Cur So CCN A Wireless

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 90

CCNA Wireless

Freddy Len
Instructor

leon_freddy@hotmail.com
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Decibel (dB)

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
The power level that will be radiated froma tha antenna. EIRP,
measured in dBm.

EIRP = 10 dBm (10 mW) + (-5dB loss connects and cable) + 8 dBi

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Receiver expects to find a
signal on a predetermined
frequency, with enough
power to contain useful
data.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
To minimize the effect of a low SNR data loss in cases of
narrowband interference, each bit of data is encoded as a
sequence of 11 bits called a Baker 11 code (1 bit into 11 bits).
0 data bit (10110111000), and 1 data bit (01001000111).
Each bit in a Backer chip can be transmitted by using the
differential binary phase shift keying (DBPSK).
..with a steady chipping rate of 11 millon chips per second, wher
each symbol (1 original bit) contains 11 chips, the transitte data
rate is 1 Mbps.
Chips are taken two at a time and modulated onto the carrier
signal by using DQPSK (Differential quadrature phase shift keying)
Data rate with DQPSK is 2 Mpbs.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
FCC

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Onminidertional
Dipole
Monopole

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
2,4 Ghz, gain of 2 dBi
5 Ghz, gain of 5 dBi

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Gain of between
20 and 30 dBi

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Transmit at the same time.
Same Channel.
The host cant transmit and
receive at the same time on
a given frecuency

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Multiple hosts can share the same channel, they also share the
airtime.
To keep everything clean, only one device should transmit at any
given time.
The solution is to make every wireless service area a closed
group of mobile devices that forms around a fixed device.
The 802,11 standard calls this a basic service set (BSS).
At the heart of every BSS is a wireless access point (AP).
The operation of a BSS hinges on the AP, the BSS is bounded by
the area where the APs signal is usable. This is know as the
basic service area (BSA) or cell.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
The AP uses a unique BSS
identifier (BSSID) that is based
on the APs own radio MAC
address.

The AP advertiss the wireless


network with a service set
identifier (SSID), which is a text
string containing a logical name

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Membership with the BSS is
called an association.

All frames are freely availabe


over the air to anyone that is
within range to receive them.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
The mesh network runs its own dynamic routing protocol to work out the
best path for backhaul traffic to take across the mesh Aps

AP usually maintains a BSS on a 2.4 Ghz channel, with which wireless


clients can associate. Client traffic is then usually bridged from AP to
AP over 5 Ghz channels as a backhaul network

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
TA transmitter
address
RA receiver
address

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
CSMA is the technique to determine if the media is available
before transmitting.
Wired devices can detect collisions in real time so that they
can back off and wait a random rime to try again
(CSMA/CD).
Wireless devices always operate in half duplex mode
(transmitting wireless client cant detect when a collision
occurs at all).
Therefore, 802.11 devices must try to avoid collisions
(CSMA/CA).

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Management frames
Beacon (passive scanning): ten times per second
(100 ms)
Probe (active scanning)
Authentication and deauthentication ( Open
System / WEP)
Association (SSID)

Control frames
ACK
Block ACK
Power save Poll
RTS/CTS

Data frames

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
To use a wireless LAN, device must be located within the range of
an APs signal and have an active association with the AP ( BSA
or cell)

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
PC-5s wireless
transmitter has a
lesser transmit
power level

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Higher SNR closer to the AP
Less complex MCSs (modulation and coding schemes) slower
data rates
To design a wireless LAN for Best performance to disable
some of the lower data rates (1, 2 an 5,5 Mbps)

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
To provide robust wireless

Tune the cell size base on data


rates and performance
Add additional Aps to build an
ESS (extended service set)
that covers more area

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
The cliente around
location B will
probably experience
so many collisions,
that it may never be
able to roam cleanly

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Aps should be configured to use different
non-overlapping channels.
The decision to roam, is driven by the
wireless client driver (controller), not by
the AP
The 802.11 standars does not address, so
roaming algorithms are vendor specific.
Can be: received signal strength indicator
(RSSI), signal-to-noise ratio (SNR), count
of missed AP beacons, erro due the
collision or interference.
.different clients use different 10-15% overlap data
thresholds.... 15-20 % overlap voice

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Predictive survey are usaually based around theoretical
calculations and not actual measurements.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
The survey tool
passively scans
through the
wireless bands
anda channels
to listen for any
AP that sends a
beacon or a
probe response
frame.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Power is applied to the AP and signal strength measurements.
It use the AP in mounted on a tripod, ladder or pole (AP-on-a-
stick)

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
An APs primary function is to bridge wireless
APs is equipped with both wired and wireless hardware so
that the wireless client associations can be terminated onto a
wired connection locally at the AP.
1. Cloud
2. Autonomous
3. Split MAC
FlexConnect
Centralized
Converged

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Autonomous Aps are self-contained
It offers a short and simple path for data to travel between th
wireless and wired networks.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
SSIDs an their VLANs must be extende at Layer 2.
VLAN is routed within the distribution layer and must be carried
over trunk links to the access layer switches and then to each
autonomous.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
AP management function is pushed out of the enterprice an into the
Internet cloud.
Cisco Meraki is cloud-based and offers centralized management of
wireless, switched and security.
Cisco Meraki Aps can be deployed automatically, once your register
with the Meraki cloud.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
The data path from the wireless network to the wired network is
very short.
Data to and from wireless clients does not have to travel up into
the cloud and back.
The cloud is ude to bring management functions into the data
plane.
A control plane: traffic used to control, configure, manage, and
monitor the AP itself.
A data plane: end-user traffic passing through the AP

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
The real-time processes involve
sending and receiving 802.11
frames, bancos, probe messages,
data encryption.
The AP must interact with
wireless clients on some low level
(MAC). These funtions must stay
with the AP, closest to the clients.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Lightweight access point (LAP) performs only the real-time 802.11
operation.
It name because the code image and the local intelligence are
simple compared to the trafitional autonomous AP.
The management funtions are usually performed on a wireless
LAN controller (WLC).
The LAP becomes totally dependent on the WLC for every
(security policies, selecting RF channels, output power).
..the LAP-WLC division of labor is known as a split-MAC
architecture....

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
The LAP and WLC can be
located on the same VLAN or IP
subnet, but they do not have to
be.
Instead, the can be located on
two entirely different IP subnets
in two entirely different locations.

CAPWAP tunneling protocol makes this all


possible by encapsulating the data
between th LAP and WLC within new IP
packets.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
CAPWAP tunneling allows the lap
and WLC to be separated
geographically and logically.
It also breaks the dependence on
Laye 2 connectivity between
them.
The tunnel exists between the IP
address of the WLC and the IP
address of the LAP, which allows
all of the tunneled packet to be
routed at Layer 3.
No trunk link is needed because
all of the VLANs it supports are
encapsulated and tunneled
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Traffic to and from wireless users would travel over CAPWAP
tunnels that reach into the center of the network, near the core.
A centralized WLC also provides a convenient place to enforce
security policies that affect all wireless users.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
The round-trip time (RTT) between an LAP and a
controller should be less than 100 ms so that
wireless communication can be maintained in near
real time.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
The inefficiency

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
With FlexConnect, the branch-site LAPs are able to locally switch
the traffic without traversing the CAPWAP tunnel.

2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
Thank you.

You might also like