Home
        Wireless CWNA Exam P..
         Contents
1.                                                                  112 Chapter 5     Antennas and Accessories    Highly directional Antennas    As their name would suggest  highly directional antennas emit the most narrow signal  beam of any antenna type and have the greatest gain of these three groups of antennas   Highly directional antennas are typically concave  dish shaped devices  as can be seen in  Figures 5 10 and 5 11  These antennas are ideal for long distance  point to point wireless  links  Some models are referred to as parabolic dishes because they resemble small  satellite dishes  Others are called grid antennas due to their perforated design for  resistance to wind loading     FIGURE 5 10 Sample of a highly directional parabolic dish antenna       FIGURE 5 11 Sample of a highly directional grid antenna       Figure 5 12 illustrates the radiation pattern of a high gain antenna     FIGURE 5 12 Radiation pattern of a highly directional antenna       EE    Chapter 5     Antennas and Accessories 113    Usage    High gain antennas do not have a coverage area that client devices can use  These  antennas are used for point to point communication links  and can transmit at distances  up to 25 miles  42 km   Potential uses of highly directional antennas might be to connect  two buildings that are miles away from each other and have no line of sight obstructions  between them  Additionally  these antennas can be aimed directly at each other within a  building in order to  
2.      3  The client responds to the challenge     the client responds by encrypting the  challenge text using the client   s WEP key and sending it back to the access point     4  The access point responds to the client   s response     The access point decrypts the  client s encrypted response to verify that the challenge text is encrypted using a    184 Chapter 7     802 11 Network Architecture    matching WEP key  Through this process  the access point determines whether or  not the client has the correct WEP key  If the client   s WEP key is correct  the  access point will respond positively and authenticate the client  If the client   s  WEP key is not correct  the access point will respond negatively  and not  authenticate the client  leaving the client unauthenticated and unassociated     This process is shown in Figure 7 5     Shared Key Authentication Process    Communication Process    Client A request to authenticate is Access Point    sent to the access point      The access point  sends a challenge phrase    ee    The client encrypts the  phrase and sends it back    Se    The access point  verifies the phrase and if they  match authenticates    The client connects  to the network    It would seem that the Shared Key authentication process is more secure than that of  Open System authentication  but as you will soon see  it is not  Rather  Shared Key  authentication opens the door for would be hackers  It is important to understand both  ways that WEP is used  The 
3.     16     17     18     19     20     Chapter 8     MAC and Physical Layers 231    A superframe is used when which of the following is true  Choose all that apply    A  The access point has been configured for point coordination function mode    w    When beacons are disabled in the access point    C  The wireless clients have been configured to announce to the access point that  they are pollable    D  The access point has been configured for distributed coordination function  mode    What is the purpose of the superframe   A  To increase the throughput of all wireless LANs  B  To ensure QoS for all voice and video applications running on wireless LANs    C  To ensure that PCF  and DCF mode clients do not communicate within the  same wireless LAN    D  To allow fair co existence between PCF  and DCF  mode clients on the  network    The acronym CCA stands for which one of the following   A  Close Client Association   B  Clear Current Authentication   C  Clear Channel Assessment   D  Clean Channel Association  E    Calculate Clear Assessment    The Network Allocation Vector  NAV  acts as    A  A timer on the station   B  A navigational feature for RF signal propagation  C  A location discovery tool for wireless LANs    D  A tool for allocating the bandwidth of a wireless LAN    Using RTS CTS allows wireless stations to do which of the following   A  Broadcast their intent to send data across the network to the receiving station    B  Send their packets across the network at t
4.     A  Per   user   B  Per port   C  Per session   D  Per MAC Address  E  Per SSID    Which of the following is NOT true regarding wireless LAN security     A     B   C   D     WEP cannot be relied upon to provide a complete security solution   A wireless environment protected with only WEP is not a secure environment   The 802 11 standard specifies user authentication methods    User authentication is a wireless LAN   s weakest link    Which of the following demonstrates the need for accurate RF cell sizing  Choose  all that apply     A   B     Co located access points having overlapping cells    A site survey utility can see 10 or more access points from many points in the  building    Users on the sidewalk passing by your building can see your wireless LAN    Users can attach to the network from their car parked in the facility s parking lot    304 Chapter 10     Wireless LAN Security    20  For maximum security wireless LAN user authentication should be based on which  of the following  Choose all that apply     A  Device independent schemes such as user names and passwords  B  Default authentication processes   C  MAC addresses only   D  SSID and MAC address    Chapter 10     Wireless LAN Security 305    Answers to Review Questions    1     10     11     E  The 802 11 standard specified that the use of WEP is to be optional  Ifa  manufacturer is to make its hardware compliant to the standard  the administrator  must be able to enable or disable WEP as necessary     C  En
5.     RF Interference     All band interference System Throughput    aeystem tnrouonput Co location Throughput    Co location throughput    Weather Types of Interference    Range Considerations    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     236 Chapter 9    Troubleshooting Wireless LAN Installations    Just as traditional wired networks have challenges during implementation  wireless LANs  have their own set of challenges  mainly dealing with the behavior of RF signals  In this  chapter  we will discuss the more common obstacles to successful implementation of a  wireless LAN  and how to troubleshoot them  There are different methods of discovering  when these challenges exist  and each of the challenges discussed has its remedies and  workarounds     The challenges to implementing any wireless LAN discussed herein are considered by  many to be    textbook    problems that can occur within any wireless LAN installation   and  therefore  can be avoided by careful planning and simply being aware that these  problems can and will occur     Multipath    FIGURE 9 1    If you will recall from Chapter 2  RF Fundamentals  there are two types of line of sight   LOS   First  there is visual LOS  which is what the human eye sees  Visual LOS is your  first and most basic LOS test  If you can see the RF receiver from the installation point  of the RF transmitter  then you have visual line of sight  Second  and different from  visual LOS  is RF line of sight  RF LOS is what 
6.     SSID filtering is a basic form of access control  and is not considered secure for  which of the following reasons  Choose all that apply     A  The SSID is broadcasted in the clear in every access point beacon by default  B  Itis very simple to find out the SSID of a network using a sniffer    C  The SSID ofa wireless LAN client must match the SSID on the access point in  order for the client to authenticate and associate to the access point    D  SSID encryption is easy to break with freeware utilities    Using a   the network administrator can reduce the time it takes to rotate  WEP keys across an enterprise network     A  Distributed Encryption Key Server  B  Centralized Encryption Key Server  C  Router Access Control List   D  Filter Application Server    302 Chapter 10     Wireless LAN Security    10     11     12     13     14     MAC filtering is NOT susceptible to which one of the following intrusions   A  Theft of a PC card   B  MAC address spoofing   C  Sniffer collecting the MAC addresses of all wireless LAN clients   D  MAC filter bypass equipment    Which of the following are types of wireless LAN attacks  Choose all that apply   A  Passive attacks   B  Antenna wind loading   C  Access point flooding   D  Active attacks    The following statement   MAC addresses of wireless LAN clients are broadcasted  in the clear by access points and bridges  even when WEP is implemented   is which  of the following     A  Always true  B  Always false    C  Dependent upon 
7.     Transmission Power    The output power of the transmitting radio will have an effect on the range of the link  A  higher output power will cause the signal to be transmitted a greater distance  resulting in  a greater range  Conversely  lowering the output power will reduce the range     Antenna Type    The type of antenna used affects the range either by focusing the RF energy into a tighter  beam transmitting it farther  as a parabolic dish antenna does   or by transmitting it in all  directions  as an omni directional antenna does   reducing the range of communication     Environment    A noisy or unstable environment can cause the range of a wireless LAN link to be  decreased  The packet error rate of an RF link is greater at the fringes of coverage due to  a small signal to noise ratio  Also  adding interference effectively raises the noise floor   lessening the likelihood of maintaining a solid link     The range of an RF link can also be influenced by the frequency of the transmission   Though not normally a concern within a wireless LAN implementation  frequency might  be a consideration when planning a bridge link  For example  a 2 4 GHz system will be  able to reach further at the same output power than a 5 GHz system  The same holds true  for an older 900 MHz system  it will go further than a 2 4 GHz system at the same output  power  All of these bands are used in wireless LANs  but 2 4 GHz systems are by far the  most prevalent     262 Chapter 9  Troubleshooti
8.    11     12     13     14     15     16     17     18     19     A  B  C  Wind can load antennas  breaking RF links or at least causing degraded  throughput  Lightning can destroy wireless LAN equipment and can introduce high  levels of RF interference due to power surges around the transmission path between  the transmitter and receiver  Smog can have intermittent effects on wireless LANs  depending on the severity and makeup of the smog  Generally smog causes  degraded throughput for a long distance RF link     A  Multipath is the set of negative effects that multiple RF signals arriving at the  same destination at almost the same time from the same source has on a wireless  LAN  These reflected signals can have numerous effects on the main signal   Multipath is especially disruptive when there are many reflective objects in area  around the signal path from transmitter to receiver     B  Due to Free Space Path Loss  an RF wave arriving at a receiver will never be as  strong as the transmitted wave  Multipath can cause an increase in the received  signal over what it would have been had there been no multipath due to reflected  waves being in phase with the main wave  but the main signal will never be  increased in amplitude beyond the transmission power     C  If there were no reflective objective near the signal path between transmitter and  receiver  multipath would not exist  The lack of any reflective object is rarely the  case since anything metal and many smooth thi
9.    Data destined to LAN must  pass through tunnel    Use of PPTP with shared secrets is very simple to implement and provides a reasonable  level of security  especially when added to WEP encryption  Use of IPsec with shared  secrets or certificates is generally the solution of choice among security professionals in  this arena  When the VPN server is implemented in an enterprise gateway  the same  process takes place except that  after the client associates to the access point  the VPN  tunnel is established with the upstream gateway device instead of with the access point  itself     There are also vendors that are offering modifications to their existing VPN solutions   whether hardware or software  to support wireless clients and competing in the wireless  LAN market  These devices or applications serve in the same capacity as the enterprise  gateway  sitting between the wireless segment and the wired core of the network   Wireless VPN solutions are reasonably economical and fairly simple to implement  If the  administrator has no experience with VPN solutions  it might be necessary to get training  in that area before implementing such a solution  VPNs that support wireless LANs are  usually designed with the novice VPN administrator in mind  which partially explains  why these devices have gained such popularity among users     Temporal Key Integrity Protocol  TKIP     TKIP is essentially an upgrade to WEP that fixes known security problems in WEP s  implementation of t
10.    How many users are typically in a given area     An understanding of how many users will be located in a given area is required to  calculate how much throughput each user is going to have  This information is also used  to determine which technology  such as 802 11b or 802 11a  would be most well suited to  the needs of the users  If the network manager is not able to provide this information  the  person doing the site survey will need to interview the actual users to be able to make an  informed decision  Different departments within an organization will have different  numbers of users  It is important to understand that the needs of one part of a facility  might be different from the needs of another part of a facility     What type of applications will be used over the wireless LAN     Find out if the network is being used to transmit non time sensitive data only  or time   sensitive data such as voice or video  High bandwidth applications such as voice or video  will require greater throughput per user than an application that makes infrequent  network requests  Connection oriented applications will need to maintain connectivity  while roaming  Analyzing and documenting these application requirements before the  site survey will allow the site surveyor to make more informed decisions when testing  areas for coverage     Are there any non typical times in which network needs may change for a particular  area     Changes in network needs could be something as simple a
11.    In bridge mode  access points act exactly like wireless bridges  which will be discussed  later in this chapter  In fact  they become wireless bridges while configured in this  manner  Only a small number of access points on the market have bridge functionality   which typically adds significant cost to the equipment  We will explain shortly how  wireless bridges function  but you can see from Figure 4 4 that clients do not associate to  bridges  but rather  bridges are used to link two or more wired segments together  wirelessly     FIGURE 4 4    FIGURE 4 5    Chapter 4     Wireless LAN Infrastructure Devices 75    An access point in bridge mode    ve   one  NE PC           Access Point Access Point         a     Bridge Mode   Bridge ete         s  a ar  7 uo       A    m we    Repeater Mode    In repeater mode  access points have the ability to provide a wireless upstream link into  the wired network rather than the normal wired link  As you can see in Figure 4 5  one  access point serves as the root access point and the other serves as a wireless repeater   The access point in repeater mode connects to clients as an access point and connects to  the upstream root access point as a client itself  Using an access point in repeater mode is  not suggested unless absolutely necessary because cells around each access point in this  scenario must overlap by a minimum of 50   This configuration drastically reduces the  range at which clients can connect to the repeater access p
12.    The processes that operate during PSP mode  in both BSS and IBSS  are described below   Keep in mind that these processes occur many times per second  That fact allows your  wireless LAN to maintain its connectivity  but also causes a certain amount of additional  overhead  An administrator should consider this overhead when planning for the needs  of the users on the wireless LAN     PSP Mode in a Basic Service Set    When using PSP mode in a BSS  stations first send a frame to the access point to inform  the access point that they are going to sleep   temporarily powering down   The access  point then records the sleeping stations as asleep  The access point buffers any frames  that are intended for the sleeping stations  Traffic for those clients who are asleep  continues arriving at the access point  but the access point cannot send traffic to a  sleeping client  Therefore  packets get queued in a buffer marked for the sleeping client     The access point is constantly sending beacons at a regular interval  Clients  since they  are time synchronized with the access point  know exactly when to receive the beacon   Clients that are sleeping power up their receivers to listen for beacons  which contain the  traffic indication map  TIM   Ifa station sees itself listed in the TIM  it powers up  and  sends a frame to the access point notifying the access point that it is now awake and  ready to receive the buffered data packets  Once the client has received its packets from 
13.    Which one of the following RF behaviors is defined as    the bending of a wave as it  passes through a medium of different density        A     B  C   D    Diffraction  Reflection  Refraction    Distraction    40 Chapter 2     RF Fundamentals    10     11     12     13     A year ago  while working for your current organization  you installed a wireless  link between two buildings  Recently you have received reports that the throughput  of the link has decreased  After investigating the connection problems  you discover  there is a tree within the Fresnel Zone of the link that is causing 25  blockage of the  connection  Which of the following statements are true  Choose all that apply     A  The tree cannot be the problem  because only 25  of the connection is blocked    B  The tree might be the problem  because up to 40  of the Fresnel Zone can be  blocked without causing problems    C  Ifthe tree is the problem  raising the heights of both antennas will fix the  problem    D  Ifthe tree is the problem  increasing the power at the transmitters at each end of  the link will fix the problem    Given an access point with 100 mW of output power connected through a 50 foot  cable with 3 dB of loss to an antenna with 10 dBi of gain  what is the EIRP at the  antenna in mW     A  100 mW  B  250 mW  C  500 mW  D  1 W    Given a wireless bridge with 200 mW of output power connected through a 100 foot  cable with 6 dB of loss to an antenna with 9 dBi of gain  what is the EIRP at the
14.    With the explosive expansion of wireless technology  manufacturers  and hardware  the  role of organizations such as the FCC  IEEE  WECA  and WLANA will become  increasingly important to the removal of barriers of operation between solutions  The  laws put in place by regulatory organizations like the FCC along with the standards  provided by promotional and other organizations like IEEE  WLANA  and WECA will  focus the wireless LAN industry and provide a common path for it to grow and evolve  over time     Chapter 1   Introduction to Wireless LANs 11    Key Terms    Before taking the exam  you should be familiar with the following terms     access layer  core layer  distribution layer  FCC   IEEE   IEEE 802 11  IEEE 802 1 la  IEEE 802 11b  IEEE 802 1 1g  last mile  SOHO   WISP    12 Chapter 1   Introduction to Wireless LANs    Review Questions    1  Which one of the following does a wireless LAN provide that a wired network does    not   A     B  C   D    Mobility  Centralized security  Reliability   VPN security    2  Which one of the following would not be an appropriate use of a wireless LAN     A     B  C   D    Connecting two buildings together that are on opposite sides of the street  Connecting two computers together in a small office so they can share a printer  Connecting a remote home to a WISP for Internet access    Connecting two rack mounted computers together    3  Why isa wireless LAN a good choice for extending a network  Choose all that  apply     A     B
15.   C   D    Reduces the cost of cables required for installation  Can be installed faster than a wired network  Hardware is considerably less expensive than wired LAN hardware    Eliminates a significant portion of the labor charges for installation    4  Wireless ISPs provide which one of the following services     A     B  C  D    Small office home office services  Connectivity for large enterprises  Last mile data delivery    Building to building connectivity    5  Wireless LANs are primarily deployed in which one of the following roles     A     B  C   D    Backbone  Access  Application    Core    10     Chapter 1   Introduction to Wireless LANs 13    Why would a mobile office be a good choice for using a wireless LAN  Choose all  that apply     A     B  C   D    Wireless LANs take less time to install than wired LANs  Wireless LAN equipment could be easily removed if the office moves  Wireless LANs do not require administration    Wireless LANs take a more centralize approach over wired LANs    Which one of the following is the IEEE family of standards for wireless LANs     A     B  C   D    802 3  803 5  802 11  802 1x    As a consultant  you have taken a job creating a wireless LAN for an office complex  that will connect 5 buildings in close vicinity together  Given only this information   which one of the following wireless LAN implementations would be most  appropriate for this scenario     A     B  C  D    Last mile data service from a WISP  Point to point bridge li
16.   Inc     106 Chapter 5     Antennas and Accessories    In the previous chapter  we discussed the many different pieces of wireless LAN  equipment that are available on the market today for creating simple and complex  wireless LANs  In this chapter  we will discuss a basic element of the devices that make  access points  bridges  pc cards and other wireless devices communicate  antennas     Antennas are most often used to increase the range of wireless LAN systems  but proper  antenna selection can also enhance the security of your wireless LAN  A properly chosen  and positioned antenna can reduce the signal leaking out of your workspace  and make  signal interception extremely difficult  In this chapter  we will explain the radiation  patterns of different antenna designs  and how the positioning of the user s antenna makes  a difference in signal reception     There are three general categories into which all wireless LAN antennas fall  omni   directional  semi directional  and highly directional  We will discuss the attributes of  each of these groups in depth  as well as the proper methods for installing each kind of  antenna  We will also explain polarization  coverage patterns  appropriate uses  and  address the many different items that are used to connect antennas to other wireless LAN  hardware     Up to now  we have discussed RF theory and some of the major categories of wireless  LAN devices that an administrator will use on a daily basis  This knowledge is a good
17.   Meshing many point to point wireless links  to form a network across a very large geographical area is considered a WMAN  but still  uses the same technologies as the WLAN     The difference between a WLAN and a WMAN  if any  would be that in many cases   WMANS use licensed frequencies instead of the unlicensed frequencies typically used  with WLANs  The reason for this difference is that the organization implementing the  network will have control of the frequency range where the WMAN is being  implemented and will not have to worry about the chance of someone else implementing  an interfering network  The same factors apply to WWANSs     FCC Specifications    Though there are many different implementations of spread spectrum technology  only   two types are specified by the FCC  The law specifies spread spectrum devices in Title  47  a collection of laws passed by congress under the heading    Telegraphs  Telephones   and Radiotelegraphs     These laws provide the basis for implementation and regulation   by the FCC              The FCC regulations can be found in the Codes of Federal Regulation  CFR   volume  47  the regulations are found in the CFR volume with the same number as the Title    part 15  Wireless LAN devices described in these regulations are sometimes called     part 15 devices        These FCC regulations describe two spread spectrum technologies  direct sequence  spread spectrum  DSSS  and frequency hopping spread spectrum  FHSS      50 Chapter 3     Spr
18.   Radio Frequency    FIGURE 2 1    Radio frequencies are high frequency alternating current  AC  signals that are passed  along a copper conductor and then radiated into the air via an antenna  An antenna  converts transforms a wired signal to a wireless signal and vice versa  When the high  frequency AC signal is radiated into the air  it forms radio waves  These radio waves  propagate  move  away from the source  the antenna  in a straight line in all directions at  once     If you can imagine dropping a rock into a still pond  Figure 2 1  and watching the  concentric ripples flow away from the point where the rock hit the water  then you have  an idea of how RF behaves as it is propagated from an antenna  Understanding the  behavior of these propagated RF waves is an important part of understanding why and  how wireless LANs function  Without this base of knowledge  an administrator would be  unable to locate proper installation locations of equipment and would not understand how  to troubleshoot a problematic wireless LAN     Rock into a pond       Chapter 2    RF Fundamentals 19    RF Behaviors    FIGURE 2 2    RF is sometimes referred to as  smoke and mirrors  because RF seems to act erratically  and inconsistently under given circumstances  Things as small as a connector not being  tight enough or a slight impedance mismatch on the line can cause erratic behavior and  undesirable results  The following sections describe these types of behaviors and what  can happen to 
19.   The signal  generator can be hooked directly to the power meter to get a baseline measurement   When putting cables and connectors between the signal generator and the power meter  it  can be determined if they meet the manufacturer s specifications and if they are  intermittent  The connectors on cables can become worn and loose making a bad or  intermittently bad connection  They can also take on water  which would be highly  detrimental to their RF characteristics  It is important to test cables and connectors  before deployment and periodically as possible thereafter     FIGURE 5 38 Sample test kit       Copyright Young Design  Inc  2002  YDI com    Chapter 5     Antennas and Accessories 145    Key Terms    Before taking the exam  you should be familiar with the following terms     azimuth   beam   beamwidth  bi directional amplifier  coverage area  horizontal beamwidth  lobe   narrowing   n type   pigtails  point to multipoint  point to point  radiation pattern  SMA type   transient current  unidirectional amplifier  unused pair    vertical beamwidth    146 Chapter 5     Antennas and Accessories    Review Questions    1     In a small warehouse installation  you must provide the greatest coverage area  possible for the users inside the warehouse  The warehouse is free from tall  obstructions such as shelving  but has a high ceiling  You have decided to use a  low gain omni directional antenna to achieve your goal  For the best coverage area   where should the antenna b
20.   a carrier frequency 5 MHz wide  the maximum  must be used  It is  important to note that systems may comply with either the pre  8 31 00 rule or the post   8 31 00 rule  but no mixing or matching of pieces of each rule is allowed        es The IEEE did not change the 802 11 standard to reflect the post 8 31 00 rules  Rather    HomeRF is the only organization to adopt these changes into any sort of technical   standard   No overlapping frequencies are allowed under either rule  If the minimum 75 MHz of  used bandwidth within the frequency spectrum were cut into pieces as wide as the carrier  frequency bandwidth in use  they would have to sit side by side throughout the spectrum  with no overlap  This regulation translates into 75 non overlapping carrier frequencies  under the pre  8 31 00 rules and 15 74 non overlapping carrier frequencies under the  post  8 31 00 rules     The IEEE states in the 802 11 standard that FHSS systems will have at least 6 MHz of  carrier frequency separation between hops  Therefore  a FHSS system transmitting on  2 410 GHz must hop to at least 2 404 if decreasing in frequency or 2 416 if increasing in  frequency  This requirement was left unchanged by the IEEE after the FCC change on  8 31 00     Chapter 3     Spread Spectrum Technology 55    The pre  8 31 00 FCC rules concerning FHSS systems allowed a maximum of 2 Mbps by  today s technology  By increasing the maximum carrier bandwidth from 1 MHz to 5  MHz  the maximum data rate was increased to
21.   a sniffer can be used to find other wireless LANs  that are present in the area  perhaps on another floor of a building   which can affect the  wireless LAN implementation  The sniffer will pick up any packets being transmitted by  nearby wireless LANs and will provide detailed information on channels in use  distance   and signal strength  as shown in Figure 11 8     326 Chapter 11     Site Survey Fundamentals    FIGURE 11 8 Wireless Sniffer screenshot    12 AiroPock   DEK    x    13  Fle Edt View Capre Statistics Toos Wedo Help  Ik cs ica ae    DGS s      5   Destination  A4z  7  D2  60 23 36          a Aa    SF D6  SA  33 D9 A3        Absckre Timo  25 45 21  764340         F       Protocol A        02 12 WEP Deta                          AFIDS D3 i7 38 AF EO EA 08 50 49 CD 11 0 11 10k C 114   5 45 23  343420 LSAP 40   11 0 l1 10    6c 34    25 45 23 394059 802 12 Control  JO LF E2 07 6A 6C 23 08 68 SB 8C 03 11 0 ll St FC 126 4 2  5 45 23 39499S 302 11 Assoc Req  BE 91 8S5 07 07 DA 71  S8 DA 89 4325C 11 0 lL 10    C 84   5 45 23 397848 3802 11 WEP Data  OO  04  E2 07 07 DA 11 0 ll 14  6c 14   5145 23 403746 802 1  Ack   11 0 E  Sic 34   5145 23   404128   11 0 ll Sic 34   15 45 23  406010  00 04 EA1C31D3J  3A 9 FE Od  E2 0Er6SrEL 11 0 1b la c 82 1  5 45 23 406487 LSAP 2F  CFIGCIACISB  AG  FO 20108 9F  16r A6  58 11 0 ll    c 82 25 45 23  414495 902 121 WEP Data  28 E81F5149 57 95 S0 6A 72 BAr 7Ar9D 11 6 ll Se 6c 20    25145 23 415914 9302 12 CFE  00 04 69 81 D7 A42 11 0 l
22.   affects wireless LANs is by charging the air through which the RF waves must travel  after striking an object lying between the transmitter and receiver  The affect of lightning  is similar to the way that the Aurora Borealis Northern Lights provide problems for RF  television and radio transmissions     Adjacent Channel and Co Channel Interference    Having a solid understanding of channel use with wireless LANs is imperative for any  good wireless LAN administrator  As a wireless LAN consultant  you will undoubtedly    258 Chapter 9    Troubleshooting Wireless LAN Installations    find many wireless networks that have many access points  all of them configured for the  same channel  In these types of situations  a discussion with the network administrator  that installed the access points will divulge that he or she thought it was necessary for all  access points and clients to be on the same channel throughout the network in order for  the wireless LAN to work properly  This configuration is very common  and often  incorrect  This section will build on your knowledge of how channels are used   explaining how multiple access points using various channels can have a detrimental  impact on a network     Adjacent Channel Interference    FIGURE 9 16    Adjacent channels are those channels within the RF band being used that are  in essence   side by side  For example  channel 1 is adjacent to channel 2  which is adjacent to  channel 3  and so on  These adjacent channels overla
23.   and signal range will all be  key components as you conduct a site survey  We will further discuss the ramifications  of a poor site survey and even no site survey at all  Our discussion will cover a checklist  of tasks that you need to accomplish and equipment you will use  and we will apply those  checklists to several hypothetical examples     a Site Survey     An RF site survey is a map to successfully implementing a wireless network     There is no hard and fast technical definition of a site survey  You  as the CWNA  candidate  must learn the process of conducting the best possible site survey for the  client  whether that client is internal or external to your organization  The site survey is  not to be taken lightly  and can take days or even weeks  depending on the site being  surveyed  The resulting information of a quality site survey can be significantly helpful  for a long time to come        If you do not perform a thorough site survey  the wireless LAN  installed according to  the site survey  might never work properly  and you  or your client  could spend  thousands of dollars on hardware that doesn t do the intended job     A site survey is the most important step in implementing any wireless network     A site survey is a task by task process by which the surveyor discovers the RF behavior   coverage  interference  and determines proper hardware placement in a facility  The site  survey   s primary objective is to ensure that mobile workers     the wireles
24.   antenna in dBm     A  20 dBm  B  26 dBm  C  30 dBm  D  36 dBm    Given an access point with an output power of 100 mW connected through a cable  with a loss of 2 dB to antenna with a gain of 11 dBi  what is the EIRP in mW     A  200 mW  B  400 mW  C  800 mW  D  1W    14     15     16     17     18     Chapter 2   RF Fundamentals 41    Given an access point with an output power of 20 dBm connected through a cable  with a loss of 6 dB to an amplifier with a 10 dB gain  then through a cable with 3 dB  of loss to an antenna with 6 dBi of gain  what is the EIRP in dBm     A     18 dBm    B  23 dBm  C  25 dBm  D  27 dBm    What is the net gain or loss of a circuit if it is using two cables with 3 dB loss each   one amplifier with a 12 dB gain    antenna with 9 dBi gain  and an attenuator with a  loss of 5 dB     A  5 dB    B   C   D     10 dB  15 dB  20 dB    Which of the following is a cause of VSWR     A     B   C   D     Mismatched impedances between wireless LAN connectors  Too much power being radiated from the antenna element  The incorrect type of antenna used to transmit a signal    Use of the incorrect RF frequency band    Radio waves propagate  move  away from the source  the antenna  in what manner     A     Q    In a straight line in all directions at once within the vertical and horizontal  beamwidths    In circles spiraling away from the antenna  In spherical  concentric circles within the horizontal beamwidth    Up and down across the area of coverage    Why is the
25.   centralized encryption key servers  Obviously  the more advanced the WEP system is   the harder it will be for a hacker to gain access to the network     WEP keys are available in two types  64 bit and 128 bit  Many times you will see them  referenced as 40 bit and 104 bit instead  This reference is a bit of a misnomer  The  reason for this misnomer is that WEP is implemented in the same way for both  encryption lengths  Each uses a 24 bit Initialization Vector concatenated  linked end to   end  with a secret key  The secret key lengths are 40 bit or 104 bit yielding WEP key  lengths of 64 bits and 128 bits     Entering static WEP keys into clients or infrastructure devices such as bridges or access  points is quite simple  A typical configuration program is shown in Figure 10 1   Sometimes there is a checkbox for selecting 40  or 128 bit WEP  Sometimes no  checkbox is present  so the administrator must know how many characters to enter when  asked  Most often  client software will allow inputting of WEP keys in alphanumeric   ASCII  or hexadecimal  HEX  format  Some devices may require ASCII or HEX  and  some may take either form of input        simple search engine  You might have to reference such a chart if using mixed vendor  hardware across your network  Some vendors include this conversion chart in their  client software s HELP section     es There are many HEX ASCII conversion charts on the Internet that can be found with a    Chapter 10     Wireless LAN Security 27
26.   foundation  but is of little value without a solid working knowledge of antennas  which  are the devices that actually send and receive the RF signals     This chapter will also cover wireless LAN accessories such as        RF Amplifiers     RF Attenuators     Lightning Arrestors    RF Connectors      RF Cables    RF Splitters    Pigtails    Knowledge of these devices  uses  specifications  and effects on RF signal strength is  essential to being able to build a functional wireless LAN     Power over Ethernet  PoE  has become an important factor in today s wireless networks  spawning new product lines and new standards  PoE technology will be discussed along  with the different types of PoE equipment that can be used to deliver power to a PoE   enabled device     Chapter 5     Antennas and Accessories 107    RF Antennas    An RF antenna is a device used to convert high frequency  RF  signals on a transmission  line  a cable or waveguide  into propagated waves in the air  The electrical fields emitted  from antennas are called beams or lobes  There are three generic categories of RF  antennas     a Omni directional  a Semi directional       Highly directional    Each category has multiple types of antennas  each having different RF characteristics  and appropriate uses  As the gain of an antenna goes up  the coverage area narrows so  that high gain antennas offer longer coverage areas than low gain antennas at the same  input power level  There are many types of antenna moun
27.   must be rated to meet building codes without being placed in a metal protective shell   This restriction applies to wiring closets as well     RF Information Gathering    The next task will be gathering and recording data on RF coverage patterns  coverage  gaps  also called  holes  or  dead spots    data rate capabilities  and other RF related  criteria for your RF Site Survey Report      Range  amp  coverage patterns     Data rate boundaries      Documentation     Throughput tests  amp  capacity planning     Interference sources     Wired data connectivity  amp  AC power requirements     Outdoor antenna placement      Spot checks    Chapter 11     Site Survey Fundamentals 331    Gather and record data for each of these areas by slowly and systematically surveying  and measuring the entire facility     Range and Coverage Patterns    FIGURE 11 14    Start by placing an access point in what should be a logical location  This location may  not be the final location  but you have to start somewhere  The access point may get  moved many times before the proper location is found  as shown in Figure 11 14   Generally speaking  starting in the center of an area is practical when using omni  antennas  In contrast  when using semi directional antennas  consider being toward one  end of a stretch of intended coverage area     When the best locations for access points are determined  mark the locations you for  access points and bridges with bright colored  easily removable tape  Take 
28.   or increase the amplitude of  an  RF signal  This positive increase in power is called GAIN and is measured in  dB  An  amplifier will be used when compensating for the loss incurred by the RF signal  either  due to the distance between antennas or the length of cable from a wireless infrastructure  device to its antenna  Most RF amplifiers used with wireless LANs are powered using  DC voltage fed onto the RF cable with a DC injector near the RF signal source  such as  the access point or bridge      Sometimes this DC voltage used to power RF amplifiers is called  phantom voltage   because the RF amplifier seems to magically power up  This DC injector is powered  using AC voltage from a wall outlet  so it might be located in a wiring closet  In this  scenario  the RF cable carries both the high frequency RF signal and the DC voltage  necessary to power the in line amplifier  which  in turn  boosts the RF signal amplitude   Figure 5 22 below depicts both an RF amplifier and a DC power injector     A sample of a fixed gain RF amplifier             Copyright Young Design  Inc  2002  YDI com    RF amplifiers come in two types  unidirectional and bi directional  Unidirectional  amplifiers compensate for the signal loss incurred over long RF cables by increasing the  signal level before it is injected into the transmitting antenna  Bi directional amplifiers  boost the effective sensitivity of the receiving antenna by amplifying the received signal  before it is fed into the acces
29.   significant overhead to the wireless LAN     WEP Usage    When WEP is initialized  the data payload of the packet being sent using WEP is  encrypted  however  part of the packet header     including MAC address     is not  encrypted  All layer 3 information including source and destination addresses is  encrypted with WEP  When an access point sends out its beacons on a wireless LAN  using WEP  the beacons are not encrypted  Remember that the beacons do not include  any layer 3 information     When packets are sent using WEP encryption  those packets must be decrypted  This  decryption process consumes CPU cycles and reduces the effective throughput on the  wireless LAN  sometimes significantly  Some manufacturers have implemented  additional CPUs in their access points for the purpose of performing WEP encryption and  decryption  Many manufacturers implement WEP encryption decryption in software and  use the same CPU that s used for access point management  packet forwarding  etc    These access points are generally the ones where WEP will have the most significant  effects if enabled  By implementing WEP in hardware  it is very likely that an access  point can maintain its 5 Mbps  or more  throughput with WEP enabled  The disadvantage  of this implementation is the added cost of a more advanced access point     WEP can be implemented as a basic security mechanism  but network administrators  should first be aware of WEP   s weaknesses and how to compensate for them  The  
30.   system     The 802 1x protocol has been incorporated into many wireless LAN systems and has  become almost a standard practice among many vendors  When combined with  extensible authentication protocol  EAP   802 1x can provide a very secure and flexible  environment based on various authentication schemes in use today     EAP  which was first defined for the point to point protocol  PPP   is a protocol for  negotiating an authentication method  EAP is defined in RFC 2284 and defines the  characteristics of the authentication method including the required user credentials   password  certificate  etc    the protocol to be used  MD5  TLS  GSM  OTP  etc     support of key generation  and support of mutual authentication  There are perhaps a  dozen types of EAP currently on the market since neither the industry players nor IEEE  have come together to agree on any single type  or small list of types  from which to  create a standard     The successful 802 1x EAP client authentication model works as follows     1  The client requests association with the access point   The access point replies to the association request with an EAP identity request  The client sends an EAP identity response to the access point   The client s EAP identity response is forwarded to the authentication server  The authentication server sends an authorization request to the access point  The access point forwards the authorization request to the client    The client sends the EAP authorization respons
31.   systems describe       what frequency bands may be used    hop sequences      dwell times      data rates    The IEEE 802 11 standard specifies data rates of 1 Mbps and 2 Mbps and OpenAir  a  standard created by the now defunct Wireless LAN Interoperability Forum  specifies data  rates of 800 kbps and 1 6 Mbps  In order for a frequency hopping system to be 802 11 or  OpenAir compliant  it must operate in the 2 4 GHz ISM band  which is defined by the  FCC as being from 2 4000 GHz to 2 5000 GHz   Both standards allow operation in the  range of 2 4000 GHz to 2 4835 GHz             Since the Wireless LAN Interoperability Forum  WLIF  is no longer supporting the  OpenAir standard  IEEE compliant systems will be the main focus for FHSS systems in  this book     Channels    A frequency hopping system will operate using a specified hop pattern called a channel   Frequency hopping systems typically use the FCC   s 26 standard hop patterns or a subset  thereof  Some frequency hopping systems will allow custom hop patterns to be created     52 Chapter 3     Spread Spectrum Technology    and others even allow synchronization between systems to completely eliminate  collisions in a co located environment     FIGURE 3 3 Co located frequency hopping systems    N  Divided into 79   amp   1 MHz Frequencies       N  D      Z    Transmission Frequency  GHz        200 400 600 800 1000 1200 1400 1600  Elapsed Time in Milliseconds  ms     Channel 1 Channel 2    Channel 78    Though it is possibl
32.   the network manager or administrator  This function can be done before the site  survey as a preparatory step that saves time on site     7  A  The signal to noise ratio in a given area is important to document for the  purposes of determining link viability and suitability for certain user applications   The wireless network designer can use this data to assure business requirements are  met when the wireless LAN is used     8  A  Recent advancements in client software for PDAs make it possible to do a  thorough site survey using a PDA instead of a laptop  PDAs remove the burden of  carrying a heavy laptop  and PDA batteries tend to last significantly longer than  those in laptop computers  allowing a site surveyor to spend more consecutive hours  surveying     9  C  Site surveys can range from an hour to many days depending on client needs and  the facility size  shape  and construction  For example  a multi floor  multi tenant  building would take much longer than a single floor  small office environment     10     11     12     13     14     15     16     17     18     Chapter 11     Site Survey Fundamentals 351    A  B  C  Data rate  throughput  signal strength  SNR  range from access point  the  coverage pattern generated by the access point  and RF interference sources are all  pieces of information gathered during a site survey that relate directly to the RF  links between clients and access points     C  Names of wireless LAN users are not useful pieces of informat
33.   what the driver software and manufacturer utilities miss in many cases     Link speed monitor utility software can be used to measure the wireless link speed  This  information is useful in case part of the site survey requirement is to size or shape the  cells for 11 Mbps usage by clients  As we learned earlier  Dynamic Rate Shifting  DRS   allows a client to automatically downshift link speeds as range increases  If the business  requirements are for all clients to maintain 11 Mbps connectivity while roaming  then  proper coverage patterns must be documented during the site survey     Laptops  amp  PDAs    Paper    A laptop computer or PDA unit is used by the site surveyor for checking for signal  strength and coverage while roaming around the facility  Many site survey professionals  have begun using PDAs instead of laptop computers to perform the site survey because of  battery life and portability  PDAs can report the same information and connect to the  network in the same way as the laptop without the 3   7 pounds of extra weight that a  laptop weighs  Three to seven pounds might not seem like much weight  but after  carrying a laptop of this weight around a facility that measures over a million square feet   which is a common facility size   a PDA that supports the functionality you need to do  your site survey may seem like a trivial purchase  Most manufacturers make Pocket PC  and Windows CE drivers and utilities  including the site survey utilities  for their  PC
34.  1 00 from one  manufacturer and  20 00 from another  Typically  the more expensive manufacturer  has made their connector to exacting standards and fully guarantees their product     3  C  Yagi antennas are most often used on short to medium length building to   building bridging up to 2 miles  3 3 km   Patch and panel antennas are more  typically used on short range building to building and in building directional links  and Parabolic Dish antennas are more often used on very long distance links such as  2 25 miles  3 42 km   Omni directional and dipole antennas are the same thing and  are mostly used indoors  If omni antennas are used outdoors  the required coverage  area is often relatively small     4  A  While both parabolic dish and grid antennas will perform the function of  connecting building miles apart  the grid antenna is designed for maximum  resistance to wind loading by being perforated to let the wind pass through it  A  parabolic dish in this scenario would likely cause intermittent service for the  wireless link due to wind loading     5  A C  In this very short range scenario  4 omni directional antennas such as dipoles  could be used  The better scenario for security reasons is to use a single omni   directional antenna and three semi directional antennas using only as much power at  each antenna as necessary  This configuration forms a star topology  which is  commonly used in such point to multipoint scenarios     6  B  By adding a bi directional amplif
35.  10 Mbps     Direct Sequence Spread Spectrum  DSSS     Direct sequence spread spectrum is very widely known and the most used of the spread  spectrum types  owing most of its popularity to its ease of implementation and high data  rates  The majority of wireless LAN equipment on the market today uses DSSS  technology  DSSS is a method of sending data in which the transmitting and receiving  systems are both on a 22 MHz wide set of frequencies  The wide channel enables  devices to transmit more information at a higher data rate than current FHSS systems     How DSSS Works    DSSS combines a data signal at the sending station with a higher data rate bit sequence   which is referred to as a chipping code or processing gain  A high processing gain  increases the signal   s resistance to interference  The minimum linear processing gain that  the FCC allows is 10  and most commercial products operate under 20  The IEEE 802 11  working group has set their minimum processing gain requirements at 11     The process of direct sequence begins with a carrier being modulated with a code  sequence  The number of    chips    in the code will determine how much spreading occurs   and the number of chips per bit and the speed of the code  in chips per second  will  determine the data rate     Direct Sequence Systems    In the 2 4 GHz ISM band  the IEEE specifies the use of DSSS at a data rate of 1 or 2  Mbps under the 802 11 standard  Under the 802 11b standard   sometimes called high   rate 
36.  2  standard is the new forthcoming 802 1 1h standard     ETSI s original HiPerLAN standard for wireless  dubbed HiperLAN 1  supported rates of  up to 24 Mbps using DSSS technology with a range of approximately 150 feet  45 7  meters   HiperLAN 1 used the lower and middle UNII bands  as do HiperLAN 2   802 11a  and the new 802 11h standard  The new HiperLAN 2 standard supports rates of  up to 54 Mbps and uses all three of the UNII bands     ETSI s HiperLAN 2 standard has interchangeable convergence layers  support for QoS   and supports DES and 3DES encryption  The supported convergence layers are ATM   Ethernet  PPP  FireWire  and 3G  Supported QoS awareness includes 802 1p  RSVP  and  DiffServ FC        eS The website for ETSI is www etsi org    Wireless LAN Association    The Wireless LAN Association s mission is to educate and raise consumer awareness  regarding the use and availability of wireless LANs and to promote the wireless LAN  industry in general  The Wireless LAN Association  WLANA  is an educational resource  for those seeking to learn more about wireless LANs  WLANA can also help if you are  looking for a specific wireless LAN product or service     WLANA has many partners within the industry that contribute content to the WLANA  directory of information  It is this directory  along with the many white papers and case  studies that WLANA provides  that offer you valuable information for making your own  decisions about wireless LAN implementation        eS The
37.  2 years from now  need simultaneous access to the  wireless network       What is the bandwidth  per user  requirement on the wireless network      What protocols are in use over the wireless LAN      What channels and spread spectrum technologies are currently in use      What wireless LAN security measures are in place      Where are wired LAN connection points  wiring closets  located in the facility       What are the client   s expectations of what a wireless LAN will bring to their  organization       Is there a naming convention for infrastructure devices such as routers  switches   access points  and wireless bridges in place  Figure 11 1   If not  who is  responsible for creating one     312 Chapter 11     Site Survey Fundamentals    FIGURE 11 1    Naming Conventions       1  AP North Storage 7  2  AP North Storage 6  3  AP Sales 23    Obtain a detailed network diagram  topology map  from the current network  administrator  When one or more wireless LANs are already in place  the site survey will  become all the more difficult  especially if the previous installations were not done  properly  Doing a site survey with an ill functioning wireless LAN in place can be  almost impossible without the cooperation of the network administrator to disable the  network where and when needed  Upgrades of existing wired infrastructure devices  might also be necessary to enhance throughput and security on the wireless LAN        It may be necessary to sign a confidentiality agree
38.  Address Filtering    FIGURE 10 4    Wireless LANs can filter based on the MAC addresses of client stations  Almost all  access points  even very inexpensive ones  have MAC filter functionality  The network  administrator can compile  distribute  and maintain a list of allowable MAC addresses  and program them into each access point  If a PC card or other client with a MAC  address that is not in the access point   s MAC filter list tries to gain access to the wireless  LAN  the MAC address filter functionality will not allow that client to associate with that  access point  Figure 10 4 illustrates this point     Of course  programming every wireless client s MAC address into every access point  across a large enterprise network would be impractical  MAC filters can be implemented  on some RADIUS servers instead of in each access point  This configuration makes  MAC filters a much more scalable security solution  Simply entering each MAC address  into RADIUS along with user identity information  which would have to be input  anyway  is a good solution  RADIUS servers often point to another authentication  source  so that other authentication source would need to support MAC filters     MAC Filters    Access Access  Point   Point    2 D        gt  MAC Filter      S  TQ Rogue Client  with Stolen  PC Card    Stolen Card    MAC filters can work in reverse as well  For example  consider an employee who left a  company and took their wireless LAN card with them  This wireless LAN c
39.  B  C   D    The signal to noise ratio in a particular area  The average temperature of the facility  The average population of people in a given workspace    The humidity in a particular area    8  A site survey can be executed using a PDA with a wireless connection as a client     A   B     True    False    9  How long should an average site survey take to perform     A     B  C   D    Exactly one 8 hour day  One to five hours  It depends on the facility and client needs    One week    10     11     12     13     14     Chapter 11     Site Survey Fundamentals 347    Which of the following are pieces of information pertaining to the RF link that are  gathered during a site survey  Choose all that apply     A  Range and coverage pattern  B  Data rate and throughput   C  Interference sources  D    Wired network connectivity and power requirements    Which of the following items should NOT be recorded as part of an RF site survey   Choose all that apply     A  A C power outlets and grounding points  B  Wired network connectivity points   C  Names of all wireless LAN users  D     Potential RF obstructions such as fire doors  metal blinds  metal mesh  windows  etc     E  Potential RF sources such as microwave ovens  elevator motors  baby monitors   2 4 GHz cordless phones  etc     For outdoor RF site surveys  which of the following items should be recorded   Choose all that apply     A  Trees  buildings  lakes  or other obstructions between link sites    Dimensions of all rooftop
40.  B  C  Sending time synchronization and SSID information are two of the main  functions of the beacon management frame  often referred to simply as the beacon    There are many other important roles of the beacon including sending the TIM   supported communication rates  and FH DS parameters     C  By constantly monitoring beacons sent by all access points in its vicinity  a client  station is able to keep abreast of which access point would be the best candidate for  reassociation if its current link should fail  In knowing the best access point to  attempt association with before the need arises  time is saved in reassociation   making roaming a more seamless process  Clients do not associate to bridges     C  Although the SSID is often mistakenly quoted as  security set identifier   it  actually stands for  service set identifier  denoting which service set a device is to  participate in     C  The authentication and association process has 3 distinct states that a client  station moves through in becoming connected to the network  These are  1   unauthenticated  amp  unassociated   2  authentication  amp  unassociated  and  3   authenticated  amp  associated     A  Because the plaintext challenge and the encrypted plaintext challenge are  transmitted in the clear in sequence  a hacker could easily obtain both with a sniffer   After obtaining these two pieces of information  some calculations could be  performed on them to yield the WEP key  which could then be used for re
41.  C wna        Certified Wireless  Network Administrar    Official Study Guide    es   PE   EEE  SS    Objective by Objective coverage          _    of the CWNA certification exam    Vendor neutral wireless network  training and certification    Planet3 Wireless       CWNP    Certification Program         Expert   Integration  Security  Administration    The Certified Wireless Network Professional Training  amp  Certification Program is  intended for individuals who administer  install  design  and support IEEE 802 11  compliant wireless networks  Because the CWNP program is vendor neutral  candidates  who achieve the different levels of CWNP Certification will be trained and qualified to  administer and support many different brands of wireless LAN hardware  Although there  are many manufacturers of wireless LAN hardware  the technologies behind the hardware      Radio Frequency and Local Area Networking     are the same for each piece of gear   Each manufacturer approaches these technologies in different ways     The CWNP program consists of 4 levels of certification     Administrator     Site survey  installation and management of 802 11 compliant wireless  LANs    Security Professional     Design and implementation of 802 11 security techniques   processes  hardware  and software    Integrator     Advanced site survey  design  bridging and integration of 802 11 compliant  wireless LANs    Expert     Lab intensive approach to design  implementation  troubleshooting  amp  re
42.  Considerable research  time  and resources have gone into making these  two technologies coexist peacefully     Chapter 3     Spread Spectrum Technology 49    Wireless Personal Area Networks    Bluetooth  the most popular of WPAN technologies is specified by the IEEE 802 15  standard  The FCC regulations regarding spread spectrum use are broad  allowing for  differing types of spread spectrum implementations  Some forms of spread spectrum  introduce the concept of frequency hopping  meaning that the transmitting and receiving  systems hop from frequency to frequency within a frequency band transmitting data as  they go  For example  Bluetooth hops approximately 1600 times per second while  HomeRF technology  a wide band WLAN technology  hops approximately 50 times per  second  Both of these technologies vary greatly from the standard 802 11 WLAN  which  typically hops 5 10 times per second     Each of these technologies has different uses in the marketplace  but all fall within the  FCC regulations  For example  a typical 802 11 frequency hopping WLAN might be  implemented as an enterprise wireless networking solution while HomeRF is only  implemented in home environments due to lower output power restrictions by the FCC     Wireless Metropolitan Area Networks    Other spread spectrum uses  such as wireless links that span an entire city using high   power point to point links to create a network  fall into the category known as Wireless  Metropolitan Area Networks  or WMANs
43.  D  Power gain or loss is a change in power  not an absolute amount of power   For this reason  dB and dBi are correct because they are measurements of a change  in power     A  C  It s important in keeping VSWR to a minimum that all devices in an RF  system be impedance matched  This means that all devices in the system must be 50  ohms  75 ohms  or whatever impedance is being used  just so that all devices match     B  The FCC defines the Intentional Radiator as the input power to the antenna  This  definition means that the power output of the transmitter  plus all cabling   connectors  splitters  amplifiers  and attenuators before the antenna is included as  part of Intentional Radiator     C  There s no such thing as the perfect antenna  yet that s exactly what an isotropic  radiator is  An isotropic radiator radiates power evenly in all directions  a spherical  pattern   Ommni directional antennas have a doughnut shaped coverage pattern that  has gain relative to an isotropic radiator due to the squeezing of the RF field  All  antennas are referenced against this imaginary antenna for quantifiable  measurement     C  Impedance  measured in Ohms  is a resistance to current flow in any electrical  circuit  RF signals are high frequency alternating current  AC  and experience loss  due to resistance while in a copper conductor such as cabling     D  The mathematical reference point most commonly used with wireless LANs is 0  dBm   1 mW  Using the simple calculation of addi
44.  FCC guidelines  Once the necessary attenuation is  calculated  the appropriate fixed loss attenuator can be purchased     RF Attenuator placement in a wireless LAN           Access Point Attenuator               In choosing what kind of attenuator is required  consider the similar items as when  choosing an RF amplifier  see above   The type of attenuator  fixed or variable loss    impedance  ratings  input power  loss  and frequency response   and connector types  should all be part of the decision making process             All attenuators should come with a calibration report and certificate  It may not be  feasible to disassemble your wireless LAN in order to calibrate an attenuator annually  so making sure that the attenuator meets the manufacturer s specifications prior to  installation is a good idea     Configuration and Management    Figure 5 26 above shows the proper placement in a wireless LAN for an RF attenuator   which is directly in series with the main signal path  Fixed  coaxial attenuators are  connected directly between any two connection points between the transmitter and the  antenna  For example  a fixed  coaxial antenna might be connected directly on the output  of an access point  at the input to the antenna  or anywhere between these two points if  multiple RF cables are used     Configuration of RF attenuators is not required unless a variable attenuator is being used   in which case the amount of attenuation required is configured according to your
45.  Fresnel Zone important to the integrity of the RF link     A   B     The Fresnel Zone defines the area of coverage in a typical RF coverage cell    The Fresnel Zone must always be 100  clear of any and all blockage for a  wireless LAN to operate properly    The Fresnel Zone defines an area around the LOS that can introduce RF signal  interference if blocked    The Fresnel Zone does not change with the length of the RF link    42 Chapter 2     RF Fundamentals    19  The FCC allows how many watts of power to be radiated from an antenna in a point   to multipoint wireless LAN connection using unlicensed 2 4 GHz spread spectrum    equipment   A  1 watt   B  2 watts  C  3 watts  D  4 watts    20  In regards to gain and loss measurements in wireless LANs  the statement that gains  and losses are additive is     A  Always true  Always false  Sometimes true    Sometimes false    SO    It depends on the equipment manufacturer    Chapter 2     RF Fundamentals 43    Answers to Review Questions    1     10     11     12     B  In order to have RF LOS  the Fresnel Zone must be clear  Having a clear visual  line of sight between two points does not necessarily mean that your Fresnel Zone is  clear  The radius of the Fresnel Zone can be calculated with a simple formula     C  Due to weather  smog  or distance  the person configuring the RF link may not  be able to see the other end  yet because there is nothing in the Fresnel Zone  interfering with the RF signal  the link works fine     A 
46.  GHz GHz  1 2 412 N A  2 2 417 N A  3 2 422 2 422  4 2 427 2 427  5 2 432 2 432  6 2 437 2 437  7 2 442 2 442  8 2 447 2 447  9 2 452 2 452  10 2 457 2 457  11 2 462 2 462                To use DSSS systems with overlapping channels in the same physical space would cause  interference between the systems  DSSS systems with overlapping channels should not  be co located because there will almost always be a drastic or complete reduction in  throughput  Because the center frequencies are 5 MHz apart and the channels are 22  MHz wide  channels should be co located only if the channel numbers are at least five  apart  channels 1 and 6 do not overlap  channels 2 and 7 do not overlap  etc  There is a  maximum of three co located direct sequence systems possible because channels 1  6 and  11 are the only theoretically non overlapping channels  The 3 non overlapping channels  are illustrated in Figure 3 6             FIGURE 3 6    The word    theoretically    is used here because  as we will discus in Chapter 9      Troubleshooting  channel 6 can in fact overlap  depending on the equipment used and  distance between systems  with channels 1 and 11  causing degradation of the  wireless LAN connection and speed     DSSS non overlapping channels    P    3 MHz    22 MHz    f    2 401 GHz 2 473 GHz    58 Chapter 3     Spread Spectrum Technology    Effects of Narrow Band Interference    Like frequency hopping systems  direct sequence systems are also resistant to narrow  band interference 
47.  In these times  using the formula is  the best method of doing RF calculations  Since the decibel is a unit of relative power  measurement  a change in power level is implied  If the power level is given in dBm   then change in dB is simple to calculate     Initial power   20 dBm   Final power   33 dBm   Change in power  AP   33     20    13 dB  the value is positive  indicating an  increase in power     If the power levels are given in milliwatts  the process can become more complicated   Initial power   130 mW    Final power   5 2 W  Change in power     36 Chapter 2     RF Fundamentals    AP  10 og 2  P       10109 Su   130mW    10log40   10 1 6     16dB       You will not be tested on logarithmic functions using these formulas as part of the  CWNA exam  but your understanding of power calculations using the 10 s and 3 s will  be tested  These formulas are provided only for your reference in case they are  needed during your administrative tasks  Calculators are not needed on the CWNA  exam     Chapter 2     RF Fundamentals 37    Key Terms    Before taking the exam  you should be familiar with the following terms     antenna  impedance  Line of sight  logarithm    38 Chapter 2     RF Fundamentals    Review Questions    1     When visual line of sight  LOS  is present  RF LOS will always be present   A  This statement is always true  B  This statement is always false    C  It depends on the configuration of the antennas    When RF LOS is present  visual LOS will always be p
48.  Key Servers    For enterprise wireless LANs using WEP as a basic security mechanism  centralized  encryption key servers should be used if possible for the following reasons       Centralized key generation    Centralized key distribution    Ongoing key rotation      Reduced key management overhead    Any number of different devices can act as a centralized key server  Usually a server of  some kind such as a RADIUS server or a specialized application server for the purpose of  handing out new WEP keys on a short time interval is used  Normally  when using WEP   the keys  made up by the administrator  are manually entered into the stations and access  points  When using a centralized key server  an automated process between stations   access points  and the key server performs the task of handing out WEP keys  Figure  10 3 illustrates how a typical encryption key server would be setup     Chapter 10     Wireless LAN Security 277    FIGURE 10 3 Centralized Encryption Key Server    Key Server i         Centralized encryption key servers allow for key generation on a per packet  per session  or other method  depending on the particular manufacturer   s implementation  Per packet  WEP key distribution calls for a new WEP key to be assigned to both ends of the  connection for every packet sent  whereas per session WEP key distribution uses a new  WEP key for each new session between nodes        If you choose to implement per packet WEP key distribution  be aware that it will add
49.  LAN and Ethernet frames    Layer 3 Protocols supported by wireless LANs    Specify the modes of operation involved in the movement of Pe ae Spacing  data traffic across wireless LANs     Distributed Coordination Function  DCF     Point Coordination Function  PCF     CSMA CA vs  CSMA CD    Interframe spacing    RTS CTS      Dynamic Rate Selection    RTS CTS Process    Modulation      Modulation and coding    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     212 Chapter 8      MAC and Physical Layers    We mentioned earlier in this book how most of the technology in any wireless LAN is the  same  but that manufacturers approach and utilize that technology differently  In this  chapter we will discuss some of the MAC and Physical layer characteristics of wireless  LANs that are common to all wireless LAN products  regardless of manufacturer  We  will explain the difference between Ethernet and wireless LAN frames and how wireless  LANs avoid collisions  We   ll walk through how wireless LAN stations communicate  with one another under normal circumstances  then how collision handling occurs in a  wireless LAN     It is important for you as a wireless LAN administrator to know this level of detail in  order to be able to properly configure and administer an access point  as well as to be able  to diagnose and solve problems that are common to wireless LANs     How Wireless LANs Communicate    In order to understand how to configure and manage a wireless LAN  the admin
50.  Link status monitor with link testing functionality    Chapter 4     Wireless LAN Infrastructure Devices 91    Site survey tools can include many different items that allow the user to find networks   identify MAC addresses of access points  quantify signal strengths and signal to noise  ratios  and see interfering access points all at the same time during a site survey     Spectrum analyzer software has many practical uses including finding interference  sources and overlapping wireless LAN channels in the immediate area around your  wireless LAN     Power output and speed configuration utilities and monitors are useful for knowing what  a wireless link is capable of doing at any particular time  For example  if a user were  planning on transferring a large amount of data from a server to a laptop  the user may  not want to start the transfer until the wireless connection to the network is 11 Mbps  instead of 1 Mbps  Knowing the location of the point at which throughput  increases decreases is valuable for increasing user productivity     Profile configuration utilities ease administration tasks considerably when changing from  one wireless network to another  Instead of manually having to reconfigure all of a  wireless client   s settings each time you change networks  you may configure profiles for  each wireless network during the initial configuration of the client device to save time  later     Link status monitor utilities allow the user to view packet errors  success
51.  Organizations and Standards    Key Terms    Before taking the exam  you should be familiar with the following terms     infrared    ISM bands  UNII bands    Review Questions    1  What data rates does the 802 11 standard specify when using DSSS     A   B     C  D   E    1 Mbps only  2 Mbps only  4 Mbps only  1  amp  2 Mbps  1 2   amp  4 Mbps    2  The three UNII bands used for wireless LANs are each how wide     A   B   C   D     100 MHz  102 MHz  110 MHz  120 MHz    3  The FCC specifies rules for wireless LANs regarding which of the following     Choose all that apply   A  Power output   B  Frequencies   C  Modulation   D  Data rates    4  Which of the following is NOT one of the ISM bands used with wireless LANs     Choose all that apply   A  900 MHz   B  2 4 MHz   C  4 5 GHz   D  5 8 GHz    Chapter 6     Wireless LAN Organizations and Standards 169    The 802 11b standard specifies which of the following data rates using DSSS  technology     A  1 amp 2 Mbps   B  5 5  amp  11 Mbps   C  1 2   amp  11 Mbps   D  1 2  5 5   amp  11 Mbps    The 802 11b standard specifies which of the following spread spectrum  technologies     A  FHSS  B  DSSS   C  Infrared   D  Key hopping    Which of the following standards specifies use of FHSS technology   A  802 11    802 11b  C  802 1la  D  802 11g  E  OpenAir    What is the FCC limit on EIRP for a point to multipoint link     A  1 Watt   B  2 Watts  C  3 Watts  D  4 Watts    Why are 802 1 1a devices incompatible with all other 802 11 fam
52.  PCS   and now wireless local area networks   wireless LANs   Amateur radio enthusiasts are now beginning to experiment with  spread spectrum technologies for many of the reasons we    ve discussed     In addition to wireless LANs  WLANs   wireless personal area networks  WPANs    wireless metropolitan area networks  WMANSs   and wireless wide area networks   WWANsS  are also taking advantage of spread spectrum technologies  WPANs use  Bluetooth technology to take advantage of very low power requirements to allow wireless  networking within a very short range  WWANSs and WMANSs can use highly directional   high gain antennas to establish long distance  high speed RF links with relatively low  power     Wireless Local Area Networks    Wireless LANs  WMANs  and WWANS use the same spread spectrum technologies in  different ways  For example  a wireless LAN might be used within a building to provide  connectivity for mobile users  or bridges might be used to provide building to building  connectivity across a campus  These are specific uses of spread spectrum technology that  fit within the description of a Local Area Network  LAN      The most common uses of spread spectrum technology today lie in a combination of  wireless 802 11 compliant LANs and 802 15 compliant Bluetooth devices  These two  technologies have captured a tremendous market share  so it is ironic that the two  function much differently  play within the same FCC rules  and yet interfere with each  other greatly 
53.  RF  calculations  Configuration instructions for any particular attenuator will be included in  the manufacturer s user manual  To reiterate  you will likely not see the FCC certify a  system that has a variable attenuator     Lightning Arrestors    A lightning arrestor is used to shunt into the ground transient current that is caused by  lightning  Lightning arrestors are used for protecting wireless LAN hardware such as  access points  bridges  and workgroup bridges that are attached to a coaxial transmission  line  Coaxial transmission lines are susceptible to surges from nearby lightning strikes     132 Chapter 5     Antennas and Accessories             FIGURE 5 27    One common misconception about lightning arrestors is that they are installed to  protect against a direct lightning strike  If a bolt of lightning strikes your wireless LAN  antenna with the best lightning arrestor on the market installed  your antenna will be  destroyed and your wireless LAN will probably be damaged as well  A lightning  arrestor is not meant to withstand a direct lightning strike  nor protect your network from  such a strike     A lightning arrestor can generally shunt  redirect  surges of up to 5000 Amperes at up to  50 Volts  Lightning arrestors  depending on type  function as follows    1  Lightning strikes a nearby object   2  Transient currents are induced into the antenna or the RF transmission line    3  The lightning arrestor senses these currents and immediately ionizes the gase
54.  RF Splitters       FIGURE 5 30 ARF Splitter installed on a network    RF Splitter     I    Main Signal Path          Choosing an RF Splitter  Below is a checklist of things to consider when choosing an RF splitter       Insertion loss     Frequency response     Impedance      VSWR rating     High isolation impedance    Power ratings     Connector types     Calibration report     Mounting      DC voltage passing  Insertion Loss  Low insertion loss  loss incurred by just introducing the item into the circuit  is necessary    because simply putting the splitter in the RF circuit can cause a significant RF signal  amplitude decrease  Insertion loss of 0 5 dB or less is considered good for an RF splitter     Chapter 5     Antennas and Accessories 137       Do not confuse insertion loss with the loss of amplitude incurred between the input  connector and any output connector  called  through loss    The number of connectors  on an RF splitter will determine the number of ways  speaking in terms of power  division  that the RF amplitude will be split  A two way splitter should have 3 4 dB loss  between the input connector and either output connector  Loss higher than this can be  attributed either to insertion loss  which is added to through loss when measured  or to  inaccuracies in the splitter s ability to divide the power between output connectors     Frequency Response    The frequency response specification of the splitter should be at least as high as the  highest frequency 
55.  RTS CTS will cause significant  network overhead  For this reason RTS CTS is turned OFF by default on a wireless  LAN  If you are experiencing an unusual amount of collisions on your wireless LAN   evidenced by high latency and low throughput  using RTS CTS can actually increase the  traffic flow on the network by decreasing the number of collisions  Use of RTS CTS  should not be done haphazardly  RTS CTS should be configured after careful study of  the network s collisions  throughput  latency  etc        settings  and many other settings  unless they obtain the special password from the  manufacturer  By default  an administrator is locked out of those features of the  station s driver software  Normally  getting this password will not be easy  These  manufacturers require the administrator to take their 1 2 day product seminar before  they will allow the administrator to fill out a series of paperwork to obtain the necessary  password s      eS Some manufacturers do not allow administrators to change a station s RTS CTS    Figure 8 7 illustrates the 4 way handshake process used for RTS CTS  In short  the  transmitting station broadcasts the RTS  followed by the CTS reply from the receiving  station  both of which go through the access point  Next  the transmitting station sends its  data payload through the access point to the receiving station  which immediately replies  with an acknowledgement frame  or ACK  This process is used for every frame that is  sent across the 
56.  Removable  Modular  Radio Cards  Variable Output Power  Varied Types of Wired Connectivity  Configuration and Management  Wireless Bridges  Wireless Bridge Modes  Root Mode    Chapter    5    Non root Mode  Access Point Mode  Repeater Mode  Common Options  Fixed or Detachable Antennas  Advanced Filtering Capabilities  Removable  Modular  Radio Cards  Variable Output Power  Varied Types of Wired Connectivity  Configuration and Management  Wireless Workgroup Bridges  Common Options  Configuration and Management  Wireless LAN Client Devices  PCMCIA  amp  Compact Flash Cards  Wireless Ethernet  amp  Serial Converters  USB Adapters  PCI  amp  ISA Adapters  Configuration and Management  Driver Installation  Manufacturer Utilities  Wireless Residential Gateways  Common Options  Configuration and Management  Enterprise Wireless Gateways  Configuration and Management  Key Terms  Review Questions  Answers to Review Questions  Antennas and Accessories  RF Antennas  Omni directional  Dipole  Antennas  Usage  Semi directional Antennas  Usage  Highly directional Antennas  Usage  RF Antenna Concepts  Polarization  Gain  Beamwidth  Free Space Path Loss  The 6dB Rule  Antenna Installation  Placement  Mounting  Appropriate Use  Orientation  Alignment  Safety  Maintenance    Contents    82  82  82  83  83  84  84  84  84  85  85  86  86    113  113  113  115  115  116  117  117  118  118  119  119  120  120  121    ix    x Contents    Power over Ethernet  PoE  Devices  Common PoE Options  Sing
57.  Scattered RF    Some outdoor examples of objects that can cause scattering in a mobile communications  system include foliage  street signs  and lampposts  Scattering can take place in two  primary ways     First  scattering can occur when a wave strikes an uneven surface and is reflected in many  directions simultaneously  Scattering of this type yields many small amplitude  reflections and destroys the main RF signal  Dissipation of an RF signal may occur when  an RF wave is reflected off sand  rocks  or other jagged surfaces  When scattered in this  manner  RF signal degradation can be significant to the point of intermittently disrupting  communications or causing complete signal loss     Second  scattering can occur as a signal wave travels through particles in the medium  such as heavy dust content  In this case  rather than being reflected off an uneven  surface  the RF waves are individually reflected on a very small scale off tiny particles     Absorption    Absorption occurs when the RF signal strikes an object and is absorbed into the material  of the object in such a manner that it does not pass through  reflect off  or bend around  the object  as shown in Figure 2 8     24 Chapter 2     RF Fundamentals    FIGURE 2 8    Absorption    Incoming RF    Absorbed RF       Voltage Standing Wave Ratio  VSWR     FIGURE 2 9    VSWR occurs when there is mismatched impedance  resistance to current flow   measured in Ohms  between devices in an RF system     Mismatched     in
58.  Technologies    1 3 1     Identify some of the different uses for spread spectrum technologies    Wireless LANs  Wireless PANs  Wireless WANs      Comprehend the differences between  and apply the different types of spread    spectrum technologies    FHSS  DSSS      Identify and apply the concepts which make up the functionality of spread    spectrum technology    Co location  Channels  Dwell time  Throughput  Hop time    Identify the laws set forth by the FCC that govern spread spectrum  technology  including power outputs  frequencies  bandwidths  hop times  and  dwell times     Wireless LAN Technologies     17     2 1  802 11 Network Architecture    2 1 1     Identify and apply the processes involved in authentication and association    Passive scanning   Active scanning  Authentication   Association   Open system authentication  Shared key authentication  Secret keys and certificates  AAA Support      Recognize the following concepts associated with wireless LAN service sets    BSS  ESS  IBSS  SSID    xxii    Introduction    Infrastructure mode  Ad hoc mode  Roaming      Understand the implications of the following power management features of    wireless LANs    PSP Mode  CAM   Beacons   TIM   ATIM   ATIM Windows    2 2  Physical and MAC Layers    22M     2 2 2     Understand and apply the following concepts surrounding wireless LAN  Frames    The difference between wireless LAN and Ethernet frames  Layer 3 Protocols supported by wireless LANs    Specify the modes of op
59.  The  resulting Fresnel Zone would have a radius of 31 25 feet  9 52 meters              Fresnel Zone calculations are not part of the CWNA exam  The formula is provided to  you for your administrative tasks     Obstructions    Considering the importance of Fresnel Zone clearance  it is also important to quantify the  degree to which the Fresnel Zone can be blocked  Since an RF signal  when partially  blocked  will bend around the obstacle to some degree  some blockage of the Fresnel  Zone can occur without significant link disruption  Typically  20    40  Fresnel Zone  blockage introduces little to no interference into the link  It is always suggested to err to  the conservative side allowing no more than 20  blockage of the Fresnel Zone   Obviously  if trees or other growing objects are the source of the blockage  you might  want to consider designing the link based on 0  blockage     If the Fresnel Zone of a proposed RF link is more than 20  blocked  or if an active link  becomes blocked by new construction or tree growth  raising the height of the antennas  will usually alleviate the problem     A question commonly asked about the Fresnel Zone when using indoor wireless LAN  equipment such as PC cards and access points is how blockage of the Fresnel Zone  affects indoor installations  In most indoor installations  RF signals pass through  reflect  off  and refract around walls  furniture  and other obstructions  The Fresnel Zone is not  encroached upon unless the signal i
60.  When coverage in a specific direction is required   C  When coverage is required over more than 7 miles  11 7 km  in a specific  direction   D  Indoors only  for short range coverage of non roaming wireless LAN clients   Which of the following are names of semi directional antenna types  Choose all   that apply    A  Yagi  Omni   C  Patch   D  Panel   E  Point to point    15     16     17     18     19     20     Chapter 5     Antennas and Accessories 149    The coverage area of a Yagi antenna is ONLY in the direction that the antenna is  pointing  This statement is     A   B   C   D     Always true  Always false  Sometimes true  depending on the antenna manufacturer    Depends on how the antenna itself is installed    Polarization is defined as which one of the following     A   B   C     D     The direction of the RF antenna in relation to the north and south poles  The magnetic force behind the antenna element    The power sources of an antenna that cause the antenna to transmit signal in  more than one direction    The physical orientation of the antenna in a horizontal or vertical position    Which one of the following is an accurate description of an access point with  vertically polarized antennas     A   B   C     Both antennas are standing perpendicular to the Earth s surface  Both antennas are standing parallel to the Earth s surface    One antenna is parallel to the Earth s surface and the other is perpendicular to  the Earth s surface    What is the unit of measu
61.  Zone  Light actually has a Fresnel Zone  but because its wavelength is  so small  the Fresnel Zone is microscopic  It is possible to have a situation in which there  is clear or laser like line of sight back to the base antenna  but no radio connectivity   Examples of this situation are if the base antenna is visible through a slit between two  nearby buildings in the way  or if the tower is just barely visible in the distance over the  visual horizon or obstacle  In both cases  the Fresnel Zone is encroached upon and the  signal in both directions will be attenuated     Appendix A    RF in Perspective 357    Depending on the distance involved and the amount of the Fresnel Zone that is  encroached upon  a radio link may not be possible     Increasing power at the tower    Wireless LAN users frequently want high power amplifiers  for use at a tower  that  exceed FCC Part 15 regulations  When asked why  they reply   Because we want a  strong signal to reach our clients     When asked if they intend to put amplifiers at their  clients    sites  they invariably say    no     The next step for the wireless LAN expert is to  point out that it makes no sense to put several watts of transmit power at the tower site  while their clients only have perhaps 30 milliwatts of transmit power  Since a wireless  LAN is a two way system  if the base cannot hear the weak client  it does not matter how  strong the signal from the base is  There must be amplification at both ends for a  balanced
62.  a packet based LAN system  the transition from cell to cell may be performed  between packet transmissions  as opposed to telephony where the transition may  occur during a phone conversation       Ona voice system  a temporary disconnection may not affect the conversation   while in a packet based environment it significantly reduces performance  because the upper layer protocols then retransmit the data     Standards    The 802 11 standard does not define how roaming should be performed  but does define  the basic building blocks  These building blocks include active  amp  passive scanning and a  reassociation process  The reassociation process occurs when a wireless station roams  from one access point to another  becoming associated with the new access point     The 802 11 standard allows a client to roam among multiple access points operating on  the same or separate channels  For example  every 100 ms  an access point might  transmit a beacon signal that includes a time stamp for client synchronization  a traffic  indication map  an indication of supported data rates  and other parameters  Roaming    Chapter 7     802 11 Network Architecture 193    clients use the beacon to gauge the strength of their existing connection to the access  point  If the connection is weak  the roaming station can attempt to associate itself with a  new access point     To meet the needs of mobile radio communications  the 802 11b standard must be  tolerant of connections being dropped and 
63.  access points in this manner  it is recommended that you  implement the co location using the same manufacturer s hardware for all three access  points  It has been noted in many lab scenarios that using differing vendors  equipment  for co location has a negative effect on throughput of one or more of the access points   This negative effect could be simply due to differing output power and proximity  between access points  but could be related to many other factors as well     Solutions for Co location Throughput Problems    As a wireless LAN installer or administrator  you really have two choices when  considering access point co location  You can accept the degraded throughput  or you  can attempt a workaround  Accepting the fact that your users will not have 5 Mbps of  actual throughput to the network backbone on each access point may be an acceptable  scenario  First  however  you must make sure that the users connecting to the network in  this situation can still be productive and that they do not actually require the full 5 Mbps  of throughput  The last thing you want to be responsible for as a wireless LAN  administrator is a network that does not allow the users to do their jobs or achieve the  connections that they require  An administrator s second option in this case is to attempt  a workaround  Below  we describe some of the alternatives to co location problems     Use Two Access Points    FIGURE 9 11    One option  which is the easiest  is to use channels   an
64.  are some recommendations for securing wireless  LANs     Do not rely solely on WEP  no matter how well you have it implemented as an end to   end wireless LAN security solution  A wireless environment protected with only WEP  is not a secure environment  When using WEP  do not use WEP keys that are related to  the SSID or to the organization  Make WEP keys very difficult to remember and to  figure out  In many cases  the WEP key can be easily guessed just by looking at the  SSID or the name of the organization     WEP is an effective solution for reducing the risk of casual eavesdropping  Because an  individual who is not maliciously trying to gain access  but just happens to see your  network  will not have a matching WEP key  that individual would be prevented from  accessing your network     Cell Sizing    In order to reduce the chance of eavesdropping  an administrator should make sure that  the cell sizes of access points are appropriate  The majority of hackers look for the  locations where very little time and energy must be spent gaining access into the network   For this reason  it is important not to have access points emitting strong signals that  extend out into the organization s parking lot  or similar unsecure locations  unless  absolutely necessary  Some enterprise level access points allow for the configuration of  power output  which effectively controls the size of the RF cell around the access point   If an eavesdropper in your parking lot cannot detect y
65.  arrive at the same  time from different directions  The combination of these waves  amplitudes is additive to  the main RF wave  Reflected waves  if out of phase with the main wave  can cause  decreased signal amplitude at the receiver  as illustrated in Figure 9 2  This occurrence is  commonly referred to as downfade and should be taken into consideration when  conducting a sight survey and selecting appropriate antennas     FIGURE 9 2 Downfade    Amplitude decrease  due to Path Loss       Tower with    an antenna  a ee el ae  Se es ee        gt   Out of phase reflected A A    signal is added to the     S main signal    N 7  N 4  N 7  N Z  N Z    NZ       a       Corruption    Corrupted signals  waves  due to multipath can occur as a result of the same phenomena  that cause decreased amplitude  but to a greater degree  When reflected waves arrive at  the receiver out of phase with the main wave  as illustrated in Figure 9 3  they can cause  the wave to be greatly reduced in amplitude instead of only slightly reduced  The  amplitude reduction is such that the receiver is sensitive enough to detect most of the  information being carried on the wave  but not all     238 Chapter 9  Troubleshooting Wireless LAN Installations    FIGURE 9 3 RF Signal Corruption    Reflective surface            Resultant received  signal is corrupted by  reflected signals        gt     Reflective surface    In such cases  the signal to noise ratio  SNR  is generally very low  where the signal itsel
66.  as a valid  useful  signal by a receiver  Spread spectrum systems are much closer to the noise floor  than are narrowband signals     C  Both the OpenAir and 802 11 standards define all parameters necessary for  functioning of the equipment  These specifications include dwell times  data rates   data rate fallback functionality  frequency hop patterns  channels   and the frequency  bands to be used  This is not a comprehensive list     C  Spread spectrum transmitters spread a data signal out over a wide band of  frequencies using many symbols per bit for redundancy and using very low power     B  FHSS systems that can transmit data at 3 Mbps may or may not have the ability  to slow their data rate to 2 or 1 Mbps  which is specified by the 802 11 standard   These systems could comply with the IEEE standard if they could transmit at 2  amp  1  Mbps or the OpenAir standard if they could transmit at 1 6 Mbps and 800 kbps   While they are transmitting at other than these speeds  they are NOT compliant with  either standard     B  The FCC specifies use of two types of spread spectrum technology in the 2 4  GHz ISM band  These types are Frequency Hopping and Direct Sequence        Wireless LAN Infrastructure Devices    CWNA Exam Objectives Covered         Identify the purpose of the following infrastructure devices and  explain how to install  configure  and manage them       Access Points    Bridges    Workgroup Bridges        Identify the purpose of the following wireless LAN cli
67.  because users  remain connected to the network away from their main workstations     Small Office Home Office    As an IT professional  you may have more than one computer at your home  And if you  do  these computers are most likely networked together so you can share files  a printer   or a broadband connection     This type of configuration is also utilized by many businesses that have only a few  employees  These businesses have the need for the sharing of information between users  and a single Internet connection for efficiency and greater productivity     For these applications     small office home office  or SOHO     a wireless LAN is a very  simple and effective solution  Figure 1 6 illustrates a typical SOHO wireless LAN  solution  Wireless SOHO devices are especially beneficial when office workers want to  share a single Internet connection  The alternative of course is running wires throughout  the office to interconnect all of the workstations  Many small offices are not outfitted  with pre installed Ethernet ports  and only a very small number of houses are wired for  Ethernet networks  Trying to retrofit these places with Cat5 cabling usually results in  creating unsightly holes in the walls and ceilings  With a wireless LAN  users can be  interconnected easily and neatly     FIGURE 1 6    Chapter 1   Introduction to Wireless LANs 9    SOHO Wireless LAN    Wireless  Residential  Gateway    ee       Mobile Offices    FIGURE 1 7    Mobile offices or classrooms 
68.  bubble while it was still  small  close to the person s mouth  which is the transmitter  the person would get a  significant amount of gum  If the person waited to get that same size piece until the  bubble were large  further from the transmitter   the piece would be only a very small  amount of gum  This illustration shows that path loss is affected by two factors  first  the  distance between transmitter and receiver  and second  the size of the receiving aperture   the size of the piece of gum that was grabbed      Troubleshooting Multipath    An in phase or out of phase RF wave cannot be seen  so we must look for the effects of  multipath in order to detect its occurrence  When doing a link budget calculation  in  order to find out just how much power output you will need to have a successful link  between sites  you might calculate an output power level that should work  but doesn t   Such an occurrence is one way to determine that multipath is occurring     Another common method of finding multipath is to look for RF coverage holes in a site  survey  discussed in Chapter 11   These holes are created both by lack of coverage and  by multipath reflections that cancel the main signal  Understanding the sources of  multipath is crucial to eliminating its effects     Multipath is caused by reflected RF waves  so obstacles that more easily reflect RF  waves  such as metal blinds  bodies of water  and metal roofs  should be removed from or  avoided in the signal path if poss
69.  channel selection  and SSID     Configuration and Management    Configuring and installing wireless residential gateways generally consists of browsing to  the built in HTTP server via one of the built in Ethernet ports and changing the user   configurable settings to meet your particular needs  This configuration may include  changing ISP  LAN  or VPN settings  Configuration and monitoring are done in similar  fashion through the browser interface  Some wireless residential gateways units support  console  telnet  and USB connectivity for management and configuration  The text based  menus typically provided by the console port and telnet sessions are less user friendly  than the browser interface  but adequate for configuration  Statistics that can be  monitored may include items such as up time  dynamic IP addresses  VPN connectivity   and associated clients  These settings are usually well marked or explained for the non   technical home or home office user        M When you choose to install a wireless residential gateway at your home or business  be  aware that your ISP will not provide technical support for getting your unit connected to   the Internet unless they specifically state that they will  ISPs will usually only support  the hardware that you have purchased from them or that they have installed  This lack  of service can be especially frustrating to the non technical user who must configure  the correct IP addresses and settings in the gateway unit to get Int
70.  client will automatically    listen  to see if there is a  wireless LAN within range  The client is also discovering if it can associate with that  wireless LAN  This process of listening is called scanning  Scanning occurs before any  other process  since scanning is how the client finds the network     There are two kinds of scanning  passive scanning and active scanning  In finding an  access point  client stations follow a trail of breadcrumbs left by the access point  These  breadcrumbs are called service set identifiers  SSID  and beacons  These tools serve as a  means for a client station to find any and all access points     Service Set Identifier    The service set identifier  SSID  is a unique  case sensitive  alphanumeric value from 2   32 characters long used by wireless LANs as a network name  This naming handle is  used for segmenting networks  as a rudimentary security measure  and in the process of  joining a network  The SSID value is sent in beacons  probe requests  probe responses   and other types of frames  A client station must be configured for the correct SSID in  order to join a network  The administrator configures the SSID  sometimes called the  ESSID  in each access point  Some clients have the ability to use any SSID value instead  of only one manually specified by the administrator  If clients are to roam seamlessly  among a group of access points  the clients and all access points must be configured with  matching SSIDs  The most important poin
71.  co located access points     A  3   B  15  C  26  D  79    Consider the following two wireless LAN configurations     System 1  IEEE 802 11 compliant FHSS system  6 co located access points running  at maximum data rate     System 2  IEEE 802 11b compliant DSSS system  3 co located access points  running at 50  of maximum data rate    Which one of the following statements is true    A  System 1 will have more throughput   B  System 2 will have more throughput   C  System 1 and System 2 will have the same throughput    64 Chapter 3     Spread Spectrum Technology    5  Channels on direct sequence systems for 802 11b equipment are   MHz wide   A  5  B  20  C  22  D  83    6  Which of the following are advantages of 802 11b DSSS over 802 11 FHSS   Choose all that apply     A  Cost  B  Throughput  C  Security  D    Resistance to narrowband interference    7  Ifhaving compatible equipment from different manufactures were an important  factor when purchasing wireless LAN equipment  which of the following spread  spectrum technologies would be the best choice     A  FHSS  B  DSSS    8  The FCC has two sets of rules regarding FHSS that are known as before and after  which of the following dates     A  06 30 2000  B  08 31 1999  C  08 31 2000  D  08 31 2001    9  The latest published FCC rules regarding power output for FHSS states a maximum  output of which one of the following     A  100mW  B  125mW  C  200 mW  D  1W    10     11     12     13     14     Chapter 3     Spread Spectru
72.  copies of these plans  It is possible that the  network administrator may not give access to all of these resources  citing security  reasons  If so  then the site survey may take additional time     Are facility blueprints available  electronic or printed      Among the first items to request from a network manager are blueprints or some kind of  map showing the layout of the facility  as shown in Figure 11 5  Without the official  building or facility schematics  a diagram must be created that shows the dimensions of  the areas  the offices  where the walls are located  network closets  power outlets  etc     Blueprints or floor plans          Creating a facility drawing can be a time consuming task  If it is necessary to manually  create such a document  simple things like notebook paper with grid lines are helpful in  being efficient as the site survey is performed  This information can later be put into  Visio  AutoCAD  or other such applications for professional presentation to the  customer as part of the RF Site Survey Report     318 Chapter 11     Site Survey Fundamentals    Are there any previous site survey reports available     If a company has previously had a site survey performed  having that site survey report  available can cut down on the time it takes for the new survey to be completed  Be sure  that the previous report does not bias the decisions made regarding the current site  survey     Is a facilities escort or security badge required   A security bad
73.  criteria shows the surveyor some obvious things to consider  like  roaming across large distances  a limited number of users on an access point due to  mandated security  which means much security protocol overhead on the wireless LAN    and medical applications that are often connection oriented between the client and server   To ensure only the necessary amount of coverage for certain areas  semi directional  antennas may be used instead of omni antennas  Semi directional antennas tend to  reduce multipath since the signal is being broadcasted in less directions  Elevators are  everywhere  and cause signal blockage and possibly RF interference  Elevators are  basically  dead  RF zones  A hospital site survey is good training ground for individuals  wanting to get immersed in wireless LAN technology     The second facility type is a real estate office with approximately 25 agents  In this  environment  security is important  but not mandated by law  so rudimentary security  measures might suffice  Coverage will likely be adequate with only 1 or 2 centrally   located access points  and bandwidth requirements would be nominal since most of the  access is Internet based or transferring small files back and forth to the file server     These two scenarios are quite different  but both need site surveys  The amount of time  that it will take to perform a site survey at each facility is also very different  The real  estate office may not even take a full day  whereas the hospita
74.  decryption of packets can be accomplished by listening to broadcasts packets  using the WEP key      Passive attacks to decrypt traffic   Using statistical analysis  WEP traffic can be  decrypted     Why WEP Was Chosen    Since WEP is not secure  why was it chosen and implemented into the 802 11 standard   Once the 802 11 standard was approved and completed  the manufacturers of wireless  LAN equipment rushed their products to market  The 802 11 standard specifies the  following criteria for security         Exportable     Reasonably Strong     Self Synchronizing     Computationally Efficient    Optional    WEP meets all these requirements  When it was implemented  WEP was intended to  support the security goals of confidentiality  access control  and data integrity  What  actually happened is that too many early adopters of wireless LANs thought that they  could simply implement WEP and have a completely secure wireless LAN  These early  adopters found out quickly that WEP wasn t the complete solution to wireless LAN  security  Fortunately for the industry  wireless LAN hardware had gained immense  popularity well before this problem was widely known  This series of events led to many  vendors and third party organizations scrambling to create wireless LAN security  solutions     The 802 11 standard leaves WEP implementation up to wireless LAN manufacturers  so  each vendor   s implementation of WEP keys may or may not be the same  adding another  weakness to WEP  Even WECA
75.  devices  utilizes infrared light    infrared light   Light waves having wavelengths ranging from about 0 75 to 1 000  microns  which is longer  lower in frequency  than the spectral colors but much shorter   higher in frequency  than radio waves  Therefore  under most lighting conditions   infrared light is invisible to the naked eye     Institute of Electrical and Electronic Engineers  IEEE    A United States based  standards organization participating in the development of standards for data transmission  systems  IEEE has made significant progress in the establishment of standards for LANs   namely the IEEE 802 series of standards     integration service   Enables the delivery of MAC frames through a portal between an  IEEE 802 11 distribution system and a non 802 11 LAN     interframe space   Defines spacing between different aspects of the IEEE 802 11 MAC  access protocol to enable different transmission priorities     Internet protocol  IP      layer 3 protocol that allows the assignment of IP addresses to  devices in a network for routing purposes    joining     method by which wireless clients are allowed to locate  authenticate  and  associate to an access point    Lightweight Directory Access Protocol  LDAP      a set of protocols for accessing  information directories conforming to the X 500 standard    line of sight  LOS      the ability to visibly see one antenna from another antenna  lobes     the electrical fields emitted by an antenna  also called beams    lo
76.  downfade   or completely cancel the  radio signal  null  at the receiver  Will reduce or completely cancel throughput in a  wireless LAN     near far     caused when network nodes in close proximity transmitting at high power  blind each other to far nodes whose power is small  effectively cuts far node off the  network  can also be caused by non wireless LAN radio interference    Network Address Translation  NAT    an Internet standard that enables a local area  network  LAN  to use one set of IP addresses for internal traffic and a second set of  addresses for external traffic  The four types are static  dynamic  overloading  and  overlapping     Network Layer   Provides the routing of packets from source to destination     node   Any network addressable device on the network  such as a router or network  interface card     omni directional antenna   An antenna that transmits and receives radio signals all  directions     open system authentication   The IEEE 802 11 default authentication method  which is  avery simple  two step process  First the station wanting to authenticate with another  station sends an authentication management frame containing the sending station   s  identify  The receiving station then sends back a frame alerting whether it recognizes the  identity of the authenticating station     Glossary 369    Orthogonal Frequency Division Multiplexing  OFDM      A method of digital  modulation in which a signal is split into several narrowband channels at di
77.  equipment before  arriving  Generally  the more experienced site surveying professionals do the outside site  surveys because of the more complex and involved calculations and configuration  scenarios that are necessary for outdoor wireless LANs     Knowing characteristics of the wireless link  distance  link speed required  power output  required  etc   beforehand will aid in determining whether just an omni antenna or an  entire outdoor testing lab will be required  Remember that it takes two or more antennas  to create a wireless link depending on the number of locations involved in the link   Binoculars  comfortable walking shoes  rain gear  different lengths of cables  different  types of connectors  and some method of communicating with someone at the other end  of the link  1 e   a cell phone or walkie talkie  will also make outdoor site surveys more  efficient     Spectrum Analyzer    Spectrum analyzers come in various types  The two main categories might be considered  software and hardware spectrum analyzers  Hardware spectrum analyzers are made by  many different manufacturers and may cost many thousands of dollars  depending on  resolution  speed  frequency range  and other parameters     There are companies in the wireless LAN industry who have created software capable of  scanning the entire 2 4 GHz range and providing a graphical display of the results  as  shown in Figure 11 7  These products give a user the effective equivalent of a hardware  spectrum analyz
78.  established  This  means that applications can   t persist during periods when the mobile device cannot be  reached  When the mobile devices reattaches to the network  there may be a need to  clean up broken application sessions  log in again  re authenticate  restart applications   and re enter lost data  again a productivity loss  not to mention a usability failure    Second     session persistence    means more than forwarding packets to a user   s new  location  If you don   t have transport and application session persistence  the solution  breaks down  Why  When a transport protocol cannot communicate to its peer  the  underlying protocols  like TCP  assume that the disruption of service is due to network  congestion  When this occurs  these protocols back off  reducing performance and  eventually terminating the connection  The only way to solve this problem is to have  mobile nodes deployed with a software solution that acts on behalf of the mobile device  when it is unreachable     The 802 11b standard leaves much of the detailed functioning of what it calls the  distribution system to manufacturers  This decision was a deliberate decision on the part  of the standard designers  because they were most concerned with making the standard  entirely independent of any other existing network standards  As a practical matter  an  overwhelming majority of 802 11b wireless LANs using ESS topologies are connected to  Ethernet LANs and make heavy use of TCP IP  Wireless LAN v
79.  extra few  feet of cable in case extra length is needed in the future to move the access point or  bridge     Are there physical obstructions     Doorways  cement ceilings  walls  or other obstructions can result in some construction  costs if they need to be altered to allow for power connections or to run power or data  cabling to the access points or antennas     Outdoor Antenna Placement    For outdoor antenna placement  record the location and availability of grounding points   towers  and potential mounting locations  Outdoor antennas require lightning arrestors   which require grounding  Grounding is an easy point to miss  and the client may not be  aware of this necessity  Make notes of where antennas could best be mounted and  whether any special mounting materials may be required     Keep in mind that adding network connectivity outdoors will be a very new concept to  most companies implementing wireless LANs  Specify exactly what is required to bring    Chapter 11     Site Survey Fundamentals 339    the network outside the building  including cables  power  weather protection  and  protection from vandalism and theft     Spot Checks    After a wireless LAN is installed  it might not work exactly as planned  although it may  be close  Spot checking by a site surveyor after installation is complete is most helpful in  avoiding troubleshooting situations during production use of the network  Items that  should be checked are       Coverage in perimeter areas    Overl
80.  facility make finding a particular location within the facility much easier and serve as  graphical information for the RF Site Survey Report as well  During most surveys  scratch paper  grid paper  and copies of blueprints or floor plans are necessary  When  added to the amount of equipment that will be carried around  this amount of paper and  documentation tends to become a burden  For this reason  a sufficiently large mobile  equipment cart that can contain all the necessary gear is quite useful while moving  through a facility     There are no industry standard forms for recording all the data that will be necessary  during even the smallest site survey  However  it will prove very useful to create a set of  forms that suits your style of work and recording  and to use these same forms on every  site survey  Not only will this type of uniformity help you communicate your findings to  the client  but it will also help maintain accurate and easy to understand records of past  site surveys  These forms will be used during the creation of your site survey report as a  reference for all readings taken during the site survey     Outdoor Surveys    Outdoor site surveys will take more time  effort  and equipment than will indoor surveys   which is another reason that planning ahead will greatly improve productivity once on  site  If a survey to create an outdoor wireless link is being done  obtain the appropriate  antennas  amplifiers  connectors  cabling  and other appropriate
81.  had a 100baseFx  connector and running fiber from the wiring closet to the access point mounting location  ahead of time would allow this configuration to function properly  and more easily     78 Chapter 4      Wireless LAN Infrastructure Devices    Configuration and Management    The method or methods used to configure and manage access points will vary with each  manufacturer  Most brands offer at least console  telnet  USB  or a built in web server  for browser access  and some access points will have custom configuration and  management software  The manufacturer configures the access point with an IP address  during the initial configuration  If the administrator needs to reset the device to factory  defaults  there will usually be a hardware reset button on the outside of the unit for this    purpose     Features found in access points vary  However  one thing is constant  the more features  the access point has  the more the access point will cost  For example  some SOHO  access points will have WEP  MAC filters  and even a built in web server  If features  such as viewing the association table  802 1x EAP support  VPN support  routing  functionality  Inter access point protocol  and RADIUS support are required  expect to  pay several times as much for an enterprise level access point     Even features that are standard on Wi Fi compliant access points sometimes vary in their  implementation  For example  two different brands of a SOHO access point may offer  MAC fil
82.  illustration shows how  diffraction acts with obstacles in its path  depending on the makeup of the obstacle  If the  object was large or jagged enough  the wave might not bend  but rather might be blocked     Diffraction  Old wavefront  direction  New wavefront  direction  Arial view of RF rT  propagation          RF Shadow    ern  e ee       Buidling rooftop       New wavefront  direction    Old wavefront  direction    Diffraction is the slowing of the wave front at the point where the wave front strikes an  obstacle  while the rest of the wave front maintains the same speed of propagation   Diffraction is the effect of waves turning  or bending  around the obstacle  As another  example  consider a machine blowing a steady stream of smoke  The smoke would flow  straight until an obstacle entered its path  Introducing a large wooden block into the  smoke stream would cause the smoke to curl around the corners of the block causing a  noticeable degradation in the smoke s velocity at that point and a significant change in  direction     FIGURE 2 7    Chapter 2     RF Fundamentals 23    Scattering    Scattering occurs when the medium through which the wave travels consists of objects  with dimensions that are small compared to the wavelength of the signal  and the number  of obstacles per unit volume is large  Scattered waves are produced by rough surfaces   small objects  or by other irregularities in the signal path  as can be seen in Figure 2 7     Scattering    Incoming RF
83.  information being   broadcast in beacons from the access point or any MAC address information in unicast   packets from clients     In order to put a centralized encryption key server in place  the wireless LAN  administrator must find an application that performs this task  buy a server with the  appropriate operating system installed  and configure the application according to the  organization s needs  This process could be costly and time consuming  depending on  the scale of deployment  but will pay for itself in a very short period of time in preventing  liabilities due to malicious hackers     Wireless VPNs    Wireless LAN manufacturers are increasingly including VPN server software in access  points and gateways  allowing VPN technology to help secure wireless LAN connections   When the VPN server is built into the access point  clients use off the shelf VPN  software using protocols such as PPTP or IPsec to form a tunnel directly with the access  point     288 Chapter 10     Wireless LAN Security    First  the client would associate with the access point  and then the dial up VPN  connection would have to be made in order for the client to pass traffic through the access  point  All traffic is passed through the tunnel and can be encrypted as well as tunneled to  add an extra layer of security  Figure 10 10 shows a VPN configuration     FIGURE 10 10 Wireless LAN VPN solution             Access Point      VPN Server    A      Associated    oe  N       _        7     
84.  into the network  Through  the use of VPN tunnels  clients can even be blocked from accessing each other over  the wireless segment     B  The 802 1x standard provides port based access control  It functions by stopping  a port  a connection between the edge device and the client  until the edge device  authenticates the client  After authentication  the port is forwarded so that clients  can establish a connection with the edge devices and pass packets across the  network     C  No user authentication is specified in the 802 11 standard  User authentication is  left up to the manufacturer to implement making user authentication a wireless  LAN s weakest link  Never rely on WEP as an end to end wireless LAN security  solution     B  C  D  Being able to see many access points in a given area is indicative of cell  sizes being too large  Anytime someone can see or connect to your wireless LAN  from outside your building without this being the specific intent of the network  designer  the cell sizes are too large     A  Basing user authentication on username and passwords or other appropriate user  knowledge instead of the hardware itself is a better way of securing wireless LANs        CHAPTER    11    In This Chapter    Site Survey Fundamentals    CWNA Exam Objectives Covered       Understand the importance of and processes involved in  conducting an RF site survey      Identify and understand the importance of the necessary tasks What is a Site Survey     involved in prepari
85.  is separated by 5 MHz  These channels are 1   6   amp  11 as numbered by the FCC     D  The FCC specifies 14 channels for use with wireless LANs  11 of which can be  used in the United States  Each channel is 22 MHz wide  and the channel is  specified as a center frequency  11 MHz and  11 MHz     Chapter 9  Troubleshooting Wireless LAN Installations 269    20  C  The lower 5 GHz UNII band and the 2 4 GHz ISM band are the same width    100 MHz  802 11a equipment is new and significantly more expensive than 802 11b  equipment and is not compatible with 802 11b or 802 11g equipment in any  capacity  The UNII bands  all three of them  allow for a larger useable portion than  does the 2 4 GHz ISM band  yielding a maximum of 4 non overlapping DSSS  channels           CHAPTER    10    In This Chapter    Wireless LAN Security    CWNA Exam Objectives Covered      7      Identify the strengths  weaknesses and appropriate uses of the  following wireless LAN security techniques      WEP WEP    AES Filtering    Filtering   Attacks      Emerging security techniques        Describe the following types of wireless LAN security attacks   and explain how to identify and prevent them    Emerging Solutions      Passive attacks  eavesdropping  Corporate Security Policy      Active attacks  connecting  probing  and configuring the network  Security Recommendations    Jamming attacks    Man in the middle attacks      Given a wireless LAN scenario  identify the appropriate security  solution from t
86.  long distance radio links   must be calculated into tower height for radio links greater than 7 miles    Equivalent Isotropic Radiated Power  EIRP      the actual power output  at the antenna   of a radio transmitter  EIRP can be calculated by adding the transmitter output power  in  dBm  to the antenna gain  in dBi  and subtracting the cable loss  in dB   Power     Gainant     Losscabie     Effective    is used by many sources in the industry  The two terms  have the same meaning     Ethernet   A 10 Mbps LAN medium access method that uses CSMA to allow the sharing  of a bus type network  IEEE 802 3 is a standard that specifies Ethernet     Ethernet switch   An Ethernet connectivity device more intelligent than a hub  having  the ability to connect the sending station directly to the receiving station in full duplex   Additionally  it has filtering and learning capabilities     Glossary 365    European Telecommunications Standards Institute  ETSI    a non profit organization  whose mission is to produce the telecommunications standards that will be used  throughout Europe  including HiperLAN 1 and HiperLAN 2    extended service set  ESS    A collection of basic service sets tied together via a  distribution system sharing a common network name  SSID     Extensible Authentication Protocol  EAP    The Extensible Authentication Protocol   EAP  is a general protocol for PPP authentication that supports multiple authentication  mechanisms  EAP does not select a specific authentic
87.  municipalities must approve the building of any type of  structure  antenna structures or otherwise   thus the installer designer of such a  structure should obtain proper permissions or licenses     Purpose  amp  Business Requirements    What is the purpose of the wireless LAN  What are the business requirements     From a temporary office to complete data connectivity for the Olympics  the answer to  this question will drive many decisions  Using the extreme example and contrast of a  temporary office versus the Olympics  dozens of issues might come up such as budget   number of users  outdoor connectivity  temporary network access  and security     Recommending a high speed 802 1 1a installation for an organization that is only using a  few wireless PDAs would be a poor judgment  so the needs of the users must be  determined  As much information as can be gathered will be helpful in understanding  how the wireless LAN is to be used  This information gathering may require interviews  with some network users as well as network management     Find out exactly what the client expects to do with the wireless LAN and what  applications are going to be used over this new network  There might be several distinct  and independent purposes for the wireless LAN  Thoroughly documenting the client s  needs enables the network architect to design a solution that will meet all of the client   s  needs  and may also assist the client in their network management     In order for the site 
88.  nodes  This process is  usually trial and error at best  Once these nodes are located  there are several remedies  and workarounds for the problem       Use RTS CTS     Increase power to the nodes     Remove obstacles    a Move the node    Use RTS CTS    The RTS CTS protocol is not necessarily a solution to the hidden node problem  Instead   it is amethod of reducing the negative impact that hidden nodes have on the network   Hidden nodes cause excessive collisions  which have a severely detrimental impact on  network throughput  The RTS CTS  request to send clear to send  protocol involves  sending a small packet  RTS  to the intended recipient to prompt it to send back a packet   CTS  clearing the medium for data transmission before sending the data payload  This  process informs any nearby stations that data is about to be sent  having them delay  transmissions  and thereby avoiding collisions   Both the RTS and the CTS contain the  length of the impending data transmission so that stations overhearing either the RTS or  CTS frames know how long the transmission will take and when they can start to  transmit again     There are three settings for RTS CTS on most access points and clients  On  Off  and On  with Threshold  The network administrator must manually configure RTS CTS settings   The Off setting is the default in order to reduce unnecessary network overhead caused by  the RTS CTS protocol  The threshold refers directly to the packet size that will trigger    Chap
89.  nodes is enough to transmit through  or around the obstacle blocking the RF signals from stations and sometimes it is not   When increasing the power is not enough  the best course of action is use of the  RTS CTS protocol in order that stations broadcast their intention to transmit data on  the network     2  D  By having two antennas and supporting antenna diversity  most access points can  overcome multipath problems  Antenna diversity works by separating the two  antennas by a distance greater than the wavelength of the frequency in use thereby  reducing the changes that both spots will have exactly the same detrimental effects  from reflected waves     3  A  Signal fading can refer to upfade  downfade  or nulling of an RF transmission   This type of fading is sometimes referred to as Rayleigh fading  but most often it is  simply deemed fading  No matter what type of fading happens  it s generally  detrimental to the main RF wave     4  B  The delay spread is the amount of time between the arrival at the receiver of the  main RF wave and the arrival of the last reflected wave  This amount of time is  typically 4 nanoseconds or less     5  A D  The near far problem is normally remedied by the wireless protocols in use  such as CSMA CA  When these protocols are ineffective  increasing power to  remote nodes  moving the remote nodes closer to the local nodes  or decreasing  power to the local nodes are some available remedies     6  A  Co channel interference is the interfe
90.  non   overlapping channels would yield a maximum data rate of 16 5 Mbps because each  system has a data rate of 5 5 Mbps  half of the maximum 11 Mbps   Since  throughput on each of these systems is approximately 50  of the data rate due to  overhead with the CSMA CA protocol  the 802 11b systems would yield greater  throughput     C  Channels on 802 11b compliant DSSS systems in the 2 4 GHz band are 22 MHz  wide  This is in contrast to the OFDM channels used by the 802 1 1a standard using  the 5 GHz UNII bands  which are each 20 MHz wide     A  B  The 802 11b standard specifies rates up to 11 Mbps whereas the highest data  rate specified by the 802 11 standard is 2 Mbps  Therefore  the DSSS technology  specified in 802 11b is significantly faster than that of 802 11 FHSS  802 11b  compliant hardware is often as little as 1 3 of the price of 802 11 FHSS hardware  offering a much better value to the average user  Security is implemented in both  standards in the same fashion  and FHSS has better resistance to narrowband  interference due to frequency diversity     B  DSSS technologies have become amazingly popular with 802 11b Wi Fi  compliant devices  FHSS devices have taken a back seat with 802 11 and OpenAir  standards losing popularity in comparison to IEEE s 802 11b and WECA s Wi Fi  standards  Wi Fi has become the de facto standard in DSSS wireless LAN  equipment interoperability     C  On 8 31 00  the FCC changed the rules regarding use of FHSS systems  Systems  manufac
91.  number of users grows  lack  of compatibility may render a network useless  and the lack of interoperability may  interfere with the proper operation of other networks     Chapter 1   Introduction to Wireless LANs 3    Today   s Wireless LAN Standards    Because wireless LANs transmit using radio frequencies  wireless LANs are regulated by  the same types of laws used to govern such things as AM FM radios  The Federal  Communications Commission  FCC  regulates the use of wireless LAN devices  In the  current wireless LAN market there are several accepted operational standards and drafts  in the United States that are created and maintained by the Institute of Electrical and  Electronic Engineers  IEEE      These standards are created by groups of people that represent many different  organizations  including academics  business  military  and the government  Because  standards set forth by the IEEE can have such an impact on the development of  technology  the standards can take many years to be created and agreed upon  You may  even have an opportunity to comment on these standards at certain times during the  creation process     The standards specific to wireless LANs are covered in greater detail in Chapter 6   Wireless LAN Organizations and Standards   Because these standards are the basis upon  which the latest wireless LANs are built  a brief overview is provided here     IEEE 802 11   the original wireless LAN standard that specifies the slowest data transfer  rates 
92.  of a PCI adapter with a PC card inserted     90 Chapter 4     Wireless LAN Infrastructure Devices    FIGURE 4 16 A sample PCI Adapter       Configuration and Management  There are two steps to installing wireless LAN client devices     1  Install the drivers    2  Install manufacturer   s wireless utilities    Driver Installation    The drivers included for cards are installed the same way drivers for any other type of PC  hardware would be  Most devices  other than ISA adapters  are plug n play compatible   which means that when the client device is first installed  the user will be prompted to  insert the CD or disks containing the driver software into the machine  Specific steps for  device installation will vary by manufacturer  Be sure to follow the instruction manuals  for your specific brand of hardware        M When purchasing client devices  make sure the drivers are included for the specific  operating system in which you will be installing the hardware     Serial  amp  Ethernet converters require no special drivers to work  however  wireless LAN  client utilities can still be installed and utilized     Manufacturer Utilities    Some manufacturers offer a full suite of utilities and others simply provide the user with  the most basic means of connectivity  A robust set of utilities might include      Site Survey tools  Covered in Chapter 11  Site Survey Fundamentals      Spectrum Analyzer     Power and speed monitoring tools     Profile configuration utilities     
93.  of a pancake shape when the gain is very high  Antennas have  passive gain  which means they do not increase the power that is input into them  but  rather shape the radiation field to lengthen or shorten the distance the propagated wave  will travel  The higher the antenna gain  the farther the wave will travel  concentrating its  output wave more tightly so that more of the power is delivered to the destination  the  receiving antenna  at long distances  As was shown in Figure 5 5  the coverage has been  squeezed vertically so that the coverage pattern is elongated  reaching further     Beamwidth    As we ve discussed previously  narrowing  or focusing antenna beams increases the  antenna   s gain  measured in dBi   An antenna   s beamwidth means just what it sounds  like  the    width    of the RF signal beam that the antenna transmits  Figure 5 15 illustrates  the term beamwidth     FIGURE 5 15 Beamwidth of an antenna    Directional  Antenna    Vertical  Beamwidth    ee sy    Beamwidth    116 Chapter 5     Antennas and Accessories    There are two vectors to consider when discussing an antenna   s beamwidths  the vertical  and the horizontal  The vertical beamwidth is measured in degrees and is perpendicular  to the Earth s surface  The horizontal beamwidth is measured in degrees and is parallel to  the Earth s surface  Beamwidth is important for you to know because each type of  antenna has different beamwidth specifications  The chart below can be used as a quick  refe
94.  packet to another client station  the receiving  station replies with an acknowledgement after which interframe space     A  IFS   B  SIFS  C  PIFS  D  DIFS    10     Chapter 8     MAC and Physical Layers 229    Why is the CSMA CA protocol used in order to avoid collisions in a wireless LAN   A  PCF mode requires use of a polling mechanism   B  The overhead of sending acknowledgements is high   C  All clients must acknowledge packets received while they re asleep    D  It is not possible to detect collisions on a wireless LAN    End stations will broadcast a when actively scanning for access points on  the network     A  Beacon management frame  B  Superframe   C  Probe request frame   D    Request to send    PIFS are only used during the communications of a wireless LAN when which of  the following have occurred     A  The network is in point coordination function mode   B  The access point has been configured to use RTS CTS  C  The access point has been configured to use CSMA CD  D    The network is configured for fragmentation    You have just finished installing your first wireless LAN with 802 11b equipment  rated at 11 Mbps  After testing the throughput of the clients  you find your actual  throughput is only 5 5 Mbps  What is the likely cause of this throughput     A  Wireless LANs use RTS CTS by default  B  Wireless LANs use the CSMA CA protocol  C  Use of PCF is reducing network throughput    D  DRS has caused all of the clients to decrease their data rates    You h
95.  points by the wireless LAN administrator  D    Automatically by the clients only    A situation that results in the client s  that are farther away from the access point and  using less power to not be heard over the traffic from the closer  high powered  clients  is known as     A  Hidden Node  B  Near Far  C  Degraded throughput    D  Interference    Why should an administrator be able to co locate 3 DSSS access points in the same  area using the 2 4 GHz ISM band     A  Each access point will transmit on one band and receive on another     B  Each access point will use co channel interference to stop the others from  transmitting data when it is ready to send    C  The access points will use channels that do not overlap or cause adjacent  channel interference    D  There are up to five non overlapping DSSS channels in the ISM bands     How many channels in the 2 4 GHz spectrum are designated for use in the United  States     A  3   B  14  C  10  D  11    Which one of the following is an advantage of 5 GHz  802 1 1a  equipment over  802 11b equipment     A  The lower 5 GHz UNII band is wider than the 2 4 GHz ISM band  B  The 802 11a equipment is less expensive than 802 11b    C  The 5 GHz UNII bands allows for more non overlapping channels than the 2 4  GHz ISM band    D  802 11a equipment is backwards compatible with 802 11g equipment    Chapter 9  Troubleshooting Wireless LAN Installations 267    Answers to Review Questions    1  A B  Sometimes increasing the power on the
96.  s Wi Fi interoperability standard tests include only 40   bit WEP keys  Some wireless LAN manufacturers have chosen to enhance  fix  WEP   while others have looked to using new standards such as 802 1x with EAP or Virtual  Private Networks  VPN   There are many solutions on the market addressing the  weaknesses found in WEP     274 Chapter 10     Wireless LAN Security    WEP Keys    The core functionality of WEP lies in what are known as keys  which are the basis for the  encryption algorithm discussed in the previous section of this chapter  WEP keys are  implemented on client and infrastructure devices on a wireless LAN  A WEP key is an  alphanumeric character string used in two manners in a wireless LAN  First  a WEP key  can be used to verify the identity of an authenticating station  Second  WEP keys can be  used for data encryption     When a WEP enabled client attempts to authenticate and associate to an access point  the  access point will determine whether or not the client has the correct WEP key  By     correct     we mean that the client has to have a key that is part of the WEP key  distribution system implemented on that particular wireless LAN  The WEP keys must  match on both ends of the wireless LAN connection     As a wireless LAN administrator  it may be your job to distribute the WEP keys  manually  or to setup a more advanced method of WEP key distribution  WEP key  distribution systems can be as simple as implementing static keys or as advanced as using
97.  security solutions to take the forefront in the wireless LAN security market  We  will discuss some of these possible security solutions that  while not yet approved and  accepted into the 802 11 family of standards  can play a role in securing your wireless  LAN     As of this writing  all of the available security solutions discussed in this book are  proprietary in nature  Although the IEEE has accepted 802 1x as a standard  its use as an  approved part of an 802 11 series standard is not yet official  There are new standards  still in draft form  such as 802 111  that specifies use of such security mechanisms as  802 1x and EAP     WEP Key Management    Instead of using static WEP keys  which can easily be learned or discovered by hackers   wireless LANs can be made more secure by implementing dynamic per session or per   packet key assignments using a central key distribution system     Per session or per packet WEP key distribution assigns a new WEP key to both the client  and the access point for each session or each packet sent between the two  While dynamic  keys add more overhead and reduce throughput  they make hacking the network through  the wireless segment much more difficult  The hacker would have to be able to predict  the sequence of keys that the key distribution server is using  which is very difficult     Remember that WEP protects only the layer 3 7 information and data payload  but does  not encrypt MAC addresses or beacons  A sniffer could capture any
98.  so doing   sacrifice interoperability     Security    It is widely touted   and is a myth   that frequency hopping systems are inherently more  secure than direct sequence systems  The first fact that disproves this myth is that FHSS  radios are only produced by a minimal number of manufacturers  Of this small list of  manufacturers  all of them adhere to standards such as 802 11 or OpenAir in order to sell  their products effectively  Second  each of these manufacturers uses a standard set of hop  sequences  which generally comply with a pre determined list  produced by the standards  body  IEEE or WLIF   These 2 items together make breaking the code of hop sequences  relatively simple     Other reasons that make finding the hop sequence quite simple is that the channel number  is broadcasted in the clear with each beacon  Also  the MAC address of the transmitting  access point can be seen with each beacon  which indicates the manufacturer of the  radio   Some manufacturers allow the administrator the flexibility of defining custom  hopping patterns  However  even this custom capability is no level of security since  fairly unsophisticated devices such as spectrum analyzers and a standard laptop computer  can be used to track the hopping pattern of a FHSS radio in a matter of seconds     Standards Support    As previously discussed  DSSS has gained wide acceptance due to low cost  high speed   WECA s Wi Fi interoperability standards  and many other factors  This market  acc
99.  spectrum communications in 1957 well before the broad  commercial use that spread spectrum systems enjoy today     16 Chapter 1   Introduction to Wireless LANs    11     12     13     14     15     A  The first wireless LAN standard was the 802 11 standard using the 2 4 GHz ISM  band  approved in 1997  Following 802 11 was 802 11b raising the top speed to 11  Mbps and limiting use to DSSS technology only  Following 802 11b was 802 1 1a   which uses the 5 GHz UNII bands  The 802 11g standard is in draft form  and has  not yet been completed     C  Wi Fi is the hardware compatibility standard created and maintained by WECA  for 802 11b devices  IEEE 802 11g devices use the 2 4 GHz ISM band are  backwards compatible with 802 11b  802 11a devices use a different set of  frequencies and a different modulation type from 802 11b  and are thus  incompatible     E  The IEEE 802 11  802 11b  802 11g  Bluetooth  and HomeRF all use the 2 4  GHz ISM bands  whereas the 802 11a standard uses the 5 GHz UNII bands     A  WISPs are direct competitors for telephone companies and cable companies in  providing last mile connectivity to businesses and residences in the broadband  Internet services market     C  The Federal Communications Commission  FCC  makes the laws regarding  frequency band usage  licensed and unlicensed  in the United States  The IEEE  makes standards regarding wireless LANs  which use RF frequencies  WECA  makes hardware compatibility standards called Wi Fi and Wi Fi5  and 
100.  splitter  Exceeding the manufacturer s  power rating will result in damage to the RF splitter     Connector Types    RF splitters will generally have N type or SMA connectors  It is very important to  purchase a splitter with the same connector types as the cable being used  Doing so cuts  down on adapter connectors  which reduce RF signal amplitude  This knowledge is  especially important when using splitters  since splitters already cut the signal amplitude  in an RF system     138 Chapter 5     Antennas and Accessories    Calibration Report    All RF splitters should come with a calibration report that shows insertion loss  frequency  response  through loss at each connector  etc  Having splitters calibrated once per year is  not feasible so it is essential that the administrator know before initial installation  whether or not the splitter meets the manufacturer s specifications  Continued calibration  requires taking the wireless LAN off line for an extended period of time  and may not be  practical in many situations     Mounting    Mounting an RF splitter is usually a matter of putting screws through the flange plates  into whatever surface on which you the splitter will be mounted  Some models come  with pole mounting hardware using  U  bolts  mounting plates  and standard sized nuts   Depending on the manufacturer  the splitter might be weatherproof  meaning it can be  mounted outside on a pole without fear of water causing problems  When this is the case   be sure 
101.  survey should be performed every 6 months on all wireless LAN  installations    A site survey is the most important step in implementing a wireless LAN    Anyone who is familiar with the facility can perform a site survey    4  Which of the following would a site surveyor need to have before performing an  indoor site survey  Choose all that apply     A     B  C   D    Blueprints or floor plans of the facility  Permission to access the roof and wiring closets  A thorough working knowledge of the existing network infrastructure    Advance notice of all future construction within 5 miles  8 35 km  of the  facility    346 Chapter 11     Site Survey Fundamentals    5  Why isa site survey a requirement for installing a successful wireless LAN     A     B     C   D     To determine if a wireless LAN is an appropriate solution for the problem or  need    Because RF equipment will not operate in accordance with the manufacturer s  specifications without a site survey    To ensure that the client s network managers are experts at RF technology    To determine the range  coverage  and potential RF interference sources    6  Which one of the following should be done prior to conducting a site survey     A     B  C   D    Interviewing network administrators  Preparing a thorough site survey report  Installing temporary access points    Walking the entire facility with a spectrum analyzer    7  Which one of the following measurements is important to record during a site  survey     A    
102.  system     Reflection    In cases where the client is located close to the base station  it is possible to get a non line  of sight connection off of a reflection from a nearby building  Once again  if everything  is very close together  less than 1000 feet  305 meters    the weak reflection from the  building may have enough    illumination    to be captured by a high gain antenna aimed at  the reflecting point     RF Summary    Below are several points to remember when implementing wireless links     Antennas  like telescopes  focus the signal and offer the same gain for both  transmitted and received signals     The tower should always use an amplifier     Clients  except those in close proximity to the tower  need to use high gain  directional antennas when possible     Clients at a distance from the tower may need amplifiers     Clear  unobstructed line of sight is required  except perhaps for clients in close  proximity to the tower     Fresnel Zone encroachment will reduce the strength of the radio signal     It is illegal  per FCC Part 15 regulations  to implement a wireless LAN that is not  certified  Violation of FCC regulations can result in fines  imprisonment  and  confiscation of the wireless link that violates the regulations     Reflected signals may be strong enough if the distances are short     Glossary    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc        360 Glossary    10BaseFx   IEEE standard for 10 Mbps baseband Ethernet over optical fibe
103.  the 2 451 GHz carrier  the radio will  repeat the hop sequence  starting again at 2 449 GHz  The process of repeating the  sequence will continue until the information is received completely     Chapter 3     Spread Spectrum Technology 51    The receiver radio is synchronized to the transmitting radio s hop sequence in order to  receive on the proper frequency at the proper time  The signal is then demodulated and  used by the receiving computer     Effects of Narrow Band Interference    Frequency hopping is a method of sending data where the transmission and receiving  systems hop along a repeatable pattern of frequencies together  As is the case with all  spread spectrum technologies  frequency hopping systems are resistant   but not  immune   to narrow band interference  In our example in Figure 3 2  if a signal were to  interfere with our frequency hopping signal on  say  2 451 GHz  only that portion of the  spread spectrum signal would be lost  The rest of the spread spectrum signal would  remain intact  and the lost data would be retransmitted     In reality  an interfering narrow band signal may occupy several megahertz of bandwidth   Since a frequency hopping band is over 83 MHz wide  even this interfering signal will  cause little degradation of the spread spectrum signal     Frequency Hopping Systems    It is the job of the IEEE to create standards of operation within the confines of the  regulations created by the FCC  The IEEE and OpenAir standards regarding FHSS
104.  the CWNA Exam       Take advantage of the CWNA Practice exam so you will be familiar with the types  of questions that you will see on the real exam       Arrive at least 15 minutes earlier than your scheduled exam time  and preferably 30  minutes early  so you can relax and review your study guide one last time       Read every question very carefully        Dop   t leave any unanswered questions  These count against your score     Once you have completed the CWNA exam  you will be provided with a complete  Examination Score Report  which shows your pass fail status section by section  Your  test scores are sent to Planet3 Wireless  Inc  within 7 working days  If you pass the  exam  you will receive a CWNA Certificate within 2 weeks     Contact information    We are always eager to receive feedback on our courses and training materials  If you  have specific questions about something you have read in this book  please use the  information below to contact Planet3 Wireless  Inc     Planet3 Wireless  Inc   P O  Box 412   Bremen  Georgia 30110  866 GET CWNE    http   www p3wireless com  http   www cwne com       Direct feedback via email     feedback cwne com    Introduction to Wireless LANs    CWNA Exam Objectives Covered     Identify the technology roles for which wireless LAN  technology is an appropriate application     Data access role    Extension of existing networks into remote  locations    Building to building connectivity  Last mile data delivery  Flexibility for mo
105.  the access point  the client sends a message to the access point informing it that the client  is going back to    sleep     Then the process repeats itself over and over again  This  process creates some overhead that would not be present if PSP mode were not being  utilized  The steps of this process are shown in Figure 7 18     FIGURE 7 18 PSP Mode ina BSS    1  Client goes to sleep  2  Access point marks client asleep  3  Access point buffers client packets  4  Client wakes up  notifies access point  5  Access point tells client data is waiting  6  Client requests data   lt I 7  Access point sends data     4  D   gt              gt   6  7    Chapter 7     802 11 Network Architecture 201    PSP in an Independent Basic Service Set    The power saving communication process in an IBSS is very different than when power  saving mode is used ina BSS  An IBSS does not contain an access point  so there is no  device to buffer packets  Therefore  every station must buffer packets destined from  itself to every other station in the Ad Hoc network  Stations alternate the sending of  beacons on an IBSS network using varied methods  each dependent on the manufacturer     When stations are using power saving mode  there is a period of time called an ATIM  window  during which each station is fully awake and ready to receive data frames  Ad  hoc traffic indication messages  ATIM  are unicast frames used by stations to notify other  stations that there is data destined to them and that t
106.  the access point and using less power simply cannot be heard  over the traffic from the closer  high powered clients  as illustrated in Figure 9 8     Near Far    Access Point          la a  Client A Client B  100 mW 5 mW   lt n     100 ft    Near far is similar in nature to a crowd of people all screaming at one time into a  microphone  and one person whispering from 50 feet  15 2 meters  away from that same  microphone  The voice of the person 50 feet  15 2 meters  away is not going to reach the  microphone over the noise of the crowd shouting near the microphone  Even if the  microphone is sensitive enough to pick up the whisper under silent conditions  the high   powered close range conversations have effectively raised the noise floor to a point  where low amplitude inputs are not heard     Getting back to wireless LANs  the node that is being drowned out is well within the  normal range of the access point  but it simply cannot be heard over the signals of the  other clients  What this means to you as an administrator is that you must be aware of the  possibility of the near far problem during site surveys and understand how to overcome  the problem through proper wireless LAN design and troubleshooting techniques     Troubleshooting Near Far    Troubleshooting the near far problem is normally as simple as taking a good look at the  network design  locations of stations on the wireless network  and transmission output  power of each node  These steps will give the admi
107.  the client with an association  response frame either allowing or disallowing association     Chapter 7     802 11 Network Architecture 181    States of Authentication  amp  Association  The complete process of authentication and association has three distinct states     1  Unauthenticated and unassociated  2  Authenticated and unassociated    3  Authenticated and associated    Unauthenticated and Unassociated    In this initial state  the wireless node is completely disconnected from the network and  unable to pass frames through the access point  Access points keep a table of client  connection statuses known as the association table  It s important to note that different  vendors refer to the unauthenticated and unassociated state in their access points   association table differently  This table will typically show  unauthenticated  for any  client that has not completed the authentication process or has attempted authentication  and failed     Authenticated and Unassociated    In this second state  the wireless client has passed the authentication process  but is not  yet associated with the access point  The client is not yet allowed to send or receive data  through the access point  The access point s association table will typically show     authenticated     Because clients pass the authentication stage and immediately proceed  into the association stage very quickly  milliseconds   rarely do you see the   authenticated  step on the access point  It is far more like
108.  the data rate decrease  which  in turn  is due to the distance increase     FIGURE 11 16 Data rate boundaries    11 Mbps  11 5 5 Mbps  5 5 2 Mbps  2 1 Mbps       Documentation    By this point  the copy  or copies  of the facility blueprint should be well marked up  with  circles  dead spots  if any   data rates  and signal strength measurements in key spots   Now another location within the facility can be documented  and the process begins  again  When surveying a small office  and the entire office has facility wide coverage  with maximum throughput from the first testing location chosen  the process does not  need to be repeated   the survey is finished  However  that will rarely be the case  so this  chapter will prepare you for the worst case scenario of site surveying     Be prepared to survey and move  survey and move  again and again  until the optimum  coverage pattern for a particular area has been determined  This repetition is the reason  for making multiple copies of the facility blueprint or floor plan and bringing lots of    paper     The end result of this portion of the exercise should be a map of the range and coverage  of the access point from various locations  with the best results and worst case results  noted  Certainly it saves much time to document only the best possible coverage pattern   so in the interest of efficiency  it is a general practice to quickly test until a  somewhat  optimum  location for the access point is found  then do the complet
109.  the following are true about PoE devices from different manufacturers     Choose all that apply    A  They always use the same unused pairs for sending current   B  They are guaranteed to interoperate with devices from other vendors  C  They use the same output voltage   D  They may cause damage to devices from other vendors    You have purchased a semi directional antenna from Vendor A  and an access point  from Vendor B that have been certified as a system by the FCC through a third  party  What type of cables or connectors must be used as part of this system in order  to connect the access point to the antenna     A     B     C   D     An RF cable with industry standard connectors and a pigtail cable with  appropriate connectors    An RF cable with connectors matching the access point and a pigtail cable with  appropriate connectors for the antenna and RF cable connection    An RF cable with N connectors and a pigtail with N connectors on both sides    An RF cable with SMA connectors and a pigtail with N connectors on both  sides    An antenna   s beamwidth refers to which one of the following     A  The width of the RF signal beam that the antenna transmits   B  The width of the antenna main element   C  The width of the mounting beam on which the antenna is mounted   D  The width of the beam of the RF signal relative to the Earth s surface   When should an omni directional antenna be used    A  When coverage in all horizontal directions from the antenna is required   B 
110.  they should be noted in the site  survey report  When they prevent Cat5 or RF cabling from going wherever they are  needed  it should be documented  Firewalls can also hamper the RF signal  Some  firewalls have fire doors directly underneath  Do the site survey with the doors closed  because there are locations that require fire doors to remain shut at all times  Poured  concrete walls and hardcap ceilings pose the same problems as firewalls     In a multi tenant office building  interference could be caused by a microwave oven  belonging to a company located on the same floor or possibly on floors directly above or  below you  This situation can pose a difficult problem since you have no jurisdiction  over the microwave oven    There are many outdoor interference sources  and some can change just by their nature   Seek out and record the effects of the following       Trees  buildings  lakes  or other obstructions or reflective objects      Trees without leaves that will later have leaves or that will grow to interfere with  the Fresnel zone       Automobile traffic     if linking two buildings at first story height across a road  a  large truck or bus could disable the link     Record the interference source  its location  and its effect and potential effect on wireless  LAN coverage  range  and throughput  This data should be recorded both on your copy  of the blueprint as well as in a separate list for easy future reference  Taking pictures of  interference sources that 
111.  this context   means that one piece of equipment has a greater or lesser impedance than the piece of  equipment to which it is connected  VSWR is caused by an RF signal reflected at a point  of impedance mismatch in the signal path  VSWR causes return loss  which is defined as  the loss of forward energy through a system due to some of the power being reflected  back towards the transmitter  If the impedances of the ends of a connection do not match   then the maximum amount of the transmitted power will not be received at the antenna   When part of the RF signal is reflected back toward the transmitter  the signal level on  the line varies instead of being steady  This variance is an indicator of VSWR     As an illustration of VSWR  imagine water flowing through two garden hoses  As long  as the two hoses are the same diameter  water flows through them seamlessly  If the hose  connected to the faucet were significantly larger than the next hose down the line  there  would be backpressure on the faucet and even at the connection between the two hoses   This standing backpressure illustrates VSWR  as can be seen in Figure 2 9  In this  example  you can see that backpressure can have negative effects and not nearly as much  water is transferred to the second hose as there would have been with matching hoses  screwed together properly     VSWR   like water through a hose  Lower    Impedance  Hose        Backlog of Higher  water Impedance   Return Loss  Hose    Chapter 2   RF Fu
112.  times every  second     FIGURE 8 6 DCF timeline    Cc a Cc i Cc a  DIFS P DATA A   c  DIFS P DATA B   c  DIFS P DATA C  c  K K K       Chapter 8     MAC and Physical Layers 223    Request to Send Clear to Send  RTS CTS     There are two carrier sense mechanisms used on wireless networks  The first is physical  carrier sense  Physical carrier sense functions by checking the signal strength  called the  Received Signal Strength Indicator  RSSI   on the RF carrier signal to see if there is a  station currently transmitting  The second is virtual carrier sense  Virtual carrier sense  works by using a field called the Network Allocation Vector  NAV   which acts as a  timer on the station  Ifa station wishes to broadcast its intention to use the network  the  station sends a frame to the destination station  which will set the NAV field on all  stations hearing the frame to the time necessary for the station to complete its  transmission  plus the returning ACK frame  In this way  any station can reserve use of  the network for specified periods of time  Virtual carrier sense is implemented with the  RTS CTS protocol     The RTS CTS protocol is an extension of the CSMA CA protocol  As the wireless LAN  administrator  you can take advantage of using this protocol to solve problems like  Hidden Node  discussed in Chapter 9  Troubleshooting   Using RTS CTS allows stations  to broadcast their intent to send data across the network     As you can imagine by the brief description above 
113.  to building connectivity  D    Wireless security    98 Chapter 4      Wireless LAN Infrastructure Devices    6  Properly aligning two wireless bridges will optimize their throughput  This  statement is     A  Always true  B  Always false  C  Depends on the manufacturer    7  Your friend owns a small business  and asks you what he could buy to provide low   cost wireless Internet access for his 5 salespeople in the office  Which one of the  following devices would be an appropriate solution     A  Access point   B  Wireless workgroup bridge  C  Enterprise wireless gateway  D  Wireless residential gateway    8  A company has hired you to recommend wireless LAN equipment that will allow  them to place limits on the bandwidth used by each of their wireless users  Which  one of the following devices would you recommend     A  Access point   B  Wireless workgroup bridge  C  Enterprise wireless gateway  D  Wireless residential gateway    9  Ina situation in which you need to allow outdoor users to connect to your network  via a wireless LAN  which one of the following features would allow you to use an  indoor access point with an outdoor antenna     A  Antenna diversity  B  Detachable antennas  C  Plug and play support  D  Modular radio cards  10  Which of the following wireless client devices would not be a plug n play device   A  USB Client  B  PCMCIA Card  C  ISA Card  D  Compact Flash Card    11     12     13     14     15     Chapter 4     Wireless LAN Infrastructure Devices 
114.  to change its association with  different access points as the station moves throughout the facility     Remote Authentication Dial In User Service  RADIUS      an authentication service  specified by the IETF that utilizes a computer based database  RADIUS server  to  compare usernames and passwords to allow access to a network    Request to Send Clear to Send  RTS CTS      an extension to CSMA CA  in which  clients enter into a 4 way handshake with an access point to send data   1  Client sends  RTS packet to request use of the medium   2  if the medium is free  access point sends  the CTS packet to the client   3  client sends the DATA to the receiving client   4   receiving client sends the ACK packet to acknowledge receipt of the DATA  4 way  handshake   RTS CTS DATA ACK    Resource Reservation Setup Protocol  RSVP      a network protocol which allows a  network node to reserve the transmission medium for a specified period of time for  Quality of Service  QoS  oriented applications such as video    roaming     The process of moving from one access point to another without having to re   authenticate to the wireless network     router   A layer 3 network component that provides internetworking by allowing  individual networks to become part of a WAN  It routes using logical and physical  addresses to connect two or more separate networks  It determines the best path by  which to send a packet of information     Routing Information Protocol  RIP    A common type of routi
115.  to mobile users whose laptops or PDAs run on batteries  Extending the life of  these batteries allows the user to stay up and running longer without a recharge  Wireless  LAN cards can draw a significant amount of power from the battery while in CAM   which is why power saving features are included in the 802 11 standard     Continuous Aware Mode    Continuous aware mode is the setting during which the wireless client uses full power   does not    sleep     and is constantly in regular communication with the access point  Any  computers that stay plugged into an AC power outlet continuously such as a desktop or  server should be set for CAM  Under these circumstances  there is no reason to have the  PC card conserve power     Power Save Polling    Using power save polling  PSP  mode allows a wireless client to    sleep     By sleep  we  mean that the client actually powers down for a very short amount of time  perhaps a  small fraction of a second  This sleep is enough time to save a significant amount of    200 Chapter 7     802 11 Network Architecture    power on the wireless client  In turn  the power saved by the wireless client enables a  laptop computer user  for example  to work for a longer period of time on batteries   making that user more productive     When using PSP  the wireless client behaves differently within basic service sets and  independent basic service sets  The one similarity in behavior from a BSS to an IBSS is  the sending and receiving of beacons  
116.  transmits on only two frequencies  2 401 GHz and   2 402 GHz  The system will transmit on the 2 401 GHz frequency for the duration of the  dwell time   100 milliseconds  ms   for example  After 100ms the radio must change its   transmitter frequency to 2 402 GHz and send information at that frequency for 100ms     Chapter 3     Spread Spectrum Technology 53    Since  in our example  the radio is only using 2 401 and 2 402 GHz  the radio will hop  back to 2 401 GHz and begin the process over again     Hop Time    When considering the hopping action of a frequency hopping radio  dwell time is only  part of the story  When a frequency hopping radio jumps from frequency A to frequency  B  it must change the transmit frequency in one of two ways  It either must switch to a  different circuit tuned to the new frequency  or it must change some element of the  current circuit in order to tune to the new frequency  In either case  the process of  changing to the new frequency must be complete before transmission can resume  and  this change takes time due to electrical latencies inherent in the circuitry  There is a  small amount of time during this frequency change in which the radio is not transmitting  called the hop time  The hop time is measured in microseconds  us  and with relatively  long dwell times of around 100 200 ms  the hop time is not significant  A typical 802 11  FHSS system hops between channels in 200 300 us     With very short dwell times of 500     600s  like tho
117.  use a wireless Ethernet converter  you are externally connecting  a wireless LAN radio to that device with a category 5  Cat5  cable  A common use of  wireless Ethernet converters is connection of an Ethernet based print server to a wireless  network     Serial devices are considered legacy devices and are rarely used with personal computers   Serial converters are typically used on old equipment that uses legacy serial for network  connectivity such as terminals  telemetry equipment  and serial printers  Many times  manufacturers will sell a client device that includes both a serial and Ethernet converter  in the same enclosure     These Ethernet and serial converter devices do not normally include the PC card radio   Instead  the PC card must be purchased separately and installed in the PCMCIA slot in  the converter enclosure  Ethernet converters in particular allow administrators to convert  a large number of wired nodes to wireless in a short period of time     Configuration of Ethernet and serial converters varies  In most cases  console access is  provided via a 9 pin legacy serial port  Figure 4 14 shows an example of an Ethernet and    serial converter     A sample Ethernet and serial converter    Chapter 4     Wireless LAN Infrastructure Devices 89    USB Adapters    FIGURE 4 15    USB clients are becoming very popular due to their simple connectivity  USB client  devices support plug n play  and require no additional power other than what is delivered  through the 
118.  using 802 11a  the modulation type is changed   Many manufacturers mistakenly list OFDM as the modulation type for all 802 11la  devices  but this is incorrect  OFDM is not a modulation type  but rather a  communications technique that can use various types of modulation     13     14     15     16     17     18     19     20     Chapter 8     MAC and Physical Layers 233    C  Transmitting stations not receiving ACKs from receiving stations assume that  there was a collision and begin resending the data     B  There must be a means by which relevant data is imprinted or impressed upon  RF frequencies to allow transmission of the data from one point to another  This  process is referred to as modulation  and there are many modulation types  In this  book  we address six kinds of modulation used with wireless LANs     B  The superframe is a time period during which contention free and contention   based clients can co exist without disrupting each other  This time period consists  of three periods   the contention free period  CFP   which is for stations in PCF  mode being polled by the access point  the contention period  CP   which is for  stations in DCF mode  and the beacon     A  C  Superframes are used when the access point is using PCF mode and polling  stations that are configured to be polled  When all stations and the access point are  using DCF mode  there is no contention free period and  thus  no need for a  superframe     D  In allowing peaceful co existence betw
119.  website for WLANA is www wlana org    164 Chapter 6     Wireless LAN Organizations and Standards    Competing Technologies    There are several technologies that compete with the 802 11 family of standards  As  business needs change  and technologies improve  there will continue to be new standards  created to support the marketplace as well as new inventions that drive enterprise  spending  Other wireless LAN technologies and standards that are in use today include        HomeRF    Bluetooth    Infrared      OpenAir    HomeRF    HomeRF operates in the 2 4 GHz band and uses frequency hopping technology   HomeRF devices hop at about 50 hops per second   about 5 to 20 times faster than most  802 11 compliant FHSS devices  The new version of HomeRF  HomeRF 2 0 uses the  new    wide band    frequency hopping rules approved by the FCC  and is the first to do so   This is to say that the IEEE has not adopted the wide band frequency hopping rules into  the 802 11 series of standards  Recall that these rules  implemented after 08 31 00   include       Maximum of 5 MHz wide carrier frequencies    Minimum of 15 hops in a sequence      Maximum of 125 mW of output power    Because HomeRF allows an increase over the former 1 MHz wide carrier frequencies   and flexibility in implementing less than the previously required 75 hops  one might think  that wide band frequency hopping would be quite popular among corporations and  vendors alike  This  however  is not the case  As advantageous a
120.  which  saves on CPU cycles  and RC4 is also simple enough for most software developers to  code it into software     When WEP is referred to as being simple  it means that it is weak  The RC4 algorithm  was inappropriately implemented in WEP  yielding a less than adequate security solution  for 802 11 networks  Both 64 bit and 128 bit WEP  the two available types  have the  same weak implementation of a 24 bit Initialization Vector  IV  and use the same flawed  process of encryption  The flawed process is that most implementations of WEP  initialize hardware using an IV of 0   thereafter incrementing the IV by 1 for each packet  sent  For a busy network  statistical analysis shows that all possible IVs  2      would be  exhausted in 5 hours  meaning the IV would be reinitialized starting at zero at least once  every 5 hours  This scenario creates an open door for determined hackers  When WEP is    Chapter 10     Wireless LAN Security 273    used  the IV is transmitted in the clear with each encrypted packet  The manner in which  the IV is incremented and sent in the clear allows the following breaches in security       Active attacks to inject new traffic  Unauthorized mobile stations can inject  packets onto the network based on known plaintext      Active attacks to decrypt traffic   Based on tricking the access point       Dictionary building attacks   After gathering enough traffic  the WEP key can be  cracked using freeware tools  Once the WEP key is cracked  real time 
121.  wireless LAN building to building bridging  due to a limited number of non overlapping channels  In this case  a frequency converter  may be deployed that will use existing 2 4 GHz wireless equipment  but will convert the  frequencies to a less congested band  such as the 5 8 GHz upper UNII band  for this  wireless bridge segment     Sample frequency converter       Copyright Young Design  Inc  2002  YDI com  Proper antennas and cables must be used when using a frequency converter due to both  antennas and cables having limited frequency response  but it can be a very economical  solution in a congested area  The alternative would be to replace all wireless LAN  hardware with new 5 GHz hardware  Figure 5 35 shows how a frequency converter  would be installed in a wireless LAN configuration     FIGURE 5 35 Using a frequency converter        2 4 GHz Access  Point or Bridge    l    I Z    Frequency  Converter    Amplifier    3      DC Power  Injector    Chapter 5     Antennas and Accessories 143    Bandwidth Control Units    FIGURE 5 36    Wireless LANs are a shared medium with very low throughput in comparison with  today s wired LAN technologies  For this reason  bandwidth on wireless LANs must be  conserved and protected   especially in outdoor environments such as would be found  with wireless Internet service providers  WISPs   Bandwidth should be controlled in  such a manner that each user has a reliable and consistent connectivity experience and  gets what they are payin
122. 11 standard or the 802 11b standard  supporting data rates of 1  2   5 5   amp  11 Mbps  The second reason that the type of spread spectrum technology will  affect throughput is that FHSS incurs the additional overhead of hop time     Other factors limiting the throughput of a wireless LAN include proprietary data link  layer protocols  the use of fragmentation  which requires the re assembly of packets   and  packet size  Larger packets will result in greater throughput  assuming a good RF link   because the ratio of data to overhead is better     RTS CTS  a protocol used on some wireless LAN implementations and which is similar  to the way that some serial links communicate  will create significant overhead because  of the amount of handshaking that takes place during the transfer     The number of users attempting to access the medium simultaneously will have an  impact  An increase in simultaneous users will decrease the throughput each station  receives from the access point     Using PCF mode on an access point  thereby invoking polling on the wireless network   will decrease throughput  Polling causes lower throughput by introducing the extra  overhead of a polling mechanism and mandatory responses from wireless stations even  when no data needs to be sent by those stations     Co location Throughput  Theory vs  Reality     Co location is a common wireless LAN implementation technique that is used to provide  more bandwidth and throughput to wireless users in a given a
123. 2 objectives will certify that successful  candidates know the fundamentals of RF behavior  can describe the features and  functions of wireless LAN components  and have the skills needed to install  configure   and troubleshoot wireless LAN hardware peripherals and protocols  A typical candidate  should have the CompTIA Network  certification or equivalent knowledge  although  Network  certification is not required     The skills and knowledge measured by this examination are derived from a survey of  wireless networking experts and professionals  The results of this survey were used in  weighing the subject areas and ensuring that the weighting is representative of the  relative importance of the content     This section outlines the exam objectives for the CWNA exam        M The objectives for the CWNA exam can change at any time  For the most current  objectives visit www cwne com     Radio Frequency  RF  Technologies     24   1 1  RF Fundamentals  1 1 1  Define and apply the basic concepts of RF behavior      Gain       Loss      Reflection     Refraction     Diffraction      Scattering     VSWR     Amplification  amp  attenuation    1 1 2  Understand the applications of basic RF antenna concepts        Visual LOS     RFLOS     The Fresnel Zone     Intentional Radiator    EIRP     Wave propagation    1 2  RF Math  1 2 1  Understand and apply the basic components of RF mathematics      Watt  a Milliwatt    Introduction xxi    Decibel  dB   dBm  dBi    1 3  Spread Spectrum
124. 5    FIGURE 10 1 Entering WEP keys on client devices       2  x        m Set Security    V Enable Data Security     Use Alphanumeric Characters  0 9  a z  4 2   C Use Hexadecimal  0 9  a f  A F     pa  rverciccccenmenencenenmncicnnen    Key 2 i O  Key 3 SY  Key 4      Encrypt data with    Keyl v                    lt  Back   Next gt  Help    The number of characters entered for the secret key depends on whether the configuration  software requires ASCII or HEX and whether 64 bit or 128 bit WEP is being used  If  your wireless card supports 128 bit WEP  then it automatically supports 64 bit WEP as  well  If entering your WEP key in ASCII format  then 5 characters are used for 64 bit  WEP and 13 characters are used for 128 bit WEP  If entering your WEP key in HEX  format  then 10 characters are used for 64 bit WEP and 26 characters are used for 128 bit  WEP     Static WEP Keys    If you choose to implement static WEP keys  you would manually assign a static WEP  key to an access point and its associated clients  These WEP keys would never change   making that segment of the network susceptible to hackers who may be aware of the  intricacies of WEP keys  For this reason  static WEP keys may be an appropriate basic  security method for simple  small wireless LANs  but are not recommended for enterprise  wireless LAN solutions     When static WEP keys are implemented  it is simple for network security to be  compromised  Consider if an employee left a company and  lost  their wire
125. 5    Practical Use    The designers of the antennas for PCMCIA cards face a real problem  It is not easy to  form antennas onto the small circuit board inside the plastic cover that sticks off the end  of the PCMCIA card  Rarely do antennas built into PCMCIA cards provide adequate  coverage  especially when the client is roaming  The polarization of PCMCIA cards and  that of access points is sometimes not the same  which is why turning your laptop in  different directions generally improves reception  PDAs  which usually have a vertically  oriented PCMCIA card  normally exhibit good reception  External  detachable antennas  mounted with Velcro to the laptop computer vertically almost always show great  improvement over the snap on antennas included with most PCMCIA cards  In areas  where there are a high number of PCMCIA card users  it is often recommended to orient  access point antennas horizontally for better reception     Gain    Antenna gain is specified in dBi  which means decibels referenced to an isotropic  radiator  An isotropic radiator is a sphere that radiates power equally in all directions  simultaneously  We haven t the ability to make an isotropic radiator  but instead we can  make omni directional antennas such as a dipole that radiates power in a 360 degree  horizontal fashion  but not 360 degrees vertically  RF signal radiation in this fashion  gives us a doughnut pattern  The more we horizontally squeeze this doughnut  the flatter  it becomes  forming more
126. 5 GHz UNII bands   If changing technologies is not feasible due to cost  or implementation problems  the next best solution is to find the source of the all band  interference and remove it from service  if possible  Finding the source of all band    256 Chapter 9    Troubleshooting Wireless LAN Installations    interference is more difficult than finding the source of narrowband interference because  you re not watching a single signal on the spectrum analyzer  Instead  you are looking at  a range of signals  all with varying amplitudes  You will most likely need a highly  directional antenna in order to locate the all band interference source     Weather    Severely adverse weather conditions can affect the performance of a wireless LAN  In  general  common weather occurrences like rain  hail  snow  or fog do not have an adverse  affect on wireless LANs  However  extreme occurrences of wind  fog  and perhaps smog  can cause degradation or even downtime of your wireless LAN  A radome can be used  to protect an antenna from the elements  If used  radomes must have a drain hole for  condensation drainage  Yagi antennas without radomes are vulnerable to rain  as the  raindrops will accumulate on the elements and detune the performance  The droplets  actually make each element look longer than it really is  Ice accumulation on exposed  elements can cause the same detuning effect as rain  however  it stays around longer   Radomes may also protect an antenna from falling objects s
127. 78 Chapter 7     802 11 Network Architecture    Passive Scanning    FIGURE 7 1    Passive scanning is the process of listening for beacons on each channel for a specific  period of time after the station is initialized  These beacons are sent by access points   infrastructure mode  or client stations  ad hoc mode   and the scanning station catalogs  characteristics about the access points or stations based on these beacons  The station  searching for a network listens for beacons until it hears a beacon listing the SSID of the  network it wishes to join  The station then attempts to join the network through the  access point that sent the beacon  Passive scanning is illustrated in Figure 7 1     In configurations where there are multiple access points  the SSID of the network the  station wishes to join may be broadcast by more than one of these access points  In this  situation  the station will attempt to join the network through the access point with the  strongest signal strength and the lowest bit error rate     Passive Scanning       a eS D Clients  Beacons    Stations continue passive scanning even after associating to an access point  Passive  scanning saves time reconnecting to the network if the client is disconnected   disassociated  from the access point to which the client is currently connected  By  maintaining a list of available access points and their characteristics  channel  signal  strength  SSID  etc   the station can quickly locate the best access point 
128. 99    Your client has a number of sales people that are located in a remote office building   Each sales person has both a PC and a laptop  The client wants to purchase a  hardware solution that will permit each sales person to have wireless network  connectivity for his or her PC and laptop  Only the PC or the laptop needs network  access at any given time  and both have USB support  Which of the following  solutions would work  Choose all that apply     A  1 PCMCIA card   B  1 PCMCIA card  1 PCI adapter  C  1PCMCIA card  1 USB adapter  D  1 PCMCIA card  1 CF card    You have configured an access point in a small office and are concerned about  hackers intruding on your wireless network  What settings will you adjust  from the  manufacturer   s default settings  on the unit to address this potential problem   Choose all that apply     Detachable antennas  MAC Filtering  Radio card position    Output power    m U Oe    WEP configuration    Which of the following are common security options that most wireless residential  gateways include  Choose all that apply     PPPoE     Point to Point Protocol over Ethernet    Virtual Servers    A   B   C  Routing  D  PAT     Port Address Translation   E  VPN Client or VPN Client Passthrough    Which of the following are wired connectivity options that a wireless bridge can  include  Choose all that apply     A  10baseTx  10baseFL  10 100baseTx  1000baseSX  100baseFx  workgroup bridge is a n  __   _device   Client  Infrastructure    Gatew
129. Communications  and others typically  provide a solid background in radio frequency fundamentals  In this book  we will  address specific topics that you may or may not be familiar with  or you may just have to  dust off that portion of your memory  Many people have crossed over from careers in  radio frequency to careers in Information Technology  IT   but never dreamed where the  two fields of study might meet  Wireless LAN technology is the meeting place     New to Networking    Finally  if you are stepping into the networking world for the very first time  please make  sure you have a basic understanding of networking concepts  and then jump right in  The  wireless LAN industry is growing at a phenomenal rate  Wireless networking is  replacing and adding to the mobility of conventional network access methods very    xviii    Introduction    quickly  We won   t pretend to know which technology will ultimately hold the greatest  market share  Instead  we cover all currently available wireless LAN technologies    Some technologies  like 802 11b  hold a tremendous market share presently  and those  will be covered at length in this book  Again  as the industry and market place change  so  will this book in order to stay current     How Is This Book Organized     This Official CWNA Study Guide is organized in the same manner as the official CWNA  course is taught  starting with the basic concepts or building blocks and developing your  knowledge of the convergence of RF and ne
130. ESS     IBSS    SSID      Infrastructure Mode    Ad hoc Mode    Roaming        Understand the implications of the following power  management features of wireless LANs        PSP Mode     CAM     Beacons     TIM     ATIM      ATIM Windows    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     CHAPTER    In This Chapter  Locating a wireless LAN    Authentication  amp   Association    Service Sets    Power Management  Features    176 Chapter 7     802 11 Network Architecture    This chapter covers some of the key concepts found in the 802 11 network architecture   Most of the topics in this chapter are defined directly in the 802 11 standard  and are  required for implementation of 802 11 compliant hardware  In this chapter  we   re going  to examine the process by which clients connect to an access point  the terms used for  organizing wireless LANs  and how power management is accomplished in wireless  LAN client devices     Without a solid understanding of the principals covered in this chapter  it would be quite  difficult to design  administer  or troubleshoot a wireless LAN  This chapter holds some  of the most elementary steps of both wireless LAN design and administration  As you  administer wireless LANs  the understanding of these concepts will allow you to more  intelligently manage your day to day operations     Locating a Wireless LAN    When you install  configure  and finally start up a wireless LAN client device such as a  USB client or PCMCIA card  the
131. ETSI  publishes communications standards for Europe     Radio Frequency  RF  Fundamentals    CWNA Exam Objectives Covered        Define and apply the basic concepts of RF behavior     Gain   Loss  Reflection  Refraction  Diffraction  Scattering  VSWR    Amplification  amp  attenuation        Identify and understand application of basic RF antenna    concepts     Visual LOS   RF LOS   The Fresnel Zone  Intentional Radiator  EIRP    Wave propagation        Understand and apply the basic components of RF    mathematics     Watt  Milliwatt  Decibel  dB   dBm   dBi    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc        CHAPTER    In This Chapter  RF Behavior  Principles of Antennas    RF Mathematics    18 Chapter 2    RF Fundamentals    In order to understand the wireless aspects of a wireless LAN  an administrator must have  a solid foundation in the fundamentals of radio frequency  RF  theory  In this chapter we  will discuss the properties of RF radiation and how its behavior in certain situations can  affect the performance of a wireless LAN  Antennas will be introduced to create a good  understanding of their uses and properties  We will discuss the mathematical  relationships that exist in RF circuits and why they are important  as well as how to  perform the necessary RF math calculations     To a wireless LAN administrator  an understanding of RF concepts is essential to the  implementation  expansion  maintenance  and troubleshooting of the wireless network   
132. I  European  Telecommunications Standards Institute  that provides a 54 Mbps data rate in the 5GHz  band     HomeRF   founded March 1998  this organization s charter is to establish the mass  deployment of interoperable wireless networking access devices  products utilize the 2 4    GHz ISM band  FHSS technology  and SWAP to achieve data rates of up to 10 Mbps    horizontal polarization     in reference to antennas  it is the electrical field that is parallel  to the surface of the earth    hub     layer 2 device that allows half duplex communications across a network    Glossary 367    independent basic service set  IBSS    An IEEE 802 1 1 based wireless network that  has no backbone infrastructure and consists of at least two wireless stations  This type of  network is often referred to as an ad hoc network because it can be constructed quickly  without much planning and has no access point with which to connect  Client stations  connect directly to each other     Industrial  Scientific  and Medical  ISM  bands   Radio frequency bands that the  Federal Communications Commission  FCC  authorized for wireless LANs  The ISM  bands are located at 915    13 MHz  2450    50 MHz  and 5800    75 MHz     Infrared Data Association  IrDA    founded June  1993  this organization s charter is to  create an interoperable  low cost  low power  half duplex  serial data interconnection  standard that supports a walk up point to point user model that is adaptable to a wide  range of computer
133. If  not  then this fact should be disclosed during the implementation consultation     One additional point to keep in mind here is that the cost of wired and wireless  installations  parts and labor combined  are roughly equivalent  Moving a wired user only  once will drastically sway the cost advantage toward the wireless LAN     344 Chapter 11     Site Survey Fundamentals    Key Terms    Before taking the exam  you should be familiar with the following terms     data boundary   data rate   dead spot  interference source  link speed   noise floor   RF coverage  signal to noise ratio  signal strength   site survey utility software  sniffer    spectrum analyzer    Chapter 11     Site Survey Fundamentals 345    Review Questions    1  Which of the following business requirements should be determined prior to  beginning the site survey  Choose all that apply     A     B  C  D    Where the RF coverage areas are  Where users will need to roam  Whether or not users will run applications that require Quality of Service    Where dead spots are    2  When determining the contours of RF coverage  site survey utilities should be used  to measure which of the following  Choose all that apply     A     B   C   D     Obstructions in the Fresnel Zone  Signal strength  Signal to noise ratio    Link speed    3  Which one of the following is true of an RF site survey     A     B     C   D     A site survey is not necessary in order to perform a successful wireless LAN  implementation    A site
134. Industry and Standards     13     5 1  Standards    5 1 1     Identify  apply and comprehend the differences between the following  wireless LAN standards    802 11  802 11b  802 1la  802 11g  Bluetooth  HomeRF    5 2  Organizations  amp  Regulations    S2    Understand the roles of the following organizations in providing direction and  accountability within the wireless LAN industry    FCC  IEEE  WECA  WLANA  IrDA  ETSI      Identify the differences between the ISM and UNII bands      Identify and understand the differences between the power output rules for    point to point and point to multipoint links      Identify the basic characteristics of infrared wireless LANs    Introduction xxvii    Where do you take the CWNA Exam     You may take the CWNA exam at any one of the Prometric Testing Centers worldwide   For the location of a testing center near you  call 800 639 3926 or visit  http   www 2test com  The CWNA Exam is exam number PW0 100  The exam cost is   150 00 worldwide        Once you register for the exam  you will be given complete instructions for where to go  and what to bring  For cancellations  please pay close attention to the procedures  which  can be found at the following URL     http   www cwne com cwnp exam_policy html  Tips for successfully taking the CWNA Exam    The CWNA exam consists of 60 questions  and you will have 90 minutes to complete the  exam  You may schedule and take the exam the next day     Following are some general tips for success on
135. Is grounding available     Proper grounding for all wireless LAN equipment will provide added protection against  stray currents from lightning strikes or electrical surges     Is wired network connectivity available     If network connectivity is not available  a wireless bridge may be required or an access  point may need to be operated in repeater mode to provide network connectivity  Using  access points as repeaters is not a desirable scenario  and the network performance would  be much better if the access point could be wired to the network     If the distance between the access point and the network connection is more than 100  meters  shielded twisted pair  STP  cabling or an access point that supports a fiber  connection can be used  However  using an access point that has fiber network  connectivity negates the use of PoE and would require a source of AC power nearby   Media transceivers can be used when fiber runs are necessary  These transceivers can  convert Cat5 to fiber and vice versa  When using an access point that has only a Cat5  connector  and its nearest network connection is more than 100 meters way  a media  transceiver can solve the problem  Remember that in this configuration  PoE cannot be  used     Cable lengths in the site survey report should be estimated  but never  as the crow flies    Rather  estimate RF connector cable lengths using straight runs with 90 degree turns   Try to keep RF cable runs under 300 feet  91 4 km   but remember to add an
136. It is also likely that  only a small portion of any given channel might be disrupted by narrowband interference   Typically  only a single carrier frequency  a 1 MHz increment in an 802 11b 22 MHz  channel  would be disrupted due to narrowband interference  Given this type of  interference  spread spectrum technologies will usually work around this problem without  any additional administration or configuration     Picture of a handheld digital spectrum analyzer showing a narrowband signal    A O          254 Chapter 9    Troubleshooting Wireless LAN Installations    FIGURE 9 13    To identify narrowband interference  you will need a spectrum analyzer  shown above in  Figure 9 12  Spectrum analyzers are used to locate and measure narrowband RF signals   among other things  There are even handheld  digital spectrum analyzers available that  cost approximately  4 000  That may seem like quite a bit of money to locate a  narrowband interference source  but if that source is disabling your network  it might be  well worth it     As an alternative  some wireless LAN vendors have implemented a software spectrum  analyzer into their client driver software  This software uses a FHSS PCMCIA card to  scan the useable portion of the 2 4 GHz ISM band for RF signals  The software  graphically displays all RF signals between 2 400 GHz and 2 4835 GHz  which gives the  administrator a way of  seeing  the RF that is present in a given area  An example of the  visual aid provided by such a spe
137. LANs     4 Chapter 1   Introduction to Wireless LANs    Access Role    FIGURE 1 1    Wireless LANs are mostly deployed in an access layer role  meaning that they are used as  an entry point into a wired network  In the past  access has been defined as dial up   ADSL  cable  cellular  Ethernet  Token Ring  Frame Relay  ATM  etc  Wireless is  simply another method for users to access the network  Wireless LANs are Data Link  layer networks like all of the access methods just listed  Due to a lack of speed and  resiliency  wireless networks are not typically implemented in Distribution or Core roles  in networks  Of course  in small networks  there may be no differentiation between the  Core  Distribution  or Access layers of the network  The Core layer of a network should  be very fast and very stable  able to handle a tremendous amount of traffic with little  difficulty and experience no down time  The Distribution layer of a network should be  fast  flexible  and reliable  Wireless LANs do not typically meet these requirements for  an enterprise solution  Figure 1 1 illustrates mobile clients gaining access to a wired  network through a connection device  access point      Access role of a wireless LAN         Client      N        4     Coverage Area    ee    _                          Wireless LANs offer a specific solution to a difficult problem  mobility  Without a  doubt  wireless LANs solve a host of problems for corporations and home users alike  but  all of these probl
138. MCIA cards     There are miniature laptops available on the market weighing as little as 1 5 pounds   which also serve the same purpose of having a more portable unit for site surveying   However  these ultra portable laptops tend to cost many times as much as a PDA     Simple screen capture software is also beneficial  For reporting purposes  screenshots  show the actual results that the site monitoring software displayed  These screenshots  will be presented to the customer as part of the RF Site Survey Report  which is why  custom screen capture software is useful  Screen capture software packages are available  for Windows  Pocket PC  and Linux operating systems     Laptop batteries rarely last more than 3 hours  and a site survey might last 8 10 hours per  day  Always having fresh batteries on hand will keep you productive while on site   Without the luxury of extra laptop batteries  the only alternative is to charge the batteries  during a break  which might not be a good alternative since many laptop batteries charge  slowly  Another solution would be to find a very small  power efficient laptop whose  batteries are specified to last much longer than the typical 2 3 hours  As mentioned  before  PDA batteries tend to last longer than do laptop batteries     Both the surveyor and the network designer should make hard copy  paper   documentation of all findings in great detail for future reference  Digital photographs of    324 Chapter 11     Site Survey Fundamentals    a
139. Mbps  The Data  Rate or  DR  field in the header specifies the rate at which the data will be transmitted   After sending the header  the transmitter can then change the data rate to whatever the  header specifies  This same premise applies to beacons  which are also sent at 1 Mbps  for the same reasons     There are three different categories of frames generated within the confines of this overall  frame format  These three frame categories and the types within each category are       Management Frames    Association request frame  Association response frame  Reassociation request frame  Reassociation response frame  Probe request frame   Probe response frame  Beacon frame   ATIM frame   Disassociation frame  Authentication frame  Deauthentication frame    C0CO0O000000 00       Control Frames    Request to send  RTS    Clear to send  CTS   Acknowledgement  ACK   Power Save Poll  PS Poll   Contention Free End  CF End   CF End   CF Ack    000000      Data Frames    Certain types of frames  listed above  use certain fields within the overall frame type of a  wireless frame  What a wireless LAN administrator needs to know is that wireless LANs  support practically all Layer 3 7 protocols     IP  IPX  NetBEUI  AppleTalk  RIP  DNS   FTP  etc  The main differences from 802 3 Ethernet frames are implemented at the  Media Access Control  MAC  sub layer of the Data Link layer and the entire Physical  layer  Upper layer protocols are simply considered payload by the Layer 2 wireless  f
140. N works by creating a tunnel on  top of a protocol such as IP  Traffic inside the tunnel is encrypted  and totally isolated as  can be seen in Figures 7 7 and 7 8  VPN technology provides three levels of security   user authentication  encryption  and data authentication       User authentication ensures that only authorized users  over a specific device  are  able to connect  send  and receive data over the wireless network        Encryption offers additional protection as it ensures that even if transmissions are  intercepted  they cannot be decoded without significant time and effort       Data authentication ensures the integrity of data on the wireless network   guaranteeing that all traffic is from authenticated devices only     188 Chapter 7     802 11 Network Architecture    FIGURE 7 7    FIGURE 7 8    Access point with an integrated VPN server         Server L3 VPN    Connection    se ar  N    a  Access Point fA  ei E    with integrated    VPN server L2 Connection    Access point with an external VPN server           VPN S  a      s o L3VPN  Wireless Gateway S Connection    J         Fa  S  s    Access Point POR Se TN l    L2 Connection on    Applying VPN technology to secure a wireless network requires a different approach  than when it is used on wired networks for the following reasons       The inherent repeater function of wireless access points automatically forwards  traffic between wireless LAN stations that communicate together and that appear  on the same w
141. Notice the following     PIFS   SIFS   1 Slot Time  DIFS   PIFS   1 Slot Time    Also notice that FHSS has noticeably longer slot times  DIFS times  and PIFS times than  DSSS  These longer times contribute to FHSS overhead  which decreases throughput     The Communications Process    FIGURE 8 4    When you consider the PIFS process described above  it may seem as though the access  point would always have control over the medium  since the access point does not have to  wait for DIFS  but the stations do  This would be true  except for the existence of what is  called a superframe  A superframe is a period of time  and it consists of three parts     1  Beacon  2  Contention Free Period  CFP   3  Contention Period  CP     A diagram of the superframe is shown in Figure 8 4  The purpose of the superframe is to  allow peaceful  fair co existence between PCF and DCF mode clients on the network   allowing QoS for some  but not for others     The Superframe          Superframe       Beacon Contention Free Period Contention Period   PCF Mode   DCF Mode        Again  remember that PIFS  and hence the superframe  only occurs when    Chapter 8    MAC and Physical Layers 221    The network is in point coordination function mode  The access point has been configured to do polling    The wireless clients have been configured to announce to the access point that  they are pollable    Therefore  if we start from a hypothetical beginning point on a network that has the  access point configure
142. T3 WIRELESS  INC  BE LIABLE TO YOU FOR ANY DAMAGES  INCLUDING   WITHOUT LIMITATION  ANY LOST PROFITS  LOST SAVINGS  OR OTHER INCIDENTAL OR  CONSEQUENTIAL DAMAGES ARISING OUT OF YOUR USE OR INABILITY TO USE THE STUDY GUIDE  REGARDLESS OF WHETHER SUCH DAMAGES ARE FORESEEABLE OR WHETHER SUCH DAMAGES  ARE DEEMED TO RESULT FROM THE FAILURE OR INADEQUACY OF ANY EXCLUSIVE OR OTHER  REMEDY  IN ANY EVENT  THE LIABILITY OF PLANET3 WIRELESS  INC  SHALL NOT EXCEED THE  LICENSE FEE PAID BY YOU TO PLANET3 WIRELESS  INC     We at Planet3 Wireless would like to dedicate this book to our Lord Jesus Christ  It is through Him that  we have had the talent  time  encouragement  and strength to work many long months in preparing this  text  Our goal through the creation of this book and through all things that He allows us to do going  forward is to glorify Him  We acknowledge His hand in every part of our company  our work  and our  friendships  We would also like to thank our families who have been amazingly supportive  our friends  who have encouraged us and everyone that contributed to this book in any way        I can do all things through Christ  who strengthens me         Philippians 4 13    Acknowledgements       Devin Akin     Kevin Sandlin      Scott Turner     Robert Nicholas     Josh McCord     Jeff Jones     Stan Brooks     Bill Waldo     Barry Oxford    Planet3 Wireless  Inc  would like to acknowledge and thank the following people for  their tireless contributions to this work     D
143. USB port on the computer  Some USB clients utilize modular  easily  removable radio cards and others have a fixed internal card that cannot be removed  without opening the case  When purchasing a USB client device  be sure you understand  whether or not the USB adapter includes the PC card radio  In cases of a USB adapter  that requires a PC card  it is recommended  although not always required  that you use the  same vendor   s equipment for both the adapter and the PC card  Figure 4 15 shows an  example of a USB client     A sample USB client       PCI  amp  ISA Adapters    Wireless PCI and ISA are installed inside a desktop or server computer  Wireless PCI  devices are plug   n   play compatible  but may also only come as an    empty    PCI card and  require a PC card to be inserted into the PCMCIA slot once the PCI card is installed into  the computer  Wireless ISA cards will likely not be plug n play compatible and will  require manual configuration both via a software utility and in the operating system   Since the operating system cannot configure ISA devices that aren   t plug n play  compatible  the administrator must make sure the adapter   s setting and those of the  operating system match  Manufacturers typically have separate drivers for the PCI or  ISA adapters and the PC card that will be inserted into each  As with USB adapters  it is  recommended that you use the same vendor   s equipment for the PCI ISA adapters and  the PC card  Figure 4 16 shows an example
144. WEP key can be used during the Shared Key authentication  process to verify a client s identity  but it can also be used for encryption of the data  payload send by the client through the access point  This type of WEP use is further  discussed in Chapter 10  Security      Authentication Security    Shared Key authentication is not considered secure because the access point transmits the  challenge text in the clear and receives the same challenge text encrypted with the WEP  key  This scenario allows a hacker using a sniffer to see both the plaintext challenge and  the encrypted challenge  Having both of these values  a hacker could use a simple  cracking program to derive the WEP key  Once the WEP key is obtained  the hacker  could decrypt encrypted traffic  It is for this reason that Open System authentication is  considered more secure than Shared Key authentication     Chapter 7     802 11 Network Architecture 185            It is important for the wireless network administrator to understand that neither Open  System nor Shared Key authentication types are secure  and for this reason a wireless  LAN security solution  above and beyond what the 802 11 standard specifies  is  important and necessary     Shared Secrets  amp  Certificates    Shared secrets are strings of numbers or text that are commonly referred to as the WEP  key  Certificates are another method of user identification used with wireless networks   Just as with WEP keys  certificates  which are authenticat
145. a digital  picture of the location for use in the site survey report  Do not make location references  in the report to objects  such as a temporary desk  table  or plant that may be moved and  can no longer provide a reference for locating an access point  Make sure to note  orientation of your antennas because not all wireless LAN installers are familiar with  antennas     Access point coverage testing       New  Coverage Area    Initial  Coverage Area       Various types of antennas can be used for site survey testing including highly directional   semi directional  and omni directional  When using semi directional antennas  be sure to  take into account the side and back lobes both for coverage and security reasons  Sites  may require the use of multiple antenna types to get the appropriate coverage  Long  hallways might benefit from Yagi  patch  or panel antennas while omni directional  antennas would more easily cover large rooms     There are differing opinions as to where measuring coverage and data speeds should  begin  Some experts recommend starting in a corner  while some say starting in the  middle of the room is best  It doesn   t matter where the measurements start so long as  every point in the room is measured during the survey and covered after installation   Pick a starting point in the room  and slowly walk with your laptop  PC card  and site  survey utility software running  While walking  record the following data for every area  of the room     332 Chap
146. a problem since even  when you purchase like connectors with different impedances  they will not  properly fit together because of center pin sizing     Know how much insertion loss each connector inserted into the signal path  causes  The amount of loss caused will factor into your calculations for signal  strength required and distance allowed     Know the upper frequency limit  frequency response  specified for the particular  connectors  This point will be very important as 5 Ghz wireless LANs become  more and more common  Some connectors are rated only as high as 3 GHz   which is fine for use with 2 4 GHz wireless LANs  but will not work for 5 GHz  wireless LANs  Some connectors are rated only up to 1 GHz and will not work  with wireless LANs at all  other than legacy 900 MHz wireless LANs     Beware of bad quality connectors  First  always consider purchasing from a  reputable company  Second  purchase only high quality connectors made by  name brand manufacturers  This kind of purchasing particularity will help  eliminate many problems with sporadic RF signals  VSWR  and bad connections     Make sure you know both the type of connector  N  F  SMA  etc   that you need  and the sex of the connector  Connectors come in male and female  Male  connectors have a center pin  and female connectors have a center receptacle     In the same manner that you must choose the proper cables for your 10 Gbps wired  infrastructure backbone  you must choose the proper cables for connecti
147. acturers  o Transmits out of the antenna last used for reception  o Can alternate antennas for transmission retries    o A unit can either transmit or receive  but not both simultaneously    Figure 9 6 illustrates an access point with multiple antennas to compensate for multipath     242 Chapter 9  Troubleshooting Wireless LAN Installations    FIGURE 9 6 Antenna Diversity       Unit selects the antenna 4  that has the best signal    Antenna diversity is made up of the following characteristics that work together to  compensate for the effects of multipath     l     Antenna diversity uses multiple antennas on multiple inputs to bring a signal to a  single receiver     The incoming RF signal is received through one antenna at a time  The receiving  radio is constantly sampling the incoming signals from both antennas to  determine which signal is of a higher quality  The receiving radio then chooses  to accept the higher quality signal     The radio transmits its next signal out of the antenna that was last used to receive  an incoming signal because the received signal was a higher quality signal than  from the other antenna  If the radio must retransmit a signal  it will alternate  antennas until a successful transmission is made     Finally  each antenna can be used to transmit or receive  but not both at the same  time  Only one antenna may be used at a time  and that antenna may only  transmit or receive  but not both  at any given instant     Most access points in today   
148. administrator should also be aware of the fact that each vendor   s use of WEP can and  may be different  hindering the use of multiple vendor hardware     278 Chapter 10     Wireless LAN Security    Advanced Encryption Standard    The Advanced Encryption Standard  AES  is gaining acceptance as an appropriate  replacement for the RC4 algorithm used in WEP  AES uses the Rijndale  pronounced     RINE dale     algorithm in the following specified key lengths       128 bit    192 bit    256 bit    AES is considered to be un crackable by most cryptographers  and the National Institute  of Standards and Technology  NIST  has chosen AES for the Federal Information  Processing Standard  or FIPS  As part of the effort to improve the 802 11 standard  the  802 111 working committee is considering the use of AES in WEPv2     AES  if approved by the 802 111 working group to be used in WEPv 2  will be  implemented in firmware and software by vendors  Access point firmware and client  station firmware  the PCMCIA radio cards  will have to be upgraded to support AES   Client station software  drivers and client utilities  will support configuring AES with  secret key s      Filtering    Filtering is a basic security mechanism that can be used in addition to WEP and or AES   Filtering literally means to keep out that which is not wanted and to allow that which is  wanted  Filtering works the same way as access lists on a router  by defining parameters  to which stations must adhere in order t
149. al antenna  The output signal being sent and received is very  weak at each end of the link  What device could you add to the configuration that  would fix the problem     A  Uni directional amplifier  B  Bi directional amplifier  C  Uni directional attenuator  D  Bi directional attenuator    The RF signal amplitude loss that occurs because of the natural broadening of the  RF wave front is referred to as which one of the following     A  Fresnel zone loss   B  Coverage area loss   C  Radiation pattern loss   D  Free space path loss   PoE could be used in which one of the following scenarios    A  To power an antenna that is less than 100 meters away from an access point   B  To power an antenna that is more than 100 meters away from an access point  C  To power an access point that is less than 100 meters away from a wiring closet  D    To power an access point that is more than 100 meters away from a wiring  closet    You are performing an outdoor installation of an omni directional antenna  Which  of the following will you need to do to ensure proper installation  Choose all that    apply    A  Check that RF LOS exists with the other antennas in the installation   B  Check that visual LOS exists with the other antennas in the installation  C  Install a lightning arrestor to protect against transient currents    D  Seal all the cable connections in the series to prevent water damage    148 Chapter 5     Antennas and Accessories    10     11     12     13     14     Which of
150. al strength  the SNR  and the background RF  noise level  called the  noise floor   is very useful  Knowing the signal strength is useful  for finding out if an obstacle is blocking the RF signal or if the access point is not putting  out enough power  The SNR measurement lets the site surveyor know if the link is clean  and clear enough to be considered viable  Knowing the noise level is useful in  determining if RF interference is causing the link a problem or if the level of RF in the  environment has changed from the time that a baseline was established  An engineer can  use all three of these measurements to make design and troubleshooting determinations     One function of a wireless PC card that is particularly useful is the ability to change the   power output at the client station during the site survey  This feature is useful because a  site surveyor should test for situations in which near far or hidden node problems might  exist  Not all site surveyors have the luxury of taking the time to do this sort of testing    but this feature is useful when time permits     Chapter 11     Site Survey Fundamentals 323    Third party utilities such as Netstumbler are valuable utilities during a site survey in  which there are already access points and bridges in place  These utilities enable the site  surveyor to find all of these units quickly and record their information  such as MAC  address  SSID  WEP status  signal strength  SNR  noise  etc    These utilities can replace
151. al time  decryption of data packets on the network     B  A basic service set is a wireless LAN consisting of one access point wired to a  distribution system servicing one or more wireless stations     D  Basic service sets and extended service sets both use infrastructure mode on the  access point and clients in order to communicate  Infrastructure mode specifies that  all client communication must traverse the access point     A  C  An ad hoc network is often referred to as a peer to peer network because  in  this mode  stations communicate directly with each other as opposed to  infrastructure mode where all communication must traverse the access point  The  802 11 standard uses the terminology  ad hoc   but peer to peer is a more common  name for this type of network     B  D  Stations that have a continuous power source other than batteries can use  CAM instead of PSP to improve performance of both the station and the network     A  D  PSP mode is a mode allowing wireless clients to sleep  Sleeping clients  cannot receive packets so they are buffered at the access point  Any time PSP mode  is used  it creates additional overhead on the wireless network segment  Polling is  configured on a station  but is not related to PSP        CHAPTER       MAC and Physical Layers    CWNA Exam Objectives Covered        Understand and apply the following concepts surrounding    In This Chapter  wireless LAN Frames     How wireless LANs  communicate      The difference between wireless
152. allow users to pack up their computer equipment quickly  and move to another location  Due to overcrowded classrooms  many schools now use  mobile classrooms  These classrooms usually consist of large  movable trailers that are  used while more permanent structures are built  In order to extend the computer network  to these temporary buildings  aerial or underground cabling would have to be installed at  great expense  Wireless LAN connections from the main school building to the mobile  classrooms allow for flexible configurations at a fraction of the cost of alternative  cabling  A simplistic example of connecting mobile classrooms using wireless LAN  connectivity is illustrated in Figure 1 7     Temporary office spaces also benefit from being networked with wireless LANs  As  companies grow  they often find themselves with a shortage of office space  and need to  move some workers to a nearby location  such as an adjacent office or an office on  another floor of the same building  Installing Cat5 or fiber cabling for these short periods  of time is not cost effective  and usually the owners of the building do not allow for the  installed cables to be removed  With a wireless network  the network components can be  packed up and moved to the next location quickly and easily     A school with mobile classrooms       Main  Educational    Facility Portable Classrooms    10 Chapter 1   Introduction to Wireless LANs    There are many groups that might use movable networks effec
153. allowed on your  wireless network  In order for a sniffer to see a station s MAC address  that station must  transmit a frame across the wireless segment     Some wireless PC cards permit the changing of their MAC address through software or  even operating system configuration changes  Once a hacker has a list of allowed MAC  addresses  the hacker can simply change the PC card   s MAC address to match one of the  PC cards on your network  instantly gaining access to your entire wireless LAN     Since two stations with the same MAC address cannot peacefully co exist on a LAN  the  hacker must find the MAC address of a mobile station that is removed from the premises  at particular times of the day  It is during this time when the mobile station  notebook  computer  is not present on the wireless LAN that the hacker can gain access into the  network  MAC filters should be used when feasible  but not as the sole security  mechanism on your wireless LAN     Protocol Filtering    Wireless LANs can filter packets traversing the network based on layer 2 7 protocols  In  many cases  manufacturers make protocol filters independently configurable for both the  wired segment and wireless segment of the access point     Imagine a scenario where a wireless workgroup bridge is placed on a remote building in a  campus wireless LAN that connects back to the main information technology building s  access point  Because all users in the remote building are sharing the 5 Mbps of  throughput be
154. allows entities like small businesses and households to implement wireless systems and  fosters the growth of the wireless LAN market     Such freedom from licensing carries with it a major disadvantage to license free band  users  The same license free band you use  or intend to use  is also license free to others   Suppose you install a wireless LAN segment on your home network  If your neighbor  also installs a wireless LAN segment in his home  his system may interfere with yours   and vise versa  Furthermore  if he uses a higher power system  his wireless LAN may  disable yours by    whiting out    your wireless traffic  The two competing systems don   t  necessarily have to be on the same channel  or even be the same spread spectrum  technology     Industrial Scientific Medical  ISM  Bands    There are three license free ISM bands the FCC has specified that wireless LANs may  use  They are the 900 MHz  2 4 GHz  and 5 8 GHz bands     156 Chapter 6     Wireless LAN Organizations and Standards    900 MHz ISM Band    The 900 MHz ISM band is defined as the range of frequencies from 902 MHz to 928  MHz  This band may be additionally  and correctly  defined as 915 MHz   13 MHz   Though the 900 MHz ISM band was once used by wireless LANs  it has been largely  abandoned in favor of the higher frequency bands  which have wider bandwidths and  allow more throughput  Some of the wireless devices that still use the 900 MHz band are  wireless home phones and wireless camera systems  O
155. am   10109 pmw    This equation can be manipulated to reverse the conversion  now converting dBm to mW     Pmw   log  Ca     Note  log     denotes the inverse logarithm  inverse log        CWNA exam  These formulas are provided only for your reference in case they are  needed during your administrative tasks  Calculators are not needed on the CWNA  exam     es You will not be tested on logarithmic functions using these formulas as part of the    Another important point is that gains and losses are additive  If an access point were  connected to a cable whose loss was  2 dB and then a connector whose loss was  1 dB   then these loss measurements would be additive and yield a total of  3 dB of loss  We  will walk through some RF calculations in the coming sections to give you a better idea  of how to relate these numbers to actual scenarios     dBm  The reference point that relates the logarithmic dB scale to the linear watt scale is   1 mW   0 dBm    The m in dBm refers simply to the fact that the reference is 1 milliwatt  1 mW  and  therefore a dBm measurement is a measurement of absolute power     The relationship between the decibels scale and the watt scale can be estimated using the  following rules of thumb      3 dB will double the watt value    10 mW   3dB   20 mW   Likewise   3 dB will halve the watt value    100 mW   3dB   50 mW      10 dB will increase the watt value by ten fold     Chapter 2   RF Fundamentals 33     10 mW   10dB   100 mW   Conversely   10 dB will d
156. amp  Association    The process of connecting to a wireless LAN consists of two separate sub processes   These sub processes always occur in the same order  and are called authentication and  association  For example  when we speak of a wireless PC card connecting to a wireless  LAN  we say that the PC card has been authenticated by and has associated with a certain  access point  Keep in mind that when we speak of association  we are speaking of Layer  2 connectivity  and authentication pertains directly to the radio PC card  not to the user   Understanding the steps involved in getting a client connected to an access point is  crucial to security  troubleshooting  and management of the wireless LAN     Authentication    The first step in connecting to a wireless LAN is authentication  Authentication is the  process through which a wireless node  PC Card  USB Client  etc   has its identity  verified by the network  usually the access point  to which the node is attempting to  connect  This verification occurs when the access point to which the client is connecting  verifies that the client is who it says it is  To put it another way  the access point  responds to a client requesting to connect by verifying the client   s identity before any  connection happens  Sometimes the authentication process is null  meaning that   although both the client and access point have to proceed through this step in order to  associate  there s really no special identity required for associat
157. anager ideally will employ channel reuse  taking care to configure each access  point on an 802 11 DSSS channel that does not overlap with a channel used by a  neighboring access point  While there are 14 partially overlapping channels specified in  802 11 DSSS  11 channels can be used within the U S    there are only 3 channels that do  not overlap at all  and these are the best to use for multi cell coverage  If two access  points are in range of one another and are set to the same or partially overlapping    channels  they may cause some interference for one another  thus lowering the total  available bandwidth in the area of overlap     VPN Use    Wireless VPN solutions are typically implemented in two fashions  First  a centralized  VPN server is implemented upstream from the access points  This VPN server could be a  proprietary hardware solution or a server with a VPN application running on it  Both  serve the same purpose and provide the same type of security and connectivity  Having  this VPN server  also acting as a gateway and firewall  between the wireless user and the  core network provides a level of security similar to wired VPNs     The second approach is a distributed set of VPN servers  Some manufacturers implement  a VPN server into their access points  This type of solution would provide security for  small office and medium sized organizations without use of an external authentication    mechanism like RADIUS  For scalability  these same access point VPN 
158. and     Since this rule was enacted  consumers have had to obtain proprietary connectors from  manufacturers to connect to an industry standard connector  Third party manufacturers  have begun custom making these adapter cables  called  pigtails   and selling them  inexpensively on the open market  Keep in mind that the FCC s CFR 15 204 does NOT  allow  home brew  systems of any kind  All systems must be certified  and a system is  defined as an intentional radiator  an antenna  and everything between  Those individuals  using security utilities such as Netstumbler with a Pringles can  or similar  antennas are  in violation of this FCC regulation  This is mentioned both to answer the commonly  asked question and as an example of how this regulation is interpreted by the FCC  Any  pigtails or antennas used with a wireless LAN in the ISM or UNII bands must be part of a  certified system and documented as such by the FCC     142 Chapter 5     Antennas and Accessories    Frequency Converter    FIGURE 5 34    Frequency converters are used for converting one frequency range to another for the  purpose of decongesting a frequency band  Suppose many companies that were located  in the same multi tenant office building had wireless LANs  which is common   Each of  these companies wants building to building wireless connectivity with a building next  door because each of these companies has an office in the adjacent building  It is easy to  see that only 3 companies will be able to use
159. anes or tornadoes occurring in this site   s locale  Outdoor usage  of wireless LAN gear creates many situations and potential obstacles to installing and  maintaining a wireless LAN  As we discussed in prior sections  a strong wind can  eliminate the signal on a long distance wireless link  If inclement weather such as ice or  strong rain is often present  radomes  a domelike shell transparent to radio frequency  radiation  used to house RF antennas  might be considered for protecting outdoor  antennas  If bridges or access points need to be mounted outdoors as well  a NEMA   compliant weatherproof enclosure might be considered  as shown in Figure 11 2     NEMA Enclosure    Mounting plate  width standoffs  Electrical  Workbox  Bulkhead  Extender    External Antenna  Connector       Outdoor wireless connections are vulnerable to security attacks  since the intruder would  not have to be inside the building to get into the network  Once it is determined that the  survey is for indoors  outdoors  or both  obtain any and all property survey documents  and diagrams that are available  Indoors  these documents will show you the floor layout   firewalls  building structure information  wiring closets  and other valuable information   Outdoors  these documents will show how far the outdoor wireless LAN can safely  extend without significant chance of intrusion     When outdoors  look for RF signal obstructions such as other buildings  trees  mountains   etc  Checking for other wirel
160. annels that have no overlap    Chapter 9  Troubleshooting Wireless LAN Installations 259    whatsoever  For example  using channels 1  amp  11 ina DSSS system would accomplish  this task     Co channel Interference    Co channel interference can have the same effects as adjacent channel interference  but is  an altogether different set of circumstances  Co channel interference as seen by a  spectrum analyzer is illustrated in Figure 9 17 while how a network configuration would  produce this problem is shown in Figure 9 18     FIGURE 9 17 Co channel Interference    P    Ch1 Ch1 Co channel Interference       2 401 GHz    FIGURE 9 18 Co channel Interference in a network    Co channel Interference  Physical configuration       DA    A Channel 1        F sone              J         Sx 4                  To illustrate co channel interference  assume a 3 story building  with a wireless LAN on  each floor  with the wireless LANs each using channel 1  The access points    signal  ranges  or cells  would likely overlap in this situation  Because each access point is on    260 Chapter 9    Troubleshooting Wireless LAN Installations    the same channel  they will interfere with one another  This type of interference is  known as co channel interference     In order to troubleshoot co channel interference  a wireless network sniffer will be  needed  The sniffer will be able to show packets coming from each of the wireless LANs  using any particular channel  Additionally  it will show the 
161. ansmission  much like a passing train overpowers a quiet  conversation     Spread Spectrum Technology    Spread spectrum technology allows us to take the same amount of information that we  previously would have sent using a narrow band carrier signal and spread it out over a  much larger frequency range  For example  we may use 1 MHz at 10 Watts with narrow  band  but 20 MHz at 100 mW with spread spectrum  By using a wider frequency  spectrum  we reduce the probability that the data will be corrupted or jammed  A narrow  band jamming attempt on a spread spectrum signal would likely be thwarted by virtue of  only a small part of the information falling into the narrow band signal s frequency range   Most of the digital data would be received error free  Today s spread spectrum RF radios  can retransmit any small amount of data loss due to narrowband interference     While the spread spectrum band is relatively wide  the peak power of the signal is quite  low  This is the second requirement for a signal to be considered spread spectrum  For a  signal to be considered spread spectrum  it must use low power  These two  characteristics of spread spectrum  use of a wide band of frequencies and very low  power  make it look to most receivers as if it were a noise signal  Noise is a wide band   low power signal  but the difference is that noise is unwanted  Furthermore  since most  radio receivers will view the spread spectrum signal as noise  these receivers will not  attempt to de
162. answer to this question can determine the actual technology to be implemented  and  the technology to be used when doing the site survey  For example  if the client is a  warehouse facility and the only purpose that the wireless LAN will serve is scanning data  from box labels and sending that data to a central server  the bandwidth requirements are  very small  Most data collection devices require only 2 Mbps  such as a computer on a  forklift in a warehouse   but require seamless connectivity while moving  However  if  the client requires that the wireless LAN will serve 35 software developers who need  high speed access to application servers  test servers  and the Internet  consider using  802 1 1a equipment     The necessary speed  range  and throughput per user must be determined so that when the  site survey is given to the RF design engineer  the design engineer can create a solution  that is cost effective and meets the needs of the users  Figure 11 3 shows a survey  diagram that will allow for 2 Mbps per user  while Figure 11 4 allows for 5 5 Mbps per  user  Most companies are broken into several departments such as engineering   accounting  marketing  human resources  etc  Each department type may have different  uses of the wireless LAN in their area     FIGURE 11 3 2 Mbps data rate       316 Chapter 11     Site Survey Fundamentals    FIGURE 11 4 5 5 Mbps data rate       pa er ey     J A iN   gt            a Lay      a  at Oe oe    W O    P        td      a  7    
163. any uses wireless technology to update parcel   tracking data immediately upon the arrival of the delivery vehicle  As the driver parks at  the dock  the driver   s computer has already logged onto the network and transferred the  day s delivery data to the central network     8 Chapter 1   Introduction to Wireless LANs    FIGURE 1 5    Mobility        Employee with a  hand scanner    In warehousing facilities  wireless networks are used to track the storage locations and  disposition of products  This data is then synchronized in the central computer for the  purchasing and shipping departments  Handheld wireless scanners are becoming  commonplace in organizations with employees that move around within their facility  processing orders and inventory     In each of these cases  wireless networks have created the ability to transfer data without  requiring the time and manpower to input the data manually at a wired terminal   Wireless connectivity has also eliminated the need for such user devices to be connected  using wires that would otherwise get in the way of the users     Some of the newest wireless technology allows users to roam  or move physically from  one area of wireless coverage to another without losing connectivity  just as a mobile  telephone customer is able to roam between cellular coverage areas  In larger  organizations  where wireless coverage spans large areas  roaming capability has  significantly increased the productivity of these organizations  simply
164. anymore   Using a X10  times ten  telescope and aiming it at the bulb on the tower  the light bulb is  now visible  This layout would be analogous to using a 10 dBi gain directional antenna   such as a flat panel or Yagi antenna  A 10 dBi gain antenna has about ten times the  focusing gain of a simple whip  or dipole  antenna     Appendix A    RF in Perspective 355    From a distance of five or six miles out  the light is so weak that even the X10 scope  cannot see it  Using a X100 scope  the light comes in clearly  but the viewing area of the  telescope is much smaller  which makes aiming the telescope  analogous to an antenna   properly even more critical  This setup would be comparable to using a 20 dBi dish  antenna  A 20 dBi gain directional antenna has nearly 100 times the focusing power of a  dipole antenna     From a distance of ten miles or more  presuming that the bulb is mounted high enough up  so that there is clear line of sight back to it  even the X100 scope does not see the bulb  If  one were to use a X100 night scope  like the ones that military and law enforcement use   the bulb would now be clearly visible  but so would everything around the bulb and the  background     background noise    as infrared light   This configuration is analogous to  using a radio amplifier at the client site  which  in this example  would be where the high   powered night scope is     In order for the bulb to be brighter  the brightness control  gain  on the night scope can be  
165. apping coverage for seamless roaming      Co channel and adjacent channel interference in all areas    Site Survey Reporting    Now that you have thoroughly documented the client   s facility  the necessary data is  available to prepare a proper report for the client  The report will serve as the map for  implementation of the wireless LAN and future reference documentation for the  network   s administrators and technicians     The site survey report is the culmination of all the effort thus far  and might take days or  even weeks to complete  It may be necessary to revisit the site to gather more data or to  confirm some of the initial findings  Several more conversations may be needed with the  decision makers and some of the people with whom you were unable to meet when you  were on site     Report Format    There is no body of standards or laws that define how a site survey report should look   The following are recommendations that will serve as a starting point and guideline   First  remember while preparing this report that this report is what the client will have  after you leave  This work will represent both your knowledge and that of your  company  Second  you may be doing the wireless LAN implementation  and if so  you  will be working off of your own documentation  Ifthe report is inaccurate  the  implementation will not work as planned  Third  save every piece of data collected  and  include everything with the report as an attachment  appendix  or another set 
166. ard holds the  WEP key and MAC filters  which  for the sake of this example  are not used  The  administrator could then create a filter on all access points to disallow the MAC address  of the client device that was taken by the employee  If MAC filters were already being  used on this network when the wireless LAN card was stolen  removing the particular  client s MAC address from the allow list would work as well     Although MAC filters may seem to be a good method of securing a wireless LAN in  some instances  they are still susceptible to the following intrusions     Theft of a PC card that is in the MAC filter of an access point      Sniffing the wireless LAN and then spoofing with the MAC address after  business hours    Chapter 10     Wireless LAN Security 281    MAC filters are great for home and small office networks where there are a small number  of client stations  Using WEP and MAC filters provides an adequate security solution in  these instances  This solution is adequate because no intelligent hacker is going to spend  the hours it takes to break WEP on a low use network and expend the energy to  circumvent a MAC filter for the purpose of getting to a person s laptop or desktop PC at  home     Circumventing MAC Filters    MAC addresses of wireless LAN clients are broadcasted in the clear by access points and  bridges  even when WEP is implemented  Therefore  a hacker who can listen to traffic  on your network can quickly find out most MAC addresses that are 
167. ards    12     13     14     15     16     17     18     19     20     B  The FCC creates the regulations  laws  to which wireless LAN equipment must  adhere  The IEEE creates standards for the purpose of interoperability within the  industry  WECA creates the tests and certification program to assure  interoperability within the industry using specific standards  WLANA is responsible  for promoting and educating the wireless LAN industry     D  The FCC mandates a 4 watt maximum EIRP in a point to multipoint circuit   One important part of this rule is the understanding that any time an omni   directional antenna is used  the circuit is automatically considered point to   multipoint     C  Clicking on the  About the FCC  link on the homepage of the FCC   www fcc gov  yields this information in the first paragraph     C  It is said that the biggest advantage of using wireless LANs is that they are  license free  It is also said that the biggest disadvantage to using wireless LANs is  that they are license free  Sometimes the fact that nearby license free networks  interfere with yours seems to outweigh the implementation ease and cost factors of  the frequency spectrum being license free     D  The FCC created the ISM bands with specific industry uses in mind  Industrial   Scientific  and Medical related uses  However  since the availability of the ISM  bands  license free wireless LAN gear has enjoyed broad popularity and diverse use     B  E  The 802 1x standard is centered 
168. are permanent  e g   lakes and buildings  will serve as a visual  reference to the client  Pictures of potential sources of interference like young trees or  future building sites will also help the client   s decision making for the future     Wired Data Connectivity  amp  AC Power Requirements    While moving the access point around the site  indoors and out  the access point may not  be able to be located in the best positions  Rather the location will be constrained to  where AC power sources exist and network connectivity is within a given distance   Record on the blueprint or floor plan the locations of each AC power source and network  connection point  These points will lead to the easier  not necessarily the best  locations  for access points  Document and make recommendations for the best locations for all  access points  Preferred access point locations may be a solid reason for the client to  install new AC power sources as well as new network connectivity points  Remember  that many brands of access points can utilize Power over Ethernet  PoE      Some questions to consider when looking for the best place to install wireless LAN  hardware are     338 Chapter 11     Site Survey Fundamentals    Is AC power available     Without an available source of AC power  access points will not function  If AC power  is not available in a particular location  an electrician s services may be required  added  cost  or Power over Ethernet  PoE  can be used to power the unit     
169. arting at the  reference point  times a factor of 10 four times then times a factor of 2 one time yielding  the following     1 mW x 10   10 mW   10 mW x 10   100 mW   100 mW x 10   1 000 mW   1 000 mW x 10   10 000 mW   10 000 mW x 2   20 000 mW   20 watts    So  we now see that  43 dBm equals 20 watts of power  Another example that takes into    34 Chapter 2     RF Fundamentals    consideration measurement negative from the reference point would be  26 dBm     In this example  we see that  26 dBm equals  10  10  3  3  From the reference point  the  charts show you that you would divide the milliwatt value  starting at the reference point   by a factor of 10 twice and by a factor of 2 twice yielding the following     1 mW  10   100 uW  100 uW   10   10 uW  10 uW  2 5 uW  5 uwW 2   2 5 uW    So  we now see that  26 dBm equals 2 5 microwatts of power     dBi    As discussed previously  gain and loss are measured in decibels  When quantifying the  gain of an antenna  the decibel units are represented by dBi  The unit of measurement  dBi refers only to the gain of an antenna  The    1    stands for    isotropic     which means that  the change in power is referenced against an isotropic radiator  An isotropic radiator is a  theoretical ideal transmitter that produces useful electromagnetic field output in all  directions with equal intensity  and at 100 percent efficiency  in three dimensional space   One example of an isotropic radiator is the sun  Think of dBi as being referen
170. at you have at  your disposal when you begin to create or add to a wireless network  These hardware  items are the physical building blocks for any wireless LAN     In general  we will cover each type of hardware in this section in a similar manner  according to the following topics       Definition and role of the hardware on the network    Common options that might be included with the hardware      How to install and configure the hardware    The goal of this section of the book is to make you aware of all the types of hardware that  are available for the many varying wireless LAN configurations that you will encounter  as a wireless LAN administrator  Antennas and wireless LAN accessories are covered in  Chapter 5     Access Points    Second only to the basic wireless PC card  the access point  or    AP     is probably the most  common wireless LAN device with which you will work as a wireless LAN  administrator  As its name suggests  the access point provides clients with a point of  access into a network  An access point is a half duplex device with intelligence  equivalent to that of a sophisticated Ethernet switch  Figure 4 1 shows an example of an  access point  while Figure 4 2 illustrates where an access point is used on a wireless  LAN     Chapter 4     Wireless LAN Infrastructure Devices 73    FIGURE 4 1 A sample access point    lt            FIGURE 4 2 An access point installed on a network         arose                      ba  p    N Coverage Area    S wa    a
171. atio  VSWR   VSWR Measurements  Effects of VSWR  Solutions to VSWR  Principles of Antennas  Line of Sight  LOS   Fresnel Zone  Obstructions  Antenna Gain  Intentional Radiator  Equivalent Isotropically Radiated Power  EIRP   Radio Frequency Mathematics  Units of Measure  Watts  W   Milliwatt  Decibels  dBm  dBi  Accurate Measurements  Key Terms  Review Questions  Answers to Review Questions    Contents vii    xxiv    OANADNANPWWN      viii Contents    Chapter 3 Spread Spectrum Technology  Introducing Spread Spectrum  Narrow Band Transmission  Spread Spectrum Technology  Uses of Spread Spectrum  Wireless Local Area Networks  Wireless Personal Area Networks  Wireless Metropolitan Area Networks  FCC Specifications  Frequency Hopping Spread Spectrum  FHSS   How FHSS Works  Effects of Narrow Band Interference  Frequency Hopping Systems  Channels  Dwell Time  Hop Time  Dwell Time Limits  FCC Rules affecting FHSS  Direct Sequence Spread Spectrum  DSSS   How DSSS Works  Direct Sequence Systems  Channels  Effects of Narrow Band Interference  FCC Rules affecting DSSS  Comparing FHSS and DSSS  Narrowband Interference  Cost  Co location  Equipment compatibility and availability  Data rate  amp  throughput  Security  Standards Support  Key Terms  Review Questions  Answers to Review Questions  Chapter 4 Wireless LAN Infrastructure Devices  Access Points  Access Point Modes  Root Mode  Bridge Mode  Repeater Mode  Common Options  Fixed or Detachable Antennas  Advanced Filtering Capabilities 
172. ation mechanism at link control  phase  but rather postpones this until the authentication phase  This allows the  authenticator to request more information before determining the specific authentication  mechanism  This also permits the use of a  back end  server  which actually implements  the various mechanisms while the PPP authenticator merely passes through the  authentication exchange     extension point   A base station 2 radio transceiver that bridges the gap between a  wireless client and an access point or between a wireless client and another extension  point     Federal Communications Commission  FCC    The Federal Communications  Commission  FCC  is an independent United States government agency  directly  responsible to Congress  The FCC was established by the Communications Act of 1934  and is charged with regulating interstate and international communications by radio   television  wire  satellite and cable  The FCC s jurisdiction covers the 50 states  the  District of Columbia  and U S  possessions     File Transfer Protocol  FTP    A TCP IP protocol for file transfer     firewall   A device that interfaces the network to the outside world and shields the  network from unauthorized users  The firewall does this by blocking certain types of  traffic  For example  some firewalls permit only electronic mail traffic to enter the  network from elsewhere  This helps protect the network against attacks made to other  network resources  such as sensitive files  data
173. ave just finished installing your first wireless LAN with 802 11b equipment  rated at 11 Mbps  After testing the throughput of the clients you find your actual  throughput is only 5 5 Mbps  What can you change to get 11Mbps throughput     A  Turn off RTS CTS  B  Move all of the clients closer to the access point  C  Turn up the power on the access point    D  Purchase another access point and co locate both together    230 Chapter 8     MAC and Physical Layers    11     12     13     14     15     802 11b devices use what type of modulation at 11 Mbps     A  BPSK  B  DPSK  C  QPSK  D  CCK    802 11a devices use what type of modulation at 24 Mbps     A  BPSK  B  16QAM  C  OFDM  D  CCK    If the sending station on a wireless LAN does not receive an ACK  the sending  station assumes which one of the following     A  The receiving station is sleeping   B  The receiving station is a hidden node  C  There was a collision  D     That RTS CTS is turned on    Modulation is which of one of the following   A  The process by which digital data is modified to become RF data    B  The process of adding data to a carrier by altering the amplitude  frequency  or  phase of the carrier in a controlled manner    C  The process of propagating an RF signal through the airwaves    D  The means by which RF signals are received and processed by RF antennas    Which one of the following is not part of a superframe   A  Beacon   B  Beacon Free Period   C  Contention Free Period  D    Contention Period
174. avy wall  6    solid core  15 20 15  Very heavy wall  12    solid core  20 25 10  Floor ceiling  solid core  15 20 15  Floor ceiling  heavy solid core  20 25 10       Find and record all sources of interference as you map your range and coverage patterns   as shown in Figure 11 19  When measuring the coverage in the break room  for example   measure both when the microwave is running and when it is off  In some cases  the  microwave could impact the entire wireless LAN infrastructure if the microwave is an  older model  If this is the case  advise the client to purchase a new microwave oven and  not to use the existing unit  The client and the users need to be aware of the potential  interference and possible lack of connectivity from the break room  or wherever a  microwave oven is operated      FIGURE 11 19 RF Obstacles    No Coverage    Other common sources of indoor interference to look for include metal mesh cubicles   metal mesh glass windows  metal blinds  inventory  what if the client manufactures    Chapter 11     Site Survey Fundamentals 337    metal blinds    fire doors  cement walls  elevator motors  telemetry equipment   transformers  fluorescent lights  and metal studded walls  as opposed to wood studs    Piles of objects made of paper  cardboard  wood  and other similar products also serve to  block RF signals     There are standards for how a firewall  a physical fire barrier  may be penetrated  It is  important to find firewalls during the site survey because
175. ay    UOWP gt r gt  gt  moons    Antenna    100 Chapter 4      Wireless LAN Infrastructure Devices    16     17     18     19     20     Which one of the following is not a hardware or software option on a wireless  bridge     A  Fixed or detachable antennas  Advanced filtering capabilities  Removable  modular  radio cards    Full duplex radio links    SARE    Varied Types of Wired Connectivity    Ethernet and serial converters are used with devices having which of the following  physical connectivity  Choose all that apply     A  9 pin serial ports   B  Ethernet ports   C  USB Ports   D  Parallel Ports   Why is an access point considered a portal     A  An access point allows client connectivity from an 802 11 network to either  802 3 or 802 5 networks    B  An access point always connects users to the Internet  C  An access point connects clients to one another  D  An access point is a gateway to another collision domain    The statement that an access point is a half duplex wireless device is which one of  the following     A  Always true  B  Always false  C  Dependent on the maker of the access point    A USB adapter is used with which type of wireless LAN device     A  Gateway   B  Access point  C  Bridge   D  Client   E  Converter    Chapter 4     Wireless LAN Infrastructure Devices 101    Answers to Review Questions    1  A C  When an access point is used in repeater mode  throughput of the wireless  connection to clients is significantly reduced due to the access poin
176. ay be familiar with the area   s weather patterns  If you do not live there  gathering  more detailed information about local weather patterns like winds  rain  hail  tornadoes   hurricanes  and other potentially severe weather may be necessary  Remember from our  troubleshooting discussion that for the most part  only severe weather causes disruption  to wireless LANs  However  you must be aware of  prepare and compensate for  these  types of weather before the implementation of the wireless network     Lifts and ladders could be needed for an area where a trade show or other similar function  is going to take place  The event   s location may have 40 foot ceilings  and the access  points may need to be mounted in the ceiling for proper coverage  OSHA has many  regulations regarding ladders and ladder safety     If a facility such as a trade show is able to provide the personnel  ladders  and lifts to do  the installation  let these individuals perform the work  These individuals are familiar  with OSHA regulations and have processes in place to obtain the proper permits  The RF  Site Survey Report will need to reference any lifts  ladders  or permits required for  installation of the wireless LAN  In many cases  a sturdy 6 foot ladder for climbing into  drop ceilings is all that is needed     If an RF cable  Cat5 cable  access point  or any other device must be placed in the plenum   the space between the drop ceiling  false ceiling  and the hard cap ceiling   then the item
177. bases  and applications     free space path loss   a reference to the loss incurred by an RF signal due largely to   signal dispersion  which is a natural broadening of the wave front  The wider a wave  front  the less power can be induced into the receiving antenna  this loss of signal strength  is a function of distance alone and becomes a very important factor when considering link  viability     Frequency Division Multiple Access  FDMA    A digital radio technology that divides  the available spectrum into separate radio channels  Generally used in conjunction with  Time Division Multiple Access  TDMA  or Code Division Multiple Access  CDMA      Frequency Hopping Multiple Access  FHMA    A system using frequency hopping  spread spectrum to permit multiple  simultaneous conversations or data sessions by  assigning different hopping patterns to each     366 Glossary    Frequency Hopping Spread Spectrum  FHSS    Takes the data signal and modulates it  with a carrier signal that hops from frequency to frequency as a function of time over a  wide band of frequencies  For example  a frequency hopping radio will hop the carrier  frequency over the 2 4 GHz frequency band between 2 4 GHz and 2 483 GHz  A hopping  code determines the frequencies it will transmit and in which order  To properly receive  the signal  the receiver must be set to the same hopping code and listen to the incoming  signal at the right time at the correct frequency     Fresnel Zone     an oval shaped zone a
178. bases  and data encryption using industry   standard VPN tunnel types  Figure 4 19 shows an example of an enterprise wireless  gateway  while Figure 4 20 illustrates where it is used on a wireless LAN     A sample enterprise wireless gateway       An enterprise wireless gateway installed on a network    Server        Firewall    Authentication technologies incorporated into enterprise wireless gateways are often built  into the more advanced levels of access points  For example  VPN and 802 1x EAP  connectivity are supported in many brands of enterprise level access points     Enterprise wireless gateways do have features  such as Role Based Access Control   RBAC   that are not found in any access points  RBAC allows an administrator to    Chapter 4     Wireless LAN Infrastructure Devices 95    assign a certain level of wireless network access to a particular job position in the  company  If the person doing that job is replaced  the new person automatically gains the  same network rights as the replaced person  Having the ability to limit a wireless user s  access to corporate resources  as part of the  role   can be a useful security feature     Class of service is typically supported  and an administrator can assign levels of service  to a particular user or role  For example  a guest account might be able to use only 500  kbps on the wireless network whereas an administrator might be allowed 2 Mbps  connectivity     In some cases  Mobile IP is supported by the enterprise 
179. bile users  SOHO Use    Mobile office  classroom  industrial  and  healthcare       CHAPTER       In This Chapter  The Wireless LAN Market    Applications of Wireless  LANs    2 Chapter 1   Introduction to Wireless LANs    In this section  we will discuss the wireless LAN market  an overview of the past   present  and future of wireless LANs  and an introduction to the standards that govern  wireless LANs  We will then discuss some of the appropriate applications of wireless  LANs  In closing  we will introduce you to the various organizations that guide the  evolution and development of wireless LANs     The knowledge of the history and evolution of wireless LAN technology is an essential  part of the foundational principles of wireless LANs  A thorough understanding of where  wireless LANs came from and the organizations and applications that have helped the  technology mature will enable you to better apply wireless LANs to your organization or  your client   s needs     The Wireless LAN Market    The market for wireless LANs seems to be evolving in a similar fashion to the  networking industry as a whole  starting with the early adopters using whatever  technology was available  The market has moved into a rapid growth stage  for which  popular standards are providing the catalyst  The big difference between the networking  market as a whole and the wireless LAN market is the rate of growth  Wireless LANs  allow so many flexibilities in their implementation that it s no w
180. blast  through an obstruction  This setup would be used in order to  get network connectivity to places that cannot be wired and where normal wireless  networks will not work        Highly directional antennas have a very narrow beamwidth and must be accurately  aimed at each other     RF Antenna Concepts    There are several concepts that are essential knowledge when implementing solutions  that require RF antennas  Among those that will be described are     a Polarization    Gain    Beamwidth      Free Space Path Loss    The above list is by no means a comprehensive list of all RF antenna concepts  but rather  a set of must have fundamentals that allow an administrator to understand how wireless  LAN equipment functions over the wireless medium  A solid understanding of basic  antenna functionality is the key to moving forward in learning more advanced RF  concepts     Knowing where to place antennas  how to position them  how much power they are  radiating  the distance that radiated power is likely to travel  and how much of that power  can be picked up by receivers is  many times  the most complex part of an administrator s  job     Polarization    A radio wave is actually made of up two fields  one electric and one magnetic  These two  fields are on planes perpendicular to each other  as shown in figure 5 13     114 Chapter 5     Antennas and Accessories    FIGURE 5 13 E planes and H planes    H Plane    The sum of the two fields is called the electro magnetic field  En
181. ble from the tower  With the X10 scope in front of  the bulb  the light is visible  but it is not strong  With the X100 telescope  the light is  quite bright     The lesson here is that high gain directional antennas are needed at the client end of a  wireless link     Obstacles    If there were any obstacles in the way  the bulb would not be visible  This situation is  one area in which the light bulb analogy begins to break down  A 2 4 GHz radio signal  will go through walls and floors   light will not  How many walls and floors the radio  signal will go through depends on the type and the thickness of the material of the walls   RF signals easily travel through sheet rock walls  such as those found in offices and  homes  but are seriously attenuated  weakened  through steel reinforced concrete walls  and floors     At long distances  the analogy holds up  A large building in the way will definitely block  the radio signal  At close range  a mile or less   reflection and or refraction of the radio  signal will possibly allow connectivity  but that connectivity is both unpredictable and  unreliable     Fresnel Zone    The other departure from our light analogy is the concept of the Fresnel Zone  Radio  waves  unlike light  do not travel in thin laser like lines  RF waves emanate away from  an antenna like ripples in a pond when a rock is thrown in  Radio waves fan out   becoming wider toward the middle of the link  The area where radio waves spread out is  called the Fresnel
182. book and a practice exam should adequately prepare you to pass the exam     New To Wireless    If you   ve been working on networks     LANs  MANs  WANs  etc      but not yet taken on  wireless  then this book and the subsequent certification exam are great introductions into  wireless LAN technology  Be careful not to assume that wireless is just like any other  form of networking  While they certainly serve as an extension to wired LANs  wireless    Introduction xvii    LANs are a field of study all their own  An individual can spend many more than the  standard 40 hours in a week learning and using wireless LAN technology  With wireless  LAN security now clearly in focus  the industry is piling on knowledge requirements that  wireless LAN administrators must master quickly in order to keep pace  Wireless LANs  are reaching into new areas with each passing month that nobody thought they would  ever reach  If you administer LANs  there s simply no avoiding wireless  Wireless is  here to stay     Wireless Experts    If you are experienced in wireless networking already  there is substantial material  covered in this book that will benefit you  Most people who attend a CWNA class  marvel from the first day about how much they don   t know  If you have been working  with wireless LANs for years  be careful you don   t assume that you know all there is to  know about them  Even experts who spent 12 hours each day studying wireless material  in order to stay up to date cannot kee
183. by using proprietary technology  such as rate doubling  The highest  rates of some of these devices are the result of newer technologies not specified by the  802 11a standard  IEEE 802 11a specifies data rates of only 6  12  and 24 Mbps  A  wireless LAN device must support at least these data rates in the UNII bands in order to  be 802 1la compliant  The maximum data rate specified by the 802 1 1a standard is 54  Mbps     IEEE 802 11g    802 11g provides the same maximum speed of 802 11a  coupled with backwards  compatibility for 802 11b devices  This backwards compatibility will make upgrading  wireless LANs simple and inexpensive  Since 802 11g technology is new  802 11g  devices are not yet available as of this writing     IEEE 802 11g specifies operation in the 2 4 GHz ISM band  To achieve the higher data  rates found in 802 11a  802 11g compliant devices utilize Orthogonal Frequency Division  Multiplexing  OFDM  modulation technology  These devices can automatically switch    162 Chapter 6     Wireless LAN Organizations and Standards    to QPSK modulation in order to communicate with the slower 802 11b  and 802 11   compatable devices  With all of the apparent advantages  802 11g   s use of the crowded  2 4 GHz band could prove to be a disadvantage             As of this writing  the 802 11g standard has been approved as a standard  but the  specifications of this standard are still in draft form  Final specifications for 802 11g are  expected in mid to late 2002     Ma
184. c across the  wireless link     86 Chapter 4      Wireless LAN Infrastructure Devices    FIGURE 4 11 A sample wireless workgroup bridge       FIGURE 4 12 A wireless workgroup bridge installed on a network        Wireless  Workgroup       Common Options    Because the wireless workgroup bridge is a type of bridge  many of the options that you  will find in a bridge     MAC and protocol filtering  fixed or detachable antennas  variable  power output  and varied types of wired connectivity     are also found in a workgroup  bridge  There is a limit to the number of stations that may use the workgroup bridge from  the wired segment  This number ranges between 8 and 128 depending on the  manufacturer  Use of more than about 30 clients over the wireless segment is likely to  cause throughput to drop to a point at which users might feel that the wireless link is  simply too slow to adequately perform their job tasks     Configuration and Management    The methods used to access  configure  and manage a wireless workgroup bridge are  similar to those of a wireless bridge  console  telnet  HTTP  SNMP support  or custom  configuration and management software  Workgroup bridges are configured for a default  IP address from the manufacturer  but can be changed either by accessing the unit via  console port  web browser  telnet  or custom software application  The administrator can  reset the device to factory defaults by using the hardware reset button on the device     Chapter 4     Wir
185. cal area network  LAN      a relatively high speed computer network that spans a  relatively small area  such as a single building or a group of buildings    Logical Link Control Layer  LLC    The highest layer of the IEEE 802 Reference Model  and provides similar functions of a traditional data link control protocol     368 Glossary    MAC protocol data unit  MPDU    The unit of data in an IEEE 802 network that two  peer MAC entities exchange across a physical layer     medium   A physical link that provides a basic building block to support the transmission  of information signals  Most media are composed of metal  glass  plastic  or air     medium access   A data link function that controls the use of a common network  medium     medium access control layer  MAC Layer    Provides medium access services for  IEEE 802 LANs     Megahertz  MHz    One million cycles per second     Mobile IP   A protocol developed by the Internet Engineering Task Force to enable users  to roam to parts of the network associated with a different IP address than what   s loaded  in the user   s appliance     mobility   Ability to continually move from one location to another     modulation   The process of translating the baseband digital signal to a suitable analog  form     multipath     the composition of a primary signal plus duplicate or echoed images caused  by reflections of signals off objects between the transmitter and receiver  Can cause  increased amplitude  upfade   reduced amplitude 
186. ccess points are connected to hubs  then every packet  traversing the wired segment will be broadcast across the wireless segment as well  This  functionality gives hackers additional information such as passwords and IP addresses     Wireless DMZ    Another idea in implementing security for wireless LAN segments is to create a wireless  demilitarized zone  WDMZ   Creating these WDMZs using firewalls or routers can be  costly depending on the level of implementation  WDMZs are generally implemented in  medium  and large scale wireless LAN deployments  Because access points are basically  unsecured and untrusted devices  they should be separated from other network segments  by a firewall device  as illustrated in Figure 10 13     298 Chapter 10     Wireless LAN Security    FIGURE 10 13 Wireless DMZ        Firewall    Firmware  amp  Software Updates    Update the firmware and drivers on your access points and wireless cards  It is always  wise to use the latest firmware and drivers on your access points and wireless cards   Manufacturers commonly fix known issues  security holes  and enable new features with  these updates     Chapter 10     Wireless LAN Security 299    Key Terms    Before taking the exam  you should be familiar with the following terms     Initialization Vector  key server   RC4   Rijndale   Wi Fi hot spot    300 Chapter 10     Wireless LAN Security    Review Questions    1     Which one of the following is NOT one of the criteria for WEP implementation   acco
187. ced against  perfection  The dBi measurement is used in RF calculations in the same manner as dB   Units of dBi are relative     Consider a 10 dBi antenna with 1 watt of power applied  What is the EIRP  output power  at the antenna element      1 W   10 dBi  a ten fold increase    10 W    This calculation works in the same fashion as showing gain measured in dB  A gain of  10 dBi multiplies the input power of the antenna by a factor of ten  Antennas  unless they  are malfunctioning  do not degrade the signal  so the dBi value is always positive  Like  dB  dBi is a relative unit of measure and can be added to or subtracted from other decibel  units  For example  if an RF signal is reduced by 3 dB as it runs through a copper cable   then is transmitted by an antenna with a gain of 5 dBi  the result is an overall gain of  2  dB     Example    Given the RF circuit in Figure 2 15  determine the power at all marked points in  milliwatts     Chapter 2   RF Fundamentals 35    FIGURE 2 15 Sample wireless LAN configuration       Point A Point B  cable  Access point connector  connector  cable antenna  a  connector       Point ae   D    Access Point PointA PointB PointC Point D  100 mW  3 dB  3 dB  3 dB  12 dBi  100 mW  2  2  2  x2 x2 x2 x2     100 mW  2  2  2 x16    50 mW  2  2 x16    25mW  2 x16    12 5 mW x16    200 mW    Accurate Measurements    Although these techniques are helpful and expedient in some situations  there are times  when rounded or even numbers may not be available 
188. cess  point  Mount the 2x4 to the column and then mount the access point to the 2x4      When beam mounting  one may use zip ties directly or perhaps a 2x4 mounted to  the beam with beam clamps with the access point mounted to it  Do not forget to  mount the antenna the same way as is specified in the site survey     Some access points come with slide mount holes and others may have a separate  mounting kit or frame with which to mount them  Some do not  by design  allow  for mounting     Figure 4 6 shows some examples of mounting access points     80 Chapter 4      Wireless LAN Infrastructure Devices    FIGURE 4 6 Mounting access points                               Wireless Bridges    A wireless bridge provides connectivity between two wired LAN segments  and is used  in point to point or point to multipoint configurations  A wireless bridge is a half duplex  device capable of layer 2 wireless connectivity only  Figure 4 7 shows an example of a  wireless bridge  while Figure 4 8 illustrates where a wireless bridge is used on a wireless  LAN     FIGURE 4 7 A sample wireless bridge    Chapter 4     Wireless LAN Infrastructure Devices 81    FIGURE 4 8 A point to point wireless bridge link       _ Server  3 peno  A wired PC  To    Wireless    a Wireless Bridge       a   Saa       Er    P N ae en    m xe    Wireless Bridge Modes    Wireless bridges communicate with other wireless bridges in one of four modes       Root Mode    Non root Mode  a Access Point Mode       Repeater Mo
189. code  information  such as with Morse code  we would have a wireless link established   Remember  we are only interested in sending and receiving data  not illuminating the  receiver with RF energy as we would illuminate a room with light  You can see that  relatively little power is required to form an RF link of great distance  The FCC allows  only 4 watts of power to be radiated from an antenna in a point to multipoint wireless  LAN connection using unlicensed 2 4 GHz spread spectrum equipment  Four watts  might not seem like much power  but it is enough to send a clear RF data signal for miles     Milliwatt    When implementing wireless LANs  power levels as low as 1 milliwatt  1 1000 watt   abbreviated as    mW      can be used for a small area  and power levels on a single wireless  LAN segment are rarely above 100 mW   enough to communicate up to a half mile  0 83  km  in optimum conditions  Access points generally have the ability to radiate 30 100  mW of power  depending on the manufacturer  It is only in the case of point to point  outdoor connections between buildings that power levels above 100 mW would be used   Most of the power levels referred to by administrators will be in mW or dBm  These two  units of measurement both represent an absolute amount of power and are both industry  standard measurements     Chapter 2   RF Fundamentals 31    Decibels    When a receiver is very sensitive to RF signals  it may be able to pick up signals as small  as 0 000000001 Wa
190. complete set of tools in their client utility software  An  additional tool that can be utilized is a spectrum analyzer  which is used for finding  sources of RF interference  With quality site surveying software  whether using one or  more wireless PC cards   site survey measurements can be efficiently completed with  accuracy     322 Chapter 11     Site Survey Fundamentals    FIGURE 11 6 Site Monitor application  xi  Network 1adaml  etwosk name adam12    Selection Site Monitor   Log Settings   AP names       Channel  gt    Signalen z  ies     Noise d8m  x   6 81       16 37  W    62 Se   R  1  89 7 L96  oososezesics M f1 55 43 38  oosos62eFc30   1 79 17  36  00409626FB62      6 E 7 88       ema  o Ca   He      While walking around the intended coverage area  pay particular attention to the SNR  measurement because this measurement shows the strength of the RF signal versus the  background noise  This measurement shows the viability of the RF link  and is a good  indicator of whether or not a client will connect and remain connected  Many experts  agree that an SNR measurement of 22 dB or more is a viable RF link  but there is no hard  and fast rule for this measurement  Whether a link is actually viable or not depends on  factors other than just SNR  but as long as a link is stable and the access point provides  the client with a level of RF power significantly above its sensitivity threshold  the link  can be considered viable     Having a utility that can measure the sign
191. cord which of the following  measurements  Choose all that apply     A  Microwave energy level on all floors with microwave ovens  Signal strength  Noise floor    Signal to noise ratio       moo    Noise strength ratio    Which of the following are possible RF sources  that would interfere with a wireless  LAN  to look for when performing a site survey in a hospital  Choose all that    apply    A  Microwave ovens  Elevator motors   Baby monitors   2 4 GHz cordless phones  Walkie talkies    oS Oe    Chapter 11     Site Survey Fundamentals 349    20  Which of the following would be NOT considered potential RF obstructions   Choose all that apply     A  Fire doors   A large crowd of users  Metal blinds  Metal mesh windows    Concrete walls    7  moo ow    Metal framed office cubicles    350 Chapter 11     Site Survey Fundamentals    Answers to Review Questions    1  B C  Determining what types of applications will be used over the wireless LAN  and what those applications require from the wireless LAN infrastructure is critical  in making sure the wireless LAN can meet the intended business need  Roaming  requirements are no different  because where the users will use the applications can  be equally as important as what applications they are using  Determining dead spots  and RF coverage is required for every RF site survey     2  B C D  Link speed  SNR  signal strength  and the level of RF noise are all useful  pieces of information in deciding on the viability of an RF link  
192. creased up to 9000 bytes  referred to as  Jumbo Frames    Frames  larger than 1518 bytes are normally fragmented to comply with the standard  Wireless  LAN frames have a maximum frame size of 2346 bytes before the 802 11 standard  requires fragmentation  However  wireless frames are generally fragmented at 1518  bytes by the access point due to data traversing between wired Ethernet  802 3  and  wireless  802 11  media     A subject seldom discussed is the preamble and header of a wireless frame  There are a  few pieces of information that are important to know   especially if you are going to do  any wireless protocol analysis  The preamble  a series of 1 s and 0 s used for bit  synchronization at the beginning of each frame  is always sent at 1 Mbps to provide a    Chapter 8      MAC and Physical Layers 213    common data rate that any receiver can interpret  There are two lengths of preamble   also called PLCP preamble    long  128 bits  and short  56 bits   It is important that  nodes at each end of a wireless link use the same preamble type  The 802 11b standard  requires support of long preambles and provides an option for short preambles for the  purpose of improving network efficiency when transmitting special types of traffic such  as VoIP  After the preamble is sent  the header  also called PLCP header  is sent  For  long preambles  the preamble and the header are both sent at 1 Mbps  For short  preambles  the preamble is sent at 1 Mbps  and the header is sent at 2 
193. cryption key servers are useful in performing the same tasks as an  administrator  changing WEP keys   except that the server can do it much faster and  more efficiently  Servers of this type bring value to the network security  architecture by being able to create and distribute encryption keys quickly and  easily     A  B  Most centralized encryption key servers have the ability to implement key  rotation on a per packet or a per session basis  Be careful when implementing per   packet key rotation that you don t add more overhead to the network than the  network can withstand     C  The initialization vector  IV  is a 24 bit number used to start and track the  wireless frames moving between nodes  The IV is concatenated with the secret key  to yield the WEP key  With a 40 bit secret key added to a 24 bit IV  a 64 bit WEP  key is generated     A  Any station on the wireless segment can see the source and destination MAC  addresses  Any layer 3 information such as IP addresses is encrypted  The data  payload  layer 3 7 information  is encrypted  Shared Key authentication issues the  plaintext challenge in clear text   only the response is encrypted     C  The Rijndale algorithm was chosen by NIST for AES  There were many  candidates competing for use as part of AES  but Rijndale was chosen and no  backup selection has been specified     A  B  C  Filtering based on SSIDs should be aimed toward segmentation of the  network only  as SSID filtering does not present any real leve
194. cted  Typically  RF amplifiers will have either SMA or N Type connectors  SMA  and N Type connectors perform well and are widely used              Make sure that the amplifier you purchase comes with a calibration report and  certificate  Although it is not feasible to disassemble your wireless LAN and send  amplifiers in for calibration  an initial calibration report will at least let you know whether  or not it started out working within the manufacturer s specifications     Configuration  amp  Management    FIGURE 5 23    RF amplifiers used with wireless LANs are installed in series with the main signal path as  seen below in Figure 5 23  Amplifiers are typically mounted to a solid surface using  screws through the amplifier   s flange plates     RF amplifier placement in the wireless LAN system         IS  o    Access Point Amplifier       Variable amplifiers are not recommended because the settings could inadvertently be  changed  resulting in damage to the antenna or other downstream equipment or a  violation of FCC rules governing output power in the ISM or UNII bands or certified  systems  Fixed  linear RF amplifiers are recommended  and the RF calculations  should be done ahead of time to make sure the RF signal strength will meet your  application s needs and will be within FCC guidelines  These calculations are usually  performed by the manufacturer that sells the amplifier as part of an FCC certified  system     Special Stipulations    The FCC   s CFR 15 204 state
195. ctly in  the propagated wave s transmission path can absorb  reflect  or destroy RF signals  Loss  can be intentionally injected into a circuit with an RF attenuator  RF attenuators are    20 Chapter 2  RF Fundamentals    FIGURE 2 3    accurate resistors that convert high frequency AC to heat in order to reduce signal  amplitude at that point in the circuit     Power Loss    Loss as seen by an    Loss of DSSS as seen bya  Oscilloscope    spectrum analyzer    Peak Amplitude before Loss    Peak Amplitude after Loss               There are many things that can affect an RF signal between the transmitter and  receiver  In order for gains or losses to be relevant to the implementation of wireless    LANs  they must be quantifiable  The section in this chapter about RF mathematics will    discuss quantifiable loss and gain and how to calculate and compensate for them     Being able to measure and compensate for loss in an RF connection or circuit is    important because radios have a receive sensitivity threshold  A sensitivity threshold is    defined as the point at which a radio can clearly distinguish a signal from background  noise  Since a receiver   s sensitivity is finite  the transmitting station must transmit a    signal with enough amplitude to be recognizable at the receiver  If losses occur between    the transmitter and receiver  the problem must be corrected either by removing the  objects causing loss or by increasing the transmission power     Reflection    Reflecti
196. ctrum analyzer is shown in Figure 9 13     Screenshot of a spectrum analyzer showing narrowband interference        ov 5s0 0    SION PEI EVOL        En MM a    2 402 A pee    Frequencies  GHz  3480  Peak Hold i Spear re       Done   Average i    C Slow    Medum   Fast   Help         In order to remedy a narrowband RF interference problem  you must first find where the  interference originates by using the spectrum analyzer  As you walk closer to the source  of the RF signal  the RF signal on the display of your spectrum analyzer grows in  amplitude  size   When the RF signal peaks on the screen  you have located its source   At this point  you can remove the source  shield it  or use your knowledge as a wireless  network administrator to configure your wireless LAN to efficiently deal with the  narrowband interference  Of course  there are several options within this last category   such as changing channels  changing spread spectrum technologies  DSSS to FHSS or  802 11b to 802 11a   and others that we will discuss in later sections     Chapter 9  Troubleshooting Wireless LAN Installations 255    All band Interference    FIGURE 9 14    All band interference is any signal that interferes with the RF band from one end of the  radio spectrum to the other  All band interference doesn t refer to interference only  across the 2 4 GHz ISM band  but rather is the term used in any case where interference  covers the entire range you re trying to use  regardless of frequency  Technolo
197. d 11 with only 2 access points  as  illustrated in Figure 9 11  Using only these two channels will ensure that you have no  overlap between channels regardless of proximity between systems  and therefore  no  detrimental effect on the throughput of each access point  By way of comparison  two  access points operating at the maximum capacity of 5 5 Mbps  about the best that you can  expect by any access point   give you a total capacity of 11 Mbps of aggregate  throughput  whereas three access points operating at approximately 4 Mbps each   degraded from the maximum due to actual channel overlap  on average yields only 12  Mbps of aggregate throughput  For an additional 1 Mbps of throughput  an administrator  would have to spend the extra money to buy another access point  the time and labor to  install it  and the continued burden of managing it     Using two access points instead of three    Remove this access point  P allowing more channel separation  between access points for greater  throughput    Channel 1 Channel 11       2 401 GHz 2 473 GHz    252 Chapter 9    Troubleshooting Wireless LAN Installations    In certain instances  the extra 1 Mbps of bandwidth might still be advantageous  but in a  small environment  it might not be practical  Don t forget that this scenario applies only  to access points located in the same physical space serving the same client base  but using  different  non overlapping channels  This configuration does not apply to channel reuse   wher
198. d by as little as 10 inches or as  much as 40 inches on either side of the mast or tower  Each panel in this configuration  may have a mechanical down tilt  The resultant gain in each of the main radiation lobes  is reduced by 3   4 dB in these configurations     When installing an RF splitter  the input connector should always face the source of the  RF signal  The output connectors  sometimes called  taps   are connected facing the  destination of the RF signal  the antenna   Figure 5 29 shows two examples of RF  splitters  Figure 5 30 illustrates how an RF splitter would be used in a wireless LAN  installation     Splitters may be used to keep track of power output on a wireless LAN link  By hooking  a power meter to one output of the splitter and the RF antenna to the other  an  administrator can actively monitor the output at any given time  In this scenario  the  power meter  the antenna  and the splitter must all have equal impedance  Although not a  common practice  removing the power meter from one output of the splitter and replacing  it with a 50 ohm dummy load would allow the administrator to move the power meter  from one connection point to another throughout the wireless LAN while making output  power measurements     Power splitters are yet another device that can be used as part of a wireless LAN  Keep  in mind that the splitter MUST be part of a certified system if used in your wireless LAN     136 Chapter 5     Antennas and Accessories    FIGURE 5 29 Sample
199. d for PCF mode  and the some of the clients are configured for  polling  the process is as follows     l   2     The access point broadcasts a beacon     During the contention free period  the access point polls stations to see if any  station needs to send data     If a station needs to send data  it sends one frame to the access point in response  to the access point   s poll    Ifa station does not need to send data  it returns a null frame to the access point  in response to the access point   s poll    Polling continues throughout the contention free period    Once the contention free period ends and the contention period begins  the access  point can no longer poll stations  During the contention period  stations using  DCF mode contend for the medium and the access point uses DCF mode     The superframe ends with the end of the CP  and a new one begins with the  following CFP     Think of the CFP as using a  controlled access policy  and the CP as using a  random  access policy   During the CFP  the access point is in complete control of all functions  on the wireless network  whereas during the CP  stations arbitrate and randomly gain  control over the medium  The access point  in PCF mode  does not have to wait for the  DIFS to expire  but rather uses the PIFS  which is shorter than the DIFS  in order to  capture the medium before any client using DCF mode does  Since the access point  captures the medium and begins polling transmissions during the CFP  the DCF clien
200. d meet the IEEE standard of  lt 8 uS     Reusable     Gas tube breakdown voltage     Connector types     Frequency response     Impedance     Insertion loss     VSWR rating     Warranty    IEEE Standards    Most lightning arrestors are able to trigger a short to Earth ground in under 2  microseconds  uS   but the IEEE specifies that this process should happen in no more  than 8 uS  It is very important that the lightning arrestor you choose at least meet the  IEEE standard     Reusable Units    Some lightning arrestors are reusable after a lightning strike  and some are not  It is more  cost effective to own an arrestor that can be used a number of times  Some reusable  models have replaceable gas discharge tube elements that are cheaper to replace than the  entire lightning arrestor  Other models may have physical characteristics that allow the  lightning arrestor to do its job properly multiple times with no replaceable parts     134 Chapter 5     Antennas and Accessories    Voltage Breakdown    Some lightning arrestors support the passing of DC voltage for use in powering RF  amplifiers and others do not  A lightning arrestor should be able to pass the DC voltage  used in powering RF amplifiers if you plan on placing an RF amplifier closer to the  antenna than the lightning arrestor  The gas tube breakdown voltage  the voltage at  which the arrestor begins shorting current to ground  should be higher than the voltage  required to operate in line RF amplifiers  It is sugges
201. d spectrum is in opposition to that mission  since it uses much wider frequency bands than is necessary to transmit the information   This brings us to the first requirement for a signal to be considered spread spectrum  A  signal is a spread spectrum signal when the bandwidth is much wider than what is  required to send the information     Figure 3 1 illustrates the difference between narrowband and spread spectrum  transmissions  Notice that one of the characteristics of narrow band is high peak power   More power is required to send a transmission when using a smaller frequency range  In  order for narrow band signals to be received  they must stand out above the general level  of noise  called the noise floor  by a significant amount  Because its band is so narrow  a  high peak power ensures error free reception of a narrow band signal     Chapter 3     Spread Spectrum Technology 47    FIGURE 3 1 Narrow band vs  spread spectrum on a frequency domain    Narrowband   High Peak Power          Spread Spectrum   Low Peak Power     A compelling argument against narrowband transmission   other than the high peak  power required to send it   is that narrow band signals can be jammed or experience  interference very easily  Jamming is the intentional overpowering of a transmission  using unwanted signals transmitted on the same band  Because its band is so narrow   other narrow band signals  including noise  can completely eliminate the information by  overpowering a narrowband tr
202. d that wireless  LANs can use the Industrial  Scientific  and Medical  ISM  bands  which are license free   The ISM bands are located starting at 902 MHz  2 4 GHz  and 5 8 GHz and vary in width  from about 26 MHz to 150 MHz     In addition to the ISM bands  the FCC specifies three Unlicensed National Information  Infrastructure  UNII  bands  Each one of these UNII bands is in the 5 GHz range and is  100 MHz wide  Figure 6 1 illustrates the ISM and UNII bands available     Chapter 6     Wireless LAN Organizations and Standards 155    FIGURE 6 1 ISM and UNII Spectra    UNII  ISM IEEE  amp  FCC     5 15    5 25   5 725    IEEE   24000 24895 Ghz 5 25 GHz   5 35 GHz  5 825 GHz  Fcc    2 4000 2 5000 GHz    2 400 2 425 2 450 2 475 2 500  GHz                 5 000 5 250 5 500 5 750 6 000  GHz ISM    FCC   5 725 5 875 GHz    5 725 5 775 5 825 5 875  GHz           ISM    FCC    902 928MHz    900 910 920 930  MHz         N  Maritime  Radio Astronomy Research  Navigation    10 100 1 10  MHz MHz GHz GHz    Advantages and Disadvantages of License Free Bands    When implementing any wireless system on a license free band  there is no requirement  to petition the FCC for bandwidth and power needs  Limits on the power of transmission  exist  but there is no procedure for receiving permission to transmit at such power   Furthermore  there are no licensing requirements and  thus  no cost associated with  licensing  The license free nature of the ISM and UNII bands is very important because  it 
203. d the data     Point Coordination Function    Point Coordination Function  PCF  is a transmission mode allowing for contention free  frame transfers on a wireless LAN by making use of a polling mechanism  PCF has the    Chapter 8     MAC and Physical Layers 217    advantage of guaranteeing a known amount of latency so that applications requiring QoS   voice or video for example  can be used  When using PCF  the access point on a  wireless LAN performs the polling  For this reason  an ad hoc network cannot utilize  PCF  because an ad hoc network has no access point to do the polling     The PCF Process    First  a wireless station must tell the access point that the station is capable of answering  a poll  Then the access point asks  or polls  each wireless station to see if that station  needs to send a data frame across the network  PCF  through polling  generates a  significant amount of overhead on a wireless LAN        When using PCF  only one access point should be on each non overlapping channel to  avoid much degraded performance due to co channel interference     DCF can be used without PCF  but PCF cannot be used without DCF  We will explain  how these two modes co exist as we discuss interframe spacing  DCF is scalable due to  its contention based design  whereas PCF  by design  limits the scalability of the wireless  network by adding the additional overhead of polling frames     Interframe Spacing    Interframe spacing doesn   t sound like something an administrat
204. d the information    Chapter 3     Spread Spectrum Technology 67    19  Some 2 4 GHz FHSS systems operate at 3 Mbps or more  Which of the following is  true regarding these systems     20     A     B  C   D    They are always IEEE 802 11 compliant   They may not interoperate with other FHSS systems  They are always OpenAir compliant   They are backwards compatible with 900 MHz systems    How many different types of implementations of spread spectrum technology does  the FCC specify for the 2 4 GHz ISM band     A     B  C   D    1  2  3    68 Chapter 3     Spread Spectrum Technology    Answers to Review Questions    1     10     A  The dwell time is the time spent by a transmitter on a certain frequency actually  transmitting data  The longer a transmitter stays on a given frequency  the higher  the throughput of the system will be  Hopping between frequencies takes time and  takes away from the system throughput     D  400 ms is the legal limit on dwell time per the FCC  This dwell time is also the  most advantageous for systems with the goal of maximized throughput     A  Using Direct Sequence technology within the 2 4 GHz ISM allows only three  non overlapping channels within the 83 5 MHz allotted by the FCC  These channels  are 1 6   amp  11     B  Six IEEE 802 11 compliant access points  synchronized to have absolutely no  collisions  would yield a maximum data rate of 12 Mbps because each system has a  maximum data rate of 2 Mbps  Three 802 11b compliant access points on
205. dard describing the operation  of wireless LANs     A  802 11  B  802 11a  C  802 11b  D  802 11g    Chapter 6     Wireless LAN Organizations and Standards 173    Answers to Review Questions    1     10     11     D  The 802 11 standard specifies data rates for FHSS  DSSS  and infrared  technologies  The two speeds specified by the 802 11 standard are 1 Mbps and 2  Mbps  Speeds for DSSS were thereafter amended with the 802 11b standard to add  both 5 5  amp  11 Mbps speeds     A  Each of the three 5 GHz UNII bands are exactly 100 MHz wide  The lower band  ranges from 5 15   5 25 GHz  The middle band ranges from 5 25   5 35 GHz  The  upper band ranges from 5 725   5 825 GHz     A  B  The FCC mandates which frequencies may be used for what purposes  They  specify which frequency bands will be licensed or unlicensed  and they specify the  maximum output power within each frequency band     B  C  Note that the most popular ISM band in use today is the 2 4 GHz ISM band   not the 2 4 MHz ISM band  There are three ISM bands specified by the FCC  The  first is the 902   928 MHz band  The second is the 2 4000   2 5000 GHz band  and  the third is the 5 825   5 875 GHz band     D  Although the most significant changes from the original 802 11 standard was the  additional data rates of 5 5  amp  11 Mbps  the 1  amp  2 Mbps data rates are still specified  in 802 11b for backwards compatibility with the 802 11 standard     B  The 802 11b standard only specifies use of DSSS technology  The 
206. data is then delivered according  to CSMA CA medium access rules     7  A  The terms ad hoc and JBSS are interchangeable  Both indicate a lack of an  access point in a wireless LAN where stations are communicating directly with each  other     8  A C  The 802 11 standard specifies use of only two processes of authentication   These processes are Shared Key authentication and Open System authentication  In  order to comply with the 802 11 standard  the default setting on a system must be  Open System authentication  The reason the IEEE specified Open System as the  default authentication method was to aid in ease of installation and configuration  when receiving an access point or client station device from the manufacturer for the  first time     9  B D  The advantage of using PSP mode is prolonged battery life on mobile  stations  The drawback of using PSP is the additional overhead of PSP frames on  the network  Of course  PSP frames are short and don t add very much overhead so  overhead is likely not a big consideration in deciding on using PSP mode on  stations     10     11     12     13     14     15     16     17     18     19     20     Chapter 7     802 11 Network Architecture 209    A  In an ad hoc  IBSS  network  there is no access point to buffer packets for  sleeping stations  Stations communicate directly with each other in an IBSS   creating the need for each station to buffer packets for each sleeping destination  station for which it has packets buffered    
207. de  Each of these modes is described below     Root Mode    One bridge in each group of bridges must be set as the root bridge  A root bridge can  only communicate with non root bridges and other client devices and cannot associate  with another root bridge  Figure 4 9 illustrates a root bridge communicating with non   root bridges     82 Chapter 4     Wireless LAN Infrastructure Devices    FIGURE 4 9 A root bridge communicating with non root bridges    2    Server f        Bridge       Bridge   non root     Non root Mode    Wireless bridges in non root mode attach  wirelessly  to wireless bridges that are in root  mode  Some manufacturers    wireless bridges support client connectivity to non root  mode bridges while the bridge is in access point mode  This mode is actually a special  mode where the bridge is acting as both an access point and as a bridge simultaneously   Client devices associate to access points  or bridges in access point mode  and bridges  talk to bridges     When using the Spanning Tree Protocol  all non root bridges must have connectivity to  the root bridge     Access Point Mode    Some manufacturers give the administrator the ability to have clients connect to bridges   which is actually just giving the bridge access point functionality  In some cases  the  bridge has an    access point    mode that converts the bridge into an access point entirely     Repeater Mode    Wireless bridges can also be configured as repeaters  as shown in Figure 4 10  In  
208. de such that they can  be repaired  but not attached to non certified matching intentional radiators     One common question that we would like to address regarding CFR 15 204 is that one  manufacturer s antennas may not be used with another manufacturer s intentional radiator   bridge  PC Card  or access point for example  without FCC certification as a system   This ruling directly affects those individuals that would connect a Pringles can antenna to  a PC Card for the purpose of war driving     When purchasing an RF amplifier for use as part of a wireless LAN  ask for a copy of the  FCC certification documenting use of the amplifier BEFORE you purchase  There are  two classes of changes that can be made to an FCC certification  First is a class I change   This type of change can be made by the manufacturer who may document a change that  has no negative affect on RF propagation or signal density  increasing interference with  other systems in your immediate environment  by noting on the FCC certificate and then    130 Chapter 5     Antennas and Accessories    writing a brief synopsis on what the change involved and why it had no negative affect   A class II change is a change that does negatively affect RF propagation or signal density  and requires that the system be recertified by the FCC     RF Attenuators    An RF attenuator is a device that causes precisely measured loss  in    dB  in an RF signal   While an amplifier will increase the RF signal  an attenuator will d
209. dging can take on either of these  configurations  Clients cannot connect to wireless bridges  and wireless bridges are  not security devices     6  A  Ifhighly directional antennas are misaligned only slightly  it can result in a loss  of throughput in the wireless link  For this reason  administrators often use semi   directional antennas in order to simplify the task of alignment and to minimize the  chance of misalignment caused by things such as wind loading     7  D  Wireless residential gateways  which are sometimes referred to as SOHO  devices  provide the necessary connectivity for both wired and wireless clients in a  small network environment  Additionally  these gateways provide needed upstream  Internet connectivity and internal functionality  such as DHCP  that eases  administrative overhead     8  C  Some wireless enterprise gateways support role based access control  RBAC   where profiles can be attached to user accounts allowing specific types of access  functionality  such as rate limiting  on a per user basis     9  B  Access points and bridges are typically mounted inside the building unless  placed in a weatherproof enclosure  It is often more economical to place access  points and bridges indoors  requiring that the antenna be detachable  Mounting the  antenna outdoors and running a long cable between the antenna and access point  allow the administrator to protect the access point against weather and theft     102 Chapter 4     Wireless LAN Infrastructu
210. ding rods can prevent damage to the wireless LAN equipment and might even save  the life of anyone climbing on the tower if the tower is struck by lightning     Maintenance    To prevent moisture entry into antenna cable  seal all external cable connectors using  commercial products such as coax compatible electrical tape or Coax Seal  Moisture that  has entered connectors and cabling is very difficult to remove  It is usually more  economical to replace the cable and connectors than to remove the moisture  Connectors  and cables with any amount of water will likely make the RF signal erratic and can cause  significant signal degradation because the presence of water will change the cable   s  impedance  and hence the VSWR     When installing outdoor RF cabling  make sure to mount connectors facing downward  and use drip loops in the cabling so that water will be directed away from points where  moisture is likely to enter connections  Check seals periodically  Sealant materials can  sometimes dry rot when exposed to the sun for long periods of time and may need  replacing from time to time     Power over Ethernet  PoE  Devices    Power over Ethernet  PoE  is a method of delivering DC voltage to an access point   wireless bridge  or wireless workgroup bridge over the Cat5 Ethernet cable for the  purpose of powering the unit  PoE is used when AC power receptacles are not available  where wireless LAN infrastructure devices are to be installed  The Ethernet cable is used  to ca
211. due to their spread spectrum characteristics  A DSSS signal is more  susceptible to narrow band interference than FHSS because the DSSS band is much  smaller  22 MHz wide instead of the 79 MHz wide band used by FHSS  and the  information is transmitted along the entire band simultaneously instead of one frequency  ata time  With FHSS  frequency agility and a wide frequency band ensures that the  interference is only influential for a small amount of time  corrupting only a small portion  of the data     FCC Rules affecting DSSS    Just as with FHSS systems  the FCC has regulated that DSSS systems use a maximum of  1 watt of transmit power in point to multipoint configurations  The maximum output  power is independent of the channel selection  meaning that  regardless of the channel  used  the same power output maximum applies  This regulation applies to spread  spectrum in both the 2 4 GHz ISM band and the upper 5 GHz UNII bands  discussed in  Chapter 6      Comparing FHSS and DSSS    Both FHSS and DSSS technologies have their advantages and disadvantages  and it is  incumbent on the wireless LAN administrator to give each its due weight when deciding  how to implement a wireless LAN  This section will cover some of the factors that  should be discussed when determining which technology is appropriate for your  organization  including      Narrowband interference     Co location     Cost     Equipment compatibility  amp  availability     Data rate  amp  throughput     Securit
212. dular  Radio Cards    Some manufacturers allow you to add and remove radios to and from built in PCMCIA  slots on the access point  Some access points may have two PCMCIA slots for special  functionality  Having two radio slots in an access point allows one radio card to act as an  access point while the other radio card is acting as a bridge  in most cases a wireless  backbone   Another somewhat dissimilar use is to use each radio card as an independent  access point  Having each card act as an independent access point allows an  administrator to accommodate twice as many users in the same physical space without  the purchase of a second access point  further reducing costs  When the access point is  configured in this manner  each radio card should be configured on a non overlapping  channel  ideally channels 1 and 11  respectively     Variable Output Power    Variable output power allows the administrator to control the power  in milliwatts  that  the access point uses to send its data  Controlling the power output may become  necessary in some situations where distant nodes cannot locate the access point  It also  may simply be a luxury that allows you to control the area of coverage for the access  point  As the power output is increased on the access point  clients will be able to move  farther away from the access point without losing connectivity  This feature can also aid  in security by allowing for proper sizing of RF cells so that intruders cannot connect to  the 
213. e   a    i    ee  ey GED                                                                                                                                                                                                                                                                                                                            Semi directional Antennas    FIGURE 5 7    Semi directional antennas come in many different styles and shapes  Some semi   directional antennas types frequently used with wireless LANs are Patch  Panel  and Yagi   pronounced    Y AH gee     antennas  All of these antennas are generally flat and designed  for wall mounting  Each type has different coverage characteristics  Figure 5 7 shows  some examples of semi directional antennas     Sample semi directional antennas    b    Yagi Antenna Patch Antenna Panel Antenna    These antennas direct the energy from the transmitter significantly more in one particular  direction rather than the uniform  circular pattern that is common with the omni   directional antenna  Semi directional antennas often radiate in a hemispherical or  cylindrical coverage pattern as can be seen in Figure 5 8     FIGURE 5 8    FIGURE 5 9    Chapter 5     Antennas and Accessories 111    Coverage area of a semi directional antenna    Directional Patch Antenna Directional Yagi Antenna    Usage    Semi directional antennas are ideally suited for short and medium range bridging  For  example  two office buildings that are acro
214. e WEP key on each side of the connection  during authentication  Rather  the WEP key is used only for encrypting data once the  client is authenticated and associated     Open System authentication is used in several scenarios  but there are two main reasons  to use it  First  Open System authentication is considered the more secure of the two  available authentication methods for reasons explained below  Second  Open System  authentication is simple to configure because it requires no configuration at all  All  802 11 compliant wireless LAN hardware is configured to use Open System  authentication by default  making it easy to get started building and connecting your  wireless LAN right out of the box     Shared Key Authentication    Shared Key authentication is a method of authentication that requires use of WEP  WEP  encryption uses keys that are entered  usually by the administrator  into both the client  and the access point  These keys must match on both sides for WEP to work properly   Shared Key authentication uses WEP keys in two fashions  as we will describe here     Shared Key Authentication Process  The authentication process using Shared Key authentication occurs as follows   1  A client requests association to an access point     this step is the same as that of    Open System authentication     2  The access point issues a challenge to the client     this challenge is randomly  generated plain text  which is sent from the access point to the client in the clear
215. e a eee    Access Point Modes    Access points communicate with their wireless clients  with the wired network  and with  other access points  There are three modes in which an access point can be configured        Root Mode   Repeater Mode    Bridge Mode    Each of these modes is described below     74 Chapter 4      Wireless LAN Infrastructure Devices    Root Mode    Root Mode is used when the access point is connected to a wired backbone through its  wired  usually Ethernet  interface  Most access points that support modes other than root  mode come configured in root mode by default  When an access point is connected to  the wired segment through its Ethernet port  it will normally be configured for root mode   When in root mode  access points that are connected to the same wired distribution  system can talk to each other over the wired segment  Access points talk to each other to  coordinate roaming functionality such as reassociation  Wireless clients can  communicate with other wireless clients that are located in different cells through their  respective access points across the wired segment  as shown in Figure 4 3     FIGURE 4 3 An access point in root mode    e  ee  snes   aa 5S    wee j 7 P N      ae     eas       A b      Access Point      A a l  Root Mode          S4       go we     a Access Point ia   eS i    hee Mode    X             l o Data   t   Z  l 7     7        7   R  7                           N    7   Coverage Area Z    N 7  N S 2 Pa    Bridge Mode 
216. e affects throughput   Using a dwell time of 100 ms  4 times as many hops must be made as when using a 400  ms dwell time  This additional hopping time decreases system throughput     Normally  frequency hopping radios will not be programmed to operate at the legal limit   but instead  provide some room between the legal limit and the actual operating range in  order to provide the operator with the flexibility of adjustment  By adjusting the dwell  time  an administrator can optimize the FHSS network for areas where there is either  considerable interference or very little interference  In an area where there is little  interference  longer dwell time  and hence greater throughput  is desirable  Conversely   in an area where there is considerable interference and many retransmissions are likely  due to corrupted data packets  shorter dwell times are desirable     54 Chapter 3     Spread Spectrum Technology    FCC Rules affecting FHSS    On August 21  2000  the FCC changed the rules governing how FHSS can be  implemented  The rule changes allowed frequency hopping systems to be more flexible  and more robust  The rules are typically divided into    pre  8 31 2000    rules and    post   8 31 2000    rules  but the FCC allows for some decision making on the part of the  manufacturer or the implementer  If a manufacturer creates a frequency hopping system  today  the manufacturer may use either the    pre  8 31 2000    rules or the    post   8 31 2000    rules  depending on his 
217. e best sales tool that a network integration firm has at its  disposal  Performing a quality site survey can  and many times should  lead to your  organization performing the installation and integration of the wireless LAN for which  the site survey was done     Preparing for a Site Survey    The planning of a wireless LAN involves collecting information and making decisions   The following is a list of the most basic questions that must be answered before the actual  physical work of the site survey begins  These questions are purposely open ended  because each one results in more information being passed from the client to the  surveyor  thus making the surveyor better prepared to go on site and do the site survey   Most  if not all  of these questions can be answered via phone  fax  or email  assuming the  people with the answers to the questions are available  Again  the more prepared one is  before arriving at the site  with a site survey toolkit   the more valuable the time on site  will be  Some of the topics you may want to question the network management about  before performing your site survey       Facilities Analysis     Existing Networks     Area Usage  amp  Towers     Purpose  amp  Business Requirements     Bandwidth  amp  Roaming Requirements    a Available Resources    310 Chapter 11     Site Survey Fundamentals      Security Requirements    Facility Analysis  What kind of facility is it     This question is very basic  but the answer can make a big impact o
218. e cells on different non overlapping channels are alternately spread throughout an  area to avoid co channel interference     Use 802 11a Equipment    As a second option  you could use 802 11a compliant equipment operating in the 5 GHz  UNII bands  The 5 GHz UNII bands  which are each wider than the 2 4 GHz ISM band   have three usable bands  and each band allows for four non overlapping channels  By  using a mixture of 802 11b and 802 11a equipment  more systems can be co located in  the same space without fear of interference between systems  With two  or three  co   located 802 11b systems and up to 8 co located 802 11a systems  there is the potential for  an incredible amount of throughput in the same physical space  The reason that we  specify 8 instead of 12 co located access points with 802 11a is that only the lower and  middle bands  with 4 non overlapping channels each  are specified for indoor use   Therefore  indoors  where most access points are placed  there s normally only the  potential for up to 8 access points using 802 11a compliant devices     Issues with 802 11a Equipment    802 11a equipment is now available from only a few vendors  and is more expensive than  equipment that uses the 2 4 GHz frequency band  However  the 5 GHz band has the  advantage of many more non overlapping channels than the 2 4 GHz band  8 vs  3    allowing you to implement many more co located access points     You must keep in mind that while the 2 4 GHz band allows for less expen
219. e discussed earlier  this piece of  information is easily obtained  The perpetrator would have to know the network   s WEP  keys if WEP is being used on the network  Upstream  facing the network core   connectivity from the rogue access point is handled through use of a client device such as  a PC card or workgroup bridge  Many times  man in the middle attacks are orchestrated  using a single laptop computer with two PCMCIA cards  Access point software is run on  the laptop computer where one PC card is used as an access point and a second PC card is  used to connect the laptop to nearby legitimate access points  This configuration makes  the laptop a  man in the middle   operating between clients and legitimate access points   A man in the middle hacker can obtain valuable information by running a sniffer on the  laptop in this scenario    One particular problem with the man in the middle attack is that the attack is  undetectable by users  That being the case  the amount of information that a perpetrator  can gather in this situation is limited only by the amount of time that the perpetrator can  stay in place before getting caught  Physical security of the premises is the best remedy  for the man in the middle attack     Chapter 10     Wireless LAN Security 287    Emerging Security Solutions    Because wireless LANs are not inherently secure  and because WEP is not an end to end  security mechanism for enterprise wireless LANs  there is a significant opportunity for  other
220. e greatest source of loss in a wireless system  Below is the formula  for Path Loss     PathLoss   20106  H lap        You will not be tested on the Path Loss formula in the CWNA exam  but it is provided  for your administrative reference     The 6dB Rule    Close inspection of the Path Loss equation yields a relationship that is useful in dealing  with link budget issues  Each 6 dB increase in EIRP equates to a doubling of range   Conversely  a 6 dB reduction in EIRP translates into a cutting of the range in half  Below  is a chart that gives you a rough estimate of the Path Loss for given distances between  transmitter and receiver at 2 4 GHz                                      Distance Loss  in dB   100 meters 80 23   200 meters 86 25   500 meters 94 21   1 000 meters 100 23  2 000 meters 106 25  5 000 meters 114 21  10 000 meters 120 23          eS This chart above is provided for your reference  and is not tested on the CWNA exam     Antenna Installation    It is very important to have proper installation of the antennas in a wireless LAN  An  improper installation can lead to damage or destruction of your equipment and can also  lead to personal injury  Equally as important as personal safety is good performance of  the wireless LAN system  which is achieved through proper placement  mounting   orientation  and alignment  In this section we will cover       Placement    Mounting      Appropriate Use    118 Chapter 5     Antennas and Accessories      Orientation    Alig
221. e installed     A  Inthe center of the building on the roof  B  In the center of the building on the ceiling  C  Inone of the corners of the building   D  On one of the walls of the building    When purchasing RF connectors  which of the following should be considered when  making your decision  Choose all that apply     A  Impedance   B  Insertion loss   C  Gain   D  Maximum frequency allowed    You have been hired as a consultant to install a wireless LAN that will connect only  two buildings that are 1 5 miles  2 5 km  apart at 11 Mbps  Which one of the  following antennas would you use     A  Omni directional  B  High gain Dipole  C  High gain Yagi  D  Parabolic dish    You have been hired as a consultant to install a wireless LAN that will connect two  buildings that are 10 miles  16 7 km  apart  In this particular area  wind gusts are a  problem  Which one of the following antennas would you use     A  High gain Grid  B  High gain Dipole  C  High gain Yagi  D  Parabolic dish    Chapter 5     Antennas and Accessories 147    You have been hired as a consultant to install a wireless LAN that will connect four  buildings that are 100 meters apart  Which of the following antennas could you use   Choose all that apply     A  4 dipole antennas   B  4 patch antennas   C  1 dipole and 3 patch antennas   D  2 parabolic dish antennas and 2 Yagi antennas  E  4 panel antennas    A wireless LAN installation has a 50 meter cable running between the access point  and a highly direction
222. e regulations that govern the technical requirements  licensing  and    usage of wireless LANs in the United States     A  IEEE  B  WECA  C  FCC   D  ETSI    Chapter 1   Introduction to Wireless LANs 15    Answers to Review Questions    1     10     A  The most alluring feature of a wireless network is the freedom to move about  while remaining connected to the network  Wired networks cannot offer this  feature     D  Generally speaking  computers that are rack mounted together are servers  and  servers should be connected to a high speed  wired backbone  Wireless networks  are meant for mobile access rather than server room connectivity     A  B  D  Cabling a facility is a time consuming and expensive task  Wireless  networks can quickly and inexpensively be installed and configured     C  Wireless Internet Service Providers  WISPs  provide last mile data delivery  service to homes and businesses  In this fashion  they compete directly against  wired ISPs such as telephone and cable companies     B  The access layer of the industry standard design model is where users attach to  the network  Wireless network devices are most generally installed in this capacity   There are times when wireless networks may be used in a distribution role  such as  building to building bridging  but a very large percentage of wireless networks are  used strictly for access     A  B  In the setup and teardown of a mobile office  cabling is the most significant  task  In a small office  many of t
223. e set of  documentation  drawings  recording of data  etc    Site surveying  like anything else   takes practice to become effective  Making decisions that affect the use of time are very  important because site surveying is a very time consuming task     334 Chapter 11     Site Survey Fundamentals    Throughput Tests  amp  Capacity Planning    There is another type of measurement  outside of the typical SNR  noise   amp  signal  strength that we ve discussed thus far  that can be performed by the site surveyor which  will yield valuable information to the wireless network design engineer  and that is doing  throughput testing from various points throughout the facility  The point of doing all of  this coverage and data rate documentation is to understand and control what the user s  experience will be on the wireless LAN  Doing live throughput tests such as file transfers  to and from an FTP server will give the site surveyor a more thorough look at what the  user might experience  Sometimes this test is not possible due to a lack of wired  infrastructure connectivity  but it is a valuable option when it is available     Planning for user capacity is very important if the user is to make productive use of the  wireless LAN  From the answers provided by the network manager or administrator  you  will know to look for locations within the facility where there are different types of user  groups present  For example  if one 50    x 50    area were to house 20 people who work  f
224. e surveying is not an exact science  which is why thoroughness and attention to detail  are required  Record the measurements for the general areas of the room  including  measuring the furthest point from the access point  every corner of the room  and every  point in the room at which there is no signal or the data rate changes  either increases or  decreases   Points of measurement should be determined by the answers to the questions  that were asked before you arrived on site to do the survey  Information such as where  users will be sitting in a room  where users will be able to roam  the types of users  heavy  file transfer or bar code scanning  for example   and locations of break rooms with  microwave ovens in them will all help determine for which points data rate and range  should be recorded     Chapter 11     Site Survey Fundamentals 333    Data Rate Boundaries    Be sure to record the data rate boundaries  These boundaries are also known as the  concentric zones around the access point  If you are using an 802 11b wireless LAN  for  example  record where the data rate decreases from 11 Mbps to 5 5Mbps to 2Mbps to  1Mbps  as shown in Figure 11 16  These boundaries should somewhat resemble  concentric circles  with the slower data rate areas further from the access point than the  higher data rates  The client organization must be told that when a user roams out past  the coffee machine to the mailroom  that user will not get the highest possible throughput  due to
225. e susceptible to narrowband interference than a FHSS  channel because of which of the following  Choose all that apply     A  The DSSS channel is much smaller  22 MHz wide instead of the 79 MHz wide  band used by FHSS     B  The information is transmitted along the entire band simultaneously instead of  one frequency at a time    C  FHSS systems simply avoid the frequency on which the narrowband  interference is located    D  FHSS systems only use one frequency at a time  so the narrowband interference  must be on the same exact frequency at the same time    The noise floor is defined by which one of the following    A  The general level of RF noise in the environment around the wireless LAN  B  The noise that is generated as a result of foot traffic   C  A fixed level of  100 dBm    D  The level of noise at which a wireless LAN starts working    Which one of the following is not described by the IEEE and OpenAir standards  regarding FHSS systems     A  What frequency bands may be used  Hop sequences  Allowable levels of interference    Dwell times    moo    Data rates    An RF signal is considered spread spectrum when which of the following are true   Choose all that apply     A  The system sending the signal is using infrared technology    B  The power required to send the information is significantly greater than is  necessary    C  The bandwidth used is much wider than what is required to send the  information    D  The bandwidth used is much less than what is used to sen
226. e to have as many as 79 synchronized  co located access points  with  this many systems  each frequency hopping radio would require precise synchronization  with all of the others in order not to interfere with  transmit on the same frequency as   another frequency hopping radio in the area  The cost of such a set of systems is  prohibitive and is generally not considered an option  If synchronized radios are used   the expense tends to dictate 12 co located systems as the maximum     If non synchronized radios are to be used  then 26 systems can be co located in a wireless  LAN  this number is considered to be the maximum in a medium traffic wireless LAN   Increasing the traffic significantly or routinely transferring large files places the practical  limit on the number of co located systems at about 15  More than 15 co located  frequency hopping systems in this environment will interfere to the extent that collisions  will begin to reduce the aggregate throughput of the wireless LAN     Dwell Time    When discussing frequency hopping systems  we are discussing systems that must  transmit on a specified frequency for a time  and then hop to a different frequency to  continue transmitting  When a frequency hopping system transmits on a frequency  it  must do so for a specified amount of time  This time is called the dwell time  Once the  dwell time has expired  the system will switch to a different frequency and begin to  transmit again     Suppose a frequency hopping system
227. e to the access point    OOF SN SON ae ER  TS     The access point forwards the EAP authorization response to the authentication  server    9  The authentication sends an EAP success message to the access point    10  The access point forwards the EAP success message to the client and places the  client s port in forward mode    Chapter 10     Wireless LAN Security 291    FIGURE 10 11 Two Logon Processes    User sees a NT Domain  double logon Controller             Layer 7     gt   Day RADIUS   j a Server  Layer 2  LDAP Server  User sees a NT Domain  single logon Controller  Layer 7                              __ gt   eS P RADIUS       Layer 2 Server       When 802 1x with EAP is used  a situation arises for an administrator in which it is  possible to have a double logon when powering up a notebook computer that is attached  wirelessly and logging into a domain or directory service  The reason for the possible  double logon is that 802 1x requires authentication in order to provide layer 2  connectivity  In most cases  this authentication is done via a centralized user database  If  this database is not the same database used for client authentication into the network   such as with Windows domain controllers  Active Directory  NDS  or LDAP   or at least  synchronized with the database used for client authentication  then the user will  experience two logons each time network connectivity is required  Most administrators  choose to use the same database for MAC layer connec
228. e wireless LAN administrator so that  necessary security precautions can be taken  Such precautions should include  at a  minimum  resetting MAC filters  changing WEP keys  etc     Having guards make periodic scans around the company premises looking specifically  for suspicious activity is effective in reducing netstumbling  Security guards that are  trained to recognize 802 11 hardware and alerting company personnel to always be on the  lookout for non company personnel lurking around the building with 802 11 based  hardware is also very effective in reducing on premises attacks     Wireless LAN Equipment Inventory  amp  Security Audits    As a complement to the physical security policy  all wireless LAN equipment should be  regularly inventoried to account for authorized and prevent unauthorized use of wireless  equipment to access the organization   s network  If the network is too large and contains  a significant amount of wireless equipment  periodic equipment inventories might not be  practical  In cases such as these  it is very important to implement wireless LAN security  solutions that are not based on hardware  but rather based on usernames and passwords or  some other type of non hardware based security solution  For medium and small wireless  networks  doing monthly or quarterly hardware inventories can motivate users to report  hardware loss or theft     Periodic scans of the network with sniffers  in a search for rogue devices  are a very  valuable way of kee
229. e with a complete site survey toolkit  walking several miles throughout the  client   s facility is common  RF site surveying is 10  surveying and 90  walking  so  comfortable shoes should be worn when performing site surveys in large facilities   However  the general task has not changed  collecting and recording information   Beginning your site survey with the more general tasks of recording non RF related  information is usually the best course of action     Indoor Surveys    For indoor surveys  locate and record the following items on a copy of the facility  blueprints or a drawing of the facility      AC power outlets and grounding points     Outdoor power receptacles and weatherproof enclosure availability     Wired network connectivity points      Ladders or lifts that will be needed for mounting access points      Potential RF obstructions such as fire doors  metal blinds  metal mesh windows   etc       Potential RF sources such as microwave ovens  elevator motors  baby monitors   2 4 GHz cordless phones  etc  Figure 11 13 shows a spectrum analysis of a 2 4  GHz phone       Cluttered areas such as office cubical farms    Chapter 11     Site Survey Fundamentals 329    FIGURE 11 13 2 4 GHz DSSS phone as seen by a spectrum analyzer                    Spa x    Signal Strength vs  Frequency       i  9  n  a       S  t    r  e  n  g  t         AM  Oar ee ee eee ee ee ee ee a ee Bee  Frequencies  GH2z  X  2402 Legend T  2 480     Peak Hold     Sampling Rate    vege    C Sto
230. ead Spectrum Technology    Frequency Hopping Spread Spectrum  FHSS     Frequency hopping spread spectrum is a spread spectrum technique that uses frequency  agility to spread the data over more than 83 MHz  Frequency agility refers to the radio   s  ability to change transmission frequency abruptly within the usable RF frequency band   In the case of frequency hopping wireless LANs  the usable portion of the 2 4 GHz ISM  band is 83 5 MHz  per FCC regulation and the IEEE 802 11 standard     How FHSS Works    FIGURE 3 2    In frequency hopping systems  the carrier changes frequency  or hops  according to a  pseudorandom sequence  The pseudorandom sequence is a list of several frequencies to  which the carrier will hop at specified time intervals before repeating the pattern  The  transmitter uses this hop sequence to select its transmission frequencies  The carrier will  remain at a certain frequency for a specified time  known as the dwell time   and then use  a small amount of time to hop to the next frequency  hop time   When the list of  frequencies has been exhausted  the transmitter will repeat the sequence     Fig  3 2 shows a frequency hopping system using a hop sequence of five frequencies over  a 5 MHz band  In this example  the sequence is     1  2 449 GHz  2  2 452 GHz  3  2 448 GHz  4  2 450 GHz  5  2 451 GHz    Single frequency hopping system    2 4835    2 4000       Transmission Frequency  GHz     Elapsed Time    Once the radio has transmitted the information on
231. ecified by the  IEEE 802 11 as the default setting in wireless LAN equipment  Using this method of  authentication  a station can associate with any access point that uses Open System  authentication based only on having the right service set identifier  SSID   The SSIDs  must match on both the access point and client before a client is allowed to complete the  authentication process  Uses of the SSID relating to security will be discussed in Chapter  10  Security   The Open System authentication process is used effectively in both secure  and non secure environments     Open System Authentication Process  The Open System authentication process occurs as follows     1  The wireless client makes a request to associate to the access point    2  The access point authenticates the client and sends a positive response and the  client becomes associated  connected     These steps can be seen in Figure 7 4     Chapter 7     802 11 Network Architecture 183    FIGURE 7 4 Open System Authentication Process    Communication Process    Client A request to Access Point    authenticate is sent        to the access point   A  The access point  authenticates    pe    The client connects  to the network    Open System authentication is a very simple process  As the wireless LAN  administrator  you have the option of using WEP  wired equivalent privacy  encryption  with Open System authentication  If WEP is used with the Open System authentication  process  there is still no verification of th
232. ecrease it  Why would  you need or want to decrease your RF signal  Consider the case where an access point  has a fixed output of 100mW  and the only antenna available is an omni directional  antenna with  20 dBi gain  Using this equipment together would violate FCC rules for  power output  so an attenuator could be added to decrease the RF signal down to 30mW  before it entered the antenna  This configuration would put the power output within FCC  parameters  Figure 5 24 shows examples of fixed loss RF attenuators with BNC  connectors  left  and SMA connectors  right   Figure 5 25 shows an example of an RF  step attenuator     FIGURE 5 24 A sample of a fixed loss RF attenuator       Common Options    RF attenuators are available as either fixed loss or variable loss  Like variable  amplifiers  variable attenuators allow the administrator to configure the amount of loss  that is caused in the RF signal with precision  Variable RF attenuators are not used in  wireless LAN systems due to the FCC s regulations on certified systems  They are  typically used in site surveys in order to determine antenna gain  necessity of amplifiers   etc     Chapter 5     Antennas and Accessories 131       A    FIGURE 5 26    Variable attenuators are not recommended because the settings could inadvertently be  changed  resulting in damage to the antenna or receiving equipment  Fixed RF  attenuators are recommended where the RF calculations are done ahead of time to  assure the signals are within
233. ecrease the watt value to one tenth of that value    300 mW   10dB   30 mW     These rules will allow a quick calculation of milliwatt power levels when given power  levels  gains  and losses in dBm and dB  Figure 2 14 shows that the reference point is  always the same  but power levels can move in either direction from the reference point  depending on whether they represent a power gain or loss     FIGURE 2 14 Power level chart        40  30  20  10 0  10  20  30  40  dBm dBm dBm dBm dBm dBm dBm dBm dBm  100 1 10 100 1 10 100 1 000 10 000  nW uW uW uW mW mW mW mW mW    12  9  6  3  0  3  6  9  12  dBm dBm dBm dBm dBm dBm dBm dBm dBm    lt   gt    62 5 125 250 500 1 2 4 8 16   uW uW uW uW mW mW mW mW mW    In the top chart of Figure 2 14  gains and losses of 10 dB are shown at each increment   Notice that a gain of  10 dB from the reference point of 1 mW moves the power to  10  dBm  10 mW   Conversely  notice that a loss of  10 dB moves the power to  10 dBm   100 microwatts   On the bottom chart  the same principal applies  These charts both  represent the same thing  except that one is incremented in gains and losses of 3 dB and  the other for gains and losses of 10 dB  They have been separated into two charts for  ease of viewing  Using these charts  one can easily convert dBm and mW power levels     Examples        43 dBm divided into 10 s and 3 s would equal  10  10  10  10  3  From the reference  point  the charts show you that you would multiply the milliwatt value  st
234. ed by 802 11 and 802 11b products on the market today  Barker Code and  Complimentary Code Keying  CCK  are the types of spreading codes used in 802 11 and  802 11b wireless LANs     226 Chapter 8  MAC and Physical Layers    FIGURE 8 10    As higher transmission speeds are specified  such as when a system is using DRS    modulation techniques change in order to provide more data throughput  For example   802 11g and 802 11a compliant wireless LAN equipment specify use of orthogonal  frequency division multiplexing  OFDM   allowing speeds of up to 54 Mbps  which is a  significant improvement over the 11 Mbps specified by 802 11b  Figure 8 10 shows the  modulation types used for 802 11a networks  The 802 11g standard provides backwards  compatibility by supporting CCK coding and even supports packet binary convolution  coding  PBCC  as an option  Bluetooth and HomeRF are both FHSS technologies that  use GFSK modulation technology in the 2 4 GHz ISM band     Modulation types and data rates for 802 11a                                           Coding Modulation Data  Technique Technology Rate  OFDM BPSK 6 Mbps  OFDM BPSK 9 Mbps  OFDM QPSK 12 Mbps  OFDM QPSK 18 Mbps  OFDM 16QAM 24 Mbps  OFDM 16QAM 36 Mbps  OFDM 64QAM 48 Mbps  OFDM 64QAM 54 Mbps       Orthogonal frequency division multiplexing  OFDM  is a communications technique that  divides a communications channel into a number of equally spaced frequency bands  A  subcarrier carrying a portion of the user information is transm
235. ed network is important  it is even  more important for a company that uses wireless LAN technology  For reasons discussed  earlier  a person that has a wireless PC Card  and maybe an antenna  does not have to be  in the same building as the network to gain access to the network  Even intrusion  detection software is not necessarily enough to prevent wireless hackers from stealing  sensitive information  Passive attacks leave no trace on the network because no  connection was ever made  There are utilities on the market now that can see a network  card that is in promiscuous mode  accessing data without making a connection     Chapter 10     Wireless LAN Security 293    When WEP is the only wireless LAN security solution in place  tight controls should be  placed on users who have company owned wireless client devices  such as not allowing  them to take those client devices off of company premises  Since the WEP key is stored  in the client device   s firmware  wherever the card goes  so does the network   s weakest  security link  The wireless LAN administrator should know who  where  and when each  PC card is taken from the organization   s facilities     Because such knowledge is often unreasonable  an administrator should realize that  WEP  by itself  is not an adequate wireless LAN security solution  Even with such tight  controls  if a card is lost or stolen  the person responsible for the card  the user  should be  required to report the loss or theft immediately to th
236. eek out a    manufacturer that offers a good warranty on their lightning arrestors  Some  manufacturers offer a highly desirable  No Matter What  type of warranty     Chapter 5     Antennas and Accessories 135    Configuration  amp  Maintenance    No configuration is necessary for a lightning arrestor  Lightning arrestors are installed in  series with the main RF signal path  and the grounding connection should be attached to  an Earth ground with a measurable resistance of 5 ohms or less  It is recommended that  you test an Earth ground connection with an appropriate Earth ground resistance tester  before deciding that the installation of the lightning arrestor is satisfactory  Make it a  point  along with other periodic maintenance tasks  to check the Earth ground resistance  and the gas discharge tube regularly     RF Splitters    An RF Splitter is a device that has a single input connector and multiple output  connectors  An RF Splitter is used for the purpose of splitting a single signal into  multiple independent RF signals  Use of splitters in everyday implementations of  wireless LANs is not recommended  Sometimes two 120 degree panel antennas or two  90 degree panel antennas may be combined with a splitter and equal length cables when  the antennas are pointing in opposite directions  This configuration will produce a bi   directional coverage area  which may be ideal for covering the area along a river or major  highway  Back to back 90 degree panels may be separate
237. een DCF  and PCF mode clients on the  network  the superframe allows some nodes to have QoS and others to have the  ability to contend for network access to maximize throughput     C  A clear channel assessment is a function requested by the MAC layer and  performed at the Physical layer where the physical layer senses the RF amplitude  level on a particular frequency  If the amplitude is below a given threshold  the  medium is considered to be clear and ready for frames to be transmitted  This is  called a positive CCA  If the amplitude is above that same threshold  then the  medium is considered busy  This is considered a negative CCA     A  The NAV field is used on a station as a timer  When using the RTS CTS  protocol  RTS and CTS packets set the NAV on stations hearing them to an amount  of time that they must wait before trying to access the medium     A  The RTS CTS protocol is a method of remedying problems caused by the hidden  node problem on wireless LANs  While using RTS CTS cannot eliminate hidden  nodes  stations broadcasting their intention to transmit packets on the network can  drastically reduce the problems hidden nodes cause with collisions on the network        CHAPTER    Troubleshooting Wireless LAN  Installations    CWNA Exam Objectives Covered        Identify  understand and correct or compensate for the      In This Chapter  following wireless LAN implementation challenges       Multipath Multipath  ny  Midden Node Hidden Node    Near Far   Near Far  
238. een buildings  avoiding the costly installation of cabling or leasing fees and the  down time associated with system failures     wireless workgroup bridge     Used to connect a small group of users  normally 8 or  less  from one wired network to another via a wireless link  These users connect to the  wireless workgroup bridge via an 802 3 Ethernet connection  The wireless workgroup  bridge then associates to an access point as a single client allowing users access to the  wired network behind the access point  Users are a    collective client    on the wireless  network     
239. eless LAN Infrastructure Devices 87    Wireless LAN Client Devices    The term    client devices    will  for purposes of this discussion  cover several wireless  LAN devices that an access point recognizes as a client on a network  These devices  include       PCMCIA  amp  Compact Flash Cards     Ethernet  amp  Serial Converters     USB Adapters     PCI  amp  ISA Adapters    Wireless LAN clients are end user nodes such as desktop  laptop  or PDA computers that  need wireless connectivity into the wireless network infrastructure  The wireless LAN  client devices listed above provide connectivity for wireless LAN clients  It is important  to understand that manufacturers only make radio cards in two physical formats  and  those are PCMCIA and Compact Flash  CF   All radio cards are built  by the  manufacturers  into these card formats and then connected to adapters such as PCI  ISA   USB  etc     PCMCIA  amp  Compact Flash Cards    FIGURE 4 13    The most common component on any wireless network is the PCMCIA card  More  commonly known as    PC cards     these devices are used in notebook  laptop  computers  and PDAs  The PC card is the component that provides the connection between a client  device and the network  The PC card serves as a modular radio in access points  bridges   workgroup bridges  USB adapters  PCI  amp  ISA adapters  and even print servers  Figure  4 13 shows an example of a PCMCIA card     A sample PCMCIA card       Antennas on PC cards vary with each manu
240. eless LAN Security    making it easier to gain access next time  The administrator might not even notice this  change for some time  Figure 10 7 illustrates an active attack on a wireless LAN     FIGURE 10 7 Active Attack Example       MY ATTACK LOG         Usernames  amp  Passwords       Open Ports  amp  Running       Services         Confidential Files       Virii  amp  Trojans           Some examples of active attacks might be a drive by spammer or a business competitor  wanting access to your files  A spammer could queue emails in his laptop  then connect  to your home or business network through the wireless LAN  After obtaining an IP  address from your DHCP server  the hacker can send tens of thousands of emails using  your Internet connection and your ISP   s email server without your knowledge  This kind  of attack could cause your ISP to cut your connection for email abuse when it s not even  your fault     A business competitor might want to get your customer list with contact information or  maybe your payroll information in order to better compete with you or to steal your  customers  These types of attacks happen regularly without the knowledge of the  wireless LAN administrator     Once a hacker has a wireless connection to your network  he might as well be sitting in  his own office with a wired connection because the two scenarios are not much different   Wireless connections offer the hacker plenty of speed and access to servers  wide area  connections  Inter
241. eless LAN attack  This text is aimed at giving a network administrator  insight into some possible methods of attack so that security will be considered a vital  part of wireless LAN implementation     Passive Attacks    Eavesdropping is perhaps the most simple  yet still effective type of wireless LAN attack   Passive attacks like eavesdropping leave no trace of the hacker s presence on or near the  network since the hacker does not have to actually connect to an access point to listen to  packets traversing the wireless segment  Wireless LAN sniffers or custom applications  are typically used to gather information about the wireless network from a distance with a    Chapter 10     Wireless LAN Security 283    directional antenna  as illustrated in Figure 10 6  This method of access allows the  hacker to keep his distance from the facility  leave no trace of his presence  and listen to  and gather valuable information     FIGURE 10 6 Passive Attack Example        Intruder    a a ce   MY LOG  VA     MAC Addresses           IP Addresses           Usernames  amp  Passwords       Instant Messenger    T   Conversations         Email         HTTP logins         Server logins         e    There are applications capable of gathering passwords from HTTP sites  email  instant  messengers  FTP sessions  and telnet sessions that are sent in clear text  There are other  applications that can snatch password hashes traversing the wireless segment between  client and server for login purpo
242. em that uses different codes to distinguish users     data encryption standard  DES    A cryptographic algorithm that protects unclassified  computer data  DES is a National Institute of Standards and Technology  NIST   standard and is available for both public and government use     Data Link Layer   The OSI level that performs the assembly and transmission of data  packets  including error control     decibel gain  loss    A unit of measurement that represents the difference between two  signal levels  For example  the increased power of an active device  such as an amplifier     and the decreased power of a passive device  such as an attenuator or length of cable     delay spread     In terms of multipath in a wireless LAN  it is the time between the first  signal received and the last echoed signal received  up to 4 ns in duration    dipole antenna   The most basic type of antenna shaped like a    T       364 Glossary    Direct Sequence Spread Spectrum  DSSS    Combines a data signal at the sending  station with a higher data rate bit sequence  which many refer to as a chip sequence  also  known as processing gain   A high processing gain increases the signal   s resistance to  interference  The minimum processing gain that the FCC allows is 10  and most products  operate under 20     disassociation service   An IEEE 802 11 term that defines the process a station or  access point uses to notify that it is terminating an existing association     dish antenna   A high gain 
243. ems point to the need for freedom from data cabling  Cellular solutions  have been available for quite some time  offering users the ability to roam while staying  connected  at slow speeds and very high prices  Wireless LANs offer the same flexibility  without the disadvantages  Wireless LANs are fast  inexpensive  and they can be located  almost anywhere     When considering wireless LANs for use in your network  keep in mind that using them  for their intended purpose will provide the best results  Administrators implementing  wireless LANs in a Core or Distribution role should understand exactly what  performance to expect before implementing them in this fashion to avoid having to  remove them later  The only distribution role in a corporate network that is definitely  appropriate for wireless LANs is that of building to building bridging  In this scenario   wireless could be considered as playing a distribution role  however  it will always  depend on how the wireless bridging segments are used in the network     Chapter 1   Introduction to Wireless LANs 5    There are some Wireless Internet Service Providers  WISPs  that use licensed wireless  frequencies in a distribution role  but almost never unlicensed frequencies such as the  ones discussed at length in this book     Network Extension    FIGURE 1 2    Wireless networks can serve as an extension to a wired network  There may be cases  where extending the network would require installing additional cabling that is c
244. ency at which the antenna can propagate waves or receive propagated  waves     Some essential points of understanding in administering license free wireless LANs are  line of sight  the effects of the Fresnel  pronounced    fra NEL     Zone  and antenna gain  through focused beamwidths  These points will be discussed in this section     Line of Sight  LOS     FIGURE 2 10    With visible light  visual LOS  also called simply    LOS     is defined as the apparently  straight line from the object in sight  the transmitter  to the observer s eye  the receiver    The LOS is an apparently straight line because light waves are subject to changes in  direction due to refraction  diffraction  and reflection in the same way as RF frequencies   Figure 2 10 illustrates LOS  RF works very much the same way as visible light within  wireless LAN frequencies with one major exception  RF LOS can also be affected by  blockage of the Fresnel Zone     Line of Sight    K    ____ Line of Site             _   y    N   7 N  N   N    M   N   Ny   Ls   Ray   3 aa  E 1    Imagine that you are looking through a two foot long piece of pipe  Imagine further that  an obstruction were blocking part of the inside of the pipe  Obviously  this obstruction  would block your view of the objects at the other end of the pipe  This simple illustration  shows how RF works when objects block the Fresnel Zone  except that  with the pipe  scenario  you can still see the other end to some degree  With RF  that same limi
245. endors have stepped  into the gap to offer proprietary methods of facilitating roaming between nodes in an  ESS     194 Chapter 7     802 11 Network Architecture             When a station roams from an old access point to a new access point  the new access  point is responsible for ensuring that any bridges between the two access points are  properly notified of the station   s new location  The manner in which this is  accomplished is not specified  The only requirement is that some method is  implemented which ensures that packets will flow properly to the station   s new access  point  The new IEEE 802 11f draft addresses the issue of standardizing roaming with  the introduction of the Inter Access Point Protocol  IAPP      Connectivity    The 802 11 MAC layer is responsible for how a client associates with an access point   When an 802 11 client enters the range of one or more access points  the client chooses  an access point to associate with  also called joining a BSS  based on signal strength and  observed packet error rates     Once associated with the access point  the station periodically surveys all 802 11  channels in order to assess whether a different access point would provide better  performance characteristics  If the client determines that there is a stronger signal from a  different access point  the client re associates with the new access point  tuning to the  radio channel to which that access point is set  The station will not attempt to roam until  i
246. ennas     Explain the concepts of polarization  gain  beamwidth  and free space path  loss as they apply to implementing solutions that require antennas     Identify the use of the following wireless LAN accessories and explain how to  install  configure  and manage them    Power over Ethernet devices  Amplifiers   Attenuators   Lightning arrestors   RF connectors and cables  RF splitters    3 3  Troubleshooting Wireless LAN Installations    3 3 1     Identify  understand  correct or compensate for the following wireless LAN  implementation challenges    Multipath    xxiv    Introduction    3 3 2     Hidden node   Near Far   RF interference  All band interference  System throughput  Co location throughput  Weather    Explain how antenna diversity compensates for multipath     3 4  RF Site Survey Fundamentals    3 4 1     3 4 2     Identify and understand the importance and process of conducting a thorough  site survey     Identify and understand the importance of the necessary tasks involved in  preparing to do an RF site survey    Gathering business requirements  Interviewing management and users   Defining security requirements   Site specific documentation   Documenting existing network characteristics    Identify the necessary equipment involved in performing a site survey    Wireless LAN equipment  Measurement tools  Documentation    Understand the necessary procedures involved in performing a site survey    Non RF information   Permits and zoning requirements  Outdoor c
247. ent devices  and explain how to install  configure  and manage them       PCMCIA Cards     Serial and Ethernet Converters    USB Devices     PCI ISA Devices        Identify the purpose of the following wireless LAN gateway  devices and explain how to install  configure  and manage them       Residential Gateways      Enterprise Gateways    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     CHAPTER    In This Chapter  Access Points  Bridges   Workgroup Bridges  Client Devices  Residential Gateways    Enterprise Gateways    72 Chapter 4      Wireless LAN Infrastructure Devices    This chapter of the book may be the most important section of the book for you  the  CWNA candidate  to have access to at least some wireless LAN hardware  As mentioned  in previous chapters  you can purchase a basic home or SOHO wireless network for  under  400  including an access point  wireless PC Cards  and possibly a USB client   Although with this type of equipment you won   t get hands on experience with every  piece of hardware covered in this chapter  you will have a good idea of how the devices  communicate and otherwise behave using RF technology     This chapter covers the different categories of wireless network infrastructure equipment  and some of the variations within each category  From reading this chapter alone  you  should be noticeably more versed in the actual implementation of wireless LANs  simply  by being aware of all the different kinds of wireless LAN equipment th
248. entication    Since user authentication is a wireless LAN   s weakest link  and the 802 11 standard does  not specify any method of user authentication  it is imperative that the administrator  implement user based authentication as soon as possible upon installing a wireless LAN  infrastructure  User authentication should be based on device independent schemes like  usernames and passwords  biometrics  smart cards  token based systems  or some other  type of secure means of identifying the user  not the hardware  The solution you  implement should support bi directional authentication between an authentication server   such as RADIUS  and the wireless clients     RADIUS is the de facto standard in user authentication systems in most every  information technology market  Access points send user authentication requests to a  RADIUS server  which can either have a built in  local  user database or can pass the  authentication request through to a domain controller  an NDS server  an Active  Directory server  or even an LDAP compliant database system     A few RADIUS vendors have streamlined their RADIUS products to include support for  the latest family of authentication protocols such as the many types of EAP     Administering a RADIUS server can be very simple or very complicated  depending on  the implementation  Because wireless security solutions are very sensitive  care should  be taken when choosing a RADIUS server solution to make sure that the wireless  network adminis
249. eplacement for PAP or CHAP under PPP that works  over local area networks  EAP allows plug ins at either end of a link through which  many methods of authentication can be used  In the past  PAP and or CHAP have been  used for user authentication  and both support using passwords  The need for a stronger   more flexible alternative is clear with wireless networks since more varied  implementations abound with wireless than with wired networks     Typically  user authentication is accomplished using a Remote Authentication Dial In  User Service  RADIUS  server and some type of user database  Native RADIUS  NDS   Active Directory  LDAP  etc    The process of authenticating using EAP is shown in  Figure 7 6  The new 802 111 standard includes support for 802 1x  EAP  AAA  mutual  authentication  and key generation  none of which were included in the original 802 11  standard     44A    is an acronym for authentication  identifying who you are    authorization  attributes to allow you to perform certain tasks on the network   and  accounting  shows what you   ve done and where you   ve been on the network      186 Chapter 7     802 11 Network Architecture    FIGURE 7 6    In the 802 1x standard model  network authentication consists of three pieces  the  supplicant  the authenticator  and the authentication server     802 1x and EAP                                  Client Access Point Authentication Server  SS A l P  Associate  EAP Identity Request  EAP Identity Response EAP Ident
250. eptance will only accelerate due to the industry moving toward newer  faster DSSS  systems such as the new 802 11g and 802 11a compliant wireless LAN hardware   WECA s new Wi Fi5 interoperability standard for 5 GHz DSSS systems operating in the  UNI bands will help move the industry along even faster in the same direction it is  already headed  The new standards for FHSS systems include HomeRF 2 0 and 802 15   in support of WPANSs such as Bluetooth   but none for advancing FHSS systems in the  enterprise  All of these standards and technologies will be further discussed at in Chapter  6  Organizations and Regulations      62 Chapter 3     Spread Spectrum Technology    Key Terms    Before taking the exam  you should be familiar with the following terms     channel  chipping code  co location  direct sequence  dwell time  frequency hopping  hop time  interoperability  narrow band  noise floor  processing gain    throughput    Chapter 3     Spread Spectrum Technology 63    Review Questions    1     Increasing the dwell time for an FHSS system will increase the throughput   A  This statement is always true  B  This statement is always false    C  It depends on the manufacturer of the equipment    Which one of the following dwell times will result in the greatest throughput in a  FHSS system and will still be within FCC regulations     A  100 ms  B  200 ms  C  300 ms  D  400 ms    An 802 11b compliant wireless LAN configuration using DSSS can have a  maximum of __ non overlapping 
251. equency hopping systems  have a co location advantage over direct sequence systems  which have a maximum co   location of 3 access points     Co location comparison    40 3 Mbps FHSS  sync    11 Mbps DSSS 2  0     30    7   a  20 P d 3 Mbps FHSS  no sync         1 5 10 15 20  Number of Co located Systems    However  when calculating the hardware costs of an FHSS system to get the same  throughput as a DSSS system  the advantage quickly disappears  Because DSSS can  have 3 co located access points  the maximum throughput for this configuration would  be     3 access points x 11 Mbps   33 Mbps    At roughly 50  of rated bandwidth  the DSSS system throughput would be  approximately     33 Mbps  2   16 5 Mbps    60 Chapter 3     Spread Spectrum Technology    To achieve roughly the same rated system bandwidth using an IEEE 802 11 compliant  FHSS system would require     16 access points x 2 Mbps   32 Mbps    At roughly 50  of rated bandwidth  the FHSS system throughput would be  approximately     32 Mbps  2   16 Mbps    In this configuration  an FHSS system would require 13 additional access points to be  purchased to get the same throughput as the DSSS system  Also  additional installation  services for these units  cables  connectors  and antennas would all need to be purchased     As you can see  there are advantages to co location for each type of system  If the  objectives are low cost and high throughput  clearly DSSS technology wins out  If  keeping users segmented using di
252. er  which  although it may not produce precisely accurate quantitative  measurements  can give a user a general idea of what sources of RF are in use in the area     FIGURE 11 7    Chapter 11     Site Survey Fundamentals 325    As part of the spectral analysis  have all the users turn their equipment off  if possible  so  that any sources of background interference can be detected  such as low power sources  of narrowband interference  Low power narrowband interference is easily located while  there are no other sources of RF in use  but is quite difficult to locate when many sources  of RF are in use  High power narrowband is easily located with the proper test  equipment regardless of additional RF sources     Spectrum Analyzer screenshot        o 50 0       Se pe                                                              ee    De ee    2a  Es                          L     i    Le a    a a Be       2402 pape a ES Frequencies  GHz  2 480  Pesk Hoi fi Be ere AJo    Done   Average E    C Slow      Medum C Fast   Help       Part of a spectrum analysis should be to locate any 802 11b or 802 11a networks in use in  the area around the implementation area of the proposed wireless LAN  If current or  future plans involve installation of 802 1 1a products  it would be advantageous to both  the site surveyor and the customer to know of any 5 GHz RF sources  especially if they  are part of a wireless LAN     Network Analyzer  a k a   Sniffer      After spectrum analysis is complete
253. erate at 3 Mbps or  more  these systems are not 802 11 compliant and may not interoperate with other FHSS  systems  FHSS and DSSS systems have a throughput  data actually sent  of only about  half of the data rate  When testing the throughput of a new wireless LAN installation   achieving 5     6 Mbps on the 11 Mbps setting for DSSS or 1 Mbps on the 2 Mbps setting  is common using DSSS     Chapter 3     Spread Spectrum Technology 61       HomeRF 2 0 uses wide band frequency hopping technology to achieve 10 Mbps data  rates  which in turn achieve approximately 5 Mbps of actual throughput  The catch is  that comparing HomeRF 2 0 to 802 11 or 802 11b systems is not really comparing  apples to apples  The difference is HomeRF s limited power output  125 mW  as  compared to that of 802 11 systems  1 watt      When wireless frames are transmitted  there are pauses between data frames for control  signals and other overhead tasks  With frequency hopping systems  this    interframe  spacing    is longer than that used by direct sequence systems  causing a slow down in the  rate that data is actually sent  throughput   Additionally  when the frequency hopping  system is in the process of changing the transmit frequency  no data is sent  This  translates to more lost throughput  albeit only a minor amount  Some wireless LAN  systems use proprietary physical layer protocols in order to increase throughput  These  methods work  yielding throughputs as high as 80  of the data rate  but in
254. eration involved in the movement of data traffic  across wireless LANs    DCF   PCF   CSMA CA vs  CSMA CD  Interframe spacing  RTS CTS   Dynamic Rate Selection  Modulation and coding    Wireless LAN Implementation and Management     30     3 1  Wireless LAN Application    3 1 1     Identify the technology roles for which wireless LAN technology is an  appropriate technology application    Data access role   Extension of existing networks into remote locations  Building to building connectivity   Last mile data delivery   Flexibility for mobile users   SOHO Use   Mobile office  classroom  industrial  and healthcare    Introduction xxiii    3 2  Hardware Management    3 2 1     3 2 2     3 2 5     3 2 6     3 2 75    Identify the purpose of the following infrastructure devices and explain how  to install  configure  and manage them    Access points  Wireless bridges  Wireless workgroup bridges    Identify the purpose of the following wireless LAN client devices and explain  how to install  configure  and manage them    PCMCIA cards   Serial and Ethernet converters  USB devices   PCI ISA devices      Identify the purpose of the following wireless LAN gateway devices and    explain how to install  configure  and manage them    Residential gateways  Enterprise gateways      Identify the basic attributes  purpose  and function of the following types of    antennas    Omni directional dipole  Semi directional  High gain    Describe the proper locations and methods for installing ant
255. ere    124 Chapter 5     Antennas and Accessories    Active Ethernet Switches    The next step up for large enterprise installations of access points is the implementation  of active Ethernet switches  These devices incorporate DC voltage injection into the  Ethernet switch itself allowing for large numbers of PoE devices without any additional  hardware in the network  See Figure 5 20 for an example of an Active Ethernet switch   Wiring closets will not have any additional hardware other than the Ethernet switches  that would already be there for a non PoE network  Several manufacturers make these  switches in many different configurations  number of ports   In many Active Ethernet  switches  the switch can auto sense PoE client devices on the network  If the switch does  not detect a PoE device on the line  the DC voltage is switched off for that port     FIGURE 5 20 An Active Ethernet switch       As you can see from the picture  an Active Ethernet switch looks no different from an  ordinary Ethernet switch  The only difference is the added internal functionality of  supplying DC voltage to each port     PoE Compatibility    Devices that are not  PoE Compatible  can be converted to Power over Ethernet by way  of a DC  picker  or  tap   These are sometimes called Active Ethernet  splitters   This  device picks off the DC voltage that has been injected into the CATS cable by the  injector and makes it available to the equipment through the regular DC power jack     In order 
256. ergy is transferred back  and forth from one field to the other  in the process known as  oscillation   The plane  that is parallel with the antenna element is referred to as the  E plane  whereas the plane  that is perpendicular to the antenna element is referred to as the  H plane   We are  interested primarily in the electric field since its position and direction with reference to  the Earth s surface  the ground  determines wave polarization     E Plane    Polarization is the physical orientation of the antenna in a horizontal or vertical position   The electric field is parallel to the radiating elements  the antenna element is the metal  part of the antenna that is doing the radiating  so  if the antenna is vertical  then the  polarization is vertical       Horizontal polarization   the electric field is parallel to the ground      Vertical polarization   the electric field is perpendicular to the ground    Vertical polarization  which is typically used in wireless LANs  is perpendicular to the  Earth   s plane  Notice the dual antennas sticking up vertically from most any access point    these antennas are vertically polarized in that position  Horizontal polarization is  parallel to the Earth  Figure 5 14 illustrates the effects polarization can have when  antennas are not aligned correctly  Antennas that are not polarized in the same way are  not able to communicate with each other effectively     FIGURE 5 14 Polarization    Chapter 5     Antennas and Accessories 11
257. ernet access  Your  best source of support for installing these devices is the manual provided with the  device or someone who has already successfully installed similar units and can provide  free guidance  Wireless residential gateways are so common now that many  individuals that consider themselves non technical have gained significant experience  installing and configuring them     Enterprise Wireless Gateways    An enterprise wireless gateway is a device that can provide specialized authentication and  connectivity for wireless clients  Enterprise wireless gateways are appropriate for large     94 Chapter 4     Wireless LAN Infrastructure Devices    FIGURE 4 19    FIGURE 4 20    scale wireless LAN environments providing a multitude of manageable wireless LAN  services such as rate limiting  Quality of Service  QoS   and profile management     It is important that an enterprise wireless gateway device needs to have a powerful CPU  and fast Ethernet interfaces because it may be supporting many access points  all of  which send traffic to and through the enterprise wireless gateway  Enterprise wireless  gateway units usually support a variety of WLAN and WPAN technologies such as  802 11 standard devices  Bluetooth  HomeRF  and more  Enterprise wireless gateways  support SNMP and allow enterprise wide simultaneous upgrades of user profiles  These  devices can be configured for hot fail over  when installed in pairs   support of RADIUS   LDAP  Windows NT authentication data
258. ertifications such as CCNA  MCSE  or CNE  then you most likely already have the  understanding of networking technologies necessary to move into wireless     By purchasing this book  you are taking the first step towards a bright future in the  networking world  Why  Because you have just jumped ahead and apart from the rest of  the pack by learning wireless networking to complement your existing networking  knowledge     The wireless LAN industry is growing faster than any other market segment in  networking  Many new careers will be presenting themselves in support of the added  responsibilities network administrators must deal with when they add wireless LANs to  their networks  Getting a head start on wireless technology now will enable you to  compete effectively in tomorrow s marketplace     Who This Book Is For    This book focuses on the technologies and tasks vital to installing  managing  and  supporting wireless networks  based on the exam objectives of the CWNA certification  exam  You will learn the wireless technology standards  governing bodies  hardware  RF  math  RF behavior  security  troubleshooting  and site survey methodology  After you  achieve your CWNA certification  you will find this book to be a concise compilation of  the basic knowledge necessary to work on wireless LANs     The best method of preparation for the CWNA certification exam is attending an official  CWNA training course  If you prefer to study and prepare at your own pace  then this  
259. es in the radios  or just due to each  vendor s implementation of hardware around the radio  is unknown        g    Idiosyncrasies like non overlapping channels overlapping one will not be tested on the  CWNA exam  For the exam it is important to know the theory of how co channel  throughput is theoretically supposed to work     Types of Interference    Due to the unpredictable behavioral tendencies of RF technology  you must take into  account many kinds of RF interference during implementation and management of a  wireless LAN  Narrowband  all band  RF signal degradation  and adjacent and co   channel interference are the most common sources of RF interference that occur during  implementation of a wireless LAN  In this section  we will discuss these types of  interference  how they affect the wireless LAN  how to locate them  and in some cases  how to work around them     Narrowband    FIGURE 9 12    Narrowband RF is basically the opposite of spread spectrum technology  Narrowband  signals  depending on output power  frequency width in the spectrum  and consistency   can intermittently interrupt or even disrupt the RF signals emitted from a spread spectrum  device such as an access point  However  as its name suggests  narrowband signals do  not disrupt RF signals across the entire RF band  Thus  if the narrowband signal is  primarily disrupting the RF signals in channel 3  then you could  for example  use  Channel 11  where you may not experience any interference at all  
260. es of RF interference in the 2 4 GHz band  These potential interference  sources need to be documented in the survey as potential problems with the installation   Microwave ovens can easily be replaced  though radiology equipment in a hospital  installation may not be  2 4 GHz phones running on the same channel as the wireless  LAN can render a wireless LAN useless     In case 802 11a networks are to be installed  are there any RF sources in the 5 GHz  range     If there were many other organizations in the area already using 802 11b  using 802 1la  would avoid the interference of trying to coexist with another 802 11b network   However  it should be noted whether or not other 802 1 1a networks exist in the area that  could interfere with an 802 11a implementation     336 Chapter 11     Site Survey Fundamentals    Obstacle Induced Signal Loss    The chart in Figure 11 18 provides estimates on RF signal losses that occur for various  objects  Using these values as a reference will save the surveyor from having to calculate  these values  For example  if a signal must penetrate drywall  the range of the signal  would be reduced by 50   The loss is indicated in decibels  and the resulting range  effect is shown     FIGURE 11 18 Signal Loss Chart                                              Obstruction Additional Loss Effective   dB  Range  Open Space 0 100   Window  non metallic tint  3 70  Window  metallic tint  5 8 50  Light wall  dry wall  5 8 50  Medium wall  wood  10 30  He
261. ess LAN signals at the point where outdoor antennas will be  installed is a good idea  If channel 1 in a DSSS system were to be used  and subsequently  it was found that channel 1 is in use by a nearby outdoor system using an omni   directional antenna  document in the report that a channel that does not overlap channel 1  should be used for this bridge link     Is a tower required     When performing a site survey  a 30 foot tower might be needed on top of a building to  clear some trees that are in the direct signal path of an outdoor wireless link  If a tower is  required  other questions that need to be asked might include      Ifthe roof is to be used  is it adequate to support a tower       Jsa structural engineer required       Is a permit necessary     314 Chapter 11     Site Survey Fundamentals    A structural engineer may be required to determine if a tower can be placed on top of a  building without safety risks to the occupants of the building  Permits may also be  necessary to install a tower              Permits or government approval may be necessary to install a tower  For example  for  towers that are more than 200 feet  61 meters  above ground level  the FCC requires  that the FAA be notified prior to constructing or modifying an antenna structure  tower   pole  building  etc    A 190 foot tall building with an 11 foot tall tower would fall into this  category for example because the building  antenna structure  has been modified and  exceeds 200 feet  Local
262. et      Independent basic service set    Basic Service Set  BSS     FIGURE 7 9    When one access point is connected to a wired network and a set of wireless stations  the  network configuration is referred to as a basic service set  BSS   A basic service set  consists of only one access point and one or more wireless clients  as shown in Figure  7 9  A basic service set uses infrastructure mode   a mode that requires use of an access  point and in which all of the wireless traffic traverses the access point  No direct client   to client transmissions are allowed     Basic Service Set       ea    Client    Basic Service Set    single cell    Each wireless client must use the access point to communicate with any other wireless  client or any wired host on the network  The BSS covers a single cell  or RF area  around  the access point with varying data rate zones  concentric circles  of differing data speeds   measured in Mbps  The data speeds in these concentric circles will depend on the  technology being utilized  If the BSS were made up of 802 11b equipment  then the  concentric circles would have data speeds of 11  5 5  2  and 1 Mbps  The data rates get  smaller as the circles get farther away from the access point  A BSS has one unique  SSID     190 Chapter 7     802 11 Network Architecture    Extended Service Set  ESS     An extended service set is defined as two or more basic service sets connected by a  common distribution system  as shown in Figure 7 10  The distribut
263. etwork  you could attach a cable and an outdoor antenna directly to the access point  and mount only the antenna outside     Access points may be shipped with or without diversity antennas  Wireless LAN antenna  diversity is the use of multiple antennas with multiple inputs on a single receiver in order  to sample signals arriving through each antenna  The point of sampling two antennas is  to pick the input signal of whichever antenna has the best reception  The two antennas  might have different signal reception because of a phenomenon called multipath  which  will be discussed in detail in Chapter 9     Advanced Filtering Capabilities    MAC or protocol filtering functionality may be included on an access point  Filtering is  typically used to screen out intruders on your wireless LAN  As a basic security  provision  covered in Chapter 10   Security   an access point can be configured to filter  out devices that are not listed in the access point   s MAC filter list  which the  administrator controls     Protocol filtering allows the administrator to decide and control which protocols should  be used across the wireless link  For example  if an administrator only wishes to provide  http access across the wireless link so that users can browse the web and check their web   based email  then setting an http protocol filter would prevent all other types of protocol  access to that segment of the network     Chapter 4     Wireless LAN Infrastructure Devices 77    Removable  Mo
264. evin Akin  whose knowledge of wireless LANs  networking  and radio frequency  surprised even us  His talents to convey  teach  write  and edit were essential in making  this the most accurate and comprehensive writing on wireless LANs in today s market     Scott Turner  who constantly keeps us in line and focused on what is important  Scott s  work in formatting  framing  content organization  and graphics creation was  indispensable  Scott s eye for detail and his motivation for perfection in everything he  does keep us in awe     Kevin Sandlin  for his intellect to make difficult concepts sound simple  his skill to write  and edit the most difficult material  and his ability to motivate every member of the team  to do their best and to keep their eyes on the sometimes moving target  His leadership  skills are second to none     Robert Nicholas  for his ability to conceptualize and create difficult graphics and radio  frequency concepts  his savvy in presentation of difficult material  and his ability to find  the answer to even the most vague concepts through diligent research and study  His  effort in support of this book is greatly appreciated     Jeff Jones and Josh McCord  who have been with Planet3 since the beginning of this  project  Their willingness to volunteer as much time and effort as was needed to make all  of it possible has been amazing  They have been an inspiration to the entire team  Their  relentless pursuit of perfection in support of Planet3 s mission 
265. exclusive  non transferable license to use the Study  Guide  in part or in whole  for your internal business or personal use  Any internal or personal use of the Study  Guide content must be accompanied by the phrase  Used with permission from PLANET3 WIRELESS  INC   or  other phrasing agreed upon in writing by PLANET3 WIRELESS  INC     RESTRICTIONS ON TRANSFER   Reproduction or disclosure in whole or in part to parties other than the PLANET3 WIRELESS  INC  client that is  the original subscriber to this Study Guide is permitted only with the written and express consent of PLANET3  WIRELESS  INC  This Study Guide shall be treated at all times as a confidential and proprietary document for  internal use only     Any purported sale  assignment  transfer or sublicense without the prior written consent of PLANET3 WIRELESS   INC  will be void and will automatically terminate the License granted hereunder     LIMITED WARRANTY   THE INFORMATION CONTAINED IN THIS STUDY GUIDE IS BELIEVED TO BE RELIABLE BUT  CANNOT BE GUARANTEED TO BE CORRECT OR COMPLETE  If the Study Guide s electronic delivery  format is defective  PLANET3 WIRELESS  INC  will replace it at no charge if PLANET3 WIRELESS  INC  is  notified of the defective formatting within THIRTY days from the date of the original download or receipt of Study  Guide  PLANET3 WIRELESS  INC   MAKES NO WARRANTY  EXPRESS OR IMPLIED  OF  MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE    LIMITATION OF LIABILITY   IN NO EVENT WILL PLANE
266. f  is very close to the noise floor  The receiver is unable to clearly decipher between the  information signal and noise  causing the data that is received to be only part  if any  of  the transmitted data  This corruption of data will require the transmitter to resend the  data  increasing overhead and decreasing throughput in the wireless LAN     Nulling    The condition known as nulling occurs when one or more reflected waves arrive at the  receiver out of phase with the main wave with such amplitude that the main wave s  amplitude is cancelled  As illustrated in Figure 9 4  when reflected waves arrive out of   phase with the main wave at the receiver  the condition can cancel or    null    the entire set  of RF waves  including the main wave     Chapter 9  Troubleshooting Wireless LAN Installations 239    FIGURE 9 4 RF Signal Nulling    Reflective surface    TW NP    Reflected signals added to the  main signal cancel all signal   amplitude resulting in no   signal at all          Reflective surface    When nulling occurs  retransmission of the data will not solve the problem  The  transmitter  receiver  or reflective objects must be moved  Sometimes more than one of  these must be relocated to compensate for the nulling effects on the RF wave     Increased Signal Amplitude    Multipath conditions can also cause a signal   s amplitude to be increased from what it  would have been without reflected waves present  Upfade is the term used to describe  when multipath causes a
267. facturer  You might notice that several  manufacturers use the same antenna while others use radically different models  Some  are small and flat such as the one shown in figure 4 13  while others are detachable and  connected to the PC card via a short cable  Some PC cards are shipped with multiple    88 Chapter 4      Wireless LAN Infrastructure Devices    antennas and even accessories for mounting detachable antennas to the laptop or desktop  case with Velcro              There are two major manufacturers of radio chipsets that make up the heart of the very  popular 802 11b PC and CF cards  Agere Systems  formerly Lucent Technologies  and  Intersil  Atheros is the first to mass produce chip sets for the 802 11a standard that  uses the 5 GHz UNII frequency bands  These manufacturers sell their chipsets to the  PC and CF radio card manufacturers  the wireless LAN hardware manufacturing  companies  who use the radios in their product lines     Compact Flash Cards  more commonly known as    CF cards     are very similar to wireless  PC cards in that they have the same functionality  but CF cards are much smaller and  typically used in PDAs  Wireless CF cards draw very little power and are about the size  of a matchbook     Wireless Ethernet  amp  Serial Converters    FIGURE 4 14    Ethernet and serial converters are used with any device having Ethernet or legacy 9 pin  serial ports for the purpose of converting those network connections into wireless LAN  connections  When you
268. ff time expires  first  that station does a CCA  and provided the medium is clear  it then begins  transmission     Once the first station has begun transmissions all other stations sense that the medium is  busy  and remember the remaining amount of their random back off time from the  previous CP  This remaining amount of time is used in lieu of picking another random  number during the next CP  This process assures fair access to the medium among all  stations     Once the random back off period is over  the transmitting station sends its data and  receives back the ACK from the receiving station  This entire process then repeats  It  stands to reason that most stations will chose different random numbers  eliminating most  collisions  However  it is important to remember that collisions do happen on wireless  LANs  but they cannot directly be detected  Collisions are assumed by the fact that the  ACK is not received back from the destination station     220 Chapter 8  MAC and Physical Layers    Slot Times    A slot time  which is pre programmed into the radio in the same fashion as the SIFS   PIFS  and DIFS timeframes  is a standard period of time on a wireless network  Slot  times are used in the same method as a clock s second hand is used  A wireless node  ticks slot times just like a clock ticks seconds  These slot times are determined by the  wireless LAN technology being utilized       FHSS Slot Time   50uS     DSSS Slot Time   20uS      Infrared Slot Time   8uS    
269. fferent  frequencies     packet   A basic message unit for communication across a network  A packet usually  includes routing information  data and  sometimes  error detection information     passive scanning     method by which a wireless client will keep track of access points  based on the reception of beacon management frames  Stations generally decide to  authenticate and associate with an access point related to beacon management frames  having the strongest received signal strength  amp  lowest observed packet error rates    password authentication protocol  PAP      The most basic form of authentication in  which a username and password are transmitted over a network and compared to a  database of authorized users to allow network access    peer to peer Network   A network where there are communications between groups of  equal devices  A peer to peer LAN does not depend upon a dedicated server  but allows  any node to be installed as a non dedicated server and share its files and peripherals  across the network  Peer to peer LANs are normally less expensive because they do not  require a dedicated computer to store applications and data  They do not perform well   however  for larger networks     Physical Layer   Provides the transmission of bits through a communication channel by  defining electrical  mechanical  and procedural specifications     pigtail   used for adapting proprietary connectors on bridges and access points to  standard connectors    point coordina
270. fferent access points in a dense co location environment  is the objective  FHSS might be a viable alternative     Equipment compatibility and availability    The Wireless Ethernet Compatibility Alliance  WECA  provides testing of 802 11b  compliant DSSS wireless LAN equipment to ensure that such equipment will operate in  the presence of and interoperate with other 802 11b DSSS devices  The interoperability  standard that WECA created and now uses is called Wireless Fidelity  or Wi Fi     and  those devices that pass the tests for interoperability are    Wi Fi compliant    devices   Devices so deemed are allowed to affix the Wi Fi logo on the related marketing material  and devices themselves showing that they have been tested and interoperate with other  Wi Fi compliant devices     There are no such compatibility tests for equipment that uses FHSS  There are standards  such as 802 11 and OpenAir  but no organization has stepped forward to do the same  kind of compatibility testing for FHSS as WECA does for DSSS     Due to the immense popularity of 802 11b compliant radios  it is much easier to obtain  these units  The demand seems only to be growing for the Wi Fi compliant radios while  the demand for FHSS radios has remained fairly steady  even decreasing to some degree  over the past year     Data rate  amp  throughput    The latest frequency hopping systems are slower than the latest DSSS systems mostly  because their data rate is only 2 Mbps  Though some FHSS systems op
271. ficant  depending  on cable type used   Use of longer Cat5 cable can sometimes remedy the  situation by allowing the access point to be moved closer to the antenna  RG 58  cable should never be used for extension cables due to bad frequency response   LMR  Heliax  or other appropriate high frequency cable should be used for  extensions     If the FCC performs an inspection on your wireless LAN  which they are authorized to  do at any time   they will make note of the manufacturer  model number  length  and type  of connectors on your RF cable  These pieces of information should be documented in  your system s FCC certificate     FIGURE 5 32 Coaxial cable attenuation ratings  in dB foot at X MHz                                               LMR CABLE 30 50  150 220 450 900 1500 1800 2000 2500  100A 3 9 51  89 10 9 15 8 22 8 30 1 33 2 35 2 39 8  195 20 26 44 54  78 11 1 14 5 16 0 16 9 19 0  200 18 23 40 48 70 99 12 9 14 2 15 0 16 9  240 13 17 30 37 53 76 99 10 9 11 5 12 9  300 1 1 14 24 29 42 61 79 87 92 10 4  400 0 7 09  15  19 27 39 51  5 7 60 68  400UF 08 11 1 7 22 31  45 59  66 69 7 8  500 0 54 70 12 15 22  31  41  46 48 5 5  600 0 42 55  10  12  17 25 33  3 7 39 44  600UF 0 48 63 1 15 14 20 29  38 43 45  5 1  900 0 29 0 37 0 66 0 80 1 17 1 70 2 24 2 48 2 63 2 98  1200 0 21 0 27 0 48 059 089 1 3 1 7  19 20 2 3  1700 0 15 0 19 0 35 043 0 63 0 94 1 3 1 4 15 1 7                                           Chapter 5     Antennas and Accessories 141            There are three majo
272. following terms     AAA support  channel reuse  load balancing  multicell coverage    reassociation    204 Chapter 7     802 11 Network Architecture    Review Questions    1  A client that can transmit data over a wireless network is considered to be which of  the following  Choose all that apply     A  Unauthenticated  B  Unassociated   C  Authenticated  D    Associated    2  Which one of the following supports Authentication  Authorization  and Accounting   AAA      A  Open System authentication   Shared Key authentication   Open System and Shared Key authentication  802 11    BS Oye    None of the above    3  A basic service set has how many access points     A  None  B  1  C 2     D  Unlimited    4  Shared Key authentication is more secure than Open System authentication   A  This statement is always true  B  This statement is always false    C  It depends on whether or not WEP is utilized    5  A traffic indication map  TIM  is populated with station information when using  which one of the following power management features in a basic or extended  service set     A  Continuous aware mode  B  Continuous power mode  C  Power save polling mode  D    Power aware polling mode    10     Chapter 7     802 11 Network Architecture 205    An ad hoc traffic indication message  ATIM  is sent when using which one of the  following power management features in an independent basic service set     A  Continuous aware mode  B  Continuous power mode  C  Power save polling mode  D    Po
273. for a radio to transmit at 50 mW and operate    Middle Band    The middle UNII band is bound by 5 25 GHz and 5 35 GHz and is specified at 250 mW  of output power by the FCC  The power output specified by IEEE for the middle UNII  band is 200 mW  This power limit allows operation of devices either indoors or outdoors  and is commonly used for short outdoor hops between closely spaced buildings  In the  case of a home installation  such a configuration might include an RF link between the  house and the garage  or the house and a neighbor   s house  Due to reasonable power  output and flexible indoor outdoor use restrictions  products manufactured to work in the  middle UNII band could enjoy wide acceptance in the future     Upper Band    The upper UNII band is reserved for outdoor links and is limited by the FCC to 1 Watt   1000 mW  of output power  This band occupies the range of frequencies between 5 725  GHz and 5 825 GHz  and is often confused with the 5 8 GHz ISM band  The IEEE  specifies the maximum output power for this band as 800 mW  which is plenty of power  for almost any outdoor implementation  except for large campuses or long distance RF  links     Power Output Rules    The FCC enforces certain rules regarding the power radiated by the antenna element   depending on whether the implementation is a point to multipoint or a point to point  implementation  The term used for the power radiated by the antenna is Equivalent  Isotropically Radiated Power  EIRP      Poin
274. for placards to be mounted in wireless LAN areas that read    No Bluetooth    in  eye catching print     Bluetooth devices operate in three power classes  1 mW  2 5 mW  and 100 mW   Currently there are few if any implementations of Class 3  100 mW  Bluetooth devices   so range data is not readily available  however  Class 2  2 5 mW  Bluetooth devices have  a maximum range of 33 feet  10 meters   Naturally  if extended ranged is desired  the use  of directional antennas is a possible solution  though most Bluetooth devices are mobile  devices        es The website for the Bluetooth Special Interest Group  SIG  is www bluetooth com    166 Chapter 6     Wireless LAN Organizations and Standards    Infrared Data Association  IrDA     IrDA is not a standard like Bluetooth  HomeRF  and the 802 11 series of standards   rather  IrDA is an organization  Founded in June of 1993  IrDA is a member funded  organization whose charter is    to create an interoperable  low cost  low power  half   duplex  serial data interconnection standard that supports a walk up point to point user  model that is adaptable to a wide range of computer devices     Infrared data transmission  is known by most for its use in calculators  printers  some building to building and in   room computer networks  and now in handheld computers     Infrared    Infrared  IR  is a light based transmission technology and is not spread spectrum   spread  spectrum technologies all use RF radiation  IR devices can achieve a ma
275. found at http   standards ieee org cgi    bin status  wireless     Channels    FIGURE 3 4    Unlike frequency hopping systems that use hop sequences to define the channels  direct  sequence systems use a more conventional definition of channels  Each channel is a  contiguous band of frequencies 22 MHz wide  and 1 MHz carrier frequencies are used  just as with FHSS  Channel 1  for instance  operates from 2 401 GHz to 2 423 GHz   2 412 GHz   11 MHz   channel 2 operates from 2 406 to 2 429 GHz  2 417   11 MHz    and so forth  Figure 3 4 illustrates this point           DSSS channel allocation and spectral relationship        Ch Ch Ch Ch Ch Ch Ch Ch Ch Ch Ch  q 2 3 4 5 6 7 8 9 10 11    sLLLELILE    E we    MHz MHz       2 401 GHz    The chart in Figure 3 5 has a complete list of channels used in the United States and  Europe  The 802 11b Standard specification specifies only 11 channels for non licensed  use in the United States  We can see that channels 1 and 2 overlap by a significant  amount  Each of the frequencies listed in this chart are considered center frequencies   From this center frequency  11 MHz is added and subtracted to get the useable 22 MHz  wide channel  It is easy to see that adjacent channels  channels directly next to each  other  would overlap significantly     FIGURE 3 5    Chapter 3     Spread Spectrum Technology 57    DSSS channel frequency assignments                                           Channel FCC Channel ETSI Channel  ID Frequencies Frequencies 
276. ful  transmissions  connection speed  link viability  and many other valuable parameters   There is usually a utility for doing real time link connectivity tests so that  for example   an administrator would be able to see how stable a wireless link is while in the presence  of heavy RF interference or signal blockage     Common Functionality    Manufacturers    utilities vary greatly in their functionality  but share a common set of  configurable parameters  Each of these parameters is discussed in detail in this book       Infrastructure mode   Ad Hoc mode      SSID  a k a  Network Name      Channel  if in ad hoc mode      WEP Keys     Authentication type  Open System  Shared Key     Wireless Residential Gateways    A wireless residential gateway is a device designed to connect a small number of wireless  nodes to a single device for Layer 2  wired and wireless  and Layer 3 connectivity to the  Internet or to another network  Manufacturers have begun combining the roles of access  points and gateways into a single device  Wireless residential gateways usually include a  built in hub or switch as well as a fully configurable  Wi Fi compliant access point  The  WAN port on a wireless residential gateway is the Internet facing Ethernet port that may  be connected to the Internet through one of the following     92 Chapter 4     Wireless LAN Infrastructure Devices      Cable modem     xDSL modem    Analog modem    a Satellite modem    Figure 4 17 shows an example of a wireless 
277. g but not limited to performance  merchantability   fitness for any particular purpose  or any losses or damages of any kind caused or alleged to be caused directly or  indirectly from this book     Manufactured in the United States of America    LICENSE AGREEMENT   PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THIS MANUAL      MATERIALS      BY USING THE MATERIALS YOU AGREE TO BE BOUND BY THE TERMS AND  CONDITIONS OF THIS LICENSE     OWNERSHIP   The Study Guide is proprietary to PLANET3 WIRELESS  INC   who retains exclusive title to and ownership of the  copyrights and other intellectual property rights in the Study Guide  These rights are protected by the national and  state copyright  trademark  trade secret  and other intellectual property laws of the United States and international  treaty provisions  including without limitation the Universal Copyright Convention and the Berne Copyright  Convention  You have no ownership rights in the Study Guide  Except as expressly set forth herein  no part of the  Study Guide may be modified  copied  or distributed in hardcopy or machine readable form without prior written  consent from PLANET3 WIRELESS  INC  All rights not expressly granted to you herein are expressly reserved by  PLANET3 WIRELESS  INC  Any other use of the Study Guide by any person or entity is strictly prohibited and a  violation of this Agreement     SCOPE OF RIGHTS LICENSED  PERMITTED USES    PLANET3 WIRELESS  INC  is granting you a limited  non 
278. g distance RF links  It s important to try to keep the Fresnel Zone as  clear as possible  There is a simple formula for calculating the radius of the Fresnel  Zone     D  The FCC defines EIRP as the output from the antenna  EIRP in a point to   multipoint configuration  which includes any configuration using an omni   directional antenna  is limited to 4 watts by the FCC     A  Gains and losses in a wireless LAN system using like units  dB  amp  dBi  are  always additive  Sometimes this means adding in negative numbers  losses  and  sometimes the numbers are positive  gain   As you ve seen in some of the practice  questions in this section  gain and loss can be calculated by adding all gains and  losses in a system        Spread Spectrum Technology    CWNA Exam Objectives Covered       Identify some of the different uses for spread spectrum  technologies       Wireless LANs    Wireless PANs    Wireless WANs      Comprehend the differences between  and apply the  different types of spread spectrum technologies       FHSS    DSSS        Identify and apply the concepts which make up the  functionality of spread spectrum technology       Co location    Channels     Dwell time    Throughput      Hop time    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     CHAPTER    In This Chapter    Spread Spectrum  Introduction    Frequency Hopping  FHSS   Direct Sequence  DSSS     Comparing FHSS to DSSS    46 Chapter 3     Spread Spectrum Technology    In order to administer and t
279. g for  With indoor wireless LAN installations  it is not as  common to use a Bandwidth Control Unit  BCU  because many users are expecting to  have the same experience as they had on the wired LAN  This simply isn t feasible  considering the extreme bandwidth differences  However  administrators strive to give  indoor LAN users as much bandwidth as possible by not overloading access points  Ina  wireless LAN  the BCU is placed between the access point or bridge and the network  as  shown in Figure 5 36     Using a bandwidth control unit    Bandwidth  Router Control Unit       wy    BCUs typically work by filtering on MAC addresses in order to drop each user into a pre   assigned queue  Each queue has particular properties such as upstream and downstream  bandwidth  Multiple users might be put into the same queue  This allows for precise  bandwidth control and accounting per user  BCUs are managed through various software  packages  such as the one shown in Figure 5 37     144 Chapter 5     Antennas and Accessories    FIGURE 5 37 Manager application for a BCU    E Traffic Shaping Manager    BCU 2   192 168 0 250              Queue 1    Queue 2          ummm 0  14217         Copyright Young Design  Inc  2002  YDI com    Test Kits    There are many types of test kits on the market  One of the most valuable types of test  kits in the wireless LAN industry is one used for testing cables and connectors  The kit  might consist of an RF signal generator and a through line power meter
280. g this type of attacker from the premises first requires locating the source of the  RF signal  Locating an RF signal source can be done with an RF spectrum analyzer   There are many spectrum analyzers on the market  but having one that is handheld and  battery operated is quite useful  Several manufacturers make handheld spectrum  analyzers  and a few wireless LAN manufacturers have created spectrum analyzer  software utilities for use in wireless client devices     When jamming is caused by a non moveable  non malicious source such as a  communications tower or other legitimate system  the wireless LAN administrator might  have to consider using a wireless LAN system that utilizes a different set of frequencies   For example  if an administrator were responsible for the design and installation of an RF  network at a large apartment complex  special considerations might be in order  If an RF  interference source were a large number of 2 4 GHz spread spectrum phones  baby  monitors  and microwave ovens in this apartment complex  then the administrator might  choose to implement 802 1 1a equipment that uses the 5 GHz UNII bands instead of  802 11b equipment that shares the 2 4 GHz ISM band with these other devices     Unintentional jamming occurs regularly due to many different devices across many  different industries sharing the 2 4 GHz ISM band with wireless LANs  Malicious  jamming is not a common threat  The reason RF jamming is not very popular among  hackers is that it 
281. gain and loss are  relative concepts and a decibel is a relative measurement  Gain or loss in an RF system  may be referred to by absolute power measurement  e g  ten watts of power  or by a  relative power measurement  e g  half of its power   Losing half of the power in a system  corresponds to losing 3 decibels  If a system loses half of its power   3 dB   then loses  half again  another  3 dB   then the total system loss is 3 4 of the original power   first   then 1   4     4 of 2   Clearly  no absolute measurement of watts can quantify this  asymmetrical loss in a meaningful way  but decibels do just that     As a quick and easy reference  there are some numbers related to gain and loss that an  administrator should be familiar with  These numbers are      3 dB   half the power in mW    3 dB   double the power in mW   10 dB   one tenth the power in mW   10 dB   ten times the power in mW    We refer to these quick references as the 10 s and 3 s of RF math  When calculating  power gain and loss  one can almost always divide an amount of gain or loss by 10 or 3  or both  These values give the administrator the ability to quickly and easily calculate RF    32 Chapter 2     RF Fundamentals    loss and gain with a fair amount of accuracy without the use of a calculator  In the case  where use of this method is not possible  there are conversion formulas  shown below   that can be used for these calculations     The following is the general equation for converting mW to dBm   P
282. ge or an escort may be required to move throughout the facility freely     When performing a site survey  every square foot of the facility is usually covered in  order to answer all of the questions needed to define the RF coverage              It has been said that RF site surveying is 90  walking  and 10  surveying  This is  usually true  so one should wear very comfortable shoes and make sure that an escort   if necessary  has plenty of time while the survey is being performed     Is physical access to wiring closets and the roof available if needed     Physical access to both the roof and to wiring closets may be needed to determine  antenna placement and network connection points     Security Requirements    What level of network security is necessary     Customers may have very strict demands for data security  or in some cases  no security  may be required  It should be explained to the customer that WEP should not be the only  wireless LAN security method used because WEP can be easily circumvented  Briefly  educating the customer on available security options is an important step in getting  started with a site survey  A discussion with the customer will provide them enough  information to feel informed and will allow them to better understand the solutions likely  to be presented by the design engineer  After this discussion  the customer may likely  have several questions involving wireless network security that may aid the site surveyor  in properly documenting t
283. gies like  Bluetooth  which hops across the entire 2 4 GHz ISM band many times per second  can   and usually do  significantly interfere with 802 11 RF signals  Bluetooth is considered  all band interference for an 802 11 wireless network  In Figure 9 14 a sample screen shot  of a spectrum analyzer recording all band interference is shown     Screenshot of a software spectrum analyzer showing all band interference                Signal Stienghh v  vs  SESE  S  i  g  n  a  I  S  t  f  e  n  9  t  beers tr she a t PAI Diese PARA EAEE  2 402 Hi tequencies AUN  Peak Hold E   Samping Rate       Done     Average E   C Slow      Medum    Fast   Help            A possible source of all band interference that can be found in homes and offices is a  microwave oven  Older  high power microwave ovens can leak as much as one watt of  power into the RF spectrum  One watt is not much leakage for a 1000 watt microwave  oven  but considering the fact that one watt is many times as much power as is emitted  from a typical access point  you can see what a significant impact it might have  Itis not  a given that a microwave oven will emit power across the entire 2 4 GHz band  but it is  possible  depending on the type and condition of the microwave oven  A spectrum  analyzer can detect this kind of problem     When all band interference is present  the best solution is to change to a different  technology  such as moving from 802 11b  which uses the 2 4 GHz ISM band  to 802 11a   which uses the 
284. gital pictures outlining locations of  access points and bridges     As mentioned earlier in this section  the site survey report could take days or weeks  and  may require return visits to the site  The site survey report should be a professional  technical documentation of your investigation and findings of the client   s site  which can  serve as a technical reference for the wireless LAN design and future network  implementations     Hardware placement  amp  configuration information    The report should answer the following questions about hardware placement and  configuration     What is the name of each manageable device       Where and how should each access point and bridge be placed or mounted for  maximum effectiveness       What channels should each access point be on     342 Chapter 11     Site Survey Fundamentals      How much output power should each access point deliver     A list of facts about each access point to be installed  or already installed  should be  included in the RF site survey report  This list should include at least the following      Name of the device     Location within facility     Antenna type to be used     Power output settings     Connectors  amp  cables to be used     Antenna mount type to be used     How power should be provided to unit     How data should be provided to unit      Picture of location where unit is to be installed    Additional Reporting    The site survey report should be focused on informing the customer of the bes
285. good corporate policy starts with management  Recognizing the need  for security and delegating the tasks of creating the appropriate documentation to include  wireless LANs into the existing security policy should be top priority  First  those who  are responsible for securing the wireless LAN segments must be educated in the  technology  Next  the educated technology professional should interact with upper  management and agree on company security needs  This team of educated individuals is  then able to construct a list of procedures and requirements that  if followed by personnel  at every applicable level  will ensure that the wireless network remains as safely guarded  as the wired network     Keep Sensitive Information Private    Some items that should be known only by network administrators at the appropriate  levels are       Usernames and passwords of access points and bridges     SNMP strings     WEP keys     MAC address lists    The point of keeping this information only in the hands of trusted  skilled individuals  such as the network administrator is important because a malicious user or hacker could  easily use these pieces of information to gain access into the network and network  devices  This information can be stored in one of many secure fashions  There are now  applications using strong encryption on the market for the explicit purpose of password  and sensitive data storage     Physical Security    Although physical security when using a traditional wir
286. gure 5 5  This characteristic can be an  important consideration when mounting a high gain omni antenna indoors on the ceiling   If the ceiling is too high  the coverage area may not reach the floor  where the users are  located   Coverage area of a high gain omni directional antenna   Side View Top View    Usage    Omni directional antennas are used when coverage in all directions around the horizontal  axis of the antenna is required  Omni directional antennas are most effective where large  coverage areas are needed around a central point  For example  placing an omni   directional antenna in the middle of a large  open room would provide good coverage   Omni directional antennas are commonly used for point to multipoint designs with a star  topology  See Figure 5 6   Used outdoors  an omni directional antenna should be placed  on top of a structure  such as a building  in the middle of the coverage area  For  example  on a college campus the antenna might be placed in the center of the campus for  the greatest coverage area  When used indoors  the antenna should be placed in the  middle of the building or desired coverage area  near the ceiling  for optimum coverage   Omni directional antennas emit a large coverage area in a circular pattern and are suitable  for warehouses or tradeshows where coverage is usually from one corner of the building  to the other     110 Chapter 5     Antennas and Accessories    FIGURE 5 6    Point to multipoint link           a n Omni Coverag
287. he RC4 stream cipher  TKIP provides for initialization vector  hashing to help defeat passive packet snooping  It also provides a Message Integrity  Check to help determine whether an unauthorized user has modified packets by injecting  traffic that enables key cracking  TKIP includes use of dynamic keys to defeat capture of    Chapter 10     Wireless LAN Security 289    passive keys   a widely publicized hole in the existing Wired Equivalent Privacy  WEP   standard     TKIP can be implemented through firmware upgrades to access points and bridges as  well as software and firmware upgrades to wireless client devices  TKIP specifies rules  for the use of initialization vectors  re keying procedures based on 802 1x  per packet key  mixing  and message integrity code  MIC   There will be a performance loss when using  TKIP  but this performance decrease may be a valid trade off  considering the gain in  network security     AES Based Solutions    AES based solutions may replace WEP using RC4  but in the interim  solutions such as  TKIP are being implemented  Although no products that use AES are currently on the  market as of this writing AES has undergone extensive cryptographic review and a few  companies have submitted their AES based products to NIST for review  The current  802 111 draft specifies use of AES  and  considering most wireless LAN industry players  are behind this effort  AES is likely to remain as part of the finalized standard     Changing data encryption tec
288. he area is totally pitch black  but closer to the ground visibility is clear   If one were to disassemble the light mechanism and remove the reflective mirror from  behind the bulb of a standard flashlight with two D cell batteries  and then set it up so  that the light bulb is hanging in free space  the bulb lights up the room  but there is not  even enough light to read by     The power output of this bulb is only about 2 watts  In the license free 2 4 GHz radio  band  the most power that the FCC allows for powering an omni directional antenna is 1  watt     If half of the light   s power is removed by removing one of the two batteries  the intensity  of the bulb drops considerably  The light   s output decreases because the power output is  proportional to the square of the voltage  meaning that  if the voltage is cut in half  the  power goes down by 25      The next part of the analogy is to imagine installing this 1 watt light on a tall radio tower   mountaintop  or tall building  The amount of light output represents roughly the radiation  power that is present with an amplifier feeding a 6 dBi  decibel  gain omni directional  antenna     Transmit Range Tests    At a distance of approximately 2 mile from this hypothetical tower  one should be able to  see the light with the naked eye  but just barely  This arrangement using the naked eye  would be analogous to a low gain dipole antenna     At a distance of a mile or two away  one will not likely be able to see the bulb 
289. he beacon  In a DSSS system  the beacon contains channel  information     SSID Information    Stations look in beacons for the SSID of the network they wish to join  When this  information is found  the station looks at the MAC address of where the beacon  originated and sends an authentication request in hopes of associating with that access  point  Ifa station is set to accept any SSID  then the station will attempt to join the  network through the first access point that sends a beacon or the one with the strongest  signal strength if there are multiple access points     Traffic Indication Map  TIM     The TIM is used an as indicator of which sleeping stations have packets queued at the  access point  This information is passed in each beacon to all associated stations  While  sleeping  synchronized stations power up their receivers  listen for the beacon  check the  TIM to see if they are listed  then  if they are not listed  they power down their receivers  and continue sleeping     Supported Rates    With wireless networks  there are many supported speeds depending on the standard of  the hardware in use  For example  an 802 11b compliant device supports 11  5 5  2   amp  1  Mbps speeds  This capability information is passed in the beacons to inform the stations  what speeds are supported on the access point     There is more information passed within beacons  but this list covers everything that  could be considered important from an administrator s point of view     1
290. he common problems of a wireless network are not  experienced so time consuming tasks such as site surveys are not required   Centralized connection points  called access points  are minimal so wiring is  minimal     C  The 802 11 family of standards specifically address wireless LANs  There are  many flavors of standards addressing many types of wireless technologies and  various topics related to wireless technologies  For example  802 11  802 11b   802 11g  and 802 1 1a are all specifications of wireless LANs systems whereas  802 11f addresses inter access point protocol and 802 111 addresses wireless LAN  security  The 802 1x standard is for port based network access control     C  Since using a single antenna would likely have severe problems with coverage  and many point to point bridge links  forming a partial or full mesh  would be  highly expensive  the only logical alternative is to use point to multipoint bridge  connectivity between buildings  This is an economically sound and highly effective  solution     C  D  Wireless Internet Service Providers  WISPs  face problems with line of sight  limitations of 2 4 GHz and 5 GHz wireless LAN systems  Antennas must be  installed on rooftops or higher if possible in most cases  Trees and hills both pose  problems to WISPs for the same reason     D  During WWII  actress Hedy Lamarr and composer George Antheil co invented  the frequency hopping communications technique  The U S  military began using  frequency hopping spread
291. he customer s business needs     What corporate policies are in place regarding wireless LAN security implementation  and management     The network manager may not have any security policies in place  If the customer  already has a wireless LAN in place  the existing security policies should be reviewed  before the site survey is started  If corporate security policies relating to wireless LANs  do not exist  ask questions about security requirements regarding installations of wireless  LANs     During the design phase  design is not part of the site survey itself  the RF design  engineer could include a security report detailing security suggestions for this particular  installation  The network administrator could then take this information and form a  corporate policy based on the suggestions  Security policies may differ slightly between    Chapter 11     Site Survey Fundamentals 319    small  medium and enterprise installations  and can sometimes be re used  There are  general security practices that are common to all installations of wireless LANs  These  policies may also include how to manage the wireless network once it is installed     Preparation Exercises    As a thought provoking exercise  consider some of the hypothetical examples mentioned  earlier  small office wireless LAN  international airport wireless LAN  and a wireless  LAN for connecting all the computers at the Olympics   and then ask the following  questions       Are the users mobile within the faci
292. he first standard describing the operation of wireless LANs   This standard contained all of the available transmission technologies including Direct  Sequence Spread Spectrum  DSSS   Frequency Hopping Spread Spectrum  FHSS   and  infrared        g    Infrared s wireless LAN market share is quite small and the technology is very limited  by its functionality  Due to the lack of popularity of infrared technology in the wireless  LAN marketplace  IR will be mentioned  but not covered in detail in this book     The IEEE 802 11 standard describes DSSS systems that operate at 1 Mbps and 2 Mbps  only  Ifa DSSS system operates at other data rates as well  such as 1 Mbps  2 Mbps  and  11 Mbps  then it can still be an 802 11 compliant system  If  however  the system is  operating at any rate other than   or 2 Mbps  then  even though the system is 802 11   compliant because of its ability to work at 1  amp  2 Mbps  it is not operating in an 802 11   compliant mode and cannot be expected to communicate with other 802 11 compliant  devices     IEEE 802 11 is one of two standards that describe the operation of frequency hopping  wireless LAN systems  If a wireless LAN administrator encounters a frequency hopping  system  then it is likely to be either an 802 1 1 compliant or OpenAir compliant system   discussed below   The 802 11 standard describes use of FHSS systems at 1 and 2 Mbps   There are many FHSS systems on the market that extend this functionality by offering  proprietary modes 
293. he following available wireless LAN security  solutions      WEP key solutions     Wireless VPN     Key hopping     AES based solutions    Wireless gateways     802 1x and EAP         Explain the uses of the following corporate security policies and  how they are used to secure a wireless LAN      Securing sensitive information    Physical security     Inventory and audits     Using advanced solutions     Public networks      Identify how and where the following security precautions are  used to secure a wireless LAN      WEP     Cell sizing     Monitoring     User authentication    Wireless DMZ    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     272 Chapter 10     Wireless LAN Security    Wireless LANs are not inherently secure  however  if you do not take any precautions or  configure any defenses with wired LAN or WAN connections  they are not secure either   The key to making a wireless LAN secure  and keeping it secure  is educating those who  implement and manage the wireless LAN  Educating the administrator on basic and  advanced security procedures for wireless LANs is essential to preventing security  breaches into your wireless LAN     In this very important chapter  we will discuss the much maligned 802 11 specified  security solution known as Wired Equivalent Privacy  or WEP  As you may already  know  WEP alone will not keep a hacker out of a wireless LAN for very long  This  chapter will explain why  and offer some steps for how WEP can be used with s
294. he maximum rated speed of the  network    C  Eliminate hidden nodes on the network    D  Diagnose and reduce high overhead between stations    232 Chapter 8     MAC and Physical Layers    Answers to Review Questions    10     11     12     A  B  C  There is no such thing as an IESS service set type  The rest can all use  DCF mode     A  C  There is no such thing as an IESS service set type  Any time there is an  access point present in the wireless LAN  which rules out IBSS networks   you can  use PCF mode  provided the access point supports it   IBSS networks have no  access points  and clients communicate directly with each other  There is no access  point to perform polling     C  By turning on RTS CTS with the threshold set to a given packet size  the heavy  bursts of traffic during the day would cause minimal disruption for other users in a  congested WLAN  The threshold setting is used for occasions such as this with  great success     D  While PCF mode is not the answer to every QoS need  it does provide a given  level of QoS by providing predictable latencies in the wireless LAN     B  A short interframe space  SIFS  is used between the data packet receipt and the  acknowledgement reply  SIFS are used before and after many frame types on  wireless networks such as RTS  CTS  ACK  PSP frames  etc     D  It is impossible to detect collisions on a wireless LAN  For this reason  the  CSMA CA protocol  the RTS CTS protocol  and positive acknowledgements are  used in order t
295. he same network without the expense of leased lines  or the need to dig up the ground between buildings  With the proper wireless antennas   any number of buildings can be linked together on the same network  Certainly there are  limitations to using wireless LAN technology  as there are in any data connectivity  solution  but the flexibility  speed  and cost savings that wireless LANs introduce to the  network administrator make them indispensable     There are two different types of building to building connectivity  The first is called  point to point  PTP   and the second is called point to multipoint  PTMP   Point to point  links are wireless connections between only two buildings  as illustrated in Figure 1 3   PTP connections almost always use semi directional or highly directional antennas at  each end of the link     Building to building connectivity                                                                                                                                                                                                                         Point to multipoint links are wireless connections between three or more buildings   typically implemented in a  hub and spoke  or star topological fashion  where one  building is the central focus point of the network  This central building would have the  core network  Internet connectivity  and the server farm  Point to multipoint links  between buildings typically use omni directional antennas in the cent
296. he surveyor may have to conduct the  site survey during non production hours     Chapter 11     Site Survey Fundamentals 335    Are there any plans for future wireless LAN installations other than the one in question     Determine if there is another wireless LAN project that needs to be included in the  analysis  These projects could affect implementation of the wireless LAN for which this  site survey is being performed     If this is a multi tenant building  are there any other organizations within the building  that have wireless LANs or sources of RF  Are any other organizations planning  wireless LAN implementations     For multi tenant buildings  it is possible that another organization within the same  building is also planning to build a wireless LAN in the future that would impact the site  survey  as shown in Figure 11 17  Organizations within the same multi tenant office  building could have wireless LANs in place disrupting each other   s communications  If  the location is a high rise building  try to find out if any of the neighboring high rises  have wireless LANs     FIGURE 11 17 Multi tenant Office Buildings    ABC Corp   802 11b Wireless LAN 3rd Floor  Coverage Area    Proposed Wireless 2nd Floor  LAN for Client  XYZ Corp   802 11b Wireless LAN 1st Floor       Are there any other common sources of RF interference in the 2 4 GHz band in use in the  facility     Microwave ovens  2 4 GHz cordless phones  radiology equipment  and baby monitors are  common sourc
297. hear  detect  one or more of the other nodes connected to the wireless LAN  In  this situation  a node can see the access point  but cannot see that there are other clients  also connected to the same access point due to some obstacle or a large amount of  distance between the nodes  This situation causes a problem in medium access sharing   causing collisions between node transmissions  These collisions can result in  significantly degraded throughput in the wireless LAN  as illustrated in Figure 9 7     Hidden Node    Access Point         Ay  ay     2 at Wall  e   e   oye ee  Client A Client B    Figure 9 7 illustrates a brick wall with an access point sitting on top  On each side of the  wall is a wireless station  These wireless stations cannot hear each other s transmissions   but both can hear the transmissions of the access point  If station A is transmitting a  frame to the access point  and station B cannot hear this transmission  station B assumes  that the medium is clear and can begin a transmission of its own to the access point  The  access point will  at this point  be receiving transmissions that have originated at two  points and there will be a collision  The collision will cause retransmissions by both  stations A  amp  B  and again  since they cannot hear each other  they will transmit at will  thinking the medium is clear  There will likely be another collision  This problem is  exacerbated with many active nodes on the wireless LAN that cannot hear one a
298. here is to first realize that gains and  losses are additive so a 2 dB loss and an 11 dBi gain equals 9 dB of change    Luckily  9 dB is divisible by 3  so we have 100 x 2 x 2 x 2   800 mW of output  power at the antenna  EIRP      D  This question is a simple addition subtraction problem from start to finish  20  dBm   6 dB   10 dB   3 dB   6 dBi   27 dBm  It starts and ends with absolute  amounts of power  but adds and subtracts changes in power along the way     B  Instead of the usual question that begins and ends with an absolute amount of  power  measured in mW or dBm   this question is testing your understanding of the  additive nature of power change   3 dB    3 dB  12 dB  9 dBi     5dB yields a  combined power change of  10 dB     A  Having mismatched impedances between any two devices in a system can cause  VSWR at that point of connection  This concept applies to cables  connectors  the  output circuit of the transmitter  the input circuit of the receiver  the antenna  and  any other device in the system     A  The angles of the horizontal and vertical beamwidth determine exactly what  direction the RF waves will propagate from the antenna  Waves propagate within  these angles in all directions simultaneously     C  The Fresnel Zone is an area around the direct path between the transmitter and  the receiver that must be mostly clear  60 80   in order to avoid RF signal  interference  Trees  buildings  and many other objects tend to get into the Fresnel  Zone of lon
299. hether RF links are viable without overstepping  power limitations set by the FCC  Each of these factors must be taken into account when  planning a wireless LAN  and all of these factors are related mathematically  The  following section explains the units of measurement that are used to calculate power  output when configuring wireless LAN devices     Units of Measure    There are a few standard units of measure that a wireless network administrator should  become familiar with in order to be effective in implementing and troubleshooting  wireless LANs  We will discuss them all in detail  giving examples of their usage  We  will then put them to use in some sample math problems so that you have a solid grasp of  what is required as part of the CWNA s job tasks     Watts  W     The basic unit of power is a watt  A watt is defined as one ampere  A  of current at one  volt  V   As an example of what these units mean  think of a garden hose that has water  flowing through it  The pressure on the water line would represent the voltage in an  electrical circuit  The water flow would represent the amperes  current  flowing through  the garden hose  Think ofa watt as the result of a given amount of pressure and a given  amount of water in the garden hose  One watt is equal to an Ampere multiplied times a  Volt     A typical 120 volt plug in night light is about 7 watts  On a clear night this 7 W light  may be seen 50 miles  83 km  away in all directions  and  if we could somehow en
300. hey should stay awake long enough to  receive it  ATIMs and beacons are both sent during the ATIM window  The process  followed by stations in order to pass traffic between peers is       Stations are synchronized through the beacons so they wake up before the ATIM  window begins       The ATIM window begins  the stations send beacons  and then stations send  ATIM frames notifying other stations of buffered traffic destined to them       Stations receiving ATIM frames during the ATIM window stay awake to receive  data frames  If no ATIM frames are received  stations go back to sleep       The ATIM window closes  and stations begin transmitting data frames  After  receiving data frames  stations go back to sleep awaiting the next ATIM window     This PSP process for an IBSS is illustrated in Figure 7 19     202 Chapter 7     802 11 Network Architecture    FIGURE 7 19 PSP Mode in an IBSS    Well before next ATIM Window    eS All clients are asleep      Just before ATIM Window          eS Beacons eS  During ATIM Window             have data to send    After ATIM Window            Here is the data            Repeat the Process       As a wireless LAN administrator  you need to know what affect power management  features will have on performance  battery life  broadcast traffic on your LAN  etc  In the  example described above  the effects could be significant     Chapter 7     802 11 Network Architecture 203    Key Terms    Before taking the exam  you should be familiar with the 
301. hically strong secret as a byproduct of successful  authentication  which enables the two parties to communicate securely     EAP SIM  GSM   EAP SIM is a mechanism for Mobile IP network access authentication  and registration key generation using the GSM Subscriber Identity Module  SIM   The  rationale for using the GSM SIM with Mobile IP is to leverage the existing GSM  authorization infrastructure with the existing user base and the existing SIM card  distribution channels  By using the SIM key exchange  no other preconfigured security  association besides the SIM card is required on the mobile node  The idea is not to use  the GSM radio access technology  but to use GSM SIM authorization with Mobile IP  over any link layer  for example on Wireless LAN access networks     It is likely that this list of EAP authentication types will grow as more and more vendors  enter the wireless LAN security market  and until the market chooses a standard        The different types of EAP authentication are not covered on the CWNA exam  but  understanding what EAP is and how it is used in general is a key element in being  effective as a wireless network administrator     VPN Solutions    VPN technology provides the means to securely transmit data between two network  devices over an unsecure data transport medium  It is commonly used to link remote  computers or networks to a corporate server via the Internet  However  VPN is also a  solution for protecting data on a wireless network  VP
302. hniques to a solution that is as strong as AES will make a  significant impact on wireless LAN security  but there still must be scalable solutions  implemented on enterprise networks such as centralized encryption key servers to  automate the process of handing out keys  Ifa client radio card is stolen with the AES  encryption key embedded  it would not matter how strong AES is because the perpetrator  would still be able to gain access to the network     Wireless Gateways    Residential wireless gateways are now available with VPN technology  as well as NAT   DHCP  PPPoE  WEP  MAC filters  and perhaps even a built in firewall  These devices  are sufficient for small office or home office environments with few workstations and a  shared connection to the Internet  Costs of these units vary greatly depending on their  range of offered services  Some of the high end units even boast static routing and  RIPv2     Enterprise wireless gateways are a special adaptation of a VPN and authentication server  for wireless networks  An enterprise gateway sits on the wired network segment between  the access points and the wired upstream network  As its name suggests  a gateway  controls access from the wireless LAN onto the wired network  so that  while a hacker  could possibly listen to or even gain access to the wireless segment  the gateway protects  the wired distribution system from attack     An example of a good time to deploy an enterprise wireless LAN gateway might be the  foll
303. how to design the  wireless network  meeting business requirements  and network security  There are  no software utilities on the market as of this writing that can measure Fresnel Zone  interference     3  C  An RF site survey is the most important step to performing a successful wireless  LAN implementation  Nobody can force an organization to do a site survey  but the  results of implementing a wireless LAN without first performing a thorough site  survey first can be costly in terms of both time and money     4  A B  Itis not necessary to be intimate with a customer s wired network topology  although a basic understanding might be beneficial  Having access to wiring closets  and the roof and having current copies of building floor plans or blueprints is  essential to performing the site survey in an efficient manner  The alternative to  having this information is having to find wiring closets  guess locations of RF  barriers  and create a floor plan on grid paper or in a software application     5  D  Although part of a site survey is gathering information such as business  requirements for the wireless LAN  it s important to note that these pieces of  information are helpful  but not absolutely required in order to perform the site  survey  In its most basic form  a site survey is simply a determination of RF  coverage areas and dead spots and finding interference sources     6   lt A  All of the functions listed are part of the site survey itself other than interviewing
304. ible  This procedure may include moving the  transmitting and receiving antennas  Multipath is likely the most common  textbook   wireless LAN problem  Administrators and installers deal with multipath daily  Even    Chapter 9  Troubleshooting Wireless LAN Installations 241    wireless LAN users   because they are mobile   experience problems with multipath   Users may roam into an area with high multipath  not knowing why their RF signal has  been so significantly degraded     Solutions for Multipath    Antenna diversity was devised for the purpose of compensating for multipath  Antenna  diversity means using multiple antennas  inputs  and receivers in order to compensate for  the conditions that cause multipath  There are four types of receiving diversity  one of  which is predominantly used in wireless LANs  The type of transmission diversity used  by wireless LANs is also described below     Antenna Diversity   not active  o Multiple antennas on single input  o Rarely used    Switching Diversity  o Multiple antennas on multiple receivers  o Switches receivers based on signal strength    Antenna Switching Diversity     active  o Used by most WLAN manufacturers  o Multiple antennas on multiple inputs   single receiver  o Signal is received through only one antenna at a time     Phase Diversity  o Patented proprietary technology    o Adjusts phase of antenna to the phase of the signal in order to maintain signal  quality      Transmission Diversity  o Used by most WLAN manuf
305. ication at www netstumbler com       Making the SSID something company related     This type of setting is a security  risk because it simplifies the process of a hacker finding the company s physical  location  When looking for wireless LANs in any particular geographic region   finding the physical location of the wireless LAN is half the battle  Even after  detecting the wireless LAN using tools such as Netstumbler  finding where the  signal originates takes time and considerable effort in many cases  When an  administrator uses an SSID that names the company or organization  it makes  finding the wireless LAN very easy  Always use non company related SSIDs       Using the SSID as a means of securing wireless networks     This practice is  highly discouraged since a user must only change the SSID in the configuration  setting is his workstation in order to join the network  SSIDs should be used as a  means of segmenting the network  not securing it  Again  think of the SSID as  the network name  Just as with Windows  Network Neighborhood  changing the  workgroup your computer is a part of and is as simple as changing a  configuration setting on the client station       Unnecessary Broadcasting of SSIDs   If your access points have the ability to  remove SSIDs from beacons and probe responses  configure them that way  This  configuration aids in deterring casual eavesdroppers from tinkering with or using  your wireless LAN     280 Chapter 10     Wireless LAN Security    MAC
306. ier to this scenario  the signal produced by the  access point will be amplified before the antenna transmits the signal  Even though  the received signal is the same amplitude as before  the bi directional amplifier  boosts the signal before it enters the access point so that the signal is above the  amplitude threshold of the access point     7  D  Free Space Path Loss or just  Path Loss  is the reason that the amplitude of the  RF signal at the receiver is significantly less than what was transmitted  Path Loss is  a result of both the natural broadening of the wave front and the size of the receiving  aperture     8  C  Power over Ethernet is used for getting DC power to an access point from a  power injector  Access points located further than 100 meters from a wiring closet   where the injector will be located  will not have the luxury of PoE because the DC  power is sent over the same cable as the data  Since Cat5 cable can only extend to  100 meters and still be used for reliable data transmission  PoE should not be used  on cable lengths over 100 meters     10     11     12     13     14     15     16     17     Chapter 5     Antennas and Accessories 151    A  C  D  RF line of sight is critical for the proper functioning of any wireless LAN  link  Not having line of sight means that throughput will be reduced  possibly  significantly  Installing lightning arrestors  sealing connectors that are outside the  building  proper grounding  and lightning rods may all be sig
307. if and when you begin to implement PoE     First  there is no industry standard on implementation of PoE  This means that the  manufacturers of PoE equipment have not worked together and agreed on how this  equipment should interface with other devices  If you are using a wireless device such as  an access point and will be powering it using PoE  it is recommended that you purchase  the PoE device from the same manufacturer as the access point  This recommendation  holds true for any device when considering powering with PoE     Second  and similar in nature to the first caveat  is that the output voltage required to  power a wireless LAN device differs from manufacturer to manufacturer  This caveat is  another reason to use the same vendor s equipment when using PoE  When in doubt  ask  the manufacturer or the vendor from whom the equipment was purchased     Finally  the unused pins used to carry the current over Ethernet are not standardized  One  manufacturer may carry power on pins 4 and 5  while another carries power on pins 7 and  8  If you connect a cable carrying power on pins 4 and 5 to an access point that does not  accept power on those pins  the access point will not power up     Chapter 5     Antennas and Accessories 123    Single port DC Voltage Injectors    Access points and bridges that specify mandatory use of PoE include single port DC  voltage injectors for the purpose of powering the unit  See Figure 5 18 below for an  example of a single port DC voltage i
308. igh accuracy instrumentation such as SWR meters  but this measurement is beyond  the scope of this text and the job tasks of a network administrator     Solutions to VSWR    To prevent the negative effects of VSWR  it is imperative that all cables  connectors  and  devices have impedances that match as closely as possible to each other  Never use 75   Ohm cable with 50 Ohm devices  for example  Most of today   s wireless LAN devices  have an impedance of 50 Ohms  but it is still recommended that you check each device  before implementation  just to be sure  Every device from the transmitter to the antenna  must have impedances matching as closely as possible  including cables  connectors   antennas  amplifiers  attenuators  the transmitter output circuit  and the receiver input  circuit     Principles of Antennas    It is not our intention to teach antenna theory in this book  but rather to explain some very  basic antenna principals that directly relate to use of wireless LANs  It is not necessary  for a wireless LAN administrator to thoroughly understand antenna design in order to  administer the network  A couple of key points that are important to understand about  antennas are       Antennas convert electrical energy into RF waves in the case of a transmitting  antenna  or RF waves into electrical energy in the case of a receiving antenna       The physical dimensions of an antenna  such as its length  are directly related to    26 Chapter 2  RF Fundamentals    the frequ
309. ily devices   A  802 11a devices operate at a maximum of 54 Mbps   B  802 11a devices operate in the 5 GHz ISM band   C  802 11a devices operate in the 5 GHz UNII bands  D    802 11a devices use Barker Code modulation    170 Chapter 6     Wireless LAN Organizations and Standards    10     11     12     13     14     Which of the following statements are true  Choose all that apply    A  The IEEE is government regulated   B  The FCC is a government agency   C  The IEEE sets the allowable RF power outputs in the United States  D  The FCC specifies connectivity speeds for the 802 11 standard    What does the Wi Fi    seal of approval indicate   A  A  vendor   s hardware has a WECA chipset in it    B  A vendor   s hardware has been proven interoperable with other vendor   s  hardware    C  A wireless LAN meets the IEEE 802 11 standard  D  A wireless LAN meets FCC regulations    Which organization creates the regulations that wireless LANs must abide by     A  IEEE    B  FCC  C  WECA  D  WLANA    You have been hired to take over the administration of a wireless LAN on a small  college campus  The campus uses one omni directional antenna to connect 6  buildings  One day an inspector with the FCC tells you that the power output at the  element of your antenna is too high and violating FCC laws  What is the maximum  power output at which you can set the EIRP to comply with the law     A  125mW    B  1W  C  2W  D  4W    The FCC s jurisdiction covers which of the following  Choose all 
310. in both RF and light based transmission technologies     IEEE 802 116     describes somewhat faster data transfer rates and a more restrictive scope  of transmission technologies  This standard is also widely promoted as Wi Fi    by the  Wireless Ethernet Compatibility Alliance  or WECA     IEEE 802 1 1a   describes much faster data transfer rate than  but lacks backwards  compatibility with  IEEE 802 11b  and uses the 5 GHz UNII frequency bands     IEEE 802 11 g   the most recent draft based on the 802 11 standard that describes data  transfer rates equally as fast as IEEE 802 1 1a  and boasts the backward compatibility to  802 11b required to make inexpensive upgrades possible     Emerging technologies will require standards that describe and define their proper  behavior  The challenge for manufacturers and standards makers alike will be bringing  their resources to bear on the problems of interoperability and compatibility     Applications of Wireless LANs    When computers were first built  only large universities and corporations could afford  them  Today you may find 3 or 4 personal computers in your neighbor   s house  Wireless  LANs have taken a similar path  first used by large enterprises  and now available to us  all at affordable prices  As a technology  wireless LANs have enjoyed a very fast  adoption rate due to the many advantages they offer to a variety of situations  In this  section  we will discuss some of the most common and appropriate uses of wireless  
311. in salary  The CWNP program is positioned to be that certification for wireless  networking  Imagine if you had CCIE  MCSE  or CNE in 1993  Advancement in  wireless technologies will follow the same steps as other certifications     an increase in  responsibilities within your organization  perhaps followed by increases in salary     Introduction xix    How Do You Get CWNA Certified     The CWNP program consists of multiple levels of certification  beginning with CWNA   You can become CWNA certified by passing one written exam  The CWNA exam is  currently available at all Prometric testing centers worldwide     The best way to prepare for the CWNA exam is to attend a CWNA training course or to  study at your own pace with this book  The CWNA practice exam will provide you with  a good idea of the types of questions that can be found on the real exam  The CWNA  practice exam is available at http   www quizware com  Complete information on  available training for the CWNA certification is available at http   www cwne com           As you prepare for the CWNA exam  and the other  more advanced CWNP certifications   we highly recommend that you practice with wireless LAN gear  The best part of that  recommendation is that wireless LAN gear is plummeting in price  As of the writing of  this book  you can get a basic wireless LAN  Access Point  USB Client  PC Card  PCI  Card  for less than  500 retail     xx Introduction    Exam Objectives    The CWNA certification covering the 200
312. increased  As the bulb gets brighter through the night scope  so does all the background  light  If the brightness control is turned up full  the light from the bulb is overcome by all  the background noise created by the light amplification circuitry and the light itself gets  lost in this background light     If the gain on the night scope is turned down to the point at which the bulb is as bright as  possible without an intolerable increase in the background light  this point represents the  optimum    signal to noise    ratio for this particular configuration  Turning up the  brightness  gain  did not improve the visibility of the bulb  but instead  stressed the  viewer   s eyes and made the viewer   s iris close up to compensate for the increase in the  overall light level caused by the increased brightness  gain      The lesson from this situation is  use only as much receiver gain as is necessary because  too much gain can cause less than optimum results  A delicate balance exists within the  ratio of the signal to the noise when working with radio frequency     Receive range tests    The above example explained the analysis of what the client side of the RF link would  see  Below  we will look in the other direction of the signal  what the unit on the tower  would see  A wireless LAN requires two way communication  and connectivity is  impossible if the client can see the tower   s signal  but the tower cannot see the client   s  signal     Continuing with the light a
313. ion  This is the case when  most brand new access points and PC cards are installed in their default configuration   We will discuss two types of authentication processes later in this chapter     The client begins the authentication process by sending an authentication request frame to  the access point  in infrastructure mode   The access point will either accept or deny this  request  thereafter notifying the station of its decision with an authentication response  frame  The authentication process can be accomplished at the access point  or the access  point might pass along this responsibility to an upstream authentication server such as  RADIUS  The RADIUS server would perform the authentication based on a list of  criteria  and then return its results to the access point so that the access point could return  the results to the client station     Association    Once a wireless client has been authenticated  the client then associates with the access  point  Associated is the state at which a client is allowed to pass data through an access  point  If your PC card is associated to an access point  you are connected to that access  point  and hence  the network     The process of becoming associated is as follows  When a client wishes to connect  the  client sends an authentication request to the access point and receives back an  authentication response  After authentication is completed  the station sends an  association request frame to the access point who replies to
314. ion documents  are placed on  the client machine ahead of time  This placement is done so that when the user wishes to  authenticate to the wireless network  the authentication mechanism is already in place on  the client station  Both of these methods have historically been implemented in a manual  fashion  but there are applications available today that allow automation of this process     Emerging Wireless Security Solutions    There are many new authentication security solutions and protocols on the market today   including VPN and 802 1x using Extensible Authentication Protocol  EAP   Many of  these security solutions involve passing authentication through to authentication servers  upstream from the access point while keeping the client waiting during the authentication  phase  Windows XP has native support for 802 11  802 1x  and EAP  Cisco and other  wireless LAN manufacturers also support these standards  For this reason  it is easy to  see that the 802 1x and EAP authentication solution could be a common solution in the  wireless LAN security market     802 1x and EAP    The 802 1x  port based network access control  standard is relatively new  and devices  that support it have the ability to allow a connection into the network at layer 2 only if  user authentication is successful  This protocol works well for access points that need the  ability to keep users disconnected if they are not supposed to be on the network  EAP is  a layer 2 protocol that is a flexible r
315. ion during a site  survey  Perhaps during the implementation of a wireless LAN security solution   getting the names of users for the purposes of entering them into a database would  be useful  but keep in mind that a site survey consists mostly of identifying RF  coverage and dead spots for particular areas     A  D  E  Obstructions and link distance are important to record during an outdoor  site survey because both figure into link budget calculations  Earth bulge  Path  Loss  Fresnel Zone encroachment  transmit power  and many other factors play into  calculating how much power the receiving antenna will receive  Knowing where  power receptacles and weatherproof enclosures are located  if they are available   helps in knowing whether they will have to be installed later or if equipment will  have to be located indoors rather than outdoors     A  C  Interference sources  distances from the access point where RF signals remain  viable  and RF coverage pattern  including  dead spots   should all be a part of the  RF site survey  There are many other items that should be included as well  such as  locations of infrastructure devices  digital pictures  suggested output power and  antenna selection information for access points and bridges  and channel selection  information on a per access point basis     C  SNR is measured in decibels  dB   Signal to noise ratio is a relative  measurement of the noise floor in relation to the peak of the RF data signal  which is  used to dete
316. ion system can be  either wired  wireless  LAN  WAN  or any other method of network connectivity  An  ESS must have at least 2 access points operating in infrastructure mode  Similar to a  BSS  all packets in an ESS must go through one of the access points     FIGURE 7 10 Extended Service Set       Coverage may overlap  to provide roaming capabilities    Other characteristics of extended service sets  according to the 802 11 standard  are that  an ESS covers multiple cells  allows     but does not require     roaming capabilities  and  does not require the same SSID in both basic service sets     Independent Basic Service Set  IBSS     An independent basic service set is also known as an ad hoc network  An IBSS has no  access point or any other access to a distribution system  but covers one single cell and  has one SSID  as shown in Figure 7 11  The clients in an IBSS alternate the  responsibility of sending beacons since there is no access point to perform this task     Chapter 7     802 11 Network Architecture 191    FIGURE 7 11 Independent Basic Service Set    In order to transmit data outside an IBSS  one of the clients in the IBSS must be acting as  a gateway  or router  using a software solution for this purpose  In an IBSS  clients make  direct connections to each other when transmitting data  and for this reason  an IBSS is  often referred to as a peer to peer network     Roaming    Roaming is the process or ability of a wireless client to move seamlessly from one ce
317. ions  This database can be searched at the following web address   http   gullfoss2 fcc gov cgi   bin ws exe prod oet forms reports Search_Form hts form Generic Search    This website is meticulously maintained by the FCC  and is always current  Typical  updates are a minimum of weekly  The end user is liable for violations of FCC rules  while they use the equipment  FCC violations may result in fines of  27 500     1 200 000 per violation  The FCC usually typically allows a violator a brief  e g  10  days  time to correct the problem and report to the FCC how the violation was repaired   It is not uncommon for the FCC to audit a Wireless ISP looking for certified system  infractions     Many manufacturers do not produce amplifiers to be used with their systems  For this  reason  there are companies that produce amplifiers  but not wireless LAN hardware  that  obtain FCC certification of an entire wireless LAN system using their amplifiers and  another vendor   s wireless LAN hardware together  Be careful in what type of amplifiers  you buy in that some amplifiers cause the FCC to only certify systems as being able to  use DSSS channels 2 10 or 3 9 instead of 1 11 like an unamplified system  This is due to  how the RF signal is amplified and bleeds over into licensed RF frequency spectrum  outside of the ISM or UNII bands     The FCC s CFR 15 203 says that installers are responsible to make sure that intentional  radiators are used with authorized antennas  Antennas may be ma
318. ions within a facility  a set of two way radios if working in teams  and a  secure case for the gear  Some manufacturers sell site survey kits already configured  but  in many cases  the individual prefers to select the tool kit and wireless LAN equipment  piece by piece to assure that they get all of the pieces they need  A more comprehensive  list of equipment required during a site survey is provided in a checklist at the end of this  section     Point    The access point used during a site survey should have variable output power and  external antenna connectors  The variable output power feature allows for easy sizing of  coverage cells during the site survey  This tool is particularly useful for situations  involving long hallways such as in a hospital             Very few manufacturers have a variable output power feature in an access point  but  more vendors are expected to add this feature in the future  It is not hard to see how  changing output power in software is more convenient than adding  mounting  and then  dismounting and removing antennas with different amounts of gain     Many experienced site survey professionals have an access point that operates on AC  power connected to a DC to AC converter  which  in turn  is connected  to a battery pack   This configuration makes the access point mobile  and able to be placed anywhere the    Chapter 11     Site Survey Fundamentals 321    site surveyor needs to perform testing  This group of components can be tie stra
319. ireless Networks  Limited and Tracked Access  Security Recommendations  WEP  Cell Sizing  User Authentication  Security Needs  Use Additional Security Tools  Monitoring for Rogue Hardware  Switches  not hubs  Wireless DMZ  Firmware  amp  Software Updates  Key Terms  Review Questions  Answers to Review Questions  Site Survey Fundamentals  What is a Site Survey   Preparing for a Site Survey  Facility Analysis  Existing Networks  Area Usage  amp  Towers  Purpose  amp  Business Requirements  Bandwidth  amp  Roaming Requirements  Available Resources  Security Requirements  Preparation Exercises  Preparation Checklist  Site Survey Equipment  Access Point  PC Card and Utilities  Laptops  amp  PDAs  Paper  Outdoor Surveys  Spectrum Analyzer  Network Analyzer  a k a   Sniffer    Site Survey Kit Checklist  Conducting a Site Survey  Indoor Surveys  Outdoor Surveys  Before You Begin  RF Information Gathering  Range and Coverage Patterns  Data Rate Boundaries  Documentation  Throughput Tests  amp  Capacity Planning  Interference Sources  Wired Data Connectivity  amp  AC Power Requirements  Outdoor Antenna Placement  Spot Checks    293  294  294  294  295  295  295  296  296  297  297  297  297  298  299  300  305  307  308  309  310  311  313  314  315  317  318  319  319  320  320  321  323  323  324  324  325  326  328  328  329  329  330  331  333  333  334  334  337  338  339    Appendix A    Site Survey Reporting  Report Format  Purpose and Business Requirements  Methodology  RF Cove
320. ireless network       The range of the wireless network will likely extend beyond the physical  boundaries of an office or home  giving intruders the means to compromise the  network     The ease and scalability with which wireless LAN solutions can be deployed makes them  ideal solutions for many different environments  As a result  implementation of VPN  security will vary based on the needs of each type of environment  For example  a hacker  with a wireless sniffer  if he obtained the WEP key  could decode packets in real time   With a VPN solution  the packets would not only be encrypted  but also tunneled  This  extra layer of security provides many benefits at the access level     An important note here is that not all VPNs let wireless users roam between subnets or  networks without    breaking    the secure tunnel  and not all VPNs will permit transport  and applications connections to remain established during roaming  Another stumbling  block is the operating system     what operating system or systems do the mobile clients  have to be running in order to get the protections of a wireless VPN     Chapter 7     802 11 Network Architecture 189    Service Sets    A service set is a term used to describe the basic components of a fully operational  wireless LAN  In other words  there are three ways to configure a wireless LAN  and  each way requires a different set of hardware  The three ways to configure a wireless  LAN are      Basic service set     Extended service s
321. is available  such as VPNs  firewalls  intrusion  detection systems  IDS   standards and protocols such as 802 1x and EAP  and client  authentication with RADIUS can help make wireless solutions secure above and beyond  what the 802 11 standard requires  The cost and time to implement these solutions vary  greatly from SOHO solutions to large enterprise solutions     Monitoring for Rogue Hardware    To discover rogue access points  regular access point discovery sessions should be  scheduled but not announced  Actively discovering and removing rogue access points  will likely keep out hackers and allow the administrator to maintain network control and  security  Regular security audits should be performed to locate incorrectly configured  access points that could be security risks  This task can be done while monitoring the  network for rogue access points as part of a regular security routine  Present  configurations should be compared to past configurations in order to see if users or  hackers have reconfigured the access points  Access logs should be implemented and  monitored for the purpose of finding any irregular access on the wireless segment  This  type of monitoring can even help find lost or stolen wireless client devices     Switches  not hubs    Another simple guideline to follow is always connecting access points to switches instead  of hubs  Hubs are broadcast devices  so every packet received by the hub will be sent out  on all of the hub   s other ports  If a
322. is fairly expensive to mount an attack  considering the cost of the  required equipment  and the only victory that the hacker gets is temporarily disabling a  network     286 Chapter 10     Wireless LAN Security    Man in the middle Attacks    FIGURE 10 9    A man in the middle attack is a situation in which a malicious individual uses an access  point to effectively hijack mobile nodes by sending a stronger signal than the legitimate  access point is sending to those nodes  The mobile nodes then associate to this rogue  access point  sending their data  possibly sensitive data  into the wrong hands  Figure  10 9 illustrates a man in the middle attack  hijacking wireless LAN clients     In order to get clients to reassociate with the rogue access point  the rogue access point s  power must be much higher than that of the other access points in the area and something  has to actively cause the users to roam to the rogue access point  Losing connectivity  with a legitimate access point happens seamlessly as a part of the roaming process so  some clients will connect to the rogue accidentally  Introducing all band interference  into the area around the legitimate access point  as with a Bluetooth device  can cause  forced roaming     Man in the middle attack       An access point and sometimes a  workgroup bridge are used to hijack users    The person perpetrating this man in the middle attack would first have to know the SSID  that the wireless clients are using  and  as we   v
323. is recognized and greatly  appreciated     Stan Brooks  Bill Waldo  and Barry Oxford  each of whom brought a unique set of  skills to the review and quality assurance process for this publication  Their time  effort  and eye for necessary changes were immeasurable  and helped to publish this book in a  timely manner     vi Contents    Contents at a Glance    Introduction  Chapter 1  Chapter 2  Chapter 3  Chapter 4  Chapter 5  Chapter 6  Chapter 7  Chapter 8  Chapter 9  Chapter 10  Chapter 11  Appendix A    Glossary    Introduction to Wireless LANs   Radio Frequency  RF  Fundamentals  Spread Spectrum Technology   Wireless LAN Infrastructure Devices  Antennas and Accessories   Wireless LAN Organizations and Standards  802 11 Network Architecture   MAC and Physical Layers   Troubleshooting Wireless LAN Installations  Wireless LAN Security   Site Survey Fundamentals    RF in Perspective    xvi    17   45   71  105  153  175  211  235  271  307  353  359    Contents    Introduction  Chapter 1    Chapter    2    Introduction to Wireless LANs  The Wireless LAN Market  Today   s Wireless LAN Standards  Applications of Wireless LANs  Access Role  Network Extension  Building to Building Connectivity  Last Mile Data Delivery  Mobility  Small Office Home Office  Summary  Key Terms  Review Questions  Answers to Review Questions  Radio Frequency  RF  Fundamentals  Radio Frequency  RF Behaviors  Gain  Loss  Reflection  Refraction  Diffraction  Scattering  Absorption  Voltage Standing Wave R
324. istrator  must understand communication parameters that are configurable on the equipment and  how to implement those parameters  In order to estimate throughput across wireless  LANs  one must understand the affects of these parameters and collision handling on  system throughput  This section conveys a basic understanding of many configurable  parameters and their affects on network performance     Wireless LAN Frames vs  Ethernet Frames    Once a wireless client has joined a network  the client and the rest of the network will  communicate by passing frames across the network  in almost the same manner as any  other IEEE 802 network  To clear up a common misconception  wireless LANs do NOT  use 802 3 Ethernet frames  The term wireless Ethernet is somewhat of a misnomer   Wireless LAN frames contain more information than common Ethernet frames do  The  actual structure of a wireless LAN frame versus that of an Ethernet frame is beyond the  scope of both the CWNA exam as well as a wireless LAN administrator   s job     Something to consider is that there are many types of IEEE 802 frames  but there is only  one type of wireless frame  With 802 3 Ethernet frames  once chosen by the network  administrator  the same frame type is used to send all data across the wire just as with  wireless  Wireless frames are all configured with the same overall frame format  802 3  Ethernet has a maximum frame size of 1518 bytes before fragmentation is required by the  standard  but can be in
325. it of measure  dBi  means an amount of gain relative to an isotropic  radiator  Isotropic radiators are spheres that radiate RF in all directions  simultaneously such as the sun  We are unable to make such an isotropic radiator   so any amount of horizontal squeezing of this sphere is considered gain over the  distance that the isotropic radiator would have radiated the signal  Decibels  or     dB     are the unit of measure used to measure gain or loss of an RF signal while in a  copper conductor or waveguide     C  When thinking of Path Loss  consider blowing a bubble with chewing gum  As  the bubble gets larger  the amount of gum at any point on the surface gets thinner  If  a one inch square section of this bubble were taken while the bubble is small  more  gum would be gathered than if the same amount of gum were taken when the bubble  is much larger  This natural broadening of the wavefront thins the amount of power  that a receiver can gather  The one inch section of gum represents how much power  the receiving aperture  antenna element  can receive     A  B  C  Due to the Canadian Department of Communications and FCC regulations  implemented in 1994  manufacturers had to produce proprietary connectors for their  wireless LAN equipment  Because of this fact  many different variations on  connector types have been created  A good example is the N type connector  There  are standard  reverse threaded  and reverse polarity N type connectors on the market  today  There s n
326. itted in each band  Each  subcarrier is orthogonal  independent of each other  with every other subcarrier   differentiating OFDM from the commonly used frequency division multiplexing  FDM      Chapter 8     MAC and Physical Layers 227    Key Terms    Before taking the exam  you should be familiar with the following terms     ACK   beacons   bit error rate  contention free period  contention period  DIFS   PIFS   polling   probe frame   SIFS    superframe    228 Chapter 8     MAC and Physical Layers    Review Questions    1     Which of the following service sets can use distributed coordination function  DCF   mode  Choose all that apply     A  BSS  B  IBSS  C  ESS  D  TESS    Which of the following service sets can use point coordination function  PCF   mode  Choose all that apply     A  BSS  B  IBSS  C  ESS  D  IESS    You have a large number of users on one access point and collisions are becoming a  problem  causing reduced throughput  Some of the users are developers that do a  significant amount of large file transfers during the day  Which RTS CTS setting  would best fix this problem     A  On  B  Off  C  On with threshold    Which one of the following is an advantage to using point coordination function   PCF  mode over distributed coordination mode  DCF      A  PCF has a lower overhead than using DCF   B  PCF can be used in and IBSS while DCF cannot  C  PCF uses CSMA CA while DCF does not   D  PCF provides a given level of QoS    After a client station sends a data
327. ity Response   gt   EAP Auth Request EAP Auth Request   lt   EAP Auth Response EAP Auth Response   gt   EAP Success EAP Success  q                Because wireless LAN security is essential     and EAP authentication types provide the  means of securing the wireless LAN connection     vendors are rapidly developing and  adding EAP authentication types to their wireless LAN access points  Knowing the type  of EAP being used is important in understanding the characteristics of the authentication  method such as passwords  key generation  mutual authentication  and protocol  Some of  the commonly deployed EAP authentication types include     EAP MD 5 Challenge  The earliest EAP authentication type  this essentially duplicates  CHAP password protection on a wireless LAN  EAP MDS5 represents a kind of base   level EAP support among 802 1x devices     EAP Cisco Wireless  Also called LEAP  Lightweight Extensible Authentication  Protocol   this EAP authentication type is used primarily in Cisco wireless LAN access  points  LEAP provides security during credential exchange  encrypts data transmission  using dynamically generated WEP keys  and supports mutual authentication     EAP TLS  Transport Layer Security   EAP TLS provides for certificate based  mutual  authentication of the client and the network  EAP TLS relies on client side and server   side certificates to perform authentication  using dynamically generated user  and  session based WEP keys distributed to secure the connecti
328. ize distance of the propagated wave at low  power     Intentional Radiator    FIGURE 2 12    As defined by the Federal Communication Commission  FCC   an intentional radiator is  an RF device that is specifically designed to generate and radiate RF signals  In terms of  hardware  an intentional radiator will include the RF device and all cabling and  connectors up to  but not including  the antenna  as illustrated in Figure 2 12 below     Intentional Radiator                   7   Components    included in the  cable connector Intentional Radiator  Bridge lee  connector  cable  ST  F      N connector antenna              Any reference to  power output of the Intentional Radiator  refers to the power output at  the end of the last cable or connector before the antenna  For example  consider a 30   milliwatt transmitter that loses 15 milliwatts of power in the cable and another 5  milliwatts from the connector at the antenna  The power at the intentional radiator would  be 10 milliwatts  As an administrator  it is your responsibility to understand the FCC    Chapter 2   RF Fundamentals 29    rules relating to Intentional Radiators and their power output  Understanding how power  output is measured  how much power is allowed  and how to calculate these values are all  covered in this book  FCC regulations concerning output power at the Intentional  Radiator and EIRP are found in Part 47 CFR  Chapter 1  Section 15 247 dated October 1   2000     Equivalent lsotropically Radiated P
329. jor Organizations    Whereas the FCC and the IEEE are responsible for defining the laws and standards as   they apply to wireless LANs in the United States  there are several other organizations   both in the U S  and in other countries  which contribute to growth and education in the  wireless LAN marketplace  In this section  we will look at three of these organizations       Wireless Ethernet Compatibility Alliance  WECA     European Telecommunications Standards Institute  ETSI       Wireless LAN Association  WLANA     Wireless Ethernet Compatibility Alliance    The Wireless Ethernet Compatibility Alliance  WECA  promotes and tests for wireless  LAN interoperability of 802 11b devices and 802 11a devices  WECA   s mission is to  certify interoperability of Wi Fi     IEEE 802 11  products and to promote Wi Fi as the  global wireless LAN standard across all market segments  As an administrator  you must  resolve conflicts among wireless LAN devices that result from interference   incompatibility  or other problems     When a product meets the interoperability requirements as described in WECA s test  matrix  WECA grants the product a certification of interoperability  which allows the  vendor to use the Wi Fi logo on advertising and packaging for the certified product  The  Wi Fi seal of approval assures the end user of interoperability with other wireless LAN  devices that also bear the Wi Fi logo     Among WECA s list of interoperability checks is the use of 40 bit WEP key
330. l  depending on size  might  take a week or more  Many of the activities of the users in each facility  such as roaming   are very different  With nurses and doctors in a hospital  roaming is just part of the job     Chapter 11     Site Survey Fundamentals 311    In the relatively small  multi room facility of the real estate firm  users sit at their desks  and access the wireless network from that one location  so roaming may not be necessary     Existing Networks  Is there already a network  wired or wireless  in place     This question is also basic  but you must know if the client is starting from scratch or if  the wireless LAN must work with an existing infrastructure  If there is an existing  infrastructure  what it consists of must be known  Most of the time there is an existing  infrastructure  which opens the door to a myriad of questions that need answering   Documentation of existing wireless LAN hardware  frequencies being used  number of  users  throughput  etc   must be taken into account so that decisions can be made on how  the new equipment  if needed  will fit in  It may also be the case that the customer did  the initial installation  and has since outgrown the initial installation  If the existing setup  functions poorly  this poor performance must also be noted so the problems are not  repeated     Questions commonly asked of the network administrator or manager include       What Network Operating Systems  NOS  are in use       How many users  today and
331. l 10  sC 14  85245 23 419302 9502 11 Ack  00 04 02 1C1D7   DA 00104 E2 0E 6  E  11 0 iL 148 c 192  15145 23 427189 SHAP 30 10 00 08 0   AZIGFIFLIIO7IDIIDA 11 0 iL 10  sC 14   5345 23 434070 902 11 Ack   11 0 ll Sa ec 3a 15 45 23  436739 902 12 Control  J9  CA E2 07 07 DA 00704  SA  1G  FALE  11 0 ll 10a c    192 15 45 23  437517 LSAP SA  00 04 E2   9  41  SF 11 0 iL l  a 6c 14 15 45 23  444467 902 11 Ack   11 0 ll saic 34 15 45 23  S66627  FArOG CE  FO  7AiDF 79 74  GC  Slr1er2L 11 0 ll 124       o2 15 45 23  567447 LSAP SC  48 04 62  AFD  26 04 D5  60  OA  49  F3 11 0 ll 10     115 15 45 25  532239 LSAP 30  00 16 1F 9C 07  DA 11 0 ll las sC 14 15 45 25  508267   902 11 Ack  1F EA 69 87 16 36  C E7 2F E7  54 01 11 0 ll S C 115 15 45 25  508000 LSAP B1  S9  6A E3 07 D7 DA 00 04 E2 0E 69 EL 11 0 ll las c O02 15 45 25  592138 SHAP 4C 4   00 00 01  00 04 E2 E0 22 00    l 16 B6 91 20 99 11 0 ll 10s 8c 20 15 45 25  592702 802 12 CFE CFA  0a  Ca 0E 07 27  0D 67  SF 01 0F DC EF 11 0 ll 10   C 02 15 45 25  593328 802 12 Disassoc   18 05 23  ASNA  TP       TR 192  14A  1  3 AAA  2 AK AARI 13 A LEJ LEA E nz    F Z            Site Survey Kit Checklist    A complete site survey kit should include     Laptop and or PDA   Wireless PC card with driver  amp  utility software   Access points or bridges as needed   Battery pack  amp  DC to AC converter   Site survey utility software  loaded on laptop or PDA   Clipboard  pen  pencils  notebook paper  grid paper   amp  hi liter  Blueprints  amp  
332. l of security  MAC  addresses can be spoofed  though it s not a simple task  MAC filters are great for  home and small office wireless LANs where managing lists of MAC addresses is  feasible  Protocol filters should be used as a means of bandwidth control     A  B  The SSID is sent as part of each beacon frame and probe response frame   Sniffers  wireless LAN client driver software  and applications such as Netstumbler  easily see SSIDs     B  Having a single server generate and rotate encryption keys across the entire  network reduces the amount of time the administrator has to devote to managing  WEP on a wireless LAN     D  There s no such thing as MAC filter bypass equipment  although it is possible to  get past MAC filters using software applications and custom operating system  configurations     A  D  By passive listening to the wireless network or by connecting to access points  and performing scanning and probing of network resources  a hacker is able to gain  valuable information if the right precautions and security measures are not in place     306 Chapter 10     Wireless LAN Security    12     13     14     15     16     17     18     19     20     A  MAC addresses must always be sent in the clear so that stations may recognize  both who the intended recipient is and who the source station is  Using WEP does  not change this     A  Depending on whether the jamming signal was originating from a malicious  hacker or an unintentional nearby RF source  finding and re
333. ld Happen  Reality  What Does Happen  Solutions for Co location Throughput Problems  Use Two Access Points  Use 802 1 1a Equipment  Summary  Types of Interference  Narrowband  All band Interference  Weather  Wind  Stratification  Lightning  Adjacent Channel and Co Channel Interference  Adjacent Channel Interference  Co channel Interference  Range Considerations  Transmission Power  Antenna Type  Environment  Key Terms  Review Questions  Answers to Review Questions  Chapter 10 Wireless LAN Security  Wired Equivalent Privacy  Why WEP Was Chosen  WEP Keys  Static WEP Keys  Centralized Encryption Key Servers  WEP Usage  Advanced Encryption Standard  Filtering  SSID Filtering  MAC Address Filtering  Protocol Filtering  Attacks on Wireless LANs  Passive Attacks  Active Attacks  Jamming  Man in the middle Attacks  Emerging Security Solutions  WEP Key Management  Wireless VPNs  Temporal Key Integrity Protocol  TKIP   AES Based Solutions  Wireless Gateways  802 1x and Extensible Authentication Protocol  Corporate Security Policy  Keep Sensitive Information Private  Physical Security    Contents xiii    248  249  250  251  251  252  252  253  253  255  256  256  257  257  257  258  259  260  261  261  261  262  263  267  271  272  273  274  275  276  277  278  278  278  280  281  282  282  283  284  286  287  287  287  288  289  289  290  291  292  292    xiv Contents    Chapter    11    Wireless LAN Equipment Inventory  amp  Security Audits  Using Advanced Security Solutions  Public W
334. ld happen  when you co locate these access points properly  and then we will explain what will  happen     What Should Happen    For purposes of simplicity in this explanation  we will assume that all access points being  used in this scenario are 802 1 1b compliant  11 Mbps access points  When using only one  access point in a simple wireless LAN  you should experience actual throughput of  somewhere between 4 5 Mbps and 5 5 Mbps  You will never see the full 11 Mbps of  rated bandwidth due to the half duplex nature of the RF radios and overhead  requirements for wireless LAN protocols such as CSMA CA     250 Chapter 9  Troubleshooting Wireless LAN Installations    Reality     FIGURE 9 10    The RF theory of 3 non overlapping channels should allow you to setup one access point  on channel 1  one access point on channel 6  and one access point on channel 11 without  any overlap in these access points  RF band usages  Therefore  you should see normal  throughput of approximately 5 Mbps on all co located access points  with no adjacent   channel interference  Adjacent channel interference would cause degradation of  throughput on one or both of the other access points     What Does Happen    What actually happens is that channel 1 and channel 6 actually do have a small amount of  overlap  as do channel 6 and channel 11  Figure 9 10 illustrates this overlap  The reason  for this overlap is typically that both access points are transmitting at approximately the  same high output p
335. le antennas are a particularly nice feature with wireless bridges because they  provide the ability to mount the bridge indoors and run a cable outdoors to connect to the  antenna  In almost all cases  semi directional or directional antennas are used with  wireless bridges  The alternative to connecting a detachable antenna to a wireless bridge  and mounting the bridge indoors is mounting the wireless bridge outdoors in a NEMA   compliant weatherproof enclosure     84 Chapter 4      Wireless LAN Infrastructure Devices             In 1926  the Electric Power Club and the Associated Manufacturers of Electrical  Supplies merged their operations to form the National Electrical Manufacturers  Association  NEMA   Even though its roots go back more than 75 years  from that day  to the present  NEMA has always focused on standardization of electrical equipment   advocacy on behalf of the industry  and economic analysis  Among other things   NEMA specifies standards for enclosures that are used in every industry for protecting  the contents of the enclosure from the negative effects of adverse weather conditions     Advanced Filtering Capabilities    MAC or protocol filters may be built into a wireless bridge  As a basic security  provision  the administrator may configure a wireless bridge to allow or disallow network  access to particular devices based on their MAC address     Most wireless bridges offer protocol filtering  Protocol filtering is the use of layer 3 7  protocol filte
336. le port DC Voltage Injectors  Multi port DC Voltage Injectors  Active Ethernet Switches  PoE Compatibility  Types of Injectors  Types of Picker   Taps  Voltage and Pinout Standards  Fault Protection  Wireless LAN Accessories  RF Amplifiers  Common Options  Configuration  amp  Management  Special Stipulations  RF Attenuators  Common Options  Configuration and Management  Lightning Arrestors  Common Options  Configuration  amp  Maintenance  RF Splitters  Choosing an RF Splitter  RF Connectors  Choosing an RF Connector  RF Cables  RF    Pigtail    Adapter Cable  Frequency Converter  Bandwidth Control Units  Test Kits  Key Terms  Review Questions  Answers to Review Questions  Chapter 6 Wireless LAN Organizations and  Standards  Federal Communications Commission  ISM and UNII Bands  Advantages and Disadvantages of License Free Bands  Industrial Scientific Medical  ISM  Bands  900 MHz ISM Band  2 4 GHz ISM Band  5 8 GHz ISM Band  Unlicensed National Information Infrastructure  UNII  Bands  Lower Band  Middle Band  Upper Band  Power Output Rules  Point to Multipoint  PtMP   Point to Point  PtP   Institute of Electrical and Electronics Engineers  IEEE 802 11    121  122  123  123  124  124  125  125  125  126  126  127  127  128  128  130  130  131  131  133  135  135  136  138  139  139  141  142  143  144  145  146  150    153  154  154  155  155  156  156  156  156  157  157  157  157  157  158  159  160    IEEE 802 11b  IEEE 802 1 1a  IEEE 802 11g  Major Organizations  Wireless E
337. lementing a wireless LAN in a geographic location where  hurricanes or tornadoes occur frequently  you should certainly take that into account    when setting up any type of outdoor wireless LAN  In such weather conditions  securing  antennas  cables  and the like are all very important                                                                                                                                                                                                                                                                                                                                                                                                                                                        Stratification    When very thick fog or even smog settles  such as in a valley   the air within this fog  becomes very still and begins to separate into layers  It is not the fog itself that causes  the diffraction of RF signals  but the stratification of the air within the fog  When the RF  signal goes through these layers  it is bent in the same fashion as visible light is bent as it  moves from air into water     Lightning    Lightning can affect wireless LANs in two ways  First  lightning can strike either a  wireless LAN component such as an antenna or it may strike a nearby object  Lightning  strikes of nearby objects can damage your wireless LAN components just as if these  components were not protected by a lightning arrestor  A second way that lightning
338. less LAN  card  Since some PC cards carry the WEP key in their firmware  the card will always  have access to the wireless LAN until the WEP keys on the wireless LAN are changed     Most access points and clients have the ability to hold up to 4 WEP keys simultaneously   as can be seen in Figure 10 2  One useful reason for having the ability to enter up to 4  WEP keys is network segmentation or departmentalization within an organization   Suppose a network had 100 client stations  Giving out four WEP keys instead of one    276 Chapter 10     Wireless LAN Security    Figure 10 2    could segment the users into four distinct groups of 25   for use with different  departments for example  Ifa WEP key were compromised  it would mean changing 25  stations and an access point or two instead of the entire network  Access points generally  transmit using only the first key  but can receive traffic that has been encrypted with any  one of the 4 keys it holds     Entering WEP keys on infrastructure devices    se of Data Encryption by Statens is  Not Available  Musi sei an Encryption Key first    Open Shared  coept Authentication Type     Key Sime  WEP Key 1        notset     WEP Key 2    norse     WEF Rey 3   nolga    WEP Key 4   noisel  Enter   bit WEF keys as 10 hexadecimal digis  0 9  a f  or A F     Enter 122 bat WEP keys as 2 hexedecumal digits  0 9  a f  or A F     This radso supports Encryption for all Date Rates    Apply   OF Cancel Restore Defaults       Centralized Encryption
339. lient stations may connect to the access point  The  BSS typically connects into a wired LAN  but does not have to     4  B  While the process used by Shared Key authentication lends it to looking much  more secure than Open System authentication  Shared Key opens the system up to  attack with the vulnerability of passing both the plain text challenge and the  encrypted challenge across the wireless segment  Since the WEP key is used both  for authentication and data encryption  if the WEP key is compromised due to a  weakness in the method of authenticating  then all encrypted data is compromised   For this reason  Open System authentication is considered more secure than shared  key authentication     5  C  When a station is not sleeping  the access point has no need to buffer packets  destined to that station  However  if a station is sleeping  there is a need for the  access point to buffer its packets so that the packets are not lost  The TIM is used  for the purpose of notifying stations using power save polling  PSP  mode that they  have packets buffered at the access point  Client stations use power save poll frames  to notify the access point to send the buffered packets     6  C  An ATIM is used for the purpose of notifying stations that are using power save  poll  PSP  mode that there is data queued for them by other stations  awaiting  delivery  After stations send the ATIMs to other stations  the ATIM window  the  time during which ATIMs are sent  closes and the 
340. lients to authenticate with an access point  Allows clients to actively search for any access points within range    Reduces the time it takes clients to locate and associate to access points when  roaming    Helps determine which bridge the client will connect to    What does the acronym  SSID  stand for     A   B   C   D     Security Set Identifier  Service Set Information Directory  Service Set Identifier    Security Service Information Dependency    The process of authentication and association has how many distinct states     A   B     moo    1    2  3  4  5    Why is Shared Key authentication considered a security risk     A     Q    The access point transmits the challenge text in the clear and receives the same  challenge text encrypted with the WEP key    The keys are shared via broadcast with all network nodes  A hacker could see the keys with a sniffer    The WEP keys used on all computers are the same    16     17     18     19     20     Chapter 7     802 11 Network Architecture 207    What is a basic service set    A  The basic components of a wireless LAN   B  All clients in a wireless LAN that are being serviced by one access point  C  The area around an access point which can be serviced by the access point    D  One or more access points transmitting an RF signal    In a basic service set  or BSS  the access point must operate in which mode     A  Repeater  B  Router  C  Bridge    D  Infrastructure    E  Gateway    An IBSS can also be called which of the fol
341. lity  e g   do they have portable computers or  desktops      How far     inside or outside     will the users roam and still need connectivity       What level of access do these users need to sensitive data on the network  Is  security required  How secure is  secure enough        Will these users be able to take their laptop computers away from the wireless  LAN where the wireless LAN cards could be stolen       Do these users use any bandwidth intensive  time sensitive  or connection   oriented applications       How often do these users change departments or locations       Will any or all of these users have Internet access  and what are the policies  regarding email and downloads        Does the office work environment of these users ever change for special events  that could disrupt a wireless LAN       Who currently supports these users on the existing network  and are they  qualified to support wireless users       Ifthe users are mobile  what type of mobile computing device do they use   e g    PDA or Laptop       How often and for how long will the users with laptops work without A C  power     There are many specific questions about the users of the wireless LAN and their needs   and this information is vital to the site survey  The more information that can be gathered  about who will be using the wireless LAN and for what purposes the easier it will be to  conduct the site survey     Preparation Checklist    Below is a general list of items that should be obtai
342. ll   or BSS  to another without losing network connectivity  Access points hand the client  off from one to another in a way that is invisible to the client  ensuring unbroken  connectivity  Figure 7 12 illustrates a client roaming from one BSS to another BSS     When any area in the building is within reception range of more than one access point   the cells    coverage overlaps  Overlapping coverage areas are an important attribute of the  wireless LAN setup  because it enables seamless roaming between overlapping cells   Roaming allows mobile users with portable stations to move freely between overlapping  cells  constantly maintaining their network connection     192 Chapter 7     802 11 Network Architecture    FIGURE 7 12 Roaming in an ESS       eS eo  Client 2    Client 1 Client 2    Inter cell roaming  and handoff    When roaming is seamless  a work session can be maintained while moving from one cell  to another  Multiple access points can provide wireless roaming coverage for an entire  building or campus     When the coverage area of two or more access points overlap  the stations in the  overlapping area can establish the best possible connection with one of the access points  while continuously searching for the best access point  In order to minimize packet loss  during switchover  the    old    and    new    access points communicate to coordinate the  roaming process  This function is similar to a cellular phones    handover  with two main  differences       On
343. lowing  Choose all that apply   A  Peer to peer   B  Indifferent Basic Service Set   C  Ad hoc network  D    Internet Bindery Set Solution    Continuous Aware Mode  or CAM  should be configured on wireless LAN clients in  which of the following situations     A  Portable laptop stations whose users need the ability to roam away from power  sources    B  Desktop stations that are rarely moved from their permanent location  C  PDAs with limited battery life    D  Laptop computers that can remain connected to a power source    Which of the following statements is true  Choose all that apply   A  Using power save polling  PSP  mode allows a wireless client to sleep    B  Using power save polling  PSP  mode forces a wireless client to accept an  access point s polling    C  Using power save polling  PSP  mode allows a wireless client to accept packets  while asleep       D  Using power save polling  PSP  mode causes overhead in an ad hoc network    208 Chapter 7     802 11 Network Architecture    Answers to Review Questions    1  C D  A client station must be both authenticated  authorized  and associated   connected  before it is allowed to communicate with other nodes on the network   Authentication happens before association     2  E  The 802 11 standard does not support AAA  Both Shared Key and Open System  authentication are specified by the 802 11 standard     3  B  A basic service set  BSS  may only have one access point  The cell around this  single access point is where c
344. ly that you will see   unauthenticated  or  associated    which brings us to the last stage     Authenticated and Associated    In this final state  your wireless node is completely connected to the network and able to  send and receive data through the access point to which the node is connected   associated   Figure 7 3 illustrates a client associating with an access point  You will  likely see  associated  in the access point s association table denoting that this client is  fully connected and authorized to pass traffic through the access point  As you can  deduce from the description of each of these three states  advanced wireless network  security measures would be implemented at the point at which the client is attempting to  authenticate     182 Chapter 7     802 11 Network Architecture    FIGURE 7 3 Association    2 487       Authentication Methods    The IEEE 802 11 standard specifies two methods of authentication  Open System  authentication and Shared Key authentication  The simpler and also the more secure of  the two methods is Open System authentication  For a client to become authenticated   the client must walk through a series of steps with the access point  This series of steps  varies depending on the authentication process used  Below  we will discuss each  authentication process specified by the 802 11 standard  how they work  and why they are  used     Open System Authentication    Open System authentication is a method of null authentication and is sp
345. m Technology 65    The FCC specifies how many channels in the 2 4 GHz ISM band that can be used  for DSSS in the United States     A  3  B  6  C  9  D  11    You have been hired on as a consultant to increase the capacity of an existing  wireless LAN based on FHSS technology  After your research is completed you  recommend that a replacement system based on DSSS would be better  Which of  the following could be your arguments to defend your position  Choose all that    apply    A  The DSSS devices will cost less and have more throughput   B  The DSSS devices will cost more but have more throughput   C  Additional new FHSS devices may not be compatible with the older devices  D  DSSS is more secure than FHSS    The statement     802 11b wireless LAN devices are backward compatible with  802 11 wireless LAN devices    is     A  Always true  B  Always false    C  Sometimes true    What is considered to be the maximum number of co located FHSS access points in  a wireless LAN  if non synchronized radios are to be used     A  3   B  16  C  20  D  26    In Frequency Hopping wireless LAN systems  the term hopping refers to which one  of the following     A  Switching between throughput speeds from 11 Mbps to 5 5 Mbps  B  What happens when the carrier frequency is changed   C  The change that occurs as a result of the RF signal getting weaker  D  Changing technologies from FHSS to DSSS    66 Chapter 3     Spread Spectrum Technology    15     16     17     18     A DSSS channel is mor
346. m via an access point     attenuation   a term used to describe decreasing the amplitude of an RF signal due to  resistance of cables  connectors  splitters  or obstacles encountering the signal path    authentication   The process a station uses to announce its identity to another station   The IEEE 802 11 standard specifies two forms of authentication  open system and shared  key     362 Glossary    authentication  authorization  and accounting  AAA      method by which users are  authenticated  authorized  and tracked to gain access and move about inside a network    automatic rate selection  ARS      see Dynamic Rate Shifting    background noise   Extraneous noise that exists everywhere that interferes with  reception of weak radio signals     bandwidth   Specifies the amount of the frequency spectrum that is usable for data  transfer  In other words  it identifies the maximum data rate a signal can attain on the  medium without encountering significant attenuation  loss of power      baseband   A transmission system in which the signals are broadcast one at a time at  their original frequency  not modulated      base station   The part of a radio network where the transceivers and antennas are  located     basic service set  BSS    A set of 802 11 compliant stations and an access point that  operate as a fully connected wireless network     basic service set identification  BSSID    A six byte address that distinguishes a  particular access point from others  Also know a
347. manuals and quick start guides will provide more specific  information for each brand  Some of these functions  such as those having to do with  security like RADIUS and VPN support  will be discussed in later sections  Some of  these functions are included as part of the pre requisites to reading this book  such as  telnet  USB  and web servers  Other topics  such as static and dynamic routing  are  beyond the scope of this book     As a wireless LAN administrator  you should know your environment  look for products  that fit your deployment and security needs  and then compare features among 3 or 4  vendors that make products for that particular market segment  This evaluation process  will undoubtedly take a substantial amount of time  but time spent learning about the  different products on the market is useful  The best possible resource for learning about  each of the competing brands in a particular market is each manufacturer   s website   When choosing an access point  be sure to take into account manufacturer support  in  addition to features and price     Mounting  Some things to keep in mind when mounting access points are       Use heavy duty zip ties to mount access points to columns or beams      Do not cover access point lights when mounting access point with zip ties      Mount access points upside down so that indicator lights can be seen from the  floor      Label access points     When column mounting  it   s possible to use a 2x4 beam as a base for the ac
348. manufacturer WEP implementation    The best solution for a jamming attack would be which one of the following   A  To use a spectrum analyzer to locate the RF source and then remove it  B  Increase the power on the wireless LAN to overpower the jamming signal    C  Shut down the wireless LAN segment and wait for the jamming signal to  dissipate    D  Arrange for the FCC to shut down the jamming signal s transmitter    Why should access points be connected to switches instead of hubs    A  Hubs are faster than switches and can handle high utilization networks  B  Hubs are full duplex and switches are only half duplex   C  Hubs are broadcast devices and pose an unnecessary security risk   D    Access points are not capable of full duplex mode    15     16     17     18     19     Chapter 10     Wireless LAN Security 303    Which of the following protocols are network security tools above and beyond what  is specified by the 802 11  Choose all that apply     A     B  C   D    802 1x and EAP  8011 g   VPNs   802 11x and PAP    An enterprise wireless gateway is positioned at what point on the wired network  segment     A     B   C   D     Between the access point and the wired network upstream  Between the access point and the wireless network clients  Between the switch and the router on the wireless network segment    In place of a regular access point on the wireless LAN segment    Networks using the 802 1x protocol control network access on what basis  Choose    all that apply
349. ment in order to obtain network  diagrams or blueprints from your client     Where are the network wiring closets located     It is not uncommon to find that what seems like the most appropriate location for  installing an access point ends up being too far from a wiring closet to allow for upstream  network connectivity  Knowing where these wiring closets are ahead of time will save  on time later on  Locations of these wiring closets should be documented on the network  topology map  blueprints  or other facility maps  There are solutions for these problems  such as using access points or bridges as repeaters  but this method of connectivity should  be avoided where possible  Connecting bridges and access points directly into the wired  distribution system is almost always favored     Has an access point bridge naming convention been devised     If a wireless LAN is not currently in place  a logical naming convention may need to be  devised by the network manager  Using a logical naming convention with access points  and bridges on the wireless network will make managing them  once they are in place   much easier  For the site surveyor  having logical names in place for each access point  and bridge will facilitate the task of documenting the placement of units in the RF Site  Survey Report     Chapter 11     Site Survey Fundamentals 313    Area Usage  amp  Towers    FIGURE 11 2    Is the wireless LAN going to be used indoors  outdoors  or both     Are there frequent hurric
350. method of adjustment is to configure the fragmentation threshold     If your network is experiencing a high packet error rate  faulty packets   increase the  fragmentation threshold on the client stations and or the access point  depending on  which units allow these settings on your particular equipment   Start with the maximum  value and gradually decrease the fragmentation threshold size until an improvement  shows  If fragmentation is used  the network will experience a performance hit due to the  overhead incurred with fragmentation  Sometimes this hit is acceptable in order to gain  higher throughput due to a decrease in packet errors and subsequent retransmissions     Dynamic Rate Shifting  DRS     Adaptive  or Automatic  Rate Selection  ARS  and Dynamic Rate Shifting  DRS  are  both terms used to describe the method of dynamic speed adjustment on wireless LAN  clients  This speed adjustment occurs as distance increases between the client and the  access point or as interference increases  It is imperative that a network administrator  understands how this function works in order to plan for network throughput  cell sizes   power outputs of access points and stations  and security     216 Chapter 8  MAC and Physical Layers    FIGURE 8 2    Modern spread spectrum systems are designed to make discrete jumps only to specified  data rates  such as 1  2  5 5  and 11 Mbps  As distance increases between the access point  and a station  the signal strength will decrease to a p
351. method of roaming across router boundaries without losing their layer 3 connection  The  layer 2 connection is still maintained by the access points  but since the IP subnet has  changed while roaming  the connection to servers  for example  will be broken  Without  subnet roaming capability  such as with using a Mobile IP solution or using DHCP    wireless LAN access points must all be connected to a single subnet  a k a   a flat  network    This work around can be done at a loss of network management flexibility   but customers may be willing to incur this cost if they perceive that the value of the end  system is high enough     Chapter 7     802 11 Network Architecture 197    FIGURE 7 15 Roaming across Layer 3 boundaries       Layer 2 Connection    eeeee  Layer 3 Connection                  Many network environments  e g   multi building campuses  multi floored high rises  or  older or historical buildings  cannot embrace a single subnet solution as a practical  option  This wired architecture is at odds with current wireless LAN technology  Access  points can t hand off a session when a remote device moves across router boundaries  because crossing routers changes the client device s IP address  The wired system no  longer knows where to send the message  When a mobile device reattaches to the  network  all application end points are lost and users are forced to log in again  re   authenticate  relocate themselves in their applications  and recreate lost data  The same  
352. modulate or interpret it  creating a slightly more secure communication     48 Chapter 3     Spread Spectrum Technology    Uses of Spread Spectrum    This inherent security is what interested the military in spread spectrum technology  through the 1950s and 1960s  Because of its noise like characteristics  spread spectrum  signals could be sent under the noses of enemies using classic communication techniques   Security was all but guaranteed  Naturally  this perceived security of communication was  only valid so long as no one else used the technology  If another group were to use the  same technology  these spread spectrum communications could be discovered  if not  intercepted and decoded     In the 1980s  the FCC implemented a set of rules making spread spectrum technology  available to the public and encouraging research and investigation into the  commercialization of spread spectrum technology  Though at first glance it may seem  that the military had lost its advantage  it had not  The bands used by the military are  different from the bands used by the public  Also  the military uses very different  modulation and encoding techniques to ensure that its spread spectrum communications  are far more difficult to intercept than those of the general public     Since the 1980s  when research began in earnest  spread spectrum technologies have been  used in cordless phones  global positioning systems  GPS   digital cellular telephony   CDMA   personal communications system 
353. moving the RF source is  the best solution to this problem  It may not be possible to remove it  so in this case  you might have to use a wireless LAN in another frequency spectrum in order to  avoid the interference  Waiting on a government agency such as the FCC to respond  to your complaint of a possible hacker jamming your license free network  could  take a considerable amount of time  If you locate such a malicious attacker   contacting the local law enforcement authorities is the proper procedure for  eliminating the attack     C  Hubs are broadcast devices that pass along all information passing through them  to all of their ports  If access points are connected to hub ports  all packets on the  wire will also be broadcasted across the wireless segment giving hackers more  information about the network than is absolutely necessary     A  C  802 1x using EAP and VPNs both comprise good wireless LAN security  solutions  There are many other solutions  and many versions of both EAP and  wireless VPN solutions  Care should be taken when choosing a wireless LAN  security solution to assure it both meets the needs of the network and fits the  organization s security budget     A  An enterprise wireless gateway has no wireless segments  These gateways have  a downstream wired connection and a wired connection upstream that allows them  to act as a gateway or firewall of sorts  Wireless LAN clients must be authenticated  through this device before it may pass packets upstream
354. n RF signal to gain strength  Upfade  as illustrated in Figure 9 5   occurs due to reflected signals arriving at the receiver in phase with the main signal   Similar to a decreased signal  all of these waves are additive to the main signal  Under  no circumstance can multipath cause the signal that reaches the receiver to be stronger  than the transmitted signal when the signal left the transmitting device  If multipath  occurs in such a way as to be additive to the main signal  the total signal that reaches the  receiver will be stronger than the signal would have otherwise been without multipath  present     240 Chapter 9  Troubleshooting Wireless LAN Installations    FIGURE 9 5 Upfade    Amplitude decrease  due to Path Loss    Tower with  an antenna  In phase reflected  signal is added to  the main signal    4  ae     p  S rs  N 7  N 7  N 4               It is important to understand that a received RF signal can never be as large as the signal  that was transmitted due to the significance of free space path loss  usually called path  loss   Path loss is the effect of a signal losing amplitude due to expansion as the signal  travels through open space     Think of path loss as someone blowing a bubble with bubble gum  As the gum expands   the gum at any point becomes thinner  If someone were to reach out and grab a 1 inch  square piece of this bubble  the amount of gum they would actually get would be less and  less as the bubble expanded  Ifa person grabbed a piece of the
355. n caused by a receiving station having multiple antennas which  causes the signal to take multiple paths to the CPU    D  The result of using a signal splitter to create multiple signal paths between  sending and receiving stations    Multipath can cause signals to increase above the power of the signal that was  transmitted by the sending station  This statement is     A  Always true   B  Always false   C  True  when the signal is transmitted in clear weather  D     False  unless a 12 dBi or higher power antenna is being used    Multipath is caused by which one of the following   A  Multiple antennas   B  Wind   C  Reflected RF waves   D  Bad weather    When can the hidden node problem occur    A  Only when a network is at full capacity   B  When all users of a wireless LAN are simultaneously transmitting data  C  Anytime  even after a flawless site survey  D    Every time a wireless LAN client roams from one access point to another    Which one of the following is NOT a solution for correcting the hidden node  problem     A  Using the RTS CTS protocol   B  Increasing power to the node s    C  Removing obstacles between nodes  D    Moving the hidden node s     266 Chapter 9    Troubleshooting Wireless LAN Installations    16     17     18     19     20     How is the threshold set when using RTS CTS in  On with Threshold  mode on a  wireless LAN     A  Automatically by the access points only   B  Manually by the user of the hidden node   C  Manually on the clients and access
356. n is implemented on a series of servers  using the Mobile IP standard  RFC 2002   Many of the software solutions are  implemented in somewhat the same manner     Load Balancing    Congested areas with many users and heavy traffic load per unit may require a multi cell  structure  In a multi cell structure  several co located access points    illuminate    the same  area creating a common coverage area  which increases aggregate throughput  Stations  inside the common coverage area automatically associate with the access point that is less  loaded and provides the best signal quality     As illustrated in Figure 7 17  the stations are equally divided between the access points in  order to equally share the load between all access points  Efficiency is maximized    Chapter 7     802 11 Network Architecture 199    because all access points are working at the same low level load  Load balancing is also  known as load sharing and is configured on both the stations and the access point in most  cases     FIGURE 7 17 Load balancing          Access Point A    Channel 1       Ly  Access Point B 4    Channel 11 T    T    Power Management Features    Wireless clients operate in one of two power management modes specified by the IEEE  802 11 standard  These power management modes are active mode  which is commonly  called continuous aware mode  CAM  and power save  which is commonly called power  save polling  PSP  mode  Conserving power using a power saving mode is especially  important
357. n optimizing antenna alignment for best reception   which reduces lost packets and high retry counts while maximizing signal strength   When using access points with omni directional or semi directional antennas  proper  alignment usually is a matter of covering the appropriate area such that wireless clients  can connect in places where connectivity is required     Safety    RF antennas  like other electrical devices  can be dangerous to implement and operate   The following guidelines should be observed whenever you or one of your associates is  installing or otherwise working with RF antennas     Follow the Manual    Carefully follow instructions provided with all antennas  Following all provided  instructions will prevent damage to the antenna and personal injury  Most of the safety  precautions found in antenna manufacturers    manuals are common sense     Do not touch when power is applied    Never touch a high gain antenna to any part of your body or point it toward your body  while it is transmitting  The FCC allows very high amounts of RF power to be  transmitted in the license free bands when configuring a point to point link  Putting any  part of your body in front of a 2 4 GHz highly directional antenna that is transmitting at  high power would be the equivalent to putting your body in a microwave oven     Professional Installers    For most elevated antenna installations  consider using a professional installer   Professional climbers and installers are trained i
358. n proper climbing safety  and will be able  to better install and secure your wireless LAN antenna if it is to be mounted in on a pole   tower  or other type of elevated construction     Metal Obstructions    Keep antennas away from metal obstructions such as heating and air conditioning ducts   large ceiling trusses  building superstructures  and major power cabling runs  These  types of metal obstructions create a significant amount of multipath  And  since these  types of metal obstructions reflect a large portion of the RF signal  if the signal is being  broadcasted at high power  the reflected signal could be dangerous to bystanders     Chapter 5     Antennas and Accessories 121    Power Lines    Antenna towers should be a safe distance from overhead power lines  The recommended  safe distance is twice the antenna height  Since wireless LAN antennas are generally  small  this recommended practice does not usually apply  It is not a good idea to have  wireless LAN antennas near significant power sources because an electrical short  between the power source and the wireless LAN could be dangerous to personnel  working on the wireless LAN and would likely destroy the wireless LAN equipment     Grounding Rods    Use special grounding rods and follow the National Electrical Code and local Electrical  codes for proper outdoor antenna and tower grounding  Grounding rods should generally  have less than 5 ohms to Earth ground  The recommended resistance is 2 ohms or less   Groun
359. n the site survey work  for the next several days  Consider the obvious differences that would exist in  conducting a site survey of a small office with one server and 20 clients versus  performing a site survey of a large international airport  Aside from the obvious size  differences  you must take into account the number of users  security requirements   bandwidth requirements  budget  and what kind of impact jet engines have on 802 11 RF  signals  if any  etc     All that and more comes from this one question  Your answers could come in the form of  pictures  written descriptions  or blueprints whenever possible  The more you know  before you get to the facility  the better prepared you will be when you actually arrive   Depending on the facility type  there will be standard issues to be addressed  Knowing  the facility type before arrival will save time on site     To demonstrate the standard issues discussed above  we will consider two facility types   The first example is a hospital  Hospitals are subject to an act of Congress known as  HIPAA  HIPAA mandates that hospitals  and other like healthcare organizations  keep  certain information private  This topic alone demonstrates that  when doing a site survey  for a hospital  security planning must be of prime importance     Hospitals also have radiology equipment  mesh metal glass windows  fire doors  very  long hallways  elevators  mobile users  nurses and doctors   and X ray rooms with lead   lined walls  This set of
360. nalogy  if the voltage to the bulb is decreased so that  instead  of radiating   watt  it puts out fifty thousandths of a watt  50 mW   barely lighting the  filament  Fifty milliwatts is equivalent to the transmitter power emitted by typical  wireless LAN cards and access points  At this level of power  the bulb cannot be seen  past several hundred feet away  Using the same X100 night scope mentioned earlier  the  bulb is visible  The night scope will be the viewing mechanism  representing an  amplifier  for the remainder of this example     356 Appendix A     RF in Perspective    At a distance of a half mile  the bare bulb can be seen with a properly adjusted night  scope     At a mile or two away  the bare bulb is not visible because the light   s intensity is too  weak  If the bulb were setup behind an X10 telescope eyepiece  so that the X10 eyepiece  is aimed back up at the tower  this setup would be equivalent to feeding the radio signal  into a directional high gain antenna  With the X10 telescope aimed towards the tower   the bulb is visible from the tower   s X100 night scope     At five miles out  the X100 telescope is necessary in order for the client on the tower to  see the bulb  The light is not strong  but it is visible  At ten miles  the bulb is not visible  at all  so the voltage feeding the bulb is increased  The bulb is now radiating 250  milliwatts  which represents the maximum the FCC allows into a 24 dBi gain dish  antenna  The bare bulb is still not visi
361. nas outside of buildings unless  the indoor area is significantly large to warrant use of an outdoor antenna  Outdoor  antennas are most often sealed to prevent water from entering the antenna element area  and made of plastics able to withstand extreme heat and cold  Indoor antennas are not  made for outdoor use and generally cannot withstand the elements     Orientation    Antenna orientation determines polarization  which was discussed previously as having a  significant impact on signal reception  If an antenna is oriented with the electrical field  parallel to the Earth s surface  then the clients  if the antenna is mounted to an access  point  should also have this same orientation for maximum reception  The reverse is also  true with both having the electrical field oriented perpendicular to the Earth s surface   The throughput of a bridge link will be drastically reduced if each end of the link does  not have the same antenna orientation     120 Chapter 5     Antennas and Accessories    Alignment    Antenna alignment is sometimes critical and other times not  Some antennas have very  wide horizontal and vertical beamwidths allowing the administrator to aim two antennas  in a building to building bridging environment in each other s general direction and get  almost perfect reception  Alignment is more important when implementing long distance  bridging links using highly directional antennas  Wireless bridges come with alignment  software that aids the administrator i
362. nd optimizing wireless LAN links   Appropriate use of hardware  antenna gain  amplification  antenna use   receiver sensitivity  output power  and FCC regulations are all addressed   in hopes that you will get a good perspective of what working with wireless  LANs involves     This RF Primer was authored by Michael F  Young of Young Design  Inc    www ydi com   and edited by Planet3 Wireless  Inc   for use within the  CWNA Study Guide     CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc        APPENDIX    In This Chapter    Radio acts like light  Light bulb analogy  Transmit Range Tests  Receive range tests  Obstacles   Fresnel Zone    Increasing power at the  tower    Reflection    354 Appendix A     RF in Perspective    RF in Perspective    Radio acts like light    For people who have no RF experience  it may be difficult to visualize how radio waves  travel  or propagate  through the air  Even for those with RF experience  this concept is  sometimes difficult to understand  An easy way to think about microwave signals   generally those frequencies above 1000 MHz or 1 GHz  is to use light as an analogy   Light is an electromagnetic signal as are radio frequency waves     Light bulb analogy    For purposes of this light radio analogy  we will create a hypothetical example that  should help the thought process of understanding radio frequency  Imagine a dark   overcast night sky with no moon or stars shining through the high clouds  away from any  city lights  where t
363. nd the  antenna     A  C  D  Yagi  Patch  and Panel antennas are common types of semi directional  antennas that loosely focus their radiation pattern in general direction     B  Yagi antennas always have a back lobe and sometimes have significant side  lobes as well  The size of these lobes depends on the gain and design of the antenna   Whether or not the side and rear lobes are used effectively is irrelevant to this  question  The lobes are there regardless of whether or not they are used  Sometimes  these lobes can even interfere with other systems when care is not taken to aim them  properly or to block them with obstacles     D  Since the electric field around the antenna is parallel with the radiating element   and the electric field defines the polarization  the orientation of the antenna  determines whether the antenna is vertically or horizontally polarized     A  Ifthe access point is sitting on a flat platform and if its antennas are oriented  such that they are vertical  perpendicular to the Earth s surface   then it is vertically  polarized  Both of the diversity antennas commonly found on access points should  be oriented in the same fashion  It is not uncommon to get better reception with  horizontally polarized antennas when using PCMCIA cards in laptop computer  It  all depends on the mounting and positioning of the access point and the relative  location of the laptop computers     152 Chapter 5     Antennas and Accessories    18     19     20     C  The un
364. ndamentals 25    VSWR Measurements    VSWR is a ratio  so it is expressed as a relationship between two numbers  A typical  VSWR value would be 1 5 1  The two numbers relate the ratio of impedance mismatch  against a perfect impedance match  The second number is always 1  representing the  perfect match  where as the first number varies  The lower the first number  closer to 1    the better impedance matching your system has  For example  a VSWR of 1 1 1 is better  than 1 4 1  A VSWR measurement of 1 1 would denote a perfect impedance match and  no voltage standing wave would be present in the signal path     Effects of VSWR    Excessive VSWR can cause serious problems in an RF circuit  Most of the time  the  result is a marked decrease in the amplitude of the transmitted RF signal  However  since  some transmitters are not protected against power being applied  or returned  to the  transmitter output circuit  the reflected power can burn out the electronics of the  transmitter  VSWR s effects are evident when transmitter circuits burn out  power output  levels are unstable  and the power observed is significantly different from the expected  power  The methods of changing VSWR in a circuit include proper use of proper  equipment  Tight connections between cables and connectors  use of impedance matched  hardware throughout  and use of high quality equipment with calibration reports where  necessary are all good preventative measures against VSWR  VSWR can be measured  with h
365. necessarily true due to phenomena such as  multipath  near far  and hidden node  There may be  holes  in the RF coverage pattern  due to multipath or stations that cannot talk to the network due to near far     Though a surveyor may be documenting the site survey results  another individual   possibly the RF design engineer  may be doing the site survey analysis to determine best  placement of hardware  Therefore  all of the results of the entire survey must be  documented  The surveyor and the designer may be the same person  or in larger  organizations they may be different people  Organized and accurate documentation by  the site surveyor will result in a much better design and installation process     A proper site survey provides detailed specifications addressing coverage  interference  sources  equipment placement  power considerations  and wiring requirements   Furthermore  the site survey documentation serves as a guide for the network design and  for installing and verifying the wireless communication infrastructure     If you don   t do a site survey  you will not have the knowledge of your clients    needs  the  sources of interference  the    dead    spots  where no RF coverage exists   where to install  the access point s   and  worst of all  you won   t be able to estimate for the client how  much the wireless LAN will cost to implement     Finally  although performing RF site surveys is the only business that some firms engage  in  a good site survey can be th
366. nect stations that have no network connectivity or have  legacy serial network connectivity to the wireless network via the standard 9 pin  serial  COM  port     A  A portal is a device that connects dissimilar media types such as 802 11 wireless  and 802 3 Ethernet  or maybe even 802 5 Token Ring     A  All wireless LAN radios are half duplex  The same radios used for client  connectivity are used for access points  bridges  and workgroup bridges     Chapter 4     Wireless LAN Infrastructure Devices 103    20  D  A USB adapter connects a computer   s USB port to a wireless network using a  standard PCMCIA radio  whether internally fixed or externally modular      Antennas and Accessories    CWNA Exam Objectives Covered         Identify the basic attributes  purpose  and function of the  following types of antennas         Describe the proper locations and methods for installing antennas         Explain the concepts of polarization  gain  beamwidth  and  free space path loss as they apply to implementing solutions  that require antennas      Identify the purpose of the following wireless LAN  accessories and explain how to install  configure  and  manage them       CHAPTER    In This Chapter    Omni directional dipole RF Antennas    Semi directional Power over Ethernet    Highly directional Accessories    Power over Ethernet devices  Amplifiers   Attenuators   Lightning arrestors   RF connectors and cables    RF splitters    CWNA Study Guide    Copyright 2002 Planet3 Wireless
367. ned from or scheduled with the client  prior to visiting the site for the purpose of doing the site survey  if possible     Q Building blueprints  including power source documentation        Q Previous wireless LAN site survey documentation    320 Chapter 11     Site Survey Fundamentals    Current network diagram  topology map    A meeting with the network administrator   A meeting with the building manager   A meeting with the security officer   Access to all areas of the facility to be affected by the wireless LAN  Access to wiring closets    Access to roof  if outdoor antennas are anticipated        D 0 0 O O0 0 CO O    Future construction plans  if available    Now that all of these questions are answered and complete documentation of the facility  has been made  you are ready to leave your office and go on site     Site Survey Equipment    Access    This section will cover the wireless LAN equipment and tools required for a site survey   In the most basic indoor cases  you will need at least one access point  a variety of  antennas  antenna cables and connectors  a laptop computer  or PDA  with a wireless PC  card  some site survey utility software  and lots of paper  There are some minor things  that can be added to your mobile toolkit such as double sided tape  for temporarily  mounting antennas to the wall   a DC to AC converter and batteries  for powering the  access point where there s no source of AC power   a digital camera for taking pictures of  particular locat
368. needs  If the manufacturer decides to use the    post   8 31 2000    rules  then the manufacturer will be bound by all of these rules  Conversely   if using the  pre  8 31 2000    rules  the manufacturer will be bound by that set of rules  A  manufacturer cannot use some provisions from the    pre  8 31 2000    rules and mix them  with other provisions of the    post  8 31 2000    rules     Prior to 8 31 00  FHSS systems were mandated by the FCC  and the IEEE  to use at least  75 of the possible 79 carrier frequencies in a frequency hop set at a maximum output  power of 1 Watt at the intentional radiator  Each carrier frequency is a multiple of 1  MHz between 2 402 GHz and 2 480 GHz  This rule states that the system must hop on  75 of the 79 frequencies before repeating the pattern     This rule was amended on 8 31 00 to state that only 15 hops in a set were required  but  other changes ensued as well  For example  the maximum output power of a system  complying with these new rules is 125 mW and can have a maximum of 5 MHz of carrier  frequency bandwidth  Remember  with an increase in bandwidth for the same  information  less peak power is required  As further explanation of this rule change   though not exactly in the same wording used by the FCC regulation  the number of hops  multiplied times the bandwidth of the carrier had to equal a total span of at least 75 MHz   For example  if 25 hops are used  a carrier frequency only 3 MHz wide is required  or if  15 hops are used
369. net connections  and users  desktops and laptops  With a few simple  tools  it is relatively simple to gather important information  impersonate a user  or even  cause damage to the network through reconfiguration  Probing servers with port scans   creating null sessions to shares and having servers dump passwords to hacking utilities   and then logging into servers using existing accounts are all things that can be done by  following the instructions in off the shelf hacker books     Jamming    Whereas a hacker would use passive and active attacks to gain valuable information from  or to gain access to your network  jamming is a technique that would be used to simply    Chapter 10     Wireless LAN Security 285    shut down your wireless network  Similar to saboteurs arranging an overwhelming  denial of service  DoS  attack aimed at web servers  so a wireless LAN can be shut down  by an overwhelming RF signal  That overwhelming RF signal can be intentional or  unintentional  and the signal may be removable or non removable  When a hacker stages  an intentional jamming attack  the hacker could use wireless LAN equipment  but more  likely  the hacker would use a high power RF signal generator or sweep generator   Figure 10 8 illustrates an example of jamming a wireless LAN     FIGURE 10 8 Jamming Attack Example      l     r Jammer    I     va    l I l  A p   l      aun     Client and access   k Sen       point signals get High power RF    cut off     Signal Generator    Removin
370. network diagrams   Indoor  amp  outdoor antennas   Cables  amp  connectors   Binoculars and two way radios   Umbrella and or rain suit   Specialized software or hardware such as a spectrum analyzer or sniffer    Tools  double sided tape  and other items for temporary hardware mountings       Oo 0 0 O0 0 0 O0 OOO 0 0 DO    Secure and padded equipment case for housing computers  tools  and secure  documents during the survey and travel to and from the survey site    Chapter 11     Site Survey Fundamentals 327    Digital camera for taking pictures of particular locations within a facility  Battery chargers   Variable attenuator  Figure 11 9    Measuring wheel  Figure 11 10        D 0 0 O O    Appropriate cart or other mechanism for transporting equipment  amp   documentation    FIGURE 11 9 Variable attenuator        eee li bbe baer    FIGURE 11 10 Distance wheel       FIGURE 11 11 Access point with a battery pack       If frequent site surveys are part of your business  create a toolkit with all this gear in it  so  that you will always have the necessary site survey tools on hand  The last item in the    328 Chapter 11     Site Survey Fundamentals    above list     a cart     will become a valued possession after making a few dozen trips back  and forth across a large facility moving the hardware and site survey support gear  Figure  11 12 shows the type of cart that can be used to carry gear     FIGURE 11 12 Site Survey travel case       Conducting a Site Survey    Once on sit
371. network from outside the building   s walls     The alternative to the variable output power feature is use of fixed output access points   With a fixed output from the access point  creative measures such as amplifiers   attenuators  long cables  or high gain antennas may have to be implemented  Controlling  output power both from the access point and from the antenna is also important regarding  operation within FCC guidelines  We will discuss use of these items in Chapter 5   Antennas and Accessories     Varied Types of Wired Connectivity    Connectivity options for an access point can include a link for 10baseTx  10 100baseTx   100baseTx  100baseFx  token ring  or others  Because an access point is typically the  device through which clients communicate with the wired network backbone  the  administrator must understand how to properly connect the access point into the wired  network  Proper network design and connectivity will help prevent the access point from  being a bottleneck and will result in far fewer problems due to malfunctioning equipment     Consider using a standard  off the shelf access point for use in an enterprise wireless  LAN  If  in this case  the access point were to be located 150 meters from the nearest  wiring closet  running a category 5  Cat5  Ethernet cable to the access point probably will  not work  This scenario would be a problem because Ethernet over Cat5 cable is only  specified to 100 meters  In this case  purchasing an access point that
372. ng 30 dB  we can quickly see  that 1 watt   30 dBm     C  Refraction of RF waves works similarly to visible light bending as it passes from  air into water  Be careful not to confuse refraction and diffraction     B  C  Raising the antennas on each end will fix the problem  but what happens in  another year when the tree has grown again  This is only a short term fix  Turning  up the power will not always solve the problem since the problem may be  retransmissions due to packet errors instead of decreased signal amplitude   Trimming the tree as a test  and then cutting it down if it is the problem is the  solution to this problem  The tree could be the problem because any encroachment  into the Fresnel Zone can cause signal degradation  Severe degradation begins  somewhere between 20  amp  40  blockage of the Fresnel Zone     C  100 mW with a 3 dB loss results in 50 mW of output power remaining because a  3 dB loss cuts the power in half  A gain of 10 dBi will multiply the remaining  power of 50 mW by a factor of 10 yielding 500 mW of output power at the antenna  element  referred to as EIRP      B  Converting 200 mW to dBm  we see that we start out with 23 dBm  From this    44 Chapter 2  RF Fundamentals    13     14     15     16     17     18     19     20     point  it s a simple addition subtraction problem  23 dBm   6 dB   9 dBi   26 dBm     C  Starting with 100 mW of output power  and not being able to use the 10 s and 3 s   we have a more complex math problem  A trick 
373. ng Wireless LAN Installations    Key Terms    Before taking the exam  you should be familiar with the following terms     adjacent channel Interference  all band interference   antenna diversity   co channel Interference  downfade   free space path loss  narrowband interference  nulling   spectrum analyzer    stratification    upfade    Chapter 9  Troubleshooting Wireless LAN Installations 263    Review Questions    1     Which of the following are solutions to the hidden node problem  Choose all that  apply    A  Using RTS CTS   B  Increasing the power to the hidden nodes   C  Decreasing the power to the hidden node  D    Increasing the power on the access point    Antenna diversity is a solution to which one of the following wireless LAN  problems     A  Near Far   B  Hidden Node   C  Co location throughput  D  Multipath    When objects in the Fresnel Zone absorb or block some of the RF wave  which one  of the following might result     A  Signal fading   B  A surge in signal amplitude  C  Achange in signal frequency  D    A change in modulation    What is the period of time between the main wave s arrival at the receiver and the  reflected wave s arrival at a receiver called     A  SIFS  B  Delay spread  C  PIFS  D  Signal spread    Which of the following could be used to remedy a near far problem  Choose all that  apply    A  Decrease the power of the near nodes   B  Increase the power of the closer nodes   C  Decrease the power of the distant node  D    Increase the powe
374. ng an antenna to  an access point or wireless bridge  Below are some criteria to be considered in choosing  the proper cables for your wireless network     140 Chapter 5     Antennas and Accessories      Cables introduce loss into a wireless LAN  so make sure the shortest cable length  necessary is used       Plan to purchase pre cut lengths of cable with pre installed connectors  Doing so  minimizes the possibility of bad connections between the connector and the  cable  Professional manufacturing practices are almost always superior to cables  manufactured by untrained individuals       Look for the lowest loss cable available at your particular price range  the lower  the loss  the more expensive the cable   Cables are typically rated for loss in  dB 100 feet  The table in Figure 5 32 illustrates the loss that is introduced by  adding cables to a wireless LAN       Purchase cable that has the same impedance as all of your other wireless LAN  components  generally 50 ohms        The frequency response of the cable should be considered as a primary decision  factor in your purchase  With 2 4 GHz wireless LANs  a cable with a rating of at  least 2 5 GHz should be used  With 5 GHz wireless LANs  a cable with a rating  of at least 6 GHz should be used       One might have to use an extension cable when an access point and its remote  antenna are far apart  such as in an outdoor installation   In this case  be aware  that connectors drop  0 25 dB and cable loss can be very signi
375. ng for an RF site survey  P ti     Gathering business requirements reparation  Tools and Equipment  Needed      Interview management and users     Defining security requirements     Site specific documentation Conducting the Survey     Documenting existing network characteristics Reporting        Identify the necessary equipment involved in performing a  site survey      Wireless LAN equipment    Measurement tools    Documentation        Understand the necessary procedures involved in  performing a site survey      Non RF information     Permits and zoning requirements     Outdoor considerations     RF related information     Interference sources     Connectivity and power requirements        Understand and implement RF site survey reporting  procedures      Requirements     Methodology     Measurements     Security     Graphical documentation      Recommendations    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     308 Chapter 11     Site Survey Fundamentals    What is    In this chapter  we will discuss the process of conducting a site survey  also known as a   facilities analysis   We will discuss terms and concepts that you have probably heard  and used before if you have ever installed a wireless network from the ground up  If  wireless is new to you  you might notice that some of the terms and concepts carry over  from traditional wired networks  Concepts like throughput needs  power accessibility   extendibility  application requirements  budget requirements
376. ng protocol  RIP bases its  routing path on the distance  number of hops  to the destination  RIP maintains optimum  routing paths by sending out routing update messages if the network topology changes   For example  if a router finds that a particular link is faulty  it will update its routing  table  and then send a copy of the modified table to each of its neighbors     session layer   Establishes  manages  and terminates sessions between applications     shared key authentication   A type of authentication that assumes each station has  received a secret shared key through a secure channel independent from an 802 11  network  Stations authenticate through shared knowledge of the secret key  Use of  shared key authentication requires implementation of the 802 11 Wireless Equivalent  Privacy algorithm     signal to noise ratio   A measure of the useful information being communicated relative  to anything else including external noise or interference     Glossary 371    Simple Mail Transfer Protocol  SMTP      protocol for sending e mail messages between  servers    Simple Network Management Protocol  SNMP    A network management protocol that  defines the transfer of information between Management Information Bases  MIBs    Most high end network monitoring stations require the implementation of SNMP on each  of the components the organization wishes to monitor     simplex     method of communication in which data travels only in one direction    site survey   The act of sur
377. ngs  like a body of water or a flat  stretch of earth  reflect RF waves  Multipath almost always exists in any wireless  LAN connection  hence  the use of dual antennas on most access points     C  The causes of the hidden node problem are numerous  Typical causes are  obstructions through which RF waves cannot penetrate and low power on client  stations  A good site survey might help in reducing the occurrences of hidden node  problems  but eliminating them would only be possible in an unchanging  environment  The main use and advantage of a wireless LAN is mobility  which  creates an ever changing environment     A  The RTS CTS protocol is not a cure for the hidden node problem  but a tool used  to reduce the negative effects that hidden nodes have on the network  collisions     C  The network administrator must manually configure the access points and clients  for use of RTS CTS regardless of the setting  The three settings are Off  On  and On  with Threshold  The Offsetting is used by default to reduce unnecessary overhead  on the network     B  The near far problem is one that is addressed by the access protocols used by  wireless networks  This problem is seen in both cellular and wireless LAN  networks  When the problem is severe  it might be necessary to move distant nodes  closer  increase power to distant nodes  or to decrease power to closer nodes     C  There are three non overlapping DSSS channels specified by the FCC in the 2 4  GHz ISM band  Each of these bands
378. nificant parts of an  outdoor installation  Visual line of sight is not necessary in order to have a good RF  connection  Fog  smog  rain  snow  or long distances might for good RF LOS and  no Visual LOS     D  Since no standard yet exists for PoE  manufacturers implement PoE in various  ways  Various voltages and polarities are used as well as different sets of unused  pins in the Cat5 cable  Be careful not to damage your wireless LAN equipment by  using PoE equipment from one vendor and wireless LAN equipment from another   PoE is sometimes called Power over LAN as well     B  A pigtail cable is used to adapt two different kinds of connectors  Typically one  of the connectors is an industry standard type such as an N type or SMA  but not  necessarily  Having the RF cable   s connector match the access point   s connector  saves from having to purchase separate adapter connectors  which would insert more  loss into the circuit  The pigtail cable will be attached to the RF cable and the  antenna     A  Beamwidth refers to the angle of transmission  for both horizontal and vertical   from an antenna  For example  a patch antenna might have a 45 degree vertical  beamwidth and a 65 degree horizontal beamwidth whereas a dipole antenna might  have a 40 degree vertical beamwidth and would have a 360 degree horizontal  beamwidth     A  Omni directional antennas radiate in a 360 degree field around the element   providing complete coverage in the shape of a doughnut horizontally arou
379. nistrator clues as to what is likely  going on with the stations having connectivity problems  Since near far prevents a node  from communicating  the administrator should check to see if the station has drivers  loaded properly for the wireless radio card and has associated with the access point   shown in the association table of the access point      The next step in troubleshooting near far is use of a wireless sniffer  A wireless sniffer  will pick up transmissions from all stations it hears  One simple method of finding nodes  whose signals are not being heard by the access point is to move around the network  looking for stations with a faint signal in relation to the access point and nodes near the  access point  Using this method  it should not be too time consuming to locate such a  node  depending on the size of the network and the complexity of the building structure   Locating this node and comparing its signal strength to that of nodes near the access point  can solve the near far problem fairly quickly     Chapter 9  Troubleshooting Wireless LAN Installations 247    Solutions for Near Far    System    Although the near far problem can be debilitating for those clients whose RF signals get  drowned out  near far is a relatively easy problem to overcome in most situations  It is  imperative to understand that the CSMA CA protocol solves much of the near far  problem with no intervention of the administrator  If a node can hear another node  transmitting  it will 
380. njector  These single port injectors are acceptable  when used with a small number of wireless infrastructure devices  but quickly become a  burden  cluttering wiring closets  when building medium or large wireless networks     FIGURE 5 18 A single port PoE injector       Multi port DC Voltage Injectors    Several manufacturers offer multi port injectors including 4  6  or 12 port models  These  models may be more economical or convenient for installations where many devices are  to be powered through the Cat5 cable originating in a single wiring closet or from a  single switch  Multi port DC voltage injectors typically operate in exactly the same  manner as their single port counterparts  See Figure 5 19 for an example of a multi port  PoE injector  A multi port DC voltage injector looks like an Ethernet switch with twice  as many ports  A multi port DC voltage injector is a pass through device to which you  connect the Ethernet switch  or hub  to the input port  and then connect the PoE client  device to the output device  both via Cat5 cable  The PoE injector connects to an AC  power source in the wiring closet  These multi port injectors are appropriate for medium   sized wireless network installations where up to 50 access points are required  but in  large enterprise rollouts  even the most dense multi port DC voltage injectors combined  with Ethernet hubs or switches can become cluttered when installed in a wiring closet     FIGURE 5 19 A multi port PoE injector    Ser
381. nks between all buildings  Point to multipoint bridge link from a central building to all remote buildings    One central antenna at the main building only    Which of the following are challenges that WISPs face that telephone companies  and cable companies do not  Choose all that apply     A     B   C   D     Customers located more than 18 000 feet  5 7 km  from a central office  High costs of installing telephone lines or copper cabling  Trees as line of sight obstructions    Rooftop access for antenna installation    In what organization did the use of spread spectrum wireless data transfer originate     A     B   C   D     WECA  WLANA  FCC   U S  Military    14 Chapter 1   Introduction to Wireless LANs    11  Which one of the following is the most recently approved IEEE standard for    wireless LANs     A  802 1la  B  802 11b  C  802 11c  D  802 11g    12  Which one of the following IEEE standards for wireless LANs is not compatible    with the standard currently known as Wi Fi        A  802 11  B  802 11g  C  802 11a  D  802 11b    13  Which one of the following IEEE 802 11 standards for wireless LANs utilizes the 5    GHz UNII bands for its radio signal transmissions     A  802 11b  B  Bluetooth  C  802 11   D  802 11g  E  802 1la    14  A WISP would take advantage of which one of the following applications for    wireless LANs    A  Last Mile data delivery   B  Building to building bridging  C  Classroom connectivity    D  Home network connectivity    15  Who makes th
382. nment     Safety      Maintenance    Placement    Mount omni directional antennas attached to access points near the middle of the desired  coverage area whenever possible  Place the antenna as high as possible to increase  coverage area  being careful that users located somewhat below the antenna still have  reception  particularly when using high gain omni antennas  Outdoor antennas should be  mounted above obstructions such as trees and buildings such that no objects encroach on  the Fresnel Zone     Mounting  Once you have calculated the necessary output power  gain  and distance that you need to  transmit your RF signal  and have chosen the appropriate antenna for the job  you must    mount the antenna  There are several options for mounting antennas both indoors and  outdoors  some of which are shown in Figure 5 16     FIGURE 5 16 Mounting antennas    Ceiling Mast  Mount Mount    Patch                   Antenna Mounting Options      ceiling mount   typically hung from crossbars of drop ceilings     wall mount   forces the signal away from a perpendicular surface    pillar mount   mounts flush to a perpendicular surface     ground plane   sits flat on the ground     mast mount   the antenna mounts to a pole     articulating mount   movable mast mount      chimney mount   various hardware to allow antenna mounting to a chimney    Chapter 5     Antennas and Accessories 119       tripod mast   the antenna sits atop a tripod    There is no perfect answer for where to mount y
383. nother     Troubleshooting Hidden Node    The primary symptom of a hidden node is degraded throughput over the wireless LAN   Many times you will discover that you have a hidden node by hearing the complaints of    244 Chapter 9    Troubleshooting Wireless LAN Installations    users connected to the wireless LAN detecting an unusual sluggishness of the network   Throughput may be decreased by up to 40  because of a hidden node problem  Since  wireless LANs use the CSMA CA protocol  they already have an approximate overhead  of 50   but  during a hidden node problem  it is possible to lose almost half of the  remaining throughput on the system     Because the nature of a wireless LAN increases mobility  you may encounter a hidden  node at any time  despite a flawless design of your wireless LAN  Ifa user moves his  computer to a conference room  another office  or into a data room  the new location of  that node can potentially be hidden from the rest of the nodes connected to your wireless  LAN              To proactively troubleshoot a hidden node  you must test for degraded throughput and  also find as many potential locations for a hidden node as possible during the initial and  any subsequent site surveys     Solutions for Hidden Node    Once you have done the troubleshooting and discovered that there is a hidden node  problem  the problem node s  must be located  Finding the node s  will include a manual  search for nodes that might be out of reach of the main cluster of
384. nsmissions are spaced by SIFS  The NAV is set with RTS on  all nodes  and then reset on all nodes by the immediately following CTS     Chapter 8      MAC and Physical Layers 225             FIGURE 8 8 RTS CTS data transmission in DCF mode  DIFS  RTS data  sender  SIFS SIFS    oe rs ACK  receiver  NAV  RTS  DIFS  other NAV  CTS  data  stations t  Defer access  i  contention  Modulation  Modulation  which is a Physical Layer function  is a process in which the radio  transceiver prepares the digital signal within the NIC for transmission over the airwaves   Modulation is the process of adding data to a carrier by altering the amplitude  frequency   or phase of the carrier in a controlled manner  Knowing the many different kinds of  modulations used with wireless LANs is helpful when trying to build a compatible  network piece by piece   FIGURE 8 9 Modulation and Spreading Code Types for 802 11  amp  802 11b                            Spreading Modulation Data  Code Technology Rate  N Barker Code DBPSK 1 Mbps  T 2 DQPSK 2 Mbps  X O CCK DQPSK 5 5 Mbps  CCK DQPSK 11 Mbps  N  T 2 Barker Code 2GFSK 1 Mbps  T  4 Barker Code 4GFSK 2 Mbps                      Figure 8 9 shows the details of modulation and spreading code types used with Frequency  Hopping and Direct Sequence wireless LANs in the 2 4 GHz ISM band  Differential  Binary Phase Shift Keying  DBPSK   Differential Quadrature Phase Shift Keying   DQPSK   and Gaussian Frequency Shift Keying  GFSK  are the types of modulation  us
385. nteroperable standard    802 1d     See Spanning Tree Protocol  802 1x     wireless LAN security implementation meant to increase security in user  authentication by using RADIUS  Extensible Authentication Protocol  EAP   and LDAP    for port based authentication between an operating system and the network access device    802 2   IEEE standard that specifies the Logical Link Control  LLC  that is common to  all 802 series LANs    802 3   IEEE standard that specifies a carrier sense medium access control and physical  layer specifications for wired LANs     802 5   IEEE standard that specifies a token passing ring access method and physical  layer specifications for wired LANs     Glossary 361    802 11b   A revision to the IEEE standard for direct sequence wireless LANs  Most  802 11b products have data rates of up to 11 Mbps  even though the standard does not  specify the techniques for achieving these data rates     802 11a   A revision to the IEEE standard that operates in the unlicensed 5 GHz band   Most 802 1 1a products have data rates up to 54 Mbps and must support 6  12   amp  24  Mbps     access point  AP    a layer 2 device that serves as an interface between the wireless  network and a wired network and can control medium access using RTS CTS  Access  points combined with a distribution system  e g  Ethernet  support the creation of  multiple radio cells  BSSs  that enable roaming throughout a facility     active scanning     method by which stations broadcast a p
386. o gain access to the network  With wireless  LANs  it is not so much what the stations do  but rather who they are and how they are  configured  There are three basic types of filtering that can be performed on a wireless  LAN        SSID filtering    MAC address filtering      Protocol filtering    This section will explain what each of these types of filtering are  what each can do for  the administrator  and how to configure each one     SSID Filtering    SSID filtering is a rudimentary method of filtering  and should only be used for the most  basic access control  The SSID  service set identifier  is just another term for the  network name  The SSID of a wireless LAN station must match the SSID on the access  point  infrastructure mode  or of the other stations  ad hoc mode  in order for the client to  authenticate and associate to the service set  Since the SSID is broadcast in the clear in  every beacon that the access point  or set of stations  sends out  it is very simple to find  out the SSID of a network using a sniffer  Many access points have the ability to take the    Chapter 10     Wireless LAN Security 279    SSID out of the beacon frame  When this is the case  the client must have the matching  SSID in order to associate to the access point  When a system is configured in this  manner  it is said to be a  closed system   SSID filtering is not considered a reliable  method of keeping unauthorized users out of a wireless LAN     Some manufacturer s access point
387. o reduce the possibility of collisions on the wireless LAN     C  When a client station is actively seeking access points with which to associate  it  sends probe request frames  All access points hearing the probe request frame  respond with probe response frames  Probe response frames contain almost  identical information to beacon management frames     A  An access point using point coordination function mode uses PIFS interframe  spaces in order to capture use of the medium before stations that are using DCF  mode  PIFS is shorter than DIFS and therefore gives the access point priority over  stations competing for use of the medium using DIFS     B  Wireless LANs use the CSMA CA protocol in order to avoid collisions on the  network  The CSMA CA protocol introduces approximately 50  overhead into the  network reducing throughput to approximately half of the data rate     D  The typical maximum throughput of an 802 11b access point is approximately  5 5 Mbps  This is due to protocols like CSMA CA and RTS CTS being used  In  order to increase the throughput beyond this point  additional access points can be  co located  up to 3 in an area  using non overlapping channels  Each access point is  capable of the same 5 5 Mbps     C  In many cases  manufacturers state that 802 1 1b devices use CCK modulation at  11 Mbps  but they do not  CCK is not a modulation type  but rather a coding  technique  The modulation type used at 11 Mbps is QPSK     B  For every two steps in data rate
388. o such thing as a dual head N type connector        Wireless LAN Organizations and  Standards    CWNA Exam Objectives Covered         Identify  apply  and comprehend the differences between the    following wireless LAN standards     802 11  802 11b  802 11a  802 119  Bluetooth  Infrared  HomeRF        Understand the roles of the following organizations in providing    direction and accountability within the wireless LAN industry     FCC  IEEE  WECA  WLANA  IrDA  ETSI    CWNA Study Guide    Copyright 2002 Planet3 Wireless  Inc     CHAPTER    In This Chapter   FCC   IEEE   Wireless LAN Organizations    Competing Technologies    154 Chapter 6     Wireless LAN Organizations and Standards    Most computer related hardware and technologies are based on some standards  and  wireless LANs are no exception  There are organizations that define and support the  standards that allow hardware from different manufacturers to function together  seamlessly  In this chapter we will discuss the FCC   s role in defining and enforcing the  laws governing wireless communication and the IEEE   s role in creating standards that  allow wireless devices to work together  We will also cover the different frequency  bands on which wireless LANs operate  and examine the 802 11 family of standards  We  will discuss some of the major organizations in the wireless LAN marketplace as well as  the roles they fill in the industry  Finally  we will cover some of the emerging  technologies and standards and di
389. oadcast  SSID  Ifa probe request is sent specifying an SSID  then only access points that are  servicing that SSID will respond with a probe response frame  If a probe request frame is  sent with a broadcast SSID  then all access points within reach will respond with a probe  response frame  as can be seen in Figure 7 2     The point of probing in this manner is to locate access points through which the station  can attach to the network  Once an access point with the proper SSID is found  the  station initiates the authentication and association steps of joining the network through  that access point     Active Scanning       Client    The information passed from the access point to the station in probe response frames is  almost identical to that of beacons  Probe response frames differ from beacons only in  that they are not time stamped and they do not include a Traffic Indication Map  TIM      The signal strength of the probe response frames that the PC Card receives back helps  determine the access point with which the PC card will attempt to associate  The station  generally chooses the access point with the strongest signal strength and lowest bit error  rate  BER   The BER is a ratio of corrupted packets to good packets typically determined  by the Signal to Noise Ratio of the signal  If the peak of an RF signal is somewhere near  the noise floor  the receiver may confuse the data signal with noise     180 Chapter 7     802 11 Network Architecture    Authentication  
390. of  documentation  This information may be needed in the future     Once the site survey is delivered and reviewed by the client  have the client sign a simple  form  the site survey report is your only deliverable  that states that the client has both  received and reviewed the report  and that the report is acceptable  The client may ask  for additional information before signing off     Below are the main sections of documentation that should be provided to the client in a  site survey report  Include graphics that may help illustrate the data when appropriate     340 Chapter 11     Site Survey Fundamentals    Purpose and Business Requirements    The site survey report should include all contact information for the site survey company  and the client company  Both the site survey company and the customer get copies of the  report     Restate the customer   s wants  needs  and requirements  and then provide details on how  these wireless LAN requirements can be met  item by item  as a result of using the site  survey as a roadmap to implementing the new wireless LAN  Supplement this section  with graphical representations  either sketches  or copies of actual blueprints  to show the  client what types of coverage and wireless connectivity they requested  This section may  include an application analysis where the site surveyor has tested the client s application  to assure that the proper implementation of the new wireless LAN will provide  appropriate coverage and connecti
391. of the frame due to an  incorrect FCS value  EIFS is not a main focus of this section and an in depth  understanding of its functionality is not essential knowledge to a wireless network  administrator     Interframe spacing                IFS DSSS FHSS Diffused  Infrared  SIFS 10 uS 28 uS 7 uS  PIFS 30 uS 78 uS 15 us  DIFS 50 uS 128 uS 23 uS                      Interframe spaces are measured in microseconds and are used to defer a station s access to  the medium and to provide various levels of priority  On a wireless network  everything  is synchronized and all stations and access points use standard amounts of time  spaces   to perform various tasks  Each node knows these spaces and uses them appropriately  A  set of standard spaces is specified for DSSS  FHSS  and Infrared as you can see from  Figure 8 3  By using these spaces  each node knows when and if it is supposed to  perform a certain action on the network     Short Interframe Space  SIFS     SIFS is the shortest fixed interframe space  SIFS are time spaces before and after which  the following types of messages are sent  The list below is not an exhaustive list       RTS   Request to Send frame  used for reserving the medium by stations      CTS   Clear to Send frame  used as a response by access points to the RTS frame  generated by a station in order to ensure all stations have stopped transmitting      ACK   Acknowledgement frame used for notifying sending stations that data  arrived in readable format at the 
392. oint  Additionally  the repeater  access point is communicating with the clients as well as the upstream access point over  the wireless link  reducing throughput on the wireless segment  Users attached to the  repeater access point will likely experience low throughput and high latencies in this  scenario  It is typical for the wired Ethernet port to be disabled while in repeater mode     An access point in repeater mode    ot  Server gree    Wwe       we        Access Point  aa     Root Mode     Repeater Mode     Access Point    76 Chapter 4      Wireless LAN Infrastructure Devices    Common Options    An access point is considered a portal because it allows client connectivity from an  802 11 network to 802 3 or 802 5 networks  Access points are available with many  different hardware and software options  The most common of these options are       Fixed or Detachable Antennas     Advanced Filtering Capabilities     Removable  Modular  Radio Cards    Variable Output Power     Varied Types of Wired Connectivity    Fixed or Detachable Antennas    Depending on your organization or client   s needs  you will need to choose between  having an access point with fixed  meaning non removable  antennas or detachable  antennas  An access point with detachable antennas gives you the ability to attach a  different antenna to the access point using whatever length of cable you require  For  example  if you needed to mount the access point inside  and give outdoor users access to  the n
393. oint where the current data rate  cannot be maintained  When this signal strength decrease occurs  the transmitting unit  will drop its data rate to the next lower specified data rate  say from 11 Mbps to 5 5 Mbps  or from 2 Mbps to 1 Mbps  Figure 8 2 illustrates that  as the distance from the access  point increases  the data rate decreases     Dynamic Rate Shifting        wa 11 5 5 Mbps     P      Mi x       _ 5 5 2 Mbps_       Te eee    7  N21 Mbps                A wireless LAN system will never drop from 11 Mbps to 10 Mbps  for example  since 10  Mbps is not a specified data rate  The method of making such discrete jumps is typically  called either ARS or DRS  depending on the manufacturer  Both FHSS and DSSS  implement DRS  and the IEEE 802 11  IEEE 802 11b  HomeRF  and OpenAir standards  require it     Distributed Coordination Function    Distributed Coordination Function  DCF  is an access method specified in the 802 11  standard that allows all stations on a wireless LAN to contend for access on the shared  transmission medium  RF  using the CSMA CA protocol  In this case  the transmission  medium is a portion of the radio frequency band that the wireless LAN is using to send  data  Basic service sets  BSS   extended service sets  ESS   and independent basic  service sets  IBSS  can all use DCF mode  The access points in these service sets act in  the same manner as IEEE 802 3 based wired hubs to transmit their data  and DCF is the  mode in which the access points sen
394. ome level  of effectiveness     We will explain the various methods that can be used to attack a wireless LAN so that as  an administrator you will know what to expect and how to prevent it  Then we will  discuss some of the emerging security solutions that are available  but not yet specified  by any of the 802 11 standards  Finally  we will offer some recommendations for  maintaining wireless LAN security and discuss corporate security policy as it pertains  specifically to wireless LANs     This chapter on wireless LAN security is by no means the end of knowledge on the  subject  Rather  this chapter should serve the CWNA candidate as a basic introduction to  the inherent weaknesses of wireless LANs and the available solutions for compensating  for these weaknesses     Wired Equivalent Privacy    Wired Equivalent Privacy  WEP  is an encryption algorithm used by the Shared Key  authentication process for authenticating users and for encrypting data payloads over only  the wireless segment of the LAN  The IEEE 802 11 standard specifies the use of WEP     WEP is a simple algorithm that utilizes a pseudo random number generator  PRNG  and  the RC4 stream cipher  For several years this algorithm was considered a trade secret and  details were not available  but in September of 1994  someone posted the source code in  the cypherpunks mailing list  Although the source code is now available  RC4 is still  trademarked by RSADSI  The RC4 stream cipher is fast to decrypt and encrypt 
395. on  Windows XP includes an  EAP TLS client  and EAP TLS is also supported by Windows 2000     EAP TTLS  Funk Software and Certicom have jointly developed EAP TTLS  Tunneled  Transport Layer Security   EAP TTLS is an extension of EAP TLS  which provides for  certificate based  mutual authentication of the client and network  Unlike EAP TLS   however  EAP TTLS requires only server side certificates  eliminating the need to  configure certificates for each wireless LAN client     In addition  EAP TTLS supports legacy password protocols  so you can deploy it against  your existing authentication system  such as Active Directory or NDS   EAP TTLS  securely tunnels client authentication within TLS records  ensuring that the user remains    Chapter 7     802 11 Network Architecture 187    anonymous to eavesdroppers on the wireless link  Dynamically generated user  and  session based WEP keys are distributed to secure the connection     EAP SRP  Secure Remote Password   SRP is a secure  password based authentication  and key exchange protocol  It solves the problem of authenticating clients to servers  securely in cases where the user of the client software must memorize a small secret  like  a password  and carries no other secret information  The server carries a verifier for each  user  which allows the server to authenticate the client  However  if the verifier were  compromised  the attacker would not be allowed to impersonate the client  In addition   SRP exchanges a cryptograp
396. on  as illustrated in Figure 2 4  occurs when a propagating electromagnetic wave    impinges upon an object that has very large dimensions when compared to the  wavelength of the propagating wave  Reflections occur from the surface of the earth     buildings  walls  and many other obstacles  If the surface is smooth  the reflected signal    may remain intact  though there is some loss due to absorption and scattering of the  signal     FIGURE 2 4    FIGURE 2 5    Chapter 2   RF Fundamentals 21    Reflection    Incoming RF    Reflected RF       RF signal reflection can cause serious problems for wireless LANs  This reflecting of the  main signal from many objects in the area of the transmission is referred to as multipath   Multipath can have severe adverse affects on a wireless LAN  such as degrading or  canceling the main signal and causing holes or gaps in the RF coverage area  Surfaces  such as lakes  metal roofs  metal blinds  metal doors  and others can cause severe  reflection  and hence  multipath     Reflection of this magnitude is never desirable and typically requires special functionality   antenna diversity  within the wireless LAN hardware to compensate for it  Both  multipath and antenna diversity are discussed further in Chapter 9  Troubleshooting      Refraction    Refraction describes the bending of a radio wave as it passes through a medium of  different density  As an RF wave passes into a denser medium  like a pool of cold air  lying in a valley  the wave 
397. on port based access control  This standard  can be used to enhance the security of wireless systems  but is not a wireless LAN  standard itself  The 802 11a standard specifies use of the 5 GHz UNII bands     B  There are three UNII bands  all specified for use by various 802 1 1a compliant  devices  These three UNII bands are 100 MHz wide and each have different  maximum output power limits and usage requirements     C  The IEEE creates standards for most every type of connectivity  whether wired  or wireless  The IEEE s role in keeping each information technology industry  working within certain standards is quite important to rapid advancement of the  industry     A  The original 802 11 standard was started in 1990 and finished in 1997  It  underwent several revisions after 1997  the final being the 1999 revision  Since the  1999 version of 802 11  there have been several new 802 11 based standards  published by the IEEE such as 802 11b and 802 11a  Several more drafts related to  wireless LANs are currently on their way to becoming standards such as 802 1 1i   802 11g  and 802 11f        802 11 Network Architecture    CWNA Exam Objectives Covered       Identify and apply the processes involved in authentication and  association       Authentication     Association     Open System authentication     Shared Key authentication     Secret keys  amp  certificates     AAA Support         Recognize the following concepts associated with wireless  LAN Service Sets        BSS     
398. onder that they are  outpacing every other market sector     History of Wireless LANs    Spread spectrum wireless networks  like many technologies  came of age under the  guidance of the military  The military needed a simple  easily implemented  and secure  method of exchanging data in a combat environment     As the cost of wireless technology declined and the quality increased  it became cost   effective for enterprise companies to integrate wireless segments into their network   Wireless technology offered a relatively inexpensive way for corporate campuses to  connect buildings to one another without laying copper or fiber cabling  Today  the cost  of wireless technology is such that most businesses can afford to implement wireless  segments on their network  if not convert completely to a wireless network  saving the  company time and money while allowing the flexibility of roaming     Households are also benefiting from the low cost and subsequent availability of wireless  LAN hardware  Many people are now creating cost effective wireless networks that take  advantage of the convenience of mobility and creating home offices or wireless gaming  stations     As wireless LAN technology improves  the cost of manufacturing  and thus purchasing  and implementing  the hardware continues to fall  and the number of installed wireless  LANs continues to increase  The standards that govern wireless LAN operation will  increasingly stress interoperability and compatibility  As the
399. onsiderations   RF related information   Interference sources   Connectivity and power requirements    Identify and understand site survey reporting procedures    Requirements  Methodology  Measurements   Security   Graphical documentation  Recommendations    Introduction xxv    Wireless LAN Security     16     4 1  Protection    4 1 1     Identify the strengths  weaknesses and appropriate uses of the following  wireless LAN security techniques    WEP   AES   Filtering   Emerging security techniques    4 2  Attacks    4 2 1     Describe the following types of wireless LAN security attacks  and explain  how to identify and prevent them    Passive attacks  eavesdropping    Active attacks  connecting  probing  and configuring the network   Jamming   Man in the middle    4 3  Security Solutions    4 3 1     Given a wireless LAN scenario  identify the appropriate security solution  from the following available wireless LAN security solutions    WEP key solutions  Wireless VPN   Key hopping   AES based solutions  Wireless gateways  802 1x and EAP      Explain the uses of the following corporate security policies and how they are    used to secure a wireless LAN    Securing sensitive information  Physical security   Inventory and audits   Using advanced solutions  Public networks      Identify how and where the following security precautions are used to secure    a wireless LAN    WEP   Cell sizing  Monitoring   User authentication  Wireless DMZ    xxvi Introduction    Wireless LAN 
400. onsumption reasons  broadcast IR is  normally implemented indoors  Point to point IR transmitters can be used outdoors  and  have a maximum range of about 3280 feet  1 km   but this range may be shortened by the  presence of sunlight  Sunlight is approximately 60  infrared light  which severely  dilutes broadcast IR signals  On sunny days when transferring data between laptop  computers or PDAs  the two devices may have to be held closer together for good IR data  transfer        es The website for IrDA is www irda org    Chapter 6     Wireless LAN Organizations and Standards 167    Wireless LAN Interoperability Forum  WLIF     The OpenAir standard was a standard created by the Wireless LAN Interoperability  Forum  now defunct   for which many wireless LAN systems were created to comply as  an alternative to 802 11  OpenAir specified two speeds   800 kbps and 1 6 Mbps   OpenAir and 802 11 systems are not compatible and will not interoperate  Since there  are currently several product lines still available that comply with the OpenAir standard   it is important that the wireless LAN administrator know that OpenAir exists  however   OpenAir is quickly losing support among vendors and no new products are being made  that comply with this standard  OpenAir was the first attempt at interoperability and  standardization among wireless LANs  OpenAir focused on FHSS devices operating at  only two speeds        eS The website for WLIF has been removed    168 Chapter 6     Wireless LAN
401. or would need to know   however  if you don   t understand the types of interframe spacing  you cannot effectively  grasp RTS CTS  which helps you solve problems  or DCF and PCF  which are manually  configured in the access point  Both of these functions are integral in the ongoing  communications process of a wireless LAN  First  we will define each type of interframe  space  IFS   and then we will explain how each type works on the wireless LAN     As we learned when we discussed beacons  all stations on a wireless LAN are time   synchronized  All the stations on a wireless LAN are effectively    ticking    time in sync  with one another  Interframe spacing is the term we use to refer to standardized time  spaces that are used on all 802 11 wireless LANs     Three Types of Spacing    There are three main spacing intervals  interframe spaces   SIFS  DIFS  and PIFS  Each  type of interframe space is used by a wireless LAN either to send certain types of  messages across the network or to manage the intervals during which the stations contend  for the transmission medium  Figure 8 3 illustrates the actual times that each interframe  space takes for each type of 802 11 technology     218 Chapter 8      MAC and Physical Layers            FIGURE 8 3    There is a fourth interframe space called the Extended Interframe Space  EIFS   which  is not covered on the CWNA exam  EIFS is a variable length space used as a waiting  period when a frame transmission results in a bad reception 
402. original  802 11 standard specified use of DSSS  FHSS  and infrared technologies     A  E  Both the original 802 11 and the OpenAir standards specified use of FHSS  technology  The most significant difference between these two standards is the  supported speeds  OpenAir specifies 800 kbps and 1 6 Mbps whereas 802 11  specifies 1 Mbps and 2 Mbps     D  For point to multipoint links  the FCC specifies 1 watt at the intentional radiator  and 4 watts EIRP  measured at the antenna element   For point to point links  there  are specific  more complicated rules to follow to understand the maximum output  power allowed     C  Since 802 11a devices use the three 5 GHz UNII bands  they cannot  communicate with other wireless LAN devices operating in accordance with the  802 11  802 11b  and 802 11g standards  These standards use the 2 4 GHz ISM  band instead of the 5 GHz UNII bands     B  The FCC is a government agency responsible for regulating frequency spectra  within the United States  As a part of that responsibility  the FCC regulates the  unlicensed bands used by wireless LANs     B  The Wireless Fidelity  a k a  Wi Fi  seal indicates that a vendor s hardware has  undergone extensive testing to assure interoperability with other devices  manufactured to meet the 802 11b standard  In order to be interoperable with other  802 11b equipment  the equipment under test would most likely have to meet the  same 802 11b standards     174 Chapter 6     Wireless LAN Organizations and Stand
403. ost  prohibitive  You may discover that hiring cable installers and electricians to build out a  new section of office space for the network is going to cost tens of thousands of dollars   Or in the case of a large warehouse  the distances may be too great to use Category 5   Cat5  cable for the Ethernet network  Fiber might have to be installed  requiring an even  greater investment of time and resources  Installing fiber might involve upgrades to  existing edge switches     Wireless LANs can be easily implemented to provide seamless connectivity to remote  areas within a building  as illustrated by the floor plan image in Figure 1 2  Because little  wiring is necessary to install a wireless LAN  the costs of hiring installers and purchasing  Ethernet cable might be completely eliminated     Network Extension    Servers       Warehouse Clients    Building to Building Connectivity    In a campus environment or an environment with as few as two adjacent buildings  there  may be a need to have the network users in each of the different buildings have direct  access to the same computer network  In the past  this type of access and connectivity  would be accomplished by running cables underground from one building to another or  by renting expensive leased lines from a local telephone company     6 Chapter 1   Introduction to Wireless LANs    FIGURE 1 3    Using wireless LAN technology  equipment can be installed easily and quickly to allow  two or more buildings to be part of t
404. our network  then your network is  not susceptible to this kind of attack     It may be tempting for network administrators to always use the maximum power output  settings on all wireless LAN devices in an attempt to get maximum throughput and  coverage  but such blind configuration will come at the expense of security  An access  point has a cell size that can be controlled by the amount of power that the access point is  emitting and the antenna gain of the antenna being used  If that cell is inappropriately  large to the point that a passerby can detect  listen to  or even gain access to the network   then the network is unnecessarily vulnerable to attack  The necessary and appropriate  cell size can be determined by a proper site survey  Chapter 11   The proper cell size  should be documented along with the configuration of the access point or bridge for each  particular area  It may be necessary to install two access points with smaller cell sizes to  avoid possible security vulnerabilities in some instances     296 Chapter 10     Wireless LAN Security    Try to locate your access points towards the center of your house or building  This will  minimize the signal leak outside of the intended range  If you are using external  antennas  selecting the right type of antenna can be helpful in minimizing signal range   Turn off access points when they are not in use  This will minimize your exposure to  potential hackers and lighten the network management burden     User Auth
405. our particular antenna  You will learn in  Chapter 11  Site Surveying Fundamentals  that the recommended placement and  mounting of antennas will be part of a proper site survey  There is no substitute for on   the job training  which is where you are likely to learn how to mount wireless LAN  antennas using various types of mounting hardware  Each type of mount will come with  instructions from the manufacturer on how to install and secure it  There are many  different variations of each mount type because manufacturers each have their own way  of designing the mounting kit     Some things to keep in mind when mounting antennas are       Many times the brackets shipped with the antenna may not work for a particular  situation  Modifying brackets or building custom brackets may be necessary        Do not hang an antenna by its cable and make sure the mounting is solid and  secure  The cable can break and cable sway can produce a moving cell       Exactly how the antenna is to be mounting should be specified for each antenna  in the site survey report    Mounting Aesthetics    Antennas are usually unsightly and should be hidden  Some manufacturers make ceiling  panel antennas  When aesthetics are important  patch or panel antennas might be used  rather than omni antennas  If possible  antennas should be hidden to avoid damage by  children and also by adults who purposefully seek to damage the gear     Appropriate Use    Use indoor antennas inside of buildings and outdoor anten
406. ower  EIRP     FIGURE 2 13    EIRP is the power actually radiated by the antenna element  as shown in Figure 2 13   This concept is important because it is regulated by the FCC and because it is used in  calculating whether or not a wireless link is viable  EIRP takes into account the gain of  the antenna        EIRP  cable  Bridge connector  connector  cable antenna  Sf      connector T RF Beam  AN KK 7  EIRP     output power     Suppose a transmitting station uses a 10 dBi antenna  which amplifies the signal 10 fold   and is fed by 100 milliwatts from the intentional radiator  The EIRP is 1000 mW  or 1  Watt  The FCC has rules defining both the power output at the intentional radiator and  the antenna element        Ak    Failure to comply with FCC rules regarding power output can subject the administrator  or the organization  or both  to legal action and fines     Radio Frequency Mathematics    There are four important areas of power calculation in a wireless LAN  These areas are       Power at the transmitting device      Loss and gain of connectivity devices between the transmitting device and the  antenna   such as cables  connectors  amplifiers  attenuators  and splitters      Power at the last connector before the RF signal enters the antenna  Intentional  Radiator     30 Chapter 2     RF Fundamentals      Power at the antenna element  EIRP     These areas will be discussed in calculation examples in forthcoming sections  Each of  these areas will help to determine w
407. ower Save Polling  PSP Mode in a Basic Service Set  PSP in an Independent Basic Service Set  Key Terms  Review Questions  Answers to Review Questions  MAC and Physical Layers  How Wireless LANs Communicate  Wireless LAN Frames vs  Ethernet Frames  Collision Handling  Fragmentation  Dynamic Rate Shifting  DRS   Distributed Coordination Function  Point Coordination Function  The PCF Process  Interframe Spacing  Three Types of Spacing  Short Interframe Space  SIFS   Point Coordination Function Interframe Space  PIFS   Distributed Coordination Function Interframe Space  DIFS   Slot Times  The Communications Process  Request to Send Clear to Send  RTS CTS   Configuring RTS CTS  Modulation  Key Terms  Review Questions  Answers to Review Questions  Troubleshooting Wireless LAN  Installations  Multipath  Effects of Multipath  Decreased Signal Amplitude  Corruption  Nulling  Increased Signal Amplitude  Troubleshooting Multipath  Solutions for Multipath  Hidden Node  Troubleshooting Hidden Node  Solutions for Hidden Node  Use RTS CTS  Increase Power to the Nodes  Remove Obstacles  Move the Node  Near Far  Troubleshooting Near Far  Solutions for Near Far  System Throughput    199  199  199  200  201  203  204  208  211  212  212  214  214  215  216  216  217  217  217  218  219  219  220  220  223  224  225  227  228  232  235    236  237  237  237  238  239  240  241  242  243  244  244  245  245  245  245  246  247  247    Co location Throughput  Theory vs  Reality   Theory  What Shou
408. ower and are located relatively close to each other  So  instead of  getting normal half duplex throughput on all access points  a detrimental effect is seen on  all three  Throughput can decrease to 4 Mbps or less on all three access points or may be  unevenly distributed where the access points might have 3  4  and 5 Mbps respectively     DSSS channel overlap    Channel Channel Channel  1 6 11       The portion of the theory that holds true is that adjacent channels  1  2  3  4  and 5  for  example  have significant overlap  to the point that using an access point on channel 1  and another on channel 3  for example  results in even lower throughput  2Mbps or less   on the two access points  In this case  in particular  a partial overlapping of channels  occurs  It is typically seen that a full overlap results in better throughput for the two  systems than does a partial overlap between systems     All this discussion is not to say that you simply cannot co locate three access points using  channels 1  6  and 11  Rather  it is to point out that when you do so  you should not  expect the theory to hold completely true  You will experience degraded throughput that  is significantly less than the normally expected rate of approximately 5 Mbps per access  point unless care is taken to turn down the output power and spread the access points  across a broader amount of physical space     Chapter 9  Troubleshooting Wireless LAN Installations 251            If you do co locate three
409. owing hypothetical situation  Suppose a hospital had implemented 40 access points  across several floors of their building  Their investment in access points is fairly  significant at this point  so if the access points do not support scalable security measures   the hospital could be in the predicament of having to replace all of their access points   Instead  the hospital could employ a wireless LAN gateway     290 Chapter 10     Wireless LAN Security    This gateway can be connected between the core switch and the distribution switch   which connects to the access points  and can act as an authentication and VPN server  through which all wireless LAN clients can connect  Instead of deploying all new access  points  one  or more depending on network load  gateway device can be installed behind  all of the access points as a group  Use of this type of gateway provides security on behalf  of a non security aware access point  Most enterprise wireless gateways support an array  of VPN protocols such as PPTP  IPsec  L2TP  certificates  and even QoS based on  profiles     802 1x and Extensible Authentication Protocol    The 802 1x standard provides specifications for port based network access control  Port   based access control was originally     and still is     used with Ethernet switches  When a  user attempts to connect to the Ethernet port  the port then places the user s connection in  blocked mode awaiting verification of the user s identity with a backend authentication
410. oximately 5 0   5 5  Mbps on a typical 802 11b wireless LAN rated at 11 Mbps  CSMA CD also generates  overhead  but only about 30  on an average use network  When an Ethernet network  becomes congested  CSMA CD can cause overhead of up to 70   while a congested  wireless network remains somewhat constant at around 50   55  throughput     The CSMA CA protocol avoids the probability of collisions among stations sharing the  medium by using a random back off time if the station s physical or logical sensing  mechanism indicates a busy medium  The period of time immediately following a busy  medium is when the highest probability of collisions occurs  especially under high  utilization  At this point in time  many stations may be waiting for the medium to  become idle and will attempt to transmit at the same time  Once the medium is idle  a  random back off time defers a station from transmitting a frame  minimizing the chance  that stations will collide     Fragmentation    Fragmentation of packets into shorter fragments adds protocol overhead and reduces  protocol efficiency  decreases network throughput  when no errors are observed  but  reduces the time spent on re transmissions if errors occur  Larger packets have a higher  probability of collisions on the network  hence  a method of varying packet fragment size  is needed  The IEEE 802 11 standard provides support for fragmentation     By decreasing the length of each packet  the probability of interference during packet  t
411. p each other because each channel  is 22 MHz wide and their center frequencies are only 5 MHz apart  Adjacent channel  interference happens when two or more access points using overlapping channels are  located near enough to each other that their coverage cells physically overlap  Adjacent  channel interference can severely degrade throughput in a wireless LAN     It is especially important to pay attention to adjacent channel interference when co   locating access points in an attempt to achieve higher throughput in a given area  Co   located access points on non overlapping channels can experience adjacent channel  interference if there is not enough separation between the channels being used  as  illustrated in Figure 9 16     Adjacent channel Interference    Adjacent Channel  P Interference    Channel Channel  1 3       2 401 GHz    In order to find the problem of adjacent channel interference  a spectrum analyzer will be  needed  The spectrum analyzer will show you a picture of how the channels being used  overlap each other  Using the spectrum analyzer in the same physical area as the access  points will show the channels overlapping each other     There are only two solutions for a problem with adjacent channel interference  The first  is to move access points on adjacent channels far enough away from each other that their  cells do not overlap  or turn the power down on each access point enough to where the  cells do not overlap  The second solution is to use only ch
412. p up with the technology  Many new solutions   both for seamless connectivity and for security  are released each week  There are new  solutions that are designed each month and before you can blink  there are 3 or 4  companies producing products supporting these new technologies  This book will be  kept up to date as the wireless industry progresses so that the reader always knows that  they are receiving the latest information     While our program was still in its infancy  we were privileged to have some industry  experts take part in our testing  We found out very quickly that their status of  expert   was in question  There is such a broad base of knowledge required to be a wireless  expert that it will likely feel overwhelming at times  As you will soon see  this book is  geared toward the beginner and intermediate reader alike  We hope that it will take you  further than you had expected to go when you first picked it up  and we hope that it will  open your eyes to a wonderful new field of study     RF Experienced    Some of you may have worked with RF for years  perhaps in the military  and have  moved into the networking industry  Your knowledge and experience is right on track  with the evolution of wireless LAN technology  but you have probably never measured  your knowledge of these two technologies by taking a certification exam  This  measurement is the purpose of the CWNA certification exam  Fields of study like  Electrical Engineering  RF Metrology  Satellite 
413. pair   security and integration of 802 11 compliant wireless LANs    Copyright    2002 Planet3 Wireless  Inc   P O  Box 412  Bremen Georgia 30110  World rights reserved  No part of  this publication may be stored in any retrieval system  transmitted  or reproduced in any way  including but not  limited to photocopying  photographing  magnetic  electronic  or other record  without the prior written agreement  and written permission of Planet3 Wireless  Inc     ISBN  0 9716057 3 4  Version  AY Y34F9532    CNWP  CWNA  CWNI  CWSE  CWSP  CWNE  CWAP  CWEC  Wi School  and their respective logos are  trademarks of Planet3 Wireless  Inc  in the United States and or other countries     This study guide and reference manual are not sponsored by or affiliated with any wireless LAN manufacturer   including those mentioned in the text and in the lab exercise notes     TRADEMARKS  Planet3 Wireless  Inc  has attempted throughout this book to distinguish proprietary trademarks  from descriptive terms by following the capitalization style used by the manufacturers  The author and publisher  have made their best efforts to prepare this book  and the content is based upon final release software whenever  possible  Portions of the manuscript may be based on pre release versions supplied by software manufactures  The  author and publisher make no representation or warranties of any kind with regard to the completeness or accuracy  of the contents herein and accept no liability of any kind includin
414. ping the wireless network secure  Consider if a very elaborate  and  expensive  wireless network solution were put in place with state of the art security  and   since coverage did not extend to a particular area of the building  a user took it into their  own hands to install an additional  unauthorized access point in their work area  In this  case  this user has just provided a hacker with the necessary route into the network   completely circumventing a very good  and expensive  wireless LAN security solution     Inventories and security audits should be well documented in the corporate security  policy  The types of procedures to be performed  the tools to be used  and the reports to  be generated should all be clearly spelled out as part of the corporate policy so that this  tedious task does not get overlooked  Managers should expect a report of this type on a  regular basis from the network administrator     294 Chapter 10     Wireless LAN Security    Using Advanced Security Solutions    Organizations implementing wireless LANs should take advantage of some of the more  advanced security mechanisms available on the market today  It should also be required  in a security policy that the implementation of any such advanced security mechanism be  thoroughly documented  Because these technologies are new  proprietary  and often used  in combination with other security protocols or technologies  they must be documented  so that  if a security breach occurs  network adminis
415. pped  together  or put into a single  portable enclosure  There are companies that have pieced  together such a  kit  for the sole purpose of making site surveying easier  Many times  the access point will be placed on a ladder or on top of the ceiling tiles while the antenna  is temporarily mounted to a wall  Having completely portable gear with no need for AC  power makes the site survey go much faster than it would otherwise        Mobile access points mounted to battery packs and DC to AC converters may tend to  look like some sort of dangerous device  and may be confiscated at airports  Make  sure you disclose to all security  airports  and otherwise  exactly what this configuration  is  and what it is for  Placing such devices in a hard shell travel case and checking the  case is likely a better scenario than having it as a carry on item     PC Card and Utilities    High quality wireless pc cards will come with site survey utility software  as shown in  Figure 11 6  The site survey utilities from the different manufacturers will vary in their  functionality  but most offer a link speed indicator and signal strength meter at a  minimum  These two tools will provide general indications of coverage  To perform a  quality site survey  the following actual quantitative measurements should be recorded       Signal strength  measured in dBm     Noise floor  measured in dBm        Signal to noise ratio     SNR      measured in dB     Link speed    Only a few vendors offer this 
416. ptop computer   s files  These vulnerable users  are considered    low hanging fruit     meaning that they are easy to hack because of their  general unfamiliarity with leading edge technology such as wireless LANs     Limited and Tracked Access    Most enterprise LANs have some method of limiting and tracking a user   s access on the  LAN  Typically  a system supporting Authentication  Authorization  and Accounting   AAA  services is deployed  This same security measure should be documented and  implemented as part of wireless LAN security  AAA services will allow the organization  to assign use rights to particular classes of users  Visitors  for example  might be allowed  only Internet access whereas employees would be allowed to access their particular  department   s servers and the Internet     Keeping logs of users    rights and the activities they performed while using your network  can prove valuable if there   s ever a question of who did what on the network  Consider if  a user was on vacation  yet during the vacation the user   s account was used almost every  day  Keeping logs of activity such as this will give the administrator insight into what is    Chapter 10     Wireless LAN Security 295    really happening on the LAN  Using the same example  and knowing that the user was  on vacation  the administrator could begin looking for where the masquerading user was  connecting to the network     Security Recommendations    WEP    As a summary to this chapter  below
417. r   10BaseTx   IEEE standard for 10 Mbps baseband Ethernet over twisted pair wire   100BaseTx   IEEE standard for a 100 Mbps baseband Ethernet over twisted pair wire     5 Unified Protocol  5 UP         a standard proposed by Atheros Communications to  enhance the features of 802 11a and HiperLAN 2 into one interoperable standard    802 1d     See Spanning Tree Protocol  802 1x     wireless LAN security implementation meant to increase security in user  authentication by using RADIUS  Extensible Authentication Protocol  EAP   and LDAP    for port based authentication between an operating system and the network access device    802 2   IEEE standard that specifies the Logical Link Control  LLC  that is common to  all 802 series LANs    802 3   IEEE standard that specifies a carrier sense medium access control and physical  layer specifications for wired LANs     802 5   IEEE standard that specifies a token passing ring access method and physical  layer specifications for wired LANs     802 11   IEEE standard that specifies medium access and physical layer specifications for  1 Mbps and 2 Mbps wireless connectivity between fixed  portable  and moving stations  within a local area    10BaseFx   IEEE standard for 10 Mbps baseband Ethernet over optical fiber     10BaseTx   IEEE standard for 10 Mbps baseband Ethernet over twisted pair wire     5 Unified Protocol  5 UP         a standard proposed by Atheros Communications to  enhance the features of 802 11a and HiperLAN 2 into one i
418. r manufacturers of RF cable used with wireless LANs  Those are  Andrew  Times Microwave  and Belden  Andrew s Heliax cable  Times Microwave s  LMR  and Belden s RF series are all popular in the wireless LAN industry  LMR cable  has become somewhat of an industry standard in the same way Xerox became known  for copiers  Sometimes the term  LMR  is used in place of  RF cable  in the same way     Xerox    is used in place of    copy        RF    Pigtail    Adapter Cable    FIGURE 5 33    Pigtail adapter cables are used to connect cables that have industry standard connectors to  manufacturer   s wireless LAN equipment  Pigtails are used to adapt proprietary  connectors to industry standard connectors like N type and SMA connectors  One end of  the pigtail cable is the proprietary connector while the other end is the industry standard  connector  Figure 5 33 shows an example of a pigtail cable     Sample RF Pigtail adapter    The DOC and FCC  United States Federal Communications Commission  ruling of June  23  1994  stated that connectors manufactured after June 23  1994 must be manufactured  as proprietary antenna connectors  The 1994 rule was intended to discourage use of  amplifiers  high gain antennas  or other means of increasing RF radiation significantly   The rules are further intended to discourage    home brew    systems which are installed by  inexperienced users and which   either accidentally or intentionally   do not comply with  FCC regulations for use in the ISM b
419. r of  24 dBm  30 dBm     6 dB   or 250 mW and an EIRP of  36 dBm  24 dBm   12 dBi   or 4 Watts  Clearly this rule can become confusing  but the  end result must be that the power at the intentional radiator must never be more than 1  Watt  see Figure 6 2   and the EIRP must never be above 4 Watts for a PtMP connection     Point to Multipoint Power Limit Table                               Power at Antenna Antenna Gain EIRP EIRP   dBm   dBi   dBm   watts   30 6 36 4  27 9 36 4  24 12 36 4  21 15 36 4  18 18 36 4  15 21 36 4  12 24 36 4                      g    The specific information contained in Figure 6 2 is not covered on the CWNA exam   The information is provided as a resource for your administrative tasks     When using an omnidirectional antenna  the rules for point to multipoint links must be  followed  regardless of whether the actual implementation is point to point or point to   multipoint     Point to Point  PtP     PtP links include a single directional transmitting antenna and a single directional  receiving antenna  These connections will typically include building to building or  similar links and must abide by special rules  When installing a 2 4 GHz PtP link  the 4  Watt power limit all but disappears in favor of a sliding power limit  Regarding a PtP  link  the FCC mandates that for every 3 dBi above the initial 6 dBi of antenna gain  the  power at the intentional radiator must be reduced by 1 dB from the initial  30 dBm     Consider our previous example  
420. r of the far node    264 Chapter 9  Troubleshooting Wireless LAN Installations    10     Which of the following channels on three co located access points will result in the  greatest co channel interference     A     B  C   D    1 1 1  1  2 3  1  6  11  1 11    Which one of the following can cause all band interference     A     B  C   D    Metal roof  Lake  Bluetooth  HiperLAN    Why are most access points built with two antennas     A     Q    Access points are half duplex devices that send on one antenna and receive on  the other    Access points use one antenna as a standby for reliability  Access points use two antennas to overcome multipath    Access points use two antennas to transmit on two different channels    Using RTS CTS can solve the hidden node problem and will not affect network    throughput   A  This statement is always true   B  This statement is always false   C  Depends on the manufacturer   s equipment    Which of the following can cause RF interference in a wireless LAN  Choose all    that apply    A  Wind   B  Lightning  C  Smog   D  Clouds    11     12     13     14     15     Chapter 9  Troubleshooting Wireless LAN Installations 265    Multipath is defined as which one of the following     A  The negative effects induced on a wireless LAN by reflected RF signals  arriving at the receiver along with the main signal     B  Surges in signal strength due to an RF signal taking multiple paths between the  sending and receiving stations    C  The conditio
421. radio waves as they are transmitted     Gain    Gain  illustrated in Figure 2 2  is the term used to describe an increase in an RF signal s  amplitude  Gain is usually an active process  meaning that an external power source   such as an RF amplifier  is used to amplify the signal or a high gain antenna is used to  focus the beamwidth of a signal to increase its signal amplitude     Power Gain  Gain as seen by an Gain of DSSS as seen by a  Oscilloscope spectrum analyzer    Peak Amplitude after Gain  ad    Peak Amplitude before Gain       However  passive processes can also cause gain  For example  reflected RF signals can  combine with the main signal to increase the main signal s strength  Increasing the RF  signal s strength may have a positive or a negative result  Typically  more power is  better  but there are cases  such as when a transmitter is radiating power very close to the  legal power output limit  where added power would be a serious problem     Loss    Loss describes a decrease in signal strength  Figure 2 3   Many things can cause RF  signal loss  both while the signal is still in the cable as a high frequency AC electrical  signal and when the signal is propagated as radio waves through the air by the antenna   Resistance of cables and connectors causes loss due to the converting of the AC signal to  heat  Impedance mismatches in the cables and connectors can cause power to be  reflected back toward the source  which can cause signal degradation  Objects dire
422. rage Areas  Throughput  Interference  Problem Areas  Drawings  Hardware placement  amp  configuration information  Additional Reporting  Key Terms  Review Questions  Answers to Review Questions  RF in Perspective  RF in Perspective  Radio acts like light  Light bulb analogy  Transmit Range Tests  Receive range tests  Obstacles  Fresnel Zone  Increasing power at the tower  Reflection  RF Summary  Glossary    Contents xv    339  339  340  340  340  340  340  340  341  341  342  344  345  350  353  354  354  354  354  355  356  356  357  357  357  359    xvi    Introduction    Introduction    This Official CWNA Study Guide is intended first to help prepare you to install  manage   and support wireless networks  and second to prepare you to take and pass the CWNA  certification exam  As part of the CWNP Training and Certification program  the CWNA  certification picks up where other popular networking certification programs leave off   wireless LANs     Your study of wireless networking will help you bring together two fascinating worlds of  technology  because wireless networks are the culmination of Radio Frequency  RF  and  networking technologies  No study of wireless LANs would be complete without first  making sure the student understands the foundations of both RF and local area  networking fundamentals     For that reason  we recommend that you obtain a basic level of networking knowledge  as  exhibited in the CompTIA Network   certification  If you have achieved other  c
423. ral  hub  building  and semi directional antennas on each of the outlying  spoke  buildings  Antennas will  be covered in greater detail in Chapter 5        There are many ways to implement these two basic types of connectivity  as you will  undoubtedly see over the course of your career as a wireless LAN administrator or  consultant  However  no matter how the implementations vary  they all fall into one of  these two categories     Last Mile Data Delivery    Wireless Internet Service Providers  WISPs  are now taking advantage of recent  advancements in wireless technology to offer last mile data delivery service to their  customers   Last mile  refers to the communication infrastructure   wired or wireless     that exists between the central office of the telecommunications company  telco  or cable  company and the end user  Currently the telcos and cable companies own their last mile  infrastructure  but with the broadening interest in wireless technology  WISPs are now  creating their own wireless last mile delivery service  as illustrated in Figure 1 4     Chapter 1   Introduction to Wireless LANs 7    FIGURE 1 4 Last Mile Service       WISP  Owned Remote  Tower Residence    Consider the case where both the cable companies and telcos are encountering difficulties  expanding their networks to offer broadband connections to more households or  businesses  If you live in a rural area  chances are you do not have access to a broadband  connection  cable modem or xDSL   and p
424. rames     214 Chapter 8     MAC and Physical Layers    Collision Handling    Since radio frequency is a shared medium  wireless LANs have to deal with the  possibility of collisions just the same as traditional wired LANs do  The difference is  that  on a wireless LAN  there is no means through which the sending station can  determine that there has actually been a collision  It is impossible to detect a collision on  a wireless LAN  For this reason  wireless LANs utilize the Carrier Sense Multiple  Access   Collision Avoidance protocol  also known as CSMA CA  CSMA CA is  somewhat similar to the protocol CSMA CD  which is common on Ethernet networks     The biggest difference between CSMA CA and CSMA CD is that CSMA CA avoids  collisions and uses positive acknowledgements  ACKs  instead of arbitrating use of the  medium when collisions occur  The use of acknowledgements  or ACKs  works in a very  simple manner  When a wireless station sends a packet  the receiving station sends back  an ACK once that station actually receives the packet  If the sending station does not  receive an ACK  the sending station assumes there was a collision and resends the data     CSMA CA  added to the large amount of control data used in wireless LANs  causes  overhead that uses approximately 50  of the available bandwidth on a wireless LAN   This overhead  plus the additional overhead of protocols such as RTS CTS that enhance  collision avoidance  is responsible for the actual throughput of appr
425. ransmission can be reduced  as illustrated in Figure 8 1  There is a tradeoff that must be  made between the lower packet error rate that can be achieved by using shorter packets   and the increased overhead of more frames on the network due to fragmentation  Each  fragment requires its own headers and ACK  so the adjustment of the fragmentation level  is also an adjustment of the amount of overhead associated with each packet transmitted     FIGURE 8 1    Chapter 8     MAC and Physical Layers 215    Stations never fragment multicast and broadcast frames  but rather only unicast frames in  order not to introduce unnecessary overhead into the network  Finding the optimal  fragmentation setting to maximize the network throughput on an 802 11 network is an  important part of administering a wireless LAN  Keep in mind that a 1518 byte frame is  the largest frame that can traverse a wireless LAN segment without fragmentation     Fragmentation    1  Increased chance of collision   lt  lt  header       gt  2  Less overhead            Data 2       1  Decreased chance of collision    FCS 2  More overhead                One way to use fragmentation to improve network throughput in times of heavy packet  errors is to monitor the packet error rate on the network and adjust the fragmentation  level manually  As a recommended practice  you should monitor the network at multiple  times throughout a typical day to see what impact fragmentation adjustment will have at  various times  Another 
426. rding to the 802 11 standard     A  Exportable   B  Reasonably Strong   C  Self Synchronizing   D  Computationally Efficient  E  Mandatory    Centralized encryption key servers should be used if possible  Which one of the  following reasons would NOT be a good reason to implement centralized encryption  key servers     A  Centralized key generation  Centralized key distribution  Centralized key coding and encryption    On going key rotation    moo    Reduced key management overhead    Typical key rotation options implemented by various manufacturers for encryption  key generation include which of the following  Choose all that apply     A   Per packet   B  Per session   C   Per user   D   Per broadcast  E    Per frame    A WEP key using a 40 bit secret key concatenated with the initialization vector to  form the WEP key  creates what level of encryption     A  24 bit  B  40 bit  C  64 bit  D  128 bit    Chapter 10     Wireless LAN Security 301    Which piece of information on a wireless LAN is encrypted with WEP enabled   A  The data payload of the frame   B  The MAC addresses of the frame   C  Beacon management frames  D     Shared Key challenge plaintext    AES uses which one of the following encryption algorithms     A  Fresnel  B  NAV   C  Rijndale  D  Rinehart    What are the three types of filtering that can be performed on a wireless LAN   A  SSID filtering    MAC address filtering  C  Protocol filtering  D  802 11 standard filtering  E  Manufacturer hardware filtering
427. re Devices    10     11     12     13     14     15     16     17     18     19     C  Wireless ISA devices do not support plug n play functionality  and therefore  require manual configuration  Legacy 9 pin serial wireless client devices likewise  do not support plug n play configuration  PCI  PCMCIA  CF  and USB devices  support plug n play     B  C  With a PCI card  the desktop computer would be able to accept the PCMCIA  card  The PCMCIA card can be inserted directly into the laptop computer   Likewise the USB adapter can be connected to either computer  and the PCMCIA  card can be inserted into the PCMCIA adapter     B  D  E  If output power is only high enough to allow company personnel to attach  to the network  but not passers by  then the network is likely more secure  Setting  WEP keys and MAC filters before deployment is a very good idea for small wireless  networks     B  D  E  Port Address Translation is a many to one configuration variance of  Network Address Translation  Using private IP addresses in the corporate  environment and using public IP addresses on the Internet connection allows a  degree of security for corporate users  Likewise  VPN client or VPN client  passthrough functionality allows SOHO users to connect to a corporate VPN server  over the Internet using a secure tunnel  Virtual servers must be manually configured  by the administrator to direct packets to a particular server  This type of manual  control allows the administrator to keep the in
428. re backward compatible and support both 2 and 1 Mbps data  rates  Backward compatibility is very important because it allows a wireless LAN to be  upgraded without the cost of replacing the core hardware  This low cost feature  together  with the high data rate  has made the 802 11b compliant hardware very popular     The high data rate of 802 11b compliant devices is the result of using a different coding  technique  Though the system is still a direct sequencing system  the way the chips are  coded  CCK rather than Barker Code  along with the way the information is modulated   QPSK at 2  5 5   amp  11 Mbps and BPSK at 1 Mbps  allows for a greater amount of data to  be transferred in the same time frame  802 11b compliant products operate only in the  2 4 GHz ISM band between 2 4000 and 2 4835 GHz  Modulation and coding are further  discussed in Chapter 8  MAC  amp  Physical Layers      IEEE 802 11a    The IEEE 802 11a standard describes wireless LAN device operation in the 5 GHz UNII  bands  Operation in the UNII bands automatically makes 802 11a devices incompatible  with all other devices complying with the other 802 11 series of standards  The reason  for this incompatibility is simple  systems using 5 GHz frequencies will not communicate  with systems using 2 4 GHz frequencies     Using the UNII bands  most devices are able to achieve data rates of 6  9  12  18  24  36   48  and 54 Mbps  Some of the devices employing the UNII bands have achieved data  rates of 108 Mbps 
429. re established  The standard attempts to  ensure minimum disruption to data delivery  and provides some features for caching and  forwarding messages between BSSs     Particular implementations of some higher layer protocols such as TCP IP may be less  tolerant  For example  in a network where DHCP is used to assign IP addresses  a  roaming node may lose its connection when it moves across cell boundaries  The node  will then have to re establish the connection when it enters the next BSS or cell   Software solutions are available to address this particular problem     One such solution is Mobile IP  Mobile IP is an Internet Engineering Task Force  IETF   Request for Comment  RFC    2002  that was documented for the purpose of explaining  how to best have mobile users stay connected to the Internet while moving between  connection points  This is accomplished by use of home agents and foreign agents   These two work together to assure that traffic destined to a mobile node reaches the node  no matter where it is connected  A home agent or foreign agent can be a computer  a  router  or other similar device that is capable of running the Mobile IP protocol  There  are some caveats in many Mobile IP solutions that should be briefly addressed in this text  so that the user understands what to look for in a Mobile IP solution     First  Mobile IP does not allow mobile devices and mobility agents on the network to  share state information about each session that a mobile device has
430. re of the conductors have come in contact with each other  or another conducting material     During any fault condition  the fault protection circuit shuts off the DC voltage injected  onto the cable  Fault protection circuit operation varies from model to model  Some  models continuously monitor the cable and restore power automatically once the fault is  removed  Some models must be manually reset by pressing a reset button or cycling  power     Wireless LAN Accessories    When the time comes to connect all of your wireless LAN devices together  you will  need to purchase the appropriate cables and accessories that will maximize your  throughput  minimize your signal loss  and  most importantly  allow you to make the  connections correctly  This section will discuss the different types of accessories and  where they fit into a wireless LAN design  The following types of accessories are  discussed in this section       RF Amplifiers     RF Attenuators     Lightning Arrestors    RF Connectors      RF Cables     RF Splitters    Each of these devices is important to building a successful wireless LAN  Some items  are used more than others  and some items are mandatory whereas others are optional  It  is likely that an administrator will have to install and use all of these items multiple times  while implementing and managing a wireless LAN     Chapter 5     Antennas and Accessories 127    RF Amplifiers    FIGURE 5 22    As its name suggests  an RF amplifier is used to amplify
431. rea  RF theory  combined  with FCC regulations  allows wireless LAN users in the United States three non   overlapping RF channels  1  6  and 11   These 3 channels can be used to co locate  multiple  3  access points within the same physical area using 802 11b equipment  as can  be seen in Figure 9 9     FIGURE 9 9    Chapter 9  Troubleshooting Wireless LAN Installations 249    Co location Throughput    Channel 1    D    Channel 6 Channel 11    D     gt     When co locating multiple access points  it is highly recommended that you     1  Use the same Spread Spectrum technology  either Direct Sequence or Frequency  Hopping  but not both  for all access points    2  Use the same vendor for all access points       Theory     Several vendors    access point configurations allow you to load balance  either  automatically or manually  If this feature is available  it is recommended to use it     The portion of the 2 4 GHz ISM band that is useable for wireless LANs consists of 83 5  MHz  DSSS channels are 22 MHz wide  and there are 11 channels specified for use in  the United States  These channels are specifically designated ranges of frequencies  within the ISM band  According to the center frequency and width given to each of these  channels by the FCC  only three non overlapping channels can exist in this band  Co   location of access points using non overlapping channels in the same physical space has  advantages in implementing wireless LANs  so we will first explain what shou
432. receiving station    SIFS provide the highest level of priority on a wireless LAN  The reason for SIFS  having the highest priority is that stations constantly listen to the medium  carrier sense   awaiting a clear medium  Once the medium is clear  each station must wait a given  amount of time  spacing  before proceeding with a transmission  The length of time a  station must wait is determined by the function the station needs to perform  Each  function on a wireless network falls into a spacing category  Tasks that are high priority  fall into the SIFS category  Ifa station only has to wait a short period of time after the  medium is clear to begin its transmissions  it would have priority over stations having to    Chapter 8     MAC and Physical Layers 219    wait longer periods of time  SIFS is used for functions requiring a very short period of  time  yet needing high priority in order to accomplish the goal     Point Coordination Function Interframe Space  PIFS     A PIFS interframe space is neither the shortest nor longest fixed interframe space  so it  gets more priority than DIFS and less than SIFS  Access points use a PIFS interframe  space only when the network is in point coordination function mode  which is manually  configured by the administrator  PIFS are shorter in duration than DIFS  see Figure 8 3    so the access point will always win control of the medium before other contending  stations in distributed coordination function  DCF  mode  PCF only works wi
433. rement for gain as related to an RF antenna     A  B  C   D  E    Decibels  Watts  dBi  dBm   dB    Which one of the following defines Free Space Path Loss     A   B   C     D     The loss incurred by an RF signal whose path has crossed a large free space  What occurs as an RF signal is deflected off of its intended path into free space    The loss incurred by an RF signal due largely to  signal dispersion  which is a  natural broadening of the wave front    The weakening of the RF signal propagation due to an infinite amount of free  space    Which of the following are variations of the  N type  connector     A   B   C     Standard N type  Reverse threaded N type  Reverse polarity N type  Dual head N type    150 Chapter 5     Antennas and Accessories    Answers to Review Questions    1  B  Inan open area where maximum user coverage is required  using a low gain  omni antenna makes practical and economic sense  Warehouses typically have high  ceilings  so use of a high gain omni might not be effective for users below the  antenna  Mounting the antenna near the center of the intended coverage area in an  out of the way place like the ceiling is most effective     2  A B  D  Making sure the connector you choose has the right impedance for your  system  has a low insertion loss  and supports frequencies at least as high as the  circuit with which you ll be using it are critical  There is a vast range of quality in  connector choices where seemingly the same connector might cost 
434. rence experienced between systems using  the same channel  In this question  only answer  A  meets the criteria of all access  points being on the same channel     7  C  All band interference is interference that spans the width of the frequency band  in use  This type of interference cannot be avoided by a wireless LAN system   leaving the administrator one option  a different frequency band must be used  which  often means use of a different set of wireless LAN technologies  Bluetooth spans  the width of the 2 4 GHz ISM band disrupting 802 11  802 11b  and 802 11g data  transmissions     8  C  Access points use two antennas in order to implement antenna diversity to  overcome multipath  The radios used in wireless LANs are half duplex meaning  they can either transmit or receive at any given time  Multipath is an effect caused  by reflected RF waves and can disrupt or corrupt data transmissions  Access points  sample inputs from both antennas and use the best signal  Access points normally  transmit on the antenna last used for receiving     9  B  Use of the RTS CTS protocol always adds overhead to the network  decreasing  throughput  Use of the RTS CTS protocol  when used appropriately  can help  reduce a high rate of collisions on a wireless network  but does not solve the hidden  node problem  Solving the hidden node problem would consist of all nodes being  able to hear one another   s transmissions     268 Chapter 9    Troubleshooting Wireless LAN Installations    10  
435. rence guide for beamwidths        Antenna Type    Horizontal Beamwidth   in degrees     Vertical Beamwidth   in degrees        Omni directional    360    Ranges from 7 80       Patch Panel    Ranges from 30 180    Ranges from 6 90       Yagi    Ranges from 30 78    Ranges from 14 64       Parabolic Dish    Ranges from 4 25    Ranges from 4 21                   Selecting an antenna with appropriately wide or narrow beamwidths is essential in having  the desired RF coverage pattern  For example  imagine a long hallway in a hospital   There are rooms on both sides of the hallway  and instead of using several access points  with omni antennas  you have decided to use a single access point with a semi directional  antenna such as a patch antenna     The access point and patch antenna are placed at one end of the hallway facing down the  hallway  For complete coverage on the floors directly above and below this floor a patch  antenna could be chosen with a significantly large vertical beamwidth such as 60 90  degrees  After some testing  you may find that your selection of a patch antenna with 80  degrees vertical beamwidth does the job well     Now the horizontal beamwidth needed must be decided on  Due to the length of the  hallway  testing may reveal a high gain patch antenna must be used in order to have  adequate signal coverage at the opposite end  Having this high gain  the patch antenna s  horizontal beamwidths are significantly narrowed such that the rooms on each side of 
436. repeater configuration  a bridge will be positioned between two other bridges for the  purpose of extending the length of the wireless bridged segment  While using a wireless  bridge in this configuration has the advantage of extending the link  it has the  disadvantage of decreased throughput due to having to repeat all frames using the same  half duplex radio  Repeater bridges are non root bridges  and many times the wired port  will be disabled while the bridge is in repeater mode     Chapter 4     Wireless LAN Infrastructure Devices 83    FIGURE 4 10 A wireless bridge in repeater mode         way    Server    Bridge   repeater        9       Bridge     root mode        PC         Bridge   non root     Common Options    The hardware and software options of a wireless bridge are similar to those of an access  point  and for many of the same purposes     Fixed or Detachable Antennas  Advanced Filtering Capabilities  Removable  Modular  Radio Cards  Variable Output Power   Varied Types of Wired Connectivity    Fixed or Detachable Antennas    Wireless bridge antennas may be fixed or detachable and may come with or without  diversity  Many times  diversity is not considered when configuring a wireless bridge  because both bridges  one at each end of the link  will be static  and the environment  around the wireless bridges tends not to change very often  For these reasons  multipath  is typically not as much of a concern as it is with access points and mobile users     Detachab
437. resent   A  This statement is always true  B  This statement is always false    C  It depends on the specific factors    What unit of measurement is used to quantify the power gain or loss of an RF  signal  Choose all that apply     A  dBi   B  dBm  C  Watts  D  dB    Using which of the following will reduce VSWR  Choose all that apply    A  Cables and connectors that all have an impedance of 50 Ohms   B  Cables with a 50 Ohm impedance and connectors with 75 Ohm impedance  C  Cables and connectors that all have an impedance of 75 Ohms  D     Cables with 75 Ohm impedance and connectors with 50 Ohm impedance    In an RF circuit  what is the intentional radiator defined as    A  The output of the transmitting device   B  The output of the last connector before the signal enters the antenna  C  The output as measured after the antenna    D  The output after the first length of cable attached to the transmitting device    Chapter 2     RF Fundamentals 39    dBi is a relative measurement of decibels to which one of the following     A   B   C   D     Internet  Intentional radiator  Isotropic radiator    Isotropic radio    Which one of the following is considered impedance in an RF circuit     A     B  C   D    The inability to transmit RF signals  The pressure that causes current flow  Resistance to current flow  measured in Ohms    The frequency on which an RF transmitter sends signals    In RF mathematics  1 watt equals what measurement of dBm     A     moo    1   3  10  30  100 
438. residential gateway  while Figure 4 18  illustrates where a wireless residential gateway is used on a wireless LAN     FIGURE 4 17 A sample wireless residential gateway       FIGURE 4 18 A wireless residential gateway installed on a network    Wireless  Cable DSL Residential  Modem Gateway    eo e     3     Because wireless residential gateways are becoming increasingly popular in homes of  telecommuters and in small businesses  manufacturers have begun adding more features  to these devices to aid in productivity and security  Common options that most wireless  residential gateways include are     Common Options      Point to Point Protocol over Ethernet  PPPoE     Network Address Translation  NAT     Port Address Translation  PAT     Chapter 4     Wireless LAN Infrastructure Devices 93      Ethernet switching     Virtual Servers     Print Serving      Fail over routing     Virtual Private Networks  VPNs      Dynamic Host Configuration Protocol  DHCP  Server and Client      Configurable Firewall    This diverse array of functionality allows home and small office users to afford an all in   one single device solution that is easily configurable and meets most business needs   Residential gateways have been around for quite some time  but recently  with the  extreme popularity of 802 11b compliant wireless devices  wireless was added as a  feature  Wireless residential gateways have all of the expected SOHO class access point  configuration selections such as WEP  MAC filters 
439. rganizations that use 900 MHz  wireless LANs find out the hard way that obsolete equipment is expensive to replace  should any piece of their hardware malfunctions  A single 900 MHz radio card may cost  as much as  800 and might only be able to transmit at speeds up to 1 Mbps  In  comparison  an 802 11b compliant wireless card will support speeds up to 11 Mbps and  sell for roughly  100  Finding support or replacements for these older 900 MHz units is  almost impossible        2 4 GHz ISM Band    This band is used by all 802 11  802 11b  and 802 11g compliant devices and is by far the  most populated space of the three bands presented in this chapter  The 2 4 GHz ISM  band is bound by 2 4000 GHz and 2 5000 GHz  2 4500 GHz   50 MHz   as defined by  the FCC  Of the 100 MHz between 2 4000 and 2 5000 GHz  only the frequencies 2 4000      2 4835 GHz are actually used by wireless LAN devices  The principal reason for this  limitation is that the FCC has specified power output only for this range of frequencies  within the 2 4 GHz ISM band        5 8 GHz ISM Band    This band is also frequently called the 5 GHz ISM Band  The 5 8 GHz ISM is bound by  5 725 GHz and 5 875 GHz  which yields a 150 MHz bandwidth  This band of  frequencies is not specified for use by wireless LAN devices  so it tends to present some  confusion  The 5 8 GHz ISM band overlaps part of another license free band  the Upper  UNII band  causing the 5 8 GHz ISM band to be confused with the 5 GHz Upper UNII  band  
440. rmine an RF link s viability  stability and usability      A  D  Always plan for the  worst case  scenario when site surveying  This method  of preparatory troubleshooting is recommended for scenarios that have RF  interference sources such as 2 4 GHz spread spectrum phones  baby monitors   microwave ovens  and others  Another example of this approach is to do outdoor  site surveys planning for the trees between two sites to be full of leaves that are  holding water  In this outdoor scenario  you would increase the height of the  antennas on each side of the link planning for extra room in the Fresnel Zone     C  Data rate boundaries are imaginary lines where the data rate changes speeds   either faster or slower  in order to maintain the fastest possible viable RF link  between a client and an access point  Dynamic Rate Shifting  DRS  is specified by  the 802 11  802 11b  and 802 11a standards for performing this task automatically     A  The RF noise floor and RF signal strength are quantifiable measurements that are  measured in either milliwatts or dBm  decibels referenced to milliwatts   dB and  dBi are relative units of measure used to measure changes in power  but not absolute  amounts of power     B  C  D  Signal strength  Signal to Noise Ratio  SNR   and the RF noise floor level  are all valuable measurements when doing a site survey  In order for an RF design  engineer to have enough information to make informed design decisions  the  engineer must have a significan
441. robably will not for quite some time  It is  much more cost effective for WISPs to offer wireless access to these remote locations  because WISPs will not encounter the same costs a cable company or telco would incur  in order to install the necessary equipment     WISPs have their own unique set of challenges  Just as xDSL providers have problems  going further than 18 000 feet  5 7 km  from the central office and cable providers have  issues with the cable being a shared medium to users  WISPs have problems with  rooftops  trees  mountains  lightning  towers  and many other obstacles to connectivity   Certainly WISPs don t have a fail proof solution  but they have the capability to offer  broadband access to users that other  more conventional technologies cannot reach     Mobility    As an access layer solution  wireless LANs cannot replace wired LANs in terms of data  rates  100BaseTx at 100Mbps versus IEEE 802 11a at 54Mbps   A wireless environment  uses intermittent connections and has higher error rates over what is usually a narrower  bandwidth  As a result  applications and messaging protocols designed for the wired  world sometimes operate poorly in a wireless environment  The wireless expectations of  end users and IT manager are set by the performance and behaviors of their wired  networks  What wireless LANs do offer is an increase in mobility  as can be seen in  Figure 1 5  as the trade off for speed and quality of service     For example  a parcel delivery comp
442. robe frame  and all access  points within range respond with a probe response frame  Similar to passive scanning  the  station will keep track of the probe responses and make a decision on which access point  to authenticate and associate with based on the probe responses having the strongest  signal level    Address Resolution Protocol  ARP    A TCP IP protocol that binds logical  IP   addresses to physical addresses     Ad Hoc network   A wireless network composed of only stations and no access point     Advanced Encryption Standard  AES      uses the Rijndael  pronounced Rine Dale   algorithm and was chosen by the National Information and Standards Institute  NIST  as  the Federal Information Processing Standard  FIPS   it is considered uncrackable    amplifier     used to increase signal strength between the transmitter receiver and the  antenna along the antenna cable    Announcement Traffic Information Message  ATIM      used in Ad Hoc mode to  indicate to stations the presence of transmissions bound for a particular station  tells  stations not to enter sleep mode before receiving their transmitted frames    antenna diversity     use of multiple antennas in order to overcome multipath    Application Layer   Establishes communications with other users and provides services  such as file transfer and electronic mail to the end users of the network     association service   An IEEE 802 11 service that an enables the mapping of a wireless  station to the distribution syste
443. rom desktop PCs using client server applications  determine whether or not one access  point could provide the necessary capacity  or if co located access points would be  required to provide for these users    networking needs  In this scenario  it is likely that at  least two access points would be required  In contrast  if there were 30 doctors using  wirelessly connected PDAs all connecting through a single access point  co located  access points would not likely be needed due to the fact that a PDA cannot transmit large  amounts of data across the network very quickly     These pieces of information will add to the markings on the blueprint in the form of  specific data rates  throughput measurements  and capacity notes  With the 11 Mbps  coverage circle around each access point drawn to illustrate that particular coverage area   it might be determined that there are 10 people in that area that need a minimum of 500  kbps throughput at all times  These measurements will also determine equipment needs  and expenses     Interference Sources    In this phase of the site survey process  questions are asked about potential sources of  narrowband and spread spectrum RF interference     Are there any existing wireless LANs in use in or near the facility     Existing wireless LANs can cause hardship on a site surveyor if permission is not  provided to disable existing radios as needed  Disabling existing wireless LAN gear may  not be possible due to production environments  or t
444. rors  bit error rate  will create a need for  retransmissions  Modern spread spectrum systems are configured to make discrete jumps  to specified data rates  1  2  5 5  and 11 Mbps   If 11 Mbps cannot be maintained  for  example  then the device will drop to 5 5 Mbps  Since the throughput is about 50  of the  data rate on a wireless LAN system  changing the data rate will have a significant impact  on the throughput     Hardware limitations will also dictate the data rate  If an IEEE 802 11 device is  communicating with an IEEE 802 11b device  the data rate can be no more than 2 Mbps   despite the 802 11b device   s ability to communicate at 11 Mbps  Correspondingly  the  actual throughput will be less still   about 50   or 1 Mbps  With wireless LAN  hardware  another consideration must be taken into account  the amount of CPU power  given to the access point  Having a slow CPU that cannot handle the full 11 Mbps data  rate with128 bit WEP enabled will affect throughput     248 Chapter 9    Troubleshooting Wireless LAN Installations    The type of spread spectrum technology used  FHSS or DSSS  will make a difference in  throughput for two specific reasons  First  the data rates for FHSS and DSSS systems are  quite different  FHSS systems are typically in compliance with either the OpenAir  standard and can transmit at 800 kbps or 1 6 Mbps  or the IEEE 802 11 standard  which  allows them to transmit at 1 Mbps or 2 Mbps  Currently  DSSS systems comply with  either the IEEE 802 
445. roubleshoot wireless LANs effectively  a good understanding  of spread spectrum technology and its implementation is required  In this section  we  will cover what spread spectrum technology is and how it is used according to FCC  guidelines  We will differentiate and compare the two main spread spectrum  technologies and discuss  in depth  how spread spectrum technology is implemented in  wireless LANs     Introducing Spread Spectrum    Spread spectrum is a communications technique characterized by wide bandwidth and  low peak power  Spread spectrum communication uses various modulation techniques  in wireless LANs and possesses many advantages over its precursor  narrow band  communication  Spread spectrum signals are noise like  hard to detect  and even harder  to intercept or demodulate without the proper equipment  Jamming and interference have  a lesser affect on a spread spectrum communication than on narrow band  communications  For these reasons  spread spectrum has long been a favorite of the  military  In order to discuss what spread spectrum is we must first establish a reference  by discussing the concept of narrowband transmission     Narrow Band Transmission    A narrowband transmission is a communications technology that uses only enough of the  frequency spectrum to carry the data signal  and no more  It has always been the FCC s  mission to conserve frequency usage as much as possible  handing out only what is  absolutely necessary to get the job done  Sprea
446. round the main lobe of an RF transmission which  must be 60 to 80 percent clear of obstacles to insure adequate signal reception between  the two wireless links  gets larger as the distance between the antennas increases    full duplex   refers to communications type in which devices can communicate in both  directions at the same time  devices can transmit and receive simultaneously    gain     the process of focusing the lobes of an antenna in a specific direction    gateway   A network component that provides interconnectivity at higher network  layers  For example  electronic mail gateways can interconnect dissimilar electronic mail  systems     Gaussian Frequency Shift Keying   A frequency modulation technique that filters the  baseband signal with a Gaussian filter before performing the modulation  used in FHSS    Gigahertz  GHz    One billion hertz     half duplex     refers to communications in which devices can communicate in only one  direction at a time  devices can either be transmitting or receiving  but not both  simultaneously    hidden node     occurs when two wireless clients cannot hear each other   s transmissions   but both can be heard by the access point  causes excessive collisions on the wireless  LAN  remedied by RTS CTS    HiperLAN   A wireless LAN protocol developed by ETSI  European  Telecommunications Standards Institute  that provides a 23 5 Mbps data rate in the 5GHz  band     HiperLAN 2     An extension to the HiperLAN protocol developed by ETS
447. rry both the power and the data to the units     Consider a warehouse where the access points need to be installed in the ceiling of the  building  The labor costs that would be incurred to install electrical outlets throughout  the ceiling of the building to power the access points would be considerable  Hiring an  electrician to do this type of work would be very expensive and time consuming   Remember that Ethernet cables can only carry data reliably for 100 meters and  for any  distance more than 100 meters  PoE is not a viable solution  Figure 5 17 illustrates how a  PoE device would provide power to an access point     122 Chapter 5     Antennas and Accessories    FIGURE 5 17    PoE installation    Passive Hub or Switch    Un powered  Ethernet       F    Access Point            ee Powered Ethernet                POE  Device          Many times the best places to install access points or bridges for RF connectivity will  have no AC power source  Therefore  PoE can be a great help in implementing a well   designed wireless network  Some manufacturers allow for only PoE to power up their  devices  not standard AC power     Common PoE Options    PoE devices are available in several types        Single port DC voltage injectors    Multi port DC voltage injectors      Ethernet switches designed to inject DC voltage on each port on a given pair of  pins    Although configuration and management is generally not necessary for a PoE device   there are some caveats to be aware of 
448. rs allowing or disallowing specific packets or datagrams based on their layer  3 protocols  layer 4 port  or even layer 7 application  Protocol filters are useful for  limiting use of the wireless LAN  For example  an administrator may prevent a group of  users from using bandwidth intensive applications based on the port or protocol used by  the application     Removable  Modular  Radio Cards    Having the ability to form a wireless backbone using one of the two radio card slots  found in some bridges reduces the number of devices from four to two when providing  client connectivity and bridging functionality  Typically these functions would require an  access point and a bridge on both ends of the link  Some wireless bridges perform these  same functions using a single radio  While still performing the same tasks  this  configuration allows for much less throughput than if separate sets of radios are used for  the access point and bridging functions     Variable Output Power    Variable Output Power feature allows the administrator to control the power  in  milliwatts  that the bridge uses to send its RF signal  This functionality is especially  useful when performing an outdoor site survey because it allows the site surveyor the  flexibility of controlling the output power without adding and subtracting amplifiers   attenuators  and lengths of cable from the circuit during testing  Used in conjunction with  amplifiers  variable output in the bridge can be useful on long di
449. s  Note that  40  and 64 bit keys are the same thing  A 40 bit  secret  key is concatenated with a 24   bit Initialization Vector  IV  to reach the 64 bits  In the same manner  104  and 128 bit  keys are the same  WECA does not specify interoperability of 128 bit keys  hence  no  compatibility is to be expected between vendors displaying the Wi Fi seal when using  128 bit WEP keys  Nevertheless  many 128 bit systems from different vendors are  interoperable     There are many other factors besides use of 40 bit WEP keys that are required to meet  WECA s Wi Fi criteria  These factors include support of fragmentation  PSP mode   SSID probe requests  and others  Some of these topics will be discussed in later chapters     Chapter 6     Wireless LAN Organizations and Standards 163       eS The website for WECA is www wirelessethernet org    European Telecommunications Standards Institute    The European Telecommunications Standards Institute  ETSI  is chartered with  producing communications standards for Europe in the same way that the IEEE is for the  United States  The standards ETSI has established  HiPerLAN 2 for example  directly  compete against standards created by the IEEE such as 802 1la  There has been much  discussion about IEEE and ETSI unifying on certain wireless technologies  but nothing  has materialized as of this writing  This effort is referred to as the  SUP  initiative for  5  GHz Unified Protocol   The IEEE s attempt at interoperability with ETSI s HiperLAN
450. s  held internally to cause a short  a path of almost no resistance  directly to earth  ground    Figure 5 27 shows some types of lightning arrestors  The one shown on the right shunts  transient currents to ground by way of the physical characteristics of the lightning  arrestor itself while allowing the appropriate RF signals to pass     Sample lightning arrestors       Copyright Young Design  Inc  2002  YDI com  Figure 5 28 shows how a lightning arrestor is installed on a wireless LAN  When objects  are struck by lightning an electric field is built around that object for just an instant   When the lightning ceases to induce electricity into the object  the field collapses  When  the field collapses  it induces high amounts of current into nearby objects  which  in this  case  would be your wireless LAN antenna or coaxial transmission line  Lightning is  discharged as a direct current  DC  pulse  but then causes an alternating current  AC   component to be formed resonating as high as 1 GHz  However  most of the power is  dissipated from DC to 10 MHz     Chapter 5     Antennas and Accessories 133    FIGURE 5 28 A lightning arrestor installed on a network        Lightning    Arrestor                  A    Access Point    Earth Ground    Common Options    There are few options on a lightning arrestor  and the cost will be between  50    150 for  any brand  However  there are some attributes that should be considered for any  lightning arrestor that is purchased      It shoul
451. s LAN   s     clients       experience continually strong RF signal strength as they move around their  facility  At the same time  clients must remain connected to the host device or other  mobile computing devices and their work applications  Employees who are using the  wireless LAN should never have to think about the wireless LAN  Proper performance  of the tasks listed in this section will ensure a quality site survey and can help achieve a  seamless operating environment every time you install a wireless network     Site surveying involves analyzing a site from an RF perspective and discovering what  kind of RF coverage a site needs in order to meet the business goals of the customer   During the site survey process  the surveyor will ask many questions about a variety of  topics  which are covered in this chapter  These questions allow the surveyor to gather as  much information as possible to make an informed recommendation about what the best  options are for hardware  installation  and configuration of a wireless LAN     A site survey is an attempt to define the contours of RF coverage from an RF source  an  access point or bridge  in a particular facility  Many issues can arise that prevent the RF  signal from reaching certain parts of the facility  For example  if an access point were  placed in the center of a medium sized room  it would be assumed that there would be RF    Chapter 11     Site Survey Fundamentals 309    coverage throughout the room  This is not 
452. s and access points in place  Trying to add 802 11b  devices into the network will not work for clients that are using FHSS PCMCIA  cards  This would only work if the existing WLAN consists of 802 11 DSSS clients  and access points     D  When synchronized radios are used  a maximum of 12 radios in a system is  currently available  no vendor currently has the ability to synchronize more than 12  radios   With unsynchronized radios  a recommended maximum of 15 radios should  be used for the best performance  but up to 26 radios can be used before collisions  hinder performance more than the throughput gain of adding another access point     B  When a FHSS system hops  both the transmitter and receiver systems change the  carrier frequency in a synchronized fashion     A  B  D  Frequency hopping systems use the entire useable range of the 2 4 GHz  ISM band with a range of 83 5 MHz whereas direct sequence systems use only a 22  MHz portion of the same frequency band  For this reason  the same narrowband  signal will disrupt the DSSS system more  Additionally  if the narrowband signal is  either intermittent or changes frequencies  the chance of it affecting FHSS is slim     A  The noise floor is a mixture of all of the background RF radiation found in the  environment surrounding the system in use  The noise floor is generally in the  100  dBm area  but can be much higher or much lower depending on the environment   RF signals must be higher than the noise floor to be detectible
453. s have the ability to remove the SSID from beacons  and or probe responses  In this case  in order to join the service set  a station must have  the SSID configured manually in the driver configuration settings  Some common  mistakes that wireless LAN users make in administering SSIDs are listed below       Using the default SSID   This setting is yet another way to give away information  about your wireless LAN  It is simple enough to use a sniffer to see that MAC  addresses originating from the access point and then look up the MAC address in  the OUI table hosted by IEEE  The OUI table lists the different MAC address  prefixes that are assigned to each manufacturer  Until Netstumbler came along   this process was manual  but now Netstumbler performs this task automatically   If you don t know how to use Netstumbler or are unfamiliar with network  sniffers  then looking for default SSIDs also works well  Each wireless LAN  manufacturer uses their own default SSID  and  since there are still a manageable  number of wireless LAN manufacturers in the industry  obtaining each of the  user manuals from the support section of each manufacturer s website and  looking for the default SSID and default IP subnet information is a simple task   Always change the default SSID        wireless LAN auditing application  Netstumbler  written by Marius Milner  More    eS Looking for wireless LANs is also called  netstumbling    after the ever so popular  information can be found on this appl
454. s just SSID  Serves as a network ID or  name     Bluetooth     a part of the 802 15 standard for WPANs  Wireless Personal Area  Networks   Bluetooth is a close range networking protocol primarily used for mobile  devices  utilizing FHSS in the 2 4 GHz ISM band at around 1600 hops second  Because  of the high hop rate  Bluetooth devices will greatly interfere with other devices operating  in the 2 4 GHz band     bridge   A network component that provides internetworking functionality at the data  link or medium access layer of a network   s architecture  Bridges can provide  segmentation of data frames     Carrier Sense Multiple Access Collision Avoidance  CSMA CA      a type of  contention protocol  It is a set of rules determining use of the wireless medium  and it is  used to prevent collisions in a wireless network  Use of this protocol means that all  stations that want to transmit will listen for other transmissions in the air  and if there are  transmissions  they will back off for a random period of time  and then try again  As soon  as there are no transmissions detected  the station will begin transmitting  Also known as  Distributed Coordination Function     Carrier Sense Multiple Access Collision Detection  CSMA CD    a type of contention  protocol  It a set of rules determining how network devices respond when two devices  attempt to use a data channel simultaneously  called a collision   Standard Ethernet  networks use CSMA CD  This standard enables devices to de
455. s more users being on a  particular shift or something as difficult to discover as seasonal changes  For example  if  a building to building bridge link were being surveyed in winter  the trees would be  without leaves  In the spring  trees will fill with leaves  which in turn fill with water   which could possibly cause problems with the wireless link     What mobility or roaming coverage is necessary     Chapter 11     Site Survey Fundamentals 317    Users may want to roam indoors  outdoors  or both  Roaming may also have to  incorporate crossing of router boundaries  maintaining VPN connectivity  and other  complex situations  In this case  it would be important for the site surveyor to document  these facts so that the wireless network design engineer would have all of the facts before  presenting a solution to the customer  There may be areas within or around a facility that  require special connectivity solutions  due to blockage of RF coverage or to special  security requirements  in order to provide roaming     Available Resources    FIGURE 11 5    What are the available resources     Among topics to discuss with the network manager regarding available resources are the  project s budget  the amount of time allotted for the project  and whether or not the  organization has administrators trained on wireless networks  If documentation of  previous site surveys  current topology and facility maps  and current design plans are  available  the site surveyor should request
456. s on which antennas will be placed    C  Visual line of sight  D  Outdoor power receptacles and weatherproof enclosure availability  E  Link distance  note if  gt  7 miles  8 35 km  to calculate compensation for Earth    bulge     What items should be included in an RF Site Survey Report   A  Ranges and RF coverage pattern of particular areas   B  Data storage details   C  Interference sources    D  Names and locations of all wireless LAN users    The Signal to Noise Ratio  SNR  is measured in     A  dBi  B  dBm  C  dB    D  Mbps    348 Chapter 11     Site Survey Fundamentals    15     16     17     18     19     Which two of the following should be tested during an RF site survey   A  RF coverage with microwave oven s  on   B  RF coverage with microwave oven s  off   C  RF coverage with 2 4 GHz phone s  off   D  RF coverage with 2 4 GHz phone s  on    Data rate boundaries are defined as which one of the following     A  The line after which there is no longer any data passed to the wireless LAN  infrastructure    B  The boundary between 2 separate wireless LAN RF coverage cells    C  The point at which the data rate is decreased or increased to the next acceptable  higher or lower rate in order to maintain the fastest viable RF link    D  Square areas of coverage denoted on the facility floor plan within which access  points are installed    Signal strength and the noise floor are measured in     A  dBm  B  dBi  C  Mbps  D  dB    To perform a site survey  you will need to re
457. s partially or fully blocked  This is sometimes the  case  but is rarely noticed due to most wireless users being mobile  In a mobile  environment  the Fresnel Zone is constantly changing so the user normally dismisses it  thinking that the coverage is simply  bad  where they are located   giving no thought to  why the coverage is bad     28 Chapter 2  RF Fundamentals    Antenna Gain    An antenna element     without the amplifiers and filters typically associated with it     is a  passive device  There is no conditioning  amplifying  or manipulating of the signal by  the antenna element itself  The antenna can create the effect of amplification by virtue of  its physical shape  Antenna amplification is the result of focusing the RF radiation into a  tighter beam  just as the bulb of a flashlight can be focused into a tighter beam creating a  seemingly brighter light source that sends the light further  The focusing of the radiation  is measured by way of beamwidths  which are measured in degrees horizontal and  vertical  For example  an omni directional antenna has a 360 degree horizontal  beamwidth  By limiting the 360 degree beamwidth into a more focused beam of  say  30  degrees  at the same power  the RF waves will be radiated further  This is how patch   panel  and Yagi antennas  all of which are semi directional antennas  are designed   Highly directional antennas take this theory a step further by very tightly focusing both  horizontal and vertical beamwidths to maxim
458. s point  bridge  or client device  Bi directional amplifiers  should be placed as close to the antenna as possible so as to effectively compensate for  cable loss between the antenna and the receiver  access point or bridge  for received  signals  Most amplifiers used with wireless LANs are bi directional     Common Options    Before you ever get to a point of deciding which amplifier to purchase  you should  already know the amplifier specification requirements  Once you know the impedance   ohms   gain  dB   frequency response  range in GHz   VSWR  input  mW or dBm   and  output  mW or dBm  specifications  you are ready to select an RF amplifier     128 Chapter 5     Antennas and Accessories    Frequency response is likely the first specification you will decide upon  If a wireless  LAN uses the 5 GHz frequency spectrum  an amplifier that works only in the 2 4 GHz  frequency spectrum will not work  Determine how much gain  input  and output power is  required by performing the necessary RF math calculations  The amplifier should match  impedances with all of the other wireless LAN hardware between the transmitter and the  antenna  Generally  wireless LAN components have an impedance of 50 ohms  however   it is always a good idea to check the impedance of every component on a wireless LAN     The amplifier must be connected into the network  so an amplifier should be chosen with  the same kinds of connectors as the cables and or antennas to which the amplifier will be  conne
459. s that EVERY system used in the ISM and UNII bands must  be certified as a complete system and given a certification number by the FCC  This  certification will be accompanied by a certificate that will list the pieces of equipment  and their FCC identifiers that are permitted for use with that specific wireless LAN    Chapter 5     Antennas and Accessories 129    system  All pieces of the wireless LAN setup that are used must be listed in the  certificate  Understanding this requirement becomes especially crucial when dealing  with amplifiers  A    system    is defined as the transmitting device  the cabling   connectors  amplifiers  attenuators  splitters  and the antenna  Manufacturers obtain FCC  approval or    certification    of their hardware such that an end user may purchase any of  their radio devices and antennas and use them as a system without contacting the FCC for  testing and certification  When additional devices such as amplifiers are added into the  system  the manufacturer   s certification no longer applies and a user must obtain his own  certification of his system  This might cost as much as  12 000 per system  An answer  to this problem might be to purchase an FCC certified system from a reputable vendor  that meets the requirements of the wireless network     CFR 15 204 does not allow an amplifier to be marketed or sold when not part of a     certified    system  The FCC maintains a database of certified systems and companies  holding these certificat
460. s the resulting 10 Mbps  data rate is  it does not overshadow the disadvantage of 125 mW of output power  which  limits use of wide band frequency hopping devices to an approximate range of 150   300  feet  46   92 meters   This outcome limits the use of wideband frequency hopping  devices primarily to SOHO environments     HomeRF units use the Shared Wireless Access Protocol  SWAP  protocol  which is a  combination of CSMA  used in local area networks  and TDMA  used in cellular phones   protocols  SWAP is a hybrid of the 802 11 and DECT standards and was developed by  the HomeRF working group  HomeRF devices are the only devices currently on the  market that follow the wideband frequency hopping rules  HomeRF devices are  considered more secure than 802 11 products using WEP because of the 32 bit  initialization vector  IV  HomeRF uses  in contrast to 802 11 s 24 bit IV   Additionally   HomeRF has specified how the IV is to be chosen during encryption  whereas 802 11  does not  leaving 802 11 open for attack due to weak implementations     Some particularly interesting features of HomeRF 2 0 are     Chapter 6     Wireless LAN Organizations and Standards 165        50 hops per second   e Uses 2 4 GHz ISM band   e Meets FCC regulations for spread spectrum technologies   e 10 Mbps data rate with fallback to 5 Mbps  1 6 Mbps and 0 8 Mbps   e Backwards compatible with OpenAir standard   e Simultaneous host client and peer peer topology   e Built in security measures against eave
461. s wireless LANs are built with dual antennas for exactly this  purpose  to compensate for the degrading effects of multipath on signal quality and  throughput     Hidden Node    Multiple access protocols that enable networked computing devices to share a medium   such as Ethernet  are well developed and understood  However the nature of the wireless  medium makes traditional methods of sharing a common connection more difficult     Collision detection has caused many problems in wired networking  and even more so for  wireless networks  Collisions occur when two or more nodes sharing a communication  medium transmit data simultaneously  The two signals corrupt each other and the result    FIGURE 9 7    Chapter 9  Troubleshooting Wireless LAN Installations 243    is a group of unreadable packet fragments  Collisions have always been a problem for  computer networks  and the simplest protocols often do not overcome this problem   More complex protocols such as CSMA CD and CSMA CA check the channel before  transmitting data  CSMA CD is the protocol used with Ethernet and involves checking  the voltage on the wire before transmitting  However  the process is considerably more  difficult for wireless systems since collisions are undetectable  A condition known as the  hidden node problem has been identified in wireless systems and is caused by problems  in transmission detection     Hidden node is a situation encountered with wireless LANs in which at least one node is  unable to 
462. scuss  in depth  the best possible solutions to the RF  and other networking  problems  that were found and documented  The client may not be aware of problems that can    Chapter 11     Site Survey Fundamentals 341    surface in doing a thorough site survey  This section should include recommendations  for which technologies and equipment will best serve the customer   s needs  There is  rarely one solution to any technology situation  If possible  present 2 or 3 solutions  so  that the customer will have options  It is possible that while performing a site survey   you may find problems with the customer s wired LAN  Tactfully mention any problems  you find to the network administrator  especially if those problems will directly affect  implementation of the wireless LAN     Drawings    FIGURE 11 20    Provide Visio  CAD  or other types of drawings and graphical illustrations of how the  network should be configured including a topology map  All of the survey findings  should be documented in words and pictures  It will be much easier to present a range of  coverage using a floor plan than only words  Provide floor plan drawings or marked up  blueprints to the customer to graphically show RF findings and recommendations  Figure  11 20 illustrates where access points would be placed on a multi floor installation     Access point placement and coverage       3rd Floor    Are 2nd Floor       E    e   e e   1st Floor       Provide screenshots of the site monitor software and di
463. scuss their impact on the wireless LAN industry     By understanding the laws and the standards that govern and guide wireless LAN  technology  you will be able to ensure that any wireless system you implement will be  interoperable and comply with the law  Furthermore  familiarity with these statutes and  standards  as well as the organizations that create them  will greatly enhance your ability  to research and find the latest information about wireless LANs     Federal Communications Commission    The Federal Communications Commission  FCC  is an independent United States  government agency  directly responsible to Congress  The FCC was established by the  Communications Act of 1934 and is charged with regulating interstate and international  communications by radio  television  wire  satellite  and cable  The FCC s jurisdiction  covers not only the 50 states and the District of Columbia  but also all U S  possessions  such as Puerto Rico  Guam  and The Virgin Islands     The FCC makes the laws within which wireless LAN devices must operate  The FCC  mandates where on the radio frequency spectrum wireless LANs can operate and at what  power  using which transmission technologies  and how and where various pieces of  wireless LAN hardware may be used             The website for the FCC is www fcc gov    ISM and UNII Bands    The FCC establishes rules limiting which frequencies wireless LANs can use and the  output power on each of those frequency bands  The FCC has specifie
464. sdropping and denial of service   e Support for prioritized streaming media sessions and toll quality two way voice  connections   e Enhanced roaming capabilities       eS The website for HomeRF is www homerf org    Bluetooth    Bluetooth is another frequency hopping technology that operates in the 2 4 GHz ISM  band  The hop rate of Bluetooth devices is about 1600 hops per second  about 625s  dwell time   so it has considerably more overhead than 802 1 1 compliant frequency  hopping systems  The high hop rate also gives the technology greater resistance to  spurious narrow band noise  Bluetooth systems are not designed for high throughput  but  rather for simple use  low power  and short range  WPANs   The new IEEE 802 15 draft  for WPANSs includes specifications for Bluetooth     A major disadvantage of using Bluetooth technology is that it tends to completely disrupt  other 2 4 GHz networks  The high hop rate of Bluetooth over the entire usable 2 4 GHz  band makes the Bluetooth signal appear to all other systems as all band noise  or all   band interference  Bluetooth also affects other FHSS systems  All band interference  as  the name implies  disrupts the signal over its entire range of useable frequencies   rendering the main signal useless  Curiously  the counter interference  interference  provided by the wireless LAN interfering with Bluetooth  does not impact the Bluetooth  devices as severely as Bluetooth impacts the 802 11 compliant wireless LAN  It is now  common 
465. se being used in some frequency  hopping systems such as Bluetooth  hop time can become very significant  If we look at  the effect of hop time in terms of data throughput  we discover that the longer the hop  time in relation to the dwell time  the slower the data rate of bits being transmitted     This translates roughly to longer dwell time   greater throughput     Dwell Time Limits    The FCC defines the maximum dwell time of a frequency hopping spread spectrum  system at 400 ms per carrier frequency in any 30 second time period  For example  if a  transmitter uses a frequency for 100 ms  then hops through the entire sequence of 75 hops   each hop having the same 100 ms dwell time  returning to the original frequency  it has  expended slightly over 7 5 seconds in this hopping sequence  The reason it is not exactly  7 5 seconds is due to hop time  Hopping through the hop sequence four consecutive  times would yield 400 ms on each of the carrier frequencies during this timeframe of just  barely over 30 seconds  7 5 seconds x 4 passes through the hop sequence  which is  allowable by FCC rules  Other examples of how a FHSS system might stay within the  FCC rules would be a dwell time of 200 ms passing through the hop sequence only twice  in 30 seconds or a dwell time of 400 ms passing through the hop sequence only once in  30 seconds  Any of these scenarios are perfectly fine for a manufacturer to implement   The major difference between each of these scenarios is how hop tim
466. semi spherical shaped antenna  Often used for satellite and  microwave radio reception  It consists of an active element  called a feed element  and a  passive spherical reflector     distributed coordination function  DCF      see Carrier Sense Multiple Access Collision  Avoidance    distribution service   An IEEE 802 11 station uses the distribution service to send MAC  frames across a distribution system     distribution system   An element of a wireless system that interconnects basic service  sets via access points to form an extended service set     dwell time     in FHSS wireless networks  the amount of time that a client is allowed to  spend  dwell  transmitting data on a particular hopping frequency in the hop sequence    Dynamic Host Configuration Protocol  DHCP    Issues IP addresses automatically  within a specified range to devices such as PCs when they are first powered on  The  device retains the use of the IP address for a specific license period that the system  administrator can define  DHCP is available as part of the many operating systems  including Microsoft Windows NT Server and UNIX     dynamic rate shifting     a method by which wireless LAN clients will fall back to lower  data rates when bit error rates exceed a predefined power level due to interference or  radio signal attenuation  Clients will shift to higher rates when signal attenuation or  interference is no longer present     Earth bulge     the amount of rise of the earth   s surface between
467. servers typically  support RADIUS     Tunnels are built from the client station to the VPN server  as illustrated in Figure 7 14   When a user roams  the client is roaming between access points across layer 2    196 Chapter 7     802 11 Network Architecture    boundaries  This process is seamless to the layer 3 connectivity  However  if a tunnel is  built to the access point or centralized VPN server and a layer 3 boundary is crossed  a  mechanism of some kind must be provided for keeping the tunnel alive when the  boundary is crossed     FIGURE 7 14 Roaming within VPN tunnels    VPN Server Switch          Layer 2  amp  3 Boundaries    A constraint of existing technology is that wired networks are often segmented for  manageability  Enterprises with multiple buildings  such as hospitals or large  businesses  often implement a LAN in each building and then connect these LANs with  routers or switch routers  This is layer 3 segmentation has two major advantages  First   it contains broadcasts effectively  and second it allows access control between segments  on the network  This type of segmentation can also be done at layer 2 using VLANs on  switches  VLANs are often seen implemented floor by floor in multi floor office  buildings or for each remote building in a campus for the same reasons  Segmenting at  layer 2 in this fashion segments the networks completely as if multiple networks were  being implemented  When using routers such as seen in figure 7 15  users must have a  
468. ses  Any information going across the wireless segment  in this manner leaves the network and individual users vulnerable to attack  Consider the  impact if a hacker gained access to a user s domain login information and caused havoc  on the network  The hacker would be to blame  but network usage logs would point  directly at the user  This breach could cost a person their job  Consider another situation  in which HTTP or email passwords were gathered over the wireless segment and later  used by a malicious hacker for personal gain from a remote site     A hacker who is parked in your facility   s parking lot may have a veritable toolkit for  breaking into your wireless LAN  All this individual needs is a packet sniffer and some  shareware or freeware hacking utilities to acquire your WEP keys and to gain access to  the wireless network     Active Attacks    Hackers can stage active attacks in order to perform some type of function on the  network  An active attack might be used to gain access to a server to obtain valuable  data  use the organization s Internet access for malicious purposes  or even change the  network infrastructure configuration  By connecting to a wireless network through an  access point  a user can begin to penetrate deeper into the network or perhaps make  changes to the wireless network itself  For example  if a hacker made it past a MAC  filter  then the hacker could navigate to the access points and remove all MAC filters     284 Chapter 10     Wir
469. should its current  connection be broken for any reason     Stations will roam from one access point to another after the radio signal from the access  point where the station is connected gets to a certain low level of signal strength   Roaming is implemented so that the station can stay connected to the network  Stations  use the information obtained through passive scanning for locating the next best access  point  or ad hoc network  to use for connectivity back into the network  For this reason   overlap between access point cells is usually specified at approximately 20 30   This  overlap allows stations to seamlessly roam between access points while disconnecting  and reconnecting without the user   s knowledge        Because the sensitivity threshold on some radios does not work properly  sometimes  an administrator will see a radio stay attached to an access point until the signal is  broken due to extremely low signal strength instead of roaming to another access point    Chapter 7     802 11 Network Architecture 179       that has a better signal  This situation is a known problem with some hardware and  should be reported to the manufacturer if you are experiencing this problem     Active Scanning    FIGURE 7 2    Active scanning involves the sending of a probe request frame from a wireless station   Stations send this probe frame when they are actively seeking a network to join  The  probe frame will contain either the SSID of the network they wish to join or a br
470. signal strength of each  wireless LAN s packets  giving you an idea of just how much one wireless LAN is  interfering with the others     The two solutions for co channel interference are  first  the use of a different  non   overlapping channel for each of the wireless LANs  and second  moving the wireless  LANs far enough apart that the access points    cells do not overlap  These solutions are  the same remedy as for adjacent channel interference     In situations where seamless roaming is required  a technique called channel reuse is used  in order to alleviate adjacent and co channel interference while allowing users to roam  through adjacent cells  Channel reuse is the side by side locating of non overlapping  cells to form a mesh of coverage where no cell on a given channel touches another cell on  that channel  Figure 9 19 illustrates channel reuse     FIGURE 9 19 Channel reuse    Channel 1 Channel 1    oh P  ud Channel 6 Pa  La    4    ly    Z   a  J d  Channel 11  gt  Channel 11       Channel 1    Range Considerations    When considering how to position wireless LAN hardware  the communication range of  the units must be taken into account  Generally  three things will affect the range of an  RF link  transmission power  antenna type and location  and environment  The  maximum communication range of a wireless LAN link is reached when  at some  distance  the link begins to become unstable  but is not lost     Chapter 9  Troubleshooting Wireless LAN Installations 261
471. sing CLI   telnet  internal HTTP or HTTPS  servers  etc  Centralized management of only a few devices is one big advantage of using  enterprise wireless gateways  An administrator  from a single console  can easily manage  a large wireless deployment using only a few central devices instead of a very large  number of access points     Enterprise wireless gateways are normally upgraded through use of TFTP in the same  fashion as many switches and routers on the market today  Configuration backups can  often be automated so that the administrator won t have to spend additional management  time backing up or recovering from lost configuration files  Enterprise wireless gateways  are mostly manufactured as rack mountable 1U or 2U devices that can fit into your  existing data center design     96 Chapter 4     Wireless LAN Infrastructure Devices    Key Terms    Before taking the exam  you should be familiar with the following terms     bridge mode   configurable firewall   converters   detachable antenna   Dynamic Host Configuration Protocol  DHCP  Server and Client  Ethernet switching  fail over routing   modular cards   Network Address Translation  NAT   Point to Point Protocol over Ethernet  PPPoE   Port Address Translation  PAT   portal   print serving   profiles   repeater mode   root mode   SNMP   wired connectivity   variable output   USB   Virtual Private Networks  VPNs     virtual servers    Chapter 4     Wireless LAN Infrastructure Devices 97    Review Questions    1  Wh
472. sive gear  the  2 4 GHz band is much more crowded  which means you are more likely to encounter  interference from other nearby wireless LANs  Remember that 802 1 1a devices and  802 11b devices are incompatible  These devices do not see  hear  or communicate with  one another because they utilize different frequency bands and different modulation  techniques     Summary    Why do  non overlapping  channels overlap  There could be many answers to this  question  however  it seems that the greatest cause is access points being located too  close together  By separating the access points by a greater distance  the overlap between  theoretically non overlapping channels is reduced  Watching this configuration on a  spectrum analyzer  you can see that for close quarters co location  there needs to be a  channel separation larger than 3 MHz  however  since that is what we  as administrators   have to work with  we have to find a workaround     We can either physically separate the radios by a further distance or we can use channels  further than 3 MHz apart  hence the suggestion of using channels    amp  11 only for close   quarters co location   It also seems that co location of different vendors  equipment  makes a difference as well  Using the same vendor s equipment for close quarters co     Chapter 9  Troubleshooting Wireless LAN Installations 253    location has less severe overlapping than does using multiple vendors  equipment   Whether this phenomenon is due to inaccuraci
473. ss point     Remove Obstacles    Increasing the power on your mobile nodes may not work if  for example  the reason one  node is hidden is that there is a cement or steel wall preventing communication with other  nodes  It is doubtful that you would be able to remove such an obstacle  but removal of  the obstacle is another method of remedy for the hidden node problem  Keep these types  of obstacles in mind when performing a site survey     Move the Node    Another method of solving the hidden node problem is moving the nodes so that they can  all hear each other  If you have found that the hidden node problem is the result of a user  moving his computer to an area that is hidden from the other wireless nodes  you may  have to force that user to move again  The alternative to forcing users to move is  extending your wireless LAN to add proper coverage to the hidden area  perhaps using  additional access points     Near Far    The near far problem in wireless LAN implementation results from the scenario in which  there exists multiple client nodes that are  a  very near to the access point and  b  have  high power settings  and then at least one client that is  a  much farther away from the  access point than the aforementioned client nodes  and  b  is using much less transmitting  power than the other client nodes  The result of this type of situation is that the client s     246 Chapter 9  Troubleshooting Wireless LAN Installations    FIGURE 9 8    that are farther away from
474. ss the street from one another and need to  share a network connection would be a good scenario in which to implement semi   directional antennas  In a large indoor space  if the transmitter must be located in the  corner or at the end of a building  a corridor  or a large room  a semi directional antenna  would be a good choice to provide the proper coverage  Figure 5 9 illustrates a link  between two buildings using semi directional antennas     Point to point link using semi directional antennas             Many times  during an indoor site survey  engineers will constantly be thinking of how to  best locate omni directional antennas  In some cases  semi directional antennas provide  such long range coverage that they may eliminate the need for multiple access points in a  building  For example  in a long hallway  several access points with omni antennas may  be used or perhaps only one or two access points with properly placed semi directional  antennas   saving the customer a significant amount of money  In some cases  semi   directional antennas have back and side lobes that  if used effectively  may further reduce  the need for additional access points  Specifically  Yagi antennas are appropriate for  signal coverage down pathways or aisles in warehouses  rail yards  retail stores  or  manufacturing facilities                                                                                                                                                                  
475. stance links in reducing  the amount of time it takes to fine tune the output power such that the power is high  enough to create a viable link and low enough to stay within FCC regulations     Varied Types of Wired Connectivity    Connectivity options for a wireless bridge can include 10baseTx  10 100baseTx   100baseTx  or 100baseFx  Always attempt to establish a full duplex connection to the  wired segment in order to maximize the throughput of the wireless bridge  It is important  when preparing to purchase a wireless bridge to take note of certain issues  such as the    Chapter 4     Wireless LAN Infrastructure Devices 85    distance from the nearest wiring closet  for the purpose of specifying wired connectivity  options for wireless bridges     Configuration and Management    Wireless bridges have much the same configuration accessibility as do access points   console  telnet  HTTP  SNMP  or custom configuration and management software    Many bridges support Power over Ethernet  PoE  as well  discussed in Chapter 5   Once  wireless bridges are implemented  throughput checks should be done regularly to confirm  that the link has not degraded because a piece of the equipment was moved or the antenna  shifted     Wireless bridges usually come with a factory default IP address and can be accessed via  the methods mentioned above for initial configuration  There is almost always a  hardware reset button on the outside of the unit for resetting the unit back to factory  defa
476. stop its own transmissions  complying with shared medium access  tules of CSMA CA  However  if for any reason the near far problem still exists in the  network  below is a list of remedies that are easily implemented and can overcome the  near far problem       Increase power to remote node  the one that is being drowned out    Decrease power of local nodes  the close  loud ones     Move the remote node closer to the access point    One other solution is moving the access point to which the remote node is associated   However  this solution should be viewed as a last resort  since moving an access point  will likely disrupt more clients than it would help  Furthermore  the need to move an  access point likely reveals a flawed site survey or network design  which is a much bigger  problem     Throughput    Throughput on a wireless LAN is based on many factors  For instance  the amount and  type of interference may impact the amount of data that can be successfully transmitted   If additional security solutions are implemented  such as Wired Equivalent Privacy   WEP   discussed in depth in Chapter 10  Wireless LAN Security   then the additional  overhead of encrypting and decrypting data will also cause a decrease in throughput   Using VPN tunnels will add additional overhead to a wireless LAN system in the same  manner as will turning on WEP     Greater distances between the transmitter and receiver will cause the throughput to  decrease because an increase in the number of er
477. surveyor  and subsequently the design engineer  to keep the business  requirements as a main focus  the site surveyor must have a solid understanding of how  the network will be used and for what reasons  By knowing how the wireless network  affects the business goals of the organization  the site surveyor will be able to create a  better  more thorough RF Site Survey Report     For example  at a ski resort  skiing instructors and ski instructor supervisors use wireless  handheld PDAs to coordinate skiing classes across several slopes at once  Since these  handhelds are used over a vast stretch of land  range is very important  but the small  amount of data being carried over the wireless network means that many of these wireless  PDAs can be used on a single access point at any given time without degraded  performance  In contrast  a small workgroup of graphic designers  sitting in one room  needing access to file servers to which they transfer large images over the wireless  network  need high speed access  but range is minimal  Only a small number of this type  of user  high bandwidth  should be connected to an access point at any given time     Chapter 11     Site Survey Fundamentals 315    These scenarios show how uses of wireless LANs can vary substantially  The site  surveyor must know the business needs of the organization in order to effectively  perform a site survey     Bandwidth  amp  Roaming Requirements  What bandwidth and roaming requirements are there     The 
478. t about an SSID is that it must match  EXACTLY between access points and clients  Do not confuse the SSID  ESSID  with  the BSSID  The Basic Service Set Identifier is a 6 byte hex number identifying the  access point where the frame originated or was relayed  whereas the SSID and ESSID are  interchangeable terms denoting the network name or identifier     Beacons    Beacons  short for beacon management frame  are short frames that are sent from the  access point to stations  infrastructure mode  or station to station  ad hoc mode  in order    Chapter 7     802 11 Network Architecture 177    to organize and synchronize wireless communication on the wireless LAN  Beacons  serve several functions  including the following     Time Synchronization    Beacons synchronize clients by way of a time stamp at the exact moment of transmission   When the client receives the beacon  it changes its own clock to reflect the clock of the  access point  Once this change is made  the two clocks are synchronized  Synchronizing  the clocks of communicating units will ensure that all time sensitive functions  such as  hopping in FHSS systems  are performed without error  The beacon also contains the  beacon interval  which informs stations how often to expect the beacon     FH or DS Parameter Sets    Beacons contain information specifically geared to the spread spectrum technology the  system is using  For example  in a FHSS system  hop and dwell time parameters and hop  sequence are included in t
479. t amount of information relating to RF levels  throughout a facility     352 Chapter 11     Site Survey Fundamentals    19     20     A  B  C  Baby monitors are used in the nursery near the delivery section   Microwave ovens are used in staff break rooms  2 4 GHz cordless phones are  generally not permitted in a hospital because of the interference with the wireless  LAN installations  Cell phones are not normally permitted in hospitals at all  Staff  throughout a hospital uses walkie talkies  however  these units almost never use the  2 4 GHz ISM band and interfere with wireless LANs  As hard as it is to believe   elevator motors may emit RF interference across many frequency ranges including  the 2 4 GHz ISM band     B  People are not generally RF obstructions  however  all of the rest of these items   especially those that are metal or metal related  are reflective of RF signals and can  cause multipath or signal blockage     RF in Perspective    Throughout this book  we have provided the technical facts  specifications   and many  how to  descriptions of wireless LANs  however  without  experience working with RF networks  it may still be difficult to understand  the big picture  You will spend many hours in trial and error when working  with RF networks  and skill comes with experience  The following RF  Primer should help dispel some common misconceptions about wireless  LANs and explain in simple terms some of the scenarios involved with  forming wireless connections a
480. t coverage  patterns available in the facility  Additional pieces of information that belong in the site  survey report are interference findings  equipment types needed  and equipment  placement suggestions     A site survey report should not be turned into a consulting report for implementation and  security  A wireless consulting firm should be able to come in  read the site survey  report  and then be able to provide effective information on equipment purchasing   including vendor selection  and security solutions  The site survey report should be kept  separate from implementation and security reports  which can be equally as involved as  the site survey  and require as much time to complete  Often  the company that does  quality work during the site survey is asked to return to perform the equipment  recommendations  installation  security audits  and subsequent security solution  implementations     Consultants may charge additional fees for a report that includes information about one  or more of the following       Which manufacturers make appropriate products for this environment and what  those particular products are       Which security solution makes sense for this environment and how to implement  that solution       Detailed diagrams and drawings on how to implement the suggested solutions    Cost and time involved to implement the suggested solutions       Details of how each wireless LAN requirement listed in the RF Site Survey  Report will be met  item by i
481. t drops below a manufacturer defined signal strength threshold     Reassociation    Reassociation usually occurs because the wireless station has physically moved away  from the original access point  causing the signal to weaken  In other cases  reassociation  occurs due to a change in radio characteristics in the building  or due simply to high  network traffic on the original access point  In the latter case  this function is known as  load balancing  since its primary function is to distribute the total wireless LAN load  most efficiently across the available wireless infrastructure     Association and reassociation differ only slightly in their use  Association request frames  are used when joining a network for the first time  Reassociation request frames are used  when roaming between access points so that the new access point knows to negotiate  transfer of buffered frames from the old access point and to let the distribution system  know that the client has moved  Reassociation is illustrated in Figure 7 13     Chapter 7     802 11 Network Architecture 195    FIGURE 7 13 Roaming with reassociation    Buffered Packet Request        gee    Disassociatio    Association  Request Frame    Reassociation    This process of dynamically associating and re associating with access points allows  network managers to set up wireless LANs with very broad coverage by creating a series  of overlapping 802 11 cells throughout a building or across a campus  To be successful   the IT m
482. t having to listen  to the clients and retransmit every frame upstream over the same wireless segment   This situation causes much more contention for the medium than would normally be  expected  Having a series of repeater hops can cause data corruption  Use of only  one repeater in a series is recommended     2  C  PCI cards and Ethernet converters use PCMCIA cards for connectivity into the  wireless LAN  In this scenario  only PCMCIA cards themselves are standalone  wireless LAN connectivity devices     3  C  Access points  when serving in root or repeater mode  allow only client  connectivity  In this scenario  wireless bridges should be used  but in their absence   many wireless access points support a bridging mode where the access points can  effectively be a wireless bridge connecting two wired segments together wirelessly   Although an access point in repeater mode can talk to another access point  it does  so as a client and on behalf of other clients  and multiple wired segments cannot be  connected using access points in this manner     4  B  The purpose behind repeater mode is to extend the wireless segment to users  who cannot see the access point connected to the wired LAN  Many times repeater  mode is used because an additional access point could not be connected to the wired  infrastructure in a particular area of a facility     5  B C  There are two basic configurations using wireless bridges  point to point and  point to multipoint  Building to building bri
483. t of an isotropic radiator  The higher the  gain  the more we horizontally squeeze our doughnut until it starts looking like a  pancake  as is the case with very high gain antennas     108 Chapter 5     Antennas and Accessories    FIGURE 5 1    FIGURE 5 2    FIGURE 5 3    Dipole Doughnut       The dipole radiates equally in all directions around its axis  but does not radiate along the  length of the wire itself   hence the doughnut pattern  Notice the side view of a dipole  radiator as it radiates waves in Figure 5 2  This figure also illustrates that dipole antennas  form a  figure 8  in their radiation pattern if viewed standing beside a perpendicular  antenna     Dipole side view    If a dipole antenna is placed in the center of a single floor of a multistory building  most  of its energy will be radiated along that floor  with some significant fraction sent to the  floors above and below the access point  Figure 5 3 shows examples of some different  types of omni directional antennas  Figure 5 4 shows a two dimensional example of the  top view and side view of a dipole antenna     Sample omni directional antennas    Omni Pillar Omni Ground Omni Ceiling  Mount Antenna Plane Antenna Mount Antenna    FIGURE 5 4    FIGURE 5 5    Chapter 5     Antennas and Accessories 109    Coverage area of an omni directional antenna   Side View Top View  High gain omni directional antennas offer more horizontal coverage area  but the vertical  coverage area is reduced  as can be seen in Fi
484. t to Multipoint  PtMP     PtMP links have a central point of connection and two or more non central connection  points  PtMP links are typically configured in a star topology  The central connection  point may or may not have an omnidirectional antenna  an omnidirectional antenna  produces a 360 degree horizontal beam   It is important to note that when an  omnidirectional antenna is used  the FCC automatically considers the link a PtMP link   Regarding the setup of a PtMP link  the FCC limits the EIRP to 4 Watts in both the 2 4    158 Chapter 6     Wireless LAN Organizations and Standards    FIGURE 6 2    GHz ISM band and upper 5 GHz UNII band  Furthermore  the power limit set for the  intentional radiator  the device transmitting the RF signal  in each of these bands is 1  Watt  If the transmitting wireless LAN devices are adjustable with respect to their output  power  then the system can be customized to the needs of the user     Suppose a radio transmitting at 1 Watt   30 dBm  is connected directly to a 12 dBi  omnidirectional antenna  The total output power at the antenna is about 16 Watts  which  is well above the 4 Watt limit  The FCC stipulates that for each 3 dBi above the  antenna s initial 6 dBi of gain  the power at the intentional radiator must be reduced by 3  dB below the initial  30 dBm  For our example  since the antenna gain is 12 dBi  the  power at the intentional radiator must be reduced by 6 dB  This reduction will result in  an intentional radiator powe
485. tect a collision  After  detecting a collision  a device waits a random delay time and then attempts to re transmit  the message  If the device detects a collision again  it waits a longer period of time to  attempt retransmission of the message  This is known as exponential back off     Glossary 363    Category 5 UTP data cable   Certified for data rates up to 100 Mbps  which facilitates  802 3 100BaseT  Ethernet  networks    Challenge Handshake Authentication Protocol  CHAP    a type of authentication in  which the authentication agent  typically a network server  sends the client program a  key to be used to encrypt the username and password  This enables the username and  password to be transmitted in an encrypted form to protect them against eavesdroppers     clear channel assessment   A function that determines the state of the wireless medium  in an IEEE 802 11 network     co location     method of installing multiple access points using different frequencies to  increase throughput in a wireless LAN    coaxial cable   Type of medium having a solid metallic core with a shielding as a return  path for current flow  The shielding within the coaxial cable reduces the amount of  electrical noise interference within the core wire  therefore  coaxial cable can extend to  much greater lengths than twisted pair wiring  Commonly called  coax  and used in  legacy Ethernet  10base2  networks     Code Division Multiple Access  CDMA    A spread spectrum digital cellular radio  syst
486. ted  ability to see translates into a broken or corrupted connection  RF LOS is important  because RF doesn t behave in exactly the same manner as visible light                                                                                                              Fresnel Zone    A consideration when planning or troubleshooting an RF link is the Fresnel Zone  The  Fresnel Zone occupies a series of concentric ellipsoid shaped areas around the LOS path   as can be seen in Figure 2 11  The Fresnel Zone is important to the integrity of the RF  link because it defines an area around the LOS that can introduce RF signal interference  if blocked  Objects in the Fresnel Zone such as trees  hilltops  and buildings can diffract  or reflect the main signal away from the receiver  changing the RF LOS  These same  objects can absorb or scatter the main RF signal  causing degradation or complete signal  loss     FIGURE 2 11    Chapter 2     RF Fundamentals 27    Fresnel Zone    Fresnel Zone    mn                                                                                                                                                                                                                   The radius of the Fresnel Zone at its widest point can be calculated by the following    formula   r  43 3x 4    where d is the link distance in miles  f is the frequency in GHz  and the answer  r  is in  feet  For example  suppose there is a 2 4000 GHz link 5 miles  8 35 km  in length 
487. ted that you place lightning  arrestors as the last component on the RF transmission line before the antenna so that the  lightning arrestor can protect amplifiers and attenuators along with your bridge or access  point     Connector Types   Make sure the connector types of the lightning arrestor you choose match those on the  cable you are planning to use on your wireless LAN  If they do not match  then adapter  connectors will have to be used  inserting more loss into the RF circuit than is necessary   Frequency Response   The frequency response specification of the lightning arrestor should be at least as high as  the highest frequency used in a wireless LAN  For example  if you are using only a 2 4  GHz wireless LAN  a lightning arrestor that is specified for use at up to 3 GHz is best     Impedance    The impedance of the arrestor should match all of the other devices in the circuit between  the transmitter and the antenna  Impedance is usually 50 ohms in most wireless LANs     Insertion Loss    The insertion loss should be significantly low  perhaps around 0 1 dB  so as not to cause  high RF signal amplitude loss as the signal passes through the arrestor     VSWR Rating    The VSWR rating of a good quality lightning arrestor will be around 1 1 1  but some may  be as high as 1 5 1  The lower the ratio of the device  the better  since reflected voltage  degrades the main RF signal     Warranty  Regardless of the quality of a lightning arrestor  the unit can malfunction  S
488. tem  in the suggested solution     Chapter 11     Site Survey Fundamentals 343    Recommendations for equipment vendors are very important  and require       Knowing what each vendor specializes in  their strengths and weaknesses      What level of support is available from a vendor and how easy it is to get  replacement hardware      The costs and part numbers of the appropriate hardware    When a customer reads the site survey report  they may determine that another vendor  offers better or cheaper hardware that can provide the same functionality  Part of the  recommendation should be to include justification for the decision in choosing a  particular vendor   s hardware  In creating a report for the purpose of equipment  recommendations and installation  create a detailed equipment purchase list  bill of  materials  that covers everything needed to implement a solution that meets the  customer s requirements as stated in the site survey  If you recommend three solutions   inexpensive  moderate  and full featured  for example   three complete equipment lists  should be provided  Do not omit anything  because it is better to overestimate the  potential cost of a solution  and then provide ways to come in under budget  An  important note here is that some customers have contractual obligations to buy a  particular brand of wireless LAN hardware  In order to identify this situation  the site  surveyor may choose to ask this question as part of the network manager s interview  
489. ter 11     Site Survey Fundamentals      Data rate  measured in megabits second or Mbps     Signal strength  measured in dBm     Noise floor  measured in dBm       Signal to noise ratio     SNR      measured in dB     Walking fast will speed up the survey process  but may cause you to miss dead spots or  potential interference sources  Using a very simple example  Figure 11 15 illustrates  what the recordings might look like on a floor plan or blueprint     FIGURE 11 15 Marked up floor plan                               we wl  ie a     4              i a          it wet  gt  ESD cre Soru Neise  N A   g    kS NeNase HeC  yi A VO y KGA 3 Jpn    MiL lel  pA  amp  Es NO       e     lt n     mps  io fl   GF  fa gs hs aw  gt     D oped  oft yee  md ae ib    RECA i ED  es    ad    Wat wa     S  pore   tictiwn     ROA w i 3   D  vew  WLAN  Ig   UNAFFECTED    A aan i 3     A nigel iv  ry ont  8 x ait a       J RA 7N VALD nt    19  o           i    For outdoor coverage areas  be prepared to walk farther and record more  If planning an  outdoor installation of an access point  to cover areas between campus buildings for  example   then there are usually a very limited number of places where the access point  may be mounted  For this reason  moving the access point around is rarely required   Sitting atop a building is the most common place in such an installation  There are  potentially many more sources of interference or blockage to a wireless LAN signal  outdoors than indoors     Sit
490. ter 9  Troubleshooting Wireless LAN Installations 245    use of the RTS CTS protocol  Since hidden nodes cause collisions  and collisions mainly  affect larger packets  you may be able to overcome the hidden node problem by using the  packet size threshold setting for RTS CTS  What this setting essentially does is tell the  access point to transmit all packets that are greater in size than    x     your setting  using  RTS CTS and to transmit all other packets without RTS CTS  If the hidden node is only  having a minor impact on network throughput  then activating RTS CTS might have a  detrimental effect on throughput     Try using RTS CTS in the    On    mode as a test to see if your throughput is positively  affected  If RTS CTS increases throughput  then you have most likely confirmed the  hidden node problem  You will encounter some additional overhead when using  RTS CTS  but your overall throughput should increase over what it was when the hidden  node problem occurred     Increase Power to the Nodes    Increasing the power  measured in milliwatts  of the nodes can solve the hidden node  problem by allowing the cell around each node to increase in size  encompassing all of  the other nodes  This configuration enables the non hidden nodes to detect  or hear  the  hidden node  If the non hidden nodes can hear the hidden node  the hidden node is no  longer hidden  Because wireless LANs use the CSMA CA protocol  nodes will wait their  turn before communicating with the acce
491. ternal servers secure     A  C  E  10baseTx  10 100baseTx  and 100baseFx are common wired Ethernet ports  on access points  bridges  and even workgroup bridges  Cat5 or short haul fiber is  used to connect these devices to the wired distribution system  10baseFL is  basically obsolete  and using gigabit Ethernet connectivity such as 1000baseSx  would increase costs of the infrastructure device but add no further speed to the  network  Since access points and bridges only have a maximum of 100 Mbps on the  fastest available wireless LAN system  802 11a devices in proprietary mode   there  is no need to have a connection on the wired segment faster than 100 Mbps     A  Workgroup bridges are client devices capable of advanced filtering and  connecting a group of wired users on a wired network segment to another wired  segment over a wireless link as a single  collective client     D  All wireless LAN radios are half duplex  Because radios can either transmit or  receive on a particular frequency  but not both simultaneously  full duplex  communications are not possible on a wireless LAN without using multiple radios  and multiple frequencies at one time  Wireless LAN radio manufacturers do not  build their radios to be full duplex capable because of the very high cost of doing so     A  B  Ethernet converters are used to connect wired stations to the wireless network  via standard wired Ethernet ports that are already installed in the computer  Serial  converters are used to con
492. ters  but only one of them might offer MAC filtering where you can explicitly  permit and explicitly deny stations  rather than only one or the other  Some access points  support full duplex 10 100 wired connectivity whereas others offer only 10baseT half  duplex connectivity on the wired side     Understanding what features to expect on a SOHO  mid range  and enterprise level  access points is an important part of being a wireless network administrator  Below is a  list of features to look for in SOHO and enterprise categories  This listing is by no means  comprehensive because manufacturers release new features frequently at each level  This  list is meant to provide an idea of where to start in looking for an appropriate access  point  These lists build upon each other beginning with the SOHO level access point   meaning that every higher level includes the features of the layer below it     Small Office  Home Office  SOHO       MAC filters     WEP  64  or 128 bit      USB or console configuration interface     Simple built in web server configuration interface    Simple custom configuration application    Enterprise      Advanced custom configuration application     Advanced built in web server configuration interface    Telnet access     SNMP management     802 1x EAP      RADIUS client     VPN client and server     Routing  static dynamic     Chapter 4     Wireless LAN Infrastructure Devices 79      Repeater functions    Bridging functions    Using the manufacturer   s 
493. th DCF   not as a stand alone operational mode so that  once the access point is finished polling   other stations can continue to contend for the transmission medium using DCF mode     Distributed Coordination Function Interframe Space  DIFS     DIFS is the longest fixed interframe space and is used by default on all 802 1 1 compliant  stations that are using the distributed coordination function  Each station on the network  using DCF mode is required to wait until DIFS has expired before any station can  contend for the network  All stations operating according to DCF use DIFS for  transmitting data frames and management frames  This spacing makes the transmission  of these frames lower priority than PCF based transmissions  Instead of all stations  assuming the medium is clear and arbitrarily beginning transmissions simultaneously  after DIFS  which would cause collisions   each station uses a random back off algorithm  to determine how long to wait before sending its data     The period of time directly following DIFS is referred to as the contention period  CP    All stations in DCF mode use the random back off algorithm during the contention  period  During the random back off process  a station chooses a random number and  multiplies it by the slot time to get the length of time to wait  The stations count down  these slot times one by one  performing a clear channel assessment  CCA  after each slot  time to see if the medium is busy  Whichever station s random back o
494. that apply   A  The 50 United States only  B  The 50 United States and the District of Columbia    C  The 50 United States  the District of Columbia  and all U S  possessions such as  Puerto Rico  Guam  and the Virgin Islands    D  All of Europe    15     16     17     18     19     Chapter 6     Wireless LAN Organizations and Standards 171    Which one of the following is a disadvantage of a license free radio frequency band     A   B   C   D     No licensing fees or paperwork  Regulation by the FCC in the US  Possible random interference with other networks    Lower cost of equipment     ISM  stands for which one of the following     A   B   C   D     International Scientific Measurement  International Standards Makers  Industrial Standard Machine    Industrial  Scientific  and Medical    Which of the following does NOT specify use of equipment that uses the 2 4 GHz    ISM band   A  802 11  B  802 1la  C  802 11b  D  802 11g  E  802 1x    Which one of the following defines the acronym  UNII      A   B   C   D     Unlicensed National Information Invention  Unlicensed National Information Infrastructure  Unlicensed Nominal Information Infrastructure    Unlicensed National Innovation Infrastructure    Which one of the following is the key standards maker for most information  technology arenas in the United States     A     moo    WECA  FCC  IEEE  WLANA  IrDA    172 Chapter 6     Wireless LAN Organizations and Standards    20  Which one of the following was the FIRST IEEE stan
495. that operate at 3 10 Mbps  but just as with DSSS  if the system is  operating at speeds other than    amp  2 Mbps  it cannot be expected to automatically  communicate with other 802 1 1 compliant devices     802 11 compliant products operate strictly in the 2 4 GHz ISM band between 2 4000 and  2 4835 GHz  Infrared  also covered by 802 11  is light based technology and does not  fall into the 2 4 GHz ISM band     IEEE 802 11b    Though the 802 11 standard was successful in allowing DSSS as well as FHSS systems  to interoperate  the technology has outgrown the standard  Soon after the approval and  implementation of 802 11  DSSS wireless LANs were exchanging data at up to 11 Mbps   But  without a standard to guide the operation of such devices  there came to be problems    Chapter 6     Wireless LAN Organizations and Standards 161    with interoperability and implementation  The manufacturers ironed out most of the  implementation problems  so the job of IEEE was relatively easy  create a standard that  complied with the general operation of wireless LANs then on the market  It is not  uncommon for the standards to follow the technology in this way  particularly when the  technology evolves quickly     IEEE 802 11b  referred to as  High Rate  and Wi Fi     specifies direct sequencing   DSSS  systems that operate at 1  2  5 5 and 11 Mbps  The 802 11b standard does not  describe any FHSS systems  and 802 11b compliant devices are also 802 1 1 compliant  by default  meaning they a
496. the  hallway do not have adequate coverage  Additionally  the high gain antenna doesn t have  a large enough vertical beamwidth to cover the floors immediately above and below  In  this case  you might decide to use two patch antennas   one at each end of the hallway  facing each other  They would both be low gain with wide horizontal and vertical  beamwidths such that the rooms on each side of the hallway are covered along with the  floors above and below  Due to the low gain  the antennas may each only cover a portion   maybe half  of the length of the hallway     As you can see from this example  appropriate selection of beamwidths to have the right  coverage pattern is essential and may likely determine how much hardware  such as  access points  needs to be purchased for an installation     Free Space Path Loss    Free Space Path Loss  or just Path Loss  refers to the loss incurred by an RF signal due  largely to  signal dispersion  which is a natural broadening of the wave front  The wider  the wave front  the less power can be induced into the receiving antenna  As the  transmitted signal propagates  its power level decreases at a rate inversely proportional to    Chapter 5     Antennas and Accessories 117  the distance traveled and proportional to the wavelength of the signal  The power level  becomes a very important factor when considering link viability    The Path Loss equation is one of the foundations of link budget calculations  Path Loss    represents the singl
497. thernet Compatibility Alliance  European Telecommunications Standards Institute  Wireless LAN Association  Competing Technologies  HomeRF  Bluetooth  Infrared Data Association  IrDA   Infrared  Wireless LAN Interoperability Forum  WLIF   Key Terms  Review Questions  Answers to Review Questions  Chapter 7 802 11 Network Architecture  Locating a Wireless LAN  Service Set Identifier  Beacons  Time Synchronization  FH or DS Parameter Sets  SSID Information  Traffic Indication Map  TIM   Supported Rates  Passive Scanning  Active Scanning  Authentication  amp  Association  Authentication  Association  States of Authentication  amp  Association  Unauthenticated and Unassociated  Authenticated and Unassociated  Authenticated and Associated  Authentication Methods  Open System Authentication  Shared Key Authentication  Authentication Security  Shared Secrets  amp  Certificates  Emerging Wireless Security Solutions  Service Sets  Basic Service Set  BSS   Extended Service Set  ESS   Independent Basic Service Set  IBSS   Roaming  Standards  Connectivity  Reassociation  VPN Use  Layer 2  amp  3 Boundaries  Load Balancing    Contents xi    160  161  161  162  162  163  163  164  164  165  166  166  167  168  168  173  175  176  176  176  177  177  177  177  177  178  179  180  180  180  181  181  181  181  182  182  183  184  185  185  189  189  190  190  191  192  194  194  195  196  198    xii Contents    Chapter    Chapter    8    9    Power Management Features  Continuous Aware Mode  P
498. tion function  PCF    An IEEE 802 11 mode that enables contention free  frame transfer based on a priority mechanism  stations are polled for the need for frame  transmission  Enables time bounded services that support the transmission of voice and  video     Point to Point Protocol  PPP    A protocol that provides router to router and host to   network connections over both synchronous and asynchronous circuits  PPP is the  successor to SLIP     polarization     in reference to antennas  it is the physical orientation of the antenna in a  horizontal or vertical position    portal   A logical point where MSDUs from a non IEEE 802 11 LAN enter the  distribution system of an extended service set wireless network     Post Office Protocol  POP    a protocol used to retrieve e mail from a mail server   Power over Ethernet  PoE      method of injecting DC current over the unused pairs in    Cat5 cabling to power access points in remote locations  reduces difficulty in access point  installation in terms of power installation    370 Glossary    processing gain   Equal to the data rate of the spread direct sequence signal divided by  the data rate of the actual data     Radio Frequency  RF    A generic term for radio based technology     Radio Frequency Line of sight     line of sight in which at least 60 to 80 percent of the  Fresnel Zone is clear of obstructions  necessary for proper radio communications among  wireless LANs    reassociation service   enables an IEEE 802 11 station
499. tively  Some of these  include the Superbowl  the Olympics  circuses  carnivals  fairs  festivals  construction  companies  and others  Wireless LANs are well suited to these types of environments     Hospitals and other healthcare facilities benefit greatly from wireless LANs  Some  valuable uses of wireless LANs within these facilities include doctors using wireless  PDAs to connect to the networks and mobile diagnostic carts that nurses can move from  room to room to connect to the patient and the network  Wireless networks allow doctors  and nurses to perform their jobs more efficiently using these new devices and associated  software     Industrial facilities  such as warehouses and manufacturing facilities  utilize wireless  networks in various ways  A good example of an industrial wireless LAN application is  shipping companies whose trucks pull into the dock and automatically connect to the  wireless network  This type of networking allows the shipping company to become  automated and more efficient in handling the uploading of data onto the central servers     Summary    Wireless technology has come a long way since its simple military implementations  The  popularity and level of technology used in wireless LANs continues to grow at an  incredible rate  Manufactures have created a myriad of solutions for our varying wireless  networking needs  The convenience  popularity  availability  and cost of wireless LAN  hardware provide us all with many different solutions  
500. tivity and client server  connectivity  providing a seamless logon process for the client  A similar configuration  can also be used with wireless VPN solutions     Corporate Security Policy    A company that uses wireless LANs should have a corporate security policy that  addresses the unique risks that wireless LANs introduce to the network  The example of  an inappropriate cell size that allows the drive by hacker to gain network access from the  parking lot is a very good example of one item that should be included in any corporate  security policy  Other items that should be covered in the security policy are strong  passwords  strong WEP keys  physical security  use of advanced security solutions  and  regular wireless LAN hardware inventories  This list is far from comprehensive   considering that security solutions will vary between organizations  The depth of the    292 Chapter 10     Wireless LAN Security    wireless LAN section of the security policy will depend on the security requirements of  organization as well as the extent of the wireless LAN segment s  of the network     The benefits of having  implementing  and maintaining a solid security policy are too  numerous to count  Preventing data loss and theft  preventing corporate sabotage or  espionage  and maintaining company secrets are just a few  Even the suggestion that  hackers could have stolen data from an industry leading corporation may cause  confidence in the company to plummet     The beginning of 
501. to have a contention free period  The superframe consists of a beacon  a contention free  period  CFP  and a contention period  CP      Telnet   A terminal emulation program for TCP IP networks such as the Internet  The  Telnet program runs on your computer and connects your PC to a server on the network   You can then enter commands through the Telnet program and they will be executed as if  you were entering them directly on the server console  This enables you to control the  server and communicate with other servers on the network  To start a Telnet session  you  must log in to a server by entering a valid username and password  Telnet is a common  way to remotely control Web servers     Time Division Multiple Access  TDMA    a technology for delivering digital wireless  service using time division multiplexing  TDM   TDMA works by dividing a radio  frequency into time slots and then allocating slots to multiple calls  In this way  a single    372 Glossary    frequency can support multiple  simultaneous data channels  TDMA is used by  HomeRF  HiperLAN 1 and  2  and cellular systems  GSM      Traffic Indication Map  TIM      transmitted by the access point to indicate to sleeping  stations the presence of buffered transmissions for a particular station    Transmission Control Protocol  TCP    A commonly used protocol for establishing and  maintaining communications between applications on different computers  TCP provides  full duplex  acknowledged  and flow controlled ser
502. to seal cable connections and use drip loops     DC Voltage Passing    Some RF splitters have the option of passing the required DC voltage to all output ports  in parallel  This feature is helpful when there are RF amplifiers  which power internal  circuitry with DC voltage originating from a DC voltage injector in a wiring closet   located on the output of each splitter port     RF Connectors    RF connectors are specific types of connection devices used to connect cables to devices  or devices to devices  Traditionally  N  F  SMA  BNC   amp  TNC connectors  or  derivatives  have been used for RF connectors on wireless LANs     In 1994  the FCC and DOC  now Industry Canada  ruled that connectors for use with  wireless LAN devices should be proprietary between manufacturers  For this reason   many variations on each connector type exist such as      N type     Reverse polarity N type     Reverse threaded N type    Figure 5 31 illustrates the N and SMA type connectors     Chapter 5     Antennas and Accessories 139    FIGURE 5 31 Sample N type and SMA connectors            es  we    The N Connector The SMA Connector    Choosing an RF Connector    There are five things that should be considered when purchasing and installing any RF  connector  and they are similar in nature to the criteria for choosing RF amplifiers and  attenuators     l     RF Cables    The RF connector should match the impedance of all other wireless LAN  components  generally 50 ohms   This is normally not 
503. to use Power over Ethernet one of the two following device combinations are  needed      Injector     PoE compatible device   or     Injector     non PoE compatible device     Picker     Chapter 5     Antennas and Accessories 125    FIGURE 5 21 PoE using an injector    Active Hub   or Switch    er    Powered    Ethernet    gt   Passive Hub   or Switch    ee Unpowered Ethernet lay     gt  _   _    Power Injector    Types of Injectors    There are 2 basic types of Injectors available  passive and fault protected  Each type is  typically available in a variety of voltage levels and number of ports     Passive injectors place a DC voltage onto a CATS cable  These devices provide no  short circuit or over current protection     Fault protected injectors provide continuous fault monitoring and protection to detect  short circuits and over current conditions in the CATS cable     Types of Picker   Taps    Two basic types of pickers and taps are available  passive and regulated  A passive tap  simply takes the voltage from the Cat5 cable and directs it to the equipment for direct  connection  Therefore  if the injector injects 48 VDC  Volts of Direct Current   then 48  VDC will be produced at the output of the passive tap     A regulated tap takes the voltage on the Cat5 cable and converts it to another voltage   Several regulated voltages are available  5 VDC  6 VDC   amp  12 VDC  allowing a wide  variety of non PoE equipment to be powered through the Cat5 cable     Voltage and Pino
504. trator can administer it or can work effectively with the existing  RADIUS administrator     Something else to think about when user authentication is considered is that wireless  security has many faces     man in the middle attacks  eavesdropping     free rides     etc     and you have to think about all of them  One way to ensure the ongoing security of your  network when users are mobile is to ensure that users are re authenticated every time  their IP address or network attachment point changes     Security Needs    Choose a security solution that fits your organizations    needs and budget  both for today  and tomorrow  Wireless LANs are gaining popularity so fast partly because of their ease  of implementation  That means that a wireless LAN that began as an access point and 5  clients could quickly grow to 15 access points and 300 clients across a corporate campus   The same security mechanism that worked just fine for one access point will not be as  acceptable  or as secure  for 300 users  An organization could waste money on security  solutions that will be quickly outgrown as the wireless LAN grows  In many cases   organizations already have security in place such as intrusion detection systems     Chapter 10     Wireless LAN Security 297    firewalls  and RADIUS servers  When deciding on a wireless LAN solution  leveraging  existing equipment is an important factor in keeping costs down     Use Additional Security Tools    Taking advantage of the technology that 
505. trators can determine where and how  the breach occurred     Because so few people in the IT industry are educated in wireless technology  the  likelihood of employee turnover causing network disruption  or at least vulnerability  is  much higher when wireless LANs are part of the network  This turnover of employees is  another very important reason that thorough documentation on wireless LAN  administration and security functions be created and maintained     Public Wireless Networks    It is inevitable that corporate users with sensitive information on their laptop computers  will connect those laptops to public wireless LANs  It should be a matter of corporate  policy that all wireless users  whether wireless is provided by the company or by the  user  run both personal firewall software and antiviral software on their laptops  Most  public wireless networks have little or no security in order to make connectivity simple  for the user and to decrease the amount of required technical support     Even if upstream servers on the wired segment are protected  the wireless users are still  vulnerable  Consider the situation where a hacker is sitting at an airport  considered a     Wi Fi hot spot     This hacker can sniff the wireless LAN  grab usernames and  passwords  log into the system  and then wait for unsuspecting users to login also  Then   the hacker can do a ping sweep across the subnet looking for other wireless clients  find  the users  and begin hacking into their la
506. ts  each suited to fit a particular  need  After studying this section  you will understand which antenna and mount best  meets your needs and why     Omni directional  Dipole  Antennas    The most common wireless LAN antenna is the dipole antenna  Simple to design  the  dipole antenna is standard equipment on most access points  The dipole is an omni   directional antenna  because it radiates its energy equally in all directions around its axis   Directional antennas concentrate their energy into a cone  known as a  beam   The  dipole has a radiating element just one inch long that performs an equivalent function to  the  rabbit ears  antennas on television sets  The dipole antennas used with wireless  LANs are much smaller because wireless LAN frequencies are in the 2 4 GHz microwave  spectrum instead of the 100 MHz TV spectrum  As the frequency gets higher  the  wavelength and the antennas become smaller     Figure 5 1 shows that the dipole s radiant energy is concentrated into a region that looks  like a doughnut  with the dipole vertically through the  hole  of the  doughnut   The  signal from an omni directional antenna radiates in a 360 degree horizontal beam  If an  antenna radiates in all directions equally  forming a sphere   it is called an isotropic  radiator  The sun is a good example of an isotropic radiator  We cannot make an  isotropic radiator  which is the theoretical reference for antennas  but rather  practical  antennas all have some type of gain over tha
507. ts  sense the medium as being busy and wait to transmit  After the CFP the CP begins   during which all stations using DCF mode may contend for the medium and the access  point switches to DCF mode     Figure 8 5 illustrates a short timeline for a wireless LAN using DCF and PCF modes     222 Chapter 8     MAC and Physical Layers    FIGURE 8 5 DCF PCF mode timeline    22s Gs    Stations in DCF mode would  normally contend for access here    Access point seizes  control of medium here    Contention  Period       The process is somewhat simpler when a wireless LAN is only in DCF mode  because  there is no polling and  hence  no superframe  This process is as follows     1  Stations wait for DIFS to expire    2  During the CP  which immediately follows DIFS  stations calculate their random  back off time based on a random number multiplied by a slot time    3  Stations tick down their random time with each passing slot time  checking the  medium  CCA  at the end of each slot time  The station with the shortest time  gains control of the medium first     4  A station sends its data     5  The receiving station receives the data and waits a SIFS before returning an ACK  back to the station that transmitted the data     6  The transmitting station receives the ACK and the process starts over from the  beginning with a new DIFS     Figure 8 6 illustrates a timeline for a DCF mode wireless LAN  Keep in mind that this  timeline is a few milliseconds long  The whole process happens many
508. tts  Other than its obvious numerical meaning  this tiny number has  little intuitive meaning to the layperson and will likely be ignored or misread  Decibels  allow us to represent these numbers by making them more manageable and  understandable  Decibels are based on a logarithmic relationship to the previously  explained linear measurement of power  watts  Concerning RF  a logarithm is the  exponent to which the number 10 must be raised to reach some given value     If we are given the number 1000 and asked to find the logarithm  log   we find that log  1000   3 because 10     1000  Notice that our logarithm  3  is the exponent  An  important thing to note about logarithms is that the logarithm of a negative number or of  zero does not exist     Log   100    undefined   Log  0    undefined     On the linear watt scale we can plot points of absolute power  Absolute power  measurement refers to the measurement of power in relation to some fixed reference  On  most linear scales  watts  degrees Kelvin  miles per hour   the reference is fixed at zero   which usually describes the absence of the thing measured  zero watts   no power  zero  degrees Kelvin   no thermal energy  zero MPH   no movement  On a logarithmic scale   the reference cannot be zero because the log of zero does not exist  Decibels are a  relative measurement unit unlike the absolute measurement of milliwatts     Gain and Loss Measurements    Power gain and loss are measured in decibels  not in watts  because 
509. tured to meet the new rules of 8 31 00 are referred to as using Wide Band  Frequency Hopping  These changes in rules are explained in detail in the FHSS  section     B  With the FCC rules regarding FHSS equipment  a manufacturer could either  implement a piece of equipment to meet the old rules or the new rules  Under the  old rules  the maximum power output was   watt  but under the new rules  due to a  significant increase in carrier bandwidth  the power limit was changed to 125 mW     D  There are 14 channels specified for use by the FCC and IEEE for spread  spectrum technologies in the 2 4 GHz ISM band  Of these  only 11 are allowed to  be used in the United States     11     12     13     14     15     16     17     18     19     20     Chapter 3     Spread Spectrum Technology 69    A  C  Implementations of DSSS hardware meeting the 802 11b standard are both  fast and inexpensive  One problem that might be encountered with FHSS systems is  compatibility  There are two standards manufacturers can choose to use for creating  their hardware   802 11 and OpenAir   but both are losing popularity  They are  incompatible standards and there is no organization performing OpenAir and 802 11  FHSS testing for interoperability  Buying two OpenAir FHSS systems is no  guarantee of interoperability     C  The 802 11b standard supports DSSS devices only whereas 802 11 supports  DSSS and FHSS  This being the case  an administrator could have a situation where  there are 802 11 FHSS node
510. tween these buildings  some amount of control over usage must be  implemented  If this link was installed for the express purpose of Internet access for  these users  then filtering out every protocol except SMTP  POP3  HTTP  HTTPS  FTP   and any instant messaging protocols would limit users from being able to access internal  company file servers for example  The ability to set protocol filters such as these is very  useful in controlling utilization of the shared medium  Figure 10 5 illustrates how  protocol filtering works in a wireless LAN     282 Chapter 10     Wireless LAN Security    FIGURE 10 5 Protocol Filtering    Router        ee Wireless qm  Point Workgroup o    Bridge      7D      gt   lt   treed      HTTP  HTTPS  SMTP   POP3   amp  FTP only          functionality than others  Ethertype  layer 3 protocols  layer 4 ports  and layer 7    eS Manufacturers vary in their implementation of protocol filters  some offering more    application filters are common     Attacks on Wireless LANs    A malicious hacker can seek to disable or attempt to gain access to a wireless LAN in  several ways  Some of these methods are     1   2   3   4     Passive attacks  eavesdropping   Active attacks  connecting  probing  and configuring the network   Jamming attacks    Man in the middle attacks    The above list is by no means exhaustive  and some of these methods can be orchestrated  in several different ways  Itis beyond the scope of this book to present every possible  means of wir
511. twork  WAN    A network that interconnects users over a wide area   usually encompassing different metropolitan areas     Wired Equivalent Privacy  WEP    An optional IEEE 802 11 function that offers frame  transmission privacy similar to a wired network  The Wired Equivalent Privacy  generates secret shared encryption keys that both source and destination stations can use  to alter frame bits to avoid disclosure to eavesdroppers     wireless bridge     layer 2 device used to connect remote sites wirelessly to the main  network  can be used as repeaters to extend the range of the segment    Wireless Ethernet Compatibility Alliance  WECA      Founded in 1999  this  organization s charter is to certify interoperability of IEEE 802 11b products and to  promote Wi Fi    as the global wireless LAN standard across all market segments     Glossary 373    Wireless Fidelity      Wi Fi         the WECA certification standard signifying  interoperability among 802 11b products    Wireless LAN Association  WLANA    Founded March 1996  this organization s charter  is the promotion of wireless LAN education  technology  and awareness    Wireless LAN Interoperability Forum  WLIF    founded 1996  this organization s charter  was to assist manufacturers of wireless LAN equipment in interoperability testing   Vendors who participated had their equipment certified to the  OpenAir  interoperability  specification     Wireless Metropolitan Area Network  WMAN    Provides communications links  betw
512. tworking technologies     Each chapter contains subsections that correspond to the different topics covered on the  CWNA exam  Each topic is explained in detail  followed by a list of key terms that you  should know after comprehending each chapter  Then  we close each chapter with  comprehensive review questions that cause you to apply the knowledge you    ve just  gained to real world scenarios     Finally  we have a complete glossary of wireless LAN terms for continual reference to  you as you use your new wireless LAN knowledge on the job     Why Become CWNA Certified     Planet3 Wireless  Inc  has created a certification program  not unlike those of Cisco   Novell  and Microsoft  that gives networking professionals a standardized set of  measurable wireless LAN skills and employers a standard level of wireless LAN  expertise to require of their employees     Passing the CWNA exam proves you have achieved a certain level of knowledge about  wireless networking  Where Cisco and Microsoft certifications will prove a given level  of knowledge about their products  the CWNA exam is proof of achievement about  wireless technology that can be applied to any vendor   s products  The wireless LAN  industry is still in its infancy  much like the world of networking LANs and WANs was  in the early 1990s  Learning wireless networking sets you apart from your peers and  your competition     For some positions  certification is a requirement for employment  advancement  or  increases 
513. type of problem is incurred when using VLANs  Switches see users as roaming across  VLAN boundaries     198 Chapter 7     802 11 Network Architecture    FIGURE 7 16 Roaming Across VLANs    Router    Server f    A       Blocked    Router     i VLAN VLAN VLAN  A B c  Switch    A hardware solution to this problem is to deploy all access points on a single VLAN  using a flat IP subnet for all access points so that there is no change of IP address for  roaming users and a Mobile IP solution isn t required  Users are then routed as a group  back into the corporate network using a firewall  a router  a gateway device  etc  This  solution can be difficult to implement in many instances  but is generally accepted as the   standard  methodology  There are many more instances where an enterprise must  forego use of a wireless LAN altogether because such a solution just isn t practical                 Even with all access points on a single subnet  mobile users can still encounter coverage  problems  If a user moves out of range  into a coverage hole  or simply suspends the  device to prolong battery life  all application end points are lost and users in these  situations again are also forced to log in again and find their way back to where they left  off             There are several layer 3 solutions on the market as of this writing  One such solution  is an access point that has a built in VPN server and performs full routing  including  routing protocols such as RIP  Another solutio
514. uch as ice falling from an  overhead tree     2 4 GHz signals may be attenuated by up to 0 05 dB km  0 08 dB mile  by torrential rain   4 inches hr   Thick fog produces up to 0 02 dB km  0 03 dB mile  attenuation  At 5 8  GHz  torrential rain may produce up to 0 5 dB km  0 8 dB mile  attenuation  and thick  fog up to 0 07 dB km  0 11 dB mile   Even though rain itself does not cause major  propagation problems  rain will collect on the leaves of trees and will produce attenuation  until it evaporates     Wind    Wind does not affect radio waves or an RF signal  but it can affect the positioning and  mounting of outdoor antennas  For example  consider a wireless point to point link that  connects two buildings that are 12 miles  20 km  apart  Taking into account the  curvature of the Earth  Earth bulge   and having only a five degree vertical and horizontal  beam width on each antenna  the positioning of each antenna would have to be exact  A  strong wind could easily move one or both antennas enough to completely degrade the  signal between the two antennas  This effect is called  antenna wind loading   and is  illustrated in Figure 9 15     FIGURE 9 15    Chapter 9  Troubleshooting Wireless LAN Installations 257    Antenna Wind Loading on Point to point networks    Beam arrives    at receiver  oie aS ie  No Wind    Beam misses  receiver  Wind moves H  pal antenna  Other similarly extreme weather occurrences like tornadoes or hurricanes must also be  considered  If you are imp
515. ults     Wireless Workgroup Bridges    Similar to and often confused with wireless bridges are wireless workgroup bridges   WGB   The biggest difference between a bridge and a workgroup bridge is that the  workgroup bridge is a client device  A wireless workgroup bridge is capable of  aggregating multiple wired LAN client devices into one collective wireless LAN client     In the association table on an access point  a workgroup bridge will appear in the table as  a single client device  The MAC addresses of devices behind the workgroup bridge will  not be seen on the access point  Workgroup bridges are especially useful in  environments with mobile classrooms  mobile offices  or even remote campus buildings  where a small group of users need access into the main network  Bridges can be used for  this type of functionality  but if an access point rather than a bridge is in place at the  central site  then using a workgroup bridge prevents the administrator from having to buy  an additional bridge for the central site  Figure 4 11 shows an example of a wireless  workgroup bridge  while Figure 4 12 illustrates where it is used on a wireless LAN     In an indoor environment in which a group of users is physically separated from the main  body of network users  a workgroup bridge can be ideal for connecting the entire group  back into the main network wirelessly  Additionally  workgroup bridges may have  protocol filtering capabilities allowing the administrator to control traffi
516. used in the wireless LAN  For example  if you were using only a 2 4  GHz wireless LAN  a splitter that is specified for use at up to 3 GHz would be best     Impedance    The impedance of the splitter  which is usually 50 ohms in most wireless LANs  should  match all of the other devices in the circuit between the transmitter and the antenna     VSWR Rating    As with many other RF devices  VSWR ratings should be as close to 1 1 as possible   Typical VSWR ratings on RF splitters are  lt  1 5 1  Low VSWR ratings on splitters are  much more critical than on many other devices in an RF system  because reflected RF  power in a splitter may be reflected in multiple directions inside the splitter  affecting  both the splitter input signal and all splitter output signals     High Isolation Impedance    High isolation impedance between ports on an RF splitter is important for several  reasons  First  a load on one output port should not affect the output power on another  output port of the splitter  Second  a signal arriving into the output port of a splitter  such  as the received RF signal  should be directed to the input port rather than to another  output port  These requirements are accomplished through high impedance between  output connectors  Typical isolation  resistance causing separation  is 20 dB or more  between ports     Power Ratings    Splitters are rated for power input maximums  which means that you are limited in the  amount of power that you can run feed into your
517. using the same values  1 Watt   30 dBm  at the  intentional radiator and a 12 dBi antenna  in this case the antenna will be a directional  antenna   The total output power is still 16 Watts  In this example  since the antenna    FIGURE 6 3    Chapter 6     Wireless LAN Organizations and Standards 159    gain is 12 dBi  the power at the intentional radiator must be reduced by 2 dB  as opposed  to a 6 dB reduction in the previous example  This reduction will result in an intentional  radiator power of 28 dBm  30 dBm     2 dB   or about 630 mW and an EIRP of 40 dBm   28 dBm   12 dBi   or 10 Watts  In the case of PtP links  the power at the intentional  radiator is still limited to 1 Watt  but the limit of the EIRP increases with the gain of the  antenna  Figure 6 3   It is very important to clearly distinguish between the rules that  govern PtP and PtMP wireless links     Point to Point Power Limit Table                                     Power at Antenna   Max Antenna Gain EIRP EIRP   dBm   dBi   dBm   watts    30 6 36 4  29 9 38 6 3  28 12 40 10  27 15 42 16  26 18 44 25  25 21 46 39 8  24 24 48 63  23 27 50 100  22 30 52 158                      The specific information contained in Figure 6 3 is not covered on the CWNA exam   The information is provided as a resource for your administrative tasks     The FCC has a different rule for PtP links in the upper UNII band  Fixed point to point  UNII devices operating in the 5 725   5 825 GHz band may employ transmitting antennas  
518. ut Standards    Although the IEEE is working on standards such as 802 3af for PoE  a definitive standard  has yet to be introduced  At present  different equipment vendors use different PoE  voltages and Cat5 pin configurations to provide the DC power  Therefore  it is important  to select the appropriate PoE devices for each piece of equipment you plan to power  through the Cat5 cable  The IEEE has standardized on the use of 48 VDC as the injected  PoE voltage  The use of this higher voltage reduces the current flowing through the Cat5  cable and therefore increases the load and increases the Cat5 cable length limitations   Where the maximum cable length has not been a major consideration  some vendors have  chosen 24 VDC and even 12 VDC as their injected voltage     126 Chapter 5     Antennas and Accessories    Fault Protection    The primary purpose of fault protection is to protect the cable  the equipment  and the  power supply in the event of a fault or short circuit  During normal operation  a fault  may never occur in the Cat5 cable  However  there are many ways a fault might be  introduced into the Cat5 cable  including the following examples       The attached device may be totally incompatible with PoE and may have some  non standard or defective connection that short circuits the PoE conductors  At  present  most non PoE devices have no connection on the PoE pins       Incorrectly wired Cat5 cabling  Cut or crushed Cat5 cable  in which the  insulation on one or mo
519. veying an area to determine the contours of RF coverage in  order to ensure proper wireless LAN operation through appropriate wireless LAN  hardware placement    spectrum analyzer   An instrument that identifies the amplitude of signals at various  frequencies     spread spectrum   A modulation technique that spreads a signal   s power over a wide  band of frequencies  The main reasons for this technique is that the signal becomes much  less susceptible to electrical noise and interferes less with other radio based systems     Shared Wireless Access Protocol  SWAP      a combination of CSMA and TDMA  it is  a specification for wireless voice and data networking in the home    Spanning Tree Protocol  STP    a link management protocol that is part of the IEEE  802 1 standard  802 1d  for media access control bridges  Using the spanning tree  algorithm  STP provides path redundancy while preventing undesirable loops in a  network that are created by multiple active paths between stations  Loops occur when  there are alternate routes between hosts  To establish path redundancy  STP creates a tree  that spans all of the switches in an extended network  forcing redundant paths into a  standby  or blocked  state  STP allows only one active path at a time between any two  network devices  this prevents the loops  but establishes the redundant links as a backup  if the initial link should fail     superframe     a special timeframe during which Point Coordination Function is allowed  
520. vice to upper layer protocols and  applications     Transport Layer   Provides mechanisms for the establishment  maintenance  and orderly  termination of virtual circuits  while shielding the higher layers from the network  implementation details     Trivial File Transfer Protocol  TFTP    a simple form of the File Transfer Protocol   FTP   TFTP uses the User Datagram Protocol  UDP and provides no security features   Often used by servers to boot diskless workstations  X terminals  and routers     Unlicensed National Information Infrastructure  UNII  bands     a segment of RF  frequencies allocated by the FCC for unlicensed data communications  the three bands  are  5 15 to 5 25 GHz  5 25 to 5 35 GHz  and 5 725 to 5 825 GHz    vertical polarization     in reference to antennas  it is the electrical field that is  perpendicular to the surface of the earth    Virtual Local Area Network  VLAN      layer 2 functionality used to logically segment a  large network into smaller domains    Voltage Standing Wave Ratio  VSWR    caused by an impedance mismatch between  connectors or devices  it is a reflected AC signal in the opposite direction of the main  signal flow  usually out of phase with the main signal  and causes power loss on the input  signal line due to the out of phase signal being added to the main signal    whip antenna   A small  portable antenna often used with wireless transmitters or  receivers  such as hand held 2 way radios and cellular telephones      Wide Area Ne
521. vity for wireless nodes     Methodology    Discuss in detail the methodology for conducting the site survey  Tell the customer  exactly what was done  how it was done  and why it was done     RF Coverage Areas    Detail RF coverage patterns and ranges specific to the requirements that were collected   If the client said that they needed 5 Mbps for all users in one particular area  correlate the  findings and suggestions against that particular requirement  The concentric circle  drawings on the floor plan or blueprint will be the center of attention here  It may also be  helpful at this point to detail access point placements that did not work  Document and  explain any coverage gaps     Throughput    Detail bandwidth and throughput findings  showing exactly where in the facility there  will likely be the greatest and the least of each  also using the drawings made on blueprint  copies  Be sure to include screenshots of the actual numeric measurements that were  recorded  These exact numbers help determine the proper solution     Interference    Detail RF interference and obstruction findings correlating them to the particular  requirements that were collected during the network management interview  Include the  location and other details  such as pictures  about each source of interference  Include  suggestions for removing RF interference sources where possible  and explain how the  RF interference sources will affect the wireless LAN once installed     Problem Areas    Di
522. w Medi C Fot pro       Outdoor Surveys  For outdoor surveys  record the following items on a copy or sketch of the property       Trees  buildings  lakes  or other obstructions between link sites      Ifin winter  locate trees that will grow leaves during other seasons and may  interfere with the RF link      Visual and RF line of sight between transmitter and receiver      Link distance  note  if greater than 7 miles  11 7 km   calculate compensation for  Earth bulge       Weather hazards  wind  rain  snow  lightning  common to the area    Tower accessibility  height  or need for a new tower      Roof accessibility  height    Before You Begin    Once these preparatory items are checked and recorded  the next step is either to begin  the RF site survey  or to obtain more information  There are several sources from the  above items that could require further information from the client  including       Who will provide ladders and or lifts for mounting access points on high  ceilings     330 Chapter 11     Site Survey Fundamentals      Is the client willing or able to remove trees that interfere with the Fresnel zone     Ifa new tower is needed  does the client have the necessary permits        Does the client have necessary permissions to install antennas on the roof and  will the roof support a tower if needed       Do the building codes require plenum rated equipment to be used     Weather hazards may be easier to compensate for if you also reside in the area because  you m
523. wer aware polling mode    An independent basic service set is also commonly referred to as which one of the  following     A  Ad hoc mode   B  Infrastructure mode  C  Network mode  D     Power save polling mode    The 802 11 standard specifies which of the following authentication processes   Choose all that apply     A  Open System authentication  B  802 1x EAP   C  Shared Key authentication  D  RADIUS    Using power save polling mode  PSP  in a wireless LAN will result in which of the  following  Choose all that apply     A  Increased throughput on the network due to less overhead traffic  B  Decreased throughput on the network due to more overhead traffic  C  Network traffic is not effected by using PSP   D  Longer battery life on the clients that use PSP    In an ad hoc network  every client station buffers packets   A  This statement is always true  B  This statement is always false    C  It depends on whether one station is acting as a gateway    206 Chapter 7     802 11 Network Architecture    11     12     13     14     15     Which of the following are functions of the beacon frame     A     B  C   D    Load balancing all clients across multiple access points  Broadcasting the SSID so that clients can connect to the access point  Synchronizing the time between the access point and clients    Allowing client authentication with the access point when using Shared Key  authentication    What is passive scanning used for in a wireless LAN     A   B   C     D     Allows c
524. which is used with wireless LANs     Unlicensed National Information Infrastructure  UNII  Bands    The 5 GHz UNII bands are made up of three separate 100 MHz wide bands  which are  used by 802 1 1a compliant devices  The three bands are known as the lower  middle  and  upper bands  Within each of these three bands  there are four non overlapping OFDM  channels  each separated by 5 MHz  The FCC mandates that the lower band be used  indoors  the middle band be used indoors or outdoors  and the upper band be allocated for  outdoor use  Since access points are mostly mounted indoors  the 5 GHz UNII bands  would allow for 8 non overlapping access points indoors using both the lower and middle  UNII bands     Chapter 6     Wireless LAN Organizations and Standards 157    Lower Band    The lower band is bound by 5 15 GHz and 5 25 GHz and is specified by the FCC to have  a maximum output power of 50 mW  When implementing 802 1 1a compliant devices   the IEEE has specified 40 mW  80   as the maximum output power for 802 1 1a   compliant radios  reserving the lower band for indoor operation only        within the limits of the law  but still not be compliant with the 802 11a standards  Itis  also important to distinguish between what the law allows for and what the standard  specifies  In some rare installation scenarios  you may be required to work outside the  specifications of the standards in order to accomplish a business goal     es It is important to realize that it is possible 
525. will be bent such that its direction changes  When passing  through such a medium  some of the wave will be reflected away from the intended  signal path  and some will be bent through the medium in another direction  as illustrated  in Figure 2 5     Refraction  Incoming RF    Reflected RF       Refracted RF    Refraction can become a problem for long distance RF links  As atmospheric conditions  change  the RF waves may change direction  diverting the signal away from the intended  target     22 Chapter 2     RF Fundamentals    FIGURE 2 6    Diffraction    Diffraction occurs when the radio path between the transmitter and receiver is obstructed  by a surface that has sharp irregularities or an otherwise rough surface  At high  frequencies  diffraction  like reflection  depends on the geometry of the obstructing object  and the amplitude  phase  and polarization of the incident wave at the point of diffraction     Diffraction is commonly confused with and improperly used interchangeably with  refraction  Care should be taken not to confuse these terms  Diffraction describes a  wave bending around an obstacle  Figure 2 6   whereas refraction describes a wave  bending through a medium  Taking the rock in the pond example from above  now  consider a small twig sticking up through the surface of the water near where the rock hit  the water  As the ripples hit the stick  they would be blocked to a small degree  but to a  larger degree  the ripples would bend around the twig  This
526. wireless   data rates of 5 5 and 11 Mbps are specified     IEEE 802 11b devices operating at 5 5 or 11 Mbps are able to communicate with 802 11  devices operating at 1 or 2 Mbps because the 802 11b standard provides for backward  compatibility  Users employing 802 11 devices do not need to upgrade their entire  wireless LAN in order to use 802 11b devices on their network     A recent addition to the list of devices using direct sequence technology is the IEEE  802 11a standard  which specifies units that can operate at up to 54 Mbps  Unfortunately  for 802 11 and 802 11b device users  802 11a is wholly incompatible with 802 11b  because it does not use the 2 4 GHz band  but instead uses the 5 GHz UNII bands     For a short while this was a problem because many users wanted to take advantage of the  direct sequence technology delivering data rates of 54 Mbps  but did not want to incur the  cost of a complete wireless LAN upgrade  So recently the IEEE 802 11g standard was  approved to specify direct sequence systems operating in the 2 4 GHz ISM band that can    56 Chapter 3     Spread Spectrum Technology    deliver up to 54 Mbps data rate  The 802 11g technology became the first 54 Mbps  technology that was backward compatible with 802 11 and 802 11b devices              As of this writing  the first draft of the 802 11g standard has been approved as a future  standard  but the specifications of this new standard are still in draft form  More  information about 802 11g can be 
527. wireless gateway  allowing a user  to roam across a layer 3 boundary  User roaming may even be defined as part of an  enterprise wireless gateway policy  allowing the user to roam only where the  administrator allows  Some enterprise wireless gateways support packet queuing and  prioritization  user tracking  and even time date controls to specify when users may  access the wireless network     MAC spoofing prevention and complete session logging are also supported and aid  greatly in securing the wireless LAN  There are many more features that vary  significantly between manufacturers  Enterprise wireless gateways are so comprehensive  that we highly recommend that the administrator take the manufacturer s training class  before making a purchase so that the deployment of the enterprise wireless gateway will  go more smoothly     Consultants finding themselves in a situation of having to provide a security solution for  a wireless LAN deployment with many access points that do not support advanced  security features might find enterprise wireless gateways to be a good solution   Enterprise wireless gateways are expensive  but considering the number of management  and security solutions they provide  usually worth the expense     Configuration and Management    Enterprise wireless gateways are installed in the main the data path on the wired LAN  segment just past the access point s  as seen in Figure 4 19  Enterprise wireless gateways  are configured through console ports  u
528. wireless network     224 Chapter 8     MAC and Physical Layers    FIGURE 8 7    RTS CTS handshaking    Sending Access Point Receiving  Client Client       Request To Send  RTS    Oz SS  os   SI  gt     Clear To Send  CTS                      lt   Data   gt   Acknowledgement  ACK   q qa    Configuring RTS CTS    There are three settings on most access points and nodes for RTS CTS       Off    On    On with Threshold    When RTS CTS is turned on  every packet that goes through the wireless network is  announced and cleared between the transmitting and receiving nodes prior to  transmission  creating a significant amount of overhead and significantly less throughput   Generally  RTS CTS should only be used in diagnosing network problems and when only  very large packets are flowing across a congested wireless network  which is rare     However  the    on with threshold    setting allows the administrator to control which  packets  over a certain size   called the threshold  are announced and cleared to send by  the stations  Since collisions affect larger packets more than smaller ones  you can set the  RTS CTS threshold to work only when a node wishes to send packets over a certain size   This setting allows you to customize the RTS CTS setting to your network data traffic  and optimize the throughput of your wireless LAN while preventing problems like  Hidden Node     Figure 8 8 depicts a DCF network using the RTS CTS protocol to transmit data  Notice  that the RTS and CTS tra
529. with directional gain up to 23 dBi without any corresponding reduction in the transmitter  peak output power  For fixed  point to point UNII transmitters that employ a directional  antenna gain greater than 23 dBi  a 1 dB reduction in peak transmitter power for each 1  dBi of antenna gain in excess of 23 dBi is required  Notice that by having an output  power maximum of  30 dBm at the intentional radiator  and having a maximum of 23  dBi antenna gain before any reduction in transmitter output power is required  this allows  these 5 GHz UNII systems to have an output of 200 Watts EIRP     Institute of Electrical and Electronics Engineers    The Institute of Electrical and Electronics Engineers  IEEE  is the key standards maker  for most things related to information technology in the United States  The IEEE creates  its standards within the laws created by the FCC  The IEEE specifies many technology  standards such as Public Key Cryptography  IEEE 1363   FireWire  IEEE 1394    Ethernet  IEEE 802 3   and Wireless LANs  IEEE 802 11              The website for the IEEE is www ieee org    160    Chapter 6     Wireless LAN Organizations and Standards    It is part of the mission of the IEEE to develop standards for wireless LAN operation  within the framework of the FCC rules and regulations  Following are the four main  IEEE standards for wireless LANs that are either in use or in draft form       802 11    802 11b    802 1la    802 11g    IEEE 802 11    The 802 11 standard was t
530. ximum data rate  of 4 Mbps at close range  but as a light based technology  other sources of IR light can  interfere with IR transmissions  The typical data rate of an IR device is about 115 kbps   which is good for exchanging data between handheld devices  An important advantage  of IR networks is that they do not interfere with spread spectrum RF networks  For this  reason  the two are complementary and can easily be used together     Security    The security of IR devices is inherently excellent for two main reasons  First  IR cannot  travel though walls at such a low power  2 mW maximum  and second  a hacker or  eavesdropper must directly intercept the beam in order to gain access to the information  being transferred  Single room networks that need wireless connectivity must be assured  of security benefit from IR networks  With PDAs and laptop computers  IR is used for  point to point connectivity at very short range so security would be almost irrelevant in  these instances     Stability    Though IR will not pass through walls  it will bounce off walls and ceilings  which aids  in single room networking  Infrared is not disrupted by electromagnetic signals  which  promotes the stability of an IR system  Broadcast IR devices are available and can be  mounted on the ceiling  An IR broadcast device  which is analogous to an RF antenna   will transmit the IR carrier and information in all directions so that these signals can be  picked up by nearby IR clients  For power c
531. y      Standards support    Narrowband Interference    The advantages of FHSS include a greater resistance to narrow band interference  DSSS  systems may be affected by narrow band interference more than FHSS because of the use  of 22 MHz wide contiguous bands instead of the 79 MHz used by FHSS  This fact may  be a serious consideration if the proposed wireless LAN site is in an environment that has  such interference present     Cost    Chapter 3     Spread Spectrum Technology 59    When implementing a wireless LAN  the advantages of DSSS may be more compelling  than those of FHSS systems  particularly when driven by a tight budget  The cost of  implementing a direct sequence system is far less than that of a frequency hopping  system  DSSS equipment is widely available in today   s marketplace  and its rapid  adoption has helped in driving down the cost  Only a few short years ago  equipment was  only affordable by enterprise customers  Today  very good quality 802 11b compliant PC  cards can be purchased for under  100  FHSS cards complying with either the 802 11 or  OpenAir standards typically run between  150 and  350 in today s market depending on  the manufacturer and the standards to which the cards adhere     Co location    FIGURE 3 7    An advantage of FHSS over DSSS is the ability for many more frequency hopping  systems to be co located than direct sequence systems  Since frequency hopping systems  are    frequency agile    and make use of 79 discrete channels  fr
532. y would it not be a good idea to have a number of access points in repeater mode  in series  Choose all that apply     A  Throughput would be reduced to unacceptable levels    B  The access points would all be required to be physically connected to the  network    C  Data corruption can occur over the series of hops back to the root access point    D  Legacy serial devices would not be able to communicate with the root access  point    2  You are installing a wireless LAN in a factory  and the laptop client computers have  no USB support  Which one of the following client devices could be used as a  stand alone client connection to the wireless LAN     A  ISA adapter   B  PCI adapter   C  PCMCIA card   D  Ethernet converter    3  You need to connect two wired networks together that currently share no network  connectivity between them  Using only access points to connect the networks  what  mode would the access points need to be placed in     A  Root mode  B  Repeater mode  C  Bridging mode    4  When an access point connects to another access point wirelessly for the purpose of  extending the wireless segments to client out of range of the access point connected  to the wired segment  the access point not connected to the wired LAN segment is in    mode   A  Root  B  Repeater  C  Bridge    5  Wireless bridges are used for which of the following functions  Choose all that  apply   A  Connecting mobile users to the wired LAN  B  Point to multipoint configurations  C  Building
533. your RF device can    see        The general behavior of an RF signal is to grow wider as it is transmitted farther   Because of this type of behavior  the RF signal will encounter objects in its path that will  reflect  diffract  or otherwise interfere with the signal  When an RF wave is reflected off  an object  water  tin roof  other metal object  etc   while moving towards its receiver   multiple wave fronts are created  one for each reflection point   There are now waves  moving in many directions  and many of these reflected waves are still headed toward the  receiver  This behavior is where we get the term multipath  as shown in Figure 9 1   Multipath is defined as the composition of a primary signal plus duplicate or echoed  wave fronts caused by reflections of waves off objects between the transmitter and  receiver  The delay between the instant that the main signal arrives and the instant that  the last reflected signal arrives is known as delay spread     Multipath       Line of Sight                  Reflected Path                   Chapter 9  Troubleshooting Wireless LAN Installations 237    Effects of Multipath    Multipath can cause several different conditions  all of which can affect the transmission  of the RF signal differently  These conditions include     Decreased Signal Amplitude  downfade      Corruption     Nulling     Increased Signal Amplitude  upfade     Decreased Signal Amplitude    When an RF wave arrives at the receiver  many reflected waves may
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
N`oubliez pas de parler de Dynamique et de la Cvthèque à vos  取扱説明書 - シャープ  Feuille d`information sur les sels d`aluminium  XIM EDGE USER MANUAL  DATALAYER.NET™ - Creative Data Technologies, Inc.  “RESTAVEC – from Haitian Slave Child to Middle  User Manual - I  Information Power Parts    PCCtest 560 User`s Manual    Copyright © All rights reserved. 
   Failed to retrieve file