ORSYS formation
CONTACT - +33 (0)1 49 07 73 73
CONTACT - 📞 +33 (0)1 49 07 73 73    drapeau francais   drapeau anglais

Consult our trainings :

Wireless networks Training

Duration : 3 days
Ref : RSW
Price  2021 : Contact us
  • Program
  • Participants / Prerequisite
  • Intra/Tailored

The domain of wireless networks grows rapidly with newer standards. Those networks allows us to inter-connect corporates equipements transmitting voice, data, images. They are also the baseline for telcos « hot spots ». The IEEE 802.11 (Wi-Fi and all its variants), Bluetooth, UWB, ZigBee, IEEE 802.16, WiMAX, WiRAN, etc..will be described in depth during this seminar and their applications that can be used. The last day of this seminar will put the stress on the key topic of the wireless security to cover its aspects.


Principles of wireless networks

  • Introduction to wireless networks.
  • Fixed networks vs Wireless networks. Different generations.
  • WPAN, WLAN, WMAN, WRAN networks.
  • Caracteristics and theoretical performances.
  • Handover and integration of the different solutions.
  • Wireless networks for businesses.
  • Troughputs needed. Available applications. Home, Office and Business networks.
  • ISP Wi-Fi « Hot spots ».
  • Wi-Fi. Advantages of wireless technologies.
  • The Wi-Fi issues for ISPs.
  • Handovers.
  • Mobility issues. Different types of handovers.
  • Integration within mobile networks.

Bluetooth, UWB, ZigBee and IEEE 802.15 networks.

  • The IEEE 802.15 standard, the UWB, ZigBee and Bluetooth technologies.
  • The 802.15.1 standard and bluetooth.
  • IEEE 802.15.3. Very high trhoughput technology UWB.
  • Wimedia consortium and WUSB.
  • IEEE 802.15.4 and ZigBee products.
  • Personal networks technologies.

Personal networks technologies

  • WiFi (IEEE 802.11b/g).
  • A massive success. Specifications.
  • Wi-Fi devices : cards and access points.
  • MAC layer : CSMA/CA. Frequency bands.
  • Ethernet integration. Trhoughputs and performances.
  • Medium Access technologies.
  • Quality of Service and IEEE 802.11e.
  • Voice encoding and audio « streams ».
  • Wireless controlers and switches.
  • Wi-Fi engineering and managment.
  • Future of IEEE 802.11b with 802.11n and MIMO.
  • Deployment of a Wi-Fi network.
  • Constraints. Devices. Cost. Configuration.

Mesh-networks and ad-hoc networks

  • Definition of a mesh-network and ad-hoc network.
  • Mesh-networks routing.
  • Different routing protocols : pro-actives (OLSR, DSDV) and reactives (AODV, DSR).
  • Security and QoS in ad-hoc networks.

IEEE 802.16 standard and IEEE 802.16 standard

  • Definition of the Wireless Local Lopp and WDSL access (Wireless DSL).
  • WDSL vs fixed networks.
  • Technologies and frequencies available.
  • WiMAX. Theoretical performances.
  • IEEE 802.16 standard. Mobile WiMAX.

The other solutions

  • The new genration of regional wireless networks.
  • Usage of the UHF/VHF bands and IEEE 802.22.
  • Cognitive radio. Interactive radio.
  • A unified network with wireless networks.
  • IEEE 802.21 and the vertical handover.
  • Continuity of service and a wireless Internet.

Protocols and applications of wireless networks

  • The IP environment. The slow-start and buffer-bloat issues.
  • MIMO technologies and the increase of the trhoughput.
  • Home networks : UPnP and DLNA.
  • Applications : voice, production, P2P...
  • Pervasive Internet
  • Developments. Internet city. Integration with the new IP generation.
  • Sensors networks. Dust networks.

3G vs WLAN

  • 3GPP/3GPP2 vs Wi-xx.
  • Comparison with UMTS.
  • Fourth generation of mobile networks and UMA/IMS integration.

Wi-Fi security

  • Weaknesses by design of wireless networks.
  • Protection against Denial of Service possible ? How to control the radio coverage ?
  • SSID and security issue.
  • Attacks : Man-in-the-middle, ARP spoofing.
  • Weaknesses of the authentication solutions.
  • Elementary techniques based on SSID and MAC filtering.
  • Interests and limits. Risks of the beacon frame usage and ssid probe request.
  • Example of attacks : SSID brute forcing....
  • Wired Equivalent Privacy – WEP
  • Features. Key exchange. Authentication and encryption. Popular attacks. Demonstrations.
  • WiFi Protected Access – WPA. Features. Advantages of WPA over WEP.
  • Extensible Authentication Protocol – EAP. Temporal Key Integrity Protocol – TKIP.
  • Message Integrity Check – MIC. WPA v2 and the 802.11i standard.

ILAN and WAN interconnexion

  • Radio coverage control.
  • Network separaton.
  • Firewall and DMZ.
  • End-user device protection.
  • Mobile users, VPN and wireless networks.
Participants / Prerequisite

» Participants

This seminar is intended for IT professionals and network engineers wishing to specialize in cellular networks, mobile networks.

» Prerequisite

Strong knowledge in corporate networks administrations.

Contact Informations

By checking this box, I certify that I have read and accepted the conditions for the use of my data regarding the General Data Protection Regulation (GDPR).
You can at any time modify the use of your data and exercise your rights by sending an email to rgpd@orsys.fr
By checking this box, I agree to receive commercial and promotional communications from ORSYS Training*. You can unsubscribe at any time by using the link included in our communications.

Book your place

Submit your request

Time schedule

Generally, courses take place from 9:00 to 12:30 and from 14:00 to 17:30.
However, on the first day attendees are welcomed from 8:45, and there is a presentation of the session between 9:15 and 9:30.
The course itself begins at 9:30. For the 4- or 5-day hands-on courses, the sessions finish at 15:30 on the last day
linkedin orsys
twitter orsys
it! orsys
instagram orsys
pinterest orsys
facebook orsys
youtube orsys