IEEE 802.11n - Design Details & Protocol Analysis
		  [2-day course, Euro 2,350.- (net) per participant]
Reviewing 802.11 Wireless LAN
          
          - The IEEE 802.11 Alphabet 
- IEEE 802.11-1999 
 - IEEE 802.11b 
 - IEEE 802.11g 
 - IEEE 802.11a 
 - IEEE 802.11e 
 - IEEE 802.11i 
 - IEEE 802.11n 
 
 - IEEE 802.11-1999 
 - The Physical Resource 
- The ISM Band in 2.4 GHz and 5 GHz 
 - Channel Numbers and Allocation / 2.4 GHz 
 - Channel Numbers and Allocation / 5 GHz
 
 - The ISM Band in 2.4 GHz and 5 GHz 
 - Network Architecture 
- Infrastructure Mode 
 - Ad-hoc Mode
 
 - Infrastructure Mode 
 - Protocol Stack of IEEE 802.11 in Context 
- PDU-Types in the Protocol Stack 
- MSDU, MPDU, PPDU 
 
 - MSDU, MPDU, PPDU 
 - Example of an IEEE 802.11 MPDU 
 
 - PDU-Types in the Protocol Stack 
 - Operation of IEEE 802.11 
- CSMA/CA - Resource Sharing and Network Access 
- Principle Operation, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing 
 
 - Principle Operation, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing 
 - The Different MAC-Access Coordination Functions 
- Overview, Distributed Coordination Function / Example Operation, Point Coordination Function (PCF), Enhanced Distributed Channel Access (EDCA), HCF Controlled Channel Access (HCCA)
 
 - Overview, Distributed Coordination Function / Example Operation, Point Coordination Function (PCF), Enhanced Distributed Channel Access (EDCA), HCF Controlled Channel Access (HCCA)
 
 - CSMA/CA - Resource Sharing and Network Access 
 - OFDM in IEEE 802.11
- Introduction 
 - Normal OFDM Symbol 
 - Short OFDM-Symbol 
- Generation 
 
 - Generation 
 - Long OFDM-Symbol 
- Generation, Distinction in case of different Channel Bandwidth (5, 10 and 20 MHz)
 
 - Generation, Distinction in case of different Channel Bandwidth (5, 10 and 20 MHz)
 - Format of the PPDU with OFDM-PHY 
- PLCP Preamble, L-SIG (SIGNAL-Field), SERVICE-Field, PSDU, Tail Bits / Padding 
 
 - PLCP Preamble, L-SIG (SIGNAL-Field), SERVICE-Field, PSDU, Tail Bits / Padding 
 
 - Introduction 
 - Association Process to an Access Point 
- Passive Scanning 
 - Active Scanning 
 - Beacon Frame 
 - Exchange of Association Request / Response Frames
 
 - Passive Scanning 
 
Overview of 802.11n and its Enhancements 
          - Introduction to 802.11n-Enhancements 
- The Big Picture 
 - Smart Antenna related Enhancements 
 - Packet Aggregation related Enhancements 
 - Channel Bonding related Enhancements 
 - Other Enhancements 
- More Data Subcarriers / Smaller Guardband, Short Guard Interval (GI), FEC Changes, Power Saving Enhancements, Reduced Inter Frame Space (RIFS), SERVICE-Field
 
 - More Data Subcarriers / Smaller Guardband, Short Guard Interval (GI), FEC Changes, Power Saving Enhancements, Reduced Inter Frame Space (RIFS), SERVICE-Field
 
 - The Big Picture 
 - Operation with 40 MHz Bandwidth 
- Overview 
 - Number of Subcarriers and Pilot Allocation 
 - Phased Coexistence Operation (PCO) 
 
 - Overview 
 - Transmit Beamforming 
- ... with Implicit Feedback 
 - ... with explicit Feedback 
 
 - ... with Implicit Feedback 
 - Antenna Selection
 
 Detailed Analysis of the 802.11n MAC 
          - Reviewing MAC-Frame Types and IE's 
- Generic MAC Frame (Data Frame) 
- Frame Control field, Duration ID field, Address fields, Sequence Control field, QoS Control field, Frame Body, FCS field, 	Details of the Frame Control Field
 
 - Frame Control field, Duration ID field, Address fields, Sequence Control field, QoS Control field, Frame Body, FCS field, 	Details of the Frame Control Field
 - Control Frame Subtypes 
- BlockAckReq and BlockAck, PS-Poll, RTS and CTS, Ack, CF-End and CF-End+CF-Ack
 
 - BlockAckReq and BlockAck, PS-Poll, RTS and CTS, Ack, CF-End and CF-End+CF-Ack
 - Management Frame Subtypes 
- Association request and Association response, 	Reassociation request and Reassociation response, Disassociation, Probe request and Probe response, Beacon, 	Announcement Traffic Information Message, Authentication and Deauthentication, Action, Action No Ack
 
 - Association request and Association response, 	Reassociation request and Reassociation response, Disassociation, Probe request and Probe response, Beacon, 	Announcement Traffic Information Message, Authentication and Deauthentication, Action, Action No Ack
 - Data Frame Subtypes 
- Data frames, Null frames, CF-Ack frames, CF-Poll frames, QoS frames, 	Usage of the Address Fields in Data Frames 
 
 - Data frames, Null frames, CF-Ack frames, CF-Poll frames, QoS frames, 	Usage of the Address Fields in Data Frames 
 - Action Frames 
- Spectrum management Action frames, QoS Action frames, DLS Action frames, Block Ack Action frames, 	HT Action frames 
 
 - Spectrum management Action frames, QoS Action frames, DLS Action frames, Block Ack Action frames, 	HT Action frames 
 
 - Generic MAC Frame (Data Frame) 
 - Aggregation through A-MSDU 
- Practical Exercise: Evaluate a PPDU with A-MSDU inside 
 - Detailed Operation and Constraints 
- From LLC-Frame to A-MSDU - Mapping Rules, Limitation of Frame Sizes (A-MSDU)
 
 - From LLC-Frame to A-MSDU - Mapping Rules, Limitation of Frame Sizes (A-MSDU)
 
 - Practical Exercise: Evaluate a PPDU with A-MSDU inside 
 - Aggregation through A-MPDU 
- Example of an A-MPDU 
 - Detailed Operation and Constraints 
- From LLC-Frame to A-MPDU - Mapping Rules, Limitation of Frame Sizes (A-MPDU) 
 
 - From LLC-Frame to A-MPDU - Mapping Rules, Limitation of Frame Sizes (A-MPDU) 
 - Combination of A-MSDU and A-MPDU Aggregation 
 - Practical Exercise: A-MSDU vs A-MPDU Aggregation 
 
 - Example of an A-MPDU 
 - BlockAck-Procedures 
- Reviewing Acknowledgement Policies 
- Normal Ack, No Ack, No explicit Ack, Block Ack 
 
 - Normal Ack, No Ack, No explicit Ack, Block Ack 
 - Option 1: Immediate BlockAck Procedure 
- Setup BlockAck, Transmission of data frames, Block Ack Request – Block Ack exchange, ermination of Block Ack 
 
 - Setup BlockAck, Transmission of data frames, Block Ack Request – Block Ack exchange, ermination of Block Ack 
 - Option 2: Delayed Block Ack Procedure 
- Setup of Delayed BlockAck's, BlockAck Request – BlockAck exchange, Switch back to normal Ack procedure in the BlockAck period, Termination of Delayed BlockAck 
 
 - Setup of Delayed BlockAck's, BlockAck Request – BlockAck exchange, Switch back to normal Ack procedure in the BlockAck period, Termination of Delayed BlockAck 
 - Important Changes with 802.11n 
- New Format of the BlockAck Request Frame, New Format of the BlockAck Frame 
 
 - New Format of the BlockAck Request Frame, New Format of the BlockAck Frame 
 - Practical Exercise: Analyze a Real-Life BlockAck Session 
 
 - Reviewing Acknowledgement Policies 
 - Power Save Multi Poll (PSMP) 
- Operation of PSMP 
 - Format and Content of the PSMP-Frame
 
 - Operation of PSMP 
 
Advanced Security through EAP (Bonus Material) 
          - Security Challenges 
- Unauthorized use 
 - Forgery attacks 
 - Man in the middle attacks (eavesdropping) 
 - Replay attack 
 - Data truncation, concatenating, and splicing 
 - Iterative guessing against the key 
 - Redirection by modifying the MPDU DA or RA field 
 - Impersonation attacks by modifying the MPDU SA or TA field 
 - Denial of service attack 
 
 - Unauthorized use 
 - Overview Security 
- Keys 
 - Ciphering 
 - Deciphering 
 - Authentication 
 - Integrity protection 
 
 - Keys 
 - Security Technologies for IEEE 802.11	194
- Overview 
- Wired Equivalent Privacy (WEP), Robust Security Network (RSN), 802.1X, Extensible Authentication Protocol (EAP), Virtual Private Network 
 
 - Wired Equivalent Privacy (WEP), Robust Security Network (RSN), 802.1X, Extensible Authentication Protocol (EAP), Virtual Private Network 
 - Pre - RSNA Procedures 
- Open System Authentication, Shared Key Authentication, The “Wired Equivalent Privacy” Procedure 
 
 - Open System Authentication, Shared Key Authentication, The “Wired Equivalent Privacy” Procedure 
 - RSNA Procedures 
- RSNA Policy Selection, 	Key Hierarchy – How to Create the TK's, Types of Security Associations, RSNA Encryption and Integrity Protection Protocols, 
 
 - RSNA Policy Selection, 	Key Hierarchy – How to Create the TK's, Types of Security Associations, RSNA Encryption and Integrity Protection Protocols, 
 - Advanced Authentication 
- Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Variants of EAP 
 
 - Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Variants of EAP 
 - Secure Session Overview 
- Different Phases, Session Phase 1: Probing & Association, Session Phase 2: EAP Authentication, Session Phase 3: EAPOL 4-Way Handshake, Session Phase 4 & 5: Active Session & Disassociation 
 
 - Different Phases, Session Phase 1: Probing & Association, Session Phase 2: EAP Authentication, Session Phase 3: EAPOL 4-Way Handshake, Session Phase 4 & 5: Active Session & Disassociation 
 - EAP Frame Formats 
- EAP Request and EAP Response Frames, EAP Success and EAP Failure Frames 
 
 - EAP Request and EAP Response Frames, EAP Success and EAP Failure Frames 
 
 - Overview 
 - Analysis of EAP-TLS 
- EAP-TLS Protocol Structure 
 - EAP-TLS Procedure 
- Detailed Description 
 
 - Detailed Description 
 - Practical Exercise: Analysis of Real-Life EAP-TLS Logfile 
 - EAP-TLS Procedure – Fast Reconnect 
- Detailed Description
 
 
 - EAP-TLS Protocol Structure 
 - Analysis of EAP-AKA 
- EAP-AKA Protocol Structure 
 - EAP-AKA Procedure 
- Initial Conditions, Applicability of this Procedure, Detailed Description 
 
 - Initial Conditions, Applicability of this Procedure, Detailed Description 
 - EAP-AKA Procedure – Fast Re-Authentication
 
 - EAP-AKA Protocol Structure 
 
v2.000
 ℹ️ Try out the updated search below!
Search:
More Info:
General Information about this course
            Schedule of this training course
            Extract of this training course
            Buy this book
            
          
INACON eBooks
Please have a look at our full offer

