WiFi from A-Z
		  [2-day training course, Euro 2,350.- per participant or optional 2-day training course + 1 optional day trace analysis, Euro 3,450.- per participant]
          
          
Introduction and Fundamentals
         

- IEEE 802.11 Architecture Overview
 - IEEE 802.11 Specification ABC
 - IEEE 802.11 Protocol Stack Architecture
 - Physical Layer Overview
              
- TDD operation in an IEEE 802.11 Network
 - Current IEEE 802.11 Physical Layer Access Technologies
 - Frequency Bands being used for IEEE 802.11 Standards
 
 - Lessons Learned / Conclusions
 
Physical Layer procedures 
          - General PLCP Burst
 - FHSS Physical Layer
              
- FHSS PLCP Burst
 - GFSK Modulatio
 - FHSS Signal Processing Chain
 
 - IR Physical Layer
              
- IR PLCP Burst
 
 - DSSS Physical Layer
              
- DSSS PLCP Burst
 - DBPSK and DQPSK Modulation
 - DSSS Signal Processing Chain
 
 - OFDM Physical Layer
              
- Introduction OFDM Technology
- Impact of Orthogonality in the Frequency Domain – 3 Steps
- Practical Exercise: Physical Basics of OFDM
- OFDM and IFFT
- Using different Modulation Schemes on Different Subcarriers
- Tackling Inter-Symbol Interference (ISI)
- Introduction
- Cyclic Prefix or Guard Interval - OFDM PLCP Burst
- Normal OFDM Symbol
- Long OFDM Sync Symbol
- Short OFDM Sync Symbol - Modulation and Data Rates of the OFDM Physical Layer
 - OFDM Signal Processing Chain
- Modulation Schemes for OFDM
- OFDM Convolutional Encoder
- OFDM Physical Layer Puncturin 
 - Introduction OFDM Technology
 - HS-DSSS Physical Layer
              
- HS-DSSS PLCP Burst
 - CCK Modulation
 - Details of CCK
 - PBCC Signal Processing Chain
 
 - DSSS-OFDM Hybrid Physical Layer
              
- DSSS-OFDM PLCP Burst
 - ERP-PBCC Processing Enhancements
 
 - Agility
 - Lessons Learned / Conclusions
 
Medium Access Control
          - Basic MAC Functions
              
- Overview
 - MAC Frames
- Generic MAC Frame (Data Frame)
- Details of the Frame Control Field
- Control Frame Subtypes
- Management Frame Subtypes
- Data Frame Subtypes
- Usage of the Address Fields in Data Frames
- Data Frame Body - Fragmentation of MSDU's
 - MAC Access Coordination Functions
 - MAC Procedures
- Timing governing the Access: SIFS, PIFS, and DIFS
- EIFS and AIFS
- Scanning and Attachment Procedure
- Coexistence of PCF and DCF
- DCF- Sensing Procedures
- DCA & Random Back off Procedure
- DCF & Transmission of Fragments
- Contention Free Period Procedures – Example 1
- Contention Free Period Procedures – Example 2
- Power Saving Procedure in the CP
- Power Saving Procedure in CFP - Control Frames
- RTS Frame
- CTS + ACK Frame
- PS-Poll Frame
- CF-End (+ACK) Frame 
 - Additional MAC Functions for later Standard Versions
              
- Overview
 - DFS
 - TPC
 - Action Frames
 - Qos
- User Priorities
- Contents of the QoS Control Field - Block Ack
- Overview Ack Policies
- Immediate Block Ack Procedure
- Delayed Block Ack Procedure
- Block ACK Request Frame
- Block ACK Frame - EDCA & HCCA
- Changes Introduced by EDCA
- Changes Introduced by HCCA
- Coexistence of DCF, PCF, and HCF
- EDCA Procedure
- HCCA Procedures – Example 1
- HCCA Procedures – Example 2
- Termination of the HCCA Procedure 
 - Lessons Learned / Conclusions
 
Security 
          - Security Challenges
 - Overview Security
 - Security Technologies in and over IEEE 802.11
              
- Overview
 - Pre-RSNA Procedures
- Open System Authentication
- Shared Key Authentication
- The “Wired Equivalent Privacy” Procedure - RSNA Procedures
- RSNA Policy Selection
- Key Hierarchy – How to Create the TK's
- Types of Security Association
- RSNA Encryption and Integrity Protection Protocols
- The TKIP Encryption and Integrity Protection Procedure
- The CCMP Encryption and Integrity Protection Procedure - Advanced Authentication
- Authentication and Key Generation with an Authentication Server
- Essentials on the IEEE 802.1x Protocol
- EAP Derivatives - Secure Session
- Phases of a Session
- Session Phase 1: Probing & Association
- Session Phase 2: EAP Authentication
- Session Phase 3: Generation of IEEE 802.11 Keys
- Session Phase 4 & 5: Active Session & Disassociation - Accessing External Resources using the VPN Approach
 - Security Association in the Roaming Case
 
 - Lessons Learned / Conclusions
 
Planning a Wireless LAN Deployment 
          - Planning a WLAN
 - Lessons Learned / Conclusions
 
Future / Recent Developments 
          - New and Coming IEEE 802.11 Standards
 - IEEE 802.11 and Bluetooth coexistence
 - WLAN's Accessing a Mobile Radio Network Core
              
- I-WLAN Direct IP-Access
 - Details of I-WLAN 3GPP IP-Access
 - Details of GAN/UMAN-Access
 - MIP in Wireless Standards
 
 - IEEE 802.11n
              
- Practical Exercise: Scaling of OFDM / OFDMA-Systems
 - Key Changes in IEEE 802.11n
 - HT PPDU's
 - Smart Antenna Technology in IEEE 802.11
- Categorization of Smart Antenna Technologies
- The Basics: Signal Fading Physics between TX and RX
- Multipath Diversity
- The Transmission Diversity Problem
- The Wrong Way to Implement TX Diversity
- Beamforming
- Beamforming in IEEE 802.11
- Practical Exercise: Draw the Antenna Diagram of Beamforming
- CSD
- STBC
- MIMO
- Multiple Input Multiple Output (MIMO)
- MIMO General Operation
- MIMO Details
- Motivation of MIMO combined with Beamforming
- Multiple Rank Beamforming Procedure - How to Calculate the Data Rate of HT
 - Signal Processing Chain for the HT-SIGNAL Field
 - Signal Processing Chain for the HT-SERVICE and HT-data Fields
 - The optional LDPC encoder
 
 - Lessons Learned / Conclusions
 
Voice over WiFi 
          - How to deliver VoIP Services
 - QoS Issues
 - Other Initial Obstacles for Vo802.11
 - Deployment Examples
 - Operation of Vo802.11 with a Softswitch
 - Lessons Learned / Conclusions
 
The WiFi Alliance 
          - The WiFi Forum and IEEE - Overview and Responsibilities
 - WiFi Certification Programs 
              
- Features of WPA and WPA2
 - Features of WMM
 
 - Lessons Learned / Conclusions
 
v1.500
 ℹ️ Try out the updated search below!
Search:
More Info:
General Information to  this course
            Schedule of this course
            
            Buy this book
            
          
INACON eBooks
Please have a look at our full offer

