WLAN
and Networking Industry Organizations
Wi-Fi Related Organizations
The IEEE
PHY Amendments
802.11 Amendments
Wi-Fi Alliance
PoE (802.3)
RF Characteristics
and Behavior Electromagnetic
Spectrum
Wavelength, amplitude and other RF
characteristics
Reflection, refraction and other RF
behavior
RF Propagation
Basic Types of Modulation
RF
Mathematics and Measurements RF units of measure
Basic RF mathematics RF signal measurements
Understand link budgets
RF Antennas and Hardware RF Units of
Measure
Types of Antennas and Antenna
Systems Commonly Used With 802.11 WLANs
Antenna Polarization and Gain
Antenna Implementation
Types of Antenna Cables, Connectors, and
Other Accessories
802.11 PHYs
and Network Types 802.11 PHYs and
Network Types
802.11 Frequency Bands
802.11 Channels Explained
OSI Model Layers and Wi-Fi
802.11 Physical Layers (PHYs)
Throughput vs. Data Rate
RF Modulation Methods
802.11 Use Case Scenarios
WLAN Operating Modes including BSS. ESS
and Roaming
802.11 Network
Devices Access Point Features and
Capabilities
AP and WLAN Management Systems
Wireless Monitoring Systems (Analytics)
WLAN Controller Functionality
Network Architecture Planes
WLAN Bridging
Client Devices
Client Device OS Configuration
Power over Ethernet (PoE) Functionality
802.11
MAC Operations
802.11 Frames
Frame Aggregation
Guard Interval
General Frame Format
PHY Preamble
Management, Control and Data Frames
Locating WLANs
|
802.11 Channel Access Methods
Differences between CSMA/CD and CSMA/CA
Distributed Coordination Function (DCF)
Network Allocation Vector (NAV)
Clear Channel Assessment (CCA)
Interframe Spacing (IFS)
Contention Window (CW)
Quality of Service in 802.11 WLANs
Hybrid Coordination Function (HCF)
Additional Control Frames and Protection
Modes
WLAN Network Architectures
Control, Management and Data Planes
WLAN Controller Solutions
Network Architectures
RF Channel Planning
Service Set Configurations
Cell Sizing and Interference
WLAN Requirements and Solutions
Explore WLAN Deployment Scenarios
BYOD and Guest Access
Mobile Device Management
Radio Resource Management (RRM) and
other automatic RF management solutions
Additional Management Features
Security Solutions for WLANs
Additional Authentication Features
Deprecated Standard Security
Weak Security Mechanisms
Pre-shared Key and IEEE 802.1X/EAP
Wireless Intrusion Prevention Systems
(WIPS)
Protocol and Spectrum Analysis for
Security
Using Secure Protocols
Site Surveys, Network Design and
Validation
Survey Processes
Understanding Requirements
Verify Design Requirements
Documentation
Locating Interference
Spectrum Analysis
Application and Throughput Testing
Protocol Analysis
WLAN Troubleshooting
CWNP Troubleshooting Methodology
Protocol Analysis Troubleshooting
Features
Spectrum Analysis Troubleshooting
Features
RF Interference
Hidden Nodes
Connectivity Problems
|