Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

WiFi Technology Principles and Operation Training

WiFi Technology Principles and Operation Training

WiFi Technology Principles and Operation Training:

WiFi Technology Principles and Operation Training Course Hands-on (Online, Onsite, and Classroom Live!)

This three-day WiFi Technology Principles and Operation Training course offers in-depth coverage of the principles and operation of IEEE 802.11 (“WiFi”) short-range wireless communications.

We will begin by looking at the indoor propagation characteristics and how to estimate range limits. You will review the government regulations and learn the techniques used by 802.11 to meet those regulations. You will then examine and compare the modulation schemes employed by the various forms of 802.11. Next, you will study in depth the operation of 802.11a, 802.11b, and 802.11g along with the IEEE 802.11n proposals to enhance throughput. We will undertake a detailed analysis of how security is implemented, followed by a look at countermeasures to various attack strategies. We will conclude the course by discussing the coexistence of 802.11 and other wireless networks such as Bluetooth and a study of the interference solutions.

What’s Included?

  • 3 days of WiFi Technology Principles and Operation Training with an expert instructor
  • WiFi Technology Principles and Operation Training Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee


Related Courses

Customize It:

  • If you are familiar with some aspects of WiFi Technology Principles and Operation Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the WiFi Technology Principles and Operation Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the WiFi Technology Principles and Operation Training course in a manner understandable to lay audiences.


After completing this WiFi Technology Principles and Operation course, attendees will be able to:

  • Calculate signal range using large-scale path loss models for the 2.4 and 5 GHz bands
  • Describe solutions to the impairments caused by multipath
  • Show how 802.11 signaling meets various government regulations
  • Compare the 802.11 a, b, g, and proposed 802.11n modulation processes
  • Describe the channel-access methods used by 802.11
  • Demonstrate the strengths and weaknesses of 802.11 security
  • Show how coexistence can be improved between 802.11 and other wireless systems

Course Syllabus:

Day One

  • Introduction to WiFI and Short-Range Systems
  • Wired vs wireless communications
  • Categories of information transmission
  • Overview of 802.11
  • The Wi-Fi Alliance and IEEE 802.11 task groups
  • Other short-range wireless systems
  • Propagation and Range Limit
  • Review of decibels
  • Link budget equation and path loss model
  • Calculating maximum range
  • Partition attenuation and primary ray tracing
  • Eavesdropping and jamming vulnerabilities
  • Multipath characteristics and mitigation
  • Data Communications
  • Advanced modulation methods for faster data rates
  • Direct sequence spread spectrum
  • Complementary coded keying (CCK)
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • Error control coding
  • Frequency regulation and administration

Day Two

  • 11 Physical Layer (PHY) Operations
  • 11b channel sets and modulation
  • The 802.11b radio and its performance
  • 11b PHY packet structure and data rates
  • 11g channel sets and modulation
  • 11g PHY packet structure and data rates
  • 11a channel sets and comparison to 802.11g
  • 11 Medium Access Control (MAC) Operations
  • Carrier-sense multiple-access operation and throughput
  • Distributed coordination function (DCF) operation
  • Point coordination function (PCF) operation
  • MAC frame construction and examples
  • Throughput and frame transmission times
  • 11 management operations

Day Three

  • 11 Upgrades and Enhancements
  • Types of security threats
  • Operation of 802.11 Wired Equivalent Privacy (WEP)
  • 11 WEP weaknesses
  • Temporal Key Integrity Protocol (TKIP)
  • Advanced Encryption Standard (AES)
  • 1X port-based network access control
  • IEEE 802.11e quality-of-service (QoS)
  • IEEE 802.11n higher data rates
  • Coexistence
  • Consequences of interference
  • Wi-Fi deployment for interference-free operations
  • Coexisting with other wireless networks
  • Collocated Wi-Fi and Bluetooth nodes
  • Microwave ovens
  • Operation aboard commercial aircraft

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: