Choose 2 of the 4 case studies from below and answer questions for the case study. - Management
Choose 2 of the 4 case studies from below and answer questions for the case study. Choose two: Case Study: Bluetooth Security (Pg. 492) Besides bluejacking and bluesnarfing, there are other security issues that Bluetooth could face as its popularity continues to increase. Use the Internet to research Bluetooth security. What are the attacks that could be launched against Bluetooth? What are the defenses against these attacks? Will they have an impact on Bluetooth's popularity? Case Study: Future of UWB (Pg. 492) In addition to concerns regarding interference, other factors have contributed to the stalled growth of UWB. What are these factors? Does UWB have a future or will it be replaced by other technologies? Using the Internet research the problems of UWB, the source of those problems, and what the future holds for UWB. Give your opinion about you believe will happen with this technology. Case Study: RFID Passports (Pg. 493) Although several nations use RFID technology with their paper passports, there was a concern initially voiced that unauthorized individuals could intercept these transmissions and use them in nefarious ways against the passport holders. In response the United States made modifications to the RFID technology in its passports. Research RFID technology in passports, and particularly note the changes the United States made to make them more secure. In your opinion, are these additional security protections adequate? Why or why not? Case Study: Body Area Networks (Pg. 493) Body area networks (BANs) hold the promise of providing significant benefits particularly in the healthcare area to provide patients with more immediate care. Using the Internet, research BANs. What are some ways in which they are being used today? What are some new technologies that may be introduced in the new feature utilizing BANs? And what concerns are there about these networks from a social and a security perspective? Writing Requirements Include Abstract 5 pages in length (excluding cover page, abstract, and reference list) Include a minimum of 2 outside sources Include In text Citations where necessary Use Correct APA format for reference from the channel center, so that they actually consume five overlapping channels (for example, transmitting on channel 6 may cause interference on channels 5 and 7 as well as limited on channels 4 and 8). This leaves only three nonoverlapping (simultaneously usable) 20-MHz channels: 1, 6, and 11. IEEE 802.11a networks have 555 MHz spread across 23 nonover- lapping channels. Channel allocation is covered in Chapter 5. Managing the radio frequency spectrum of 802.11b/g—and to a lesser degree 802.11a—wireless networks can be challenging. Setting all of the APs to the same channel number would result in reduced throughput because each station must wait a longer period of time for its turn to transmit (called cochannel interference). To eliminate this interference it is necessary to arrange the coverage areas of the APs so that one channel does not interfere with an adjacent channel. In Figure 7-6, only channels 1, 6 and 11 are used as nonoverlap- ping channel numbers. Each cell is separated from other cells so that no two adjacent cells have the same channel number in order to reduce interference (known as adjacent channel interference). This type of WLAN is called a multiple-channel architecture or MCA because more than one channel is in the wireless network. One of the keys to an MCA is to have the correct cell size in order to minimize adjacent channel interference. This is especially true when “scaling” or adding additional capacity to the WLAN. The most common approach, called the micro-cell architecture, creates small areas of coverage. Typically, in order to add wireless network capacity, more APs are added while the transmission power of all APs is reduced to minimize potential interference. This can usually provide acceptable network throughput if the site has been properly surveyed to identify the best locations for the APs. In addition, the configuration of BSSIDs and ESSIDs can be made easier in a micro-cell architecture. Single-Channel Architecture (SCA) The fundamental reason why multiple APs in a MCA are necessary is because the interference range of wireless devices exceeds their useful communication range. That is, devices that are too far apart to communicate can still be close enough to interfere with each other. An alter- native to MCA that addresses this weakness is the single-channel architecture (SCA). Instead of having each cell use a different channel as in WCA, WLANs using SCA have all of the APs use the same channel. Each AP has overlapping coverage that forms a continuous region on a single channel, thereby reducing interference. The SCA architecture is accomplished through 6 1 11 116 1 11 6 1 11 6 1 6 1 11 116 1 11 6 1 11 6 1 Figure 7-6 Nonoverlapping cells © Cengage Learning 2013 256 Chapter 7 WLAN Management and Architectures Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 7 the use of lightweight APs and WLCs. Each lightweight AP broadcasts the same virtual BSSID (instead of multiple BSSIDs) and each has the same configured MAC address. This also serves to eliminate the cochannel interference problem. There are several advantages to SCA. The first advantage is smoother handoffs. A mobile sta- tion must receive an uninterrupted flow of frames when moving from the coverage area of one AP to another AP, especially when using VoIP. With MCA, the station responsible for this pro- cedure monitors the signal strength from multiple APs or data frame error rates. With SCA, the handoff is instead accomplished through coordination between the lightweight APs and the WLC. The stations cannot distinguish which AP is providing the coverage; instead, the net- work decides which AP should transmit and receive data for a particular station. This means that the stations are not involved in any handoff decision from one AP to another. As stations move, the network directs traffic to them via the nearest AP with available capacity. With SCA, the roaming clients are “fooled” into thinking that they are always interacting with the same AP when in reality they may be communicating with several different APs. A second advantage to SCA is that the often tedious planning process required for MCA WLANs is no longer needed. All APs are set to the same common RF channel and transmit power, eliminating the need for lengthy and often complex planning regarding the location and unique configuration of each AP. Another advantage to SCA is that because each AP is operating on the same channel, cochan- nel interference is no longer an issue. This can also improve the signal-to-noise ratio (SNR) that in turn increases throughput and reliability. A final advantage is that the SCA architecture provides more network information in order to make informed decisions. With MCA, a station and AP are essentially “in the dark” regarding the overall status of the network. Yet with SCA a more complete knowledge of the conditions at neighboring APs, and even historical information about how stations reacted previously when in similar situations, can be used when deciding which AP a roam- ing client should be associated with. MCA is similar to the centralized handover control of first-generation cellular telephone networks, while today’s 3G and 4G is based on a shared network-client responsibility like SCA. SCA can also support channel stacking. Channel stacking allows for increased capacity by hav- ing more than one SCA operating in an area. Instead of having only one SCA on channel 1, another set of APs operating on channel 6 can also be added using a different BSSID. Stations can then associate with either SCA, thus dramatically increasing the available capacity. This additional capacity can be used for redundancy or to support higher data rates or user density. Instead of installing additional APs, channel stacking can also be accomplished by using APs that support multiple radios. Multiple-Channel Architecture vs. Single-Channel Architecture Models 257 Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Wireless Network Management Systems (WNMS) C W N A 4.4.4. Define, describe, and implement a WNMS that manages autonomous APs, WLAN controllers, and mesh nodes. A wireless network management system (WNMS) is a set of hardware and/or software that can be used to provide unified management of a wireless network. This includes configuration man- agement, deployment, and especially troubleshooting. A WNMS can be used to isolate and solve wireless problems, which can have many different root causes (station wireless configuration errors, authentication problems, connectivity issues, problems with wired ports or switches, etc.). The typical features of a WNMS include: ● Configuration management. A new or updated configuration can be “pushed” out to all wireless devices, a single device, or a group of specific devices. These configurations can be designed so that general updates do not override specific configuration settings unique to each device. ● Firmware/Software distribution. As new firmware and software is made available, these can be distributed to all devices from a central management facility, with no need to “touch” each device. ● Intelligent scheduling. To minimize the impact of a new configuration or firmware update, many WNMS can be scheduled to automatically occur late at night or on the weekends when the wireless network usage is low. In addition, recurring tasks can be scheduled to automatically occur on a regular daily, weekly, or monthly basis. ● User and device monitoring. A WNMS can locate a specific user or device on a wire- less network often by WLAN administrator clicking a single button on a Web-based software interface. This allows a wireless technician to monitor historical information and use special diagnostic information to address problems. One of the disadvantages of a WNMS is that it cannot be used to monitor wireless network traffic as it occurs. Power Management C W N A 3.1.3. Explain and apply the power management features of WLANs. Most stations in a WLAN are portable laptop or tablet computers, giving the users the freedom to roam without being tethered to the network by wires. These devices depend upon batteries as their primary power source when they are mobile. To conserve battery power, 258 Chapter 7 WLAN Management and Architectures Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 7 laptops are usually configured to go into a “sleep” mode after a specific period of time, when functions such as the hard drive or display screen are temporarily powered down by the computer. However, a laptop that is part of a WLAN must remain “awake” in order to receive wireless network transmissions. If a laptop is in sleep mode, it could miss important transmitted infor- mation or even lose the network connection altogether. The dilemma is how to allow the lap- top to power down into sleep mode during idle periods to preserve battery life yet continue to be active to receive network transmissions. The reason a wireless laptop must continue to remain awake to receive network transmissions is because the original IEEE 802 standard assumes that stations are always ready to receive a network message. The answer to the problem is known as power management. Power management allows a station to be in either active mode when it is continuously awake or in power save mode, which turns off the wireless network interface card adapter to conserve battery life but still not miss wireless transmissions. Power management is transparent to all protocols and appli- cations so that it will not interfere with normal network functions. Power save mode is also called continuous aware mode or constantly awake mode. IEEE 802.11 power management can be divided into two categories: basic power manage- ment and enhanced power management techniques. Basic Power Management In a BSS infrastructure WLAN, the steps of power save mode are as follows: 1. A station sends a frame to the AP with the Power Management field set to 1 to indicate that it will go into power save mode after this frame transmission. 2. The AP records that the station is in power save mode to prevent any frames from being sent to that station from the AP. 3. As the AP receives frames specifically for that station (unicast frames) it temporarily stores those frames at the AP (buffering). 4. At prescribed set times, the AP will send out a beacon frame to all stations. At the same time, all stations switch to active mode to receive the frame. This frame contains a list of the stations that have buffered unicast frames waiting at the AP. This list is known as the traffic indication map (TIM). 5. If a station learns from the TIM that buffered frames are waiting for it, that station will request the AP to have those frames forwarded (if it has no buffered frames then it can return to power save mode). Once the buffered frames are received the station can again return to power save mode. This is illustrated in Figure 7-7. Power Management 259 Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. The amount of power that a wireless network interface card adapter consumes is significant. One typical card requires 450 millionths of an amp (mA) to transmit and 270 mA to receive. While in power save mode it only consumes 15 mA. When a station in power save mode must receive a frame intended for all stations (multicast or broadcast frame) the AP will send a special TIM called a delivery traffic indication message (DTIM). All stations will then change to active mode to receive the frame. Power management for an IBSS is different because there is no AP. Every station in an IBSS must buffer the frames that it attempts to send to another device in case the receiving device is asleep. At a specific period of time, known as the ad hoc traffic indication message (ATIM) window, each station must be awake. At this time a station sends a beacon frame to all other stations. Those stations that previously attempted to send a frame to a sleeping station will now send an ATIM frame, which indicates that the receiving station has pending data to be received and must remain awake (any device that does not receive an ATIM frame can go back to sleep). Finally, the data frames are retrieved from the buffer and sent to the station that is now awake. There are a variety of configuration settings that can be used with power management. For example, different power save levels can be specified for a station in power save mode. One level may require that a station turn off the radio for as long as possible without losing network connectivity for the greatest power savings at the sake of network per- formance, while another setting can require that the station turn off the radio for small periods in order to provide optimal network performance. Enhanced Power Management Although the basic power management features can provide power savings, there are enhanced power management technologies that can provide additional functionality and Station A Power save mode Power save mode Active mode Station B Station C TIM Station A Yes Station C No Access point Send frames request Figure 7-7 Request for frames © Cengage Learning 2013 260 Chapter 7 WLAN Management and Architectures Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 7 power savings. These include Unscheduled Automatic Power Save Delivery, Power Save Multi-Poll, and Spatial Multiplexing Power Save. Unscheduled Automatic Power Save Delivery (U-APSD) The Unscheduled Automatic Power Save Delivery (U-APSD), which is similar to the Wi-Fi Alliance’s WMM Power-Save (WMM-PS), is often used when a wireless station is using VoIP. With the basic power management settings a device using VoIP for a voice conversation may receive frames every 10–20 milliseconds (ms), while an AP usually sends out a beacon frame every 100 ms. Because the delay is too long, normally a station using VoIP simply could not afford to go into power save mode. With U-APSD, the station would inform the AP that it is operating according to this proto- col, and the AP will then save any frames destined for this station. However, instead of waiting for the AP to send a beacon frame to all stations as with basic power management, whenever the AP sees a frame coming from the station it will immediately release any frames it has been holding for the station. This allows the station to sleep until it needs to send a VoIP frame to the AP, and that frame also serves as an indicator to release any packets des- tined for it. Once the station has received its frames it then goes back into power save mode. There is a slight delay for the station in listen mode when using VoIP with U-APSD while the AP gathers up and sends the frames, at which time the station goes into receive mode. U-APSD improves the efficiency of the basic power management in two ways: it increases the amount of time that a station can be in power save mode and it decreases the number of frames that a station must send and receive in order to download stored frames on the AP. An interesting benefit of U-APSD is that, when higher data rates are used, overall power savings increase. This is because a station will spend less time actively transmitting and receiving and will spend more time in power save mode. A device using U-APSD for VoIP consumes approximately one-sixth of the power compared with not using U-APSD. Power Save Multi-Poll (PSMP) Another enhanced power management mechanism is the Power Save Multi-Poll (PSMP), which can have either a scheduled or an unscheduled component. Scheduled PSMP (S-PSMP) allows an AP to send a transmission schedule to one or more stations in a WLAN. This schedule informs the stations when they should be in active mode to receive frames as well as when they are allowed to begin transmitting. And since a station can only send or receive frames based on the schedule, other stations cannot interfere with the transmissions by attempting to send simultaneously. By using a schedule, stations can be in power save mode for the maximum amount of time without missing any frames. Unscheduled PSMP (U-PSMP) functionality does not replace U-APSD (WMM), but rather extends it to add further functionality. Power Management 261 Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Although an improvement over basic power management, S-PSMP still requires a significant amount of overhead. In addition, stations may not be able to be in power save mode for extended periods of time. For example, with VoIP transmissions the time gap for station may be so short that the station must still remain in active mode while other stations are receiving their VoIP packets. Generally speaking, P-SPMP is used only if the number of sta- tions using VoIP associated with a single AP exceeds 15. If fewer than 15 stations are using VoIP, then U-APSD should be used instead. Spatial Multiplexing Power Save (SMPS) Spatial Multiplexing Power Save (SMPS) can be used with IEEE 802.11n devices using Multiple-Input Multiple-Output (MIMO). A device using MIMO may have a 2x3:2 configuration of two transmit antennas and three receive antennas (along with two data spatial streams), each having its own radio chain. Yet it is not necessary for all three of the receive radio chains to be simultaneously awake. This is because the station is only waiting to receive a low data rate beacon that may not be sent with MIMO encoding. SMPS allows the station to change from a 2x3:2 configuration to a 1x1:1 to save power. If the station is plugged into an electrical outlet running on alternating current (AC), it can be configured to run using all radio chains (since conserving power is not a concern). However, if the station begins running on a direct current (DC) battery, it will automatically “down- shift” to 1x1:1 while waiting to receive beacons. The station would then “upshift” back to 2x3:2 when necessary. SMPS is also called Dynamic MIMO Power Save. A device using SMPS can downshift and then tell the AP to prevent it from sending any MIMO-encoded frames to the device with only one receive radio chain. The AP can then send a request to send (RTS) packet that indicates the AP is about to send a MIMO packet so that the device can upshift to receive it. The power savings provided by SMPS can be significant. The ability to dynamically change the MIMO configuration can reduce power consumption by 30 percent when the traffic is low. Chapter Summary ■ The most common type of wireless architecture is an autonomous access point archi- tecture. Each AP is independent or autonomous from all other APs. There are several enhanced features in this type of architecture. Two of the most advanced features are Quality of Service (QoS) and wireless virtual LANs (VLANs). QoS provides the ability to prioritize different types of frames so that those frames that are more time-dependent, such as voice and video, can be given a higher priority (and arrive earlier) than standard data frames. A wireless VLAN is often used to segment traffic. Wireless 262 Chapter 7 WLAN Management and Architectures Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 7 VLANs can be configured in one of two ways. The difference depends upon which device separates the packets and directs them to different networks. ■ A controller-based architecture uses a wireless LAN controller (WLC) to manage and provide configuration services to the WLAN. Access points in a controller-based architecture are significantly different. A lightweight access point does not contain the management and configuration functions that are found in autonomous access points; instead, these features are contained in the centralized WLC. Lightweight access points only have simplified radios for wireless communication between devices and a media converter for accessing the wired network. A lightweight mesh AP can be used instead of a standard mesh AP. Lightweight mesh APs can also be centrally configured and managed through a WLC. A captive portal AP uses a standard Web browser to pro- vide information, give the wireless user the opportunity to agree to a policy, or present valid login credentials. The WLC is a device that can be centrally configured; these settings are then automatically distributed to all lightweight access points. ■ Besides autonomous access point architectures and control-based architectures, there are other types of WLANs. A WLAN array is a proprietary product that resembles a round consumer-grade smoke detector and replaces a standard WLC installed in a rack in a server closet. The WLAN array contains a WLC that can be directly con- nected to as many as 16 integrated access points. Cooperative control is another proprietary technology marketed architecture that enables APs to communicate and coordinate with each other without the need for a WLC, so that each AP contains the capabilities of a WLC. Wireless mesh access points communicate wirelessly with the next closest mesh access point. ■ A multiple-channel architecture, or MCA, has more than one channel in the wireless network. Each cell is separated from other cells so that no two adjacent cells have the same channel number in order to reduce interference. An alternative to MCA is the single-channel architecture (SCA). Instead of having each cell use a different channel as in WCA, WLANs using SCA have all of the APs use the same channel. Each AP has overlapping coverage that forms a continuous region on a single channel, thereby reducing interference. The SCA architecture is accomplished through the use of lightweight APs and WLCs. ■ A wireless network management system (WNMS) is a set of hardware and/or software that can be used to provide unified management of a wireless network. This includes configuration management, deployment, and especially troubleshooting. A WNMS can be used to isolate and solve wireless problems, which can have many different root causes (station wireless configuration errors, authentication problems, connectivity issues, problems with wired ports or switches, etc.). ■ Power management allows a station to be in either active mode (continuously awake) or in power save mode (turns off the wireless network interface card adapter to con- serve battery life but still not miss wireless transmissions). Power management is transparent to all protocols and applications so that it will not interfere with normal network functions. Basic power management involves the AP temporarily storing frames and then releasing them to the stations. Although the basic power management features can provide power savings, there are enhanced power management technolo- gies that can provide additional functionality and power savings. With Unscheduled Automatic Power Save Delivery (U-APSD) a station informs the AP that it is operating Chapter Summary 263 Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. according to this protocol, and the AP will then save any frames destined for this station. Whenever the AP sees a frame coming from the station, it will immediately release any frames it has been holding for the station. Power Save Multi-Poll (PSMP) allows an AP to send a transmission schedule to one or more stations in a WLAN. This schedule informs the stations when they should be in active mode to receive frames as well as when they are allowed to begin transmitting. Spatial Multiplexing Power Save (SMPS) allows a station to change from a MIMO configuration to a single radio in order to conserve power. Key Terms active mode A power management state in which the station is continuously awake. ad hoc traffic indication message (ATIM) window A specific period of time that each station must be awake. adjacent channel interference Each cell is separated from other cells so that no two adjacent cells have the same channel number in order to reduce interference. captive portal AP An AP that uses a standard Web browser to provide information, give the wireless user the opportunity to agree to a policy, or present valid login credentials. channel stacking A technology that allows for increased capacity by having more than one SCA operating in an area. cloud management Connecting wireless devices together using the Internet in order to remotely manage them. cochannel interference Reduced throughput caused as a result of all of APs set to the same channel number. cooperative control A proprietary product in which each AP contains the capabilities of a WLC. delivery traffic indication message (DTIM) A special TIM sent by an AP that is used when a station in power save mode must receive a frame intended for all stations. distributed WLAN architecture A wireless architecture configuration in which multiple APs form a non-centralized network through a wireless connection. IEEE 802.11e-2005 The IEEE QoS standards. IEEE 802.1q An IEEE standard for marking VLAN packets. lightweight mesh AP A mesh AP that is centrally configured and managed through a WLC. micro-cell architecture A wireless architecture that creates small areas of coverage. multiple-channel architecture (MCA) A wireless architecture in which more than one channel is used in the wireless network. power management A technology that allows a WLAN to conserve power. power save mode A power management state in which the station turns off the wireless network interface card adapter to conserve battery life. Power Save Multi-Poll (PSMP) An enhanced power management technology that can have either a scheduled or an unscheduled component. Quality of Service (QoS) Prioritizing different types of frames over a network. 264 Chapter 7 WLAN Management and Architectures Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 7 Scheduled PSMP (S-PSMP) An enhanced power management technology in which the AP sends a transmission schedule to one or more stations in a WLAN. single-channel architecture (SCA) An architecture in which all of the APs use … By Mark Ciampa, Ph.D. CWNA Guide to Wireless LANs Third Edition Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CWNA Guide to Wireless LANs, Third Edition Mark Ciampa Vice President, Careers & Computing: Dave Garza Executive Editor: Stephen Helba Acquisitions Editor: Nick Lombardi Managing Editor: Marah Bellegarde Senior Product Manager: Michelle Ruelos Cannistraci Developmental Editor: Ann Shaffer Editorial Assistant: Sarah Pickering Vice President, Marketing: Jennifer Ann Baker Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Mark Linton Associate Marketing Manager: Erica Glisson Production Director: Wendy Troeger Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Art Director: Jackie Bates, GEX Cover Art: © sergey23/Shutterstock Images Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Any fictional data related to persons or companies or URLs used throughout this book is intended for instructional purposes only. At the time this book was printed, any such data was fictional and not belonging to any real persons or companies. Course Technology and the Course Technology logo are registered trademarks used under license. Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice. The programs in this book are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes. The author and the publisher do not offer any warranties or representations, nor do they accept any liabilities with respect to the programs. © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to [email protected] Example: Microsoft ® is a registered trademark of the Microsoft Corporation. Library of Congress Control Number: 2012939173 ISBN-13: 978-1-133-13217-2 ISBN-10: 1-133-13217-0 Course Technology 20 Channel Center Street Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international.cengage.com/region Cengage Learning products are represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit www.cengage.com/coursetechnology Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com Visit our corporate website at cengage.com. Printed in the United States of America 1 2 3 4 5 6 7 16 15 14 13 12 Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Brief Contents INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii CHAPTER 1 The World of Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 CHAPTER 2 Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 CHAPTER 3 Radio Frequency Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 CHAPTER 4 Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 CHAPTER 5 Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 CHAPTER 6 Media Access Control Layer Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 CHAPTER 7 WLAN Management and Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 CHAPTER 8 Conducting a Site Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 CHAPTER 9 Wireless LAN Security Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 CHAPTER 10 Implementing Wireless LAN Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 CHAPTER 11 Managing a Wireless LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 CHAPTER 12 Wireless Network Troubleshooting and Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 CHAPTER 13 Other Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 APPENDIX A CWNA Certification Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 APPENDIX B URLs for Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 APPENDIX C Wireless Web Sites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525 iii Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Table of Contents INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii CHAPTER 1 The World of Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Wireless Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Business. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Industry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Travel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Public Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Health Care. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Wireless Advantages and Disadvantages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Types of Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Wireless Personal Area Network (WPAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Wireless Local Area Network (WLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Wireless Metropolitan Area Network (WMAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Wireless Wide Area Network (WWAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Comparison of Wireless Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Wireless Standards Organizations and Regulatory Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 International Telecommunication Union Radio Communication Sector (ITU-R) . . . . . . . . . . . . . . . . . . . . 21 Federal Communications Commission (FCC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 International Organization for Standardization (ISO) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Institute of Electrical and Electronics Engineers (IEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Wi-Fi Alliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Certified Wireless Network Administrator (CWNA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 CHAPTER 2 Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Understanding Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 The Need for Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Sources of Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Types of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 IEEE 802.11-2007 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 IEEE 802.11n-2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 WLAN Client Hardware and Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Wireless Client Network Interface Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Client Utility Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 WLAN Infrastructure Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Access Points (APs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 v Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. WLAN Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Power over Ethernet (PoE) Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 CHAPTER 3 Radio Frequency Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Principles of Radio Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 What Are Electromagnetic Waves? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Electromagnetic Wave Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 The Electromagnetic Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Radio Frequency Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Analog Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Digital Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 RF Signal Strength Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Milliwatt (mW) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Decibel Milliwatt (dBm) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Receive Signal Strength Indicator (RSSI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Percentage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Signal-to-Noise Ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Radio Frequency Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Propagation Behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Impact of Behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 CHAPTER 4 Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Antenna Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 What Is an Antenna? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Antenna Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Types of Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Omnidirectional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Semidirectional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Highly-Directional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Antenna Coverage Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Azimuth and Elevation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Beamwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Fresnel Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Multiple-Input Multiple-Output (MIMO). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 What Is MIMO? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 MIMO Signal Processing Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 vi Table of Contents Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Antenna Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Antenna Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Measuring Antenna Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 CHAPTER 5 Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Wireless Modulation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Narrowband Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Spread-Spectrum Transmissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Comparison of Modulation Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 IEEE 802.11 Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 IEEE 802.11b Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 IEEE 802.11a Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 IEEE 802.11g Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 IEEE 802.11n Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 CHAPTER 6 Media Access Control Layer Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 WLAN Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Basic Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Extended Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Independent Basic Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 802.11 Media Access Control Layer Frame Formats and Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 MAC Frame Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 MAC Frame Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 MAC Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Discovering the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Joining the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Transmitting on the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Table of Contents vii Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 7 WLAN Management and …
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident