Choose 2 of the 4 case studies from below and answer questions for the case study. - Management
Choose 2 of the 4 case studies from below and answer questions for the case study.
Choose two:
Case Study: Bluetooth Security (Pg. 492)
Besides bluejacking and bluesnarfing, there are other security issues that Bluetooth could face as its popularity continues to increase. Use the Internet to research Bluetooth security. What are the attacks that could be launched against Bluetooth? What are the defenses against these attacks? Will they have an impact on Bluetooth's popularity?
Case Study: Future of UWB (Pg. 492)
In addition to concerns regarding interference, other factors have contributed to the stalled growth of UWB. What are these factors? Does UWB have a future or will it be replaced by other technologies? Using the Internet research the problems of UWB, the source of those problems, and what the future holds for UWB. Give your opinion about you believe will happen with this technology.
Case Study: RFID Passports (Pg. 493)
Although several nations use RFID technology with their paper passports, there was a concern initially voiced that unauthorized individuals could intercept these transmissions and use them in nefarious ways against the passport holders. In response the United States made modifications to the RFID technology in its passports. Research RFID technology in passports, and particularly note the changes the United States made to make them more secure. In your opinion, are these additional security protections adequate? Why or why not?
Case Study: Body Area Networks (Pg. 493)
Body area networks (BANs) hold the promise of providing significant benefits particularly in the healthcare area to provide patients with more immediate care. Using the Internet, research BANs. What are some ways in which they are being used today? What are some new technologies that may be introduced in the new feature utilizing BANs? And what concerns are there about these networks from a social and a security perspective?
Writing Requirements
Include Abstract
5 pages in length (excluding cover page, abstract, and reference list)
Include a minimum of 2 outside sources
Include In text Citations where necessary
Use Correct APA format for reference
from the channel center, so that they actually consume five overlapping channels (for example,
transmitting on channel 6 may cause interference on channels 5 and 7 as well as limited on
channels 4 and 8). This leaves only three nonoverlapping (simultaneously usable) 20-MHz
channels: 1, 6, and 11. IEEE 802.11a networks have 555 MHz spread across 23 nonover-
lapping channels.
Channel allocation is covered in Chapter 5.
Managing the radio frequency spectrum of 802.11b/g—and to a lesser degree
802.11a—wireless networks can be challenging. Setting all of the APs to the same channel
number would result in reduced throughput because each station must wait a longer period
of time for its turn to transmit (called cochannel interference). To eliminate this interference
it is necessary to arrange the coverage areas of the APs so that one channel does not interfere
with an adjacent channel. In Figure 7-6, only channels 1, 6 and 11 are used as nonoverlap-
ping channel numbers. Each cell is separated from other cells so that no two adjacent cells
have the same channel number in order to reduce interference (known as adjacent channel
interference). This type of WLAN is called a multiple-channel architecture or MCA because
more than one channel is in the wireless network.
One of the keys to an MCA is to have the correct cell size in order to minimize adjacent
channel interference. This is especially true when “scaling” or adding additional capacity to
the WLAN. The most common approach, called the micro-cell architecture, creates small
areas of coverage. Typically, in order to add wireless network capacity, more APs are added
while the transmission power of all APs is reduced to minimize potential interference. This
can usually provide acceptable network throughput if the site has been properly surveyed to
identify the best locations for the APs. In addition, the configuration of BSSIDs and ESSIDs
can be made easier in a micro-cell architecture.
Single-Channel Architecture (SCA)
The fundamental reason why multiple APs in a MCA are necessary is because the interference
range of wireless devices exceeds their useful communication range. That is, devices that are
too far apart to communicate can still be close enough to interfere with each other. An alter-
native to MCA that addresses this weakness is the single-channel architecture (SCA). Instead
of having each cell use a different channel as in WCA, WLANs using SCA have all of the APs
use the same channel. Each AP has overlapping coverage that forms a continuous region on a
single channel, thereby reducing interference. The SCA architecture is accomplished through
6 1 11 116 1
11 6 1 11 6 1
6 1 11 116 1
11 6 1 11 6 1
Figure 7-6 Nonoverlapping cells
© Cengage Learning 2013
256 Chapter 7 WLAN Management and Architectures
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7
the use of lightweight APs and WLCs. Each lightweight AP broadcasts the same virtual BSSID
(instead of multiple BSSIDs) and each has the same configured MAC address. This also serves
to eliminate the cochannel interference problem.
There are several advantages to SCA. The first advantage is smoother handoffs. A mobile sta-
tion must receive an uninterrupted flow of frames when moving from the coverage area of one
AP to another AP, especially when using VoIP. With MCA, the station responsible for this pro-
cedure monitors the signal strength from multiple APs or data frame error rates. With SCA, the
handoff is instead accomplished through coordination between the lightweight APs and the
WLC. The stations cannot distinguish which AP is providing the coverage; instead, the net-
work decides which AP should transmit and receive data for a particular station. This means
that the stations are not involved in any handoff decision from one AP to another. As stations
move, the network directs traffic to them via the nearest AP with available capacity.
With SCA, the roaming clients are “fooled” into thinking that they
are always interacting with the same AP when in reality they may be
communicating with several different APs.
A second advantage to SCA is that the often tedious planning process required for MCA
WLANs is no longer needed. All APs are set to the same common RF channel and transmit
power, eliminating the need for lengthy and often complex planning regarding the location
and unique configuration of each AP.
Another advantage to SCA is that because each AP is operating on the same channel, cochan-
nel interference is no longer an issue. This can also improve the signal-to-noise ratio (SNR)
that in turn increases throughput and reliability.
A final advantage is that the SCA architecture provides more network information in order
to make informed decisions. With MCA, a station and AP are essentially “in the dark”
regarding the overall status of the network. Yet with SCA a more complete knowledge of
the conditions at neighboring APs, and even historical information about how stations
reacted previously when in similar situations, can be used when deciding which AP a roam-
ing client should be associated with.
MCA is similar to the centralized handover control of first-generation
cellular telephone networks, while today’s 3G and 4G is based on a
shared network-client responsibility like SCA.
SCA can also support channel stacking. Channel stacking allows for increased capacity by hav-
ing more than one SCA operating in an area. Instead of having only one SCA on channel 1,
another set of APs operating on channel 6 can also be added using a different BSSID. Stations
can then associate with either SCA, thus dramatically increasing the available capacity. This
additional capacity can be used for redundancy or to support higher data rates or user density.
Instead of installing additional APs, channel stacking can also be
accomplished by using APs that support multiple radios.
Multiple-Channel Architecture vs. Single-Channel Architecture Models 257
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Wireless Network Management Systems (WNMS)
C W N A
4.4.4. Define, describe, and implement a WNMS that manages
autonomous APs, WLAN controllers, and mesh nodes.
A wireless network management system (WNMS) is a set of hardware and/or software that can
be used to provide unified management of a wireless network. This includes configuration man-
agement, deployment, and especially troubleshooting. A WNMS can be used to isolate and solve
wireless problems, which can have many different root causes (station wireless configuration
errors, authentication problems, connectivity issues, problems with wired ports or switches, etc.).
The typical features of a WNMS include:
● Configuration management. A new or updated configuration can be “pushed” out to
all wireless devices, a single device, or a group of specific devices. These configurations
can be designed so that general updates do not override specific configuration settings
unique to each device.
● Firmware/Software distribution. As new firmware and software is made available,
these can be distributed to all devices from a central management facility, with no need
to “touch” each device.
● Intelligent scheduling. To minimize the impact of a new configuration or firmware
update, many WNMS can be scheduled to automatically occur late at night or on the
weekends when the wireless network usage is low. In addition, recurring tasks can be
scheduled to automatically occur on a regular daily, weekly, or monthly basis.
● User and device monitoring. A WNMS can locate a specific user or device on a wire-
less network often by WLAN administrator clicking a single button on a Web-based
software interface. This allows a wireless technician to monitor historical information
and use special diagnostic information to address problems.
One of the disadvantages of a WNMS is that it cannot be used to
monitor wireless network traffic as it occurs.
Power Management
C W N A
3.1.3. Explain and apply the power management features of WLANs.
Most stations in a WLAN are portable laptop or tablet computers, giving the users the
freedom to roam without being tethered to the network by wires. These devices depend upon
batteries as their primary power source when they are mobile. To conserve battery power,
258 Chapter 7 WLAN Management and Architectures
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7
laptops are usually configured to go into a “sleep” mode after a specific period of time, when
functions such as the hard drive or display screen are temporarily powered down by the
computer.
However, a laptop that is part of a WLAN must remain “awake” in order to receive wireless
network transmissions. If a laptop is in sleep mode, it could miss important transmitted infor-
mation or even lose the network connection altogether. The dilemma is how to allow the lap-
top to power down into sleep mode during idle periods to preserve battery life yet continue to
be active to receive network transmissions.
The reason a wireless laptop must continue to remain awake to receive
network transmissions is because the original IEEE 802 standard assumes
that stations are always ready to receive a network message.
The answer to the problem is known as power management. Power management allows a
station to be in either active mode when it is continuously awake or in power save mode,
which turns off the wireless network interface card adapter to conserve battery life but still
not miss wireless transmissions. Power management is transparent to all protocols and appli-
cations so that it will not interfere with normal network functions.
Power save mode is also called continuous aware mode or constantly
awake mode.
IEEE 802.11 power management can be divided into two categories: basic power manage-
ment and enhanced power management techniques.
Basic Power Management
In a BSS infrastructure WLAN, the steps of power save mode are as follows:
1. A station sends a frame to the AP with the Power Management field set to 1 to indicate
that it will go into power save mode after this frame transmission.
2. The AP records that the station is in power save mode to prevent any frames from being
sent to that station from the AP.
3. As the AP receives frames specifically for that station (unicast frames) it temporarily
stores those frames at the AP (buffering).
4. At prescribed set times, the AP will send out a beacon frame to all stations. At the same
time, all stations switch to active mode to receive the frame. This frame contains a list of
the stations that have buffered unicast frames waiting at the AP. This list is known as
the traffic indication map (TIM).
5. If a station learns from the TIM that buffered frames are waiting for it, that station will
request the AP to have those frames forwarded (if it has no buffered frames then it can
return to power save mode). Once the buffered frames are received the station can again
return to power save mode. This is illustrated in Figure 7-7.
Power Management 259
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The amount of power that a wireless network interface card adapter
consumes is significant. One typical card requires 450 millionths of
an amp (mA) to transmit and 270 mA to receive. While in power
save mode it only consumes 15 mA.
When a station in power save mode must receive a frame intended for all stations (multicast
or broadcast frame) the AP will send a special TIM called a delivery traffic indication
message (DTIM). All stations will then change to active mode to receive the frame.
Power management for an IBSS is different because there is no AP. Every station in an IBSS
must buffer the frames that it attempts to send to another device in case the receiving device
is asleep. At a specific period of time, known as the ad hoc traffic indication message
(ATIM) window, each station must be awake. At this time a station sends a beacon frame
to all other stations. Those stations that previously attempted to send a frame to a sleeping
station will now send an ATIM frame, which indicates that the receiving station has pending
data to be received and must remain awake (any device that does not receive an ATIM frame
can go back to sleep). Finally, the data frames are retrieved from the buffer and sent to the
station that is now awake.
There are a variety of configuration settings that can be used with
power management. For example, different power save levels can be
specified for a station in power save mode. One level may require that a
station turn off the radio for as long as possible without losing network
connectivity for the greatest power savings at the sake of network per-
formance, while another setting can require that the station turn off the radio for small periods in
order to provide optimal network performance.
Enhanced Power Management
Although the basic power management features can provide power savings, there are
enhanced power management technologies that can provide additional functionality and
Station A
Power save mode
Power save mode
Active mode
Station B
Station C TIM
Station
A
Yes
Station
C
No Access point
Send frames request
Figure 7-7 Request for frames
© Cengage Learning 2013
260 Chapter 7 WLAN Management and Architectures
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7
power savings. These include Unscheduled Automatic Power Save Delivery, Power Save
Multi-Poll, and Spatial Multiplexing Power Save.
Unscheduled Automatic Power Save Delivery (U-APSD) The Unscheduled
Automatic Power Save Delivery (U-APSD), which is similar to the Wi-Fi Alliance’s WMM
Power-Save (WMM-PS), is often used when a wireless station is using VoIP. With the basic
power management settings a device using VoIP for a voice conversation may receive frames
every 10–20 milliseconds (ms), while an AP usually sends out a beacon frame every 100 ms.
Because the delay is too long, normally a station using VoIP simply could not afford to go
into power save mode.
With U-APSD, the station would inform the AP that it is operating according to this proto-
col, and the AP will then save any frames destined for this station. However, instead of
waiting for the AP to send a beacon frame to all stations as with basic power management,
whenever the AP sees a frame coming from the station it will immediately release any frames
it has been holding for the station. This allows the station to sleep until it needs to send a
VoIP frame to the AP, and that frame also serves as an indicator to release any packets des-
tined for it. Once the station has received its frames it then goes back into power save mode.
There is a slight delay for the station in listen mode when using VoIP
with U-APSD while the AP gathers up and sends the frames, at
which time the station goes into receive mode.
U-APSD improves the efficiency of the basic power management in two ways: it increases
the amount of time that a station can be in power save mode and it decreases the number
of frames that a station must send and receive in order to download stored frames on the
AP. An interesting benefit of U-APSD is that, when higher data rates are used, overall
power savings increase. This is because a station will spend less time actively transmitting
and receiving and will spend more time in power save mode.
A device using U-APSD for VoIP consumes approximately one-sixth of
the power compared with not using U-APSD.
Power Save Multi-Poll (PSMP) Another enhanced power management mechanism is
the Power Save Multi-Poll (PSMP), which can have either a scheduled or an unscheduled
component. Scheduled PSMP (S-PSMP) allows an AP to send a transmission schedule to one
or more stations in a WLAN. This schedule informs the stations when they should be in active
mode to receive frames as well as when they are allowed to begin transmitting. And since a
station can only send or receive frames based on the schedule, other stations cannot interfere
with the transmissions by attempting to send simultaneously. By using a schedule, stations
can be in power save mode for the maximum amount of time without missing any frames.
Unscheduled PSMP (U-PSMP) functionality does not replace U-APSD
(WMM), but rather extends it to add further functionality.
Power Management 261
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Although an improvement over basic power management, S-PSMP still requires a significant
amount of overhead. In addition, stations may not be able to be in power save mode for
extended periods of time. For example, with VoIP transmissions the time gap for station
may be so short that the station must still remain in active mode while other stations are
receiving their VoIP packets. Generally speaking, P-SPMP is used only if the number of sta-
tions using VoIP associated with a single AP exceeds 15. If fewer than 15 stations are using
VoIP, then U-APSD should be used instead.
Spatial Multiplexing Power Save (SMPS) Spatial Multiplexing Power Save
(SMPS) can be used with IEEE 802.11n devices using Multiple-Input Multiple-Output
(MIMO). A device using MIMO may have a 2x3:2 configuration of two transmit antennas
and three receive antennas (along with two data spatial streams), each having its own radio
chain. Yet it is not necessary for all three of the receive radio chains to be simultaneously
awake. This is because the station is only waiting to receive a low data rate beacon that
may not be sent with MIMO encoding.
SMPS allows the station to change from a 2x3:2 configuration to a 1x1:1 to save power. If
the station is plugged into an electrical outlet running on alternating current (AC), it can be
configured to run using all radio chains (since conserving power is not a concern). However,
if the station begins running on a direct current (DC) battery, it will automatically “down-
shift” to 1x1:1 while waiting to receive beacons. The station would then “upshift” back to
2x3:2 when necessary.
SMPS is also called Dynamic MIMO Power Save.
A device using SMPS can downshift and then tell the AP to prevent it from sending any
MIMO-encoded frames to the device with only one receive radio chain. The AP can then
send a request to send (RTS) packet that indicates the AP is about to send a MIMO packet
so that the device can upshift to receive it.
The power savings provided by SMPS can be significant. The ability
to dynamically change the MIMO configuration can reduce power
consumption by 30 percent when the traffic is low.
Chapter Summary
■ The most common type of wireless architecture is an autonomous access point archi-
tecture. Each AP is independent or autonomous from all other APs. There are several
enhanced features in this type of architecture. Two of the most advanced features are
Quality of Service (QoS) and wireless virtual LANs (VLANs). QoS provides the ability
to prioritize different types of frames so that those frames that are more time-dependent,
such as voice and video, can be given a higher priority (and arrive earlier) than
standard data frames. A wireless VLAN is often used to segment traffic. Wireless
262 Chapter 7 WLAN Management and Architectures
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7
VLANs can be configured in one of two ways. The difference depends upon which
device separates the packets and directs them to different networks.
■ A controller-based architecture uses a wireless LAN controller (WLC) to manage and
provide configuration services to the WLAN. Access points in a controller-based
architecture are significantly different. A lightweight access point does not contain the
management and configuration functions that are found in autonomous access points;
instead, these features are contained in the centralized WLC. Lightweight access points
only have simplified radios for wireless communication between devices and a media
converter for accessing the wired network. A lightweight mesh AP can be used instead
of a standard mesh AP. Lightweight mesh APs can also be centrally configured and
managed through a WLC. A captive portal AP uses a standard Web browser to pro-
vide information, give the wireless user the opportunity to agree to a policy, or present
valid login credentials. The WLC is a device that can be centrally configured; these
settings are then automatically distributed to all lightweight access points.
■ Besides autonomous access point architectures and control-based architectures, there
are other types of WLANs. A WLAN array is a proprietary product that resembles a
round consumer-grade smoke detector and replaces a standard WLC installed in a
rack in a server closet. The WLAN array contains a WLC that can be directly con-
nected to as many as 16 integrated access points. Cooperative control is another
proprietary technology marketed architecture that enables APs to communicate and
coordinate with each other without the need for a WLC, so that each AP contains
the capabilities of a WLC. Wireless mesh access points communicate wirelessly with
the next closest mesh access point.
■ A multiple-channel architecture, or MCA, has more than one channel in the wireless
network. Each cell is separated from other cells so that no two adjacent cells have the
same channel number in order to reduce interference. An alternative to MCA is the
single-channel architecture (SCA). Instead of having each cell use a different channel as
in WCA, WLANs using SCA have all of the APs use the same channel. Each AP has
overlapping coverage that forms a continuous region on a single channel, thereby
reducing interference. The SCA architecture is accomplished through the use of
lightweight APs and WLCs.
■ A wireless network management system (WNMS) is a set of hardware and/or software
that can be used to provide unified management of a wireless network. This includes
configuration management, deployment, and especially troubleshooting. A WNMS can
be used to isolate and solve wireless problems, which can have many different root
causes (station wireless configuration errors, authentication problems, connectivity
issues, problems with wired ports or switches, etc.).
■ Power management allows a station to be in either active mode (continuously awake)
or in power save mode (turns off the wireless network interface card adapter to con-
serve battery life but still not miss wireless transmissions). Power management is
transparent to all protocols and applications so that it will not interfere with normal
network functions. Basic power management involves the AP temporarily storing
frames and then releasing them to the stations. Although the basic power management
features can provide power savings, there are enhanced power management technolo-
gies that can provide additional functionality and power savings. With Unscheduled
Automatic Power Save Delivery (U-APSD) a station informs the AP that it is operating
Chapter Summary 263
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
according to this protocol, and the AP will then save any frames destined for this
station. Whenever the AP sees a frame coming from the station, it will immediately
release any frames it has been holding for the station. Power Save Multi-Poll (PSMP)
allows an AP to send a transmission schedule to one or more stations in a WLAN.
This schedule informs the stations when they should be in active mode to receive
frames as well as when they are allowed to begin transmitting. Spatial Multiplexing
Power Save (SMPS) allows a station to change from a MIMO configuration to a single
radio in order to conserve power.
Key Terms
active mode A power management state in which the station is continuously awake.
ad hoc traffic indication message (ATIM) window A specific period of time that each
station must be awake.
adjacent channel interference Each cell is separated from other cells so that no two
adjacent cells have the same channel number in order to reduce interference.
captive portal AP An AP that uses a standard Web browser to provide information, give
the wireless user the opportunity to agree to a policy, or present valid login credentials.
channel stacking A technology that allows for increased capacity by having more than one
SCA operating in an area.
cloud management Connecting wireless devices together using the Internet in order to
remotely manage them.
cochannel interference Reduced throughput caused as a result of all of APs set to the
same channel number.
cooperative control A proprietary product in which each AP contains the capabilities of a
WLC.
delivery traffic indication message (DTIM) A special TIM sent by an AP that is used when
a station in power save mode must receive a frame intended for all stations.
distributed WLAN architecture A wireless architecture configuration in which multiple
APs form a non-centralized network through a wireless connection.
IEEE 802.11e-2005 The IEEE QoS standards.
IEEE 802.1q An IEEE standard for marking VLAN packets.
lightweight mesh AP A mesh AP that is centrally configured and managed through a
WLC.
micro-cell architecture A wireless architecture that creates small areas of coverage.
multiple-channel architecture (MCA) A wireless architecture in which more than one
channel is used in the wireless network.
power management A technology that allows a WLAN to conserve power.
power save mode A power management state in which the station turns off the wireless
network interface card adapter to conserve battery life.
Power Save Multi-Poll (PSMP) An enhanced power management technology that can have
either a scheduled or an unscheduled component.
Quality of Service (QoS) Prioritizing different types of frames over a network.
264 Chapter 7 WLAN Management and Architectures
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7
Scheduled PSMP (S-PSMP) An enhanced power management technology in which the AP
sends a transmission schedule to one or more stations in a WLAN.
single-channel architecture (SCA) An architecture in which all of the APs use …
By Mark Ciampa, Ph.D.
CWNA Guide to Wireless LANs
Third Edition
Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CWNA Guide to Wireless LANs, Third Edition
Mark Ciampa
Vice President, Careers & Computing: Dave Garza
Executive Editor: Stephen Helba
Acquisitions Editor: Nick Lombardi
Managing Editor: Marah Bellegarde
Senior Product Manager: Michelle Ruelos
Cannistraci
Developmental Editor: Ann Shaffer
Editorial Assistant: Sarah Pickering
Vice President, Marketing: Jennifer Ann Baker
Marketing Director: Deborah S. Yarnell
Senior Marketing Manager: Mark Linton
Associate Marketing Manager: Erica Glisson
Production Director: Wendy Troeger
Production Manager: Andrew Crouth
Content Project Manager: Brooke Greenhouse
Art Director: Jackie Bates, GEX
Cover Art: © sergey23/Shutterstock Images
Some of the product names and company names used in this
book have been used for identification purposes only and may
be trademarks or registered trademarks of their respective
manufacturers and sellers.
Any fictional data related to persons or companies or URLs used
throughout this book is intended for instructional purposes only.
At the time this book was printed, any such data was fictional
and not belonging to any real persons or companies.
Course Technology and the Course Technology logo are
registered trademarks used under license.
Course Technology, a part of Cengage Learning, reserves the
right to revise this publication and make changes from time to
time in its content without notice.
The programs in this book are for instructional purposes
only. They have been tested with care, but are not guaranteed
for any particular intent beyond educational purposes. The
author and the publisher do not offer any warranties or
representations, nor do they accept any liabilities with respect
to the programs.
© 2013 Course Technology, Cengage Learning
ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced, transmitted, stored or used in any form
or by any means graphic, electronic, or mechanical, including but
not limited to photocopying, recording, scanning, digitizing, taping,
Web distribution, information networks, or information storage and
retrieval systems, except as permitted under Section 107 or 108
of the 1976 United States Copyright Act, without the prior written
permission of the publisher.
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706.
For permission to use material from this text or product,
submit all requests online at cengage.com/permissions
Further permissions questions can be emailed to
[email protected]
Example: Microsoft ® is a registered trademark of the Microsoft
Corporation.
Library of Congress Control Number: 2012939173
ISBN-13: 978-1-133-13217-2
ISBN-10: 1-133-13217-0
Course Technology
20 Channel Center Street
Boston, MA 02210
USA
Cengage Learning is a leading provider of customized learning
solutions with office locations around the globe, including Singapore,
the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your
local office at: international.cengage.com/region
Cengage Learning products are represented in Canada by
Nelson Education, Ltd.
For your lifelong learning solutions, visit
www.cengage.com/coursetechnology
Purchase any of our products at your local college store or at our
preferred online store www.cengagebrain.com
Visit our corporate website at cengage.com.
Printed in the United States of America
1 2 3 4 5 6 7 16 15 14 13 12
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Brief Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
CHAPTER 1
The World of Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CHAPTER 2
Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
CHAPTER 3
Radio Frequency Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
CHAPTER 4
Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
CHAPTER 5
Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
CHAPTER 6
Media Access Control Layer Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
CHAPTER 7
WLAN Management and Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
CHAPTER 8
Conducting a Site Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
CHAPTER 9
Wireless LAN Security Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
CHAPTER 10
Implementing Wireless LAN Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
CHAPTER 11
Managing a Wireless LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
CHAPTER 12
Wireless Network Troubleshooting and Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
CHAPTER 13
Other Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
APPENDIX A
CWNA Certification Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
APPENDIX B
URLs for Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
APPENDIX C
Wireless Web Sites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
iii
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
CHAPTER 1
The World of Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Wireless Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Business. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Industry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Travel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Public Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Health Care. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Wireless Advantages and Disadvantages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Types of Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Wireless Personal Area Network (WPAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Wireless Local Area Network (WLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Wireless Metropolitan Area Network (WMAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Wireless Wide Area Network (WWAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Comparison of Wireless Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Wireless Standards Organizations and Regulatory Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
International Telecommunication Union Radio Communication Sector (ITU-R) . . . . . . . . . . . . . . . . . . . . 21
Federal Communications Commission (FCC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
International Organization for Standardization (ISO) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Institute of Electrical and Electronics Engineers (IEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Wi-Fi Alliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Certified Wireless Network Administrator (CWNA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
CHAPTER 2
Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Understanding Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
The Need for Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Sources of Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Types of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
IEEE 802.11-2007 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
IEEE 802.11n-2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
WLAN Client Hardware and Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Wireless Client Network Interface Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Client Utility Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
WLAN Infrastructure Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Access Points (APs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
v
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
WLAN Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Power over Ethernet (PoE) Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
CHAPTER 3
Radio Frequency Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Principles of Radio Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
What Are Electromagnetic Waves? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Electromagnetic Wave Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
The Electromagnetic Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Radio Frequency Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Analog Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Digital Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
RF Signal Strength Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Milliwatt (mW) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Decibel Milliwatt (dBm) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Receive Signal Strength Indicator (RSSI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Percentage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Signal-to-Noise Ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Radio Frequency Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Propagation Behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Impact of Behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
CHAPTER 4
Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Antenna Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
What Is an Antenna? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Antenna Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Types of Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Omnidirectional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Semidirectional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Highly-Directional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Antenna Coverage Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Azimuth and Elevation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Beamwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Fresnel Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Multiple-Input Multiple-Output (MIMO). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
What Is MIMO? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
MIMO Signal Processing Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
vi Table of Contents
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Antenna Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Antenna Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Measuring Antenna Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
CHAPTER 5
Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Wireless Modulation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Narrowband Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Spread-Spectrum Transmissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Comparison of Modulation Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
IEEE 802.11 Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
IEEE 802.11b Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
IEEE 802.11a Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
IEEE 802.11g Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
IEEE 802.11n Physical Layer Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
CHAPTER 6
Media Access Control Layer Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
WLAN Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Basic Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Extended Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Independent Basic Service Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
802.11 Media Access Control Layer Frame Formats and Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
MAC Frame Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
MAC Frame Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
MAC Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Discovering the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Joining the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Transmitting on the WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Case Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Table of Contents vii
Copyright 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER 7
WLAN Management and …
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident