802.11 WLAN Systems Tutorial

Table of contents

  • Introduction
  • What is a WLAN? What is 802.11?
  • Pros and Cons of 802.11
  • Basic 802.11 Operation
  • WLAN network topology
  • Channel scanning and synchronization
  • Authentication and association
  • Data transfer mechanism
  • WLAN network basics
  • WLAN Network Topologies
  • Scanning
  • Active scan, Passive scan
  • Synchronization
  • Physical layer (radio) technologies
  • Protocol architecture
  • 802.11 MAC protocol
  • 802.11 Authentication
  • 802.11 Association
  • Data Transfer
  • Security protocols in WLANs
  • Advanced topics in WLANs
  • Wireless LAN standards
  • IEEE 802.11 Protocol Architecture
  • The 802.11 PHY (RF) Layer
  • Radio channels and frequencies
  • Modulation technologies
  • PHY data rates used
  • Improving data transfer: diversity and polarization
  • Frequency Channel Allocation for 802.11a/b/g
  • Physical Layer Technologies
  • Direct Sequence Spread Spectrum
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • WLAN testing challenges and test metrics
  • PHY Data rates for 802.11a/b/g
  • Wireless LANs (WLANs) are LANs that use RF instead of cable or optical fiber
  • IEEE 802.11-1999 is the basic standard governing wireless LANs
  • Antenna Diversity and Polarization
  • Conclusion


Excerpt from course

WLAN technology is one of the faster growing networking technologies.

Wireless LAN technology provides a very good business model as it uses free unlicensed frequencies and provides a wireless last hop to IP networking which is free too.

Though WLAN protocol was initially designed for high bandwidth delay insensitive data applications, WLANs today are being used for a wide variety of traffic types and applications .

Some of the applications of WLANs include, corporate wireless data networks, hotspots, medical facilities using VoIP over WLAN phones and badges, department stores using wireless barcode scanners, consumer electronics using wireless communications like wireless TVs, wireless cameras.

Size : 947.50 Kb
File type : pdf
Downloads: 1254
Created: 2016-12-27
802.11 WLAN Systems Tutorial

Others WLAN Tutorials

WLAN network basics

Others related eBooks about 802.11 WLAN Systems Tutorial

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Download free eBook about Network cryptography and Nmap, Secrets of Network Cartography: A Comprehensive Guide to Nmap....

Linux Network Administrators Guide

This tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....

Neural Networks and Deep Learning

This book covers both classical and modern models in deep learning. The chapters of this b..., download free Neural Networks tutorial in PDF (512 pages) created by Charu C. Aggarwal ....

VoIP Tutorial in PDF

This pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....

Introduction to Computer Network

This tutorial is aimed to learn the fundamental of computer network, many questions and answers about the popular technology used for networking systems (wireless network, cellular communication, wap, bluetooth, wimax,..). Free pdf tutorial designed to beginners....

Download Hacking tutorial in PDF

This tutorial is about testing penetration and ethical hacking, designed to students. Free training document in PDF under 47 pages by Dr. Bruce V. Hartley....

Network Topologies

Download free network topologies tutorial course material and training in PDF file under 4 pages by Maninder Kaur....

Voice over IP overview in pdf

Download free training tutorial in pdf about VoIP (Voice over IP),document in 46 pages designated to intermediate level-users....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...

Networking Technologies

Download free Netwoking technologies tutorial , course tutorial training on pdf under 222 pages by Raleigh Center....