Professional Documents
Culture Documents
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e
aw
ei
.c
om
/e
Huawei Certification
HCNA-WLAN
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
g.
hu
in
Notice
ht
tp
:/
/l
ea
rn
ce
s:
Huawei Certification
ur
HCNA-WLAN
Mo
re
Le
ar
ni
ng
Re
so
aw
ei
.c
om
/e
rn
in
g.
hu
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
re
Mo
ni
ar
Le
ng
s:
ce
ur
so
Re
ht
tp
ea
/l
:/
rn
hu
g.
in
aw
ei
.c
om
/e
Referenced icon
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The wireless network first appeared during the WWII when the US army used radio
signals for data transmission. They developed a set of radio transmission and
ht
s:
encryption technologies, which were widely used by the US and Ally armies. 50 years
later, their inventions have changed people's life.
In 1971, researchers in Hawaii University invented the first radio network ALOHNET
based on encapsulation technology. This is one of the earliest versions of WLAN. This
network was comprised of seven computers in bidirectional star topology. The
computers are located in the four Hawaii islands with the core computer on the Oahu
island. This marked the birth of wireless network.
In 1990, the IEEE started the 802.11 project and formulated many 802.11 standards,
Re
so
ur
ce
ni
ng
ar
The WLAN market is rapidly expanding since 2003, becoming a highlight in IT market.
As people expect more and more convenient and high-speed WLAN, Wi-Fi,
Le
Mo
re
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
service.
Mo
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
tp
:/
ht
s:
ce
ur
so
Wireless Personal Area Networks (WPANs) are P2P or small wireless networks that
provide wireless access for individual users.
The Wireless Metro Area Network (WMAN) is used for backbone network coverage.
Re
Uses applied bands. You can also use the public bands but interference
The Wireless Wide Area Network (WWAN) is used by carriers for wireless coverage.
ar
ni
ng
exists.
Mo
With the development of wireless technologies, various wireless network are now
merging, blurring the boundaries between different wireless networks.
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mbit/s. The technology is cheap but the device used has a short lifespan.
Bluetooth: Works on the 2.4 GHz band. The ideal transmision distance is 10 cm to 10
m. Supports 72 Kbps/57.6 Kbps asymmetrical connection or 43.2 Kbps symmetrical
connection.
Home RF: A combination of IEEE802.11 and DECT. Works on the 2.4 GHz band and
provides a maximum of 2 M bandwidth within 100 m.
Re
so
ur
ce
s:
ng
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
First appeared in the US, WLAN technology is used as extension of the wired
network. It is mainly for family use. The American people have a strong requirement
on wireless access due to the cabling difficulty (Most Americans live in villas with
courtyards.) and the penetration of laptops and PDAs. This spurred the development
of WLAN.
Due to its mobility and wireless access capability, WLAN has been used in scenarios
such as families, offices, schools, and enterprises. With the development of WLAN, its
standards and products are also maturing.
The WLAN has the following advantages compared with wired access: high
bandwidth to support high-speed wireless access, cost-effective products and low
construction costs, mature technologies, and rich applications.
ni
Compared with ADSL and LAN, WLAN can provide wireless HIS(High
bandwidth wireless Internet access Service) to meet customer needs.
ar
ng
Re
so
ur
ce
s:
ht
If you ask the average user about their 802.11 wireless network, they may give you a
strange look. The name that many people recognize for the technology is Wi-Fi. Wi-Fi
is a marketing term, recognized worldwide by millions of people as referring to 802.11
wireless networking.
Mo
re
Compared with GPRS and CDMA1x, WLAN can provide 600 Mbit/s or higher
bandwidth at a lower cost.
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
High bandwidth: Rate of 802.11a/g reaches 54 Mbit/s; rate of 802.11n reaches 600
Mbit/s (using the MIMO technology).
Block traversal capability: applicable to the houses containing many walls with
complex structure.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mobility: Users move a lot but data needs to be stored in the same place. WLAN
enables users to access data from different locations, which improves productivity.
Flexibility: In some scenarios, traditional cabling can be very difficult. For example, in
old buildings without original design blueprint, it is difficult to lay out cables that will
penetrate the stone wall. However, WLAN can be flexibly deployed here.
Scalability: The WLAN requires no cabling or re-cabling. The WLAN can quickly build
ce
s:
ht
Economy: WLAN technologies help reduce network construction costs. First, there
are no cable costs. Second, if customers want to deploy wireless distribution system
ng
Re
so
ur
small and temporary group networks for meetings, overcoming the difficulties of
meeting holding among different offices. WLANs can be easily expanded since
wireless transmission media are ever-present. There is no need for any kind of
cabling. APs can also be deployed at hotels, stations, and airports.
ni
(WDS) between two buildings, they only need to buy the devices. The ensuing
maintenance costs are insiginificant. In the long term, this P2P wireless link is far
Mo
re
Le
ar
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WLANs in factories and production lines realize remote control and monitoring
of production equipment.
WLANs in logistics centers and ports realize medium and long distance
communication.
Mo
re
Le
ar
ni
ng
Re
so
s:
ce
ht
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WLANs provide users with real-time and free Internet access at any place.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ce
ur
so
Mobility
Flexibility
Scalability
Economicalness
Le
re
Mo
Re
ar
ht
s:
ng
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
China's State Radio Monitoring Center (SRMC), formerly known as the State Radio
Regulatory Commission (SRRC), is the only authorized organization in mainland
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
China that tests and certifies the radio type approval regulations. At present, China
has defined frequency ranges for different radio transmitting devices. Some
frequencies are not allowed in China. Different frequencies have been defined for
radio transmitting devices sold and used in China.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The FCC is an independent agency of the United States government, formed in 1934.
The FCC regulates interstate and international communications by radio, television,
ht
ce
s:
wire, satellite and cable. Radio products, communication products, and digital
products need to obtain FCC certification before entering the U.S. market. The FCC
investigates and researches product security stages to find out the best way to solve
problems. The FCC also regulates detection of radio devices and aircrafts.
The FCC defines regulations to reduce electromagnetic interference, manage and
control radio frequency ranges, and ensure the normal operation of telecom networks
and electrical products.
The FCC and the respective controlling agencies in the other countries typically
Re
so
ur
ar
ni
ng
Bandwidth
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
The ETSI standards development is open. The standards are drafted by ETSI
members in the technical committees, listed in the ETSI working plan after being
ng
Re
so
ur
ce
s:
(equipment makers and network operators) in Europe. The ETSI was approved by the
European Commission in 1988 and based in Nice (a southern city in France). The
ETSI is responsible for standardization of the telecommunications industry but not the
information and broadcasting industries. The ETSI is officially recognized by the
European Committee for Standardization (CEN) and European Conference of Postal
and Telecommunications Administrations (CEPT). The recommended standards
defined by the ETSI are often used by the European Communities as the technical
basis of European regulations and are required to comply with.
ni
Le
ar
secretariat and sent to the standards organizations of members for suggestions. After
suggestions are returned, the secretariat modifies the drafts according to the
suggestions and organizes voting in members. A proposition passes if at least 70% of
Mo
re
the weighed votes cast are in favor. Otherwise, the proposition becomes a temporary
standard or other technical file.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The IEEE was formed in 1963 by the merger of the Institute of Radio Engineers (IRE,
founded in 1912) and the American Institute of Electrical Engineers (AIEE, founded in
ht
ce
s:
1884). The IEEE has a dual complementary regional and technical structure, with
organizational units based on geography ( for example, the IEEE Philadelphia Section
and IEEE Computer Society).
The IEEE was founded to provide international exchange occasion for electrical and
electronic scientists, engineers, and manufacturers and provide professional
education and service capability improving services.
Re
so
ur
ni
ng
defining and revising more than 800 technical standards in every year. The IEEE
standards involve electrical and electronic devices, test methods, symbols, and
definitions.
ar
The Institute of Electrical and Electronics Engineers (IEEE) creates standards for
compatibility and coexistence between networking equipment. The IEEE standards
must adhere to the rules of the communications organizations, such as the FCC.
Mo
re
The IEEE 802 Committee was formed in February, 1980 to define international
standards for LANs.
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Wi-Fi is short for wireless fidelity. It refers to wireless compatibility certification and is
actually commercial certification and a wireless networking technology. Computers
are originally connected to the network using network cables and are now connected
to the network using radio waves. A wireless router is often used. The Wi-Fi
connection mode can be used for networking within the coverage range of wireless
router. If a wireless router connects to an ADSL line or another line, a hotspot is
so
ur
ce
Re
formed.
ni
ng
more than 300 member companies. Currently, the Wi-Fi Alliance has 10 independent
authoritative testing labs in six countries.
The Wi-Fi Alliance is the industry and technology leader in the WLAN field and
Le
It has good cooperation with the industrial chain and includes members such as
manufacturers, standards organizations, regulatory organizations, service providers,
and carriers.
Mo
re
ar
Because the ongoing expansion of the Wi-Fi network is implemented based on the
enterprise, household, and hotspot that allows people to wirelessly access the
Internet from anywhere at any time, compatibility is essential. The Wi-Fi Alliance
defines global regulations, tests and certifies wireless devices to enable them to
comply with standards of interoperability.
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ce
ur
so
Re
ng
ni
ar
Le
re
Mo
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
brings together the network designers, operators, and researchers related to Internet
architecture evolution and Internet stable operation and is open to all who want to
participate. The IETF meeting is hold three times a year with more than 1000
participants.
The IETF produces two types of files: Internet Draft and Request for Comments (RFC).
Any participant can propose an Internet Draft. Many important files were originally
Internet Drafts.
RFC is more formal than Internet Draft and is archived. Its contents remain
Re
so
ur
Proposal
Standard
ar
ng
RFCs include:
ni
The CAPWAP protocol (defined in RFC 5415) used in WLAN is defined by the IETF.
Mo
re
Best practice
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
The association aims to integrate and coordinate industry and social resources,
enhance the research, development, manufacturing, and service level of members,
and promote the fast and healthy development of the WLAN industry. Taking
advantage of leading and common wireless network security technology (WAPI), the
so
ur
ce
s:
Re
association promotes the wide use and application of WAPI, drives the development
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Extremely low frequency (ELF): 3 Hz to 30 Hz. Its wavelength ranges from 100,000
km to 10,000 km. It can be used in submarine communications or directly converted to
sound.
Super low frequency (SLF): 30 Hz to 300 Hz. Its wavelength ranges from 10,000 km
to 1,000 km. It can be directly converted to sound or used in AC transmission systems
(50 to 60 Hz).
Ultra low frequency (ULF): 300 Hz to 3 KHz. Its wavelength ranges from 1,000 km to
100 km. It can be used for communications in the mine field or directly converted to
sound.
Very low frequency (VLF): 3 KHz to 30 KHz. Its wavelength ranges from 100 km to 10
km. It can be directly converted to sound or ultrasound, or be used for geophysical
studies.
Low frequency (LF): 30 KHz to 300 KHz. Its wavelength ranges from 10 km to 1 km. It
can be used in international broadcasts.
Medium frequency (MF): 300 KHz to 3 MHz. Its wavelength ranges from 1 km to 100
m. It can be used in AM broadcasts, VHF omnidirectional range (VOR), marine and
navigation communications.
High frequency (HF): 3 MHz to 30 MHz. Its wavelength ranges from 100 m to 10 m. It
can be used in short-wave broadcasts and citizen's band radio.
Re
ng
ni
ar
Le
Very high frequency (VHF): 30 MHz to 300 MHz. Its wavelength ranges from 10 m to
1 meter. It can be used in FM broadcasts, TV broadcasts, and navigation
communications.
Mo
re
so
ur
ce
s:
ht
microwave ovens.
Ultra high frequency (UHF): 300 MHz to 3 GHz. Its wavelength ranges from 1 m to
100 mm. It can be used in TV broadcasts, mobile phones, wireless networks, and
aw
ei
.c
om
/e
Super high frequency (SHF): 3 GHz to 30 GHz. Its wavelength ranges from 100 mm
to 10 mm. It can be used in wireless networks, radar, and man-made satellites.
Extremely high frequency (EHF): 30 GHz to 300 GHz. Its wavelength ranges from 10
mm to 1 mm. It can be used in radio astronomy, remote sensing, and millimeter wave
scanner. Radio waves working at a frequency of more than 300 GHz include infrared
rays, visible light, UVs, and rays.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Because data ultimately consists of bits, the transmitter needs a way of sending both
0s and 1s to transmit data from one location to another. An AC or DC signal by itself
ht
so
ur
ce
s:
does not perform this task. However, if a signal fluctuates or is altered, even slightly,
the signal can be interpreted so that data can be properly sent and received. This
modified signal is now capable of distinguishing between 0s and 1s and is referred to
as a carrier signal. The method of adjusting the signal to create the carrier signal is
called modulation.
Re
higher frequency than the input signal. Otherwise, the two signals may overlap,
resulting in signal distortion.
ng
Data signals to be transmitted are usually of low frequency. When data signals are
transmitted over the low frequency, signal receiving and synchronization become
difficult. With a carrier wave, data signals can be loaded on the carrier wave. The
receiver receives data signals at the frequency of the carrier wave. The amplitude of
meaningful signal waves is different from that of meaningless signal waves. After
extracting meaningful signal waves from the modulated carrier wave, we obtain the
required data signals. We will talk about modulation and demodulation later.
re
Le
ar
ni
Mo
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
RF communication starts when radio waves are generated from an RF transmitter and
ht
s:
waves that you see in an ocean or lake. Waves are made up of two main
ce
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Amplitude is the height, force, or power of the wave. If you were standing in the ocean
as the waves came to shore, you would feel the force of a larger wave much more
ht
ce
s:
than you would a smaller wave. Transmitters do the same thing, but with radio waves.
Smaller waves are not as noticeable as bigger waves. A bigger wave generates a
much larger electrical signal picked up by the receiving antenna. The receiver can
then distinguish between highs and lows.
The amplitude is measured in meters or centimeters.
The amplitude describes the vibration range and intensity of a vibrating object.
The amplitude of the radio wave reflects the radio signal strength on the wireless
Re
so
ur
Mo
re
Le
ar
ni
ng
networks.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Phase is a relative term. It is the relationship between two waves with the same
frequency. To determine phase, a wavelength is divided into 360 pieces referred to as
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
degrees. If you think of these degrees as starting times, then if one wave begins at the
0 degree point and another wave begins at the 90 degree point, these waves are
considered to be 90 degrees out of phase.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If two wireless signals working at the same frequency have the same phase when
they reach the receiver, the two signals will overlay to enhance the signal effect.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If two wireless signals working at the same frequency have the opposite phases when
they reach the receiver (180 degrees in difference), the signal strength attenuates.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Frequency describes a behavior of waves. Waves travel away from the source that
generates them. How fast the waves travel, or more specifi cally, how many waves
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ar
ni
ng
Re
so
ur
ce
s:
ht
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The most common RF behavior is absorption. If a signal does not bounce off an
object, move around an object, or pass through an object, then 100 percent
ht
Brick and concrete walls will absorb a signal significantly, whereas drywall will absorb
a signal to a lesser degree. Materials of higher density may cause severe signal
attenuation. If the signal strength is too low, it is hard for a receiver to receive it. When
the wireless signals pass through water, the energy will be absorbed, leading to signal
attenuation. (In this example, water contained in the tree leaves at the wireless
so
ur
ce
s:
absorption has occurred. Most materials will absorb some amount of an RF signal to
varying degrees.
Re
transmission path or in human bodies near the wireless devices can absorb wireless
signals.)
ng
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Take the lights sent from an electric lamp as an example. Though most of the lights
spread out in all directions, some lights may encounter certain objects in the room and
be reflected. The reflected lights either go back to the electric lamp or illuminate other
areas in the room, making the areas brighter. Reflection can be caused by common
indoor objects, such as metal furniture, file cabinets, and metal doors. When outdoor
so
ur
ce
s:
the media the wave may bounce in another direction. This behavior is categorized as
reflection.
Re
ng
The reflected RF signals can cause interference to the original signals, leading to
signal distortion. Therefore, it would be better if no obstacle exists on the transmission
path of RF signals. Reflection can be the cause of serious performance problems in a
legacy 802.11/a/b/g WLAN. As a wave radiates from an antenna, it broadens and
disperses. If portions of this wave are reflected, new wave fronts will appear from the
reflection points. If these multiple waves all reach the receiver, the multiple reflected
signals cause an effect called multipath. Reflection and multipath were often
considered primary enemies when deploying legacy 802.11a/b/g radios. 802.11n
radios utilize multiple-input multiple-output (MIMO) antennas and advanced digital
signal processing (DSP) techniques to take advantage of multipath.
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Did you know that the color of the sky is blue because the molecules of the
atmosphere are smaller than the wavelength of light? This blue sky phenomenon is
known as Rayleigh scattering (named after the 19th-century British physicist Lord
Rayleigh). The shorter blue wavelength light is absorbed by the gases in the
atmosphere and radiated in all directions. This is an example of an RF propagation
behavior called scattering, sometimes called scatter.
ni
ng
Re
so
ur
ce
s:
ht
ar
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
particular surface. For example, refraction occurs when signals pass through
atmosphere layers or building walls of different densities.
When refraction happens, RF signals will change the transmission directions,
reducing the signal strength (some refraction media can affect the RF signal strength
and lead to signal attenuation).
Re
so
ur
ce
passes through a medium with a different density, thus causing the direction of the
ni
ng
Le
ar
Mo
re
outdoor wireless bridge links, refraction can be an issue. An RF signal may also
refract through certain types of glass and other materials that are found in an indoor
environment.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
the shape, size, and material of the obstructing object as well as the exact
characteristics of the RF signal, such as polarization, phase, and amplitude.
Typically, diffraction is caused by some sort of partial blockage of the RF signal, such
as a building that sits between a transmitting radio and a receiver. The waves that
encounter the obstruction bend around the object, taking a longer and different path.
The waves that did not encounter the object do not bend and maintain the shorter and
original path.
Through scattering, signals can bypass the objects that absorb their energy, and
Re
so
ur
ce
implement self-recovery. Due to this feature, signals can be transmitted to the receiver
ni
ng
even if there are some buildings between the transmitter and the receiver. However,
the radio wave may change after bypassing the obstacles, leading to signal distortions.
Sitting directly behind the obstruction is an area known as the RF shadow. Depending
Le
ar
on the change in direction of the diffracted signals, the area of the RF shadow can
become a dead zone of coverage or still possibly receive degraded signals. The
concept of RF shadows is important when selecting antenna locations. Mounting to a
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ng
Re
so
ur
ce
External obstacles: Many objects that can absorb and scatter signals exist
ar
ni
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ur
Some wireless signals are reflected and some others are directly transmitted along
the signal transmission paths. When signals reach the receiver, if the electric field
direction of reflected signals is in reverse with that of signals directly transmitted (that
so
ce
s:
Re
is, a 180 degree difference in phase), the signal strength is reduced. On the contrary,
Mo
re
Le
ar
ni
ng
if the electric field direction of the reflected signals is the same as that of signals
directly transmitted (that is, 0 difference in phase), the signal strength is increased.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Gain, also known as amplification, can best be described as the increase of amplitude,
or signal strength. The two types of gain are known as active gain and passive gain. A
ht
s:
Antennas are passive devices that do not require an external power source. The
antenna itself cannot increase the power of signals. Antenna gain is a kind of
capability to concentrate signal energy. The omnidirectional antenna can barely
concentrate signal energy. If the antenna can concentrate the energy of RF signals
into a narrower space, the power of signals increases.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Signals are focused into a beam instead of being transmitted in all directions. To form
a visible path between the transmitter antenna and the receiver antenna for the
signals, they cannot be interrupted by any obstacles.
Obstacles (including buildings and plants) that can interrupt the signals usually exist
ce
s:
ht
ur
Re
so
In this situation, the antenna must be elevated to a place higher than the obstacles, so
that no obstacles exist on the transmission path.
In long distance transmissions, the curved earth surface becomes the obstacle that
ng
may interrupt the signals. When the transmission distance exceeds two miles, the
remote end cannot be seen as it is slightly below the horizon. In this situation, the
ar
ni
wireless signals can transmit with the same curvature as the earth surface along the
atmosphere layers. However, if the transmission path is too long, the curved earth
surface is in the Fresnel zone, leading to transmission problems.
Le
As a result, the height of the visual system must be elevated, making the bottom line
of the Fresnel zone higher than all obstacles.
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
What is the working principle of WLAN radios? What are their modulation modes?
ht
s:
Frequency modulation
Phase modulation
ur
ce
Mo
re
Le
ar
ni
ng
Re
so
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Industrial band: The industrial band in America ranges from 902 to 928 MHz. In
Europe, the 900 MHz frequency band is partially used for GSM communications. The
ht
s:
Medical band: The medical band ranges from 5.725 to 5.875 GHz. The medical band
and the frequencies ranging from 5.15 to 5.35 GHz are the 5 GHz frequency band.
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
The 802.11 standard supports 2.4 GHz and 5 GHz frequency bands.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The 2.4 GHz frequency band is used for wireless transmission over a short distance,
and is used by countries all over the world. WLANs operating in the 2.4 GHz
ht
so
ur
ce
s:
Re
frequency band features low channel conflicts. However, high frequency has its own
ng
limitations. The 5 GHz frequency band transmits signals at a line; therefore more
access points are required. Besides, as the 5 GHz frequency band is easily absorbed,
Mo
re
Le
ar
ni
it has a shorter transmission distance compared to the 2.4 GHz frequency band.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
IEEE 802.11b is one of the WLAN standards. It operates at the 2.4 GHz frequency
band with a transmission rate of 11 Mbit/s. IEEE 802.11b is a well-known WLAN
ht
Re
so
ur
ce
s:
standard and it is widely used. The 2.4 GHz ISM band provides 14 channels with a
bandwidth of 22 MHz. IEEE 802.11g operates at the 2.4 GHz frequency band. When
the original data transmission rate is 54 Mbit/s, data is actually transmitted at 24
Mbit/s over the 2.4 GHz frequency band. 802.11g devices are compatible with
802.11b devices. 802.11g is a standard designed for data transmission at higher
rates. It supports the 2.4 GHz frequency band and uses the CCK technology to be
backward compatible with 802.11b. In addition, 802.11g provides a transmission rate
of up to 54 Mbit/s using the orthogonal frequency-division multiplexing (OFDM)
technology.
ng
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
In Japan, Channel 1 to Channel 14 can be used for the 2.4 GHz WLAN. Among them,
Channel 14 can only be used in 802.11b. This figure shows the frequency band
ur
The working frequency specified in China, FCC (America), IC (Canada), and ETSI
(Europe) ranges from 2.4 to 2.4835 GHz.
ce
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
For wireless technology, when two channels are bound, the throughput is largely
increased.
In the traditional 802.11 standard, air interfaces work at a bandwidth of 20 MHz. The
802.11n technology binds two neighboring 20 MHz channels to form a 40 MHz
channel to double the transmission rate. In actual applications, the two bound 20 MHz
channels can also be used as two separate channels, one as the primary channel and
the other as the secondary channel. Therefore, either a 40 MHz channel or a single
20 MHz channel can be used for transmitting and receiving data. At the same time,
partial bandwidth is reserved in each 20 MHz channel to avoid signal interferences.
When two 20 MHz channels are bound to form a 40 MHz channel, the reserved
bandwidth can be also used for communication, further improving the throughput.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Five channels are provided for frequency bands with a total bandwidth of 125
ur
ce
s:
MHz. The center of the outer channel is 20 MHz away from the edge of the
frequency band.
Mo
re
Le
ar
ni
ng
Re
so
frequency bands with a total bandwidth of 200 MHz. Four channels are
provided for U-NII high-frequency band with a total bandwidth of 100 MHz. For
U-NII low-frequency bands and U-NII middle-frequency bands, the center of
the outer channel is 30 MHz away from the edge of the frequency band. For UNII high-frequency bands, the distance is 20 MHz.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The 40 MHz channel mode has higher usage efficiency of frequency bands and
doubles the throughput of that in 20 MHz channel mode. However, the 40 MHz
ht
s:
channel mode has some problems due to the limited spectrum resources of the 2.4
GHz band, which cannot provide two 40 MHz channels without any interference.
However, the 5 GHz frequency band has abundant spectrum resources. FCC
specifies 23 non-overlapping 20 MHz channels and China has five non-overlapping
20 MHz channels. Therefore, sufficient channels can be provided for the binding to
form 40 MHz channels.
The 40 MHz channel mode is not recommended in the 2.4 GHz frequency band.
Usually, the 20 MHz channel mode is used in 802.11g/n to obtain more channel
Re
so
ur
ce
resources for cellular signal coverage. To obtain the high throughput of 40 MHz, the 5
Mo
re
Le
ar
ni
ng
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The 2.4 GHz frequency band is the ISM open frequency band. Devices working at the
2.4 GHz frequency band include cordless phones, baby monitors, microwave ovens,
ht
wireless cameras, Bluetooth devices, infrared sensors, and fluorescent light ballasts.
s:
Compared with the 2.4 GHz frequency band, the 5 GHz frequency features less
interference. More devices begin to use the 5 GHz frequency band, such as cordless
phones, radars, wireless sensors, and digital satellites.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
What are the common non-overlapping channels working at the 2.4 GHz frequency
band?
ht
s:
How many non-overlapping channels are provided for the 5 GHz frequency band in
China? What are they?
ce
ur
Five. They are Channel 149, Channel 153, Channel 157, Channel 161, and Channel
Mo
re
Le
ar
ni
ng
Re
so
165.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei APs include indoor distributed APs, indoor settled APs, outdoor APs, and the
latest 802.11ac APs.
Indoor settled AP: The APs are recommended in scenarios where the building
structure is simple and the building area is small, have a high density of users,
ce
s:
ht
Re
so
ur
and have high capacity demands, for example, small-scale meeting rooms,
bars, and entertainment places. The APs can be flexibly deployed and works
in both Fit AP and bridge mode.
Indoor distributed AP: The APs are recommended in scenarios where the
ng
building area is large, users are distributed, and an indoor distribution system
is used, for example, large-scale office buildings, business buildings, hotels,
ar
ni
airports, and bus stations. The APs can implement indoor WLAN signal
coverage.
Outdoor distributed AP: The APs are recommended in scenarios with a large
Mo
re
Le
number of APs and users and where there is a high density of users, for
example, schools and large exhibition centers.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei AC6005 series (AC6005 for short) is access controllers (AC) applicable to
MANs and enterprise networks for wireless access. AC6005 has a large capacity and
high performance. It is highly reliable, easy to install and maintain, and features such
advantages as flexible networking and energy conservation.
The AC resides at the aggregation layer to provide the high-speed, secure, and
reliable WLAN service.
Re
so
ur
ce
s:
ht
Can be maintained using the eSight, web system, or command line interface
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
The AC6605 has twenty-four GE ports, two 10GE ports, one 10GE port connecting an
AC to an LSW, and one reserved 10GE port. The switching capacity is calculated
using the following formula: (24 Gbit/s + 2 10 Gbit/s + 1 10 Gbit/s + 1 10 Gbit/s)
2 = 128 Gbit/s.
Re
Mo
re
Le
ar
ni
ng
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei access controller unit (ACU2) is installed in a modular switch and functions as
an AC. The ACU2 can be installed in S12700, S9700, and S7700 series switches.
ht
ar
ni
ng
Re
so
ur
ce
s:
The ACU2 can be applied to large-sized enterprises and campus networks to provide
wireless services. With large capacity, high reliability, and various services, the ACU2
works with Huawei APs to provide high-density access for a large number of users.
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei provides only one plate AP model: AP2010DN. Huawei AP2010DN uses an
86 mm plate in compliance with international standards and can be easily installed on
ht
so
ur
ce
s:
the junction box in a room. It is equipped with a built-in antenna and a hidden
indicator; therefore, installation of this AP does not affect indoor decorations and
designs. The AP2010DN also provides a built-in IEEE 802.11a/b/g/n wireless module
and supports a maximum transmission rate of 300 Mbit/s. It provides access services
for wireless terminals, including laptops, tablets, and smart phones, and is the ideal
choice of customers to construct wireless networks in hotels and office buildings.
It is appropriate to install plate APs (86 mm x 86 mm) in hotels, office buildings, and
Wireless plate APs can be deployed quickly without damage to the room environment.
Mo
re
Le
ar
ni
ng
Re
residential communities.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
and visitors from hotel rooms. Supporting 2.4 GHz single band frequency, the
economical AP5010SN helps customers reduce investment and provides efficient,
secure, and reliable mobile office working environment.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
and visitors from hotel rooms. Supporting 2.4 GHz/5 GHz bands, the economical
AP5010SN helps customers reduce investment and provides efficient, secure, and
reliable mobile office working environment.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Using the latest generation of chips that are more powerful and can provide more
accurate wireless coverage than other chips, Huawei AP6010SN is an advanced
ht
Supporting 2.4 GHz single band frequency, the AP6010SN is beautifully designed
and applies to multi-service enterprise scenarios with medium or high density of
users, such as educational institutions, enterprise offices, airports, and retailing
stores.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
802.11n AP. In addition to data services, the AP6010SN can support voice and video
services that require short latency.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Using the latest generation of chips that are more powerful and can provide more
accurate wireless coverage than other chips, Huawei AP6010DN is an advanced
ht
Supporting 2.4 GHz/5 GHz bands, the AP6010DN is beautifully designed and applies
to multi-service enterprise scenarios with medium or high density of users, such as
educational institutions, enterprise offices, airports, and retailing stores.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
802.11n AP. In addition to data services, the AP can support voice and video services
that require short latency.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei AP7110SN integrates the latest mature technologies of the industry, including
3x3 MIMO, spectrum analyzer, and multi-core components.
Industry-level design and waterproof and dustproof capabilities enable the AP7110SN
to work in harsh environments. It has higher reliability, security, and radio
performance, supports 2.4 GHz band, and applies to large scenarios or scenarios with
high user density, such as convention centers, hospitals, factories, and logistics
centers.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Huawei AP7110DN integrates the latest mature technologies of the industry, including
3x3 MIMO, spectrum analyzer, and multi-core components.
Industry-level design and waterproof and dustproof capabilities enable the AP7110DN
to work in harsh environments. It has higher reliability, security, and radio
performance, supports 2.4 GHz band, and applies to large scenarios or scenarios with
high user density, such as convention centers, hospitals, factories, and logistics
centers.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
The AP5030DN can work as a Fat AP or Fit AP and switch flexibly between the two
Re
so
ur
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Using the latest generation of chips that are more powerful and can provide more
accurate wireless coverage than other chips, Huawei AP6010SN is an advanced
ht
The AP6310SN is a large power indoor AP. It applies to 2G/3G indoor distribution
environments, using the line where 2G/3G signals are transmitted.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
802.11n AP. In addition to data services, the AP can support voice and video services
that require short latency.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Using the latest generation of chips that are more powerful and can provide more
accurate wireless coverage than other chips, Huawei AP6510SN is an advanced
ht
Industry-level design and waterproof and dustproof capabilities enable the AP6510DN
to work in harsh environments such as public squares, pedestrian streets, and
factories. It can be quickly started in low temperature environment and has a built-in
lightning protector, which simplifies network deployment. It also supports electrical
uplink interfaces and 802.3af PoE.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
802.11n AP. In addition to data services, the AP can support voice and video services
that require short latency.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Using the latest generation of chips that are more powerful and can provide more
accurate wireless coverage than other chips, Huawei AP6610DN is an advanced
ht
Industry-level design and waterproof and dustproof capabilities enable the AP6610DN
to work in harsh environments such as public squares, pedestrian streets, and
factories. It can be quickly started in low temperature environment and has a built-in
lightning protector, which simplifies network deployment. It also supports electrical
and optical uplink interfaces and AC power supply.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
802.11n AP. In addition to data services, the AP can support voice and video services
that require short latency.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The AC controls and manages all APs in a WLAN. It can also connect to an
authentication server to authenticate WLAN users.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Indoor settled APs with omnidirectional antennas are commonly used to provide
wireless signal coverage. They can be easily and flexibly deployed at low costs. Each
AP works independently, which facilitates selection of the number of APs to satisfy
different bandwidth requirements.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
Indoor settle APs are uplinked to nodes of access networks, sucha as access
switches or ACs and downlinked to STAs.
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Large power outdoor APs are used in outdoor scenarios, whose coverage
performance is affected by transmit power, types of antennas, height, and obstacles.
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
In WLAN deployment, all the factors need to be taken into consideration, such as
system capacity and the number of APs, antenna gain and coverage angle, signal
penetration capability and power budget, and protection grade.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Any user:
Re
ur
so
ce
s:
adjusts network control strategies to ensure enterprise network security. eSight also
provides an open platform, allowing enterprises to build their own intelligent
management systems.
ng
ar
ni
re
Mo
Any service:
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
With wide application of IP phones, network video monitoring, and wireless Ethernet
networks, the power supply requirements on the Ethernet become urgent. In most
ht
Re
so
ur
ce
s:
situations, access point devices need to provide power supply with DC power,
whereas access point devices are often installed on the ceiling that has a long
distance from the ground. The nearby proper power socket is difficult to find. Even if
the proper power socket is available, the network administrator finds it hard to install
the converter of the AC and DC power required by access point devices. On largescale LANs, the administrators need to manage multiple access point devices that
require uniform power supply and management. In this case, power supply
management is difficult. The PoE function addresses this problem.
Power over Ethernet (PoE) provides power through the Ethernet. It is also called
Power over LAN (PoL) or active Ethernet.
ni
ng
Le
ar
centralized power for terminals such as IP phones, Access Points (APs), chargers of
portable devices, POS machines, cameras, and data collection devices. Terminals
Mo
re
are powered when they access the network. Therefore, the indoor cabling of power
supply is not required.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
The PSE provide power for other devices and are classified into MidSpan (the PoE
ce
s:
Huawei PSEs are mostly Endpoint. Definition of PD (powered device): PDs are
Re
so
ur
module is installed out of the switch) and Endpoint (the PoE module is integrated to
the switch) PSEs.
devices powered through PoE, including wireless APs, IP phones, and low power
Mo
re
Le
ar
ni
ng
SOHO switches.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Network router
Network camera
VoIP phone
AP
s:
IP security camera
ur
ce
ht
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The IEEE 802.3af standard stipulates that PSEs can power PDs with a power below
13 W through the Ethernet. The IEEE 802.3af standard can satisfy traditional IP
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
phones and network cameras. However, it is becoming increasingly clear that the 13
W power cannot power dual-frequency access, video phones, and other high power
applications.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Indoor settled AP
Indoor distributed AP
Outdoor AP
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
NOTE:
ht
ur
ce
s:
the device. Using Telnet or STelnetv1 has potential security risks. STelnetv2 is
recommended.
Mo
re
Le
ar
ni
ng
Re
so
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
VRP helps to provide unified user interfaces and interface management as the core
engine of the software for Huaweis whole series routers, Ethernet switches and
service gateways. VRP defines and forwards norms of plane interface and makes the
ur
s:
interconnection services.
Mo
re
Le
ar
ni
ng
Re
so
interaction between forwarding planes of all products and the VRP control plane a
reality. VRP also forms a network interface layer to keep the difference between the
data link layer of the product and the network layer at bay.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Choose Start > All Program > Accessories > Communications > HyperTerminal to
start the HyperTerminal in Windows XP
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Enter the name of the new connection in the Name text box and then choose one
icon. Then, click OK.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In the Connect To dialog box, select an interface from the drop-down list box
according to the actual interface on the PC or terminal. Next, click OK.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Press Enter until the following information is displayed. Enter the password and
confirm password, and the system will save the password. (The following information
is only for reference.)
ht
s:
When you log in to the system again in password authentication mode, enter
the password that is set during the initial login.
You can run commands to configure the device.
Mo
re
Le
ar
Re
ng
so
NOTE:
ni
ur
Confirm Password:
ce
Enter Password:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Command line interfaces are classified into command line views. All commands must
be executed in command line views. You can run a command only after you enter its
command view.
ht
ce
s:
# Connect to the switch. If the switch uses default settings, you enter the user
view.
ur
<Quidway>
so
[Quidway]
Re
<Quidway> system-view
ng
ni
[Quidway] aaa
Note: The default sysname is Quidway. The prompt indicates the current view. For
example, <> indicates the user view and [] indicates all other views except user view.
Le
ar
[Quidway-aaa]
Some commands can be executed in multiple views, but they have different functions
re
Mo
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If the matching key word is unique, the system replaces the typed one with the
complete key word and displays it in a new line with the cursor a space behind.
If there are several matches or no match at all, the system displays the prefix
first. Then you can press Tab to view the matching key word one by one. In this
case, the cursor closely follows the end of the word and you can type a space to
enter the next word.
so
ur
ce
ht
Press Tab after typing the incomplete key word and the system runs the partial help:
s:
If a wrong key word is entered, press Tab and the word is displayed in a new
Mo
re
Le
ar
ni
ng
Re
line.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
AC6605 is a new device added to the network. To manage the AC6605 remotely,
configure the Telnet service and system name at the LSW side and AC side before
installing the AC6605.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Set the authentication method to AAA, user name to Huawei, and password to
Huawei.
s:
1.
ht
2.
3.
Configure AAA authentication for the users at the vty 0 to vty 4 levels.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
so
ur
Re
ng
s:
Run the display users [ all ] command to check information about the user
interface.
ce
ht
Run the display telnet server status command to check the configuration and
ni
Mo
re
Le
ar
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Use the FTP, TFTP, or BootROM menu to copy the system software and BootROM
program to the root directory of the storage device.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
AC mode
so
Re
ur
ce
s:
server, or FTP server, the AP starts to upgrade its version.Unlike automatic upgrade,
an in-service upgrade allows an AP to work properly without affecting services. To
minimize the impact of an AP upgrade, you are advised to configure APs to download
upgrade files in the daytime and reset the APs at night.
FTP mode
ni
ng
ar
Le
Mo
re
In an in-service upgrade, you can upgrade a single AP, upgrade APs based on both
the AP region and AP type, or upgrade APs based on the AP type.
aw
ei
.c
om
/e
AP upgrade based on the AP region and AP type: allows you to upgrade APs in
a specified hotspot area.
AP upgrade based on the AP type: allows you to upgrade APs of the same
g.
hu
type.
Note the following during the configuration:
in
In an in-service upgrade, if APs fail to load the upgrade file and are reset, APs
Upgrading multiple APs in AC mode takes a long period of time. To reduce the
service interruption time, you are advised to use the FTP or SFTP mode.
The AP version file has been uploaded to the AC, SFTP server, or FTP server.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ht
Connect the console ports of the PC and AC with a serial cable and connect
the network port of the PC and the maintenance network port of the AC with
a network cable.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To upgrade APs of the same type, run the preceding command at one time. During
upgrade, run the display ap all command to check whether APs are being upgraded.
In this example, the FTP mode is used. The maximum number of APs to be upgraded
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
Course name
[AC6605] aaa
s:
ce
Re
so
[AC6605-aaa] quit
ur
ng
ar
ni
[AC6605-ui-vty0-4] return
Le
AC mode
re
FTP mode
Mo
SFTP mode
x-40
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
BSS: A basic service set (BSS) is the basic building block of an 802.11 WLAN and
comprises a group of associated STAs. STAs can communicate with each other when
they are located in a conceptual area which is called the basic service area (BSA).
The BSA is determined by the transmission feature of the wireless media. An STA
s:
ht
ce
can communicate with other STAs in the same BSS since they are in the BSA.
BSA: The basic service area is the coverage area of the BSS.
ESS: An extended service set is a set of multiple interconnected BSSs with the same
SSID. It is a virtual BSS of a large scale.
SSID: A service set identifier is the unique identifier of the BSS. Using SSID, one
Re
so
ur
ng
wireless LAN can be divided into several sub-networks that require independent
authentication. Users can access the corresponding sub-networks only after they
pass the authentication. This prevents unauthorized users from accessing the network.
ni
BSSID: The basic service set identifier is the MAC address of an AP. It identifies the
BSSs managed by the AP. As for one AP, each BSSID maps to a specified SSID. If
multiple APs manage the same BSS, the BSS has only one SSID but different
ar
Mo
re
Le
BSSIDs for each AP. If one AP manages multiple BSSs, different BSSIDs are
assigned to map these SSIDs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
BSS: A basic service set (BSS) is the basic building block of an 802.11 WLAN and
comprises a group of associated STAs. STAs can communicate with each other when
they are located in a conceptual area which is called the basic service area (BSA).
The BSA is determined by the transmission feature of the wireless media. An STA
can communicate with other STAs in the same BSS since they are in the BSA.
BSSs can be classified into two types: independent BSS and infrastructure BSS.
The figure on the left is an independent BSS (IBSS for short). STAs can directly
communicate with each other within an IBSS since the distance between two STAs is
within the limited range. An IBSS must consist of at least two STAs. In general, an
IBSS is established temporarily for a small number of STAs for specific purposes. For
example, an IBSS is established to organize a conference in the meeting room. When
the conference begins, the STAs form an IBSS to transmit data. When the conference
ends, the IBSS is dismissed immediately.
An IBSS is of a small scale, established for specific purposes and lasts for a short
period. Therefore, it is also called Ad-hoc BSS or Ad-hoc network.
ni
ng
Re
so
ur
ce
s:
ht
ar
Note: Ad-hoc is originated from Latin, which means special or for special
situation. Ad-hoc network is also called P2P network because STAs on this
network communicate directly with each other.
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
BSS can be used in a small office or family. However, it cannot cover large-scale
areas. 802.11 allows us to connect several BSSs into an extended service set (ESS
ht
ur
ce
s:
for short) to expand the WLAN coverage area. ESS is the connection of several BSSs
through a backbone network. All the APs within an ESS use the same service set
identifier (SSID for short), which is the name of a user network. 802.11 does not
specify which technology to use. It's only required that the technology should provide
a set of specified services.
Huawei recommend AP overlap of at least 15 to 25 percent to achieve successful
seamless roaming, although measuring cell overlap is not an exact science.
SSID: A service set identifier is the unique identifier of the BSS. Using SSID, one
wireless LAN can be divided into several sub-networks that require independent
Re
so
BSSID: The basic service set identifier is the MAC address of an AP. It identifies the
ar
ni
ng
authentication. Users can access the corresponding sub-networks only after they
pass the authentication. This prevents unauthorized users from accessing the network.
BSSs managed by the AP. As for one AP, each BSSID maps to a specified SSID. If
Mo
re
Le
multiple APs manage the same BSS, the BSS has only one SSID but different
BSSIDs for each AP. If one AP manages multiple BSSs, different BSSIDs are
assigned to map these SSIDs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The earlier 802.11 chips support only a single BSS. A single AP can only provide one
wireless network for users, and the authorities of users on this network are almost the
ht
For example, each company has some regular visitors who have their own wireless
terminals (such as laptops and mobile phones). These terminals need to access the
Internet. An ESS is established for the AP to allow the visitors to access the Internet.
Currently, APs can create several ESSs simultaneously. For example, some APs
so
ur
ce
s:
same. A single logical network can meet the requirements of the earlier scenarios
where there are only a few users. However, with the popularization of wireless
networks, a single network is far from enough.
Re
developed by Huawei can support 16 virtual APs per radio. That is, each AP radio can
support 16 ESSs.
ng
As shown in this figure, two ESSs are created on an AP. Therefore, the AP has two
SSIDs: Internal for internal employees and Guest for visitors. The SSIDs are
associated to different VLANs that have different access authorities. In this way,
different users can access the wireless network through one AP.
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The wireless network of Ad-hoc typology consists of several wireless STAs. One STA
can directly communicate with another STA or several other STAs through the Ad-hoc
typology. This network cannot be connected to a wired network, and it works
independently. No AP is configured on the network. Each user ensures its own
s:
ht
ce
security.
The STAs on the network compete for public channels. When a lot of STAs coexist on
ur
the network, the channel competition may congest the network. Therefore, such
On a point-to-point network, each node must "see" other nodes; otherwise, they
consider that network connection is interrupted. Therefore, the Ad-hoc network is
applicable only when there are a few users, for example, 4 to 8 users.
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When several APs are connected to cover larger areas, the APs should communicate
with each other in order to monitor the mobile STAs. A distribution system is the
ht
ur
The distribution system is responsible for tracing the actual positions of STAs and
transmitting the frames. To transmit frames to a mobile STA, the distribution system
must first transmit them to a specified AP that serves this STA. As is shown in the
so
ce
s:
Re
figure, if STA1 wants to access STA3, STA1 must transmit frames to AP1 first. The
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
APs are connected to the 802.3 Ethernet network. All the hosts in wireless networks
communicate through the APs.
The wireless AP works in half-duplex modes. It receives, buffers, and forwards data
between STAs and the wired network. Wireless communication is implemented by the
AP.
An AP covers dozens of users and the radius of coverage area can reach a hundred
ce
s:
ht
ur
A mobile terminal can roam between the wireless networks with the same ESSID. The
Re
so
ng
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
ng
Re
so
ur
systems or wireless network adapters. Therefore, at least two APs of the same
function exist in the WDS. The maximum number of APs is determined by the
vendor's network structure. WDS connects APs using wireless links and does
not affect the coverage capabilities of APs.
ar
ni
Le
cables for wired network connection in public places. However, the WDS
system can flexibly establish private networks through the 2.4 GHz or 5.8 GHz
Mo
re
Huawei dual band APs can support a series of comprehensive services, and feature
long transmission areas, high anti-interference capabilities, simple network
deployment, automatic AC discovery and configuration, and real-time management
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
and maintenance. These APs meet the network coverage and connection
requirements of indoor and outdoor WLAN.
Mo
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
For indoor WDS deployment, you can select the P2P or P2MP networking
so
Re
ur
ce
s:
ng
The application scenario in this figure is the outdoor P2P networking mode.
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WDS connects two networks through two APs. The peer MAC address is configured
on each AP to determine the link to be set up in the actual application.
The P2P WDS networking mode can connect two networks in different places. You
need to specify the same channel for the root AP and leaf AP.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The P2MP WDS networking mode can integrate several remote and isolated
networks together. Compared to the P2P mode, it has a more complicated structure.
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
As shown in the figure, root AP is the center device. The other APs set up wireless
links with root AP. LAN segments 2, 3, and 4 can only communicate through root AP.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When there are obstacles between two LANs or the transmission distance is too far,
two LANs can be connected through a repeater AP. The repeater AP connects two
ht
APs and transmits data between them, extending the coverage areas of the system.
s:
The repeater AP can extend the wireless transmission distance to tens or dozens of
kilometers without increasing the network bandwidth.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ht
Depending on the AP's location on the WDS network, a wireless bridge works in root,
middle, or leaf mode.
ce
The hand-in-hand mode applies to typical WDS indoor scenarios, such as homes,
warehouses, subways, and enterprises. WLAN signals deteriorate because of walls
Re
so
ur
ng
and other obstacles. One AP cannot provide signal coverage for all indoor areas. A
WDS network connects multiple APs, enlarging signal coverage area and saving
For users that do not have high bandwidth requirements, this mode is cost-effective.
Mo
re
Le
ar
ni
cabling costs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The back-to-back mode applies to typical WDS outdoor scenarios. When there are
obstacles between two LANs to be connected or the transmission distance is too far,
ht
ur
When users require high bandwidth, two repeater APs can be deployed in back-toback mode to provide the wireless bridge function. The two APs work at different
channels to provide high link bandwidth.
Mo
re
Le
ar
ni
ng
Re
so
ce
s:
you can select the back-to-back mode. As is shown in the figure, two repeater APs
are deployed in back-to-back mode on the network to provide the wireless bridge
function. This network deployment ensures wireless link bandwidth for a long
transmission distance.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
On a traditional WLAN, APs exchange data with STAs using wireless channels and
connect to a wired network through uplinks. If no wired network is available before a
WLAN is constructed, it takes much time and money to construct a wired network. If
positions of some APs on a WLAN are adjusted, the wired network must be adjusted
accordingly, increasing the difficulty in network adjustment. A traditional WLAN
requires a long construction period and has a high cost and poor flexibility, so it does
so
ur
ce
Re
not apply to emergency communication, wireless MANs, or areas that lack weak wired
Mo
re
Le
ar
ni
ng
Robustness: A WMN is a peer network that will not be affected by the failure of
a single node. If a node fails, packets are forwarded to the destination node
in
/l
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
ea
rn
g.
hu
A WMN allows APs to wirelessly connect to each other, solving the preceding
problems. A WMN has the following advantages:
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Point-to-multipoint mode
Repeater mode
ht
Point-to-point mode
s:
ce
ur
Mo
re
Le
ar
ni
ng
Re
so
other APs set up wireless links with the center AP. Data forwarding between
sub-networks must be implemented through the center AP.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
tp
:/
ht
The IEEE 802.11 working group has defined the standards related to:
802.11 physical layer standard defines the frequency, modulation method, and highest rate.
IEEE 802.11: In 1990, the IEEE standard association (IEEE-SA) appointed the
IEEE 802.11 working group, which defined the standards related to physical
layer and MAC layer. The physical layer, working at 2.4000-2.4835 GHz,
defines signal characteristics and modulation in data transport. The highest
rate at this layer is 2 Mbps.
IEEE 802.11a: IEEE 802.11a standard was completed in 1999. It defines the
frequency of WLAN, which is between 5.15 GHz and 5.825 GHz. The data
transport rate reaches 54 Mbps.
Re
so
ur
ce
s:
Le
ar
ni
ng
Mo
re
IEEE 802.11n: IEEE 802.11n uses 2.4 GHz and 5 GHz frequency bands.
Multiple-input multiple-output (MIMO) and OFDM are the core technologies of
IEEE 802.11n. The transport rate is 300 Mbps and reaches 600 Mbps at the
maximum. IEEE 802.11n is compatible with 802.11b and 802.11g.
802.11 MAC layer standard defines the features of WLAN at the MAC layer, such as
QoS, security, and roaming.
aw
ei
.c
om
/e
802.11h, refers to the amendment added to the IEEE 802.11 standard for
Spectrum and Transmit Power Management Extensions. It solves problems
like interference with satellites and radar using the same 5 GHz frequency
:/
/l
ea
rn
in
g.
hu
ce
IEEE 802.11r, fast BSS transition (FT), reduces the delay to transit clients
between APs. IEEE 802.11h is designed to manage spectrum.
s:
ht
tp
amendment to MAC layer standard. IEEE 802.1i defines strict encryption and
authentication mechanism to improve WLAN security.
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Compared with infrared ray, radio frequency allows longer distance, faster
transmission, and higher security.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Physical layer is classified into two sublayers: Physical Layer Convergence Procedure
(PLCP) and Physical Medium Dependent (PMD). PLCP maps MAC frames to the
ht
s:
PLCP combines the MAC frames with radio waves. PLCP adds a header to frames.
Usually, a frame contains a preamble to synchronize data receiving. However, the
preambles vary according to modulation method. Therefore, PLCP adds its own
preamble to the frames to be transmitted. Then PMD transmits the frames from PLCP
to the air.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Bandwidth is the maximum frequency width of signals that can pass a channel. The
unit is Hz.
Nowadays, wireless signals transmit more and more information; therefore, bandwidth
usage is higher than before.
Broadcasting signals consume 175 kHz bandwidth to provide high
quality audio.
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Spread spectrum technology is used to transmit data on the WLAN. It was originally used
by military departments to prevent wiretapping and signal interference.
Spread spectrum is the basis for ISM transmission. Traditional wireless communication
focus on how to transmit more signals with low bandwidth. Spread spectrum uses
mathematics functions to spread signals to a wide frequency range. The receiver restores
the signals to narrowband signals. Moreover, the narrowband noise can be filtered out.
Re
so
ur
ce
s:
ht
Spread spectrum radio: It broadcasts signals in a wide range, preventing the issues
occurring in narrowband transmission. This technology uses a type of codes to
transmit signals, and the receiver uses the same type of codes to restore signals.
Spread spectrum radio can work in the frequency bands occupied by other signals.
Spread spectrum radio does not interfere with other wireless radio because it has
weak energy.
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Industrial Scientific Medical (ISM) is used by industry, science, and medicine fields.
Generally, each country has some radio frequencies for industry, science, and
ht
The ISM frequency bands in different countries are different. For example, the USA
uses 902-928 MHz, 2400-2483.5 MHz, and 5725-5850 MHz; however, in Europe, 900
MHz is used for GSM. Frequency band 2.4 GHz is used by all countries. Therefore,
WLAN (IEEE 802.11b/IEEE 802.11g) and other wireless networks can work at 2.4
so
ur
ce
s:
medicine use. Using these frequencies does not need license, but must use certain
transmit power (< 1 W). In addition, signals in different frequency bands cannot
interfere with each other.
Re
GHz.
2.400-2.4835 GHz is used for microwave. The typical applications are microwave
ng
5.725-5.875 GHz is the microwave frequency band, which is used for highway RFID
ar
ni
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ur
ce
Mo
re
Le
ar
ni
ng
Re
so
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Re
so
ur
ce
FHSS is defined only in IEEE802.11, but is rarely used in practice. The WLAN using
ng
ar
ni
The figure shows the impact on signals when time slot 7 is used. Signals in time slot 4
are damaged, but the signals in previous three time slots are successfully transmitted.
For example, time slot 7 is used by microwave oven. The microwave oven only
interferes with the signals in time slot 7, and signals in other time slots are
successfully transmitted.
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Direct sequence spread spectrum (DSSS) was originally specified in the primary, 802.11
standard and provides 1 and 2 Mbps RF communications using the 2.4 GHz ISM band.
An updated implementation of DSSS (HR-DSSS) was also specified in the 802.11b
addendum and provides 5.5 and 11 Mbps RF communications using the same 2.4 GHz
ISM band. The 802.11b 5.5 and 11 Mbps speeds are known as High-Rate DSSS (HRDSSS).
802.11b devices are backward compatible with the legacy 802.11 DSSS devices. This
ur
ce
s:
ht
Unlike FHSS, where the transmitter jumped between frequencies, DSSS is set to one
channel. The data that is being transmitted is spread across the range of frequencies that
ng
Re
so
means that an 802.11b device can transmit using DSSS at 1 and 2 Mbps and using HRDSSS at 5.5 and 11 Mbps. However, 802.11b devices are not capable of transmitting
using FHSS; therefore, they are not backward compatible with 802.11 FHSS devices.
Mo
re
Le
ar
ni
make up the channel. The process of spreading the data across the channel is known as
data encoding.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Everyone know the many ways that RF signals can get altered or corrupted. Because
802.11 uses an unbounded medium with a huge potential for RF interference, it had
ht
s:
Each bit code is an 11-bit barker code. The generated data object is a chip. A chip is
a binary numeral used in spread spectrum. Bit is advanced data, while chip is a binary
numeral used during coding. They do not have difference in mathematics.
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
information volume.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
CCK codes four or eight bits in any 8-bit sequence, so the total throughput is 5.5
Mbps or 11 Mbps. In addition, CCK uses the transfer function to make the receiver
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Modulation
BPSK
180
QPSK
QPSK
90
QPSK
180
10
QPSK
270
11
s:
ur
ce
BPSK
Code
01
ng
Re
so
00
QPSK uses four-level coding mechanism to provide higher throughput than BPSK.
However, if multi-path interference is serious, QPSK does not take effect. Multi-path
ni
Phases difference
ht
ar
interference occurs because signals from the transmitter to the receiver through the
branch. The lengths of paths are different, so there is time difference between the
Mo
re
Le
signals received from different paths. If multi-path interference is serious, QPSK will
be down earlier than BPSK.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.11b uses DSSS to provide four rates: 1 Mbps, 2 Mbps, 5.5 Mbps, and 11 Mbps.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
OFDM divides a wide channel into sub-channels. Each sub-channel can transmit data.
The sub-carriers used by OFDM overlap, but they do not interfere with each other.
Sub-carriers can be distinguished by using orthogonal. In mathematics, orthogonal
describes independent projects.
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
classified into three sub-carriers. The waveform of each sub-carrier is used for coding,
as shown in the bullets in figure. The sub-carriers is designed to maintain the
orthogonal relationship. Pay attention to the peak of wave. The amplitudes of the
other two sub-carriers are 0.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
OFDM divides a channel into 52 sub-channels, in which 4 are used for phase
reference. Therefore, only 48 sub-channels are available.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
QAM represents digital signals by using the amplitude change of two orthogonal
carriers. Phase modulation of analog signals and PSK of digital signals can be
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To increase data rate, use the constellation with more bullets. When the data rate
increases, the received signals must have high quality; otherwise, the adjacent bullets
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
cannot be distinguished. If two bullets are too close, the acceptable error of each
bullet is small. 802.11a defines the maximum acceptable error of each bullet at the
physical layer. The figure shows the constellation used by 802.11a. BPSK and QPSK
have the lowest bit rate. They are the PSK technologies used by DSSS.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
OFDM PHY has four rate levels: 6 and 9 Mbps, 12 and 18 Mbps, 24 and 36 Mbps,
and 48 and 54 Mbps. The mandatory rates are 6 Mbps, 12 Mbps, and 24 Mbps. The
ht
s:
The first level rate uses binary BPSK. Each sub-channel has a one-bit code.
That is, each symbol has 48 bits. About a half or a quarter of these bits are
used to correct errors. Therefore, each symbol has only 24 or 36 available bits.
ce
ur
The second level rate uses binary QPSK. Each sub-channel has a two-bit
code. That is, each symbol has 96 bits. About a half or a quarter of these bits
are used to correct errors. Therefore, each symbol has only 48 or 72 available
bits.
The third and fourth levels use QAM. 16-QAM codes 16 symbols into 4 bits,
and 64-QAM codes 64 symbols into 6 bits. 64-QAM uses 2/3 and 3/4 code rate
ng
Re
so
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
tp
:/
s:
ce
ht
so
ur
Mo
re
Le
ar
ni
ng
Re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.11 defines interfaces used to transmit signals in air between a station and a
wireless client or between wireless clients.
After release of the 802.11 standard, a series of standard extensions are developed.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.11a was released in 1999 but related products were not available unitl a long
period after 1999.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Different from 802.11a/b/g standards, 802.11n uses dual bands (2.4 GHz and 5 GHz),
making it backward compatible with 802.11a/b/g standards.
802.11n combines the MIMO and OFDM technologies, which doubles the
transmission speed.
The IEEE 802.11n standard improves the original 802.11 standards not only in the
physical layer but also in the MAC layer. IEEE 802.11n uses high-performance
wireless transmission technology to improve MAC layer performance and optimize
data frame structure, improving network throughout performance.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.11g/n uses OFDM to provide more subcarries for flexiable adjustment. More
subcarriers indicates a higher transmission rate. Even if 802.11n uses single-input
single-output (SISO) antennas, it provides higher receive and transmit rate than
802.11g.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Forward error correction (FEC) uses error-correcting codes (ECCs) to correct wireless
data errors caused by attenuation or interference during transmission. The corrupted
data can be recovered.
802.11n ECCs maintain the same error correcting ability but consume less frequency
bandwidth. The ratio between the error correcting ability and the bandwidth
consumption is called the code rate.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
802.11n uses the GI of 800 ns by default. If the multipath effect causes little
effect on data transmission, the GI should be set to 400 ns, which can increase
the throughput by 10%. This interval is called Short GI.
ur
ce
Usage scenario: Short GI applies to scenarios with good a radio environment and few
multipath problems. Short GI must be disabled on a network with severe multipath
effect.
In a multipath situation, data is transmitted over multiple paths. If a short GI is set, the
Re
so
ng
second data block interfers with the sending of the first data block. A proper GI
prevents this problem. An improper GI reduces efficient SNR, as shown in the
Mo
re
Le
ar
ni
preceding figure.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Guard intervals (GIs) are the delay required for receiving or sending wireless data or
between wireless data transmissions.
When the radio chip sends data in OFDM modulation mode, it divides a frame into
different data blocks. To ensure data transmission reliability, GIs are inserted between
data blocks to ensure that the receive end correctly parses each data block.
802.11a/g uses GI of 800 ns, while 802.11n uses short GI. A short GI of 400 ns
increases data transmission rate by 10%.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The 40 MHz frequency bandwidth doubles the transmission rate of the wireless
network. However, the number of 40 MHz channels supported by 2.4 GHz and 5 GHz
ht
s:
A 2.4 GHz network supports only one 40 MHz channel. while the number of 40 MHz
channels supported by the 5 GHz network varies according to countries. Theoretically
a maximum of eleven 40MHz channels are supported
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The 802.11n network uses APs and STAs that support MIMO technology to provde
high reliablity and data throughput. Even if only APs support MIMO, the 802.11n
network ensures 30% higher performance than an 802.11a/b/g network.
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
allow more reliable data transmissions between the AP and STAs. Compared to
standard antenana diversity, the MIMO antenna provides higher data transmission
rate for STAs. For example, when an 802.11a/b/g STA communicates with a
traditional AP, the transmission rate decreases from 54 Mbit/s to 48 Mbit/s or 36
Mbit/s. However, if the same STA communicates with an 802.11n AP that supports
MIMO, the transmission rate remains 54 Mbit/s.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Multiple antennas are used on the receive and transmit ends in a wireless
communication system. Proper use of MIMO technology greately improves
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
performance. The input and output in the MIMO system refers to wireless channels).
Multiple antennas of the transmit end allow multiple signal inputs in the wireless
channel (Multiple antennas of the receive end allow multiple signal outputs from the
wireless channel. Multiple-antenna receiver uses advanced spatial code processing
technology to separate and decode data signal streams, which has good processing
results and effectively prevents space-selective fading.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When two different antennas send two signals, the two signals are superposed at the
receive end. Their phases may be different at the receive end due to transmission
directions. This affects the signal strength at the receive end. The phases of wireless
signals on the transmit end can be adjusted to enchange signal strength, that is to
increase the SNR.
ur
ce
s:
ht
The beamforming technology applies to the scenario where the receive end
has only one antenna and no obastacle exsits. If the beamforming technology
is not used, two signals received by the receive end go out of phase, as shwon
Re
so
Mo
re
Le
ar
ni
ng
positive phases that maximize signal strength, as shown in figure 2. The SNR
is increased on the receive end.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
For example, MIMO 2*2 indicates two groups of tranmission links: two receive links
and two spatial streams that are processed through multi-tasks and transmitted over
ht
If the MIMO 2*1 is increased to MIMO 4*4, the SNR of the AP is increased every time
one transmit antenna or receive antenna is added on the AP.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
wireless links. The AP can transmit different information over multiple spatial streams
to increase data transmission rate.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.11 MAC layer protocols consume excessive bandwidth for link maintenance and
protection, which greately reduces the system throughput.
Wireless network conflicts and congestion also lower the 802.11 throughput. 802.11n
improves the MAC layer to reduce fixed cost and transmission loss caused by
congestion.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A-MSDU and A-MPDU reduce payloads and can aggregate only frames of the same
QoS level. However, there may be transmission delay because they have to wait for a
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
time for packet aggregation. Only MPDU uses the Block acknowledge frame.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A-MSDU aggregates packets that have the same destination and application. After
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
aggregation, these packets share one MAC frame header. The playload, transmission
time, and acknowledge frame in the packet header decreases. This improves wireless
transmission rate. The maximum length of an A-MSDU frame is 7935 bytes.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A-MPDU aggregates packets that have the same destination but different
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
applications. It is less efficient than A-MSDU aggregation, but it can reduce playload
in the packet header and transmission time. The maximum length of the A-MPDU
frame is 65535 bytes.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To ensure reliable data transmission, 802.11n defines that an ACK frame must be
sent to respond to every received unicast data frame. After receiving an A-MPDU, A-
ht
The sender only needs to retransmit frames that receive no ACK frame. In
environments with high error rates, A-MPDU that uses the Block Acknowledgement
mechanism allows higher WLAN efficiency than A-MSDU. In this mechanism, only
error frames rather than the all aggregation frames are retransmitted. This reduces
so
ur
ce
s:
MPDU receivers must process each MPDU and send an ACK frame to respond to
each MPDU. Block Acknowledgement uses a single Block Acknowledgement frame
to acknowledge multiple MPDUs to reduce the number of ACK frames.
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
will enable multi-station WLAN throughput of at least 1 Gbit/s and a maximum single
link throughput of at least 500 Mbit/s.
802.11ac is forward compatible with current and later 802.11 full series standards and
regulations, including the 802.11s wireless network architechture to be released.
It complies with the 802.11i security standard and supports WiFi security standards
required by enterprise-level users. 802.11ac can implement seamless roaming for
enterprises and households in the future and can support various WiFi applications,
such as security, management, and diagnossis.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Theoretically, the highest rate of 802.11a is 54 Mbit/s. 802.11a uses 5 GHz frequency
band.
802.11b is the earliest and most popular WLAN standard. The theoretical rate is 11
Mbit/s, and the actual throughput can reach 5 Mbit/s.
802.11g greatly increases the physical-layer transmission speed in 2.4 GHz frequency
band. The maximum rate reaches 54 Mbit/s, and the throughput reaches 20 to 26
ce
s:
ht
so
802.11n uses dual bands (2.4 GHz and 5 GHz). The theoretical transmission rate is
300 Mbit/s and even reaches 600 Mbit/s in certain conditions. The tested rate is over
Re
ur
ng
Mo
re
Le
ar
ni
such as group load balancing, checksum, frane bit, and error correcting data. The
signal strength and obstacles also affect the transmission rate.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ce
ur
MIMO allows 802.11n to use two or more spatial streams for data
so
Mo
re
Le
ar
ni
ng
Re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
For many years, the conventional access point was a standalone WLAN portal device
where all three planes(Management Plane, Control Plane, Data Plane) of operation
ht
ce
s:
existed and operated on the edge of the network architecture. These APs are often
referred to as fat APs, or standalone APs. However, the most common industry term
for the traditional access point is autonomous AP.
All configuration settings exist in the autonomous access point itself, and therefore,
the management plane resides individually in each autonomous AP. All encryption
and decryption mechanisms and MAC layer mechanisms also operate within the
autonomous AP.
A typical fat AP is a wireless router. Unlike traditional APs, wireless routers have
Re
so
ur
WAN and LAN interfaces and support Dynamic Host Configuration Protocol (DHCP)
Mo
re
Le
ar
ni
ng
servers, domain name server (DNS), and MAC address clone, as well as VPN access
and firewall functions.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
so
ur
ce
s:
core of the network. In the centralized WLAN architecture, autonomous APs have
been replaced with controller-based access points, also known as lightweight APs or
Fit APs (thin APs).
An AC and a fit AP run the CAPWAP protocol to communicate with each other.
Mo
re
Le
ar
ni
ng
Re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
LWAPP has a complete protocol architecture and defines detailed packet structure
and multiple control control messages. However, the effectiveness of the newly
ht
ur
The CAPWAP team compared and evaluated the four protocols, and extended the
LWAPP protocol to create the CAPWAP protocol, using DTLS technology and merits
of the other three protocols.
Mo
re
Le
ar
ni
ng
Re
so
ce
s:
created security mechanism is yet to be proven. The highlight of SLAPP is the DTLS
technology, which is highly applauded in the industry.CTP and WiCoP can satisfy the
demands of centralized WLAN architecture. However, they have drawbacks,
especially in terms of security.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Service data of APs is forwarded locally and the AC only manages the APs. That is,
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ce
CAPWAP data and control packets are transmitted on different UDP ports:
Control packets are transmitted on UDP port of 5246.
ur
Mo
re
Le
ar
ni
ng
Re
so
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
1. After an AP starts, it obtains an IP address, DNS server address, and domain name
through the DHCP server.
3. If the AP does not receive a response after 30s, it starts Layer 3 discovery. The AP
obtains the IP address of an AC using Option 43 or the domain name of an AC using
Option 15 from the DHCP server, and then sends a discovery request to the IP
ur
ce
s:
ht
4. After receiving the discovery request, the AC checks whether the AP has the right
to access the AC. If the AP is authorized, the AC replies with a discovery response.
Mo
re
Le
ar
ni
ng
Re
so
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
First, the AP sends a discovery request to the DHCP server. The DHCP server
detects the discovery request packet and responds to the AP with a DHCP
ce
s:
Since DHCP offer packets can be either unicast or multicast packets. When
Re
so
ur
offer packet with an unleased IP address and other TCP/IP configuration. The
packet contains information about lease duration.
the AP receives responses from multiple DHCP servers, it chooses the offer
ng
first received and sends a DHCP request to require all servers to send DHCP
offer packets aobtain. The DHCP server specifies which IP address is to be
ni
used. The AP sends an ARP packet to check whether the IP address is used
by another device. If the address is used, the AP sends a DHCP decline
ar
When the DHCP server receives the AP request packet, it responds with a
DHCPACK packet, which contains the IP address of the AP, lease duration,
gateway information, and DNS server IP address. By now, the lease contract
takes effect and the DHCP four-message exchange is completed.
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
AC discovery:
ht
The AP finds available ACs through the AC discovery mechanism and decides
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
DTLS handshake:
ht
After the AP obtains the AC IP address, it triggers negotiation with the AC.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
After the AP receives a response message from the AC, it starts to establish a
CAPWAP tunnel with the AC. The Datagram Transport Layer Security (DTLS)
protocol can be used to encrypt and transmit User Datagram Protocol (UDP)
packets.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Join:
ht
After the DTLS handshake is completed, the AC and the AP establish control
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
image data
ht
ce
After the software version is updated, the AP restarts, discovers the AC,
establishes a CAPWAP tunnel with the AC, and joins the AC again.
Mo
re
Le
ar
ni
ng
Re
so
ur
s:
negotiation parameters. If the current version is not the latest version, the AP
obtains the latest software version from the AC using the CAPWAP tunnel.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configuration
ht
The configuration state is for the matching of the current AP configuration and
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Data Check
ht
The management tunnel is established when the data check is completed and
ur
ce
s:
request message, which contains information about radio, result, and code.
When the AC receives the message, it replies with change state event
response message.
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Run
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
When the AC receives the Keepalive message, the data tunnel is established.
The AC then replies with a Keepalive message. The AP enters the normal
state and starts to work when receiving the Keepalive message from the AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
so
When the AP receives echo response packet, it resets the tunnel timeout
detection timer.
Mo
re
Le
ar
ni
ng
Re
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
As shown in the figure, the left two APs belong to region 101 and are added to VLAN
11. Their SSID is Huawei 101 and bound to the service VLAN 101. STAs obtain the IP
ht
ce
s:
address 10.1.101.51. The right APs belong to region 102 and are added to VLAN 12.
Their SSID is Huawei102 and bound to WLAN 102. The STAs obtain the IP address
10.1.102.51. The AC uses the management VLAN 100 to manage all APs.
The gateways of device VLAN, management VLAN, and service VLANs reside on the
core switch. The source IP address of the AC is 10.1.100.100. To ensure normal
communications, the AC creates a VLANIF interface for each service.
On the AC, the interface that connects the AC to the core switch is configured as a
trunk interface and is configured to allow the management VLAN 100, service VLANs
Re
so
ur
101 and 102. The AC functions as a Layer 2 device and uses the tunnel forwarding
Mo
re
Le
ar
ni
ng
mode.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The above is the description of the topology. The following pages are going to show you
how data flows are transmitted in this deployment mode. Take the transmission of DHCP
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
data packets as an example. After a wireless terminal connects to the wireless network, it
sends a DHCP request. The DHCP request packet carries the source IP address 0.0.0.0. The
wireless terminal has not obtained an IP address yet. The destination IP address will be
255.255.255.255.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After the data packet reaches the AP, the AP encapsulates the packet into a
CAPWAP packet. The encapsulated packet carries the source IP address
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
10.1.11.101. This IP address is the IP address of the AP. The packet is destined for
the IP address 10.1.100.100, which is the AC's IP address. Since the packet is a
CAPWAP data packet, its UDP port is 5247.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After receiving the packet, the AC decapsulates the packet and obtains the original
data sent by the terminal. Since the network uses an independent DHCP server, the
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The DHCP server receives the request packet and sends a DHCP offer packet to the
AC. The DHCP offer packet carries information such as the IP address, mask,
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
gateway IP address, and DNS IP address. The AC then encapsulates the offer data
into the CAPWAP tunnel and sends it to the AP. The AP decapsulates the packet
after receiving it, and sends the offer packet to the terminal. The terminal finally
obtains the requested IP address.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Discovery phase
2.
3.
Join phase
4.
5.
configure
6.
7.
ni
ng
Re
so
ur
1.
re
Le
ar
8.
Mo
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In home or SOHO network, the WLAN coverage area is small, so Fat AP networking
is used. Fat APs not only provide wireless coverage, but also route packets to or from
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Enterprise networks and other large networks require large WLAN coverage. If fat AP
networking is used, APs are connected to access switches and the data is forwarded
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
by the switches to the core network. NMSs can also be deployed on the core network
to manage APs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
APs, and monitors APs. The AP just implements some simple functions, for example,
encrypting and decrypting 802.11 packets, realizing functions of 802.11 physical
layer, and collecting statistics about radio frequency (RF) air interfaces.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In Layer 2 networking, the AC and APs are connected in inline mode or through Layer
2 network, it is called Layer 2 networking.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In Layer 3 networking, the AC and APs are connected toa Layer 3 network, it is Layer
3 WLAN networking.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In this mode, APs, the AC, and the core layer network are connected in line. All data
going to the core layer are forwarded by the AC.
In inline networking, the AC must have high throughput and processing capabilities, or
the AC becomes the bandwidth bottleneck. The inline networking is easy to deploy
and with clear architecture.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In bypass networking, the AC is connected to the network between APs and the core
network in bypass mode.
In actual networking, most WLANs are established based on wired networks. Bypass
networking is easy to expand. The AC can be connected to the network (such as the
aggregation switch) in bypass mode to manage the APs. So bypass networking is
used more often.
In bypass networking, The AC only manages APs. Management flows are transmitted
in CAPWAP tunnels. Data flows can be forwarded by the AC over the CAPWAP
tunnel, or forwarded to the upper layer network by the aggregation switch and do not
pass the AC.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The AC6605 processes both control flows and data flows. Management flows must be
transmitted over Control And Provisioning of Wireless Access Points (CAPWAP)
ht
tunnels. Data flows can be transmitted over CAPWAP tunnels or not, as required.
s:
The CAPWAP protocol defines how APs communicate with ACs and provides a
general encapsulation and transmission mechanism for communication between APs
and ACs. CAPWAP defines data tunnels and control tunnels.
ce
ur
Control tunnels transmit control flows for remote AP configuration and WLAN
management.
Re
so
Two forwarding modes are available according to whether data flows are transmitted
Mo
re
Le
ar
ni
ng
on CAPWAP tunnels:
You can select the chain or branched mode according to networking requirements.
On the AC6605, you can configure direct forwarding for some APs and tunnel
forwarding for other APs. In tunnel forwarding mode, all wireless user traffic is
aggregated to an AC, which may create a switching bottleneck. Therefore, tunnel
forwarding is seldom used on enterprise networks.
aw
ei
.c
om
/e
Chain Networking
g.
hu
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In chain networking mode, APs or access switches are directly connected to the
AC6605. The AC6605 functions as both an AC and an aggregation switch to forward
ht
In chain networking mode, direct forwarding is often used so that user service data
can be forwarded on APs.
The AC6605 functions as the DHCP server to allocate IP addresses to APs. APs
Re
so
ur
ce
s:
Mo
re
Le
ar
ni
AC6605.
ng
obtain the IP address of the AC6605 using the DNS function, DHCP Option 43 in
DHCP packets, or Layer 2 discovery protocols, and then set up data tunnels with the
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The AC6605 only manages APs. Management flows are transmitted in CAPWAP
tunnels, and data flows are forwarded to the upper layer network by the aggregation
switch and router and do not pass through the AC6605.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Direct forwarding is also called local forwarding. In direct forwarding mode, data
packets between APs and the AC do not go through the CAPWAP tunnel and are
ht
ce
s:
directly forwarded to the upper-layer network. This forwarding mode improves packet
forwarding efficiency.
Direct forwarding prevents AC from being the bandwidth bottleneck. Service holding
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Tunnel forwarding is also called centralized forwarding. In this mode, data packets
between APs and the AC go through the CAPWAP tunnel to the upper-layer network.
ht
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Management VLAN:
ht
ce
s:
ur
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
Service VLANs transmit data required for WLAN user access.
On an AP:
In direct forwarding mode, the service VLAN is specified by the VLAN ID that
an AP adds to a data packet.
In tunnel forwarding mode, the service VLAN is specified by the VLAN ID in
ur
s:
tp
:/
ht
On a WLAN:
ce
On an AC:
PVID VLAN of a WLAN ESS interface: indicates the default VLAN of user
packets that an AC sends and receives. The PVID VLAN is manually
Re
so
Service VLAN in a service set profile: indicates the VLAN that an AP adds to a
user packet. APs use service VLANs to forward user packets.
Mo
re
Le
ar
ni
ng
configured by the administrator and valid only when packets sent by an AP are
untagged packets.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
User VLANs are assigned based on user rights. The following user VLANs may be
used on a WLAN:
ar
ni
ng
Restrict VLAN
Re
so
ur
ce
Guest VLAN
s:
Authorization VLAN
Static VLANs fail to control mobile users. WLAN devices support dynamic
VLAN assignment based on users. For example, on an enterprise network,
dynamic VLAN assignment ensures that a user belongs to the same service
VLAN when the user roams between two APs. This prevents user services
from being interrupted.
Le
Mo
re
When management VLANs, service VLANs, and user VLANs are configured on a
WLAN, these VLANs are deployed according to the following rules:
An authorization VLAN has the highest priority, and so users are added to the
authorization VLAN during authentication, re-authentication, re-authentication
for roaming, or delivery of a Change of Authorization (CoA) packet with the
VLAN field.
Users are added to the service VLAN to which their AP belongs if no
authorization VLAN is configured during authentication, re-authentication, re-
g.
hu
authentication for roaming, or delivery of a CoA packet with the VLAN field.
Generally, user VLANs take precedence over service VLANs. When both a
service VLAN and a user VLAN (an authorization VLAN, a guest VLAN, or a
in
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
restrict VLAN) are configured, users are added to the user VLAN.
Mo
VLAN Deployment
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ht
What are the advantages and disadvantages of Layer 2 and Layer 3 networking?
ur
ce
Mo
re
Le
ar
ni
ng
Re
so
g.
hu
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
Mo
What are the advantages and disadvantages of inline networking and bypass
networking?
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The Switch assign service VLANs to users and tags AP management packets with
the management VLAN ID.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Configure the Switch and the AC to enable APs to communicate with the AC.
s:
the AC ID
carrier ID
so
ur
ce
Configure VAPs and deliver VAP parameters so that STAs can access the WLAN.
Re
ng
Configure a radio profile on the Switch and bind it to a radio to enable STAs to
communicate with the AP.
ar
ni
Configure a service set and bind a security profile and a traffic profile to it to
ensure security and QoS for STAs.
Le
Mo
re
Configure a VAP and deliver VAP parameters so that STAs can access the
WLAN.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configure the Switch and the AC to enable APs to communicate with the AC.
Configure GE0/0/3 of the access switch connected to the aggregation switch to
transparently transmit packets of all service VLANs and the management VLAN.
# Configure GE0/0/1 and GE0/0/2 of the Switch connected to APs as trunk interfaces,
and set the PVID of the trunk interfaces to 100.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configure GE0/0/1 on the AC to transparently transmit packets of all services and the
management VLAN.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ur
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The Switch assign service VLANs to users and tags AP management packets with
the management VLAN ID.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
The supported carrier IDs are cmcc (for China Mobile), ctc (for China Telecom),
cuc (for China Unicom), and other.
ur
s:
so
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ce
Run: interface
ur
Re
Run: ip address
so
ni
ng
ar
Run: quit
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Run: wlan
The WLAN view is displayed.
s:
ht
The AC uses the IP address of the specified source interface as the source IP
address. All APs connected to the AC can learn this IP address.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
sysname AC
ur
ce
Re
dhcp enable
so
ng
ni
ar
interface Vlanif100
Le
Mo
re
#
interface Vlanif101
ip address 10.1.101.1 255.255.255.0
dhcp select interface
#
interface Vlanif102
WLAN
aw
ei
.c
om
/e
in
region-id 102
rn
ea
/l
:/
ssid huawei-1
s:
ce
WLAN-ess 1
traffic-profile id 2
so
service-vlan 102
ur
ssid huawei-2
Re
ng
wmm-profile id 1
ni
ap 0 radio 0
ar
service-set id 0 WLAN 1
Le
ap 1 radio 0
Mo
re
#
return
ht
tp
traffic-profile id 1
service-vlan 101
g.
hu
region-id 101
aw
ei
.c
om
/e
#
vlan batch 100 to 102
#
interface GigabitEthernet0/0/1
port link-type trunk
g.
hu
in
rn
interface GigabitEthernet0/0/2
ea
/l
:/
ht
tp
interface GigabitEthernet0/0/3
ce
s:
ur
so
interface GigabitEthernet0/0/2
Re
ng
ni
interface GigabitEthernet0/0/3
port link-type trunk
Mo
re
Le
ar
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ce
ur
Enable DHCP(Optional)
Re
so
ni
ng
Mo
re
Le
ar
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Networking Requirements:
The customer must lay out a large number of network cables to deploy a wired
ht
ce
s:
network which does not support flexible user access. Deployment of network
cables requires huge costs and human resources. The customer wants to use an AC
and a Fit AP to deploy a WLAN network, which can reduce deployment costs,
improve access flexibility, and enhance network maintainability.
ur
As shown in Figure, the aggregation switch connects to the upper layer network and an
AC connects to the aggregation switch in bypass mode. An AP connects to the AC through
the access switch and aggregation switch. The AP and AC communicate through a Layer 2
network and the AP and AC belong to the management VLAN 100. Tunnel forwarding is
used to effectively manage data packets.
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
Use the configuration wizard to configure the WLAN service on the AC.
ar
ni
ng
Re
so
ur
ce
s:
Le
re
Mo
tp
Configuration Roadmap
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can view device status information to verify that a device runs properly.
Device Status
Statistics Details
Device Information
Log
Top10 AP Statistics
ce
ur
so
Re
ng
ni
ar
Le
re
s:
Mo
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
Interface name: Name of the interface.
Re
so
ur
ce
s:
ht
ni
ar
Le
re
Mo
tp
Interface parameters:
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ht
ur
ce
so
Interface".
PHB mapping: Enables or disables PHB mapping for outgoing packets on an interface. By
default, PHB mapping is enabled for outgoing packets on an interface.
Re
ng
When Link type is Hybrid, packets of VLANs are configured to pass through the
interface in tagged or untagged mode.
ar
When Link type is Access, only packets of the default VLAN are allowed to pass
through the interface.
ni
When Link type is Trunk, packets of VLANs are configured to pass through the
interface only in tagged mode.
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
Interface Name: Name of the virtual interface.
ce
s:
ht
re
Le
ar
ni
ng
Re
so
interface.
Mo
tp
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Log in to the web platform and choose Configuration > AC Management > DHCP > IP Pool.
The IP Pool tab page is displayed. In the IP Pool List area, click Create. In the Create IP Pool
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
IDAC ID.
s:
NOTE:
ur
ce
ht
authentication.
ng
Add APsIf the AP authentication mode is set to MAC or SN authentication, you can add
APs offline.
Manually Add: Enter the MAC address or SN of an AP to add the AP offline.
Import from local file: Configure an AP's MAC address or SN in a local file and
ar
ni
so
Re
Mo
re
Le
The file is in .txt format and contains rows of MAC addresses or SNs. Each
row provides one MAC address or SN. The following example is a file
containing rows of MAC addresses.
60de-4474-9640
60de-4474-9680
dcd2-fc9a-2110
g.
hu
Virtual IP address: The virtual IP address of the VRRP group is used as the source
interface.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
NOTE:
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ht
s:
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Create a radio profile named radio. Create a WMM profile named wmm and use the
ht
s:
Click Next.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Confirm that the settings are correct, and then click Finish. In the message that is
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configure radio calibration. By default, the radio mode and power mode are both auto in
the radio profile, and the radio calibration mode is manual. The configuration procedure is
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
therefore not provided here. If the radio calibration mode is manual, run the calibrate
manual startup command to manually trigger radio calibration.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configure a calibration channel set to specify the channels on which the AP implements
radio calibration. This example configures a calibration channel set for the 2.4 GHz radio,
ht
To configure a calibration channel set for the 5 GHz radio, run the calibrate 5g 20mhz
channel-set channel-value command.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The STA can associate with the WLAN and obtain an IP address 192.168.101.x/24 and its
gateway address is 192.168.101.1.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
An AP sends discovery requests and finds available ACs based on the received
discovery responses. Then the AP selects an appropriate AC to establish a
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
connection with. After an AP is powered on, it can discover ACs according to static
configuration or dynamically.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Add the MAC addresses or SNs of some APs to the blacklist to reject access
s:
Add the MAC addresses of some APs to the whitelist and configure MAC
ur
Add APs to the AC offline to allow the APs to connect to the AC without
authentication.
ce
address authentication.
so
Add the SNs of some APs to the whitelist and configure SN address
authentication.
Re
Manually confirm identifies of APs and allow authorized APs to connect to the
Mo
re
Le
ar
ni
ng
AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Direct forwarding is also called local forwarding. In direct forwarding mode, data
packets between APs and the AC do not go through the CAPWAP tunnel and are
ht
In tunnel forwarding mode, data packets between APs and the AC go through the
CAPWAP tunnel to the upper-layer network. This forwarding mode improves packet
forwarding security.
The encapsulated packets are UDP packets. On the AC side, data packets
carry the port number 5247, and control packets carry the port number 5246.
Re
so
ur
ce
s:
directly forwarded to the upper-layer network. This forwarding mode improves packet
forwarding efficiency. In direct forwarding, In direct forwarding, an AP does not
process the packets and sends packets directly.
Port number of data and control packets on the AP side is randomly assigned.
The Data field in UDP packets contains the contents of original packets and
ng
ar
ni
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Data collection: APs collects radio environment information in real time according to
policies provided by the AC.
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Multiple APs can be grouped into one region. AP regions are configured based on AP
ht
s:
Radios and channels of all APs in a region are adjusted using a radio calibration
algorithm. The AP deployment mode in an AP region affects the radio power and
channels of APs in the region. APs in a region can be deployed in any of the following
ce
so
Re
ur
modes:
ng
ni
Radio calibration is classified into global radio calibration and partial radio calibration:
Le
ar
In global calibration, the AC adjusts radio parameters of all the APs in the
Mo
re
region. Global calibration can adjust radio parameters of multiple APs quickly.
In partial radio calibration, the AC adjusts radio parameters of only some APs.
aw
ei
.c
om
/e
counters detected periodically, including the conflict rate threshold and packet
loss/error packet threshold.
Global calibration can be triggered automatically at intervals.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WLAN load balancing ensures sufficient transmission rate and bandwidth for each
STA by evenly distributing traffic of STAs among APs. This function is used on
ht
s:
so
ur
ce
Re
ng
ni
ar
Mo
re
Le
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
unbalanced.
Mo
Session-based load balancing: The load difference is the gap between the
number of STAs on one radio and that on another radio. If the load difference
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When the AP and STAs support both 5 GHz and 2.4 GHz, the 5 GHz radio is
preferred for WLAN access.
By default, the STAs supporting both 5 GHz and 2.4 GHz access the 2.4 GHz radio
first. To connect them to the 5 GHz radio, you must manually configure it. The
performance of 5 GHz radio is much higher than that of 2.4 GHz.
To improve user experience, you can configure the AP to connect STAs to the 5 GHz
ce
s:
ht
so
When user density is high or there is interference with 2.4 GHz, the 5 GHz radio can
provide higher access capability.
Mo
re
Le
ar
ni
ng
Re
ur
radio first.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Re
so
ur
ce
s:
switches, and power supplies are used to connect these APs. This increases network
construction costs and prolongs network construction period.
The network construction cost is low while the network performance is high.
The wireless network is highly scalable. New APs can be added to the network
ng
ar
ni
Mo
re
Le
subway station, large warehouse, manufacturer factory, and dock where wired
networks are difficult to deploy.
On a traditional WLAN, service virtual access points (VAPs) are created on APs to
aw
ei
.c
om
/e
provide access for wireless stations (STAs). On a WDS network, bridge VAPs are
created on APs to provide access for neighboring bridges. The bridges then set up
wireless virtual links (WVL).
Depending on the AP's location on the WDS network, a wireless bridge works in root,
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
On a traditional WLAN, APs exchange data with STAs using wireless channels and
connect to a wired network through uplinks. If no wired network is available before a
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-14
A WMN allows APs to wirelessly connect to each other, solving the preceding
Re
so
ur
ce
s:
WLAN is constructed, it takes much time and money to construct a wired network. If
positions of some APs on a WLAN are adjusted, the wired network must be adjusted
accordingly, increasing the difficulty in network adjustment. A traditional WLAN
requires a long construction period and has a high cost and poor flexibility, so it does
not apply to emergency communication, wireless MANs, or areas that lack weak wired
network infrastructure. The construction of a WMN requires only APs to be installed,
which greatly speeds up network construction.
problems. A WMN has the following advantages:
ng
ni
ar
Robustness: A WMN is a peer network that will not be affected by the failure of
a single node. If a node fails, packets are forwarded to the destination node
along the backup path.
Mo
re
Le
applies
to scenarios such
as large-scale
warehouses, docks, MANs, metro
lines, and emergency communications.
Mesh point (MP): a mesh-capable node that uses IEEE 802.11 MAC and
g.
hu
in
mesh link.
rn
aw
ei
.c
om
/e
P-15
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
MP.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On a WLAN, blacklist or whitelist can be configured to filter access from STAs based
on specified rules. The blacklist or whitelist allows authorized STAs to connect to the
WLAN and rejects access from unauthorized STAs.
ht
s:
Blacklist: A blacklist contains MAC addresses of STAs that are not allowed to
connect to a WLAN. After the blacklist function is enabled, STAs in the
blacklist cannot connect to the WLAN, and other STAs can connect to the
WLAN.
Re
so
ur
ce
In public places (such as airports and cafes), carriers' networks, medium- and largesized enterprises, and financial organizations, users may need to connect to the
Internet wirelessly. In these scenarios, user isolation can ensure security of data
transmitted between users. User isolation can be implemented based on VAPs or
user groups.
ar
ni
ng
Mo
re
Le
aw
ei
.c
om
/e
networks.
Service security: This feature protects service data of authorized user from
being intercepted by unauthorized users during transmission.
WLAN Quality of Service (QoS) provides differentiated service for wireless users to
satisfy their traffic requirements. WLAN QoS has the following functions:
g.
hu
rn
ea
in
high-priority users.
Differentiated services for different types of packets: The same QoS services
are provided for packets that match a specified ACL. In this way, differentiated
services are implemented for different types of packets.
tp
:/
/l
WLAN tag positioning technology uses radio frequency identification (RFID) devices
ht
Terminal positioning technology uses APs to collect strength information about radio
signals in the surrounding environment to locate Wi-Fi terminals and rogue APs. The
APs report the collected information to a positioning server. The positioning server
computes locations of terminals based on AP's location and data received from the
APs, and presents the computing results to users through a display terminal.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
and a positioning system to locate a target through the WLAN. An AP sends the
collected RFID tag information to a positioning server. The positioning server then
computes the physical location and sends the location data to a third-party device so
that users can view the location of a target through maps and tables.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Two ACs work in 1+1 active/standby mode and provides backup of CAPWAP control
ht
tunnels. The active AC provides services for APs, while the standby AC is a backup to
s:
the active AC. APs establish CAPWAP tunnels with both active and standby ACs. If
ce
the active AC fails, services are switched to the standby AC which then becomes the
so
ur
active AC.
Re
interrupted but instantly recovered on the data tunnel established between the AP and
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Definition:
ht
Purpose:
Advantage:
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
as the active AC. The standby AC is powered on and has the same
configuration as the active AC. When the active AC fails, the backup AC starts
to manage services quickly.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
In the Discovery phase, the AP sends Discover Request packets to both ACs
As long as the ACs are working properly, they will return Discover Responses
packets to the AP. The Discover Response packets contain the dual-link
ce
s:
so
Re
ur
selects the AC with a smaller priority value. If the ACs have the same priority,
ng
the AP selects the AC with a lower workload. If the ACs' workloads are also
the same, the AP selects the AC with a smaller IP address.) If an AC fails to
ni
return a Discover Response packet, the AP selects the other AC to set up the
CAPWAP tunnel. The tunnel set up first may not be the primary tunnel. The AP
Le
ar
will determine the primary and backup tunnels after it successfully establishes
tunnels with both the two ACs.
re
Mo
Note: The value of AC priority is an integer that ranges from 0 to 7. A smaller value
indicates a higher priority.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
A Discover Response packet contains the dual-link backup flag. The AP starts
s:
to set up the second tunnel only after the first AC has delivered configurations
to the AP. This avoids repeated configuration delivery.
The AP sends a unicast Discover Request packet to another AC.
ur
ce
so
After receiving the Discover Response packet, the AP knows that the dual-link
backup function is enabled on the AC and stores the AC's priority. (The AP
does not perform an active/standby switchover even if this AC has a higher
Re
ng
priority.)
ar
ni
notifying the AC that the configurations have been delivered. After receiving
the Join Request packet, the AC obtains the customized information and sets
Le
up a CAPWAP tunnel with the AP but does not deliver configurations to the
AP.
Mo
re
The AP compares the priorities and IP addresses of the two ACs and
determines the active and standby ACs. The AP performs a revertive
switchover if the second AC becomes the active AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Active/standby switchover
After an AP sets up links with the active and standby ACs, it sends Echo
packets to monitor the link status. The Echo packets contain the
active/standby status of the links. When the AP detects that the primary link
fails, it sends an Echo Request packet with the active flag to the standby AC.
After receiving the Echo Request packet, the standby AC becomes the active
AC, and AP transfers STA data to this AC.
The service interruption time lasts from the moment an active AC failure is detected to
the moment the active/standby switchover is complete.
By default, it takes three echo intervals for an AP to detect the failure after the
active AC fails. Each echo interval lasts 25 seconds. The number of echo
intervals required ranges from 2 to 120. The value of each interval ranges from
3s to 300s. A smaller value is not recommended because the AP may
incorrectly determine the fault on the active AC that works properly.
ar
ni
ng
Re
so
ur
ce
s:
ht
Le
Mo
re
If STAs go offline and reconnects with the AP, the service interruption time
depends on STA reconnection time, that is, STA connection mode (automatic
or manual) and STA performance.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Revertive switchover:
ht
Re
so
ur
ce
s:
original primary link recovers. If the original primary link recovers, the AP
switches STA data back to this link after a delay because this link has a higher
priority than the other one. The AP triggers a revertive switchover after a delay
to avoid frequent switchovers caused by network flapping. The delay time is
fixed at 500s, which is 20 times the echo interval (default interval 25s). When
the delay expires, the AP sends an Echo packet to request the ACs to carry
out a revertive switchover. Additionally, the AP transfers STA data to the new
active AC.
A command is provided on ACs to enable the revertive switchover function. If
Mo
re
Le
ar
ni
ng
this function is disabled, the ACs do not perform a revertive switchover after
the original active AC recovers.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can set different priorities for the ACs. The AC with a higher priority functions as
the active AC, while the other AC is the standby AC. A smaller value indicates a
ht
In Layer 3 networking, IP addresses of ACs are clarified in the option 43 field. For
example, [Quidway-ip-pool-huawei] option 43 sub-option 3 ascii 11.1.1.2,11.1.1.3.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
higher priority. If the ACs have the same priority, the AC with a lower workload is the
active AC. If the ACs' workloads are also the same, the AC with a smaller IP address
is the active AC.)
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
How many data forwarding modes are supported and what are their differences?
ht
Data forwarding modes include the direct forwarding and Tunnel forwarding.
Direct forwarding is also called local forwarding. In direct forwarding
mode, data packets between APs and the AC do not go through the
CAPWAP tunnel and are directly forwarded to the upper-layer network.
This forwarding mode improves packet forwarding efficiency.
Re
so
ur
ce
s:
When the AP and STAs support both 5 GHz and 2.4 GHz, the AP can allow
the STAs to access the 5 GHz radio preferentially.
When the user density is high or there is interference on the 2.4 GHz
frequency band, the 5 GHz radio can provide higher access capability and
ar
ni
ng
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Purpose: The most obvious advantage of WLAN networks is that a STA can move
within a WLAN network without physical media restrictions. WLAN roaming allows the
ht
Subnets with different VLAN IDs are in different network segments. STAs
roaming between these subnets roam at Layer 3.
so
ur
Depending on whether a STA roams within the same subnet, WLAN roaming is
categorized as Layer 2 and Layer 3 roaming.
Re
ce
s:
STA to move within a WLAN network without service interruption. An ESS includes
multiple APs. When a STA moves from an AP to another, WLAN roaming ensures
seamless transition of STA services between APs.
Sometimes, two subnets have the same VLAN ID but belong to different
ng
network segments. Based on the VLAN ID, the system may incorrectly
consider that STAs roam between the two subnets at Layer 2. To prevent this
ni
Mo
re
Le
ar
only when the STAs roam within the same VLAN and roaming domain;
otherwise, the STAs roam at Layer 3.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To avoid packet loss or service interruption due to long authentication duration. The
packet exchange duration of 802.1x or portal authentication is longer than the WLAN
ht
s:
Re
so
ur
ce
ni
ar
ng
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The STA monitors channel beacons. When it finds new APs, it sends probe requests
to the APs. The new APs respond the requests through the channels. The STA
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
evaluates the responses and decides which AP is the best to associate with.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
neighboring APs: STA roaming is triggered when the ratio reaches a threshold.
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Generally, after sending a roaming request, the STA sends a request to associate
with a new AP. After its request is accepted, the STA associates with the new AP and
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
then disassociates with the original AP. In some cases, the STA directly associates
with a new AP and then disassociates with the original AP.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The figure shows the network architecture of WLAN roaming. AC_1 and AC_2
manage APs on the WLAN. AP_1 and AP_2 associate with AC_1, and AP_3
ht
s:
associates with AC_2. A STA roams on the WLAN. During roaming, the STA
associates with different APs. The roaming process is as follows:
The STA moves from the coverage area of AP_1 to AP_2. Since AP_1 and AP_2
both connect to AC_1, the STA implements Intra-AC Roaming. The STA associates
with AP_1 first. AP_1 is the STA's HAP, and AP_2 is the STA's FAP. AC_1 is the
STA's HAC and FAC.
The STA moves from the coverage area of AP_2 to AP_3. Since AP_2 and AP_3
associate with AC_1 and AC_3 respectively, the STA implements Inter-AC Roaming.
Re
so
ur
ce
AP_1 and AC_1 are the STA's HAP and HAC, and AP_3 and AC_2 are the STA's
ni
ng
FAP and FAC. AC_1 and AC_2 belong to the same Roaming Group. The STA can
only roam between ACs of the same roaming group. ACs in a roaming group
synchronize data of each other and forward packets over the Inter-AC Tunnel.
ar
AC_1 and AC_2 need to know information about each other. AC_1 functions as the
Master Controller to manage group members and deliver member information to other
Le
Mo
re
group members.
Home AC (HAC): the AC in a roaming group that the STA first associates with, for
example, AC_1 in Figure.
Home AP (HAP): the AP that the STA first associates with, for example, AP_1 in
Figure.
Foreign AC (FAC): the AC that the STA roams to, for example, AC_2 in Figure.
Foreign AP (FAP): the AP that the STA roams to, for example, AP_3 in Figure.
Intra-AC Roaming: The STA roams within the same AC. As shown in Figure, the STA
aw
ei
.c
om
/e
g.
hu
Inter-AC Roaming: The STA roams between different ACs. As shown in Figure, the
STA roams between different ACs when moving from AP_1 to AP_3. Intra-AC
in
roaming can be regarded as a special case of inter-AC roaming where the HAC and
FAC are the same AC.
Roaming Group: You can add ACs on WLAN networks to different groups. The STA
can roam between ACs of the same group. The group is called a roaming group. As
shown in Figure, AC_1 and AC_2 form a roaming group.
Inter-AC Tunnel: Inter-AC roaming requires that ACs of a roaming group synchronize
/l
ea
rn
tp
:/
STA and AP information with each other. To enable inter-AC roaming, the ACs set up
a tunnel to synchronize data and forward packets. For example, AC_1 and AC_2 in
Figure set up a tunnel for data synchronization and packet forwarding.
Master Controller
To support inter-AC roaming, ACs of a roaming group must be able to identify each
other. You can configure one AC as the Master Controller to maintain the membership
table and deliver member information to ACs of the group. In this way, ACs of the
group can identify each other and set up tunnels. In Figure, AC_1 is configured as the
Master Controller.
The Master Controller must be able to communicate with all managed ACs but does
Re
so
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
During Layer 2 roaming, the STA stays within the same subnet. The FAP/FAC
processes packets of a Layer 2 roaming STA in the same way as it processes
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-12
ce
After receiving the service packet, the HAP sends it to the HAC.
Re
After roaming:
so
ur
After receiving the service packet, the FAP sends it to the FAC.
Mo
re
Le
ar
ni
Before roaming:
ng
s:
packets of a newly online STA. The FAP/FAP forwards the packets on the local
network but not send the packets back to the HAP over the inter-AC tunnel.
The STA stays in different subnets before and after Layer 3 roaming. To ensure that
the STA can still access the original network after roaming, user traffic is forwarded to
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-13
In tunnel forwarding mode, service packets exchanged between the HAP and HAC
are encapsulated through a CAPWAP tunnel, and the HAP and HAC can be
considered in the same subnet. Instead of forwarding the packets back to the HAP,
the HAC directly forwards the packets to the upper-layer network.
Before roaming:
so
After receiving the service packet, the HAP sends it to the HAC.
ng
Re
After roaming:
ar
ni
ur
ce
s:
The FAC forwards the service packet to the HAC through a tunnel between
them.
Mo
re
Le
In direct forwarding mode, service packets exchanged between the HAP and HAC are
not encapsulated through the CAPWAP tunnel; therefore, whether the HAP and HAC
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-14
ur
After a user roams to a new AP, the user uses the Home AP (HAP) as its home agent
by default. A tunnel is automatically set up between the Foreign AP (FAP) and home
agent when the user is roaming. User traffic is forwarded by the home agent to ensure
so
ce
s:
reside in the same subnet is unknown. Packets are forwarded back to the HAP by
default. If the HAP and HAC are located in the same subnet, configure the HAC with
higher performance as the home agent. This reduces the load on the HAP and
improves the forwarding efficiency.
Re
that the user can still access the original network after roaming.
If the AC and user's gateway can communicate at Layer 2, for example, when the AC
Le
Before roaming:
After receiving the service packet, the HAP sends it to the HAC.
Mo
re
ar
ni
ng
is located in the user VLAN or happens to be the gateway, you can configure the HAC
as the home agent to reduce traffic load on the HAP. This also reduces the length of
the tunnel between the FAP and the home agent, which improves the forwarding
efficiency.
After receiving the service packet, the FAP sends it to the FAC.
aw
ei
.c
om
/e
The FAC forwards the service packet to the HAC through a tunnel between
them.
g.
hu
After receiving the service packet, the FAP sends it to the FAC.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
The FAC forwards the service packet to the HAC through a tunnel between
them.
in
After roaming
rn
P-15
A small enterprise needs to provide access services for users through a WLAN and
requires nonstop service transmission when the users move within the enterprise. To
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-16
In Figure, the enterprise deploys one AC to manage multiple APs. The STA can
connect to the WLAN through AP_1 and AP2. When the STA roams from AP1 to AP2,
services are not interrupted.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
meet the requirements, deploy one AC and multiple APs inside the enterprise and
configure the AC to manage the APs and provide WLAN services for users.
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-17
ur
In Figure, AC1 and AC2 belong to the same roaming group and manage APs in area
1 and area 2 respectively. The STA can connect to the WLAN through AP1 and AP2.
When the STA roams from AP1 to AP2, services are not interrupted.
Mo
re
Le
ar
ni
ng
Re
so
ce
s:
service transmission when the users move between different working areas. To meet
the requirements, deploy one AC and multiple APs in each working area of the
enterprise and configure the ACs to manage the APs and provide WLAN services for
users.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Multiple APs are used to cover the scenarios from al angles. Roaming prevents
services from being interrupted when users roam from one AP to another.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
What are the differences between Layer 3 roaming and Layer 2 roaming?
ht
Subnets with different VLAN IDs are in different network segments. STAs
s:
The system considers that the STAs roam at Layer 2 only when the STAs
roam within the same VLAN and roaming domain.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
What is roaming?
ht
WLAN roaming policies mean free roaming of a STA in a WLAN. When the
STA roams within an extended service set (ESS), services are not interrupted.
Triggers roaming.
Performs roaming.
so
re
Le
ar
There are Layer 2 and Layer 3 roaming depending on whether the STA
crosses between VLANs.
Re
Mo
s:
ce
Requests to roam.
ur
ng
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
WLAN.
WLANs are especially applicable to public places such as office buildings, airports,
resorts, and hotels.
WLAN wireless data is transmitted over the air and can be received by any proper
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
device. Therefore, how to protect the security of confidential data and user privacy is
WLAN users' top concern.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Unauthorized users use WLAN network resources, which is the most common threat
to WLAN security.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Rouge APs are unauthorized but deployed on enterprise WLANs and interfere
authorized APs, such as launching denial of service (DoS) attacks. Rouge APs that
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
have correct WEP keys configured may intercept client data. Rogue APs with proper
configurations may also provide access services for unauthorized users or allow them
to intercept data packets and send fake packets, even worse, allow them to access
servers and files. Most rogue APs are installed by employees unintentionally.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Unlike wired LANs, wireless networks use wireless communication technology. User
information is transmitted over a wireless communication network and can be easily
ht
s:
Wireless signals can be easily captured by malicious users who may intercept user
information by simply using tools to parse packets.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
User authentication: ensures that authorized users and clients access the
s:
The WLAN security solution uses user authentication and data encryption to protect
data transmitted over the wireless network. User authentication and data encryption
are implemented differently but all apply to SOHO and large enterprise WLANs. A
large enterprise network also requires IDS for other levels of security protection.
Currently, IDS not only detects attacks to the wireless networks but also protects
WLAN networks against unauthorized clients and untrusted APs. However, IDS
configured on many enterprise networks aims not to prevent external threats but to
prevent access of rogue APs installed by employees unintentionally. Although
employees can enjoy the convenience of mobility and wireless networks, these rogue
APs bring potential threats to WLAN security.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The WIDS can detect malicious attacks and intrusions from external networks at an
early stage.
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WIDS/WIPS terms:
ht
rogue AP.
so
Re
ur
ce
s:
be any one of the following: an AP that connects to the network without being
authorized, a non-configured AP, a neighbor AP, or an AP operated by an
attacker. Hackers may use vulnerabilities of these APs to attack networks.
Monitoring AP: an AP that scans and listens on the wireless medium. It can
ng
Mo
re
Le
ar
ni
An AP supports three working modes: access mode, monitor mode, and hybrid mode:
aw
ei
.c
om
/e
only transmits data of wireless users and does not monitor wireless users on
the network. If background neighbor probing is enabled, the AP can not only
transmit data of wireless users but also scan wireless devices and listen on all
802.11 frames on wireless channels.
in
Note:
An AP can implement the WIDS or WIPS function only when it works in monitoring
or hybrid mode.
ea
rn
Monitor mode: An AP scans wireless devices on the network and listens on all
802.11 frames on wireless channels. In this mode, all WLAN services on the
AP are disabled and the AP cannot transmit data of wireless users.
g.
hu
APs periodically report collected device information to an AC, and the AC identifies rogue
Interference AP: an AP that works on the same channel or adjacent channels with
:/
/l
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
monitoring AP. The monitoring AP uses the rogue AP's identity information to
broadcast a Deauthentication frame. After STAs that associate with the rogue AP
receive the Deauthentication frame, they disassociate from the rogue AP. This
countermeasure prevents STAs from associating with rogue APs.
Unauthorized STA: After an AC identifies an unauthorized STA, it sends unauthorized
STA information to a monitoring AP. The monitoring AP uses the unauthorized STA's
identity information to unicast a Deauthentication frame. After the AP with which the
unauthorized STA associates receives the Deauthentication frame, the AP
disassociates from the unauthorized STA. This countermeasure prevents APs from
associating with unauthorized STAs.
Ad hoc device: After an AC identifies an ad hoc device, it sends the ad hoc device
information to a monitoring AP. The monitoring AP uses the ad hoc device's identity
ni
ng
Re
so
ur
Le
ar
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The WIDS can protect small and medium WLANs against flood, weak IV, and
spoofing attacks. It detects vulnerabilities on the network and notifies the
ht
s:
In the preceding figure, the WLAN can have WIDS enabled while providing access
services to ensure access security.
ce
Re
so
ur
AP3. AP3 will forward these packets to the AC for processing, affecting normal
network running. If flood attack detection and dynamic blacklist are enabled,
the WIDS can detect the flood attacks of malicious users and adds these users
to the dynamic blacklist. All packets from these users are discarded to protect
network security.
Weak IV attack detection: If data packets from clients use WEP encryption, the
ng
ni
ar
logs.
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Accounting: determines how to charge users that are using network resources.
ur
ce
s:
AAA uses the client/server model. In this model, the client runs on the managed
ng
Re
so
Mo
re
Le
ar
ni
resource side, while the server stores user information. Therefore, AAA features good
scalability and easily implements centralized user information management.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Protocol: RFC 2865 and RFC 2866 define the UDP/IP-based RADIUS frame
format and message transmission mechanism, and specify UDP ports 1812
and 1813 as the authentication and accounting ports respectively.
Client: RADIUS clients run on network access servers (NASs) located on the
entire network.
Re
so
ur
ce
Moreover, RADIUS servers can also function as the clients of other AAA servers to
provide proxy authentication and accounting services.
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
User authentication: ensures that authorized users and clients access the
s:
Mo
re
Le
ar
ni
ng
Re
so
System attack defense: ensures system security and availability through IDS
and IPS.
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
CCMP stands for Counter Mode with CBC-MAC (short for cipher block chainingmessage authentication code) Protocol.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
authentication mode is set to OSA, all STAs that sends authentication requests can
pass authentication. OSA applies to carriers' large-sized WLANs with a great number
of users.
OSA consists of two steps only. An AP only checks whether an STA uses the same
authentication mode as itself and does not verify the STA's WEP encryption key. This
slide shows the authentication process.
Re
so
ur
ng
ar
ni
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Usage scenario:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
identities of STAs or users nor encrypts data exchanged between STAs and
the network. This authentication method is mainly used in public areas or
hotspot areas, such as airports, restaurants, and lobbies, to provide wireless
access (for example, access to the Internet) for users.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
An STA can access an AP only if it has the same SSID as the AP. If their SSIDs are
different, the STA cannot access network resources in the service area covered by
ht
Currently, however, there are available devices or software that can be used to find
WLANs with hidden SSIDs. The SSID hiding function alone is no longer powerful
so
ur
ce
s:
the AP. By setting SSIDs, carriers can group users and restrict access from roaming
users to ensure security and access performance. Carriers can also configure SSID
hiding, define SSID areas, and assign different rights to SSID areas to ensure data
confidentiality. Therefore, an SSID can be considered as a simple password to
implement network security using the password authentication mechanism.
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
MAC address authentication controls the network access right of a user based on the
access interface and the user's MAC address. In this authentication mode, no
ht
s:
MAC address filtering identifies STAs by controlling network adapters. The network
adapter of each STA is identified by a unique MAC address. Therefore, the source
MAC address in the data packets sent from an STA can be checked to determine the
STA validity. To perform MAC address filtering, a valid MAC address list must be
preconfigured on the AC (in fat AP mode, the list is preconfigured on the AP). The AP
communicates with an STA only when the STA's MAC address matches the address
so
ur
ce
Re
Le
The RADIUS server also supports MAC address authentication. The MAC address list
is configured on the RADIUS server connected to the AC. If the MAC address of an
STA is not included in the list, the STA sends an authentication request to the
RADIUS server. After the RADIUS server authenticates the user's MAC address, the
user can access the WLAN and obtain the authorization information.
Mo
re
ar
ni
ng
case, the MAC addresses are easy to be forged or copied. Therefore, MAC address
authentication is more an access control method than an authentication mode. It is not
recommended that you use the MAC address authentication only, except for the
situation that some legacy devices do not support better security mechanism.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Shared key authentication requires that an AP and STA use the same key (static
WEP key) and is implemented based on WEP encryption. It consists of four steps.
The last three steps complete a WEP encryption and decryption process, which is
similar to the process of Challenge Handshake Authentication Protocol (CHAP).
Verifying the WEP key ensures that the network card and AP use the same key when
the network card sends association requests. This slide shows the authentication
process.
Re
so
ur
ce
s:
ht
After receiving the encrypted packet, the AP decrypts it with its key and
compares the decrypted packet with the original one.
Mo
re
Le
ar
The STA copies the challenge packet to a new packet, uses its key to encrypt
the packet, and sends the encrypted packet to the AP.
ni
ng
If the packets are the same, the STA and AP have the same key and
the STA is successfully authenticated.
If the character strings are different, the STA cannot pass the
authentication.
aw
ei
.c
om
/e
A static key is used until the next key is configured. If a key is used for a long
time, malicious users can decipher the key by collecting data encrypted by this
key. Given that static WEP keys are easy to be decrypted, shared key
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
IEEE 802.1X defines port-based network access control protocols. The port can be a
physical port or a logical one, while in a wireless local area network (WLAN) scenario,
ht
ur
so
ce
s:
Re
Mo
re
Le
ar
ni
ng
(such as 802.11a and 802.11b) are used to name regulations attached to existing
standards, while uppercase letters are used to name independent regulations. Since
802.1X is a complete and independent protocol standard, the letter X must be
capitalized.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
As shown in the slide, the 802.1X system operates in the typical client/server (C/S)
model. It consists of the following components: the supplicant, authenticator, and
ht
authentication server.
Boasting its distinct advantages on security and cost, 801.1X is an ideal wireless
Re
so
ur
ce
s:
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
802.1X is developed based on EAP. EAP is a simple encapsulation protocol and can
run at any link layer. However, it has not been widely used on Point-to-Point Protocol
ht
(PPP) links.
This slide shows the EAP encapsulation format. In a WLAN scenario, the EAP
packets are transmitted over LAN links, forming EAPoL packets.
Code: This field is the first field of an EAP packet. It is one byte in length and
identifies the EAP encapsulation type. The Data field must be parsed
according to the Code field.
Re
so
ur
ce
s:
Identifier: This field is one byte in length. It contains one unsigned integer,
ng
ar
ni
an EAP packet.
Mo
re
Le
packet.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Extensibility (what the letter E in EAP stands for) is a feature with two sides. With
extensibility, new functions can be developed to meet new requirements. However,
ht
Re
so
ur
ce
s:
extensibility also allows different carriers or enterprises to use different types of EAP
and incompatibility occurs as a result. This explains the narrow coverage of the
802.1X system.
ng
ar
ni
Le
Mo
re
Except for the previous types, EAP-SIM and EAP-AKA are also widely used,
both of which use the database of mobile phones to implement authentication.
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
EAP-SIM provides an interface for the SIM card database on the Global
System for Mobile Communications (GSM) network. EAP-AKA is an
authentication system used on 3G networks. AKA stands for Authentication
and Key Agreement.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The pre-shared key (PSK) mode is also named individual mode. It is developed for
household families and small-sized companies, for whom the 802.1X authentication
ht
ce
s:
servers are high in costs and complex in operation. Each user must enter a specific
password to access the network. The password can have a length of 8 to 63 ASCII
characters or 64 hexadecimal numbers (256 bits). Users can decide whether to save
their passwords to avoid repeated input, but the passwords must be saved on APs.
This authentication mode requires that a key be configured for an STA before the STA
starts an authentication attempt. The AP implements a 4-way handshake key
negotiation to authenticate the validity of the STA-side key.
WPA-PSK can be used for small-sized networks with few important data. It mainly
Re
so
ur
applies to small-sized networks with low risks and network users that do not have high
ni
Mo
re
Le
ar
ng
security requirements.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Portal authentication is also called web authentication. When a user accesses the
authentication page on the web server or when a user attempts to access other
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
external networks using HTTP, the user is forcibly redirected to the web
authentication page. After the user enters the account and submits the web page, the
web server obtains the account. The web server sends the user account information
to the WLAN server using the Portal protocol. The WLAN server and authentication
server exchange messages to complete user authentication.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
2. The WLAN client sends an HTTP request packet to the WLAN server (AC) to
visit a web page.
so
ur
3. The WLAN server redirects the requested URL to the web authentication page
(IP address of the Portal server) and sends the redirection packets to the
WLAN client.
Re
4. The user enters the user name and password on the web authentication page
and the WLAN client submits them to the Portal server.
ni
ng
5. The Portal server obtains the account information and encrypts the password
with the challenge from the WLAN server. After that, the Portal server sends
an authentication request packet, which carries the user account information
and IP address, to the WLAN server.
Mo
re
Le
ar
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
ce
ur
so
Re
ng
on the reliability of the data source, data users must verify the data source and
therefore authentication is essential for data protection. Authorization and
ar
ni
access control are both based on authenticity. Before a user accesses any
data, the system must verify the user identity and decide whether to allow the
user to access the data.
Le
Authentication has been mentioned in the previous section. In this section, we will talk
about the protection of data confidentiality and integrity, which is what WLAN
encryption all about.
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Secret key used to encrypt the frames (WEP allows four secret keys to be
stored at the same time.)
Initialization vector (IV) used together with secret keys during frame
transmission
ce
ht
s:
WEP delivers the following item after processing the preceding three items:
An encrypted frame that can be transmitted even on an insecure network and
that carries sufficient data for the receiver to decrypt it.
so
ur
Re
If Rivest Cipher 4 (RC4) is used, the same plain-text password will generate the same
encryption result. Therefore, decryption is not that difficult after the encryption
regularity has been figured out.
To break the regularity, IV is introduced to 802.11. IV is entered together with
the key to generate a key stream. In that way, using the same key will no
longer generate the same encryption result.
ar
ni
ng
IV is carried in packets as plain text so that the receiver can decrypt the
encrypted packets.
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
As shown in the functional block diagram of encryption, IV keys are added in the
ur
24-bit encryption keys (also called the IV key) configured for each message
block by the sender
ce
s:
Re
so
message block without encryption to inform the receiver. If a message block with a
certain IV is collected through wireless interception, it is possible to work out the
secret common key by analyzing the IV.
Due to the lack of message integrity check, messages can be easily modified by
Mo
re
Le
ar
ni
ng
hackers.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The Temporal key Integrity Protocol (TKIP) is the first commonly used new encryption
protocol at the link layer. TKIP is developed to improve the security of the legacy WEP
ht
ur
Note: TKIP was first named WEP2 when written into the 802.11 standard. After
it is proved that WEP has defects, this protocol changes its name to TKIP to
differentiate itself from WEP.
so
ce
s:
hardware. Generally, chips enabled with the WEP function support the RC4
encryption mechanism. Since it is the hardware that implements encryption, security
can be enhanced simply by upgrading the software or firmware. Therefore, TKIP
inherits the basic WEP architecture and encryption process.
TKIP has the same encryption mechanism with WEP. To guard against attacks on IV,
Re
TKIP increases the IV length from 24 bits to 48 bits so that more IV values are
Mo
re
Le
ar
ni
ng
The most important item combined into a TKIP key is the base key. Without a method
to generate unique base keys, TKIP cannot solve the biggest problem: all WLAN
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
users are repeatedly using a key that is known to the public. To solve this problem,
TKIP generates a unique base key for each packet key. Each time an STA connects
to an AP, a new base key is generated. To generate a base key, you must first obtain
the following data:
(1) Specific session
(2) Random numbers generated at an AP and an STA
(3) MAC addresses of the AP and STA
After that, use the hush algorithm to calculate the data and generate a base key.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Key management deals with problems produced during the period from key
generation to key destruction. The two major protocols in key management defined in
ht
so
ur
ce
s:
802.11i are the 4-way handshake protocol and multicast key upgrade protocol. The 4way handshake protocol is used for unicast key negotiation. An STA and an AP
dynamically negotiates a pairwise master key (PMK). The STA and AP then conduct a
4-way handshake to negotiate a unicast key based on this PMK. Each STA uses a
different PMK to communicate with the AP and the PMK is updated periodically,
ensuring communication security.
The 4-way handshake protocol is the most important part in the key management
Re
system. It is conducted to ensure that the STA and AP obtain the same PMK and that
ng
the PMK is the latest, so that the latest pairwise transient key (PTK) can be generated.
The PMK is negotiated between the STA and AP after the authentication is
ni
implemented. The PTK can be upgraded periodically through the 4-way handshake
initiated by an AP. In the case that the PMK remains unchanged, an STA can send a
Le
ar
4-way handshake initialization request to generate a new PTK. The key negotiation
messages exchanged between the STA and AP are encapsulated with EAPOL-Key.
Mo
re
The STA generates SNonce. ANonce and SNonce use the pseudo-random
function (PRF) to generate a PTK. The STA sends an EAPOL-Key frame that
includes SNonce and MIC.
The AC uses ANonce and SNonce to generate PTK, checks MIC, and sends
an EAPOL-Key frame. The EAPOL-Key frame includes ANonce, MIC, and a
message indicating whether to install an encryption or integrity key.
The STA sends an EAPOL-Key frame to confirm that the key has been
installed.
in
aw
ei
.c
om
/e
g.
hu
A PTK is a unicast key and also a base key used in cryptographic mixing.
TKIP generates a unique key for each transmitted frame. This key consists of a
sequence counter (IV), the IP address of the sending end (not necessarily the frame
source), and a temporal key. Key mixing ensures that each frame uses a key
significantly different from the other, and defends attacks which assume that the
secret part of the WEP key remains unchanged. Key mixing also considers the IP
address of the sending end, so that STAs using the same IV can derive different RC4
keys. The key mixing function is restricted by the 802.11 controller's processing
capability. TKIP divides the key mixing process into two phases. In the first phase, the
input items are the IP address of the sending end, the first 32 bits of a sequence
number, and a 128-bit temporal key; the output item is a 80-bit value. This sounds a
little complicated, but the computing is composed of simple calculations such as
addition, shifts, and XORs and the computing burden is eased. If the first 32 bits of the
sequence number is a constant, the value computed in the first phase must be a
constant. Therefore, calculation only needs to be performed once every 65535 frames.
In the second phase of key mixing, calculation must be performed for each frame.
Input items in this phase include the computing result in the first phase, the temporal
key, and the last 16 bits of the sequence number. Only the sequence number
changes. The sequence number changes based on a fixed definition. Therefore, the
sequence number required by the frame to be transmitted can be pre-computed
according to the following sequence number. The output value in the second phase is
a 128-bit RC4 key, which can be used as a random WEP seed. The last 16 bits of the
sequence number are used to generate a high byte and a low byte of the WEP IV.
The middle byte of the WEP IV is a dummy byte with a fixed value, which is used to
avoid RC4 key weakness. Some 802.11 interfaces can, with the help of hardware, use
the RC4 key as the input to generate a key string and use the key string to encrypt the
frame. The output items in the second phase can be directly transmitted to 802.11
interfaces that support such hardware.
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
Mo
Encryption key generated using 4-way handshake and key mixing ensures that each
time an STA connects to the network, it has a unique key.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
One of the biggest WEP weaknesses lies in integrity check, which is used to ensure
that frames will not be modified when being transmitted through wireless media. WEP
uses the cyclic redundancy check (CRC) to check the frame integrity, but it has been
proved that CRC is not capable of doing that. Therefore, the task for improvement
falls on TKIP. TKIP aims to work out an applicable algorithm based on solid
cryptography to implement message integrity check (MIC). The final algorithm is one
called Michael, which is an outcome of the compromise of multiple factors. Compared
with the simple linear hash algorithm, Michael is robust. However, the Standards
Committee expects an easy application of algorithms, so the design of Michael is
largely restricted.
The development of Michael results from some attacks, among which the most
serious attacks are the modification of bit and header. The modification of bits takes
advantage of the CRC's weakness in cryptography. As a linear hash algorithm, any
change of the CRC input bits will result in a change of the output ones. It is no longer
something that is known to only a limited circle of people. Attackers can modify
several bits of a frame and to balance the difference resulted, they can change the
WEP MIC value at the same time. For the modification of headers, malicious attackers
may forge an IP address of a source end or a sending end. They may also modify the
destination IP address to control the transmission direction of a frame.
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
Mo
re
The MIC Key shown in the slide is the key to protect frame content used by Michael.
TKIP will derive a pair of keys, so that the workstation-to-base station MIC key is
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
different from the base station-to-workstation key. MIC keys are used in TKIP, making
TKIP different from WEP.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Counter (CTR) and CBC-MAC were first put forward in 1970s, and are now
standardized. CCMP uses CBA-MAC to calculate MIC values and CTR to encrypt
data. To put it in another way, CCMP defines an application method of AES. The
relationship between AES and CCMP is similar to that between RC4 and TKIP.
Security: The U.S. government says the security of AES meets its requirements on
secret data encryption.
ar
Mo
re
Le
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In shared key authentication mode, two WEP encryption modes are available: WEP40 and WEP-104. One access security profile can only be configured with one data
ht
s:
To enable shared key authentication, the STA and AP must be configured with the
same shared key. In shared key authentication mode, a maximum of four WEP
encryption keys can be configured at the same time. The key IDs are 0, 1, 2, and 3
respectively. If WEP-40 is used, the encryption key can be configured as a 10-digit
hexadecimal number or five ASCII characters; if WEP-104 is used, the encryption key
can be configured as a 26-digit hexadecimal number or thirteen ASCII characters
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Choose Configuration > AP Management > Service Set > Security Profile.
In the Security Profile List area, click Create. In the Create Security Profile dialog box
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
that is displayed.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Wi-Fi Protected Access (WPA) is a commercial standard drafted by the Wi-Fi Alliance
to substitute the insecure Wired Equivalent Privacy (WEP) standard before IEEE
ht
ur
802.1X+EAP
so
ce
Re
s:
802.11i was published. WPA uses the RC4 algorithm, which is called the Temporal
Key Integrity Protocol (TKIP) algorithm.
Mo
re
Le
ar
ni
ng
is configured.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Note:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
With the proposal of the 802.11i security standard, the Wi-Fi Alliance introduced
WPA2 based on the IEEE802.11i Standard in 2004. Different from WPA, WPA2
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
ur
Choose Configuration > Security Management > AAA > RADIUS Setting.
In the RADIUS Server Template area, click Create. In the Create RADIUS
Server Template dialog box that is displayed.
so
ce
Click Create in the Authentication Scheme area, and set parameters in the
Create Authentication Scheme dialog box that is displayed.
Choose Configuration > Security Management > AAA > RADIUS Setting.
Mo
re
Le
ar
ni
Re
Choose Configuration > Security Management > AAA > AAA Schemes.
s:
ht
ng
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-42
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WPA-WPA2 and TKIP-CCMP: User devices vary and support different authentication
and encryption modes. This security policy supports simultaneous configuration of
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
WPA and WPA2 on the AC so that multiple types of terminals can access the
network, facilitating network management. If the security policy is set to WPA-WPA2,
any terminal that supports WPA or WPA2 can be authenticated and access the
WLAN; if the encryption mode is set to TKIP-CCMP, any authenticated terminal that
supports TKIP or CCMP can implement service packet encryption.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On June 15, 2009, the Broadband Wireless IP Standard Working Group told that
ht
ce
s:
WAPI had, for the first time, been approved unanimously by over ten participant
countries including America, Britain, and France, and that it would be recognized as
an international standard and be published in the form of an independent text.
WAPI is China's first self-developed technical standard for access security in the field
WAPI allows only robust security network association (RSNA), providing higher
Re
so
ur
of broadband wireless LAN communication. China owns the intellectual property right
of WAPI.
security than WEP and WPA. It can be identified by the Information Element field in a
Mo
re
Le
ar
ni
ng
Beacon frame.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
WAPI is an instance that applies the access control method based on a triple-element
architecture and peer authentication to WLANs. In this architecture, the AP is
allocated with a unique certificate and bidirectional authentication is performed
between the three entities on two links.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WAI:
s:
ce
ur
ht
WPI:
Mo
re
Le
ar
ni
ng
Re
so
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On most carrier WLAN scenarios, only Portal authentication is used. In other words,
none of the three encryption methods (WEP, WPA, and WAPI) are used. The carrier
ht
ce
s:
WLANs are open and data is transmitted in plain text. It can been seen that most of
the public WLANs that are widely used currently have low security and application
layer protocols are needed to guarantee the WLAN security.
On enterprise WLANs, however, WPA2+802.1X authentication is used to protect the
user security.
This table presents a summary of the WLAN authentication and encryption, and
various combinations of authentication and accounting applied at the service layer.
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Authenticator
Authentication server
s:
Supplicant
ce
The IV length is increased from 24 bits to 48 bits so that more IVs are
supported.
A mechanism for key generation, management, and transmission is introduced
into TKIP encryption.
Mo
re
Le
ar
ni
ng
ur
so
Re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To DS and From DS: indicate the frame sent to the AP or from the AP.
More Fragments: indicates whether there are other frames that are divided from a
ur
ce
s:
ht
Retry: indicates that the frame needs to be retransmitted. All the retransmitted frames
Re
so
large frame. If the upper-layer frames are fragmented, all the fragments except the
last one set this bit to 1.
set this bit to 1 so that the receiver can reject repeated frames.
Power Management: indicates the power status of the transmitter after a frame is
transmitted. The value 1 indicates that the STA is in Power_save mode, and the value
0 indicates that the STA is in active mode.
More Data: this bit is only used by management frames. The value is fixed as 0 in the
ar
ni
ng
Protected Frame: the value 1 indicates that the frame body is encrypted, and the
value 0 indicates that the frame body is not encrypted.
re
Le
control frame.
Mo
Order: indicates that the frames and fragments can be transmitted in a certain order;
however, the transmitter and receiver must number the frames and fragments. The
value is 1 if frames and fragments are transmitted in a certain order.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When the 15th bit is set to 0, the Duration/ID bit is used to set NAV.
This bit indicates the number of microseconds used by the transmission medium to
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
transmit the frame. The workstation must monitor all received frame headers and
update NAV. If the transmission consumes more time than expected, the NAV is
updated and other workstations are rejected.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The receiver is the workstation that decrypts wireless signals into 802.11
frames.
If Address 1 is a broadcast or multicast address, the workstation must check
ur
s:
ht
Address 1 indicates the receiver's address. In some cases, the receiver's address is
the destination.
ce
Re
so
ng
workstation that encapsulates frames into network layer protocol, and the transmitter
sends frames to wireless links.
Address 3 is used to filter stations and transport systems. The use of this bit depends
on the network type.
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The sequence number is the number of transmitted frames Mod 4096. The number of
transmitted frames starts from 0, and increases 1 every time the MAC processes an
ht
The fragment number is used when the upper-layer packets are fragmented. The
number of the first fragment is 0. The fragment number increases 1 for consecutive
fragments. All fragments of a packet have the same sequence number. The sequence
number of retransmitted frame is unchanged.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The workstations use the same algorithm, so they can use FCS to verify frame
integrity. All bits in MAC header and frame body are counted. 802.3 and 802.11 use
ht
so
ur
ce
s:
the same algorithm to calculate FCS; however, the MAC headers are different.
Therefore, the workstations must recalculate FCS. When a frame arrives at the
wireless link, the workstation calculates the FCS first, and forwards the frame through
RF or IR link. The receiver then calculates the FCS for the received frames, and
compares the FCS with the recorded one. If the FCSs are the same, it indicates that
the frame is not damaged during transmission.
On the Ethernet, the frames with incorrect FCSs are discarded or sent to the upper-
Re
layer protocol. On the 802.11 network, the receiver must respond to the frames
ng
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Control frame: 01
Data frame: 10
ce
Re
ng
ni
ar
Le
re
Mo
ht
Management frame: 00
s:
so
Type values:
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Frame Control: Each frame control bit may affect the description of other bits in MAC
header. Especially, the address bit meaning depends on the To DS and From DS bits.
Duration: The Duration bit records the NAV value. NAV specifies the time limit for
access medium.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The Distribution System (DS) is the backbone network for forwarding frames between
access points. Generally, the DS is the Ethernet.
SA refers to the source address, DA refers to the destination address, RA refers to the
receiver, and TA refers to the transmitter.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
1. The source and transmitter are STA, and the destination and receiver are AP.
ht
so
3. The source is the switch connected to the AP, and the transmitter is the AP. Signals
are transmitted from AP to the wireless link, so the From DS field is 1. The destination
Re
ce
2. The source and transmitter are STA, and the receiver is AP. Signals are transmitted
from the wireless link to AP, so the To DS field is 1. The destination is the switch
ur
s:
Signals are transmitted by the STA, and the STA attempts to associate with the AP.
The BSSID is used to discard the signals from other STAs.
4. This is a WDS model. All the four address bits are used only in this model. In WDS,
ng
signals may be transmitted from wireless link to AP and from AP to wireless link.
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
To DS and From DS: The control frame is used to process access to wireless
medium; therefore, it is generated by the wireless workstation. The
transmission system does not receive or transmit control frames. Therefore,
the value of these two bits must be 0.
More Fragments: The control frame is not fragmented, so this value is fixed as
0.
Retry: Unlike management frames and data frames, control frames are
transmitted in sequence. Therefore, this value is fixed as 0.
More Data: This bit is only used by management frames. The value is fixed as
0 in the control frame.
Protected Frame: The control frames are not encrypted. Therefore, this value
is fixed as 0.
ar
ni
ng
Re
so
ur
ce
s:
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The RTS frame is used to obtain the medium control authority for transmitting frames.
Frame Control: It is the same as the Frame Control bit of other frames. The value
ht
1011 indicates the RTS frame. The other bits are the same as those of other frames.
s:
Duration: The RTS frame specifies the medium access authority for atomic frame
exchange operation. Therefore, the transmitter must calculate the remaining time after
RTS frame is sent. After calculation is complete, the microseconds used for frame
ce
so
ur
transmission are set to the Duration bit. If the result is not an integer, it is
automatically changed to the next microsecond.
Receiver Address: indicates the address of the workstation receiving RTS frames.
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After receiving the CTS frame, the neighboring workstations do not response.
Frame Control: The subtype value is set to 1100, indicating the CTS frame.
Duration: When responding to RTS, the CTS transmitter uses the duration value of
RTS frame as time basis. RTS reserves medium use time for the RTS-CTS-frameACK interaction process. After the CTS frame is sent, only the other frames,
fragments, and response messages need to be transmitted. The CTS transmitter
ce
s:
ht
Receiver Address: The CTS receiver is the RTS transmitter, so MAC copies the RTS
Re
so
ur
deducts the time required for transmitting CTS frames and other frames from the RTS
duration, and sets the result to CTS duration.
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Frame Control: The subtype value is set to 1101, indicating the ACK frame.
Duration: The value in the last frame or fragment is set to 0 depending on the ACK
position in frame transmission.
Receiver Address: The receiver address is copied from the response packet.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Frame Control: The subtype value is set to 1010, indicating the PS-Poll frame.
AID: In the PS-Poll frame, the third and fourth bits in MAC header are the association
ht
s:
Transmitter Address: indicates the MAC address of the PS-Poll frame transmitter.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ur
so
Re
ce
s:
ht
Mo
re
Le
ar
ni
ng
Association Request
relationship.
Reassociation Request
Disassociation
aw
ei
.c
om
/e
g.
hu
in
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
access point.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Control frame: 01
Data frame: 10
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
ht
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Carrier Sense (CS): Before transmitting data, a station monitors the line to check
whether the line is idle. In this manner, chances of collision are decreased.
ht
Multiple Access (MA): Data sent by a station can be received by multiple stations.
s:
Collision Detection (CD): If two stations transmit signals at the same time, the signals
are superimposed, and the voltage amplitude over the line doubles the normal value. A
collision occurs. Stations stop data transmission after detecting the conflict, and resume
ce
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Working process:
If the line is in use, terminal A waits until the line becomes idle.
s:
ur
ce
If terminal B sends data simultaneously, collision occurs. Signals of the line become
unstable.
The terminals stop sending data when they detect the unstable signals.
so
Terminals then send a succession of interference pulses and wait for a period to send
data.
Re
ht
Mo
re
Le
ar
ni
ng
especially notifies the device that sends data at the same time. The time to wait
for resuming data transmission is random.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Carrier Sense (CD): Before transmitting data, a station monitors the line to check
whether the line is idle. In this manner, chances of collision are decreased.
Multiple Access (MA): Data sent by a station can be received by multiple stations.
Collision avoidance: 802.11 allows stations to send Request to Send (RTS) packets
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
and Clear to Send (CTS) packets to clear the transmission line. This avoids
interference of other stations during data transmission.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
As shown in the figure, the AP can communicate with PC1 and PC2 but PC1 and PC2
cannot communicate with each other due to some restrictions. (PC1 and PC2 cannot
ht
PC2 is a hidden node of PC1. PC1 and PC2 may send data simultaneously, which
causes collision and the AP cannot identify information from PC1 and PC2. PC1 and
PC2 cannot detect the error.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
receive radio signals of each other because they are for from each other. Obstacles
between PC1 and PC2 have little impact on the hidden node problem.)
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
PC1 sends an RTS frame to the AP. After receiving the frame, the AP returns a CTS
frame. PC2 cannot receive the RTS frame sent by PC1 but receives the CTS frame
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
sent by the AP. Therefore, PC2 does not send data frames over the channel.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
PC1 is transmitting data to AP1. When PC2 wants to send data to AP2, it listens on
the signal channel as defined in CSMA/CA. PC2 detects that PC1 is sending data and
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
mistakenly considers that it cannot send data to AP2. However, PC2 can send data to
AP2 without interfering data transmission of AP1. The exposed node problem occurs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
PC1 sends an RTS frame to AP1. After receiving the frame, AP1 returns a CTS
frame. If PC2 receives the CTS frame, PC2 does not send data. If PC2 receives only
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
the RTS frame, it still sends data. PC2, as an exposed node, will not receive the CTS
frame of AP1. Therefore, PC2 can send data to AP2.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The duration of the delay depends on the frame type. High priority frames are
sent ahead of lower priority frames. A station only waits for a short delay to
send frames with higher priority and has to wait for a long delay for sending
frames with lower priority.
ur
ce
A station has to wait for a delay to send the next frame (listening on the
channel) after the previous frame is sent. This delay is called InterFrame
Space (IFS).
ht
s:
so
ar
ni
ng
A station defers the transmission of lower priority frames if it detects that the
medium is busy handling higher priority frames. This reduces the chance of
collision.
Re
Mo
re
Le
The DIFS is used for frame transmission and management in DCF mode.
The DIFS is the shortest time for a medium to remain idle in competitive
services. If the medium is continuously idle for a time longer than the DIFS
duration, a station can access the medium.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The preceding figure demonstrates how Network Allocation Vector (NAV) ensures
noninterference of the whole process.
The access of a work station to the medium is described in bars in shadow. Each bar
is marked with the frame type. If no frame is sent, the operation of the station is
marked with frame interval.
At the bottom of the figure, the bar align with the NAV represents the NAV timer. NAV
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
is carried in the header of RTS and CTS frames. Other stations postpone medium
access because the CSMA/CA mechanism senses that the medium is busy.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A STA scans wireless networks first. After the authentication and association process
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
is complete, the STA sets up a connection with an AP and accesses the wireless
LAN.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In active scan, a STA periodically searches for near wireless networks. The STA can
send a Probe Request frame with or without an SSID.
ht
The STA sends a Probe Request containing an SSID in 11 channels to search for
the AP with the same SSID. Only the AP with the same SSID will respond to the STA.
s:
The STA periodically sends a Probe Request that does not contain an SSID in the
supported channels. The APs return Probe Response frames to notify the STA of the
ce
so
In passive scan, a STA waits for the Beacon frames sent by APs. The Beacon frames
contain the BSS information of the APs.
Mo
re
Le
ar
ni
ng
Re
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Authentication is the first of two steps required to connect to the 802.11 basic service
set. Both authentication and association must occur, in that order, before an 802.11
ht
client can pass traffic through the AP to another device on the network.
The 802.11-2007 standard specifies two different methods of authentication: Open
System authentication and Shared Key authentication.
If open system authentication is used, the WLAN client can be authenticated as long
ce
s:
Shared key authentication requires that the WLAN server and client use the same
Re
so
ur
as the WLAN server supports open system authentication and packets exchanged
between them are not encrypted.
shared key. The WLAN server checks whether the client uses the shared key. If the
Mo
re
Le
ar
ni
ng
client uses the same shared key as the server, the client is authenticated; otherwise,
the client fails to be authenticated.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The WLAN client has already obtained the service configuration parameters such as
the access authentication algorithm and encryption key in the WLAN service
ht
After link negotiation is complete, an 802.11 link is set up between the WLAN server
Mo
re
Le
ar
ni
ng
and client.
Re
so
ur
ce
s:
discovery stage. These parameters are carried by the Beacon frame or probe
response sent by the WLAN server. In the client association stage, the association or
re-association request sent by the client carries the client's parameters and the
parameters that the client selects according to the service configuration, including the
transmission rate, channel, QoS capabilities, access authentication algorithm, and
encryption algorithm.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
How many stages are required for an STA to access the network and what are they?
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Electromagnetic wave (namely, electromagnetic radiation) moves in the air using the
electric field and magnetic field that are mutually vertical and flap in the same
ht
direction.
Radio wave is the electromagnetic wave emitted in the free space (including air and
vacuum). The frequency of radio wave is lower than 300GHz (The lowest frequencies
are different. The commonly used lowest frequencies are 3 KHz-300 GHz, 9 KHz-300
GHz, and 10 KHz-300 GHz).
The current change in the conductor generates radio waves. Therefore, information
can be carried by radio wave through modulation. When electromagnetic wave
reaches the receiver, the electromagnetic field change caused by the electromagnetic
Re
so
ur
ce
s:
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
is 1 Hz.
Wave consists of consecutive crests and troughs. The distance between adjacent
crest and trough is the wavelength. Waves vary in size from very long radio waves the
size of a football field, to very short gamma-rays smaller than the size of the nucleus
of an atom. The higher the frequency is, the shorter the wavelength is.
The frequency of electromagnetic waves ranges from 3 kHz to 300 GHz, and the
wavelength ranges from 10 km to 0.1 mm.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When radio waves reach the receiver, the electric field may be vertical to or in parallel
with the group.
When the phases are the same (or 180), the electric field is linear polarization.
In this case, the electric field vectors are in the same plane. The amplitude E
of electric field changes at an interval in period t, but the direction is not
changed. The wave of electrical field E that is vertical to the group is called
vertical polarized wave, and the wave that is parallel with the group is called
parallel polarized wave.
Generally, the amplitude and phase of waves are random values, and the
electric field E is an ellipse. This is called elliptical polarization. If the transmit
ng
If the vertical vector and parallel vector of an electric field are the same and the
phases are 90 (270, the wave is the circular polarized wave.
Re
so
ur
ce
s:
ht
ni
antenna uses circular polarization, the receiver antenna must also use circular
polarization, and the polarization directions must be the same. This is called
Mo
re
Le
ar
polarization matching.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When electric charge is added to the metal conductors. The electric field is generated
between the conductors, as shown in figure 1. In figure 2, the conductors is placed far
ht
When the conductor length L is greatly smaller than wavelength , emission is weak.
When the conductor length is near the wavelength, current on the conductor greatly
increases and emission increases. The linear conductor is called dipole.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
away from each other. If the conductors forms a line, the electric field is outside the
conductors, as shown in figure 3.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The antenna converts guided waves on cables into free space electromagnet waves
or converts free space electromagnet waves into guided waves. Antennas on wireless
ht
ce
s:
devices transmit and receive electromagnetic waves. The signals transmitted by the
wireless transceiver are received by the antenna through the feeder, and transmitted
by the antenna as electromagnet waves. The electromagnet waves are received by
the antenna of the receiver, and sent to the wireless transceiver through the feeder.
Generally, an antenna can transmit and receive electromagnet waves. The features
and specifications of an antenna are basically the same when it transmits and
receives electromagnet waves. This is the reciprocity principle.
Re
so
ur
direction. The typical guided waves are the waves transmitted along the parallel lines
Mo
re
Le
ar
ni
ng
or coaxial cables, waves transmitted along the pipe, and waves transmitted along the
ground from the launchers to the receiver.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
To analyze antenna performance, antennas are classified into two types: linear
antenna (metal cables of which the semidiameter is smaller than the wavelength) and
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
plane antenna (metal or medium of which the semidiameter is greater than the
wavelength). The linear antenna is used for long, medium, and short frequency bands.
The plane antenna is used for centimeter or millimeter frequency bands.
Veryhighfrequency (VHF) is transmitted by linear antennas, and ultrahigh frequency
(UHF) is transmitted by both linear and plane antennas. The working mechanisms of
linear antenna and plane antenna are the same.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Half-wavelength dipole generates electric wave of which the wavelength is two times
of the dipole length. The two ends of the generated standing wave are voltage
ht
ur
In short wave, ultrashort wave, and microwave, the half-wavelength dipole functions
as the dipole of antennas, feeders, or antenna arrays.
Mo
re
Le
ar
ni
ng
Re
so
ce
s:
antinode and the center is current antinode. It is similar to electric dipole, which can
be used as antenna (dipole antenna). When it is used as dipole antenna, the
wavelength is half wavelength. Symmetrical dipole is the typical and commonly used
antenna.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
An antenna can transmit waves to different directions and receive waves from
different directions. An antenna pattern is a plot of the relative field strength of the
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The flat pattern shows the radiation direction of an antenna at the specified plane. The
radiation in the axes direction is zero, and the radiation in the horizontal direction is
the maximum value. The antenna has equal radiation in all directions.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When the pattern becomes flat, signals are focused. The signals are strong in certain
directions, and weak in other directions.
The flat pattern shows the reflector function: The reflector reflects energy to one side
to increase gain. The paraboloid reflector focuses energy to an angle, like a
searchlight. A paraboloid antenna consists of a paraboloid reflector and radiation
source.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
so
ur
ce
s:
Re
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
antenna.
s:
With development of new technologies, dual-polarized antennas are widely used now.
Dual-polarized antennas use two polarization modes: vertical and horizontal
polarization and 45 polarization. The performance of 45 polarization is higher
than the performance of vertical and horizontal polarization. Therefore, 45
polarization is widely used. The dual-polarized antenna consists of +45 and -45
antennas that are mutually orthogonal and work in full duplex mode. Fewer antennas
so
ur
ce
Re
Mo
re
Le
ar
ni
ng
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
signals will be weakened. That is, signals are attenuated due to polarization. For
example, when the + 45 polarized antenna receives vertically or horizontally
polarized waves or when the vertically polarized antenna receives +45 or -45
polarized waves, signals are attenuated. When the circular polarization antenna
receives linear polarization waves or when the linear polarization antenna receives
circular polarization waves, signals are attenuated. The received signals may be only
a half of the total signals.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The indoor ceiling-mounted antenna must have simple structure and be easy to install.
The antenna has low gain, which is about2-5 dBi. Such antennas are usually used on
ht
s:
Wall-mount antennas also feature in light weight and easy installation. The gain of
wall-mount antennas is about 5-8 dBi. The wall-mount antennas can be used on
indoor distributed devices or directly connected to the signal source.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Outdoor antennas are the most important part in WLAN outdoor project. Antenna type
decides whether signals can be stably transmitted in a long distance. Antenna's
ht
Directional antennas can provide high gain. Generally, the antennas that have small
angles provide high gain, and signals are transmitted longer. However, the antennas
so
ur
ce
s:
coverage area and angle must be considered when selecting antenna types. When
the space to be covered is small, the low-gain omnidirectional or directional antennas
can be used. When the space to be covered is large, the high-gain directional
antennas must be used. The high-gain, small-angle antennas are suitable for outdoor
long distance, point-to-point transmission.
Re
that have focused directions are difficult to install and adjust. The antennas on two
ng
sides must point to each other; otherwise, signal transmission is inaccurate. Such
antennas are suitable for long-distance transmission. Therefore, there are high
Mo
re
Le
ar
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Physically, gain has the following meaning: ratio of the signal output of a system to
the signal input of the same system. If the transmitter antenna is an ideal undirectional
ht
ce
s:
source, the input power should be 100 W. If the transmitter antenna is a directional
antenna of which gain is G=13dB(20 times), the input power is 100/20=5W. That is,
an antenna's gain is the amplifier of input power of the undirectional ideal radiation
source.
If the gain is calculated based on half-wavelength symmetrical dipole, the gain unit is
dBd.
When selecting gain, ensure that the beam matches coverage area. If coverage area
is small, select the low-gain antenna with wide vertical lobe.
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Antennas have different patterns. Some antenna patterns have many lobes. The lobe
that has the highest radiation is the main lobes, and the other lobes are backlobes
ht
When deploying the antennas, note that sidelobes will interfere with peripheral
residential areas. Generally, the main lobe radiation needs to be enhanced, and side
lobe radiation needs to be suppressed. However, in the areas near the antennas, the
Re
so
ur
ce
s:
ng
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
3 dBm = 2mW
-3 dBm = 0.5 mW
10 dBm = 10 mW
s:
ce
ur
so
tp
0 dBm = 1 mW
ht
Re
That is, the gain 16 dBd is equivalent to 18.14 dBi, that is 18 dBi.
ar
ni
ng
When transmitting signals within 100 m at frequency band 2.4 GHz, the power
loss of the 1/2-inch feeder is about 12.1 dB.
Le
Mo
re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Note
s:
ht
The output arms of cavity splitter are not separated; therefore, the cavity
splitter cannot be used as combiner.
When working for a long time, the cavity splitter is stabler than the microstrip
splitter.
ur
so
Re
ng
ni
ar
ce
Mo
re
Le
cannot work.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Product Type
ht
Couplers are classified into cavity coupler and microstrip coupler based on
power distribution.
ce
Note
When working for a long time, the cavity splitter is stabler than the microstrip
splitter.
so
Re
ng
ar
ur
ni
s:
Mo
re
Le
cannot work.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The combiner combines signals of multiple systems into a set of antenna system. In
wireless antenna system, input and output signals of different frequency bands are
ht
s:
combined ,and the antenna system is connected to the console through a feeder. This
saves feeders and prevent antenna switching.
In the WLAN field, combiners include single-band combiners (2.4G) and multi-band
combiner).
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The coaxial cable has inner conductor and the outer shield sharing a geometric axis.
Coaxial cable has an inner conductor surrounded by a tubular insulation layer,
ht
s:
surrounded by a tubular conducting shield. The coaxial cable transmits highfrequency signals with little loss, prevents interference, and provides high bandwidth.
There are two types of coaxial cables: 50 and 75.The 75 coaxial cable uses
CATV system, and the 50 coaxial cable uses radio communication.
FR coaxial cable is the coaxial cable that transmits signals and energy within the
radio frequency range. FR coaxial cables are classified into three types based on
functions, CATV coaxial cable, radio coaxial cable, and leakage coaxial cable.
When signals are transmitted in the feeder, there are impedance loss and media loss.
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
The loss increases when the feeder length and working frequency increase.
Therefore, the feeder should not be too long.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
RF connector type:
ng
Re
so
ur
ce
s:
ht
Mo
re
Le
ar
ni
male and the other end is female. BNC/SMA-50JK represents the converter
with BNC male and SMA female, and the impedance is 50.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The surge protection device is usually used between electrical conduction and ground,
and connected to the protected device. When voltage exceeds the upper limit, the
ht
Functions of antenna surge protection device: transmits wireless signals and protects
interfaces, transmits control signals and protects receiving device, protects television
satellite device, monitors signal transmission, protects receiving device, protects
wireless communication device, and protects other radio devices.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
surge protection device limits voltage to protect the device. When voltage is restored,
the surge protection device restores the working voltage.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Combiner, power splitter, and coupler are commonly used passive components used
in indoor distribution system. The combiner is mainly applied to multi-system
ht
Antenna surge protection device and network interface surge protection device are
used outdoors.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
23dBm=?Mw
Calculation:
ce
1 mW x 10 = 10 mW
10 mW x 10 = 100 mW
100 mW x 2 = 200 mW
ur
Mo
re
Le
ar
ni
ng
Re
ht
so
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When the network load is heavy, you can configure QoS to control factors that may
cause network congestion, to reduce the possibility of congestion during resource
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
allocation and traffic control. When congestion occurs, the system allocates resources
based on service characteristics and requirements to minimize the impact of
congestion on QoS.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In the Best Effort model, an application can send any number of packets at any time
without any approval or notifying the network. The application attempts to send
ht
The Best Effort model is the default service model on the Internet and can be applied
to various network applications, such as FTP and email.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
packets with the best efforts, but cannot ensure performance such as delay and
reliability.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
An application notifies the network of the QoS requirements, including the delay,
bandwidth, and packet loss ratio, through the signaling protocol. After receiving the
ht
When the resource is allocated to the application, the network ensures the QoS for
the application as long as the packets of this application are controlled within the
range specified by the traffic parameters. The network nodes on the reserved path
can perform packet classification, traffic policing, and queue scheduling with a short
so
ur
ce
s:
RSVP request, the network nodes on the transmission path perform admission control
to check the validity of the user and the availability of the resources. After that, the
network nodes decide whether to reserve resources for the application.
Re
delay to ensure the QoS. Combined with multicast, the IntServ model can be used in
ng
real-time multimedia applications that require high bandwidth and low delay, such as
video conference and video on demand (VoD). The traditional telephones use this
ni
model for communication. When the resources are not reserved, the line is occupied
and calls cannot be connected. When the resources are reserved, the quality of calls
Mo
re
Le
ar
can be guaranteed.
The advantage of the IntServ model is that it can provide end-to-end QoS guarantee,
whereas its disadvantage lies in the poor scalability. Network nodes must maintain
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
soft state information for each resource reserved. In the multicast application, network
nodes need to periodically send resource requests and path update information to the
network so that group members can join or leave a multicast group dynamically. It
takes a long time to perform these operations and a lot of memory resources are
consumed. When a network is expanded, the cost of maintenance increases greatly,
which seriously degrades the performance of network nodes, especially the core
nodes that need to process packets at line speed. Therefore, the IntServ model is not
applicable to backbone networks where traffic aggregates.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Unlike IntServ, an application in the DiffServ model does not need to send resource
reservation requests to all network devices on the transmission path. Instead, the
ht
s:
application sets the precedence field in the packet header to notify the network
devices of its QoS requirements.
In the DiffServ model, network devices provide differentiated services for each flow
based on the precedence field in the packet but do not need to maintain the status of
each flow. QoS can be specified based on various information, such as the IP
precedence, source address, and destination address of packets.
The QQ voice and QQ video services use the Best Effort model, which does not
ensure good communication quality. The video conference service uses the DiffServ
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
QoS profiles can be classified into two types: the traffic profile on the wired side and
the WMM profile on the wireless side.
The traffic profile contains various priority mapping and traffic suppression
parameters including the profile name, 802.3 priority mapping policy, tunnel
priority mapping policy, UP mapping policy, and traffic policing.
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
including the profile name, WMM status, EDCA parameters, and ACK policies
and parameters. WMM defines a priority range based on data types for
wireless communication. Delay-sensitive data, such as video data and voice
data, has higher priorities than common data. To support WMM, STAs must
have WMM enabled. STAs can also choose not to enable WMM.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
User priority (UP) represents the priority of 802.11 packets. The UP is included in the
QoS field of the 802.11 MAC header. The value of UP ranges from 0 to 7. The WMM
ht
ce
s:
protocol specifies the mapping relationships between WMM and UP. WMM is
classified into four categories, and each category maps two UP values. APs
determine the WMM access category of data packets based on UP values and
forward the packets based on the priority of AC queues.
There are four AC queues with different priorities. Packets in a high-priority AC queue
have greater capabilities in channel preemption so that differentiated services are
provided for different AC queues.
The voice and video data in video conferences maps the AC_VO and AC_VI queue
Re
so
ur
Mo
re
Le
ar
ni
ng
respectively. The QQ voice and QQ video on the Internet maps the AC_BE queue.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WMM defines a set of EDCA parameters for each AC. The meanings of parameters
are as follows:
Arbitration Inter Frame Spacing Number (AIFSN): AIFSN is similar to the DIFS
in the IEE802.11, which is a fixed value. However, WMM defines different
AIFSNs for ACs. A larger AIFSN value indicates a longer idle duration.
ce
s:
ht
ECWmin and ECWmax: These two values determine the average backoff time.
so
Re
ur
indicates a longer duration. If this parameter is set to 0, a STA can send only
Two ACK policies are specified in WMM: Normal ACK and No ACK.
In no ACK mode, if the communication quality is good and interference
is low, no ACK packet is sent to confirm the receiving of a packet from
ni
ng
Mo
re
Le
ar
the sender. This improves the transmission efficiency, but may cause
increased packet loss if the communication quality is low.
In normal ACK mode, the receiver sends an ACK packet to confirm the
receiving of every unicast packet from the sender.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
AIFS
Cwmin
CWmax
ht
Category
2/3
0.25 min
0.5 min
Video
2/3
0.5 min
1 min
Best Effort
1 min
7/3
1 min
max
The AIFS value of the BE queue is set to 1. AIFS values of other AC queues are
ur
max
ce
Background
s:
Voice
so
Backoff slots indicate the backoff duration for each AC queue. A higher-priority queue
has a shorter backoff duration and occupies the channel first.
ar
ni
ng
Re
Before occupying a channel to send packets, STAs monitor the channel. If the
channel idle time is longer than or equal to the AIFSN, each STA selects a
random backoff time between ECWmin and ECWmax. The STA whose
backoff time expires the first occupies the channel and starts to send packets
over the channel.
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
802.11 provides services of the same quality for all applications. Different
applications, however, have different requirements for wireless networks. 802.11
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-16
A WMM profile is created to implement the WMM protocol. After a WMM profile is
created, packets with higher AP or STA priority preempt a wireless channel first,
Re
so
ur
ce
s:
ng
Choose Configuration > AP Management > Radio Profile > WMM Profile to display
ar
ni
Le
On the WMM Profile page, click Create to display the Create WMM Profile page.
Mo
re
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
(Optional) Run the wmm edca ap { ac-vo | ac-vi | ac-be | ac-bk } { aifsn aifsn-value |
ecw ecwmin ecwmin-value ecwmax ecwmax-value | txoplimit txoplimit-value | ack-
ht
(Optional) Run the wmm edca client { ac-vo | ac-vi | ac-be | ac-bk } { aifsn aifsn-value
| ecw ecwmin ecwmin-value ecwmax ecwmax-value | txoplimit txoplimit-value }*
command to set EDCA parameters for the four WMM queues on a STA.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
policy { normal | noack } }* command to set EDCA parameters for the four WMM
queues on an AP.
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-19
ce
s:
radio profile, the radio has all parameters configured on the radio profile. Since one
radio profile can be bound with multiple radios, the radio profile can simplify radio
configuration.
Choose Configuration > AP Management > Radio Profile to display the Radio Profile
page.
On the Radio Profile page, click Create to display the Create Radio Profile page.
On the Create Radio Profile page, select or enter each parameter based on actual
requirements.
Mo
re
Le
ar
ni
ng
Re
so
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A traffic profile can be created, deleted, modified, and queried. The traffic profile
cannot be deleted after it is bound to an ESS. After a traffic profile is created, it must
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
so
The AP may change the packet priority according to the VAP configuration.
ni
Mo
re
Le
ar
Re
VLAN tagged-802.3 packets transmitted on the Ethernet contain the CoS field.
If an 802.3 packet is also an IP packet, it also contains the DSCP field.
ur
s:
802.11 packets sent by STAs supporting WMM contain the user priority (UP)
field.
ce
ht
802.3 and 802.11 packets indicate their priorities with different fields, which can be
changed during the transmission and forwarding process on networks.
ng
aw
ei
.c
om
/e
Configure the priorities according to the priority settings obtained from the
VAP.
If only the DSCP field is configured, and the packets are IP packets,
store the priorities in the DSCP field of the IP packet header.
If both CoS and DSCP fields are configured, perform the two
operations.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
If only the CoS field is configured, and the packets contain VLAN tags,
store the priorities in the CoS field of the 802.3 packets.
g.
hu
in
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ur
ce
s:
contained in the packet cannot be identified. Therefore, the device must implement
QoS mapping again on this upstream packet. The DSCP priority of the IPv4 packet
and the TC priority of the IPv6 are processed in the same way. Six mapping modes
are available: fixed CoS, fixed DSCP, mapping from CoS to CoS, mapping from CoS
to DSCP, mapping from DSCP to CoS, and mapping from DSCP to DSCP.
The conversion process is as follows:
Query the mapping mode of the upstream packets according to the VAP
configurations.
ng
In fixed DSCP mode, set the DSCP priority of the CAPWAP packet to the fixed
DSCP value of the VAP. The CoS value is 0.
ar
In fixed CoS mode, set the CoS priority of the CAPWAP packet to the fixed
CoS value of the VAP. The DSCP value is 0.
ni
Re
so
In CoS to CoS mapping mode, set the CoS priority of the CAPWAP packet
according to the CoS->CAPWAP CoS mapping table of the VAP. The DSCP
Le
Mo
re
value is 0.
In CoS to DSCP mapping mode, set the DSCP priority of the CAPWAP packet
according to the CoS->CAPWAP DSCP mapping table of the VAP. The CoS
aw
ei
.c
om
/e
value is 0.
In DSCP to CoS mapping mode, set the CoS priority of the CAPWAP packet
according to the DSCP->CAPWAP CoS mapping table of the VAP. The DSCP
value is 0.
In DSCP to DSCP mapping mode, set the DSCP priority of the CAPWAP
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
determined by DSCP (TC in IPv6) or CoS field value, or set by a traffic classifier. The
traffic classification can be implemented based Layer 2 and Layer 3 parameters
carried in the packet. The AP obtains a new priority based on the mapping mode
configured on the VAP and stores it in the UP field of the 802.11 packet.
The conversion process is as follows:
Query the mapping mode of the upstream packets according to the VAP
configurations.
Re
so
ur
If traffic classification is configured, set the priority value based on the traffic
ng
classification result.
After mapping, the priority is stored in the UP field of the 802.11 packet.
Mo
re
Le
ar
ni
Upstream and downstream packets can be classified based on Layer 2, Layer 3 and
Layer 4 parameters. A priority can be obtained based on the traffic classification result
aw
ei
.c
om
/e
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
and stored in the packet. Layer 2 parameters that can be used for traffic classification
include: MAC DA, MAC SA, VLAN ID, IEEE802.1p) user priority, Ethernet type (such
as MAC Control, PPPoE, and PWE3). Layer 3 and Layer 4 parameters that can be
used for traffic classification include: the destination IP address, source IP address, IP
type (such as ICMP, IGMP, TCP, and UDP), IP ToS/DSCP, destination TCP/UDP port,
and source TCP/UDP port. IPv6 parameters that can be used for traffic classification
include: the source IP address, destination IP address, IP type, and flow label.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After a traffic profile is created, parameters in the profile use default values. Run the
display traffic-profile { all | id profile-id | name profile-name } command to view the
ht
s:
After receiving an 802.3 packet from the Ethernet network, the AP converts the 802.3
packet into an 802.11 packet and forwards it to the STA. The user priority in the
802.11 packet is determined by DSCP or CoS priority in the 802.3 packet or set by a
traffic classifier.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
P-31
VAP upstream rate limit(kbit/s): Upstream rate limit for all terminals associating with a
VAP. The value must be larger than the upstream rate limit for a STA.
VAP downstream rate limit(kbit/s): Downstream rate limit for all terminals associating
with a VAP. The value must be larger than the downstream rate limit for a STA.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ur
ce
The AP may change the packet priority according to the VAP configuration.
so
Mo
re
Le
ar
ni
ng
AC queues can be classified into four types: AC_VO, AC_VI, AC_BE, and
AC_BK. They are listed in descending order.
s:
ht
What are the types of AC queues? Are they defined by default or do they need to be
manually configured on a STA?
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
and packet data loss for network services. To be specific, QoS provides endto-end quality guarantees for user services through a set of performance
indicators, including the bandwidth, delay, jitter, and packet loss ratio during
packet transmission.
ur
ng
Re
ni
Three service models are available: the best effort model, IntServ model, and
DiffServ model.
so
Traffic policing
Mo
re
Le
ar
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You need to clarify the basic requirements for WLAN network construction, such as
field strength requirements, bandwidth requirements, and the services to support.
Bring a drive test mobile phone to the site and conduct the onsite survey to obtain the
building drawings and measure the attenuation values of obstacles.
Make a deployment plan based on the survey result and customer requirements.
When you make the plan, consider frequency interference, network capacity, the
ce
s:
ht
ur
After the construction is complete, conduct the acceptance test using Huawei network
Re
so
ng
test tools and output an acceptance report. If the project is accepted, the WLAN
Mo
re
Le
ar
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Determine the key coverage area and secondary coverage area according to the site
survey and building drawings, and make coverage mode planning for areas with a
ht
s:
Determine the deployment modes (indoor settled, indoor distribution, and outdoor
coverage) according to site requirements.
ce
Re
so
ur
covered areas. Before planning the WLAN network, consider the following
points:
APs need to be deployed.
APs provide a limited bandwidth. If there is high requirement on the
ng
ni
Mo
re
Le
ar
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Conduct the site survey to obtain detailed building drawings and learn the building
structure.
Check the coverage area for wireless interference sources and 2G/3G antennas.
Perform outdoor survey to determine the method for installing APs (pole mounted or
wall mounted), and check the frequency band, transmit power, and antenna direction
of APs already deployed on the site.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Indoor settled deployment: This mode is widely used because the installation is easy
and the AP position is flexible. An AP can provide signal coverage since it is
ht
s:
connected to a network and powered on. When using this mode, you need to consider
network access, signal interference, and power supply.
Indoor distributed deployment: You can use a small number of APs since couplers are
used to integrate WLAN signals to the planned indoor distribution system. When using
this mode, you need to consider the antenna installation and bandwidth requirements.
Outdoor coverage: This mode is used when WLAN cannot be deployed indoors or
when you construct a wireless city. When using this mode, you need to consider the
sector coverage, antenna selection, wireless network bridges selection.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In Japan, channel 14 uses only the direct sequence spread spectrum (DSSS) and
complementary code keying (CCK) modulation modes but not orthogonal frequency
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The standard frequency band in China can be extended to 5.850 GHz on the basis of
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ur
ce
s:
In HT40 mode, a 2.4 G network has only two non-overlapping channels 3 and 11
ar
ni
ng
Re
so
Le
This table lists the 5 GHz frequency band in HT40 mode used in America and China.
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
In the 5.8 GHz frequency band, non-overlapping channels 149, 153, 157, 161, and
165 are used, with 20 MHz of separation between each two channels.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Use the channel distribution with the lowest co-channel interference to prevent cross
floor interference.
If the AP's channels conflict with channels of users' Wi-Fi devices, adjust the channel
distribution.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If directional antennas are used, you can prevent channel conflicts by adjusting the
antenna directions. In this way, you can make full use the channels that have been
ht
planned.
s:
For example, in outdoor coverage scenarios, you can install APs on poles or towers in
back-to-back mode. This fully uses the channels in different sectors that provide
signal coverage in different directions, improving channel utilization.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
APs are directly connected to the AC or connected to the AC through a switch. All
data is forwarded by the AC. Service data is not encapsulated by CAPWAP. The
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
service data is transparently transmitted by service VLANs. The AC must have high
forwarding performance. If there are a few APs and traffic volume is not high, this
mode can be used.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
APs are directly connected to the AC or connected to the AC through a switch. All
data is forwarded by the AC. Service data is encapsulated by CAPWAP and is
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
connected to the existing network in bypass mode. This mode has little impact on the
existing network.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
This table lists some common data services. The minimum downstream and upstream
bandwidth must be ensured for these services.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
than 30 users be connected to each AP. (For details about AP's capability, see the
product manual.)
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Calculate the AP's coverage based on AP's transmit power, antenna gain, and signal
loss. Place the AP according to its coverage radius.
When the AP's signal traverses the wall from outdoors to indoors, determine whether
signal loss affects indoor signal strength. If indoor signal is weak, add more APs to
increase signal strength indoors.
If signals traverse a barrier with a degree, the traverse depth is larger than that when
ce
s:
ht
so
In the area containing a lot of access users, AP density should be high, ensuring that
each user connected to the AP can obtain guaranteed bandwidth.
Mo
re
Le
ar
ni
ng
Re
ur
signals traverse the barrier vertically. Therefore, vertical traverse reduces signal loss.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can use Huawei eSight WLAN Planner to import building drawings and set
various obstacles.
The tool can display the signal strength and SNR by figures.
The tool allows you to export standard planning reports, facilitating communication
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can know the penetration loss of some obstacles through site survey and
experiences. These values help AP planning and signal strength rendering.
In the scenario where APs are deployed outdoors to support indoor wireless access,
wireless signal strength decreases when signals penetrate glasses, walls, or wooden
doors. You need to consider the penetration loss into link budgets.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Improve frequency multiplexing efficiency and ensure that the same signal channel is
not used in a coverage area or adjacent coverage areas. Use the isolation degree
so
ur
ce
s:
scanning and unified AP planning during the survey and planning stage and adjust
APs' transmit power and antenna direction to control signal coverage in the
optimization stage. Perform RF scanning in onsite survey to check wireless
environment, negotiate channel usage with other carriers or wireless router users to
avoid co-channel interference.
interference.
Re
Adjust transmit power and feeder system to reduce impact of co-channel interference
ni
ng
Mo
re
Le
ar
on AP performance.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When the interval between center frequencies of two channels is smaller than 25 MHz,
there is signal overlapping between the two channels. You can use adjacent channels
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If many STAs associate with the same AP, a large number of STAs and services
compete for this AP resource, causing QoS deterioration. If this AP keeps this state
ht
s:
for a long period whereas its adjacent AP is lightly-loaded, the entire network is
unstable, reducing the overall efficiency and performance.
When a network is not load balanced, STAs switch among APs randomly. A large
number of STAs disconnect from the original AP and try to associate with an AP on a
hotspot area, but the association may fail. When the number of STAs connected to
that AP reaches the threshold, new STAs cannot associate with the AP or the
association causes network congestion and service interruption.
A few APs on hotspot areas are fully-loaded whereas other APs are not used, causing
Re
so
ur
ce
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
An AC performs load balancing between APs when STAs connect to these APs.
Each AP periodically reports STA association information to the AC, and the AC
ht
distributes user traffic among APs based on received STA association information.
s:
When a STA sends an association request to an AP, the AC checks whether the
number of STAs connected to the AP has reached the threshold. If the number of
STAs is smaller than the threshold, the AC instructs the AP to accept the association
ce
As shown in this figure, STA1 requests to associate with AP1. However, the number
Re
so
ur
Mo
re
Le
ar
ni
ng
of STAs connected to AP1 has reached the threshold, so STA1 associates with AP2.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
As shown in this figure, a WLAN has three APs. The coverage area of AP1 does not
overlap the coverage areas of AP2 and AP3. The AC load balances traffic among
ht
This example shows that load balancing can be implemented among APs only when
the APs are connected to the same AC and all these APs can be discovered by a
so
ur
ce
s:
APs. When STA1 sends an association request to AP1, the AC detects that the
number of STAs connected to AP1 has reached the threshold. Therefore, the AC
instructs AP1 to reject the association request of STA1. STA1 then attempts to
connect to AP2 or AP3. Because STA1 is not in the coverage area of AP2 and AP3,
STA1 finally associates with AP1.
Mo
re
Le
ar
ni
ng
Re
STA.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
algorithm is as follows:
s:
radio) x 100%
so
The AC compares load percentages of all radios in the load balancing group
and obtains the smallest load percentage value. When a STA requests to
Re
ce
The AC calculates the load percentage of each radio in a load balancing group
using the formula:
ur
ng
radio's load percentage and the smallest load percentage value and compares
the load difference with the threshold (configured using a command). If the
ni
load difference is smaller than the threshold, the AC allows the STA to
associate with the radio. If not, the AC rejects the association request of the
Le
ar
STA. If the STA continues sending association requests to this AP, the AC
allows the STA to associate with the AP when the number of association
Mo
re
requests sent by the STA exceeds the maximum number configured on the AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
follows:
s:
The AC calculates the load percentage of each radio in a load balancing group
using the formula:
ce
so
The AC compares load percentages of all radios in the load balancing group
and obtains the smallest load percentage value. When a STA requests to
Re
ur
ng
radio's load percentage and the smallest load percentage value and compares
the load difference with the threshold (configured using a command). If the
ni
load difference is smaller than the threshold, the AC allows the STA to
associate with the radio. If not, the AC rejects the association request of the
Le
ar
STA. If the STA continues sending association requests to this AP, the AC
allows the STA to associate with the AP when the number of association
Mo
re
requests sent by the STA exceeds the maximum number configured on the AC.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
an AC. When the threshold is exceeded, an AP starts load balancing and rejects the
association request from any STA.
When the difference between the number of STAs on each radio is smaller than the
threshold, the AP accepts the association request from a STA.
By default, a load balancing group uses the session-based load balancing mode.
Load difference between radios in the group is 4% (value range 1 to 100), and the
maximum number of association attempts is 6 (value range 1 to 30). If the number of
times a STA requests to associate with a radio exceeds the threshold, the STA is
allowed to associate with the radio regardless of whether the traffic is balanced in the
load balancing group.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Why do people need to plan channels and how do they plan channels?
ht
ce
s:
frequencies of each two channels in the 2.4 GHz frequency band must be
larger than or equal to 25 MHz. It is recommended that channels 1, 6, and 11
be used in overlapping mode.
In the 5.8 GHz frequency band, non-overlapping channels 149, 153, 157, 161,
so
ng
Re
Mo
re
Le
ar
ni
ur
and 165 are used, with 20 MHz of separation between each two channels.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
As various Wi-Fi terminals are developed and WLAN sizes increase, WLAN is widely
used and a lot of new service requirements emerge. WLAN is applied to many new
ht
s:
Campus
ce
Public area
The public area, such as coach station, railway station, airport lounge,
restaurant, amusement park, library, hospital, and large gymnasium,
Re
so
ur
Exhibition center
ni
ng
ar
Office building
Mo
re
Le
The exhibition center also has temporary and mobile troops and high
population density.
The office building features in large area and middle height. The WLAN
covers meeting rooms, restaurant, and office area.
The hotels have different areas and heights. The WLANs cover guest
Hotel
aw
ei
.c
om
/e
Residential area
The residential areas have various structures, and most homes access
g.
hu
wired networks. Therefore, wired networks are the most important way
to access the Internet.
in
Pedestrian
rn
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Indoor settled APs have lower power, 100 mW usually. They can use multiple
antenna arrays to support 2x2 MIMO and 3x3MIMO, providing high throughput.
Indoor distributed AP is also called high-power AP. The indoor distributed system
enlarges signal coverage area, and works with the 2G/3G indoor distribution system
to provide signal coverage. The indoor distributed system is a cost-effective solution.
Outdoor APs are applicable to rugged environment. Compared with indoor APs,
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
outdoor APs have higher waterproof, surge protection, and dust-proof capabilities.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Case:
ht
Requirement analysis: An office area has 200 employees. The user concurrent
Network design:
ur
ce
s:
Deploy the indoor settled APs with dual bands: 2.4 GHz and 5 GHz.
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
For the indoor areas such as meeting rooms and coffee houses, the wall-mount or
ceiling-mount APs are recommended.
For the ordinary guest room, the ceiling-mount APs can be installed in corridor. For
the VIP guest rooms, the antennas can be deployed in the rooms.
The office building has a wide indoor area, and the rooms are separated by walls. The
ceiling-mount APs installed in the corridor can offer signals for ordinary offices.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Local powering is inconvenient. In addition, the exposed power cables bring security
risks.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
In most countries, the available channels at 2.4 GHz are 1-13 and 1-14, and there are
three available non-overlapping channels.
The frequencies at 5 GHz vary according to countries and regions. They are mainly
distributed at 5.1-5.3 GHz, 5.4-5.7 GHz, and 5.8 GHz. Before planning the network,
determine the available frequencies.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If the terminals and APs are separated by blocks, consider the penetration loss and
the incidence angle of signals traversing the walls.
In the premise of meeting receiver sensitivity requirement, reserve certain link margin
in case of extra loss. If the reserved link margin is high, the wireless system has high
capability to overcome signal transmission loss, and communication quality is high.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Example:
ht
An office has 150 2.4 GHz terminals. The concurrent user rate is 60%. The
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
More and more companies choose mobile offices today. Existing network interfaces
cannot meet growth requirement of new employees, and adding network interfaces
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
will cause office reconstruction. In addition, wired network cannot meet mobile office
requirements. Wireless network remedies the defects of wired network.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ht
ur
ce
Signals must cover a large area for high density users. The half-open structure has a
few obstacles. The indoor settled system is recommended because of its high
capacity and easy installation.
2.4 GHz & 5 GHz dual frequency needs to be supported to increase bandwidth.
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
The half-open area has a few obstacles, so it is recommended to use fewer APs to
reduce signal interference. Less than 3 APs are recommended in a short distance.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
The building has five floors. Signal leaking may occur between floors. Therefore,
the signals of different floors must overlap.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Wireless network and wired network are connected seamlessly, and there is no
physical connection failures. Network access is convenient.
Wireless network is easy and fast to deploy. Network deployment has little impact on
hotel operation.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Signal coverage is the primary goal for a hotel. Before planning the wireless network,
check the hotel's decoration and wall material.
ht
s:
Indoor distributed AP has only one antenna output interface, and does not support
MIMO.
Mo
re
Le
ar
ni
ng
Re
so
ur
The wash rooms are close to corridors and separated by plasterboards or brick
walls.
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
corridors; however, signal strength is weakened. Due to the impact of obstacles and
decoration materials, signal strength in some corners may be weak.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A high-gain antenna provides weak signal strength for the areas under the antenna.
To cover a small area (< 500 meters), choose a low-gain antenna, which provides
ht
s:
When coverage area is small (< 300 meters) and coverage angle is larger than 120,
the omnidirectional antenna is recommended. When coverage area is large and
coverage angle is small, the directional antenna is recommended.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A high-gain antenna provides weak signal strength for the areas under the antenna.
To cover a small area (< 500 meters), choose a low-gain antenna, which provides
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
A wireless distribution system (WDS) connects two or more wired or wireless LANs
wirelessly to establish a large network.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Measure the backhaul distance using Google Earth or GPS tester, and measure the
distance on site.
Use 5 GHz for WDS backhaul, and 2.4 GHz for user access.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After measuring the coverage distance, calculate the gain using the distance longer
than that you measured. When selecting the antennas, consider the coverage
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Bandwidth requirement
Interference
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Compared with a wired LAN, WLAN has wide coverage and high mobility and is
easier to install and expand. However, it is difficult to deploy a WLAN.
Signal quality: The quality of wireless signals is determined by the distance between
terminals and the closest APs. It decreases as the distance increases.
so
ur
ce
s:
ht
ng
ni
Re
The WLAN Planner, as a auxiliary tool for wireless network planning, provides
functions of environment planning, AP deployment, network signal simulation, and
Le
ar
automatic report export, which helps technical engineers with network planning and
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Environment planning
AP deployment
ur
ce
s:
Report management
ni
re
Le
ar
Mo
ng
Re
so
as well as deploy APs manually and adjust coverage of the signals based
on the building drawing and coverage requirements.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
2.
Shortcut toolbar : Allow users to quickly create a project, open a project, and
calculate the number of APs.
3.
4.
Planning flow diagram : Provides flow diagram for using the WLAN Planner.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
1.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The number of APs that need to be deployed is automatically calculated based on the
actual area of the deployment environment, the number of concurrent users, and a
single user's bandwidth requirements.
The sales personnel use the WLAN Planner to preevaluate the number of APs,
modify the number as required, and make a business quotation based on users'
requirements on the coverage of wireless signals.
1.
ur
ce
s:
ht
so
3.
4.
Select the environment mode as required in the Environment type dialog box.
ni
ng
Re
2.
Le
ar
re
Mo
6.
Click OK.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
This topic describes how to configure the global attributes of the WLAN Planner.
Global Configuration:
ht
2.
3.
On the Basic Setting and Advanced Setting tab pages of the Configure page,
configure the global parameters.
4.
Click OK.
so
ur
ce
s:
1.
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The transit and receive capabilities of an AP are determined by the type of the AP.
Different types of antennas are different in transmit power and receive sensitivity.
ht
s:
Users can configure the type of the antennas in the Bind AP Antenna interface.
On the home page, click Configure. The Configure page is displayed.
2.
ur
so
On the Bind AP Antenna tab page, click Operate icon in the Operate list to
open the Bind Antenna interface.
Re
3.
ce
1.
NOTE: Antennas can only be bound to APs whose Built-in Antennas are
shown as No.
ng
Configure the 2.4G and 5G antenna type in the Bind Antenna interface.
5.
Click OK.
Mo
re
Le
ar
ni
4.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The WLAN Planner preconfigures five default types of switch devices: S2700-26TPPWR-EI, S2700-9TP-PWR-EI, S3700-26C-HI, S5700-28C-PWR-EI, and S5700-52CPWR-EI. These switch types cannot be deleted.
The WLAN Planner supports the function of planning and deploying the third-party
switches. Users can customize the switches type on the Preconfigured Switch page
and deploy the customized switch on the Routing and Power Supply tab page.
ur
ce
s:
ht
2.
Re
so
1.
On the Preconfigured Switch tab page, click . The New Switch Type page is
displayed.
4.
5.
Click OK.
Mo
re
Le
ar
ni
ng
3.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
WLAN signals are related to the blocking capacity of the obstacles. Different
obstacles have different blocking capacity. Users can customize the obstacle type on
the Preconfigured Obstacle page and draw different types of obstacles on the
ht
s:
drawing.
The WLAN Planner preconfigures ten default types of obstacles, such as wooden
doors, concrete, and glass windows. These obstacle types cannot be deleted.
Procedure:
so
ur
ce
ni
ng
Re
On the New Obstacle Type page, enter the parameters for customizing the
ar
obstacle.
Click OK.
Mo
re
Le
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Before technical engineers design the wireless network, make clear the users'
requirements on the wireless network planning, including requirements on frequency
band, bandwidth, signals, the number of users who are connected to the wireless
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
network, cabling, and services. Obtain basic information about the project, including
diagrams of building layout, weak current cabling, and strong current cabling. Plan the
WLAN network using the WLAN Planner, calculate the number and location of APs,
and export the planning reports to provide reference for the on-site implementation
engineers. this slide describes the detailed procedure.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Before you use the WLAN Planner to plan the WLAN network, you need to create a
project, select a country, and set the environment type first.
Create a project.
s:
ht
On the home page, click Create Project. The Create Project page is displayed.
2.
3.
ur
ce
1.
ni
4.
ng
Re
so
NOTE: Different countries or area use different wireless channels. Select the
corresponding country or region when creating a new project. In this way,
the WLAN Planer automatically filters out channels that cannot be used
in this country.
ar
Click OK.
Mo
re
Le
5.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After you create a project, you need to add a building and import the drawing, so that
you can set the environment type and deploy APs on the drawing to simulate the
WLAN network.
Procedure
On the home page of the WLAN planning project, select project nodes.
Enter the name and import the drawing and click OK.
ng
Create a floor: Right-click a building node and select Add New Floor. Set Floor
Number, Name, and Drawing, and click OK.
Update a drawing: Right-click the newly added building node and select Update
ni
Re
so
ur
ce
s:
ht
ar
Le
Mo
re
floors and import a drawing for each floor based on the number of drawings.
Set floor attributes: Right-click a floor node and select Property. Set Floor
Height, Floor Materials, 2.4G Attenuator, and 5G Attenuator, and click OK.
Adjust the floor sequence: Directly drag a floor node to adjust the floor
sequence.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
On the floor page, click Set Scale. The mouse status changes to .
2.
ur
ce
3.
s:
Enter the drawing scale interface and select the unit as required.
5.
Mo
re
Le
ar
ni
ng
Re
so
4.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The datum marks of all the floors must be on the same vertical line.
You can manually drag the datum marks of multiple floors to align them, to better
simulate actual environment among the floors.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
NOTE: Users can customize the obstacle type. For detailed procedure,
see Preconfiguring an Obstacle.
ce
s:
3.
Mo
re
Le
ar
ni
ng
Re
so
ur
2.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
s:
You can select the shapes of the coverage area, including polygon or
rectangular in the coverage area drawing toolbar.
5.
Re
ng
Select Property. The Coverage dialog box is displayed. Modify the attributes of
this coverage area.
Click Save.
re
Le
ar
7.
so
4.
6.
Mo
tp
:/
3.
ce
2.
On the home page of the WLAN planning project, click Environment Setting.
The Environment Setting page is displayed.
ur
1.
ht
ni
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On the home page of the WLAN planning project, click Environment Setting.
The Environment Setting page is displayed.
s:
1.
ht
2.
3.
ur
ce
so
5.
6.
7.
Click Save.
Mo
re
Le
ar
ni
ng
Re
4.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
1.
2.
ce
ur
so
Re
ng
ni
ar
Le
re
Mo
tp
ht
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Deploy manually.
1.
ht
Users can deploy APs manually based on the actual environment and
deployment experience. Users can perform operations such as adding APs,
s:
3.
4.
5.
6.
ng
Re
so
ur
ce
2.
Click Save.
Mo
re
Le
ar
7.
ni
attribute.
Deploy automatically.
aw
ei
.c
om
/e
1.
4.
After adjusting the location or attributes of APs, obstacles, and coverage areas,
users can click Channel Calculation to recalculate the AP signaling channels.
This step is optional.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
3.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Preview the coverage of wireless signals by signal simulation diagram and determine
whether it meets the designing requirements. This tool is available for Received Signal
Strength Indication (RSSI) simulation diagram, Signal to Interference plus Noise Ratio
(SINR) simulation diagram, physical layer throughput diagram, and application layer
throughput diagram.
ce
s:
ht
2.
3.
After adjusting the location or attributes of APs, obstacles, and coverage areas,
users can click Refresh Simulation to refresh the simulation graph. This step is
optional.
4.
Mo
re
Le
ar
ni
ng
Re
so
ur
1.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
On the home page of the WLAN planning project, click AP Deployment.
The AP Deployment page is displayed.
2.
3.
Configure the information about the simulation access point in the dialog
box.
4.
5.
Re
so
ur
ce
1.
ar
Le
re
Mo
tp
s:
ni
ht
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
After AP deployment is complete, deploy switches and connect APs and switches using
network cables to provide reference for implementation engineers.
Procedure:
ht
On the home page of the WLAN planning project, click Routing and Power Supply. The
Routing and Power Supply page is displayed.
2.
Deploy switches.
ur
ce
s:
1.
Re
so
Deploy ACs.
ar
ni
3.
Click Save.
ng
Le
NOTE: Click View Planned Resource on the toolbar at the bottom to view the APs
and switches deployed on the drawing.
re
4.
Mo
5.
Click and draw network cables on the drawing to connect APs, switches, and ACs.
NOTE: The WLAN Planner allows you to connect devices of different types only.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The WLAN Planner allows users to export detailed planning reports, AP lists, and
material lists to provide reference for implementation engineers.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
Click Generate WLAN Planning Report. The WLAN Planning Report dialog box
is displayed.
Select the planning map.
4.
5.
6.
7.
Click Generate
Re
so
ur
3.
ni
ar
Le
re
Mo
tp
s:
2.
On the home page of the WLAN planning project, click Import and Export. The
page for import and export is displayed.
ce
1.
ht
ng
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On the home page of the WLAN planning project, click Import and Export. The
page for import and export is displayed.
s:
ht
Click Export.
ce
Mo
re
Le
ar
ni
ng
Re
so
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On the home page of the WLAN planning project, click Import and Export. The
page for import and export is displayed.
s:
ht
Click Export Materiel Bill. The Materiel List dialog box is displayed.
Click Export.
ce
Mo
re
Le
ar
ni
ng
Re
so
ur
ht
tp
:/
/l
ea
rn
in
g.
hu
aw
ei
.c
om
/e
Course name
Environment planning
AP deployment
ur
ce
s:
Report management
ni
ng
Re
so
as well as deploy APs manually and adjust coverage of the signals based
on the building drawing and coverage requirements.
Mo
re
Le
ar
x-33
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Any customer:
ht
s:
Any service:
ar
ng
so
Re
ur
Any device:
ni
ce
Le
re
Mo
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
s:
ce
ur
so
Re
ng
ni
ar
Le
re
Mo
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
eSight employs the browser/server (B/S) architecture. It can only be installed on the
server, and a client can access eSight through the browser supported by the client's
operating system.
Server environment:
ce
ur
The server of the compact edition runs on the Windows 7 operating system,
and its database is MySQL 5.5.
The server of the standard edition runs on the Windows 2008 Server platform,
and its databases are MySQL 5.5 and SQL Server 2008.
The server of the professional edition can run either on the Linux operating
system or the Windows 2008 Server platform. When running on the Linux
operating system, the server database is Oracle 11g; when running on the
Windows 2008 Server platform, the server databases are MySQL 5.5 and SQL
Server 2008.
Client environment:
Mo
re
Le
ar
ni
so
Re
ng
s:
ht
The client can only determine the browser version and device memory. The
supported browser versions are IE 8.0 and Firefox 3.6, and the device memory
must be no less than 1 GB.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Originally it takes 100 minutes to enable services on 100 APs. With this
s:
ur
ce
Re
ar
ng
Location view
ni
so
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
eSight automatically searches for AC and LSW and adds the found ones to eSight.
Use the intelligent configuration tool to configure the network connectivity between
ht
s:
eSight and the AC and LSW so that eSight can deliver services to and implement
management on them.
Set basic AC information.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
so
Re
ur
ar
ng
ce
s:
ni
WLAN User Statistics: Displays the trend chart of WLAN online users in a
specified period.
Le
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Rogue Devices And Rogue Clients Statistics: Displays Rogue Devices And Rogue
Clients Statistics.
Channel Utilization Trend: Displays the trend chart of WLAN channel utilization in a
specified period.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
ce
ur
so
When a hardware fault occurs on an AP, you can quickly replace this AP
through eSight.
The services configured do not change after the AP is replaced.
Re
Ping the IP address of an uplink device from an AP to check the AP's service
uplink status.
Ping an AP from the AC to check the link connectivity between the AP and AC.
ar
When the configurations of APs are incorrect, you can restore these APs to
factory settings in batches.
Replace an AP.
s:
After APs are upgraded online, you can remotely restart these APs in batches.
ng
tp
:/
Only Huawei WLAN devices support all these operations. APs here refer to Fit APs
re
Le
Mo
ht
Restart APs.
ni
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On the Add Device page, set basic information of the WLAN device to be added, the
SNMP parameters, and the information about the subnet that the device is to be
ht
added to.
On the Auto Discovery page, set the network segment discovery parameters, SNMP
parameter, and the information about the subnet that the device is to be added to.
On the Import Device page, download the template, enter the information about
ce
s:
so
ng
Re
Mo
re
Le
ar
ni
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ICMP can also be used to discover and add devices, but SNMP is preferred for
unified device management.
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Procedure
ce
Prerequisites:
ur
Re
so
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
When Forwarding type is set to AP, the AP forwards user data in the
forwarding mode set when APs are created.
The Country Code parameter identifies the country in which the radio
frequency is located. This parameter specifies RF features, such as power,
channel value, and total number of channels that can be used for frame
transmission. Before configuring the device for the first time, you must
configure the country code.
ng
Re
so
s:
When Forwarding type is set to ESS, the AP forwards user data in the
forwarding mode set in the bound ESS profile.
ce
ht
ur
Mo
re
Le
ar
ni
changed.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Click Add AP, select required APs, and click OK. Then click Next.
Note: You can add APs in either of the following two ways:
Choose Add AP > Batch Import, and import an AP plan sheet to create APs
in batches
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Configure profiles:
ht
Click Add and create an ESS profile. The configuration is shown in the next
slide.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
Click Next.
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If an AP is added to the whitelist, the AP automatically enters the running status when
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
getting online. If an AP is not in the whitelist, the AP enters the running status only
after manual confirmation.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
tp
:/
Any customer:
s:
ce
tools.
so
Any device:
Re
ht
ur
Any service:
Mo
re
Le
ar
ni
ng
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Including:
Wireless Resource Statistics on the Network: Displays numbers of ACs and APs
(online and total) deployed on the network.
ur
ce
s:
ht
TopN AP Air Interface Usage: Displays TopN air interface usage of APs (traffic, usage
Re
so
WLAN User Statistics: Displays the trend chart of WLAN online users in a specified
ni
ng
TopN Region Statistics: Displays region statistics (number of APs, access AP users,
STA connections).
Le
ar
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Rogue Devices And Rogue Clients Statistics: Displays Rogue Devices And Rogue
Clients Statistics.
Channel Utilization Trend: Displays the trend chart of WLAN channel utilization in a
specified period.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Allow users to view information about AC basics, APs managed by the AC, regions,
alarms, and online user statistics.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
On the Fit AP tab page, click the AP name to check the AP parameter settings.
Mo
re
Le
ar
ni
ng
Re
so
ur
s:
ht
After an AP is connected to a WLAN, you can query information about all the APs
managed by eSight.
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Direct forwarding: The AP sends the original packets without any change on
them.
s:
Region is a logical concept. You can group multiple APs into one region.
Regions are planned based on the actual deployment.
so
ur
2. AP Region
Re
ce
4. Frequency Bandwidth
Le
ar
ni
ng
To avoid interference of neighboring APs, you must set the neighboring APs'
Mo
re
When the frequency band is 20 MHz, the transmission rate is low but multiple
channels are provided for selection, effectively reducing the interference.
5. Channel Value
Setting rule:
ea
Note: In a radio profile bound to an AP, if Channel Mode is set to Manual, set
Operating Channel Value to the same value as that of Channel Value; if
Channel Mode is set to Automatic, the value of Channel Value is allocated
ht
tp
:/
/l
rn
in
20 MHz: 1-13
40 MHz-minus: 5-11
40 MHz-plus: 1-7
g.
hu
aw
ei
.c
om
/e
by eSight.
Note: The operating power determines whether the signal coverage can
be displayed in the location topology.
The value 0 indicates full power. The power depends on the AP type. A
Re
so
ur
s:
7. Operating Power
ce
9. Available Antennas
The number of available antennas must be no more than the number of actual
antennas.
ar
ni
ng
Mo
re
Le
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can browse information about all STAs on the live network.
STA is short for station, referring to terminals such as a desktop with a wireless
ht
s:
Click Synchronize to browse information about all STAs on the live network.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
1. Monitor the signal quality of terminal users in a trend graph in real time.
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
SSIDs are used to divide a WLAN into subnets, each of which requires a specific
identity for authentication. Only the users who have passed identity authentication can
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
access the corresponding subnet. In that way, unauthorized users cannot access the
WLAN.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can check logical relationships between ACs, APs, rogue APs, and STAs in the
service topology.
ht
ce
ur
so
Ping: checks the connectivity between two network devices by pinging each
device on an AP.
Re
s:
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
eSight allows you to test the connectivity between an AP and an AC and between two
APs.
Prerequisites
The Telnet parameters have been correctly configured for the AC.
Background Information
Re
so
ce
s:
ur
ht
Tracert is used to discover the routes that packets pass when traveling from
Le
When a fault is detected on a network using the ping function, use the tracert
function to locate the fault.
ar
ni
ng
the source host to the destination host. Use the tracert function to locate a
network fault.
Mo
re
The AP ping function takes effect only when the AP works properly.
You can ping the AP from the AC to check the tunnel connectivity
between the AP and AC.
Procedure
g.
hu
2. In the navigation tree on the left, choose WLAN Topology > Service
Topology.
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
Mo
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
s:
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
You can create a location topology view and add APs to the location topology view
based on the WLAN management requirements. In the location topology, you can
ht
s:
view the current signal coverage scope and current device status, and simulate actual
networks to facilitate daily maintenance.
Right-click in the location topology, and choose Add Location. In the dialog box that is
displayed, set Layer 1 subnet name, and click OK.
NOTE:
ur
so
Mo
re
Le
ar
ni
ng
A location topology view may support multiple layers of sub location topology
views. A maximum of nine sub layers are supported.
Re
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Double-click the new location icon, and click Set Background on the shortcut icon bar.
In the dialog box that is displayed, select Select image, and select a proper image of
ht
An image can be in GIF, JPG, JPEG, or PNG format. The image size cannot exceed 2
MB.
1. Add Region: Add a location based on the physical location of a device in the live
network to display the device layer relationship in the location topology.
Re
so
ur
ce
s:
ng
preset the AP transmit power, and display WLAN deployment effect in graphics.
3. Add AP: Add an AP that is managed by eSight to the topology.
4. Display Signal Coverage: The signal coverage scope can be displayed in any of
the following modes: by signal strength, by rate, and by channel. The signal coverage
ar
ni
Le
scope displayed is determined by the operating power in the radio profile. If the signal
coverage scope is not displayed properly, check the operating power in the radio
re
profile.
Mo
Ensuring that the location topology view is consistent with the real network layout.
ar
ni
ng
Re
so
ur
ce
s:
ht
tp
:/
/l
ea
rn
in
g.
hu
Le
re
Mo
6. Set Scale: Set the scale based on the actual network layout size to map the
network layout to the location topology.
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Restore APs to factory settings: When the configurations of APs are incorrect,
s:
Replace an AP: When a hardware fault occurs on an AP, replace the AP. This
method can relieve you from reconfiguring data for the faulty AP.
Mo
re
Le
ar
ni
ng
Re
so
ur
Restart APs: After APs are upgraded online, restart these APs in batches.
ce
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The main content of this slide: The first part introduces the WLAN troubleshooting
methods. The second part introduces common diagnostic commands and tools for
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Management block: APs are classified into Fat APs and Fit APs. A Fat AP can
manage itself independently, while Fit APs are uniformly managed by an AC.
Service block: This part includes service VLAN configurations and wireless services.
Wired block: This block includes the connection between APs and switches,
connection between access switches and aggregation switches, connection between
ur
ce
s:
ht
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Check the segment between a terminal and an AP. The terminal includes laptops,
tablet computers, and Wi-Fi-supported mobile phones. You must check the terminal
ht
Check the segment between an AP and a switch, including the AP hardware and PoE
power supply.
Check the segment between a switch and an AC, including the switch, hardware
ce
s:
so
For example, in areas where users can only access the Wi-Fi network at a low rate,
troubleshooting can be implemented from the terminal. First, check whether the low
Re
ur
access rate is caused by the terminal. Then, check whether there is a fault on the AP.
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The replacement troubleshooting method can quickly locate a fault and find proper
s:
ce
AP: Fit APs can start with no configurations, and it is convenient to replace
them. When Fat APs are replaced, you need to configure them again.
Network cable: When the cable on a specified network segment is suspected
to be faulty, replace the network cable for testing.
Mo
re
Le
ar
ni
ng
Re
STA: If there are several terminals, replace them with other terminals of the
same type or different types.
ur
so
ht
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Trace command:
This diagnostic program sends packets with different TTL (time to live)
ur
s:
ht
Common commands for network diagnosis also include the trace command and
debug command.
ce
Debug command:
Re
so
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Packet statistics include the number of packets sent and Response packets received,
percentage of packets that receive no response, and minimum, maximum and
average response time.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
displayed in the output. Otherwise, the number of bytes, the sequence number, TTL,
and response time of the Response message are displayed.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The common display commands help to query and display information about device
ht
ce
s:
current system.
ur
Mo
re
Le
ar
ni
ng
Re
so
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Display information about APs, including AP ID, AP Type, AP MAC, Profile ID,
s:
Region ID, and AP State. Information about one AP is displayed in one line.
ce
ur
so
Re
ng
Run the display ap all command to display IP address, MAC address, expired (M),
ni
D-0
GE0/0/1
ar
These items are the IP address, MAC address, remaining lifetime (in minutes), entry
type and slot number on which obtains the entry, type and number of interface that
Le
Mo
re
learns the entry, and name of VPN instance to which the ARP entry belongs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
ht
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
also the developer of the Wi-Spy spectrum analysis program. It is a common signal
inSSIDer can display the change of signal strength in the time axis and the distribution
ce
s:
of signal strength in each AP channel by figure. This tool can also filter AP information
ur
based on the frequency band, channel ID, signal strength and encryption mode of
For situations where a large number of APs need to be managed, the inSSIDer tool
also supports GPS functions, to locate the positions of APs in Google Maps.
Mo
re
Le
ar
ni
ng
Re
so
APs.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Column 5: vendor
so
ur
ce
s:
ng
ni
Column 11: latitude; Column12: longitude. (When the GPS function is enabled,
you can determine the AP location according to the latitude and longitude.)
Le
ar
Re
Remarks: Ensure that the wireless network adapter and the driver are installed
Mo
re
before using inSSIDer, and the wireless network adapter should be enabled.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
This figure shows the change of signal strength at different times. Different
This figure shows the signals and strengths of different channels, and also the
channel bandwidth. You can click the corresponding icon to select the 2.4 GHz
ur
s:
ce
Mo
re
Le
ar
ni
ng
Re
so
or 5 GHz channel.
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Check the services on terminals --> check the received signal strength -->
ce
Mo
re
Le
ar
ni
ng
Re
so
ur
s:
check the AP --> check the wired network devices --> check the AC --> check
the uplink devices
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Ask the users about the fault symptoms and reproduce the faults.
ce
s:
so
ur
ht
Re
Check whether the specific services such as voice service and video service
are normal.
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Scan the surrounding signals with common network diagnostic tools, such as
ht
inSSIDer. Analyze the influences of various signal strengths on the local signal. In
s:
general, RSSI in major coverage areas ranges from -40 dBm to -65 dBm; RSSI in
ce
edge areas should be larger than -75 dBm; co-channel interference should be smaller
than -80 dBm.
Through network diagnostic tools, the local signal strength and the strength of other
ur
Re
so
signals in the same channel can be detected. Weak local signal strength is usually
caused by the poor wireless environment. When a large number of other signals with
strong signal strength co-exist in the channel, change a signal channel. For example,
channels with less signal interferences, such as channel 1, channel 6, or channel 11,
Mo
re
Le
ar
ni
ng
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The appearances differ for APs of various types. However all APs have the radio
ht
s:
ce
blinks, data is transmitted or the device is started. If the indicator is off, the
related functions are disabled.
After logging in to an AC, you can check the status of an AP by running the display
command. For example, you can run the display ap all command to check the
so
ur
Mo
re
Le
ar
ni
ng
Re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Log in to the switch through the console port to check whether the switch is correctly
ht
configured.
s:
Check the network status to see whether broadcast storms or packet attacks occur.
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
ce
s:
Different devices support different authentication and encryption modes. Check whether
the AC supports the configured authentication and encryption modes.
Check whether services are correctly configured on the AC.
country code
source interface
Re
so
Mo
re
Le
ar
ng
ni
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
If the AC and its downlink devices all work properly, check the AC uplink devices. First,
check whether the hardware is damaged. Then, check whether the router is correctly
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
configured.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
Mo
re
Le
ar
ni
ng
Re
so
ur
ce
s:
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
During the installation of antennas (especially outdoor antennas), carry out operations
strictly confirming to the regulations. Ensure strong signal strength first, and take
ht
s:
For example, the two antennas on the same AP should be installed at a proper
distance according to the regulations. Otherwise, it may result in saturated received
signals and severe interferences. As is shown in the left figure, the two antennas
should be installed at a larger distance.
so
When the antennas are installed in the vertical direction, the distance between
antennas should be around one meter. When the antennas are installed in the
horizontal direction, the distance between antennas should be around two
Mo
re
Le
ar
ni
ng
meters.
Re
ur
ce
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
Note: If the power supply indicator (PWR) is off during the routine maintenance of AP,
the AP is powered off or the power supply (by the PoE switch or the power adapter) is
ht
abnormal.
The indicators on APs produced by different vendors vary from each other slightly.
For APs of different types, the number of indicators and their locations are not the
ce
s:
Mo
re
Le
ar
ni
ng
Re
so
ur
same.
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
First, check whether the terminal is working properly (the wireless adapter is enabled
or not).
Second, check whether the surrounding wireless signals are normal. By using
network diagnostic tools (for example, inSSIDer), you can check the status of the
current signals and other signal interference sources, such as a microwave oven.
Third, check whether the password is valid and correct. If the password is incorrect,
ce
s:
ht
so
Forth, check whether the certificate is correctly installed for users who adopt dot1x
authentication.
Mo
re
Le
ar
ni
ng
Re
ur
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
The AP is faulty.
ht
Check whether the PWR indicators and network cable indicators are blinking
If the AP does not have an IP address, configure the DHCP server to assign
ur
so
ce
s:
normally.
Re
ng
configurations.
If the AP fails to be authenticated, add the AP to the whitelist.
Check whether the number of APs connected to the AC reaches the upper limit.
ni
If the number of connected APs reaches the upper limit, apply for and load an
Le
ar
AP license.
Check whether the MAC address or SN of the AP conflicts with that of another AP.
Mo
re
n
aw
ei
.c
om
/e
g.
hu
in
rn
ea
/l
:/
tp
ht
s:
Which command can be used to check the status of all APs on an AC?
Run the display ap all command to display the status of all APs.
Mo
re
Le
ar
ni
ng
Re
so
ce
ur
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
g.
hu
in
aw
ei
.c
om
/e
re
Mo
ni
ar
Le
ng
ur
so
Re
s:
ce
ht
tp
ea
/l
:/
rn
in
g.
hu
aw
ei
.c
om
/e