|  | 
        
          |  | 
        
          |  | 
        
          |  | 
        
          |  | 
        
          |  | 
        
        
          | CWNA   | 
        
          | Certified Wireless Network Administrator | 
        
          |  | 
        
        
          | CWNA Training Course Outline: | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 | Exam Objectives Practice Test
 Exam Registration
 Course Outline
 Contributors
 | 
        
          |  | 
        
        
          | Overview: | 
        
          |  | 
        
          | The  Wireless LAN Administration course, whether in an academic format or a  5-day fast-track format, provides the networking professional a  complete foundation of knowledge for entering into or advancing in the  wireless networking industry. From basic RF theory to link budget math,  including topics from troubleshooting to performing a site survey, this  course delivers hands on training that will benefit the novice as well  as the experienced network professional. | 
        
          |  | 
        
          | Audience: | 
        
          |  | 
        
        
          |  | 
        
          | This  course targets both novice and experienced networking professionals who  wish to gain a solid understanding of wireless networking to complement  their knowledge of traditional wired networking. | 
        
        
          |  | 
        
          | Course Duration: | 
        
        
          |  | 
        
          | The  Wireless LAN Administration course consists of 40 hours of material,  incorporating both lecture and hands-on labs. The class may be taught  in a 5-day period. | 
        
        
          |  | 
        
          | Certification: 
 This course may be used - and is the ideal track - for preparing students for the CWNA exam exam PW0-100
 | 
        
        
          |  | 
        
        
          | Prerequisites: 
 It is recommended that all students have at least a basic knowledge of networking
(as exhibited in Net+, CCNA®, CNA, or) prior to enrolling in the course.
 | 
        
          |  | 
        
          |  | 
        
        
          | Course Outline | 
        
        
          |  | 
        
        
          | Radio Frequency (RF) Fundamentals 
 | 
        
        
          |  | 
        
          | ~ ~
 ~
 ~
 | RF behavior and properties Principles of antennas
 RF math calculations
 Link budgets and system operating margins
 | 
        
          |  | 
        
          | Spread Spectrum Technologies | 
        
          |  | 
        
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 ~
 
 
 | Uses of Spread Spectrum Frequency Hopping (FHSS)
 Direct Sequencing (DSSS)
 Orthogonal Frequency Division Multiplexing (OFDM)
 Packet Binary Convolutional Coding (PBCC)
 Comparing DSSS, FHSS, PBCC, and OFDM
 Co-location and throughput analysis
 Chipping code, processing gain, and spreading functions Channels, data rates, ranges,and
      comparisons Channel reuse in pure and mixed environments.
 | 
        
          |  | 
        
          | Hardware Installation, Configuration, and Management | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 | Access points Wireless bridges
 Wireless workgroup bridges
 Client devices and accessories
 Residential gateways
 Enterprise gateways
 Wireless LAN switches
 PoE Switches and patch panels
 VoWiFi systems
 Wireless Routers
 | 
        
        
          |  | 
        
        
          | Troubleshooting Wireless LANs | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 | Multipath Hidden node
 Near/Far
 Identifying and resolving interference problems
 Maximizing system throughput
 Maximizing co-location throughput
 Range considerations
 | 
        
          |  | 
        
          | Antennas and Accessories | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 | Omni-directional Semi-directional
 Highly-directional
 Determining coverage areas
 Proper mounting and safety
 Performing outdoor/indoor installations
 Power over Ethernet (802.3af and proprietary implementations)
 Cables and connector usage requirements
 Amplifiers, attenuators, lightning arrestors, and splitters
 | 
        
          |  | 
        
        
          | Fresnel Zones and Free Space Path Loss | 
        
          |  | 
        
          |  | 
        
          | ~ | Interference, Fading, and Multipath | 
        
          |  | 
        
        
          | Wireless Network Management 
 | 
        
        
          |  | 
        
          | ~ ~
 ~
 | Authentication, Authorization, and Accounting (AAA) functions Bandwidth control
 Wireless Network Management features and products
 | 
        
          |  | 
        
          | Physical and MAC Layers | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 | Differences between wireless and Ethernet frames Collision handling and the use of RTS/CTS
 Throughput and dynamic rate selection
 Analysis of DCF mode and the CSMA/CA protocol
 How frame fragmentation works and its affects on throughout
 | 
        
          |  | 
        
          | Wireless LAN Security | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 | Analysis of 802.11 security including WEP, WPA, 802.1x/EAP types, and 802.11i Available security solutions at Layer 2, 3, & 7
 Types of network attacks, and protecting the network from attacks
 Corporate security policies including baseline practices and common security
 solutions
 Security recommendations
 | 
        
          |  | 
        
          | Organizations and Standards | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 | FCC rules Frequency ranges and channels
 IEEE 802.11 family of standards
 wireless LAN organizations
 proper application of WLANs in distribution and access roles
 nteroperability standards
 | 
        
          |  | 
        
          | 802.11 Network Architecture | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 | Joining a wireless LAN Authentication and association
 Basic Service Sets
 Extended Service Sets
 Independent Basic Service Sets
 Distribution systems
 Roaming in a wireless LAN
 Scanning modes using Beacons and Probe Frames
 Power management features
 | 
        
          |  | 
        
          | Site Surveying | 
        
          |  | 
        
          | ~ ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 ~
 | Understanding the need for a site survey Defining business requirements and justification
 Facility analysis
 Interviewing network management and users
 Identifying bandwidth requirements
 Determining contours of RF coverage
 Documenting installation problems
 Locating interference
 Reporting methodology and procedures
 Understanding specifics of each vertical market
 Understanding the customer's network topology
 Creating appropriate documentation during and after the site survey
 Understanding FCC/FAA rules regarding towers
 Understanding safety hazards
 Using appropriate hardware and software to perform the survey
 | 
        
          |  | 
        
          | Hands-on Lab Exercises | 
        
          |  | 
        
          | Lab-1: Infrastructure Mode Connectivity | 
        
          |  | 
        
          | This exercise demonstrates wireless client devices connecting to an access point. Students configure the access point, wireless stations, and view the association table in the access point in order to understand the process a client goes through to become connected to the network. RF output power is explained and client utilities are viewed to show RF signal quality and strength. Access point features, authentication, association, and encryption are all discussed and demonstrated. 802.11a/b/g technologies are each shown independently to demonstrate channel usage and spread spectrum technologies. | 
        
          |  | 
        
          | Lab 2: Infrastructure Mode Throughput Analysis | 
        
          |  | 
        
          | This exercise demonstrates the expected throughput achievable from a wireless station to a wired station and a wireless station to a wireless station using FTP and throughput measuring software. The point of this lab is for the student to understand the half-duplex nature of wireless LANs and how the data rate relates to actual throughput in a real-world scenario. Access point frame relay is
proven and explained. | 
        
          |  | 
        
          | Lab 3: Ad Hoc Connectivity and Throughput Analysis | 
        
          |  | 
        
          | In this exercise, wireless clients will connect to each other without use of an access point. Beaconing and channel configuration in an Ad Hoc environment will be explained and throughput will be analyzed and compared against an infrastructure environment. Use of SSIDs, WEP/WPA, channels, and other connectivity factors will be discussed and demonstrated. | 
        
          |  | 
        
          | Lab 4: Cell Sizing and Automatic Rate Selection (ARS) in an Infrastructure Environment | 
        
          |  | 
        
          | In this exercise, RF cell sizing and ARS will be demonstrated. Cell sizing is important for seamless connectivity while roaming and for security purposes. ARS is the wireless LAN client's ability to increase or decrease the data rate of the wireless connection in order to maintain optimum connectivity with the access point. Environmental factors will be analyzed. A basic site survey will be performed during this lab exercise using 802.11a/b/g technologies. | 
        
          |  | 
        
          | Lab 5: Co-Channel and Adjacent Channel Interference | 
        
          |  | 
        
          | In this exercise, the effects of co-channel and adjacent channel interference are demonstrated and explained. Throughput tests using FTP and throughput measurement software are performed using fully-overlapping,partially-overlapping,andnon-overlapping channels. Effects are analyzed and compared for DSSS and OFDM environments. | 
        
          |  | 
        
          | Lab 6: Rudimentary Security Features | 
        
          |  | 
        
          | In this exercise, the security features that are specified in the IEEE 802.11 standard and the new WPA 1.0 interoperability standard are demonstrated in a mobile environment. Wireless clients attempt roaming between access points while using like and different Service Set Identifiers (SSIDs), MAC filters, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) using Pre-shared Keys (WPA-PSK). Configuration, use, and security issues are discussed, explained, and demonstrated in 802.11a/b/g environments. | 
        
          |  | 
        
          | Lab 7: Dynamic WEP Keys and Mutual Authentication using 802.1x/EAP and RADIUS | 
        
          |  | 
        
          | The need for wireless security stronger than that which is available in static WEP or WPA-PSK is explained. Port-based access control with EAP authentication is also demonstrated and explained. Cisco's proprietary Lightweight EAP is used with RADIUS for scalability of authentication. The 802.1x/LEAP association process is analyzed and rotating unicast and broadcast keys are explained. User-based authentication is demonstrated and compared to MAC-based authentication used in the 802.11 standard. | 
        
          |  | 
        
          | Lab 8: Wireless VPNs using PPTP tunnels and RADIUS | 
        
          |  | 
        
          | In this exercise, the access point is the VPN tunnel server and the PPTP VPN client software built into Microsoft Windows is used to establish an encrypted VPN tunnel from the wireless client to the access point. The access point then sends the authentication request to a RADIUS server and a tunnel is established. Use of the PPTP protocol with encryption in a wireless environment is discussed and explained. | 
        
          |  | 
        
        
        
          | Course Fees does not include Examination Charges | 
        
          |  | 
        
          |  | 
        
        
          | 
 |