 miles) transmitting at 11 Mbps or up to 40 km (25 miles) transmitting at 2 Mbps.
Even at 11 Mbps, remote wireless bridges are still seven times faster than a traditional
T1 connection.

NOT FOR PRINTING OR INSTRUCTIONAL USE

214

CWNA: Wireless LAN Administration

Wireless gateways
A wireless gateway is a device that combines wireless management and security in a
single appliance. A wireless gateway performs the following functions:

IE

Authentication Instead of using the network operating systems user-nameand-password scheme to authenticate wireless users, a wireless gateway ensures
that all wireless users are authenticated before allowing them to connect to the
network. This provides an additional level of security because unauthorized
wireless users will not be able to access the network. Wireless gateway
authentication usually supports such advanced authentication features.
Encryption A wireless gateway can encrypt all transmissions so that
unauthorized eavesdroppers cannot intercept and interpret the wireless signal.
This encryption is generally performed by using virtual private network (VPN)
technology, which is covered in detail in the Implementing wireless LAN
security unit.
Intrusion detection and malicious program protection Most wireless
gateways include real-time monitoring of wireless network traffic in order to
detect malicious attacks from wireless users. A wireless gateway enables the
wireless network administrator to block intruders and worm penetrations.
Bandwidth management Because WLAN bandwidth, or the maximum
amount of data that can be sent and received, is shared among all users, a few
users can monopolize the bandwidth. A wireless gateway allows network traffic
to be monitored so that bandwidth can be more evenly allocated among users.

EV

Centralized network management A wireless gateway can consolidate the


management of a WLAN into one device instead of having each AP managed
individually.

Wireless gateways provide a single mechanism for managing and monitoring the
wireless network. They have proven to be very effective in large enterprises that use
WLANs extensively.

The Cisco Aironet 1200 access point

PR

There are several ways to connect to the Cisco Aironet 1200 series access point to
manage it. Because you might not always find yourself in the same setting, its
important to explore each way so you are aware of the options. The LEDs on a Cisco
Aironet 1200 AP are shown in Exhibit 2-12. The three LEDs report Ethernet activity,
association status, and radio activity:
The Ethernet LED indicates Ethernet traffic. This LED is normally green when
an Ethernet cable is connected, and it blinks green when a packet is received or
transmitted over the Ethernet infrastructure. The LED is off when the Ethernet
cable is not connected. Be sure that this LED is green.
The status LED indicates operational status. Green indicates that the access point
is associated with at least one wireless client. Blinking green indicates that the
access point is operating normally but is not associated with any wireless
devices. This LED should be blinking green.

The radio LED indicates wireless traffic over the radio interface. The light is
normally off, but it blinks green whenever a packet is received or transmitted
over the access point radio.

NOT FOR PRINTING OR INSTRUCTIONAL USE

215

Wireless LAN devices and standards

IE

Exhibit 2-12: LEDs on the Cisco Aironet 1200 access point

PR

EV

The bottom of the Aironet device contains a panel that shows the MAC address. It will
be preceded by MAC. Entering the IP address of the AP allows you to access the
Cisco Aironet 1200 Home screen, shown in Exhibit 2-13. To use this utility, you must
be using a Windows XP computer.

Exhibit 2-13: The Cisco Aironet 1200 Home screen


Note that the screen images shown here might look slightly different from yours,
depending on which IEEE standard your Cisco Aironet 1200 is using: 802.11b, 802.11a,
or 802.11g.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

A-2:

Do it!

Connecting to a Cisco Aironet 1200 that receives an


IP address from a DHCP server

Heres how

Guide students through


looking up the IP address,
or give them the IP
address of the AP.

Heres why

1 Determine the MAC address of


your Cisco Aironet 1200 AP

In this activity, youll connect to the AP that is


receiving an IP number from a DHCP server.

2 Determine the IP address that


corresponds to the MAC address

If you have access to the DHCP server, look up


the MAC address. If you do not have access to
the DHCP server, your instructor will give you
the IP address.

IE

3 Open a Web browser


Enter the IP address in the
browsers address bar

4 Enter Cisco as the user name and


as the password
Click OK

Be sure to include the protocol http:// and the


full IP address. A login screen should appear.
Cisco is the default setting for the user name and
password.
The Cisco Aironet 1200 Home screen is
displayed.

5 Click each menu option in the left


pane

To examine the settings. Do not change any


settings unless your instructor tells you to.

6 Click Close Window

The message Do you want to close this


window? is displayed.

EV

If the default user name


and password have been
changed, provide students
with the correct ones.

216

Click Yes

The Cisco IP setup utility

Not all APs receive an IP number from a DHCP server, or you might not be able to find
the IP address that the DHCP server has assigned to the AP. Another way to find the IP
number assigned to the AP or to assign a number is to use the Cisco IP Setup Utility
(IPSU). The Cisco IPSU is shown in Exhibit 2-14.

PR

Explanation

Exhibit 2-14: Cisco IP Setup Utility

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards


Do it!

A-3:

217

Connecting to a Cisco Aironet AP by using IPSU

Heres how

Heres why

1 Open a Web browser and go to


the following URL:

houndware.com/website/support/downloads.html

You will download, install, and use the IPSU


program. To use this utility, you must be using a
Windows XP computer.
The message Do you want to run or save this
file? is displayed.

IE

2 Click Cisco IPSU.EXE


3 Click Save

If prompted, select the location in which to save


the file.

4 Click Run

If prompted, select the location in which to


uncompress the file. Then follow the
instructions to install the program.

5 Click Start

To start the IPSU program.

EV

Choose All Programs, Cisco


Systems Inc., IPSU

6 Verify that Get IPaddr is selected

If the AP has received an IP number from a


DHCP server.

7 Enter the MAC address of the AP


Click Get IP Address

8 Select Set Parameters

Enter the IP address youre giving


to the AP

PR

Tell students which IP


address to use.

The IP address of the AP is displayed.


To give the AP an IP address.
Your instructor will provide you with the
appropriate IP address. The IP address must be
in the same network segment.

9 Click Set Parameters

10 Close all windows


11 Unplug the power cord from the
AP
Press and hold the reset button
labeled Mode

To reset the AP to its factory-default settings.

On the AP.

Plug the power cord back in


Hold the button for three seconds
and then release it

The AP will reset itself.

NOT FOR PRINTING OR INSTRUCTIONAL USE

218

CWNA: Wireless LAN Administration

Connecting to a Cisco AP by using Telnet


In some circumstances, you might not be able to access the AP through a Web browser.
In this case, you can use the Windows Telnet client to connect to the AP. An example of
using Telnet to connect is shown in Exhibit 2-15.

IE

Explanation

PR

EV

Exhibit 2-15: Microsoft Telnet

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards


Do it!

A-4:

Connecting to a Cisco AP by using Telnet

1 Click Start
Choose Run
Enter telnet
Click OK

Heres why

Heres how

To run the Telnet utility.

2 At the Microsoft Telnet> prompt,


enter open ip_address

Where ip_address is the IP address of the AP.

3 When prompted, enter Cisco for


both the user name and password

If the default user name or password was


changed, your instructor will provide you with
the correct user name and password.

IE

If the default user name


and password were
changed, give the correct
values to students.

219

The prompt ap> is displayed when you connect


to the AP by using Ciscos command-line
interface (CLI) in User mode.

4 Enter ?

To see what information you receive.

EV

Enter several of the commands

To display a list of commands.

5 Enter enable

Enter the AP password

To switch to Privileged mode.


The prompt will change to ap#.

6 Enter show history

To see the commands you have entered.

7 Enter disable

To return to User mode.

8 Enter quit

PR

9 Close all open windows

NOT FOR PRINTING OR INSTRUCTIONAL USE

220

CWNA: Wireless LAN Administration

Linksys AP
Another popular brand of AP is Linksys. An example of the Linksys setup screen is
shown in Exhibit 2-16. The wireless page of the setup is shown in Exhibit 2-17.

EV

IE

Explanation

PR

Exhibit 2-16: Linksys setup screen

Exhibit 2-17: Linksys wireless screen

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards


Do it!

A-5:

221

Setting up a Linksys AP

Heres how

Heres why

1 Plug an RJ-45 patch cable into


one of the ports on the Linksys
AP

Plug the other end into a network


card on a computer

Your computer must be set up to receive an IP


address automatically from DHCP.

3 Open a Web browser and enter

This is the default IP address of the Linksys AP.

IE

2 Connect an RJ-45 patch cable


from the DSL/cable modem to the
Linksys AP port labeled
Internet
http://192l.168.1.1

4 At the login prompt, leave the


user name blank

Enter admin for the password

The Linksys setup screen is displayed. Leave the


Host name and Domain name fields blank unless
your instructor tells you otherwise.

EV

If your ISP requires the


host name and domain
name to be filled in,
provide students with the
values.

If your ISP requires that


you use Static IP or
PPPoE, let students know.

5 In the left pane, click Internet


Connection Type

Your instructor will let you know if you should


change the value to Static IP or PPPoE as
required by your ISP.

Click Save Settings

6 Activate the Wireless tab

To display the wireless network information.


To accommodate both 802.11b and 802.11g
wireless clients.

Under Wireless Network Name


(SSID), enter your name

This value must be fewer than 32 characters and


is case sensitive. You can use spaces and special
characters in the name.

PR

Under Wireless Network Mode,


select Mixed

7 Click Save Settings

8 Close all windows

NOT FOR PRINTING OR INSTRUCTIONAL USE

222

CWNA: Wireless LAN Administration

Topic B: Standards
We live in a world of standards. The gearshift lever in your car, the shape of an
electrical outlet in your house or apartment, and the size of a CD-ROM disc are all
based on standards. And the standards are very important. Imagine what it would be like
for someone to try to drive your car if he didnt know where Reverse was located, or if
you wanted to plug in an appliance but the electrical outlet was the wrong shape, or if
there were different sizes of CD-ROMs and your CD-ROM drive would accept only a
certain size CD. Standards simply make it easier for us to purchase and use a wide
variety of products.

Explanation

IE

Wireless technology likewise is based on standards. In fact, one of the reasons that
wireless LANs have been so successful since their introduction in late 1999 is that
WLANs have been based on standards from the outset. Unlike some computer
technologies, for which different vendors proposed different standards and the battle
had to be fought in the marketplace, wireless technology started with standards, and the
vendors manufactured products that followed these standards. The standards helped
ensure that different products from different vendors all functioned in the same
capacity.
The following sections will discuss the need for standards, their advantages and
disadvantages, different types of standards, and the regulatory bodies responsible for
creating and maintaining standards for WLANs.

EV

The need for standards

The role that standards play in a particular industry varies. Standards for
telecommunications have been essential since the very beginning. This is because of the
nature of the industry: telecommunications involves equipment interacting with other
equipment. Without standards, telecommunications would essentially be impossible.
Yet some professionals in information technology (IT) believe that standards have
stifled growth in this fast-paced field. They maintain that waiting for standards to catch
up to the rapid changes in IT slows down the process of change and development. The
IT industry was founded on cutting-edge technology without standards, the thinking
goes, so to add standards stymies growth.

PR

Despite this negative perception, standards have proven to be more beneficial than
harmful. If you examine the advantages and disadvantages of standards, this should
become evident.

Advantages and disadvantages of standards


Standards have many advantages. Examples follow.

Standards ensure that devices from one vendor will interoperate with those from other
vendors. Devices that are not based on standards might not be able to connect and
interoperate with similar devices from other vendors.
Standards create competition. If a vendor creates a new device that doesnt follow
standards, its called a proprietary device. The vendor owns the specifications and
perhaps even a patent on the device. This makes it almost impossible for another
manufacturer to produce a similar device. On the other hand, because standards apply to
everyone, any vendor can create a device based on a standard.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

223

Competition results in lower costs for consumers and manufacturers. When several
vendors make similar products based on the same standards, its likely that they will
also compete on price. Competition also results in lower costs for manufacturers.
Because standards have been established, manufacturers do not have to invest large
amounts of capital in research and development. This reduces startup costs as well as
the amount of time needed to bring a product to the market. Also, manufacturing to
meet standards encourages manufacturers to deploy mass production techniques and
economies of scale to keep production costs low; these savings can then be passed on to
consumers.

IE

Standards help protect the users investment in equipment. It is not uncommon for a
proprietary vendor to phase out a product line, leaving a business that purchased the
equipment with two choices: continue to use the now-obsolete system, with escalating
costs for supplies and technical support; or discard the legacy system and buy an up-todate system. Both choices are expensive. Standards, however, can help create a
migration path for equipment upgrades. Newer standards are generally backwardcompatible or at least provide a means of migrating to equipment based on the newer
standards at a minimal cost.
Standards also have some disadvantages. Examples follow.

EV

International standards can open domestic markets in larger countries to overseas


competition. Manufacturers in other nations might have lower overhead and might be
able to produce a device more cheaply, undercutting domestic manufacturers. However,
this also means that standards can benefit industries in the countries with lower
overhead.
Standards can create or reflect political conflict. Although standards are intended to
create unity, they can sometimes have the opposite effect. Sometimes one nation will
create a standard and offer it as a global standard. However, due to opposing political
interests or technologies, other nations might reject that standard and attempt to promote
or create their own. This can result in each nation creating its own standards and
decreasing the ease of global communications.
Most experts agree that the advantages of standards outweigh the disadvantages,
especially in industries such as IT. The following table summarizes the advantages and
disadvantages of technical standards.
Disadvantages

Standards ensure that telecommunications


devices from one vendor will interoperate
with those from other vendors.

Standards can threaten industries in large


countries.

Standards create competition between


vendors, and this can lower costs for vendors
and consumers.

Different countries might create competing or


conflicting standards.

PR

Advantages

Standards help protect the investment in


equipment.

NOT FOR PRINTING OR INSTRUCTIONAL USE

224

CWNA: Wireless LAN Administration

Types of standards

The telecommunications industry has two major types of standards: de facto and de jure.
A third, emerging type of standard, by consortium, is increasingly influencing how
standards are set.
De facto

IE

De facto standards are not actually standards at all. Rather, they are common practices
that the industry follows for various reasons, ranging from ease of use to tradition to
what the majority of the users do. For the most part, de facto standards are established
by success in the marketplace. For example, Microsoft Windows has become the de
facto standard operating system today for personal desktop computers and network
servers. This occurred because the majority of users have elected to install and run
Windows on their computers. There was no standards body that proclaimed Windows as
the standard operating system; the widespread use of the operating system has created
what amounts to be a standard, at least in the corporate world.
The phrase de facto comes from Latin and means from the fact. The phrase de
jure is also from Latin and means from the law.
De jure

EV

De jure standards are official standardsthose that are controlled by an organization or


body that has been entrusted with that task. The process for creating these standards can
be very involved. Generally, the organization will create subcommittees responsible for
a specific technology. Within each subcommittee, there are working groups, which are
teams of industry experts who create the initial draft. The draft will then be published,
and requests for comments will be solicited from other organization members. (These
members may be developers, potential users, and other people having general interest in
the field.) The comments are then reviewed by the original committee and might be
incorporated into the final draft. This is then reviewed by the entire organization before
the final standards are officially published.
De facto standards sometimes become de jure standards by being later approved by a
committee. Ethernet is one example of a de facto standard that later became a de jure
standard.

Consortia

PR

One of the complaints about de jure standards is the amount of time it takes for a
standard to be completed. For example, the initial standard for wireless LANs took
seven years to complete. In the IT economy, this represents an extremely long period of
time before products can be brought to the market.

In reaction to this, consortia are often used today to create standards. Consortia are
usually industry-sponsored organizations that want to promote a specific technology.
The goal of a consortium is to develop a standard that promotes a specific technology in
a short period of time. Unlike de jure standards bodies, membership in consortia is not
always open to everyone, although it might be. Sometimes specific high-profile
companies both create a consortium and serve on it.
One of the most famous consortia is the World Wide Web Consortium (W3C), which is
composed of industry giants such as Microsoft, Sun Microsystems, and IBM. The W3C
is responsible for creating the standards that are widely used on the Web today,
including Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), and the
Document Object Model (DOM).

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

225

Enforcing standards

Although setting standards is essential for IT, enforcing them is equally important. After
all, standards would be useless if no one followed them. How are the standards to be
enforced? The marketplace itself enforces some standards. That is, a vendor who refuses
to abide by standards for cellular telephone transmissions will find that nobody will buy
its products. Standards created by consortia are often regulated by the marketplace.
De jure standards, however, must often be enforced by an outside regulatory agency.
The role of a regulatory agency is to ensure that all participants adhere to the prescribed
standards. The agency must have the power to enforce the standards and effectively
punish those who refuse to abide by them. There are a number of national and
international regulatory agencies whose job is to ensure that standards are strictly
adhered to.

B-1:

Discussing standards and IT

IE

Do it!

Questions and answers

1 Do you think standards stifle IT or promote it?


Answers will vary.

EV

2 Compare your opinions of standards with your classmates. Discuss the other side
of the argument they make.

PR

Answers will vary.

NOT FOR PRINTING OR INSTRUCTIONAL USE

226

CWNA: Wireless LAN Administration

Topic C: Wireless organizations and agencies

This topic covers the following CWNA exam objective:


#

Objective

4.1.1

Identify technology roles for which wireless LAN technology is appropriate.


Corporate data access and end-user mobility

Educational/classroom use

Network extension to remote areas

Industrialwarehousing and
manufacturing

Building-to-building connectivitybridging
Last-mile data deliverywireless ISP

Hotspotspublic network access

IE

Small office/home office (SOHO) use

Healthcarehospitals and offices

Mobile office networking

Wireless standards organizations and regulatory agencies


Three primary standard-setting and regulatory bodies play a major role in WLAN
technology. These are the Institute of Electrical and Electronics Engineers (IEEE), the
Wi-Fi Alliance, and the U.S. Federal Communications Commission (FCC).

EV

Explanation

Institute of Electrical and Electronics Engineers (IEEE)


For computer networking and wireless communications, the most widely known and
influential organization is the Institute of Electrical and Electronics Engineers (IEEE).
The IEEE and its predecessor organizations date back to 1884. The IEEE establishes
standards for telecommunications and covers a wide range of IT standards.
Note: You can find out more about the IEEE and its standards on its Web site,
www.ieee.org.

PR

IEEE is the worlds largest technical professional society, with members around the
globe. Serving the computing, electrical engineering, and electronics professions, the
IEEE engages in technical, educational, and professional activities that advance the
theory and practice of whats called electrotechnology. The 37 Societies and Councils
of the IEEE routinely publish technically focused journals, magazines, and proceedings,
in addition to working on more than 800 standards. Some of these standards apply to
circuits and devices, communication and information technology, control and
automation, electromagnetics, geoscience, ocean technology and remote sensing,
instrumentation, measurement, and testing, optics, power and energy, and signal
processing.
Note: The IEEE is currently developing standards for rechargeable batteries for laptop
computers and electronic voting equipment data exchange.
Although the IEEE is one of the leading developers of global standards in a broad range
of industries, such as energy, biomedicine and health care, and transportation, the IEEE
is best known for its work in establishing standards for computer networks. In the early
1980s, the IEEE began started developing standards for computer network architecture.
This work was called Project 802. Project 802 quickly expanded into several categories
of network technology, known as 802.1, 802.2, and so on, all the way to 802.16. IEEE
Project 802.3 set specifications for Ethernet LAN technology.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

227

Project 802 received its name from the fact that the work was begun in 1980 (80) during
February, the second month (2).

As older network technologies have been replaced with new ones, the IEEE 802
committees have likewise reflected the changes. Several committees have been retired,
while new committees have been formed to address emerging technologies. The
following table lists the current IEEE 802 network committees.
Description

802.3

Ethernet local area networks

802.11

Wireless networks

802.15

Wireless personal area networks

802.16

Wireless wide area networks

IE

IEEE 802 Committee

Note: The IEEE is also responsible for setting standards for computer technologies
besides networking. For example, IEEE 1394 is the standard for FireWire.

Wi-Fi Alliance

EV

Shortly after the IEEE released its revised wireless network standards in 1999, there was
concern about how this new wireless technology would be accepted in the marketplace.
A consortium of wireless-equipment manufacturers and software providers was formed
to promote wireless network technology. This group was known as the Wireless
Ethernet Compatibility Alliance (WECA). The WECA had three goals:
To encourage wireless manufacturers to use the IEEE 802.11 technologies in
their wireless networking products
To promote and market these technologies to consumers in the home, in small
office/home office (SOHO) settings, and in large businesses and organizations
To test and certify that wireless products adhere to the IEEE 802.11 standards to
ensure product interoperability

Note: The SOHO market has been particularly eager to embrace wireless LAN
technology. The sales of wireless LAN equipment to SOHO settings grew by 73% from
2003 to 2004, according to the DellOro Group.

PR

In October 2002, the WECA organization changed its name to the Wi-Fi Alliance,
which reflected the name of the certification that it uses (Wi-Fi, or Wireless Fidelity) to
verify that a product follows IEEE standards. Although all wireless devices are
sometimes called Wi-Fi, only products that have passed the Wi-Fi Alliance testing are
allowed to refer to their products as Wi-Fi Certified, which is a registered trademark
shown in Exhibit 2-18.

Exhibit 2-18: The Wi-Fi Certified seal

NOT FOR PRINTING OR INSTRUCTIONAL USE

228

CWNA: Wireless LAN Administration

In addition to product testing and certification, the Wi-Fi Alliance is branching out into
new areas. Businesses can apply to be registered as Wi-Fi zones. This qualifies them to
be placed in an online database of wireless hotspot locations, which can be accessed
through the Alliances Web site. In addition, these businesses can display a Wi-Fi
ZONE logo at the physical business location and in product literature.
The Wi-Fi Alliance Web site is www.wi-fi.org.
Do it!

C-1:

Identifying wireless standards organizations

Heres how

Heres why

1 Open your Web browser and


access ieee.org

IE

2 Click About IEEE

Click IEEE Today

3 Click Search IEEE


4 Go to the Web site

grouper.ieee.org/groups/
802/16

This is a listing of the free publications available


from the IEEE. These are related to the 802.16
standard.

EV

5 Examine the types of information


available about this standard
Would you find access to these
publications useful in your job?
Why or why not?

Answers will vary.

6 Go to the wi-fi.org Web site


7 Click About Wi-Fi
Click why Wi-Fi

Click Design your Wi-Fi

Briefly review the steps listed.

PR

network

8 Do you think this list of steps is


well presented and useful for
setting up a wireless network?
Why or why not?

Answers will vary.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

229

Federal Communications Commission (FCC)

Responsibilities

In the United States, the organization that controls and regulates wireless transmissions
is the Federal Communications Commission (FCC). This section discusses what its role
is and how the FCC regulates the radio frequency spectrum on which wireless
transmissions take place.

The FCC is the primary regulatory agency for wireless communications in the United
States and its territorial possessions. The FCC, which is an independent government
agency directly accountable to Congress, was established by the Communications Act of
1934. The FCC was charged with regulating interstate and international
communications by radio, television, wire, satellite, and cable.

IE

To preserve its independence, the FCC is directed by five commissioners who are
appointed by the President and confirmed by the Senate for five-year terms. Only three
commissioners can be members of the same political party, and none of them can have a
financial interest in any FCC-related business.
The Commerce Departments National Telecommunications and Information
Administration (NTIA) serves as the principal adviser to the President on domestic and
international communications and information issues. NTIA also represents the views of
the Executive Branch before the Congress, the FCC, foreign governments, and
international organizations.

EV

The FCCs responsibilities are very broad. In addition to developing and implementing
regulatory programs, the FCC also processes applications for licenses and other filings,
analyzes complaints, conducts investigations, and takes part in congressional hearings.
The FCC also represents the United States in negotiations about telecommunications
issues with other nations.
The Web site of the FCC is www.fcc.gov.

Regulating the radio frequency spectrum

The FCC plays an important role in wireless communications. It regulates radio and
television broadcast stations, as well as cable and satellite stations. It oversees cellular
telephones, pagers, and two-way radios. The FCC regulates the use of radio frequencies
to fulfill the communications needs of businesses, local and state governments, publicsafety service providers, aircraft and ship operators, and individuals.

PR

The FCC is charged with regulating the radio frequency spectrum, which is the entire
range of all radio frequencies. The spectrum is divided into 450 sections, or bands. The
following table lists some of the more common bands. The U.S. is obligated to comply
with the international spectrum allocations established by international governing
bodies. However, the U.S. domestic spectrum uses might differ from international
allocations if these domestic uses do not conflict with international regulations or
agreements.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration


Frequency

Common uses

Very Low Frequency (VLF)

10 KHz to 30 KHz

Maritime ship-to-shore

Low Frequency (LF)

30 KHz to 300 KHz

Cordless telephones

Medium Frequency (MF)

300 KHz to 3 MHz

AM radio

High Frequency (HF)

3 MHz to 30 MHz

Short-wave radio, CB radio

Very High Frequency (VHF)

30 MHz to 144 MHz


144 MHz to 174 MHz
174 MHz to 328.6 MHz

TV stations 26, FM radio


Taxi radios
TV stations 713

Ultra High Frequency (UHF)

328.6 MHz to 806 MHz


806 MHz to 960 MHz
960 MHz to 2.3 GHz
2.3 GHz to 2.9 GHz

Public safety
Cellular telephones
Air traffic control radar
Wireless LANs

Super High Frequency (SHF)

2.9 GHz to 30 GHz

Wireless LANs

Extremely High Frequency (EHF)

30 GHz and above

Radio astronomy

Band

IE

230

The radio frequencies of some common devices include the following:


Frequency

EV

Item

40 MHz

Baby monitors

49 MHz

Radio-controlled airplanes

72 MHz

Radio-controlled cars

75 MHz

Wildlife tracking collars

215 MHz to 220 MHz

Global positioning systems (GPSs)

1.227 GHz and 1.575 GHz

PR

Garage door openers


Alarm systems

Although a license is normally required from the FCC to send and receive signals on a
specific frequency, there is a notable exception. This is known as the license-exempt
spectrum, or a set of unregulated bands. Unregulated bands are bands of the radio
spectrum that are available nationwide to all users, without requiring a license. Devices
that use these bands can be either fixed or mobile. The FCC says that it created the
unregulated bands to foster the development of a broad range of new devices, stimulate
the growth of new industries, and promote the ability of U.S. manufacturers to compete
globally by enabling them to develop unlicensed digital products for the world market.
The FCC does impose power limits on devices using the unregulated bands, and this
reduces their range. This prevents manufacturers of devices such as long-range walkietalkies from using these frequencies instead of the regulated frequencies intended for
these products.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

231

IE

The unregulated bands are summarized in the following table. Two of the bands are
used for WLANs. One of these bands is the Industrial, Scientific, and Medical (ISM)
band, which was approved by the FCC in 1985. Another unlicensed band used for
WLANs is the Unlicensed National Information Infrastructure (U-NII) band, approved
in 1996. The U-NII band is intended for devices that provide short-range, high-speed,
wireless digital communications. U-NII devices can provide a way for educational
institutions, libraries, and health care providers to connect to basic and advanced
telecommunications services. Educational institutions, for example, could form
inexpensive wireless computer networks between classrooms. U-NII unlicensed
wireless networks could help improve the quality and reduce the cost of medical care by
allowing medical staff to obtain on-the-spot patient data, x-rays, and medical charts, and
by giving health care workers in remote areas access to telecommunications services.
Depending on the type of wireless LAN, it will use either the ISM or the U-NII band.
Frequency

Total bandwidth

Common uses

Industrial, Scientific,
and Medical (ISM)

902 to 928 MHz


2.4 to 2.4835 GHz
5.725 to 5.85 GHz

234.5 MHz

Cordless phones, WLANs,


wireless Public Branch
Exchanges

Unlicensed Personal
Communications
Systems

1910 to 1930 MHz


2390 to 2400 MHz

30 MHz

Wireless Public Branch


Exchanges

Unlicensed National
Information
Infrastructure (U-NIII)

5.15 to 5.25 GHz


5.25 to 5.35 GHz
5.725 to 5.825 GHz

300 MHz

WLANs, wireless Public


Branch Exchanges,
campus applications, long
outdoor links

Millimeter Wave

59 to 64 GHz

5 GHz

EV

Unlicensed band

Home network
applications

There are some negative features of the unregulated bands. Because they are not
regulated and licensed, devices from different vendors might attempt to use the same
frequency. This conflict can cause the signals from different devices to interfere with
each other and prevent the devices from functioning properly. Thus the performance of
devices using unregulated bands can be unpredictable.

C-2:

Identifying wireless regulatory agencies

PR

Do it!

Heres how

Heres why

1 Visit fcc.gov/wbatf

This is the Web page for the wireless broadband


access task force.

2 Review some of the documents

To see the types of information provided on the


FCC web site.

3 Is this information useful in


carrying out your job? Why or
why not?

Answers will vary.

NOT FOR PRINTING OR INSTRUCTIONAL USE

232

CWNA: Wireless LAN Administration

Topic D: Types of wireless LANs

This topic covers the following CWNA exam objectives:


#

Objective

2.2.1

Identify, explain, and apply the concepts covered by the IEEE 802.11 standard and the
differences between the following 802.11 clauses:
802.11g

802.11a

802.11h

802.11b

802.11i

802.11d

802.11j

802.11e

802.11n

802.11f
2.3.1

IE

802.11

802.11s

Define the roles of the following organizations in providing direction, cohesion, and
accountability within the wireless LAN industry:
FCC
IEEE

EV

Wi-Fi Alliance

IEEE wireless LAN standards

Explanation

Since the late 1990s, the IEEE has approved four standards for wireless LANs: IEEE
802.11, 802.11b, 802.11a, and 802.11g. A new standard, 802.11n, is expected to be
approved by 2006. Each of these standards will be examined in detail in this topic.

IEEE 802.11

In 1990, the IEEE formed a committee to develop a standard for WLANs operating at 1
and 2 Mbps. Several proposals were initially recommended before a draft was
developed. This draft went through seven revisions, which took almost seven years to
complete. On June 26, 1997, the IEEE approved the final draft.

PR

The IEEE 802.11 standard specified that wireless transmissions can take place in one of
two ways: through infrared light, and through radio signals.

Infrared transmissions

All of the different types of light that travel from the sun to the earth make up what is
called the light spectrum. Visible light is just a small part of that spectrum. Some of the
other energies of the spectrumsuch as x-rays, ultraviolet rays, and microwavesare
invisible to the human eye. Infrared light, which is also invisible, can be used for
wireless transmissions.
Note: Infrared light is next to visible light on the light spectrum and shares many of the
same characteristics.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

233

Infrared transmissions can send data by the intensity of the infrared light wave, instead
of using on-off signals of, for example, a flashlight. To transmit a 1, an emitter (a
device that transmits a signal) increases the intensity of the current and sends a pulse
using infrared light. On the receiving end, a detector (a device that receives a signal)
senses the higher-intensity pulse of light and produces a proportional electrical current.
Note: Emitters and detectors are sometimes combined into a single device.

IE

Infrared transmissions can be either directed or diffused. A directed transmission


requires that the emitter and detector be directly aimed at one another (in the line of
sight), as shown in Exhibit 2-19. The emitter sends a narrowly focused beam of infrared
light. The detector has a small receiving or viewing area. A television remote control
device uses a directed transmission.

EV

Exhibit 2-19: Directed transmission

PR

A diffused transmission relies on reflected light. The emitters for diffused transmissions
have a widely focused beam instead of a narrow beam. The emitter is pointed at the
ceiling of a room and uses it as the reflection point. When the emitter transmits an
infrared signal, it bounces off the ceiling and fills the room. The detectors are also
pointed at the same reflection point and can detect the reflected signal, as shown in
Exhibit 2-20.

Exhibit 2-20: Diffused transmission

NOT FOR PRINTING OR INSTRUCTIONAL USE

234

CWNA: Wireless LAN Administration

Infrared wireless systems have several advantages. Infrared light neither interferes with
nor is affected by other communications signals. Also, because infrared light does not
penetrate walls, the signals are kept inside a room. This makes it impossible for
someone elsewhere to listen in on the transmitted signal. The IEEE 802.11 standard
outlines the use of diffused infrared transmissions for WLANs.
However, infrared wireless LAN systems have significant limitations:

Lack of mobility Directed infrared wireless systems require a line of sight.


Mobile users cannot use that system because the alignment between the emitter
and the detector would have to be adjusted continuously.

IE

Limited range Directed infrared systems, which require a clear line of sight,
cannot be placed in an environment where something could get in the way of the
infrared beam. This means that devices using infrared transmission must be
placed close enough to one another to eliminate the possibility of something
moving between them (imagine someone standing in front of your remote while
you are trying to change TV channels). Due to the angle of deflection, diffused
infrared systems can cover only a range of about 15 meters (50 feet).
Confined to indoor use Because diffused infrared systems require a
reflection point and because transmission is poor in bright sunlight, wireless
infrared LANs cannot be reliably used outdoors.

EV

Slow transmission speed Diffused infrared systems can send data at speeds
of up to only 4 Mbps. This is because the wide angle of the beam loses energy as
it reflects. The loss of energy results in a weakened signal. The weak signal
cannot be transmitted over long distances, nor does it have sufficient energy to
maintain a high transmission speed. This results in lower data throughput.

Because of these limitations, 802.11 infrared WLAN systems were never widely
adopted. Today, infrared transmissions are generally used in specialized applications,
such as data transfers between laptop computers, digital cameras, handheld data
collection devices, PDAs, electronic books, and other similar mobile devices.
Note: WLANs that use infrared transmissions are used in specialized situations where
radio signals would interfere with other equipment, such as in hospital operating rooms
or areas where security is a concern, such as in secure government buildings.

Radio wave transmissions

PR

Unlike infrared transmissions, radio waves can penetrate objects like walls and thus
allow the wireless user to be truly mobile. In addition, radio waves travel longer
distances and can be used indoors as well as outdoors. Also, radio waves can travel at
much higher speeds than can infrared transmissions. The IEEE 802.11 standard
outlining the use of radio waves in transmissions has become the preferred method for
wireless LANs.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

235

IEEE 802.11b

The bandwidth of 2 Mbps for the 802.11 standard introduced in 1997 was not sufficient
for most network applications. The IEEE body revisited that standard shortly after it was
released to determine what changes could be made to increase the speed. In September
1999, an 802.11b amendment was added to the standard. This added two higher speeds
(5.5 Mbps and 11 Mbps) to the original 802.11 standard (1 Mbps and 2 Mbps). Like the
802.11 standard, 802.11b uses the ISM band.

IE

The 802.11b standard can support wireless devices that are up to 115 meters (375 feet)
apart. However, devices that far apart might not be transmitting at 11 Mbps. Radio
waves decrease in power over distance, much like the sound of your voice: a person
standing 1 meter away from you might hear you very clearly, whereas a person 60
meters away would have difficulty hearing you. Instead of completely dropping the
signal if it falls out of range for transmitting at 11 Mbps, the 802.11b standard specifies
that the devices should drop their transmission speed to the next lower level (5.5, 2, or 1
Mbps). This allows devices to transmit farther apart but at lower speeds.

IEEE 802.11a

EV

At the same time the IEEE created the 802.11b standard, it also issued another standard
with even higher speeds. The 802.11a standard specifies a maximum rated speed of 54
Mbps and supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the U-NII
band. Although the 802.11a and 802.11b specifications were published at the same time,
802.11b products started to appear almost immediately, and 802.11a products did not
arrive until late 2001. The 802.11a products came to the market later because of
technical issues, along with the high cost of developing products for the standard.
Devices based on the 802.11a standard cannot use complementary metal oxide
semiconductors (CMOS), the semiconductor used in 802.11b WLANs. Instead, devices
must use a compound such as gallium arsenide (GaAs) or silicon germanium (SiGe).
These semiconductors are more expensive and require more capital investment and time
to develop and manufacture.
Although devices following the 802.11a standard achieve higher speeds, the tradeoff is
that devices cannot be as far apart as with the 802.11b standard. A wireless network that
follows the 802.11a standard might generally have devices that are no more than 30
meters (100 feet) apart.

PR

IEEE 802.11g

The tremendous success of the IEEE 802.11b standard shortly after its release prompted
the IEEE to re-examine the 802.11b and 802.11a standards to determine if a third
intermediate standard could be developed. This best of both worlds approach would
preserve the stable and widely accepted features of 802.11b, but increase the data
transfer rates to 54 Mbps, similar to those of 802.11a. The IEEE formed a task group to
explore this possibility. By late 2001, a draft standard known as IEEE 802.11g was
proposed. The standard was formally ratified in 2003.
The IEEE 802.11g draft was a compromise based on input from several chip
(microprocessor) manufacturers, who had a major stake in the outcome. Although most
major vendors of commercial wireless networking products will build and sell products
based on whatever standard is approved, the same is not true for the chip manufacturers.

NOT FOR PRINTING OR INSTRUCTIONAL USE

236

CWNA: Wireless LAN Administration


These businesses must make huge monetary investments in designing, sampling, and
manufacturing the silicon chips used in the wireless network products. These
manufacturers must then try to sell their chips to product vendors that design and build
commercial products based on those chips.

Projected IEEE 802.11n

The 802.11g standard specifies that devices operate entirely in the ISM frequency and
not in the U-NII band used by 802.11a. This requirement gives the 802.11g standard the
ability to support devices that are farther apart with higher speeds, but it uses the
crowded ISM band. Like 802.11b, 802.11g can support devices that are up to 115
meters (375 feet) apart.

IE

In September of 2004, the IEEE started working on a new standard to significantly


increase the bandwidth of todays WLANs. Known as 802.11n, it will set standards for
transmissions exceeding 100 Mbps. The 802.11n committee is evaluating more than 60
proposals regarding how to accomplish this. The top speed of the 802.11n standard will
be anywhere from 100 Mbps to 500 Mbps, depending on which proposal is approved.

EV

Although the final proposal might not be ratified until 2006, devices that follow one of
the proposed options will appear much earlier than that. This occurs because there is a
significant lag between when the final proposal is published and when it is ultimately
ratified by the IEEE. This occurred with the 802.11g standard: devices were marketed
and sold months before the standard was finally ratified. A WLAN based on one of the
802.11n proposals appeared in mid-2004 under the name 802.11 pre-N.
Note: The Wi-Fi Alliance refuses to sanction and certify devices manufactured before
the final release of the standard.

IEEE 802.11r

PR

Another standard that has not been approved yet is 802.11r. This standard will provide
support for fast Basic Service Set (BSS) transitions. This will enable a user traveling at
high speeds, such as in a car or train, to maintain a wireless network connection as it is
passed from one base station to another. This will be necessary if Voice over IP (VoIP)
enabled mobile phones are to work properly. Current 802.11 wireless standards cannot
switch fast enough to prevent disruption in the connection when switching between
access points.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards


Do it!

D-1:

237

Comparing access points

Heres how

Heres why

1 Using a search Web site, locate


several access-point products
from different vendors

Answers will vary.

3 Which access point would you


recommend to a client for home
use? Why?

Answers will vary. Answers might include IEEE


802.11b/g access points.

IE

2 List the features and costs of each


access point

Answers will vary. Answers might include IEEE


802.11b/g or a access points.

PR

EV

4 Which access point would you


recommend for a small office with
25 employees? Why?

NOT FOR PRINTING OR INSTRUCTIONAL USE

238

CWNA: Wireless LAN Administration

Unit summary: Wireless LAN devices and


standards
In this topic, you learned that wireless LAN devices are similar to those found in a
wired network. The difference is that wireless devices use an antenna or other means,
instead of a wired connection, to send and receive signals. A wireless network
interface card performs the same function as a wired NIC in that it receives signals
from the network. Wireless NIC types include PCI expansion cards; USB standalone or
key fob devices; CardBus, PC Card Type II or Type III, or Mini PCI cards for laptops;
and CompactFlash and SDIO cards for PDAs.

Topic B

In this topic, you learned that an access point (AP) serves as both the base station for
the wireless network and a bridge to connect the wireless network with the wired
network. The range of an access point and the number of wireless clients that it can
support vary. Power over Ethernet (IEEE 802.3af) technology allows an AP to be
placed in almost any location because electrical current is supplied through the Ethernet
cable. A remote wireless bridge connects two or more wired or wireless networks
together. Remote wireless bridges can function in access point mode, root mode, nonroot mode, or repeater mode. A wireless gateway is a device that combines wireless
management and security management in a single appliance.

Topic C

In this topic, you learned that there are several advantages of standards for the IT
industry. Standards ensure that devices from one vendor will interoperate with those
from other vendors. Standards also create competition between vendors, which results
in lower costs for consumers and often results in lower costs of manufacturing as well.
However, there are disadvantages, particularly in international markets. There are three
types of telecommunications standards: de facto, de jure, and by consortia.

EV

In this topic, you learned that there are three regulatory bodies that play a major role in
WLAN technology. The IEEE has developed network standards since 1980. The Wi-Fi
Alliance is a consortium of wireless equipment manufacturers and software providers
involved in promoting and certifying wireless technology. The Federal
Communications Commission (FCC) is responsible for controlling and regulating
wireless transmissions in the United States. There are three standards or types of
wireless LANs. IEEE 802.11b networks transmit at 11 Mbps over a distance of up to
115 meters (375 feet). The 802.11a standard devices transmit at speeds of up to 54
Mbps, but at distances of up to only 30 meters (100 feet). A compromise between the
two, the 802.11g, can transmit at 54 Mbps up to 115 meters (375 feet).

PR

Topic D

IE

Topic A

Review questions

1 Each of the following is a wireless LAN device, except for:


A A wireless client network interface card.
B A wireless gateway.
C

An access portal.

D A remote wireless bridge.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

239

2 A wireless client network interface card performs each of the following tasks,
except:
A Transmitting the packet over radio waves.

B Determining when to send the packet.


C Dividing data into packets.
D

Sending packets to a wired network through a root remote wireless bridge.

3 The type of wireless network interface card that would not be found in a laptop
computer is a(n):
A Mini PCI card.
PCI card.

IE

C CardBus.

D PC Card Type III.

4 A SIDO card would be used in which type of device?


A Laptop computer.

B Desktop computer.
PDA.

EV

D Access point.

5 An access point has a(n) ______ interface that allows it to connect to a wired
network.
A

RJ-45.

B SDDIO.
C CF.

D RJ-11.

PR

6 One of the functions of an access point is to serve as a base station for the wireless
network. True or false?
True.

7 Although the transmission range of an access point can vary, the number of wireless
clients that it can support does not vary. True or false?
False.

8 Power over Ethernet allows wireless client NICs to be placed in locations even if
there is not an electrical outlet nearby. True or false?
False.

9 A remote wireless bridge can connect only wireless networks together. True or
false?
False.

NOT FOR PRINTING OR INSTRUCTIONAL USE

240

CWNA: Wireless LAN Administration


10 Both point-to-point and point-to-multipoint configurations can be supported by a
remote wireless bridge. True or false?
True.

11 A(n) _____ is a device that combines wireless management and security in a single
appliance.
Wireless gateway.

12 _____________ standards are not formal standards but are common practices that
an industry follows.
De facto.

Consortia.

IE

13 Industry-sponsored organizations that want to promote a specific technology are


known as _____.

14 The _____ organization has been establishing network standards for almost 25
years.
IEEE.

15 The _____ is a consortium that tests and certifies wireless products.


Wi-Fi Alliance.

EV

16 List and describe the four modes in which a remote wireless bridge can function.
Access point mode In this mode, a remote wireless bridge functions as a standard AP only and
does not communicate with other remote wireless bridges.
Root mode In root mode, the bridge, called the root bridge, can communicate only with bridges
that are not in root mode. A root bridge cannot communicate with another root bridge or any
wireless clients.
Non-root mode In this mode, a remote wireless bridge can transmit only to another bridge in
root mode. Some bridge manufacturers enable a remote wireless bridge to also be configured as
an access point. This allows the bridge to simultaneously communicate with a remote wireless
root bridge and send and receive signals with the wireless clients.

PR

Repeater mode To extend the distance between LAN segments, another remote wireless
bridge can be positioned between two other bridges. This middle bridge is then in repeater mode.

17 What are the features of a wireless gateway?


A wireless gateway is a device that combines wireless management and security in one
appliance. The features of a wireless gateway include: authentication, encryption, intrusion
detection and worm protection, bandwidth management, and centralized management.

NOT FOR PRINTING OR INSTRUCTIONAL USE

Wireless LAN devices and standards

241

18 What are unregulated bands and how are they used in wireless LANs?

Although a license is normally required from the FCC to send and receive transmissions on a
specific frequency, the license-exempt spectrum (unregulated bands) is an exception.
Unregulated bands are bands of the radio spectrum that are available nationwide to all users,
without requiring a license. Devices that use these bands can be either fixed or mobile.
One unregulated band is the Industrial, Scientific and Medical (ISM) band, which was approved
by the FCC in 1985. Another unlicensed band is the Unlicensed National Information
Infrastructure (U-NII), approved in 1996. The U-NII band is intended for devices that will provide
short-range, high-speed, wireless digital communications. Depending on the type of wireless
LAN, it will use either the ISM or the U-NII band.

19 What are some limitations of infrared WLAN systems?

IE

Limitations include lack of mobility, limited range of coverage, confinement to indoor use, and
slow speed of transmission.

20 Write a brief summary of the characteristics of IEEE 802.11b, 802.11a, and 802.11g
wireless networks.

The IEEE 802.11b WLAN can transmit at 1, 2, 5.5 and 11 Mbps using the ISM band over a
distance of up to 375 feet.

The IEEE 802.11a WLAN has a maximum rated speed of 54 Mbps and also supports 48, 36,
24, 18, 12, 9, and 6 Mbps transmissions using the U-NII band.

EV

The IEEE 802.11g WLAN can also transmit up to 54 Mbps like 802.11a but it uses the ISM
band, like 802.11b.

Independent practice activity

Coldstone Lighting is opening another store across town and needs to install a new
network. Northridge Consulting has asked you to come up with a presentation for
Coldstone outlining the advantages of a wireless network for their retail store. Because
the managers at Coldstone do not have a technical background, your presentation should
be at a general level and not a technical level.

PR

1 Create a PowerPoint presentation of at least 10 slides to explain what a wireless


LAN is, what equipment is needed for a WLAN, and what the advantages and
disadvantages of WLANs are.

NOT FOR PRINTING OR INSTRUCTIONAL USE

CWNA: Wireless LAN Administration

PR

EV

IE

242

NOT FOR PRINTING OR INSTRUCTIONAL USE

You might also like