Home > Articles > Cisco > CCNA Routing and Switching

This chapter is from the book

Wireless Implementation Guidelines


  • Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
  • Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point

Now that you've read an overview of the wireless security considerations, let's talk about planning to implement wireless technology. There's much more to planning a wireless LAN deployment than putting a few wireless access points in place. You need to understand how the topology, distance, and placement of wireless access points can affect the efficiency of your wireless LAN.

Understanding Wireless Topologies

Webster's Dictionary defines "topology" as a branch of mathematics concerned with properties of geometric configurations (such as point sets) that are unaltered by elastic deformations (as stretching or twisting) that are homeomorphisms. The CCENT and CCNA exams stop short of requiring a full understanding of homeomorphism (or elastic deformation, for that matter). However, the exams do require you to have some knowledge of the placement of wireless access points in your corporate network. The first piece to understand is that anyone can deploy a wireless network in one of two forms: ad hoc or infrastructure.

Ad hoc wireless networks technically use an Independent Basic Service Set (IBSS) topology. This means that each wireless device independently manages the wireless network. This type of wireless network originates from and includes the wireless device, as shown in Figure 18.3.

Figure 18.3

Figure 18.3 Ad hoc wireless networking.

This type of network can be created by users on-the-fly to share files or services with others. For example, someone on an airplane might want to share a folder of files with the person next to her. She can create an ad hoc wireless network and allow the other person to join and access the shared files over a network connection.

Ad hoc networks typically are very limited in range and security capabilities. You may want to consider restricting laptops in your corporation from starting ad hoc wireless networks, because they could be considered a potential security vulnerability.

Infrastructure wireless networks are a far more common topology. This involves using a dedicated piece of equipment (typically a wireless access point) to initiate and manage the wireless network. Wireless access points can be configured to use one of two infrastructure modes: Basic Service Set (BSS) or Extended Service Set (ESS). The BSS is the simplest form of wireless network. It includes a single wireless access point managing a group of clients, as shown in Figure 18.4.

Figure 18.4

Figure 18.4 A single basic service set design.

An ESS is a wireless topology (note the word change from "network" to "topology") that includes two or more wireless access points providing extended wireless coverage across the network, as shown in Figure 18.5.

Figure 18.5

Figure 18.5 An extended service set design.

In Figure 18.5, notice that the wireless coverage overlaps. Wireless best practices state that you should have a 10 to 15% overlap in your wireless coverage. This allows you to implement seamless roaming, allowing a wireless client to move between access points with no service interruption. This is not as critical for data clients, such as laptops. Rather, real-time wireless clients such as 802.11-compatible cell phones, cordless VoIP phones, and some PDAs benefit from the overlapping coverage. Imagine dropping a phone call anytime you moved more than 300 feet in the network! More steps are involved in implementing seamless wireless roaming, but the 10 to 15% overlapping coverage is the starting point.

The second thing to notice in Figure 18.5 is that the channels are different on the two wireless access points. One of the wireless access points uses Channel 11, and the other uses Channel 6. This prevents the two wireless access points from interfering with each other. This channel concept is more fully discussed in Chapter 17, "Understanding Wireless Networking."

Understanding Wireless Data Rates

So you purchased a new 802.11g wireless access point and implemented it with clients running 802.11g cards. 54Mbps of pure wireless speed—right? Wrong! You may have purchased an access point capable of handling 54Mbps, but you will never reach that speed. Never! Repeated performance tests have revealed that actual data rates are about half of the theoretical data rate, on average. This means that your 802.11b access point typically averages about a 5Mbps actual data rate. 802.11g usually is in the 20Mbps range. You might be wondering why the standard says that you can handle 54Mbps when the actual throughput is much less. Well, there are many reasons.

Suppose you travel to the moon in an oxygen-free environment. You carry a single wireless access point and a single wireless card plugged into a single solar-powered laptop that does nothing but run the wireless card (no Bluetooth, no electrical interference). You sit with the wireless access point about 2 feet from the laptop and only send or receive data (never both). You might get close to the 54Mbps capability. But even that is stretching it. When you move from the world of cables into the world of wireless, you open yourself to an entirely different style of communication. One of the first considerations that you'll notice is the truth behind the range of the access point. Yes, in an obstruction-free environment, the 802.11b/g wireless signal can travel 300 feet. But couple that fact with the idea that higher data rates (11Mbps for 802.11b and 54Mbps for 802.11g) require stronger signals. You'll find that the data rates step down the farther you go from the access point. The following steps are defined for each standard:

  • 802.11a and 802.11g:
    • Step 1: 54Mbps
    • Step 2: 48Mbps
    • Step 3: 36Mbps
    • Step 4: 24Mbps
    • Step 5: 18Mbps
    • Step 6: 12Mbps
    • Step 7: 9Mbps
    • Step 8: 6Mbps
  • 802.11b:
    • Step 1: 11Mbps
    • Step 2: 5.5Mbps
    • Step 3: 2Mbps
    • Step 4: 1Mbps

So, when you picture wireless data rates coming from your wireless access point, think of them as a radial circle for each rate, with the rates continually decreasing the farther you go. This is represented in Figure 18.6.

Figure 18.6

Figure 18.6 Wireless data rates.

You'll notice that no exact measurement is attached to each of the radial circles dictating speed around the wireless access point. That's because range is not the only criterion to consider when determining wireless data throughput. From Chapter 17, you'll remember that wireless shares the unlicensed FCC frequency bands with many other pieces of equipment. Bluetooth, other 802.11 wireless clients, cordless phones, and microwave ovens are just a few that can cause interference. Couple that with typical obstructions such as walls, cubicles, desks, and so on, and you have a wireless signal that varies from business environment to business environment. It is impossible to say just how far and "clean" the signal will be in your specific environment. Many companies make testing equipment that displays the signal strength and data rate to a laptop or PDA screen. This gives you a good idea of how wireless will fare in your environment.

The saving grace of wireless data rates is the fact that most users will not notice. Most devices that use a wireless signal are used for lower-bandwidth communication. For example, a wireless VoIP phone consumes about 100Kbps of bandwidth. Laptops used in wireless environments typically surf the net or check email. Most devices that handle large data file transfers or other high-bandwidth communication typically are hardwired.

General Wireless Implementation Steps

With all those considerations floating around your mind, here are the general steps to implement wireless:

  1. Ensure hardwired operation: Before adding any wireless to the network, connect a device (such as a laptop) to the same switch port where you plan to connect your wireless access point. Ensure that it operates as expected, verifying VLAN assignment, DHCP operation, and Internet connectivity (if applicable).
  2. Install the wireless access point in your tested switch port: Some access points will connect using straight-through Ethernet cabling, and others may require a cross-over cable.
  3. Configure a basic wireless network and test: Keep this initial test extremely simple. Just implement a wireless SSID with no security. After it is configured, join the wireless network from a client, and test your connectivity. Ensure that the client obtains an IP address and can perform the same actions as when you use a hardwired connection.
  4. Add wireless security and test: Implement the wireless security standard chosen for your network. It's usually best to begin with a preshared key system of security to keep it simple. After you have added the security, reconfigure the wireless client, and test again.

Working through these four steps, you have established a baseline for your wireless network. As you add more features or security standards on top of the existing foundation, you can return to a "last known good" configuration if something goes wrong.

Wireless Troubleshooting


  • Identify common issues with implementing wireless networks.

Wireless troubleshooting is far more complex than typical wired troubleshooting. Physical problems are much more elusive, because they deal primarily with interference rather than a simple cable break or failing switch port. For example, I recently deployed in a business a wireless network that worked great until 4 in the afternoon. As soon as we crossed the 4 p.m. barrier, all wireless connectivity was lost. After doing some spectrum analysis, we found that a nearby airport was using a device (we still aren't sure what it was) that completely flooded the 2.4GHz frequency range. The company decided to move to 802.11a (which was a fairly large network upgrade) to avoid this interference.

Likewise, wireless technology is fairly new to the industry. You may find that firmware for your access point has bugs and needs to be upgraded to a newer version to avoid persistent crashing (this happens far more often than you may realize). The following wireless troubleshooting checklist may be helpful as you attempt to diagnose the issue.

Client Troubleshooting

Most wireless issues are related to the client:

  • Verify that the wireless card is enabled: Most new laptops have a button or switch that disables the wireless card to save battery life.
  • Move to a "known good" region of the building: Do your testing in an area known to have a strong wireless signal. This may require using multiple wireless devices.
  • Verify that the client can identify the wireless network using the installed wireless utility: If you are unable to identify wireless SSID(s) in your vicinity, the client's wireless card may be disabled, or the wireless access point may not be working.
  • Ensure that the wireless client has the correct wireless security information and supports your security standards: You may need to re-enter the preshared key to ensure that you entered it correctly. Likewise, the wireless card may not support the wireless security on your network. Try connecting to an SSID that does not use security from the wireless device.

Wireless Access Point Troubleshooting

Most troubleshooting that deals with the wireless access point focuses on physical considerations:

  • Verify that the wireless access point is running the latest firmware version: Nothing is worse than spending hours on a problem that is related to a bug in the wireless firmware.
  • Test the wireless reception radius at different times of the day: Because of the varying degrees of interference that may occur over time, it is best to run multiple tests on your signal strength. You can do this simply and inexpensively by carrying around a laptop and observing the reception at differing locations.
  • Verify your wireless channel configuration: If you have multiple wireless access points or are in an area where other access points may interfere, verify (using wireless software) the most saturated and unsaturated channels. For 802.11b/g, use channels 1, 6, or 11 in the U.S. For 802.11a, many more channels are available, and you should test for the cleanest frequency.
  • Consider the materials around and close to the access point: Try to avoid installing the access point near metal objects, which reflect the signal. Realize that a concrete block wall will absorb much more signal than a drywall barrier.

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020