|
 |
|
|
|
|
CWNA |
Certified Wireless Network Administrator |
|
CWNA Training Course Outline: |
|
~
~
~
~
~ |
Exam Objectives
Practice Test
Exam Registration
Course Outline
Contributors |
|
Overview: |
|
The Wireless LAN Administration course, whether in an academic format or a 5-day fast-track format, provides the networking professional a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to link budget math, including topics from troubleshooting to performing a site survey, this course delivers hands on training that will benefit the novice as well as the experienced network professional. |
|
Audience: |
|
|
This course targets both novice and experienced networking professionals who wish to gain a solid understanding of wireless networking to complement their knowledge of traditional wired networking. |
|
Course Duration: |
|
The Wireless LAN Administration course consists of 40 hours of material, incorporating both lecture and hands-on labs. The class may be taught in a 5-day period. |
|
Certification:
This course may be used - and is the ideal track - for preparing students for the CWNA exam exam PW0-100 |
|
Prerequisites:
It is recommended that all students have at least a basic knowledge of networking
(as exhibited in Net+, CCNA®, CNA, or) prior to enrolling in the course. |
|
|
Course Outline |
|
Radio Frequency (RF) Fundamentals |
|
~
~
~
~ |
RF behavior and properties
Principles of antennas
RF math calculations
Link budgets and system operating margins |
|
Spread Spectrum Technologies |
|
~
~
~
~
~
~
~
~
|
Uses of Spread Spectrum
Frequency Hopping (FHSS)
Direct Sequencing (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)
Packet Binary Convolutional Coding (PBCC)
Comparing DSSS, FHSS, PBCC, and OFDM
Co-location and throughput analysis
Chipping code, processing gain, and spreading functions Channels, data rates, ranges,and
comparisons Channel reuse in pure and mixed environments. |
|
Hardware Installation, Configuration, and Management |
|
~
~
~
~
~
~
~
~
~
~ |
Access points
Wireless bridges
Wireless workgroup bridges
Client devices and accessories
Residential gateways
Enterprise gateways
Wireless LAN switches
PoE Switches and patch panels
VoWiFi systems
Wireless Routers |
|
Troubleshooting Wireless LANs |
|
~
~
~
~
~
~
~ |
Multipath
Hidden node
Near/Far
Identifying and resolving interference problems
Maximizing system throughput
Maximizing co-location throughput
Range considerations |
|
Antennas and Accessories |
|
~
~
~
~
~
~
~
~
~ |
Omni-directional
Semi-directional
Highly-directional
Determining coverage areas
Proper mounting and safety
Performing outdoor/indoor installations
Power over Ethernet (802.3af and proprietary implementations)
Cables and connector usage requirements
Amplifiers, attenuators, lightning arrestors, and splitters |
|
Fresnel Zones and Free Space Path Loss |
|
|
~ |
Interference, Fading, and Multipath |
|
Wireless Network Management
|
|
~
~
~ |
Authentication, Authorization, and Accounting (AAA) functions
Bandwidth control
Wireless Network Management features and products |
|
Physical and MAC Layers |
|
~
~
~
~
~ |
Differences between wireless and Ethernet frames
Collision handling and the use of RTS/CTS
Throughput and dynamic rate selection
Analysis of DCF mode and the CSMA/CA protocol
How frame fragmentation works and its affects on throughout |
|
Wireless LAN Security |
|
~
~
~
~
~
~ |
Analysis of 802.11 security including WEP, WPA, 802.1x/EAP types, and 802.11i
Available security solutions at Layer 2, 3, & 7
Types of network attacks, and protecting the network from attacks
Corporate security policies including baseline practices and common security
solutions
Security recommendations |
|
Organizations and Standards |
|
~
~
~
~
~
~ |
FCC rules
Frequency ranges and channels
IEEE 802.11 family of standards
wireless LAN organizations
proper application of WLANs in distribution and access roles
nteroperability standards |
|
802.11 Network Architecture |
|
~
~
~
~
~
~
~
~
~ |
Joining a wireless LAN
Authentication and association
Basic Service Sets
Extended Service Sets
Independent Basic Service Sets
Distribution systems
Roaming in a wireless LAN
Scanning modes using Beacons and Probe Frames
Power management features |
|
Site Surveying |
|
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~ |
Understanding the need for a site survey
Defining business requirements and justification
Facility analysis
Interviewing network management and users
Identifying bandwidth requirements
Determining contours of RF coverage
Documenting installation problems
Locating interference
Reporting methodology and procedures
Understanding specifics of each vertical market
Understanding the customer's network topology
Creating appropriate documentation during and after the site survey
Understanding FCC/FAA rules regarding towers
Understanding safety hazards
Using appropriate hardware and software to perform the survey |
|
Hands-on Lab Exercises |
|
Lab-1: Infrastructure Mode Connectivity |
|
This exercise demonstrates wireless client devices connecting to an access point. Students configure the access point, wireless stations, and view the association table in the access point in order to understand the process a client goes through to become connected to the network. RF output power is explained and client utilities are viewed to show RF signal quality and strength. Access point features, authentication, association, and encryption are all discussed and demonstrated. 802.11a/b/g technologies are each shown independently to demonstrate channel usage and spread spectrum technologies. |
|
Lab 2: Infrastructure Mode Throughput Analysis |
|
This exercise demonstrates the expected throughput achievable from a wireless station to a wired station and a wireless station to a wireless station using FTP and throughput measuring software. The point of this lab is for the student to understand the half-duplex nature of wireless LANs and how the data rate relates to actual throughput in a real-world scenario. Access point frame relay is
proven and explained. |
|
Lab 3: Ad Hoc Connectivity and Throughput Analysis |
|
In this exercise, wireless clients will connect to each other without use of an access point. Beaconing and channel configuration in an Ad Hoc environment will be explained and throughput will be analyzed and compared against an infrastructure environment. Use of SSIDs, WEP/WPA, channels, and other connectivity factors will be discussed and demonstrated. |
|
Lab 4: Cell Sizing and Automatic Rate Selection (ARS) in an Infrastructure Environment |
|
In this exercise, RF cell sizing and ARS will be demonstrated. Cell sizing is important for seamless connectivity while roaming and for security purposes. ARS is the wireless LAN client's ability to increase or decrease the data rate of the wireless connection in order to maintain optimum connectivity with the access point. Environmental factors will be analyzed. A basic site survey will be performed during this lab exercise using 802.11a/b/g technologies. |
|
Lab 5: Co-Channel and Adjacent Channel Interference |
|
In this exercise, the effects of co-channel and adjacent channel interference are demonstrated and explained. Throughput tests using FTP and throughput measurement software are performed using fully-overlapping,partially-overlapping,andnon-overlapping channels. Effects are analyzed and compared for DSSS and OFDM environments. |
|
Lab 6: Rudimentary Security Features |
|
In this exercise, the security features that are specified in the IEEE 802.11 standard and the new WPA 1.0 interoperability standard are demonstrated in a mobile environment. Wireless clients attempt roaming between access points while using like and different Service Set Identifiers (SSIDs), MAC filters, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) using Pre-shared Keys (WPA-PSK). Configuration, use, and security issues are discussed, explained, and demonstrated in 802.11a/b/g environments. |
|
Lab 7: Dynamic WEP Keys and Mutual Authentication using 802.1x/EAP and RADIUS |
|
The need for wireless security stronger than that which is available in static WEP or WPA-PSK is explained. Port-based access control with EAP authentication is also demonstrated and explained. Cisco's proprietary Lightweight EAP is used with RADIUS for scalability of authentication. The 802.1x/LEAP association process is analyzed and rotating unicast and broadcast keys are explained. User-based authentication is demonstrated and compared to MAC-based authentication used in the 802.11 standard. |
|
Lab 8: Wireless VPNs using PPTP tunnels and RADIUS |
|
In this exercise, the access point is the VPN tunnel server and the PPTP VPN client software built into Microsoft Windows is used to establish an encrypted VPN tunnel from the wireless client to the access point. The access point then sends the authentication request to a RADIUS server and a tunnel is established. Use of the PPTP protocol with encryption in a wireless environment is discussed and explained. |
|
Course Fees does not include Examination Charges |
|
|
|