Networking Essential 6th Edtion
Networking Essential 6th Edtion
Networking Essential 6th Edtion
SIXTH EDITION
A COMPTIA NETWORK+ N10-008
TEXTBOOK
INSTRUCTOR EDITION
All rights reserved. This publication is protected by copyright, and permission must be DEVELOPMENT EDITOR
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval Marianne Bartow
system, or transmission in any form or by any means, electronic, mechanical, photo-
copying, recording, or likewise. For information regarding permissions, request forms, MANAGING EDITOR
and the appropriate contacts within the Pearson Education Global Rights & Permissions Sandra Schroeder
Department, please visit www.pearson.com/permissions.
PROJECT EDITOR
No patent liability is assumed with respect to the use of the information contained herein. Mandie Frank
Although every precaution has been taken in the preparation of this book, the publisher
COPY EDITOR
and author assume no responsibility for errors or omissions. Nor is any liability assumed
Kitty Wilson
for damages resulting from the use of the information contained herein.
ISBN-13: 978-0-13-745582-9 INDEXER
Ken Johnson
ISBN-10: 0-13-745582-8
Library of Congress Control Number: 2021913557 PROOFREADER
Abigail Manheim
ScoutAutomatedPrintCode
TECHNICAL EDITOR
Chris Crayton
Trademarks
All terms mentioned in this book that are known to be trademarks or service marks have PEER REVIEWERS
been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of DeAnnia Clements
this information. Use of a term in this book should not be regarded as affecting the validity Osman Guzide
of any trademark or service mark. Gene Carwile
Dr. Theodor Richardson
Warning and Disclaimer PUBLISHING COORDINATOR
Every effort has been made to make this book as complete and as accurate as possible, Cindy Teeters
but no warranty or fitness is implied. The information provided is on an “as is” basis. The
authors and the publisher shall have neither liability nor responsibility to any person or DESIGNER
entity with respect to any loss or damages arising from the information contained in this Chuti Prasertsith
book.
COMPOSITOR
codeMantra
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities
(which may include electronic versions; custom cover designs; and content particular to
your business, training goals, marketing focus, or branding interests), please contact our
corporate sales department at corpsales@pearsoned.com or (800) 382-3419.
For government sales inquiries, please contact governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact intlcs@pearson.com.
ii
iii
iv
6 TCP/IP 290
Glossary 742
Index 764
Wireshark Captures
Network+ quizzes
vi
CONTENTS vii
viii CONTENTS
CONTENTS ix
x CONTENTS
CONTENTS xi
xii CONTENTS
CONTENTS xiii
xiv CONTENTS
CONTENTS xv
xvi CONTENTS
CONTENTS xvii
xviii CONTENTS
CONTENTS xix
Glossary 742
Index 764
xx CONTENTS
DEDICATIONS
This book is dedicated to my family: Kim, Damon/Heather, and Dana/Sam. —Jeff Beasley
This book is dedicated to my family: Boonsong, Pariya, June, Ariya, and Atisat. —Piyasat Nilkaew
ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:
● Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded
twisted-pair cabling
● Don Yates for his help with the initial Net-Challenge software
I would also like to thank my many past and present students for their help with this book:
● Abel Sanchez, Kathryn Sager, and Joshua Cook for their work on the Net-Challenge software; Adam
Segura for his help taking pictures of the steps for CAT6 termination; Marc Montez, Carine George-Morris,
Brian Morales, Michael Thomas, Jacob Ulibarri, Scott Leppelman, and Aarin Buskirk for their help with
laboratory development; Josiah Jones and Raul Marquez Jr. for their help with the Wireshark material; and
Ariya Nilkaew for her help with revising and editing many of the captured pictures
xxi
xxii
xxiii
174
FIGURE I-1
xxiv
380 381
FIGURE I-2
xxv
When the Wireshark software is installed, you are ready to begin using it.
To open a saved capture file, click File > Open or click Open on the Wireshark
home screen.
To change capture options, click Capture > Options and change the options to
your preferred settings.
FIGURE I-3
xxvi
The users (clients) in the wireless LAN can communicate with other members of
Extended Service the network as long as a link is established with the access point. For example, data
Set (ESS) traffic from PC-A to PC-E first passes through the access point and then to PC-E in
A network with multiple the wired LAN.
access points to extend
user mobility The problem with a basic service set is that mobile users can travel outside the
radio range of a station’s wireless link if there is only one access point. One
Hand-off solution is to add multiple access points to the network. Multiple access points
The process in which extend the range of mobility of a wireless client in the LAN. This arrangement is
a user’s computer called an extended service set (ESS). In the example of an ESS in Figure 4-3, the
establishes an mobile computer establishes an authorized connection with the access point that
association with another
has the strongest signal level (for example, AP-1). As the user moves, the strength
access point
of the signal from AP-1 decreases. At some point, the signal strength from AP-2
Roaming exceeds that from AP-1, and the wireless bridge establishes a new connection
The term used to with AP-2. This is called a hand-off. The hand-off is an automatic process for the
describe a user’s ability wireless client adapter in 802.11, and the term used to describe this is roaming.
to maintain network
Network access in 802.11 uses a technique called carrier sense multiple access with
connectivity while
moving through the collision avoidance (CSMA/CA). In CSMA/CA, the client station listens for other
workplace users of the wireless network. If the channel is quiet (that is, no data transmission
is occurring), the client station can transmit. If the channel is busy, the station(s)
must wait until transmission stops. Each client station uses a unique random
CSMA/CA back-off time. This technique prevents client stations from trying to gain access
Carrier sense multiple to the wireless channel as soon as it becomes quiet. Currently four physical layer
access with collision technologies are being used in 802.11 wireless networking: direct-sequence spread
avoidance spectrum (DSSS), frequency-hopping spread spectrum (FHSS), infrared, and
orthogonal frequency-division multiplexing (OFDM). DSSS is used in 802.11b/g/n
wireless networks, and OFDM is used in 802.11a, 802.11g, 802.11n, 802.11ac, and
802.11ax.
Laptop
Computer
AP-1 AP-3
AP-2
FIGURE 4-3 An example of an extended service set used for increased user mobility.
FIGURE I-4
xxvii
664 674
FIGURE I-5
xxviii
? The help command, which can be used at any Active/active An architecture in which both the Symbols 40GBASE-T cabling, 41
64-bit CPU architectures, 679
prompt in the command-line interface for the Cisco primary site and the disaster recovery site are up and ? (help) command, 367
IOS software running at the same time 100BASE-FX cabling, 41
100BASE-SX cabling, 41
10GBASE-T Twisted-pair copper capable of 10Gbps Active/passive An architecture in which the disaster
recovery site is idle, in standby mode
Numbers 100BASE-TX cabling, 41
3G/4G Third Generation and Fourth Generation, 802.1x (dot1x) wireless standard, 633
digital mobile phone technologies developed to provide Adaptive cut-through A mode that is a combination 3DES (Triple Data Encryption Standard), 651
802.11 wireless standard, 175–176
broadband network wireless services of the store-and-forward and cut-through modes 3G wireless standard, 204
ad hoc networks, 176, 177
6to4 prefix A globally routable address that enables Ad hoc network An independent network 4G wireless standard, 204
AP, 177–178
IPv6 hosts to communicate over the IPv4 Internet 4G/LTE, 204
Address Resolution Protocol (ARP) A protocol used to BSS, 176, 177, 178
5G wireless standard, 204
802.1X An IEEE standard protocol for access control map IP addresses to MAC addresses channel bonding, 179
and authentication; also called dot1x 6to4 prefix, 335
Administrative distance A feature used by routers to CSMA/CD, 178
8P8C connectors, 70–71
8P8C The proper term for an RJ-45 modular plug select the best path when more than one path is available DSSS, 179
10BASE2 cabling, 41
ESS, 178
A record (Address record)The most common record Administratively down An indication that the router 10BASE5 cabling, 41
in DNS, which maps a hostname to an IP address interface has been shut off by an administrator FHSS, 180
10BASE-FL cabling, 41
frequency channels, 179
AAAA record (Quad-A record) A DNS record for IPv6 ADSL (Asymmetric DSL) A service that provides up to 10BASE-T cabling, 41
hand-offs, 178
1.544Mbps from the user to the service provider and 10GBASE-LR cabling, 41
Absorption Light interaction with the atomic structure hopping sequences, 180
up to 8Mbps back to the user from the service provider 10GBASE-SR cabling, 41
of the fiber material; also involves the conversion of ISM band, 179
optical power to heat Advertise To share route information 10GBASE-T cabling, 41, 76, 97–98
MAC layer, 176
Access control Physical security measures such as AES Advanced Encryption Standard, the encryption AXT, 98
OFDM, 180
access control cards, possibly biometric access control algorithm used by WPA2 full-duplex transmissions, 100
Open Authentication, 638
systems, and lockable fencing F/UTP, 99
Aging time The length of time a MAC address PHY layer, 176
Access control hardware Hardware used to identify remains assigned to a port hybrid echo cancellation circuits, 100
pseudorandom numbering sequences, 180
and authenticate someone entering a facility IEEE 802.3an-2006, 98
AH Authentication Header, a security protocol that roaming, 178
performance, 100–101
Access control list (ACL) A basic form of firewall guarantees the authenticity of IP packets shared-key authentication, 638
protection PSAACRF, 98, 99
Alien crosstalk (AXT) Unwanted signal coupling from transceivers, 177
PSANEXT, 98, 99
Access control vestibule/mantrap A control device one permanent link to another transmit power, 180
signal transmission, 100–101
that consists of two interlocking doors in which the WMN, 176
Angled physical contact (APC) A green fiber connector 29 CFR 1910.1200 (Hazard Communication), 716
first set of doors must be closed before the second set 802.11a (Wi-Fi 2) wireless standard, 24, 180–181,
whose endface is polished and has an 8-degree angle 29 CFR 1910.157 (Portable Fire Extinguishers),
of doors can open 183
Ant+ An ultra-low-power wireless protocol for 712–713
access-list permit Ip any any The instruction added 802.11ac (Wi-Fi 5) wireless standard, 24, 182, 183
wireless sensor networks operating at 2.4GHz 29 CFR 1910.160 (Fixed Extinguishing Systems),
to the last line of an access list to allow all other data 802.11ax (Wi-Fi 6) wireless standard, 25, 182, 183
713–714
packets to enter and exit the router Anycast address An address obtained from a list of 802.11b (Wi-Fi 1) wireless standard, 24, 181, 183
addresses 29 CFR 1910.164 (Fire Detection Systems), 714–715
Access point A transceiver used to interconnect a 802.11g (Wi-Fi 3) wireless standard, 24, 181, 182,
29 CFR 1910.165 (Employee Alarm Systems),
wireless and a wired LAN APIPA Automatic Private IP Addressing, a Windows 183
715–716
process that automatically configures reserved private 802.11i wireless standard, 183
ACK Acknowledgment packet, a packet in the TCP 29 CFR 1910.36 (Design and Construction
IP addresses and subnet masks 802.11n (Wi-Fi 4) wireless standard, 24, 181, 182,
three-way connection handshake Requirements for Exit Routes), 709–710
Application layer Layer 7 of the OSI model, which 183
ACR A measurement that compares the signal level 29 CFR 1910.37 (Maintenance, Safeguards, and
interacts with application programs that incorporate a Operational Features for Exit Routes), 710 802.11r wireless standard, 183
from a transmitter at the far end to the crosstalk
communication component such as an Internet browser 29 CFR 1910.38 (Emergency Action Plans), 710–711 802.16a (WiMAX) wireless standard, 200
measured at the near end
and email 1000BASE-LX cabling, 41
29 CFR 1910.39 (Fire Prevention Plans), 711–712
32-bit CPU architectures, 679 1000BASE-SX cabling, 41
FIGURE I-6
Companion Website
The companion website includes the captured data packets used throughout the book. It also includes the Net-
Challenge software, which was developed specifically for this text. The companion website also includes chapter-
based quiz modules for you to test your knowledge and all of the key terms in an online flash card application.
Finally, you can access your 10% off Network+ exam voucher from the companion website.
xxix
Objectives
●● Define the features of the 802.11 wireless ●● Examine how site surveys are done for
LAN standard wireless LANs
●● Understand the components of a wireless ●● Investigate the issues of securing a
LAN wireless LAN
●● Explore how wireless LANs are ●● Explore how to configure a point-to-
configured multipoint wireless LAN
Key Terms
WLAN pseudorandom paging procedure
basic service set (BSS) hopping sequence piconet
ad hoc network OFDM pairing
access point OFDMA passkey
transceiver U-NII WiMAX
extended service set (ESS) MIMO BWA
hand-off MU-MIMO NLOS
roaming beamforming last mile
CSMA/CA Wi-Fi radio frequency
DSSS SSID identification (RFID)
ISM band site survey backscatter
FHSS inquiry procedure Slotted Aloha
4-1 INTRODUCTION
The objective of this section is to introduce students to wireless networking.
Wireless networks are being used everywhere, and it is a network administrator’s
job to ensure that the addition of a wireless network meets the connectivity, data
throughput, and security requirements for the network.
This chapter addresses the basic issues of incorporating WLAN technologies
into a network. Section 4-2, “The IEEE 802.11 Wireless LAN Standard,”
includes an overview of WLAN concepts and terminology, frequency
allocations, and spread spectrum communication. The applications of WLANs
are presented in Section 4-3, “802.11 Wireless Networking,” which looks at
various types of WLAN configurations, such as point-to-point and point-to-
multipoint. Section 4-4, “Bluetooth, WiMAX, RFID, and Mobile Communica-
tions,” looks at wireless networking technologies such as Bluetooth, WiMAX,
and RFID. Any time a signal is transmitted over the air or even through a cable,
there is some chance that the signal can be intercepted. Transmitting data over
a wireless network introduces unique security issues. Section 4-5, “Configuring
a Point-to-Multipoint Wireless LAN: A Case Study,” presents an example of
configuring a WLAN to provide access for users in a metropolitan area.
Section 4-6 “Troubleshooting Wireless Networks” provides an overview of
common techniques for troubleshooting wireless networks.
Table 4-1 outlines the CompTIA Network+ objectives related to this chapter
and identifies the chapter section that covers each objective. At the end of each
chapter section you will find a review with comments on the Network+ objectives
presented in that section. These comments are provided to help reinforce your
understanding of each Network+ objective. The chapter review also includes
“Test Your Knowledge” questions to help you understand key concepts before
you advance to the next section of the chapter. At the end of the chapter you
will find a complete set of questions as well as sample certification exam-type
questions.
●● It is cost-effective for use in areas that are difficult or too costly to wire.
●● It enables user mobility in the workplace.
A B
The performance of the basic service set can be improved by including an access
point, which is a transmit/receive unit (transceiver) that interconnects data from Access Point
the wireless LAN to the wired network. In addition, the access point provides A transceiver used to
802.11 MAC layer functions and supports bridge protocols. The access point interconnect a wireless
typically uses an RJ-45 jack for connecting to the wired network. If an access point LAN and a wired LAN
is being used, users establish a wireless communications link through it to commu- Transceiver
nicate with other users in the WLAN or the wired network, as shown in Figure 4-2. A transmit/receive unit
PC-E
Wired LAN
PC-D
Access point
PC-A
PC-C
PC-B
If data is being sent from PC-A to PC-D in the network shown in Figure 4-2, the
data is first sent to the access point and then relayed to PC-D. Data sent from a
wireless client to a client in the wired LAN also passes through the access point.
Laptop
Computer
AP-1 AP-3
AP-2
FIGURE 4-3 An example of an extended service set used for increased user mobility.
TABLE 4-4 Maximum Transmit Power Levels for 802.11a with a 6 dBi
Antenna Gain
Band Power Level
Lower 40 mW
Middle 200 mW
Upper 800 mW
802.11b/g
802.11a
FIGURE 4-5 An example of an 802.11a installation and an 802.11b link running alongside
each other.
The downsides of 802.11a are the increased cost of the equipment and increased
power consumption because of the OFDM technology. This is of particular concern
with mobile users because of the effect it can have on battery life. However, the
maximum usable distance (RF range) for 802.11a is about the same as or even
greater than that of 802.11b/g/n/ac/ax. It is important to note that any RF signal has
distance limitations either due to limited output transmitted power, antenna pattern,
or terrain issues.
●● 802.11b (Wi-Fi 1): This standard can provide data transfer rates up to
11Mbps with ranges of 100–150 feet. It operates at 2.4GHz and uses DSSS.
●● 802.11a (Wi-Fi 2): This standard can provide data transfer rates up to
54Mbps and an operating range up to 75 feet. It operates at 5GHz and uses
OFDM.
●● 802.11g (Wi-Fi 3): This standard can provide data transfer rates up to
54Mbps and an operating range up to 150 feet. It operates at 2.4GHz and uses
DSSS or OFDM.
●● 802.11n (Wi-Fi 4): This high-speed wireless connectivity promises data
transfer rates over 200Mbps. It operates at 2.4GHz and 5GHz and uses DSSS
or OFDM.
●● 802.11i: This standard for WLANs provides improved data encryption for
networks that use the 802.11a, 802.11b, and 802.11g standards.
●● 802.11r: This standard is designed to speed hand-offs between access points
or cells in a WLAN. This standard is a critical addition to 802.11 WLANs if
voice traffic is to become widely deployed.
●● 802.11ac (Wi-Fi 5): This is currently the most deployed wireless standard.
It provides single-station data transfer rates of 500Mbps up to 1.3Gbps and
operates in the 5GHz frequency band.
●● 802.11ax (Wi-Fi 6): This is the latest wireless standard, and manufacturers
are starting to ship more equipment with this wireless technology. Theoreti-
cally, it could deliver close to 10Gbps data rates.
Wired
LAN
RJ-45 CAT6/5e
Switch Ethernet Connection
or Hub
Access Point
Wireless LAN-X
One of the biggest misconceptions about wireless is that it does not require a wired
connection. This is not quite correct. The connection to a wired LAN is provided by
a wireless access point (WAP), which provides a bridge between the wireless LAN
and the wired network. A physical cable connection (typically CAT6 or higher) ties
the access point to the wired network’s switch or hub (typically Ethernet).
For example, computer PC-A in Figure 4-6 sends a data packet to PC-D, a desti-
nation in the wired LAN. PC-A first sends a data packet over the wireless link. The
access point recognizes the sender of the data packet as a host in wireless LAN-X
and allows the wireless data to enter the access point. At this time, the data is sent
out the physical Ethernet connection to the wired LAN. The data packet is then
delivered to PC-D in the wired LAN.
How does the access point know that the wireless data packet is being sent from
a client in the wireless LAN? The 802.11 wireless LAN devices use an SSID to
SSID
identify what wireless data traffic is allowed to connect to the network. The SSID
Service set identifier, a is the wireless service set identifier, which enables the client to join the wireless
password that enables
network.
the client to join the
wireless network The access point uses the SSID to determine whether the client is to become
a member of the wireless network. The term association is used to describe a
wireless connection that is made. The wrong SSID prevents an association, keeping
the client from being able to become a member of the wireless network.
People are commonly surprised by the fact that an access point has two antennas.
The two antennas implement spatial diversity, improving received signal gain and
performance.
FIGURE 4-7 An example of the information displayed when an association is formed between
a client and an access point.
An access point uses an association to build a table of users (clients) on the wireless
network; this association table lists the MAC addresses for each networking device
connected to the wireless network. Figure 4-8 provides an example of an asso-
ciation table. The access point uses the association table to forward data packets
between the access point and the wireless network. As shown in Figure 4-8, the
wireless client adapter also notifies the user if the client has lost an association with
the access point.
A wireless bridge is a popular choice for connecting LANs that are running
similar network protocols, even if the LANs are miles apart. Figure 4-9 provides
examples. Figure 4-9(a) shows a point-to-point wireless bridge. Each building
shown in Figure 4-9(a) has a connection from the wireless bridge to the building’s
LAN, as shown in Figure 4-10. The wireless bridge then connects to an antenna
placed on the roof. A clear (line-of-sight) transmission path must exist between the
two buildings; otherwise, signal attenuation (loss) or signal disruption can result.
Antenna selection is also critical when configuring the connection. (This issue is
addressed in Section 4-5.) The antenna must be selected so that the signal strength
at the receiving site is sufficient to meet the required received signal level.
Bld-B
Bld-A
Bld-C
(b)
FIGURE 4-9 Examples of (a) point-to-point and (b) point-to-multipoint wireless bridge
configurations.
LAN Network–Bld #1
PC PC PC
Bridge
Rooftop
Antenna
Bridge
PC PC PC
LAN Network–Bld #2
FIGURE 4-10 The wireless bridge connection to the wired network inside the building.
Access point
Access point
Access point
FIGURE 4-11 An example of configuring multiple access points to extend the range for
wireless connectivity.
A site survey for indoor and outdoor installations should obtain the following key
information:
●● Indoor:
●● Electrical power
●● Wired network connection point(s)
= Ethernet CAT5e
FIGURE 4-12 The floor plan for a building being surveyed for a wireless LAN.
The mobile client is moved to point D in the building, and signal quality “Out of
range” is observed (see Figure 4-17). This is also called a loss of association with
the access point.
The site survey indicates that one access point placed at point 1 in the building is
not sufficient to cover the building’s floor plan. The survey shows that the addi-
tional cost of another access point is easily justified for providing full building
wireless LAN coverage. The building has two wired network connections available
for placing an access point (points 1 and 2). It is decided to place another access
point at point 2. The site survey is repeated, and it shows excellent signal strength
obtained throughout the building.
Bluetooth
The wireless technology Bluetooth is based on the 802.15 standard. Bluetooth was
developed to replace the cable connecting computers, mobile phones, handheld
devices, portable computers, and fixed electronic devices. The information
normally carried by a cable is transmitted over the 2.4GHz ISM frequency band,
which is the same frequency band used by 802.11b/g/n/ax. There are four output
power classes for Bluetooth. Table 4-6 lists the maximum output power and the
operating distance for each class.
Bluetooth Low Energy (BLE) technology has been developed to provide operation
on a small battery for up to five years. This technology is ideal for applications that
require the exchange of small amounts of data periodically. BLE operates in the
2.4GHz ISM band and remains in sleep mode except when a connection is initiated.
BLE devices have significantly lower power requirements than do traditional
Wi-Fi devices. For example, whereas a Wi-Fi device consumes about 500 μW for
10 messages, a BLE device consumes only 50 μW.
Figure 4-20 shows an incoming text file. The File Transfer menu enables you to
select where received files are saved. In this case, the incoming files are being saved
to the desktop.
FIGURE 4-20 The Mac window showing that a text file is coming in from another Bluetooth
device.
The details for setting up Bluetooth on Windows 10 differ slightly from those for
macOS, but the basic steps are the same:
WiMAX
1. Enable the Bluetooth radio. Worldwide
Interoperability for
2. Enable discoverability (to allow other Bluetooth devices to find the device). Microwave Access, a
3. Select the device for pairing. broadband wireless
system based on the
IEEE 802.16e standard
BWA
WiMAX
Broadband wireless
WiMAX (Worldwide Interoperability for Microwave Access) is a broadband wireless access
system that has been developed for broadband wireless access (BWA) for fixed
Reader
Tag
(Transceiver)
(Transponder)
The reader transmits radio waves, which activates (turns on) an RFID tag. The tag
then transmits modulated data, containing its unique identification information
stored in the tag, back to the reader. The reader then extracts the data stored on the
RFID tag.
The RFID idea dates back to 1948, when the concept of using reflected power as a
means of communication was first proposed. The 1970s saw further development
in RFID technology—in particular, a UHF scheme that incorporates rectification
of the RF signal for providing power to the tag. Development of RFID technology
significantly increased in the 1990s. Applications included toll collection that
allowed vehicles to pass through tollbooths at highway speeds while still being able
to record data from the tag.
Today, RFID technology is being used to track inventory shipments for major
commercial retailers, by the transportation industry, and by the Department of
Defense. In addition, RFID applications are being used in Homeland Security for
tracking container shipments at border crossings. In addition, RFID is being incor-
porated into WLAN computer networks to keep better track of inventory. RFID
technology is being used as a wireless means of asset tracking and is therefore
becoming more important in networks. The tracking technology is even being
extended to tracking Wi-Fi devices within the WLAN infrastructure.
Three parameters define an RFID system:
Powering the Tag RFID tags are classified in three ways, based on how they
obtain their operating power:
Antenna
Integrated Circuit
Substrate
FIGURE 4-23 The G2C501 active RFID tag from G2 Microsystems (Albert Lozano/
Shutterstock).
LF HF UHF
125/134 kHz 13.56 MHz 860—960 MHz
2.4 GHz
Note
Antenna placement is critical when setting up a point-to-multipoint wireless LAN.
Incorrect antenna placement can severely affect reception quality.
6 km 6 km
m
1k
Proposed
Antenna
Site Mountain
Range
River Home
Valley Network
FIGURE 4-25 The terrain profile of the area to be supported by the proposed point-to-
multipoint wireless network.
●● The site has a tower that can be used to mount the wireless antenna.
●● The site has a small building and available rack space for setting up the
wireless networking equipment.
●● There is a clear view of the surrounding area for 6 kilometers in every
direction.
●● There is not an available wired network connection back to the home
network. The decision is made to use the proposed antenna site and set up an
11Mbps wireless link back to the home network.
Yagi
Antenna
Wireless
Bridge
Yagi
Antenna
FIGURE 4-26 The proposed point-to-point wireless link between the home network and the
antenna site.
Note
The selection of the incorrect antenna type can lead to a poorly designed radio link
and poor reliability.
FIGURE 4-27 Antenna radiation patterns for (a) omnidirectional, (b) Yagi, and (c) dish
[parabolic reflector] antennas. The cost of the Yagi antenna is comparable to that of the
omnidirectional antenna.
Antenna B, the directional Yagi, is selected for the point-to-point link. The antenna
meets the distance requirement and also meets the 11Mbps data rate requirement.
Antennas A and C were not selected for the following reasons:
Note
When dealing with antennas, it is important to consider effective isotropic radiated
power (EIRP), which is the power that comes off an antenna and is the value the
FCC uses to determine and measure power limits in wireless equipment.
FIGURE 4-28 The excellent signal quality measured for the multipoint distribution.
Yagi Antenna PC
Lightning Hub or
Arrestor PC
Switch
Wireless
Bridge
PC
PC
FIGURE 4-30 The setup for the remote users in the proposed point-to-multipoint wireless
network.
Wireless Compatibility
Not all wireless clients are created equal, and wireless clients depend on their
hardware and software, which they must keep up to date. Also, in order to have
reliable and good wireless connectivity, the wireless access point and the wireless
clients must be compatible and use the same standard.
802.11n is a standard that can offer connectivity in either 2.4GHz or 5GHz or both.
This means a wireless client can be 802.11n compatible just by operating in one
frequency, not both. Therefore, an 802.11n wireless client with only a 2.4GHz
radio will never achieve the high speed of 300Mbps offered by 5GHz. When
troubleshooting the RF spectrum associated with a signal such as a Wi-Fi signal,
a spectrum analyzer is typically used.
Wireless Coverage
A wireless coverage area, or a cell, is very dependent on the RF transmission
radiated from a wireless router or an access point. So, there is a limitation to the
size of a cell for each access point. In a large geographic area, multiple wireless
access points are deployed to create multiple cells in an attempt to give enough
total coverage area. Good coverage depends on cells overlapping. Failure of cells to
overlap introduces weak or dead wireless spots, thus creating insufficient wireless
coverage. Also, bad coverage negatively affects client roaming. When a wireless
client moves from one cell to another, it must establish an association with the new
access point. With bad coverage, the AP association time increases, in turn causing
delay or interruption.
●● Make sure the antenna is placed high and is not obstructed by any metal.
It is important to remember that radio waves reflect off metal surfaces. Also,
surfaces such as concrete and brick attenuate the signal.
●● In some cases, you might have to use a high-gain antenna to help boost the
receive signal strength.
Load Issues
Wireless users share the same frequency channel to communicate to the same
access point. If too many users connect to the same access point at the same
time, they start experiencing slowness and packet drops due to overcapacity. For
optimum load capacity, consult the documentation of the access point manufacturer.
SSID Issues
Once the SSID has been configured for a computer, it normally does not require
reconfiguration. However, while traveling, you might reconfigure the SSID to
connect to a different network. Also, when manually configuring an incorrect SSID
or settings, human-error mistakes can be made. The simple fix is to reset the SSID
when you return to your home network.
Cable Issues
Even when you are focusing on troubleshooting wireless issues, a problem could
be due to a simple physical cable connection. A cable could be loose, may have
become disconnected, or may be bad. It is always good to have a spare cable
just in case. Remember that you can always verify that you have a connection by
checking for the presence of a link light. Also, bad cables create attenuation and
introduce loss of signal. Attenuation in any type of cable connecting to the access
point—such as antenna cable attenuation, fiber cable attenuation, or Ethernet cable
attenuation—could introduce signal issues into the wireless connection.
Deauthentication/Disassociation Attacks
Deauthentication and disassociation are legitimate handshakes used by a wireless
client when leaving a wireless network. However, a denial of service (DOS) attack
that exploits deauthentication and disassociation creates client disassociation issues.
By spoofing a disassociate or deauthenticate message while pretending to be a
targeted wireless client, the access point disassociates the targeted wireless client
from the wireless network.
Section 4-3
13. What is the purpose of an access point?
An access point provides a bridge between a wireless LAN and a wired
network.
14. How does an access point know if a wireless data packet is intended for its
network?
802.11 wireless LAN devices use an SSID to identify what wireless data
traffic is allowed to connect to the network.
15. What is an association, and what is its purpose?
An association is an established wireless connection. An access point uses an
association to build a table of users (clients) on the wireless network.
16. Draw a picture of a point-to-point wireless connection.
Refer to Figure 4-9(a)
17. Draw a picture of a point-to-multipoint wireless network.
Refer to Figure 4-9(b)
18. What are the key issues to explore when conducting a site survey for each of
the following?
a. Indoor environment
Electrical power connection points(s)
Wired network connection point(s)
Access point placement
RF coverage area
Bandwidth supported
b. Outdoor environment
Electrical power for the base access point
Connection back to the home network
Antenna selection
Bandwidth supported
RF coverage
Section 4-5
32. What type of wireless connection is used to connect a home network to a
multipoint distribution site?
Point-to-point
33. Use the Internet to find a source of omnidirectional and directional antennas
for each of the following standards:
a. 802.11b
b. 802.11a
c. 802.11g
d. 802.11n
e. 802.11ac
f. 802.11ax
34. Prepare a list of three manufacturers for each antenna type. Include cost
figures.
There are many sources for wireless network antennas. Expect the students to
come up with many possible solutions.
Section 4-6
35. What command can you issue to verify network connectivity in a wireless
LAN?
ping
36. True or false: When an association is made between a client and a wireless
router, the client with the lowest 802.11 system sets the clock speed.
True
37. True or false: In order to have reliable and good throughput wireless connec-
tivity, the wireless access point and the wireless clients must be compatible
and use the same standard.
True
Certification Questions
54. True or false: If the signal quality drops from excellent to good, the antenna
or access point should be replaced.
False
55. The network administrator is setting up a wireless network. There is a chance
of radio interference. How can the network administrator avoid or minimize
potential interference problems?
a. Perform an RF study prior to installation of the wireless network.
b. Contact all owners of equipment that may cause interference and ask
them to use different systems.
INDEX 765
766 INDEX
INDEX 767
768 INDEX
INDEX 769
C fiber-optic cabling
absorption, 136
cabinets, locking, 661 advantages of, 126–127
cable modems APC connectors, 146
home networks, 28, 29 attenuation (insertion loss), 127, 136–137
security, 644 attenuators, 142
cabling backbones, 155
8P8C connectors, 70–71 bandwidth, 126
10BASE2 cabling, 41 BD fiber, 151–154
10BASE5 cabling, 41 branching devices, 142
10BASE-FL cabling, 41 building distributions, 151–154
10BASE-T cabling, 41 campus networks, 154–157
10GBASE-LR cabling, 41 chromatic dispersion, 137–138
10GBASE-SR cabling, 41 cladding, 130
10GBASE-T cabling, 41, 76, 97–98 color-coding fiber, 156
AXT, 98 components of, 126, 141–142
full-duplex transmissions, 100 connectorization, 145–146
F/UTP, 99 cores, 130
hybrid echo cancellation circuits, 100 corrosion, 127
IEEE 802.3an-2006, 98 costs, 127
performance, 100–101 crosstalk, 127
PSAACRF, 98, 99 CWDM, 142
PSANEXT, 98, 99 detectors, 143–145
signal transmission, 100–101 DFB lasers, 141
40GBASE-T cabling, 41 diplexers, 154
100BASE-FX cabling, 41 dispersion, 137–139
100BASE-SX cabling, 41 dispersion compensation, 139
100BASE-TX cabling, 41 dispersion shifted fibers, 138–139
1000BASE-LX cabling, 41 DL, 141
1000BASE-SX cabling, 41 DWDM, 130, 141
1000BASE-T cabling, 41 electrostatic interference, 126
attenuation (insertion loss), 92, 93–94 Ethernet, 157
backbone cabling, 67 events, troubleshooting, 162
balanced mode, 74–75 FC connectors, 145–146
CAT5, patch cabling, CAT5, assembling, 87–90 fiber, 142
CAT5e, test examples, 104–109 fiber Bragg grating, 139
CAT6 cabling, 40 fiber cross-connects, 151
certification, 93–96 fiber selection, 132–133
channel specifications, 93–96 fiber-to-the-home/business, 130
coaxial cabling, 64 FTTB, 149
770 INDEX
INDEX 771
772 INDEX
INDEX 773
774 INDEX
INDEX 775
776 INDEX
INDEX 777
778 INDEX
INDEX 779
780 INDEX
INDEX 781
782 INDEX
INDEX 783
784 INDEX
INDEX 785
J Ethernet LAN, 16
cabling, numerics, 41
jamming wireless networks, 638 CSMA/CD, 16
jitter, 252 frames, 17
jumbo frames, 17 Ethernet service attributes, 276–277
Ethernet Service Definition, 274
786 INDEX
INDEX 787
788 INDEX
INDEX 789
N connecting, 32
cost, 30
NAC (Network Access Control), 624 data speeds, 30
name resolution, troubleshooting, 571 ease of implementation, 31
NAS (Network Attached Storage), 700 encryption, 33
NAT (Network Address Translation), 34 home access, 31
defined, 34 hotspots, 32
private IP addresses, 34–35 NAT, 34–36
public IP addresses, 35 public access, 31
scaling networks, 537–538 range extenders, 32
NCP (Network Control Protocol), 292 security, 33–34
NDA (Non-Disclosure Agreements), 725 troubleshooting, 31–32
near-end testing, 94 infrastructure management
NET (Network Entity Title) addresses, 479 DHCP deployments, 535–537
NET, subnet, 363 DNS, 539–546
netstat -a command, 600 domain names, 528
netstat -b command, 601 FTP data packets, 566–567
netstat -r command, 448 IP address assignments, 529–530
network adapters, home networks, 26 IP address management with DHCP, 531–537
network addresses, 249, 322 network management protocols, 546–551
network bridges. See bridges number resources, 529
Network interface layer, TCP/IP, 294, 304 protocol assignments, 529
Network layer, OSI model, 13 scaling networks, 537–538
network numbers, IP addressing, 21, 482 SFTP, 566
790 INDEX
INDEX 791
792 INDEX
O dispersion, 137–139
dispersion compensation, 139
OC (Optical Carriers), 270 dispersion shifted fibers, 138–139
OFDM (Orthogonal Frequency-Division Multiplexing), DL, 141
180, 200 DWDM, 130, 141
offboarding/onboarding policies, 727 electrostatic interference, 126
INDEX 793
794 INDEX
INDEX 795
796 INDEX
INDEX 797
798 INDEX
INDEX 799
800 INDEX
INDEX 801
802 INDEX
INDEX 803
804 INDEX
INDEX 805
806 INDEX
INDEX 807
808 INDEX
INDEX 809
810 INDEX
INDEX 811
812 INDEX
INDEX 813
814 INDEX
INDEX 815
816 INDEX
INDEX 817