SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
This document is customized and covers basic wireless information and Knowledge for group of users who
are very new to wireless technology.
 Need of Wireless
 Wireless Fundamentals
 Regulatory Bodies
 Wireless Topologies
 Adhoc VS Infrastructure network
 Service Set
 Wireless Network Types
 Cisco Unified Wireless Network Components
 Cisco Unified Controller- Based Solution
 Access points Models
 Wireless LAN Controller Models
 Access Points Types
 FAQs
Need of Wireless
 Convenience: All notebook computers and many mobile phones today come equipped
with the WiFi technology required to connect directly to a wireless LAN.
Mobility: Employees can stay connected to the network even when they're not at their
desks. People in meetings can access documents and applications. Salespeople can check
the network for important details from any location.
Ease of setup: When you don't have to run physical cables through a location,
installation can be quick and cost-effective. Wireless LANs also make it easier to bring
network connectivity to hard-to-reach locations, such as a warehouse or factory floor.
Scalability: As your business operations grow, you may need to quickly expand your
network. Wireless networks can typically expand with existing equipment, while a wired
network might require additional wiring.
Security: Controlling and managing access to your wireless network is important to its
success. Advances in WiFi technology provide robust security protections so your data is
easily available to only the people you allow access.
Cost: It can cost less to operate a wireless LAN, which eliminates or reduces wiring costs
during office moves, reconfigurations, or expansions.
RF Principles
 Wavelength: The physical distance from one point of the cycle to the same point in the
next cycle is called a wavelength , which is usually represented by the Greek symbol λ
(lambda).
 Frequency : Number of times radio waves repeat their pattern per second. It is
measured in Hertz.
 Reflection: When the radio wave hits the obstacle at a low angle, the wave (the entire
wave, or part of it) might bounce on the obstacle. This phenomenon is called reflection.
 Multipath: A signal sent to a station travels in a straight line and reaches the
destination. A few microseconds later, copies of the same signal reflected on walls,
ceiling, and obstacles also reach the destination.
 Refraction: Refraction occurs when a wave changes direction. This change in direction
usually happens when a wave passes from one medium to another (from air to water, for
example).
 Scattering: Reflection also occurs in the air itself, bouncing on dust or micro drops of
water (humidity). These multiple reflections are described as scattering .
 Free Path Loss: Even without obstacles, a radio wave gets weaker as it moves away
from the emitting source because the energy of the wave spreads .
 RSSI: Because the RF wave might have been affected by obstacles in its path, it is
important to determine how much signal is received by the other endpoint. The value
that indicates the amount of power received is called Received Signal Strength Indicator
(RSSI).
Regulatory Bodies
 IEEE : It defines how the signal is sent carrying data over unlicensed frequency band.
IEEE maintains and creates technical standards and protocols used by wireless LAN
devices.
 Federal Communications Commission (FCC): In America and other countries in
America continents, FCC restrict the power and frequency can be used in that region.
 ETSI (European Telecommunications Standards Institute): Controls Frequency
and power in Europe and other countries like Israel and some other countries.
 Wi-Fi Alliance: It ensures that wireless products that are available to consumers
provide the features that the products claim to have.
Wireless Topologies
 Wireless personal-area networks (WPAN): Have a short range (up to 5–10 meters),
commonly use the 802.15 family of specifications to connect two or a few devices with low
power consumption. Bluetooth is an example of WPAN protocol.
 Wireless local-area networks (WLAN): Consume more power but extend the connection
to about 300 feet (100 meters).
 Wireless metropolitan-area network (WMAN): Extend the range to a larger geographic
area, such as a city or suburb. WMANs typically use licensed frequencies . Although
implementations in the ISM bands can also be found. WiMAX is an example of WMAN
protocol.
 Wireless wide-area network (WWAN): Provide connectivity over a wide geographical area.
Usually, WWANs are networks used for mobile phone and data service and are operated by
carriers. WWANs typically use licensed frequencies.
Adhoc Vs Infrastructure Network
 Adhoc Mode:
◦ Also known as Peer-to-Peer network.
◦ A first station defines the radio parameters and a connection name; the other stations
just need to detect the connection and adjust their own parameters to connect to the
first station and to each other.
◦ As soon as wireless devices connect to each other over a wireless network, a Basic
Service Set (BSS) is formed.
◦ The wireless network they form is called an Independent Basic Service Set (IBSS).
 Infrastructure Mode: The AP functions as a translational bridge between 802.3 wired
media and 802.11 wireless media.
◦ BSS is the service provided by the AP.
Service Set
 Basic Service Area (BSA) :
 Wireless Cell created by an AP – CISCO term.
 Independent basic service set ( IBSSD):
 Wireless network created by a Laptop.
 Used in ADHOC Connection.
 Basic service set – (BSS):
 As soon as wireless devices (called “stations” in the 802.11 standard) connect to each
other over a wireless network a BSS is formed.
 Distribution System (DS):
 The wired section of the network that can be reached through the AP.
 Extended service set – (ESS):
 When the distribution system links two APs, or two cells, the group is called extended
service set.
 Allows mobility roaming of wireless devices within a distributed system.
 Service Set Identifier – (SSID):
 Wireless Workgroup or Domain Name or simply a wireless network.
 ASCI string providing a name to a wireless network.
 Basic Service Set Identifier –(BSSID):
 AP Radio MAC address associated with a SSID.
 Multiple Basic Service Set Identifier –(MBSSID):
 Having multiple SSIDs configured.
Wireless Network Types
19
 The first version of the 802.11 standard, released in 1997,
 It described FHSS 1 Mbps, and DSSS 1 Mbps and 2 Mbps in the 2.4 GHz spectrum,
describing 14 channels.
 802.11 is a rich family of protocols.
 The standard was revised in 2007 to integrate all the amendments published over the
previous years (integrating 802.11a, b, d, e, g, h, i, and j). This cumulative version of
the standard is called 802.11-2007
802.11 continue…
 802.11 was modified almost as soon as it was created to allow for faster speeds.
 802.11b was published in 1999
 It described CCK to bring the data rate to 5.5 Mbps and 11 Mbps.
802.11b continue…
 802.11b was also too slow. A new amendment was published in 2003 introducing
OFDM to the 2.4 GHz band, and effectively. It allowing rates up to 54 Mbps.
 802.11g is built to be backward compatible with 802.11b
 When an 802.11b station is detected in the cell, the AP informs the cell in its
information broadcasts. These broadcasts contain 2 bits set to 1: “non-ERP (that is,
non-802.11g) present” and “use protection.
 The downside of this protection mechanism is wasted time before each 802.11g
frame. This protection mechanism typically divides the overall throughput of the cell
by 3.
802.11g continue…
 The 802.11a amendment was published in 1999.
 802.11a uses OFDM only (6 Mbps to 54 Mbps).
 802.11a offers up to 23 nonoverlapping channels.
 Channels are 20 MHz apart.
802.11a continue…
Primary 802.11n Components
40-MHz Channels Improved MAC
Efficiency
Multiple-Input, Multiple-
Output (MIMO)
Two adjacent 20-MHz
channels are
combined to create a
single 40-MHz
channel.
MAC aggregation packs
smaller packets into a
single unit.
Block acknowledgment
improves throughput.
Maximal Ratio Combining
(MRC)
Beam forming
Spatial multiplexing
 802.11g and 802.11a use 20-
Mhz channels.
 802.11n aggregates
two carriers to increase the
throughput
 802.11 requires acknowledgment of each frame.
 802.11n uses block acknowledgment for constituent frames.
802.11
Header
Packet
802.11
ACK
802.11n
ACK
802.11n
Header
Packet 802.11n
Header
Packet 802.11n
Header
Packet
 MRC is used by the receiver with multiple antennas to optimally combine
energies from multiple receive chains. An algorithm eliminates out-of-
phase signal degradation.
 The emitter can send the same signal from several antennas. By carefully
coordinating these signals based on the feedback transmitted by the 802.11n
receiving station, the emitter aims at making these signals be received in phase, thus
increasing the signal power level at the receiving station, allowing for longer range or
higher throughput.
 The emitter can send different simultaneous signals from different radios. The
802.11n receiver will receive these signals on all its radios. Each of the receive radios
independently decode the arriving signals. Then, each receive signal is combined
with the signals from the other radios. This results in additional throughput.
Introduction to  cisco wireless
Network Services
Network Management
Network Unification
Access Points
Client Devices
Introduction to  cisco wireless
1-21
1-21
Access Points Types
Introduction to  cisco wireless
 Extends the AP
coverage
 Dual radio can
create dual half-
duplex
 Overlap of 50%
required
 Throughput
impacted when
single frequency
used
1-19
 A WGB provides wireless
connection from Ethernet port.
 Several devices can benefit if
the WGB is connected to a hub
or a switch.
1-18
 Extend the LAN by
linking LANs
 Usually a few miles
range
 Point to point or hub
and spoke
1-20
 Devices are connected with redundant connection between nodes; no
single point of failure
1-21
 What is a Wireless Network?
A wireless local-area network (WLAN) uses radio waves to connect devices, such as
laptops, to the Internet and to your business network and applications
 How Far Does the Signal Reach?
A wireless router or access point's signal typically extends up to approximately 300
feet.
 Who Uses WLANs?
WLANs are frequently offered in public places such as cafes, hotels, and airport
lounges. In addition, many businesses have wireless networks throughout their
office buildings or campuses for employee and guest use.
 What Equipment Do I Need?
Most laptops have built-in wireless networking. If yours doesn't, you'll need a
wireless network adapter card, which is typically inexpensive and easy to install.
Many routers act as WLAN access points. They connect multiple computers (and
wireless-capable printers) to a single WLAN and to the Internet.
You can extend WLANs throughout an area by placing additional wireless access
points in various locations. The access points extend the wireless signal's range and
strength.
1-21
 How Can I Secure a WLAN?
There are many ways to secure your WLAN, including:
◦ Data encryption, which only gives authorized users access to information over
your wireless network
◦ User authentication, which identifies computers trying to access the network
◦ Secure access for visitors and guests
◦ Control systems, which protect the laptops and other devices that use the
network
 Can two computers communicate using the wireless client cards without
an access point (AP)?
◦ Yes, two computers can communicate using the wireless client cards without an
AP. Connect the PC cards in Ad Hoc mode. This step eliminates peer interaction,
and one PC becomes the master.
 Can you share the internet between two computers?
◦ No, you cannot share the internet. You need to install additional software to share
an internet connection.
1-21
Questions ????
Drop an email to
EMEA&APAC_MSI_ENS@hcl.com

Mais conteúdo relacionado

Mais procurados

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationBryan Slayman
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Wireless lan controller
Wireless lan controllerWireless lan controller
Wireless lan controllerGenx System
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Wi-Fi 6E.pptx
Wi-Fi 6E.pptxWi-Fi 6E.pptx
Wi-Fi 6E.pptxAsmSalim
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentalsibrahimnabil17
 
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesWLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesPramod Kumar
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus seriesAnwesh Dixit
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2Yaser Rahmati
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityHughes Systique Corporation
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptxEmanHashem6
 

Mais procurados (20)

Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Wireless lan controller
Wireless lan controllerWireless lan controller
Wireless lan controller
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Ccna
CcnaCcna
Ccna
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Wi-Fi 6E.pptx
Wi-Fi 6E.pptxWi-Fi 6E.pptx
Wi-Fi 6E.pptx
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
 
VTP
VTPVTP
VTP
 
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesWLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus series
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
CCNA
CCNACCNA
CCNA
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptx
 

Semelhante a Introduction to cisco wireless

Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineershimanshu yadav
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
computer network
computer networkcomputer network
computer networkRedHeart11
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...AssocaKazama
 

Semelhante a Introduction to cisco wireless (20)

Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineers
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
computer network
computer networkcomputer network
computer network
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 

Último

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 

Último (20)

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 

Introduction to cisco wireless

  • 1. This document is customized and covers basic wireless information and Knowledge for group of users who are very new to wireless technology.
  • 2.  Need of Wireless  Wireless Fundamentals  Regulatory Bodies  Wireless Topologies  Adhoc VS Infrastructure network  Service Set  Wireless Network Types  Cisco Unified Wireless Network Components  Cisco Unified Controller- Based Solution  Access points Models  Wireless LAN Controller Models  Access Points Types  FAQs
  • 4.  Convenience: All notebook computers and many mobile phones today come equipped with the WiFi technology required to connect directly to a wireless LAN. Mobility: Employees can stay connected to the network even when they're not at their desks. People in meetings can access documents and applications. Salespeople can check the network for important details from any location. Ease of setup: When you don't have to run physical cables through a location, installation can be quick and cost-effective. Wireless LANs also make it easier to bring network connectivity to hard-to-reach locations, such as a warehouse or factory floor. Scalability: As your business operations grow, you may need to quickly expand your network. Wireless networks can typically expand with existing equipment, while a wired network might require additional wiring. Security: Controlling and managing access to your wireless network is important to its success. Advances in WiFi technology provide robust security protections so your data is easily available to only the people you allow access. Cost: It can cost less to operate a wireless LAN, which eliminates or reduces wiring costs during office moves, reconfigurations, or expansions.
  • 6.  Wavelength: The physical distance from one point of the cycle to the same point in the next cycle is called a wavelength , which is usually represented by the Greek symbol λ (lambda).  Frequency : Number of times radio waves repeat their pattern per second. It is measured in Hertz.  Reflection: When the radio wave hits the obstacle at a low angle, the wave (the entire wave, or part of it) might bounce on the obstacle. This phenomenon is called reflection.  Multipath: A signal sent to a station travels in a straight line and reaches the destination. A few microseconds later, copies of the same signal reflected on walls, ceiling, and obstacles also reach the destination.  Refraction: Refraction occurs when a wave changes direction. This change in direction usually happens when a wave passes from one medium to another (from air to water, for example).  Scattering: Reflection also occurs in the air itself, bouncing on dust or micro drops of water (humidity). These multiple reflections are described as scattering .
  • 7.  Free Path Loss: Even without obstacles, a radio wave gets weaker as it moves away from the emitting source because the energy of the wave spreads .  RSSI: Because the RF wave might have been affected by obstacles in its path, it is important to determine how much signal is received by the other endpoint. The value that indicates the amount of power received is called Received Signal Strength Indicator (RSSI).
  • 9.  IEEE : It defines how the signal is sent carrying data over unlicensed frequency band. IEEE maintains and creates technical standards and protocols used by wireless LAN devices.  Federal Communications Commission (FCC): In America and other countries in America continents, FCC restrict the power and frequency can be used in that region.  ETSI (European Telecommunications Standards Institute): Controls Frequency and power in Europe and other countries like Israel and some other countries.  Wi-Fi Alliance: It ensures that wireless products that are available to consumers provide the features that the products claim to have.
  • 11.  Wireless personal-area networks (WPAN): Have a short range (up to 5–10 meters), commonly use the 802.15 family of specifications to connect two or a few devices with low power consumption. Bluetooth is an example of WPAN protocol.  Wireless local-area networks (WLAN): Consume more power but extend the connection to about 300 feet (100 meters).  Wireless metropolitan-area network (WMAN): Extend the range to a larger geographic area, such as a city or suburb. WMANs typically use licensed frequencies . Although implementations in the ISM bands can also be found. WiMAX is an example of WMAN protocol.  Wireless wide-area network (WWAN): Provide connectivity over a wide geographical area. Usually, WWANs are networks used for mobile phone and data service and are operated by carriers. WWANs typically use licensed frequencies.
  • 13.  Adhoc Mode: ◦ Also known as Peer-to-Peer network. ◦ A first station defines the radio parameters and a connection name; the other stations just need to detect the connection and adjust their own parameters to connect to the first station and to each other. ◦ As soon as wireless devices connect to each other over a wireless network, a Basic Service Set (BSS) is formed. ◦ The wireless network they form is called an Independent Basic Service Set (IBSS).
  • 14.  Infrastructure Mode: The AP functions as a translational bridge between 802.3 wired media and 802.11 wireless media. ◦ BSS is the service provided by the AP.
  • 16.  Basic Service Area (BSA) :  Wireless Cell created by an AP – CISCO term.  Independent basic service set ( IBSSD):  Wireless network created by a Laptop.  Used in ADHOC Connection.  Basic service set – (BSS):  As soon as wireless devices (called “stations” in the 802.11 standard) connect to each other over a wireless network a BSS is formed.  Distribution System (DS):  The wired section of the network that can be reached through the AP.  Extended service set – (ESS):  When the distribution system links two APs, or two cells, the group is called extended service set.  Allows mobility roaming of wireless devices within a distributed system.  Service Set Identifier – (SSID):  Wireless Workgroup or Domain Name or simply a wireless network.  ASCI string providing a name to a wireless network.
  • 17.  Basic Service Set Identifier –(BSSID):  AP Radio MAC address associated with a SSID.  Multiple Basic Service Set Identifier –(MBSSID):  Having multiple SSIDs configured.
  • 19. 19
  • 20.  The first version of the 802.11 standard, released in 1997,  It described FHSS 1 Mbps, and DSSS 1 Mbps and 2 Mbps in the 2.4 GHz spectrum, describing 14 channels.  802.11 is a rich family of protocols.  The standard was revised in 2007 to integrate all the amendments published over the previous years (integrating 802.11a, b, d, e, g, h, i, and j). This cumulative version of the standard is called 802.11-2007 802.11 continue…
  • 21.  802.11 was modified almost as soon as it was created to allow for faster speeds.  802.11b was published in 1999  It described CCK to bring the data rate to 5.5 Mbps and 11 Mbps. 802.11b continue…
  • 22.  802.11b was also too slow. A new amendment was published in 2003 introducing OFDM to the 2.4 GHz band, and effectively. It allowing rates up to 54 Mbps.  802.11g is built to be backward compatible with 802.11b  When an 802.11b station is detected in the cell, the AP informs the cell in its information broadcasts. These broadcasts contain 2 bits set to 1: “non-ERP (that is, non-802.11g) present” and “use protection.  The downside of this protection mechanism is wasted time before each 802.11g frame. This protection mechanism typically divides the overall throughput of the cell by 3. 802.11g continue…
  • 23.  The 802.11a amendment was published in 1999.  802.11a uses OFDM only (6 Mbps to 54 Mbps).  802.11a offers up to 23 nonoverlapping channels.  Channels are 20 MHz apart. 802.11a continue…
  • 24. Primary 802.11n Components 40-MHz Channels Improved MAC Efficiency Multiple-Input, Multiple- Output (MIMO) Two adjacent 20-MHz channels are combined to create a single 40-MHz channel. MAC aggregation packs smaller packets into a single unit. Block acknowledgment improves throughput. Maximal Ratio Combining (MRC) Beam forming Spatial multiplexing
  • 25.  802.11g and 802.11a use 20- Mhz channels.  802.11n aggregates two carriers to increase the throughput
  • 26.  802.11 requires acknowledgment of each frame.  802.11n uses block acknowledgment for constituent frames. 802.11 Header Packet 802.11 ACK 802.11n ACK 802.11n Header Packet 802.11n Header Packet 802.11n Header Packet
  • 27.  MRC is used by the receiver with multiple antennas to optimally combine energies from multiple receive chains. An algorithm eliminates out-of- phase signal degradation.
  • 28.  The emitter can send the same signal from several antennas. By carefully coordinating these signals based on the feedback transmitted by the 802.11n receiving station, the emitter aims at making these signals be received in phase, thus increasing the signal power level at the receiving station, allowing for longer range or higher throughput.
  • 29.  The emitter can send different simultaneous signals from different radios. The 802.11n receiver will receive these signals on all its radios. Each of the receive radios independently decode the arriving signals. Then, each receive signal is combined with the signals from the other radios. This results in additional throughput.
  • 31. Network Services Network Management Network Unification Access Points Client Devices
  • 33. 1-21
  • 34. 1-21
  • 37.  Extends the AP coverage  Dual radio can create dual half- duplex  Overlap of 50% required  Throughput impacted when single frequency used 1-19
  • 38.  A WGB provides wireless connection from Ethernet port.  Several devices can benefit if the WGB is connected to a hub or a switch. 1-18
  • 39.  Extend the LAN by linking LANs  Usually a few miles range  Point to point or hub and spoke 1-20
  • 40.  Devices are connected with redundant connection between nodes; no single point of failure 1-21
  • 41.  What is a Wireless Network? A wireless local-area network (WLAN) uses radio waves to connect devices, such as laptops, to the Internet and to your business network and applications  How Far Does the Signal Reach? A wireless router or access point's signal typically extends up to approximately 300 feet.  Who Uses WLANs? WLANs are frequently offered in public places such as cafes, hotels, and airport lounges. In addition, many businesses have wireless networks throughout their office buildings or campuses for employee and guest use.  What Equipment Do I Need? Most laptops have built-in wireless networking. If yours doesn't, you'll need a wireless network adapter card, which is typically inexpensive and easy to install. Many routers act as WLAN access points. They connect multiple computers (and wireless-capable printers) to a single WLAN and to the Internet. You can extend WLANs throughout an area by placing additional wireless access points in various locations. The access points extend the wireless signal's range and strength. 1-21
  • 42.  How Can I Secure a WLAN? There are many ways to secure your WLAN, including: ◦ Data encryption, which only gives authorized users access to information over your wireless network ◦ User authentication, which identifies computers trying to access the network ◦ Secure access for visitors and guests ◦ Control systems, which protect the laptops and other devices that use the network  Can two computers communicate using the wireless client cards without an access point (AP)? ◦ Yes, two computers can communicate using the wireless client cards without an AP. Connect the PC cards in Ad Hoc mode. This step eliminates peer interaction, and one PC becomes the master.  Can you share the internet between two computers? ◦ No, you cannot share the internet. You need to install additional software to share an internet connection. 1-21
  • 43. Questions ???? Drop an email to EMEA&APAC_MSI_ENS@hcl.com