ExperTeach Networking Logo

Wireless LAN I

Architecture and Design

ExperTeach Networking Logo

Wireless LANs have established themselves as a supplement to wired LANs in corporate networks long since. In local networks and at hotspots they even replace the Ethernet to a large extent, and an end of the WLAN boom is not yet in sight. The course at hand gives an introduction to WLAN technology and WLAN application. The participants get to know the different WAN technologies and standards. The course enables them to understand WLAN architecture and to solve planning and dimensioning tasks. Hands-on exercises at the test network provide the reference to practical application.

Course Contents

  • Basics, Wireless Technology, and Antenna Technology
  • Topologies and Access Procedures
  • Access Points and SSID
  • IEEE 802.11a to 11ad: The Transmission Standards
  • Bit Rates and Ranges
  • Optimization with 802.11n
  • Application Areas of 802.11ac (Gigabit WLAN)
  • Roaming of WLAN Clients and Other Functions
  • Security in the WLAN––Consequences Arising from the Shared Medium
  • WEP, TKIP, AES, WPA, WPA2, IEEE 802.11i, and Address Filters
  • Design and Implementation of WLANs
  • Optimization with QoS
  • VLAN Configuration
  • Site Surveys and Planning Tools
  • Troubleshooting

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The course offers a hands-on and comprehensive insight into Wireless LAN technology for network designers, administrators, and sales-oriented employees.

Knowledge Prerequisites

Apart from basic network and IT know-how, no special knowledge is required for a successful participation in this course. Know-how of the LAN sector will be helpful in the discussion of practice-related case studies.

Complementary and Continuative Courses

1 Wireless LANs at a glance
1.1 LANs - wireless vs. wired
1.1.1 Requirements for local networks
1.1.2 Application scenarios for WLANs
1.1.3 Facts at a glance
1.2 Design and structure of a WLAN
1.2.1 Ad-hoc vs. infrastructure
1.2.2 Wi-Fi Direct
1.2.3 Basic Service Area (BSA)
1.2.4 Distribution system
1.2.5 What is a repeater (WDS)?
1.2.6 Bridge/Mesh
1.2.7 Controller-based solutions
1.3 WLAN in the layer model
1.4 Standardization and regulation
1.4.1 Radio frequencies
1.4.2 IEEE 802.11 standards
2 Radio technology and WLAN generations
2.1 Physical basics
2.1.1 Attenuation and radiation
2.1.2 Frequency ranges in WLAN
2.1.3 Possible interferences
2.1.4 What does a spectrometer show?
2.2 Antenna technology
2.2.1 Diversity antenna system
2.2.2 MIMO
2.3 Headers on Layer 1 and 2
2.4 Frequency spreading
2.4.1 Spread spectrum technologies
2.4.2 The FHSS method
2.4.3 The DSSS method
2.4.4 The OFDM method
2.4.5 The OFDMA method
2.5 Modulation methods
2.5.1 Phase modulation (BPSK)
2.5.2 Quadrature amplitude modulation
2.6 WLAN generations
2.6.1 IEEE 802.11
2.6.2 IEEE 802.11b
2.6.3 IEEE 802.11a
2.6.4 IEEE 802.11g
2.6.5 802.11n: Wi-Fi 4
2.6.6 802.11ac: Wi-Fi 5
2.6.7 IEEE 802.11ad-2012: 60 GHz
2.6.8 802.11ax: Wi-Fi 6
2.6.9 Special extensions
3 Topologies, access methods and protocols
3.1 Structure of a WLAN
3.1.1 The infrastructure network
3.2 Logging on to the access point
3.3 Access procedures
3.3.1 Distributed Coordination Function (CSMA/CA)
3.3.2 Point coordination function
3.4 Data transport in WLAN architectures
3.5 Typical frame formats
4 Security and access protection
4.1 Network security objectives
4.1.1 Security components
4.2 Confidentiality
4.2.1 Diffie-Hellman - Generating symmetric keys
4.2.2 RSA - Asymmetric encryption
4.3 Integrity
4.4 Authenticity
4.4.1 Pre-distributed keys (preshared keys)
4.4.2 Digital signatures - the modern fingerprint
4.4.3 Certificates
4.5 IEEE 802.1X
4.5.1 IEEE 802.1X framework
4.5.2 EAP - Extensible Authentication Protocol
4.5.3 EAP and network operating systems
4.6 Availability
4.7 Authentication in the WLAN
4.7.1 MAC address filters
4.8 WPA: Wi-Fi Protected Access
4.9 WPA2 and IEEE 802.11i
4.9.1 Key management
4.9.2 Data integrity with AES-CCMP
4.9.3 Encryption with AES-CCMP
4.9.4 802.11i or WPA2?
4.9.5 Hole 196
4.9.6 KRACK
4.9.7 Protected Management Frames
4.10 WPA3
4.10.1 WPA3 Enterprise: Crypto methods
4.10.2 Simultaneous Authentication of Equals (SAE)
4.10.3 Easy Connect and PMF
4.10.4 Dragonblood
A Exercises and Assignments for the Course
A.1 Structure of the exercise network
A.1.1 Accessing the FTP Server
A.1.2 Reading Wireless Frames
A.1.3 Finding data, management and control frames...
A.1.4 Inspect radio headers
A.2 Infrastructure Network
A.3 Wireshark trace
A.3.1 Signal and transmission rate at WLAN client

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

Wireless LANs have established themselves as a supplement to wired LANs in corporate networks long since. In local networks and at hotspots they even replace the Ethernet to a large extent, and an end of the WLAN boom is not yet in sight. The course at hand gives an introduction to WLAN technology and WLAN application. The participants get to know the different WAN technologies and standards. The course enables them to understand WLAN architecture and to solve planning and dimensioning tasks. Hands-on exercises at the test network provide the reference to practical application.

Course Contents

  • Basics, Wireless Technology, and Antenna Technology
  • Topologies and Access Procedures
  • Access Points and SSID
  • IEEE 802.11a to 11ad: The Transmission Standards
  • Bit Rates and Ranges
  • Optimization with 802.11n
  • Application Areas of 802.11ac (Gigabit WLAN)
  • Roaming of WLAN Clients and Other Functions
  • Security in the WLAN––Consequences Arising from the Shared Medium
  • WEP, TKIP, AES, WPA, WPA2, IEEE 802.11i, and Address Filters
  • Design and Implementation of WLANs
  • Optimization with QoS
  • VLAN Configuration
  • Site Surveys and Planning Tools
  • Troubleshooting

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The course offers a hands-on and comprehensive insight into Wireless LAN technology for network designers, administrators, and sales-oriented employees.

Knowledge Prerequisites

Apart from basic network and IT know-how, no special knowledge is required for a successful participation in this course. Know-how of the LAN sector will be helpful in the discussion of practice-related case studies.

Complementary and Continuative Courses

1 Wireless LANs at a glance
1.1 LANs - wireless vs. wired
1.1.1 Requirements for local networks
1.1.2 Application scenarios for WLANs
1.1.3 Facts at a glance
1.2 Design and structure of a WLAN
1.2.1 Ad-hoc vs. infrastructure
1.2.2 Wi-Fi Direct
1.2.3 Basic Service Area (BSA)
1.2.4 Distribution system
1.2.5 What is a repeater (WDS)?
1.2.6 Bridge/Mesh
1.2.7 Controller-based solutions
1.3 WLAN in the layer model
1.4 Standardization and regulation
1.4.1 Radio frequencies
1.4.2 IEEE 802.11 standards
2 Radio technology and WLAN generations
2.1 Physical basics
2.1.1 Attenuation and radiation
2.1.2 Frequency ranges in WLAN
2.1.3 Possible interferences
2.1.4 What does a spectrometer show?
2.2 Antenna technology
2.2.1 Diversity antenna system
2.2.2 MIMO
2.3 Headers on Layer 1 and 2
2.4 Frequency spreading
2.4.1 Spread spectrum technologies
2.4.2 The FHSS method
2.4.3 The DSSS method
2.4.4 The OFDM method
2.4.5 The OFDMA method
2.5 Modulation methods
2.5.1 Phase modulation (BPSK)
2.5.2 Quadrature amplitude modulation
2.6 WLAN generations
2.6.1 IEEE 802.11
2.6.2 IEEE 802.11b
2.6.3 IEEE 802.11a
2.6.4 IEEE 802.11g
2.6.5 802.11n: Wi-Fi 4
2.6.6 802.11ac: Wi-Fi 5
2.6.7 IEEE 802.11ad-2012: 60 GHz
2.6.8 802.11ax: Wi-Fi 6
2.6.9 Special extensions
3 Topologies, access methods and protocols
3.1 Structure of a WLAN
3.1.1 The infrastructure network
3.2 Logging on to the access point
3.3 Access procedures
3.3.1 Distributed Coordination Function (CSMA/CA)
3.3.2 Point coordination function
3.4 Data transport in WLAN architectures
3.5 Typical frame formats
4 Security and access protection
4.1 Network security objectives
4.1.1 Security components
4.2 Confidentiality
4.2.1 Diffie-Hellman - Generating symmetric keys
4.2.2 RSA - Asymmetric encryption
4.3 Integrity
4.4 Authenticity
4.4.1 Pre-distributed keys (preshared keys)
4.4.2 Digital signatures - the modern fingerprint
4.4.3 Certificates
4.5 IEEE 802.1X
4.5.1 IEEE 802.1X framework
4.5.2 EAP - Extensible Authentication Protocol
4.5.3 EAP and network operating systems
4.6 Availability
4.7 Authentication in the WLAN
4.7.1 MAC address filters
4.8 WPA: Wi-Fi Protected Access
4.9 WPA2 and IEEE 802.11i
4.9.1 Key management
4.9.2 Data integrity with AES-CCMP
4.9.3 Encryption with AES-CCMP
4.9.4 802.11i or WPA2?
4.9.5 Hole 196
4.9.6 KRACK
4.9.7 Protected Management Frames
4.10 WPA3
4.10.1 WPA3 Enterprise: Crypto methods
4.10.2 Simultaneous Authentication of Equals (SAE)
4.10.3 Easy Connect and PMF
4.10.4 Dragonblood
A Exercises and Assignments for the Course
A.1 Structure of the exercise network
A.1.1 Accessing the FTP Server
A.1.2 Reading Wireless Frames
A.1.3 Finding data, management and control frames...
A.1.4 Inspect radio headers
A.2 Infrastructure Network
A.3 Wireshark trace
A.3.1 Signal and transmission rate at WLAN client

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.