Posts from ‘CCNA Wireless’
After talking with a few people within Cisco here in RTP there seems to be a growing demand for Wireless CCIE training. The problem they brought up is that there isn’t any real options on the market other than the offerings from FastLane. A couple companies have advertised support and taken orders for the new Wireless CCIE 2.0 but never actually delivered on the products.
If there is enough interest for Wireless CCIE workbooks, ATC style videos, rack rentals, etc then I’ll look into getting something released. Worst case we could put together a community based solution with INE providing Wireless CCIE racks at no charge for anyone supporting the community and very reasonably priced for others.
Here is a link to the Wireless CCIE Syllabus on Cisco’s site for those who are unfamiliar with the Wireless CCIE.
Don’t forget that on Monday, May 21, INE begins our 5-Day CCNA Wireless course.
If you haven’t signed up yet, there’s still time to do so here.
The course will be streamed live, online here.
Look forward to seeing everyone on Monday.
Tags: ccna wireless
Just ahead of our brand new CCNA Voice live online bootcamp beginning this Monday, I thought it might be nice to provide an easy-to-follow graphic for those starting out in Voice (or on any other Cisco networking track). This graphic was from last year, but remains quite easy to follow for each and every Cisco track.
Be sure you have a high resolution set if you wish to see the entire thing, otherwise scrolling may be necessary.
The WiFi Alliance introduced Wi-Fi Protected Access (WPA) in 2003 as a replacement technology for WEP. WPA is based on the 802.11i draft version 3. This improved technology relies upon Temporal Key Integrity Protocol (TKIP) to automate the changing of keys. Remember that a huge issue for WEP was the single, static key in use. Interestingly, WPA uses the RC4 encryption algorithm like WEP; although Advanced Encryption Standard (AES) can also be used if desired.
In this series of blog posts, we will examine WLAN security mechanisms in an even greater detail than in our popular 5-Day CCNA Wireless course. We will begin with one that is now considered legacy due to major weaknesses that were quickly discovered in its implementation.
This security mechanism receives the least coverage in the CCNA Wireless materials and exam, because, as we stated, it is indeed considered legacy. The official title for this technology is Preshared Key Authentication with Wired Equivalent Privacy. This name tells us a lot. We are not really truly authenticating someone using this approach, we are just ensuring that they possess a piece of information, the preshared key (password). Notice the Wired Equivalent Privacy portion of the name tells us that the creators of the technology were really trying to sell it to WLAN designers and implementers!
Once I catch my breath and look back at one of our popular INE courses like the CCNA Wireless course, I can delve a bit deeper into certain subjects that we did not have time for in the course. This is one of those moments. Let us get more detailed about Cisco’s implementation of Radio Resource Management (RRM) in the Cisco Unified Wireless Network architecture.
In today’s wireless LAN infrastructures, of course users want more and more bandwidth in a greater and greater coverage area. This is tricky to implement, however, since adding more and more powerful access points can actually do more harm than good for throughput. The goal of Cisco’s Radio Resource Management is to act like a Radio Frequency engineer built-in to the equipment. RRM allows the Cisco Unified Wireless equipment to continuously monitor the Radio Frequency environment and adjust things like channel assignments and and power levels to ensure optimal coverage and throughput. The exciting goal here is to make the wireless infrastructure “self-healing”.
Encoding and Modulating
What form of CSMA does 802.11 use?
What does DCF stand for?
Your wireless station heres someone transmit and waits the duration heard plus what value?
What logically seperates WLANs?
Name three requirements to roam between two autonomous APS.
For success designing and implementing Cisco Wireless solutions, a CCNA Wireless student needs to be familiar with the options for various wireless topologies. Two were defined by the 802.11 committees, while others were made possible thanks to excellent developments by wireless vendors like Cisco Systems.
The 802.11 Topologies
Ad Hoc Mode
While not popular, it is possible to have wireless devices communicate directly with no central device managing the communications. This is called the Ad Hoc network topology and is one of the two topologies defined by the 802.11 committees. In the Ad Hoc type topology, one device sets a group name and radio parameters, and another device uses this information to connect to the wireless network.
This type of wireless network topology is referred to as an Independent Basic Service Set (IBSS). This is easy to remember as we know the devices are working independently of an access point (AP).
Network Infrastructure Mode
When an access point is used to create the network, the official term is network infrastructure mode for the network. There is a Basic Service Set (BSS) setup that uses a single access point, or the Extended Service Set (ESS) that uses multiple access points in order to extend the reach of the wireless network.
We wanted to provide our students with advance notification of some upcoming online classes here at INE. While we hope to see many students in the actual live events, on-demand versions will indeed be made available the week following the live, online version.
September 13 – 17th, 2010 CCNA Wireless 5-Day Bootcamp
September 15 – 17th, 2010 Security for CCIE R&S Candidates 3-Day Bootcamp
September 29 – Oct 1, 2010 IPv4/IPv6 Multicast 3-Day Bootcamp
October 4 – 9th, 2010 Online 6-Day CCIE R&S Bootcamp with K. Barker and A. Sequeira