Thank you, everyone, who helped to make this possible.
Thank you, everyone, who helped to make this possible.
The IEEE 802 family of standards deals with Local Area Networks and Metropolitan Area Networks. The first meeting of the 802 LAN/MAN Standards Committee (LMSC) was held in February of 1980. As a result, it is widely associated with 80-2.(1980-February) It was the next available number so this is more of a coincidence than anything.
The 802.11 working group is responsible for all aspects of Wireless Local Area Networks. The two layers at the heart of 802.11 are the medium access control(MAC) layer and the physical(PHY) layer.
This brings us to the topic of discussion. Why are there so many different letters associated with 802.11? It would seem that 802.11 would be 802.11. The letters at the end of the working group represent the version of the standard. Each subsequent revision will use the following letter in the alphabet. Some letters are not used. This is to avoid confusion with other standards or because they look like numbers. 802.11x is not used as it looks too much like 802.1X. It is also commonly used to identify all the 802.11 versions. 802.11l looks like 802.111 or 802.11i which would be confusing. 802.11o would also be confused with 802.110.
To make it even more confusing, there are roll-up standards. When there are a handful of letter-based standards the IEEE 802.11 working group will roll all the standards into a year based roll-up standard. This will often times include an earlier roll-up standard and an alphabet soup of some of the latest letter-based standards. See below for dated roll-ups and their associated standards.
— 1999 edition
— 802.11a-1999 (Amendment 1)
— 802.11b-1999 (Amendment 2)
— 802.11b-1999/Corrigendum 1-2001
— 802.11d-2001 (Amendment 3)
— 802.11g-2003 (Amendment 4)
— 802.11h-2003 (Amendment 5)
— 802.11i-2004 (Amendment 6)
— 802.11j-2004 (Amendment 7)
— 802.11e-2005 (Amendment 8)
— 802.11k-2008: Radio Resource Measurement of Wireless LANs (Amendment 1)
— 802.11r-2008: Fast Basic Service Set (BSS) Transition (Amendment 2)
— 802.11y-2008: 3650–3700 MHz Operation in USA (Amendment 3)
— 802.11w-2009: Protected Management Frames (Amendment 4)
— 802.11n-2009: Enhancements for Higher Throughput (Amendment 5)
— 802.11p-2010: Wireless Access in Vehicular Environments (Amendment 6)
— 802.11z-2010: Extensions to Direct-Link Setup (DLS) (Amendment 7)
— 802.11v-2011: IEEE 802.11 Wireless Network Management (Amendment 8)
— 802.11u-2011: Interworking with External Networks (Amendment 9)
— 802.11s-2011: Mesh Networking (Amendment 10)
— 802.11ae-2012: Prioritization of Management Frames (Amendment 1)
— 802.11aa-2012: MAC Enhancements for Robust Audio Video Streaming (Amendment 2)
— 802.11ad-2012: Enhancements for Very High Throughput in the 60 GHz Band (Amendment 3)
— 802.11ac-2013: Enhancements for Very High Throughput for Operation in Bands below 6 GHz (Amendment 4)
— 802.11af-2013: Television White Spaces (TVWS) Operation (Amendment 5)
Once everything is rolled up into a dated standard, all of the previously published amendments and revisions are then retired.
Now that we have navigated by the global 802.11 map, let’s zoom in and take a look at some of the individual standards.
Let’s start at the very beginning. A very good place to start, the 1997 standard. The original standard is sometimes referred to as 802.11 prime or 802.11 legacy. With this standard, the world was introduced to many of the foundational topics surrounding wireless local area networks. We are introduced to the contention mechanism carrier sense multiple access protocol with collision avoidance.(CSMA/CA) The standard includes the authentication, association, reassociation, encryption, power management and point coordination function(PCF has not ever been implemented) provisions.
We learn from the original standard many of the definitions we still use today when defining the various components of the wireless local area network. Some of these definitions include…
Access Point: A station that provides access to a distribution system through a wireless channel.
Association: The process by which an AP to Station mapping is created which allows the station to communicate with the distribution system services.
Authentication: The process by which a Station identifies itself as a member of a set of stations allowing it to associate with another station.
Basic Service Area: The coverage of a basic service set. In laymen’s terms, the AP coverage.
Basic Service Set: The set of stations controlled by a single coordination function. Think of this like the group of stations that are associated with a single AP on a single SSID.
Beacon: Transmission scheduled at specific interval which provides data about the device one each SSID and its capabilities. Also used for transmission synchronization.
Clear Channel Assessment: Function that detects whether the physical medium is clear or currently busy.
Distributed Coordination Function: The coordination function that is used by the various stations in a basic service set to coordinate access to the shared resource. A contention method.
There are many more terms that are still used in our modern 802.11 networks that are still commonly used.
Now that we have covered some of the ways the standard has remained the same, let’s consider some of the ways this standard offered some aspects that are no longer used.
The original standard was designed for infrared devices using baseband communications and radio transmissions in the 2.4 GHz band. The modulation techniques use for encoding data on the radio channel were frequency-hopping spread spectrum and direct sequence spread spectrum. Both of the different modulation techniques could yield a data rate of 1 Mbps and 2 Mbps. Infrared allowed 2 Mbps optionally.
Two types of authentication are available in the legacy standard. Open system authentication is the most basic form of authentication. Any station that requests authentication will be authenticated. The other method is shared key authentication. This method uses the deprecated Wired Equivalent Privacy (WEP) keys to establish a secured session. WEP is no longer a secure standard and should not be used on a modern Wi-Fi network. More recent standards will not even allow the faster modulations when WEP is used. Modern 802.11 networks no longer use FHSS with Gaussian Frequency Shift Keying or infrared. Direct sequence spread spectrum is still supported for legacy devices. There are significant performance drops by allowing DSSS devices to coexist on a modern network.
This standard is also commonly referred to as 802.11 legacy or prime. It is a revision to the 1997 standard. As such, the documents are nearly the same with only slight variations and clarifications made between the two revisions. FHSS, DSSS, and infrared communications are all supported. Infrared communications are transmitted between 850 nm and 950 nm. Direct sequence spread spectrum operates within a 22 MHz wide channel bandwidth in 2.4 GHz. Differential binary phase shift keying (DBPSK) is used to obtain a data rate of 1 Mbps. Differential quadrature phase shift keying (DQPSK) is used to obtain a data rate of 2 Mbps. The early standards set the stage for the Wi-Fi Alliance certifications. There were so many different PHY layer options and so many varying implementations of the standard that equipment was not capable of interoperating reliably. This lead to Wi-Fi Certified certification to ensure that equipment was interoperable.
Now the alphabeterrific fun begins. The 802.11a standard was the first standard to allow devices to transmit in the 5 GHz frequency range. This standard is 5 GHz only. We are introduced to the unlicensed national information infrastructure (U-NII) bands. We were also introduced to a new modulation technique known as orthogonal frequency division multiplexing (OFDM). OFDM is a powerful way to stack individual carriers together allowing them to occupy the same bandwidth but not to interfere with each other. Quadrature amplitude modulation (QAM) is added to encode data on the carriers. Data rates of 6,9,12,18,24,36,48 and 54 Mbps are possible. These rates are achieved using BPSK, QPSK, 16-QAM and 64-QAM. This standard was not widely implemented at first. It was ahead of its time in many ways. The shortage of equipment capable of operating in this band and the added cost made it less attractive to many of the users. 802.11a was the foundation for the 802.11g standard that was very popular as the strengths of OFDM were adopted into the 2.4 GHz band.
This standard was one of the first to find widespread adoption. 802.11b introduced high rate direct sequence spread spectrum (HR/DSSS). In addition to the 1 and 2 Mbps, devices could now connect at data rates of 5.5 and 11 Mbps. This was done by adding complementary code keying (CCK). More data could be encoded on the 22MHz DSSS channel. A shortened preamble was also included. This standard only operated in the 2.4GHz band. An optional modulation of packet binary convolutional coding (HR/DSSS/PBCC) was introduced. It never found widespread adoption.
When learning about this standard, think domain-d. The 802.11d standard is concerned with conforming to the rules within each regulatory domain. Each country makes its own rules concerning how RF devices operate. Additional elements are added to existing frames, like the beacon frame, which tell devices what country the device is operating in. This allows devices to also meet the requirements of the regulatory domain and to roam between regulatory domains.
The extended rate phy (ERP) standard was very popular in the 2000s. This standard is a PHY amendment that operates in the 2.4 GHz band. 802.11g adapted OFDM from 802.11a into the 2.4GHz band with many of the same technical parameters ported over. The following data rates were available…
ERP-DSSS: 1 and 2
ERP-CCK: 5.5 and 11
ERP-OFDM: 6, 9, 12, 18, 24, 36, 48, and 54
ERP-PBCC: 5.5, 11, 22, and 33
DSSS-OFDM: 6, 9, 12, 18, 24, 36, 48, and 54
With so many different rates, this standard clarifies multirate support. Dynamic rate switching is where devices will change the modulation and coding scheme to increase throughput when signal is good and to decrease throughput when signals are not so good. The fact that all devices must be able to understand the broadcast traffic and management traffic, the lowest order modulations are typically used for transmitting. This significantly impacts throughput on a channel. This is why OFDM only is best practice for modern networks.
This amendment deals with spectrum and transmit power management. It prevents interference in the 5 GHz band to radar and satellites. From this standard we get the dynamic frequency selection (DFS) and transmit power control (TPC).
When I hear of 802.11i I think impenetrable. The standard increased the security using Wi-Fi Protected Access (WPA2) and the robust security network (RSN). It used the advanced encryption standard (AES).
When you see this lettered amendment, think Japan. This standard deals with the operation in the 4.9 to 5 GHz band in Japan.
When I see this standard, I think excellence. The e standard is used to define quality of service (QOS) on a Wi-Fi network. The standard created 4 separate access categories. AC_VO for voice operations requiring the highest QOS. AC_VI for video. AC_BE for regular data traffic and AC_BK for the lowest priority traffic. This form of QOS is probabilistic meaning that it does not guarantee a higher class will gain access to the medium first. It increases the likelihood that a higher class would gain access to the channel before the other classes.
Radio resource management (RRM) serves to facilitate the maintenance and management of the radios in a wireless network. Devices exchange information about the RF environment that allows them to make decisions about how best to operate the network. It also helps devices to roam.
Fast BSS Transition allows wireless clients to quickly roam from AP to AP without having to undergo a complete authentication exchange. This greatly improved the ability for devices to reduce latency or missed packets during a roam.
This amendment allows for high powered Wi-Fi networks to operate in the 3.65-3.7 GHz band in the USA. It operates using the 802.11a protocol. This band requires a light license. There is a nationwide non-exclusive license and a fee per base station fee.
This amendment deals with protected management frames. One of the problems with Wi-Fi is that the management information is passed without encryption. Even with the layer 2 encryption methods, only the payloads are actually encrypted. The open management frames allow attackers to hijack communications and can force clients to deauthenticate from the network causing service interruptions. By protecting the management frames, this prevents these types of attacks from occurring.
This is a PHY layer amendment that added multiple antenna support. MIMO was brought to the wireless networking world. This allowed for multiple spatial streams to significantly improve throughput and performance. This standard allowed for up to 4 spatial streams. The maximum modulation was 64QAM 5/6. There were 32 primary MCS index values and a whole bunch of mismatched modulations. Both the 2.4 and 5 GHz bands were included. RF channel width could increase to 40MHz by combining two 20MHz channels. Theoretical speeds up to 600 Mbps could be achieved.
This amendment adds wireless access in vehicular environments (WAVE). It is designed to provide roadside access via access points to devices in vehicles driving by. A way to remember this one is to think p for pavement.
Tunnelled direct link setup (TDLS) is a way for two devices that are associated with an AP to set up a direct link between each other without going through the AP to pass data directly. This keeps this traffic off the AP and theoretically increases system performance.
This wireless network management standard allows the configuration of a client device to be changed while remaining connected to the network.
When I think of the u amendment I think of ubiquitous. The idea behind Passpoint or Hotspot 2.0 is the idea that our devices can connect securely to networks spread far and wide. Information is exchanged before the connection that tells the device information about the network. Access network query protocol (ANQP) is used to exchange info between the AP and device. The device does not have to connect to the network to receive this information. The connection is also secured with WPA2 layer 2 encryption which is much more secure than connecting to an open network where hackers can listen in on your wireless traffic.
This amendment is the mesh networking amendment. When you think s think mesh.
This amendment is about prioritizing management frames.
When you see this amendment think of awesome audio. It allows for MAC Enhancements for Robust Audio Video Streaming. It is concerned with improving multicast traffic over Wi-Fi.
The way I remember this one is to think almost deaf. This is the WiGig 60GHz standard. It allows for multi-gigabit speeds. The frequency band is really high and does not cover very far. It does have a lot of promise for delivering large amounts of data over short distances.
This is a PHY layer amendment that only operates in the 5 GHz band. The very high throughput (VHT) PHY added 256 QAM modulation, multi-user MIMO (MU-MIMO) and support for up to 8 spatial streams.
The TV White Space amendment allows networks to operate in frequencies lower than 1 GHz. It is intended to be used in rural areas to provide wireless networks. It uses OFDM modulation. Stations are managed by a geolocation database (GDB) to ensure devices do not interfere with licensed TV operations.
What is RF? Radio Frequency waves are an integral part of living in our modern world. The applications for wireless technology are vast. We use radio waves to communicate, cook our food, identify and track items, provide entertainment, triangulate positions, track weather, scan what lies below the surface of the earth and even scan the heavens.
So how is it that signals can be sent through space? Let’s start with the physics. Radio Frequency energy is composed of Electromagnetic waves. You might find the word strange. Can we take any concepts in physics and merge them together. Perhaps we could take gravity and mix it with energy to form grivitoenergy. All joking aside, the first physicist credited with making the connection between electricity and magnetism was Hans Christian Ørsted. It fills the Wifi Viking with pride to know that his gentleman was a good Scandinavian from Denmark.
As the story goes, Hans Christian Ørsted was discharging a current from a battery during a lecture when he noticed the needle of a compass move. He then went on to determine that magnetic lines of force circulate around a conductor as it carries a current.
This brings us to a principle referred to as the right-hand rule. The right-hand rules states that when current flows through a conductor, a magnetic field is created which circulates around the conductor at a 90 degree angle to the conductor. These magnetic field lines circulate in the direction of your fingers when the thumb is pointed in the direction of the conventional current flow. Physics? What? I thought this blog is about Wi-Fi. What does this have to do with wireless networking?
Let’s consider alternating current. It would seem that the right-hand rule only applies to direct current. (Current that only flows in one direction.) For a thought experiment, consider what happens if we start reversing the flow. As the current changes direction, the magnet field lines run in one direction and then the other.
These magnetic lines of force will travel away from the conductor as a wave. An electromagnetic wave is composed of an electric field and a magnetic field. We have discussed the magnetic field with our right-hand rule thought experiment. The electric field is transmitted in the same plane as the conductor and the magnetic field is oriented at a 90 degrees angle to the electric field.
An electromagnetic field is modeled using sine waves. A sine wave represents the voltage or current measured over time. A way to visualize a sine wave is to imagine tracing the perimeter of a circle with a pencil. If you were to look at the circle from the side while you traced it, you would see the tip of the pencil traveling up and down and up and down. It would not look like a circle. If you were to trace this up and down motion on a transparent strip of material that is moving at a constant speed, you would end up with a sine wave. Hooray! Another fun thought experiment.
When we are talking about electromagnetic waves or RF waves, there are several different terms that are used to describe the waveform.
Amplitude = The maximum departure of the value of an alternating current or wave from the average value. This is the strength or height of the wave. The maximum or minimum value of the amplitude is referred to as peak.
Wavelength = The distance between corresponding points of two consecutive waves. The distance over which the wave’s shape repeats. The is often referred to using the Greek letter λ (Lambda).
Frequency = The rate at which something occurs or is repeated over a particular period of time or in a given sample. Normally RF waves are measured in cycles per second or hertz. For the example below we will assume that each vertical division represents 125 ms. All eight squares represent one second. The frequency of this signal is eight cycles per second or eight hertz.
Phase = the relative position of two different waves at a specific point in time. The phase difference is measured on the zero axis between two corresponding points on the waveform. Here is an example of two waveforms 180 degrees out of phase. In this orientation, the waves will cancel each other out.
Now that we have gone over the different properties of waves, we can discuss how these different methods are used to encode data onto the waveform. Wireless communications have been accomplished using amplitude modulation, frequency modulation, and phase modulation. This process of encoding bits onto a waveform is known as keying.
Amplitude shift Keying = the amplitude of the waveform is varied over a set period of time to indicate either a 1 or a 0. One amplitude level is one state and another amplitude value is another state. The image below has a value of 01011010.
Frequency shift keying = the frequency of the waveform is varied over a set period of time to indicate either a 1 or a 0. One frequency represents a 0 and another frequency represents a 1. The image below has a value of 01011010.
Phase shift keying = the phase of the waveform is varied over a set period of time to indicate either a 1 or a 0. No phase shift represents a 0 and a phase shift represents a 1. The image below has a value of 01011010.
These different basic modulation keying methods can be complicated to include additional levels, frequencies and degrees of phase shift. Quadrature Amplitude Modulation (QAM) uses amplitude and phase modulation to encode data onto the waveform.
Thank you for watching my video today. Skål. Here’s to all you network engineers and anyone who is interested in Wi-Fi out there. Good luck building your wireless networks. This has been Bryan Noe. Have a wonderful day.
With a word as common as Wi-Fi, does anyone stop to think about what that word even means? I did not hear the word until I was out of High School. It took a time before the word caught on. I remember calling the earliest wireless systems the wireless or the wireless network. The technical name for a wireless network, at that time, was IEEE 802.11 Wireless Local Area Network. Quite a mouthful.
The name Wi-Fi was created by Interbrand. Interbrand had been tasked with creating a brand name for the Wireless Ethernet Compatibility Alliance (WECA). The Wireless Ethernet Compatibility Alliance (WECA) was founded in 1999 as a non-profit organization. It had been established to ensure the operation and compatibility of devices created by different manufacturers. The manufacturers could implement the IEEE 802.11 de jure (in law) standard to the letter, but there was no guarantee that the equipment would be interoperable in the real world. Ensuring interoperability based on 802.11 standards is the impetus for the creation of the Wireless Ethernet Compatibility Alliance (WECA) and its family of certifications.
What does Wi-Fi mean? This is where the internet does its magic of telling many different stories, all of which tell a slightly different version of the truth. When I first heard the word Wi-Fi, there was a subconscious connection to the decades-old technology of Hi-Fi. High Fidelity is the name given to home stereo systems that came out in the 1950s and later. These systems were branded as Hi-Fi sets. This differentiated them from the cheap low-quality systems of early times. The term was used to signify the superior audio reproduction, low noise, little distortion and original recording clarity.
The Interbrand website clearly recognizes Hi-Fi as having been an inspiration for the word Wi-Fi. This makes sense to me as the word has a long history of successful branding in the United States. For people younger than a late tricenarian like myself, you might not remember that there was a time when a Hi-Fi set was actually a large piece of furniture proudly displayed in the living room by most families. Fine woodwork would disguise the inner workings of a stereo system and possible turntable. Later sets incorporated an eight-track tape player.
It could very easily be inferred that Wi-Fi stands for Wireless Fidelity. This is where things get contentious. (How appropriate.) There are many articles citing founders claiming that Wi-Fi does not stand for anything. It is just a made up word. This is where I bow out of these types of discussions. How many access points can sit on the head of a pin? All words are made up. Typically they are based on earlier words that are made up from early words. In any event, Wi-Fi is a word and it is here to stay.
After the brand name Wi-Fi was trademarked by WECA and began to see widespread adoption. The organization changed its name to the Wi-Fi Alliance. It continues with this name today. The Wi-Fi Alliance owns the trademark Wi-Fi.
In the common vernacular, Wi-Fi refers to a wireless local area network. It is most commonly used for accessing the internet.
-Do you have Wi-Fi?
-Will there be Wi-Fi when we get there?
-Will we have to pay for Wi-Fi?
-I am using my neighbor’s Wi-Fi.
The one I always love is, “What is your Wi-Fi password?” (Nails on a chalkboard.)
Millennials, I am talking to you. I love the fact that you think access to Wi-Fi is like turning the kitchen sink on for a glass of water. My network is a holy place. I have no idea what you are going to do if I let you have access to my network resources. Do you know what is behind my firewall? The scarier part is that they would just connect to it if I did not have a WPA2 passphrase on it.
Think about how different wireless is from wired due to the open channel and perception of anonymity. Could you imagine a friend or family member coming over and jacking into a switch in my network closet? What authentication do you use for 802.1X? What credentials am I supposed to use?
All kidding aside, the correct question is, “May I please use your Wi-Fi?”
This elucidates the truth that Wi-Fi is a utility in this day and age. It is used to connect people wirelessly to the network resources that their lives have come to revolve around. Wi-Fi is the lifeblood of modern society. Wi-Fi brings freedom to people who are tied into an ever-growing ecosystem of services.
My definition of Wi-Fi reads as follows…
Wi-Fi is wireless technology allowing people to freely move through their environment while maintaining access to resources supplying the needs of mind, body and spirit.
In the end, the technology is irrelevant. It is what Wi-Fi does for humanity that will ultimately sustain the word Wi-Fi well into the future.
Today I passed the CWAP exam. It feels great to have completed all three professional level exams.
|Certification||Exam Date||Expiry Date|
I took a slightly different tact when studying for this test. Memorizing frame structure is not something that came easily. I read the book the first time. Then I read it again. After reading the first 5 chapters, much of it out loud to myself, I had the brilliant idea to record myself while I read it. I installed Voice Recorder on my phone and read chapters 6, 7 and 8 out loud. I then started back at the beginning and read chapters 1,2,3,4 and 5 while recording.
I also recorded sound bites of the different frame structures and tables. I recorded the questions followed by the answer for all chapters as well. I listened to these recordings any time that was available.
The weekend before the exam, I read the book again while listening to my recordings. It was a lot to cram into a weekend, but it was well worth it.
I was able to use the Wi-Fi Analyzer Pro software we have for troubleshooting at work to practice analyzing frames in the protocol analyzer.
I will now focus my efforts on creating my CWNE Portfolio.
Today I passed my CWDP-302 test. I was very happy to have received a decent score. I prepared for the exam by reading the CWDP Certified Wireless Design Professional Official Study Guide. I was not sure what to expect on the exam as this book does not have the practice questions like other books. I found it helpful to have design experience from work. I found many of the questions to be subjective. I could have selected two answers and supported them both based upon a certain explanation. I would like to know which questions I missed so that I can understand the reasoning behind their selection of one answer over another.
I will now turn my attention to CWAP. It feels great to be one certification away from tackling the requirements for CWNE. I have scheduled my CWAP exam for March 27th. I like scheduling the tests one after another. It holds my feet to the studying fire. I have a feeling I will enjoy studying CWAP better than CWDP. I found CWSP to be very enjoyable. It was very specific whether an answer was correct. This is how security works. This does this. This does this. This is very different than that. In any event, I am incredibly grateful to be getting so close to a big goal. I look forward to consuming the content in the next course and experiences beyond. Skål!