Overview of Wireless Network Technologies
Overview of Wireless Network Technologies
• Wireless Local Area Networks (WLANs) use 2.4 GHz and 5 GHz frequency bands.
• Wireless Metropolitan Area Networks (WMANs) are mainly used for backbone network
coverage.
▫ Frequencies must be applied before the WMAN is used. Public frequencies are
acceptable but vulnerable to interference.
• In 1999, several visionary companies formed the Wireless Ethernet Compatibility Alliance
(WECA), a global nonprofit association that aims to deliver the best user experience with
a new wireless network technology, regardless of brand. In 2000, the WECA adopted the
term "Wi-Fi" as its proprietary name for its technical work and announced its official name:
Wi-Fi Alliance.
• Wi-Fi products are rigorously tested by independent Authorized Test Laboratories of the
Wi-Fi Alliance. When a product successfully passes testing, the manufacturer or vendor is
granted the right to use the Wi-Fi logo, Wi-Fi CERTIFIED logo, and related trademarks.
The Wi-Fi Alliance uses the term "Wi-Fi CERTIFIED" to refer to these certified products.
Certification means that a product has been tested in numerous configurations with a
diverse sampling of other devices to validate interoperability with other Wi-Fi CERTIFIED
equipment operating in the same frequency band.
• Wireless networks adopt wireless network technologies defined by IEEE. When IEEE
officially defined the 802.11 standard in 1999, it selected and determined that the wireless
network technology invented by CSIRO is the best one in the world. Therefore, the
wireless network technology standard of CSIRO became the core technical standard of
Wi-Fi in 2010.
• The initial use of wireless networks can be traced back to World War II, when the U.S.
Army used radio signals for data transmission. They developed a radio transmission
technology, used together with a fairly high-intensity encryption technology, which was
widely used by the U.S. and Allied forces. They may not have thought that this radio
transmission technology would change our lives today.
• Many scholars took inspiration from this, and in 1971, researchers at the University of
Hawaii created the first radio communications network based on encapsulation
technology. This network, known as AlohaNet, is a fairly early WLAN. It consists of seven
computers that span four Hawaiian islands in a two-way star topology, with the central
computer on Oahu. Since then, wireless networks have been born.
• In 1990, the IEEE officially initiated the IEEE 802.11 project, and wireless network
technologies gradually became mature. Since the birth of the IEEE 802.11 (Wi-Fi)
standard, there have been 802.11a, 802.11b, 802.11g, 802.11e, 802.11f, 802.11h,
802.11i, 802.11j, 802.11n, 802.11ac, and 802.11ax. 802.11ax (Wi-Fi 6) has been
designed and launched to deliver high-speed, high-quality WLAN services for users.
• In 1993, AT&T released the 2.4 GHz WaveLAN, which provides a rate of 2 Mbps, and
completed the first large-scale installation of WaveLAN at Carnegie Mellon University. In
the same year, IEEE 802.11 selected the basis of the MAC protocol from the NCR,
Symbol Technologies, and Xircom proposals.
• Wi-Fi is based on the IEEE 802.11 standard. In 2018, the Wi-Fi Alliance launched the
"Generational Wi-Fi" marketing program. Based on major Wi-Fi technology (PHY)
versions, the Wi-Fi Alliance introduced consumer-friendly Wi-Fi generation names
(formatted as "Wi-Fi" followed by an integer) and encouraged people to use these Wi-Fi
generation names in industry terminology. Generation names do not affect the previous
certification program names. For previous certification programs (such as Wi-Fi
CERTIFIED ac or earlier programs), the original certification program names continue to
be used. Wi-Fi Alliance has not assigned new names to Wi-Fi generations prior to Wi-Fi 4.
• Wi-Fi 5 cannot meet the requirements of low service latency and high bandwidth in 4K/8K
video conferencing scenarios.
• Wi-Fi 6 works with Huawei SmartRadio technology to reduce the latency to 10 ms.
• Phase 1: In the era of basic mobile working, wireless networks were a supplement to
wired networks.
▫ Wi-Fi was also born during this period. It is a trademark of the Wi-Fi Alliance and
was created to drive the formulation of the 802.11b standard and compatibility
certification of Wi-Fi products worldwide. With the evolution of standards and the
popularity of standards-compliant products, people often equate Wi-Fi with the
802.11 standard.
▫ 802.11 is only one of many WLAN technologies and has become a mainstream
technology widely adopted in the industry. Therefore, when people talk about WLAN,
they usually refer to WLAN that uses Wi-Fi technology.
▫ This was the first phase of WLAN application, focusing mainly on implementing
wireless access. Its key value is to break away from the constraints of wired
networks so that devices can move within a certain range, that is, using wireless
networks to extend wired networks. However, in this phase, there were no specific
requirements on WLAN's security, capacity, and roaming performance. And an
access point, or AP, was used independently for networking coverage. Such an AP
is called a Fat AP.
• Planning
▫ It is difficult to verify the effect after manual planning, for example, whether the
planned signals can completely cover desired areas.
• Deployment
▫ There are too many commands, and configuration items and procedures are prone
to errors.
• Monitoring
▫ There are many network KPIs, such as the CPU usage, memory usage, bandwidth
usage, number of access users, access rate, signal strength, and signal-to-noise
ratio (SNR). If you only view KPI data, network optimization cannot be performed.
• Fault diagnosis
• On a large campus network, ACs are typically connected to aggregation or core switches
in off-path mode.
• ABCD
• Electromagnetic radiation consists of electromagnetic waves, which are synchronized
oscillations of electric and magnetic fields perpendicular to each other. Electromagnetic
waves travel through space to transmit energy in a direction perpendicular to the
electric and magnetic fields.
• Radio waves are electromagnetic waves emitted in the free space (including air and
vacuum), with frequencies lower than 300 GHz. (The lowest frequencies are different. The
commonly used lowest frequencies are 3 kHz to 300 GHz, 9 kHz to 300 GHz, and 10 kHz
to 300 GHz.)
• The current change in a conductor generates radio waves. Therefore, information can be
carried by radio waves through modulation. When an electromagnetic wave reaches the
receiver, the electromagnetic field change caused by the electromagnetic wave generates
current. Information can be extracted from current through demodulation. Information is
thus transmitted.
• The frequency is an important physical index of waves. The frequency of a wave is the
oscillation frequency of the wave, which is expressed in Hz. If a wave oscillates once per
second, the frequency is 1 Hz.
• A wave consists of consecutive crests and troughs. The distance between adjacent crests
or roughs is the wavelength. Waves vary in size from very long radio waves (as long as a
football field) to very short gamma-rays (shorter than the radius of an atom). A higher
frequency indicates a shorter wavelength.
• The frequency of radio waves ranges from 3 kHz to 300 GHz, and the wavelength ranges
from 0.1 mm to 10 km.
• WLANs use the 2.4 GHz frequency band (2.4–2.4835 GHz) and 5 GHz frequency band
(5.15–5.35 GHz and 5.725–5.85 GHz).
• Designed for Industrial, Scientific, and Medical (ISM), the 2.4 GHz and 5 GHz frequency
bands can be used without licenses or fees as long as the transmit power requirement
(generally less than 1 W) is met and no interference is caused to other frequency bands.
The free frequency band resources reduce WLAN deployment costs but cause co-channel
interference when multiple wireless communication technologies work on the same
frequency band. The frequency bands to be used by WLANs must comply with local laws
and regulations.
• ELF (3 Hz to 30 Hz): Submarine communication or direct conversion into sound
• SLF (30 Hz to 300 Hz): Direct conversion into sound or AC power transmission system
(50 Hz to 60 Hz)
• ULF (300 Hz to 3 kHz): Mine communication or direct conversion into sound
• VLF (3 kHz to 30 kHz): Direct conversion into sound, ultrasound, and geophysics research
• LF (30 kHz to 300 kHz): International broadcasting
• MF (300 kHz to 3 MHz): Amplitude Modulation (AM) broadcasting, maritime, and
aeronautical communication
• HF (3 MHz to 30 MHz): Short wave and civil radio stations
• VHF (30 MHz to 300 MHz): Frequency Modulation (FM) radio, TV broadcast, and
aeronautical communication
• UHF (300 MHz to 3 GHz): TV broadcasting, wireless telephone communication, wireless
network, and microwave oven
• SHF (3 GHz to 30 GHz): Wireless network, radar, and satellite receiving
• EHF (30 GHz to 300 GHz): Radio astronomy, remote sensing, and human body scanner
• 300 GHz or higher: Infrared ray, visible light, ultraviolet ray, and other rays
• Phase is a relative term that describes the relationship between two co-channel waves.
To measure the wave phase, the wavelength of a wave is divided into 360 parts and each
part is 1°. 0° is used as the propagation start time of a wave. If one wave starts to
propagate at 0° and the other wave starts to propagate at 90°, the two waves are 90°
out-of-phase. If electromagnetic waves with the same frequency start to propagate at
different time, the wave propagation is greatly affected.
• Source coding
▫ Source coding is a process of converting raw information into digital signals by using
a coding scheme. Source coding can reduce redundant information in the raw
information, by compressing the information to the maximum extent without
distortion.
• Channel coding
▫ Channel coding adds redundant information to the raw information and therefore
increases the information length. The ratio of the number of pre-coding bits (that is,
raw information) to the number of post-coding bits is referred to as the coding
efficiency, also called the coding rate. Channel coding decreases the transmission
rate of valid information but increases the transmission success rate of valid
information. Therefore, the best performance and effectiveness can be achieved by
selecting a proper coding scheme for communication protocols.
• Modulation is classified the following types based on controlled signal parameters:
▫ AM: The amplitude of high-frequency carrier signals changes with the instantaneous
change of modulation signals. That is, the amplitude of a high-frequency signal is
changed by using a modulation signal, so that information of the modulation signal
is included in the high-frequency signal, the high-frequency signal is transmitted by
using an antenna, and then the modulation signal is also transmitted. The receiver
then can demodulate the modulation signal, that is, parse the amplitude of the high-
frequency signal to obtain the modulation signal.
▫ FM: It changes the carrier frequency according to modulation signals. The change of
the modulation wave frequency is determined by the size of a modulation signal,
and the change period is determined by the frequency of the modulation signal. The
amplitude of the modulation wave remains unchanged. The waveform of the FM
wave is like a spring that is compressed unevenly.
▫ PM: PM is a modulation mode in which the deviation value of the carrier phase
relative to the reference phase varies proportionally with the instantaneous value of
the modulation signal. That is, the initial phase of a carrier varies with the baseband
digital signal. For example, the digital signal 1 corresponds to the phase 180°, and
the digital signal 0 corresponds to the phase 0°.
• A carrier is a waveform that is modulated with an information bearing signal for the
purpose of conveying information. It is typically a sine wave. Generally, the frequency of a
sine carrier is required to be far higher than the bandwidth of a modulation signal;
otherwise, aliasing may occur, causing distortion of the transmitted signal.
• Generally, data to be sent has a low frequency. If the data is transmitted at the original
frequency, it is difficulty for the data to be received or synchronized. With carrier wave
transmission, data signals can be loaded onto carrier wave signals. The receiver receives
data signals at the carrier wave frequency. Meaningful and meaningless signal waves
have different amplitudes, so that the needed data signals can be extracted through
demodulation.
• The 5 GHz frequency band of Wi-Fi performs better than the 2.4 GHz frequency band in
terms of frequency, data rate, and anti-interference performance. However, as the 5 GHz
frequency band has higher frequencies and therefore has a shorter wavelength than the
2.4 GHz frequency band, it delivers poor signal penetration capabilities and shorter
transmission distances. The available channels on the 5 GHz frequency band vary in
different countries and regions. Its wide frequency bandwidth and reduced interference
make it suitable for high-speed transmission.
• In 802.11n, the maximum transmission rate changes with the number of spatial streams.
For example, an independent spatial stream supports a maximum rate of 150 Mbps, and
two independent spatial streams support 300 Mbps. An 802.11n device supports up to
4x4 MIMO, that is, a maximum of four spatial streams, with a rate of up to 600 Mbps. The
number of spatial streams determines the maximum physical transmission rate.
• In the MIMO system, the number of spatial streams is typically less than or equal to the
number of antennas. If the number of RX antennas is different from that of TX antennas,
the number of spatial streams is smaller than or equal to the minimum number of
antennas on the transmitter or receiver. For example, a 4x4 MIMO system can transmit
four ore fewer spatial streams, whereas a 3x2 MIMO system can transmit two or fewer
spatial streams.
• Compared with a single-radio AP, a dual-radio AP allows access of more STAs while
ensuring STA performance. For example, in a bandwidth-demanding scenario, a single
radio module can connect to 20 to 25 STAs. However, if an AP can work on both the 2.4
GHz and 5 GHz frequency bands, it can connect to 40 to 50 STAs.
• In this way, the access capacity is doubled in the same physical space. Therefore, dual-
radio APs are applicable to high-density scenarios, such as libraries, conference rooms,
academic lecture halls, and student dormitories.
• A three-radio AP provides one more radio than a dual-radio AP. This radio can be used
for service coverage to improve the user access capability or used for spectrum
monitoring, security scanning, and wireless location. It supports link aggregation of two
Ethernet interfaces, ensuring link reliability and improving the service load balancing
capability. Using three-radio APs effectively solves problems in high-density scenarios,
such as difficult STA access, data congestion, and poor roaming performance.
• Interference from non-Wi-Fi devices: Many household appliances, such as microwave
ovens, Bluetooth headsets, and infrared remote controls, work on the 2.4 GHz frequency
band. Consequently, a large number of 2.4 GHz channels are occupied, reducing the
utilization of Wi-Fi transmission channels.
• The actual wireless access rate is significantly different from the implementation rate due
to the following reasons:
▫ Bandwidth sharing: The available bandwidth is shared by all users on the same
wireless network.
• Frequency hopping (FH or FHSS)
▫ OFDM divides available channels into sub-channels and decodes some of the
signals on each sub-channel.
• As shown in the figure above, a channel is considered as a lane. When OFDM is not
enabled, a single channel allows only one single subcarrier at a time, which is similar to
that only one vehicle can pass at a time, resulting in low efficiency. When OFDM is
enabled, a channel is divided into several sub-channels, so that multiple subcarriers can
be transmitted at the same time, thereby greatly improving channel utilization.
• OFDM divides a wide channel into multiple sub-channels, each of which is used for data
transmission.
• Subcarriers in an OFDM system overlap but do not interfere with each other because they
are orthogonal to each other. In mathematics, "orthogonal" is used to describe
independent projects.
• OFDM operates properly because the waveform of a subcarrier is not affected by other
subcarriers.
• To improve the throughput, 802.11ac introduces 256-QAM — a higher-order modulation
scheme with higher modulation efficiency. 256-QAM supports the coding rates of 3/4 and
5/6 and increases the number of MCS types to 10. In terms of MCS representation,
802.11ac eliminates MCS coding for each MIMO combination, reducing the number of
MCS types from dozens to 10. A higher MCS index indicates higher throughput due to the
difference in the number of bits represented by each subcarrier in different MCS types.
Each subcarrier (represented by a point in the constellation diagram) can carry data of 2
bits in BPSK, 4 bits in 16-QAM, 6 bits in 64-QAM, and 8 bits in 256-QAM.
▫ Users are differentiated by time segment. In each time segment, one user occupies
all subcarriers.
• OFDMA:
• RU:
▫ 802.11ax defines the RUs of different tones, including 26, 52, 106, 242, 484, 996,
and 2x996 tones. RUs with different tones are applicable when different channel
bandwidths are available: 484-tone RUs available only at 40 MHz, 80 MHz, or 160
MHz; 996-tone RUs available only at 80 MHz or 160 MHz; and 2x996-tone RUs
available only at 160 MHz.
• OFDMA working mode (as shown in the right figure): Users are differentiated by time-
frequency RUs. The resources of a channel are divided into small fixed time-frequency
blocks, which are known as RUs. In this mode, user data is carried on each RU. Therefore,
multiple users may simultaneously send data in each time segment when the total time-
frequency resources remain unchanged.
• Compared with OFDM, OFDMA has the following advantages:
▫ Finer resource allocation: The transmit power can be allocated based on the
channel quality, especially when the channel status of some nodes is not good. This
helps to allocate channel time-frequency resources in a more delicate manner.
▫ Better QoS: According to earlier 802.11 standards, one user occupies the entire
channel to transmit data. If a QoS node wants to send a data packet, it must wait
until the current sender releases the complete channel. This causes a long latency.
With OFDMA, however, one sender occupies only a part of the channel, which
reduces the access latency for QoS nodes.
• Note: 26-tone RUs are similar to radar signals, and may be detected by radars by mistake.
• The Wi-Fi 6 standard uses OFDMA to improve the spectrum utilization. For example, 80
MHz bandwidth can be divided into a maximum of 37 RUs, which can serve 37 users
concurrently.
• Wi-Fi 6 reduces the subcarrier spacing to 78.125 kHz from 312.5 kHz in Wi-Fi 5. This
means that Wi-Fi 6 achieves a four-fold increase in the number of subcarriers that in Wi-Fi
5 with the same channel bandwidth.
• In Wi-Fi 6, the minimum RU size and minimum subcarrier bandwidth are 2 MHz and
78.125 kHz, respectively. Therefore, the minimum RU type is 26-tone RU. By analogy,
there are 52-tone, 106-tone, 242-tone, 484-tone, and 996-tone RUs.
• An RU includes data subcarriers and pilot subcarriers. Data subcarriers are used to carry
data, and pilot subcarriers are used for channel estimation.
• Simply speaking, with CSMA/CA, a STA listens on the channel before sending data. If the
channel is busy, a collision exists and the STA waits for a period of time before sending
data. If the channel is not busy, the STA can directly send data.
• The basis for CSMA/CA is carrier sense. 802.11 proposes two carrier sense methods
based on medium characteristics of WLANs: physical and virtual carrier sense. These two
carrier sense methods may be performed at the same time. As long as either of the two
methods shows that the media is in use, the media is considered busy.
▫ Physical carrier sense: works at the PHY layer and depends on the medium in use
and modulation scheme. This method detects the signal energy from the received
radio frequency or antenna signals and estimates the busy or idle status of channels
based on the signal quality.
▫ Virtual carrier sense: works at the MAC layer. With this method, the transmit STA
notifies other STAs of the duration it needs to occupy the channel so that the other
STAs stop sending data during this period.
• "Virtual" herein means that other STAs do not send data because they receive
notifications from the transmit STA but do not actually detect the physical channel.
Notifications sent from the transmit STA are implemented by filling the Duration field of the
MAC frame header with the time (in μs) during which the STA will occupy the channel
after the current frame transmission is completed, including the time required by the
receive STA (destination) to send an ACK frame. When a STA other than the transmit
(source) and receive (destination) STAs detects the Duration field in the header of a MAC
frame that is being transmitted on a channel, the STA adjusts its own NAV.
▫ Allows a STA to switch from the transmit mode to the receive mode within this
period.
▫ SIFS applies to transmission of the following frames: ACK frames, CTS frames,
fragmented MAC frames, Probe Response frames, and frames sent from an AP to a
STA in PCF mode.
• DIFS
▫ A DIFS is the shortest time for a medium to remain idle in competitive services. If
the medium is continuously idle for a time longer than the DIFS, a STA can access
the medium immediately.
• A STA needs to wait for another DIFS until the channel is idle because another STA may
have a high-priority frame to be sent. Higher-priority frames will be sent preferentially.
• Before sending data, the STA sends RTS and CTS frames to avoid packet collision. This
is the virtual carrier sense mechanism, which enables a STA to notify all STAs of the
channel occupation duration (including the time required for the AP to send an ACK
frame). In this manner, all the other STAs stop sending data in this period of time, thereby
greatly reducing the chance of collision.
▫ With the virtual carrier sense mechanism, other STAs do not send data because
they receive notifications from the transmit STA (source) but do not actually detect
the physical channel. This achieves the same effect as that of channel detection by
other STAs. Notifications sent from the transmit STA are implemented by filling the
Duration field of the MAC frame header with the time (in μs) during which the STA
will occupy the channel after the current frame transmission is completed, including
the time required by the receive STA (destination) to send an ACK frame.
• When a STA detects the Duration field in the header of a MAC frame that is being
transmitted on a channel, the STA adjusts its own NAV. The NAV specifies the time
required for completing the transmission of a data frame so that the channel can be
switched to the idle state. Therefore, the STA determines that a channel is busy based on
physical carrier sense or virtual carrier sense at the MAC layer.
• 802.11 standards use the binary exponential backoff algorithm, but the specific
implementation is slightly different. For the ith backoff, one timeslot is randomly selected
from 22+i timeslots. That is, upon the first backoff, one timeslot is randomly selected from
8 timeslots (not two timeslots); and upon the second backoff, one timeslot is randomly
selected from 16 timeslots (not four timeslots). When the timeslot number reaches 255
(corresponding to the sixth backoff), the number does not increase anymore.
• When a STA that wants to send data selects a timeslot in the contention window using the
backoff algorithm, a backoff timer starts to count down from the selected timeslot. When
the backoff timer counts down to 0, the STA starts to send data. Alternatively, if the
channel is sensed busy before the backoff timer counts down to 0, the backoff timer is
frozen and waits for the channel to become idle again. After the DIFS elapses, the backoff
timer continues to count down (starting from the remaining time). This provision allows the
STA that continues to start the backoff timer to access the channel earlier.
• In the figure above, the backoff timer of STA3 counts down to zero first. Therefore, STA3
immediately sends the entire data frame. Note that the channel becomes idle immediately
after STA3 sends data. The backoff timer of STA3 keeps counting down. When STA3 is
sending data, other STAs sense the channel busy, freeze their backoff timers, and wait for
the channel to become idle.
• After STA3 finishes sending data, other STAs wait for a DIFS and their backoff timers start
to count down from their respective remaining times. Now, the backoff timer of STA4
reaches zero first, and STA4 is granted the transmission right. When STA4 sends data,
other STAs freeze their backoff timers until the remaining time expires, and then send
data. Freezing the remaining time of the backoff timer aims to make channel resources
fairer to all STAs.
• To resolve the hidden node problem on a WLAN, the IEEE 802.11 protocol allows a STA
to reserve access to a channel by using the RTS/CTS mechanism.
• With the RTS/CTS mechanism, a STA does not send data immediately after a DIFS.
Instead, the STA sends an RTS frame to apply for channel occupation. Other STAs that
receive the RTS frame respond with a CTS frame after an SIFS, informing the transmit
STA that they are ready to receive data. After successful RTS/CTS signal exchange (that
is, the handshake process is completed), the transmit STA starts to transmit data. In this
manner, when multiple STAs that are invisible to each other simultaneously attempt to
send signals to the same destination STA, only the STA that receives the CTS frame
returned by the destination STA can successfully send data, thereby avoiding collisions.
In this case, a collision (if any) may occur only when the RTS frame is transmitted. For the
STAs that did not receive the CTS frame from the destination STA, a contention
mechanism provided by the DCF is available to allocate random backoff timer values to
them. These STAs then will wait for a DIFS until the medium becomes idle again and
contend by sending RTS frames. This process continues until the STAs succeed in
sending data.
▫ Mitigates the hidden node problem because long data frames can be sent only after
channel resources are successfully reserved.
▫ Involves only a short RTS or CTS frame collision (if any) duration because these
two frames are relatively small in size. Once the RTS and CTS frames are correctly
transmitted, subsequent data frames and ACK frames can be sent without any
collision.
• In practice, a bonded channel contains one primary channel and one auxiliary channel.
Hence, either a 40 MHz channel or a single 20 MHz channel can be used for transmitting
and receiving data.
• A small part of bandwidth is reserved between two 20 MHz channels to avoid mutual
interference. When channel bonding technology is used to achieve 40 MHz bandwidth,
the reserved bandwidth may also be used for communication, thereby further improving
throughput.
• Theoretically, a 40 MHz bonded channel can increase the spectrum utilization and double
the throughput compared with 20 MHz channels. However, the 2.4 GHz frequency band
has limited spectrum resources, and has only four non-overlapping channels that can form
at most two 40 MHz bonded channels that do not interfere with each other on the band.
Therefore, channel bonding on the 2.4 GHz frequency band is not practical on the live
network. Currently, channel bonding is mainly performed on the 5 GHz frequency band.
• Theoretically, a 40 MHz bonded channel can increase the spectrum utilization and double
the throughput compared with 20 MHz channels. However, the 2.4 GHz frequency band
does not support two 40 MHz bonded channels that do not interfere with each other due
to limited spectrum resources on the band. Only channels 1, 5, 9, and 13 can be bonded
to form two non-overlapping channels.
• A small part of bandwidth is reserved between two 20 MHz channels to avoid mutual
interference. When channel bonding technology is used to achieve 40 MHz bandwidth,
the reserved bandwidth may also be used for communication, thereby further improving
throughput.
• If two adjacent 20 MHz channels are bonded and the center frequency of the auxiliary 20
MHz channel is lower than that of the primary channel, the bonded channel is named
xxxplus. Otherwise, the bonded channel is named xxxminus.
▫ For example, on the 2.4 GHz frequency band, if channel 1 is used as the primary
channel in channel bonding, the bonded channel is known as channel 1plus,
indicating channel 1 is the primary channel, channel 5 is the auxiliary channel, and
the frequency bandwidth of the bonded channel is 40 MHz.
▫ Apparently, SISO transmission is unreliable and rate limited because there is only
one path between the TX antenna and RX antenna. To address this issue, we add
more antennas on the receiver (STA) so that two or more signals can be received
concurrently, achieving single-input multiple-output (SIMO).
• SIMO
▫ There are multiple paths between the TX antenna and RX antennas. Data is sent
from the same TX antenna, and therefore only one signal is transmitted, doubling
reliability. This mode is also known as receive diversity.
• MISO
▫ There are multiple paths between TX antennas and the RX antenna. Only one RX
antenna exists, and therefore the TX antennas can send only the same data along
the two paths. The effect is similar to that of SIMO. This mode is also known as
transmit diversity.
• MIMO
▫ MIMO technology allows multiple antennas to send and receive spatial streams
(multiple signals) simultaneously and to differentiate the signals sent to or received
from different spaces. By leveraging technologies such as spatial reuse (SR) and
space diversity (SD), MIMO improves the system capacity, coverage, and SNR
without increasing the occupied bandwidth.
• A router that supports MU-MIMO technology can transmit data simultaneously with a
plurality of STAs, which changes the serial transmission mode to parallel and shortens the
waiting time before STAs obtain data from the router wirelessly. Additionally, the
bandwidth resources obtained by each STA are not compromised. Therefore, this
technology maximizes the resource utilization and thereby increases the access capacity
of the router and the Internet access speed of STAs.
• Before SR was introduced, WLAN systems used the CSMA/CA mechanism. The
CSMA/CA mechanism allows only one link to transmit data at a time within the signal
coverage of a STA. This can be done only after the STA obtains the channel access right
through contention. The CSMA/CA mechanism enables all WLAN participants in a
collision domain to fairly share channels. However, when the number of WLAN
participants greatly increases, especially when there are a large number of APs with
OBSSs on the network, transmission efficiency decreases.
• 802.11 uses CSMA/CA at the MAC layer. It uses the half-duplex communication
mechanism, in which only one radio device can transmit data on the network at a time. If
an 802.11 STA detects a transmission signal (by checking the PHY header) from any
other 802.11 STA, the 802.11 STA delays its transmission. When APs and STAs are
deployed to work on the same channel and contend for signal transmission, they are
located in the same OBSS, which suffers from co-channel interference.
• 802.11ax devices distinguish BSSs by adding the BSS color field to the PHY header of a
packet. During contention, a node allocates a contention behavior at the MAC layer based
on the detected BSS color field value in the PHY header. If the BSS color field values are
the same, the nodes are in the same BSS, indicating intra-BSS contention. If the BSS
color field values are different, the nodes are in an OBSS, indicating inter-BSS contention.
• Based on the BSS coloring mechanism, wireless traffic is marked at the beginning of
transmission, which helps surrounding devices determine whether to the allow wireless
medium to be used at the same time. Even if the level of the detection signal from the
neighboring network exceeds the traditional signal detection threshold, the wireless
medium can be considered idle and new transmission is allowed as long as the transmit
power of the new transmission is lowered appropriately. The BSS coloring mechanism
aims to enable devices to distinguish between the transmissions on the local and
neighboring networks. The self-adaptive power and sensitivity thresholds allow dynamic
adjustment of the transmit power and signal detection threshold to increase SR efficiency
and minimize co-channel interference.
• If an 802.11ax AP detects an OBSS with the same color, the AP can change its own BSS
color to reduce co-channel interference. If two APs have the same BSS color, a BSS color
collision occurs. As shown in the figure above, if an 802.11ax AP detects different BSS
color field values from other APs or the AP itself, a BSS color collision is detected.
• If a STA detects a BSS color collision, it sends a color collision report to the associated
AP. The report contains BSS coloring information about all OBSSs it has detected.
• The AP informs all nodes within the same BSS of the BSS color change through a
Beacon frame that carries the new BSS color in the New BSS Color sub-field. The BSS
color change may also be notified through a Probe Response and a Reassociation
Response frame.
• When detecting a BSS color collision, an AP can change its own BSS color. The 802.11ax
draft amendment does not define the BSS coloring standard or a method for selecting a
new BSS color. WLAN vendors can customize BSS color selection protocols, such as the
Aerohive Channel Selection Protocol (ACSP).
• Each generation of new Wi-Fi standards can extend the battery life of STAs by supporting
faster and longer transmission to lower their power consumption. Wi-Fi 6 introduces target
wakeup time (TWT), which allows an AP to inform a STA when to sleep and provide a
scheduling table defining when the STA is awake. Even though a STA sleeps for a short
period of time each time, multiple sleeps significantly prolong the battery life of the STA.
• TWT was first proposed in the 802.11ah standard. This mechanism is designed to save
energy for IoT devices, especially for devices with low traffic volume such as smart
electricity meters. It allows IoT devices to stay in the sleep state as long as possible,
reducing power consumption. After a TWT agreement is established, a STA wakes up
after a longer period of time, without the need of receiving a Beacon frame. The 802.11ax
standard improves on TWT by defining rules for STA behaviors and implementing channel
access control on the premise of meeting energy saving requirements. TWT is classified
into unicast TWT and broadcast TWT.
• The IEEE 802.11 Working Group defines the standards related to:
• 802.11 PHY standards define the frequencies, MCSs, and maximum rates of wireless
standards.
▫ IEEE 802.11: In 1990, the IEEE Standards Association (IEEE-SA) set up the IEEE
802.11 Working Group, which defined 802.11 standards. The 802.11 standard
specifies the set of MAC layer and PHY protocols for implementing WLAN
communication. It defines signal characteristics and MCSs in data transmission at
the PHY. According to the 802.11 standard, WLANs work at frequencies from 2.4
GHz to 2.4835 GHz and the maximum data rate is 2 Mbps.
▫ IEEE 802.11a: Published in 1999, 802.11a defines the frequency of WLANs, which
is between 5.15 GHz and 5.825 GHz. The maximum data rate is 54 Mbps.
▫ IEEE 802.1b: IEEE 802.1b was approved in September 1999. According to 802.1b,
WLANs work at 2.4 GHz to 2.4835 GHz. The maximum data rate is 11 Mbps.
▫ IEEE 802.11g: IEEE 802.11g improves the data rate from 11 Mbps (802.11b) to 54
Mbps. 802.11g APs support access of 802.11b and 802.11g STAs.
• Different from 802.11a/b/g, 802.11n works in dual-band mode (2.4 GHz and 5 GHz
frequency bands). Therefore, 802.11n is compatible with 802.11a/b/g.
• To improve the QoS of real-time services, 802.11n defines single-user beamforming
technology to improve the signal receiving quality. It also incorporates the 802.11e (QoS)
standard amendment, requiring 802.11n devices to support 802.11e features. In addition,
802.11n uses antenna and wireless transmission technologies, which greatly increase the
transmission distance of WLANs to several kilometers while guaranteeing the data rate of
100 Mbps.
• 802.11n combines PHY and MAC layer technologies to improve the WLAN throughput.
The main PHY technologies include MIMO, MIMO-OFDM, 40 MHz channel bonding, and
short GI, which help to increase the PHY throughput to 600 Mbps. However, if only the
PHY rate is improved but the MAC layer functions such as air interface access are not
optimized, the PHY efficiency optimization cannot be achieved in 802.11n. This is similar
to a wide road. Traffic jams and low efficiency are still problems if traffic scheduling and
management are not optimized. To resolve such problem, 802.11n uses technologies
such as block acknowledgment and frame aggregation, which greatly improve the MAC
layer efficiency.
• Forward Error Correction (FEC): According to the basic principles of wireless
communication, to make information suitable for transmission over unreliable media such
as wireless channels, the transmitter encodes information to be sent and adds on
redundant information to improve the system's error correction capability and allow the
receiver to restore the original information. The QAM-64 encoding mechanism used by
802.11n can increase the coding rate of an FEC code (proportion of useful data) from 3/4
(in 802.11g) to 5/6. Therefore, with MIMO-OFDM, the physical rate of a spatial stream can
be improved from 58.5 Mbps in 802.11g to 65 Mbps (that is, 58.5 Mbps times 5/6 divided
by 3/4).
• 802.11n supports a maximum rate of 600 Mbps thanks to the following:
▫ Delivers a data rate of up to 300 Mbps with the 20 MHz channel bandwidth and 600
Mbps with the 40 MHz channel bandwidth.
• 802.11ac has made many technological innovations, and it takes a long time to market
these innovations into Wi-Fi products. Therefore, the Wi-Fi Alliance separated the
introduction of 802.11ac products into two phases: Wave 1 and Wave 2. In this way,
802.11ac products can be quickly launched to the market to meet the rapidly increasing
traffic requirements. Meanwhile, 802.11ac is evolvable to maintain the competitiveness of
Wi-Fi.
• 802.11ac also enables seamless roaming of enterprise or home users, while supporting
security, management, and diagnosis applications of Wi-Fi products during roaming.
• 802.11ac uses new technologies while extending original technologies to improve the
maximum throughput and the number of access users. The technologies include more
spatial streams, 256-QAM, and MU-MIMO.
• It defines downlink MU-MIMO (DL MU-MIMO) technology to support concurrent downlink
multi-user transmission.
• 802.11ac extends A-MPDU technology.
▫ 802.11n and later 802.11 standards introduce frame aggregation technology at the
MAC layer to aggregate MSDUs or MPDUs before encapsulating them into PHY
packets. In this way, multiple MSDUs or MPDUs share one PHY header, improving
encapsulation efficiency, saving air interface resources, and reducing the number of
times for preempting air interface resources.
▫ Upon an error in the transmission of an A-MSDU, the entire A-MSDU needs to
retransmitted. In contrast, each MPDU in an A-MPDU has their own MAC headers.
Upon an error in the transmission of an A-MPDU, only the MPDU with the error
needs to be retransmitted.
▫ 802.11ac data frames must be sent in A-MPDU mode. That is, A-MPDU cannot be
disabled.
• The Wi-Fi Alliance launched the "Wi-Fi CERTIFIED 6" certification program on September
16, 2019, and announced IEEE 802.11ax that operates on the 6 GHz frequency band as
Wi-Fi 6E on January 3, 2020.
• You may be very familiar with the concept of MU-MIMO. DL MU-MIMO introduced in
802.11ac may bring the following problems:
▫ Many STAs use single antennas, and dual-antenna STAs need to switch to the
single-stream DL MU-MIMO mode to prevent interference. The gain of an AP with
four antennas is moderate compared with that of a single-antenna STA.
▫ Even if an AP has eight antennas, it can exchange data with a maximum of only four
STAs.
▪ Channel probe responses from STAs are sent continuously, resulting in a high
overhead.
▫ Probe frames and data frames can be exchanged with multiple STAs to reduce the
overhead and the uplink response time.
▫ Each of Huawei Wi-Fi 6 APs has four 2.4 GHz antennas and supports four spatial
streams on the 2.4 GHz frequency band. Due to protocol restrictions, the 5 GHz
frequency band can support a maximum eight spatial streams. Therefore, Huawei
Wi-Fi 6 APs support a maximum of eight spatial streams on the 5 GHz frequency
band.
▫ The coding scheme, also called the modulation scheme, converts signals generated
by a signal source into a form suitable for wireless transmission (that is, number of
bits that can be carried in one symbol).
▫ For example, 802.11ax uses 1024-QAM, which means that the size of data carried
by each subcarrier is 10 bits (that is, log21024). 802.11ac uses 256-QAM, defining
that the size of data carried by each subcarrier is 8 bits (log2256). To put it simply,
Wi-Fi 6 (802.11ax) uses 1024-QAM and each subcarrier transmits data of 10 bits
(2^10 = 1024), whereas Wi-Fi 5 (802.11ac) uses 256-QAM and each subcarrier
transmits data of 8 bits (2^8 = 256).
• 1. OFDM, OFDMA, MU-MIMO, QAM, Channel Bonding, BSS Coloring…
• The CAPWAP working group referred to the four different protocols above. LWAPP has a
complete protocol architecture and defines detailed packet structure and multiple control
messages. However, the effectiveness of the newly created security mechanism is yet to
be proven. The highlight of SLAPP is the DTLS technology, which is highly applauded in
the industry. CTP and WiCoP can satisfy the demands of a centralized WLAN
architecture. However, they have some drawbacks, especially in terms of security.
• The CAPWAP working group compared and evaluated the four protocols, and finally
developed the CAPWAP protocol, which is based on the LWAPP protocol and
incorporates DTLS technology and features of the other three protocols.
• Large-scale networking requires centralized management of multiple APs. However, the
traditional WLAN architecture can no longer meet the requirements of large-scale
networking. Therefore, the IETF set up a CAPWAP working group and developed the
CAPWAP protocol.
▪ Data packets, which are encapsulated and forwarded through the CAPWAP
data tunnel.
▫ CAPWAP data and control packets are transmitted on different UDP ports:
▫ Data packets, which are encapsulated and forwarded through the CAPWAP data
tunnel.
▫ Control packets, which are exchanged for AP management through the CAPWAP
control tunnel.
• In a CAPWAP data tunnel, the information exchanged between APs and the AC is 802.11
wireless data, which is encapsulated and forwarded by using CAPWAP, and the
information for maintaining the tunnel. In a CAPWAP control tunnel, the transmitted
control information includes not only the control information for the AC to perform working
parameter configuration on APs, but also the control information for maintaining the
CAPWAP session. In control packets, except for Discovery Request and Discovery
Response messages that are transmitted in plain text, the transmission of other requires
DTLS encryption. As for the transmission of data packets, DTLS is optional.
• The process for establishing a CAPWAP tunnel includes phases such as DHCP
interaction, Discovery, DTLS connection, Join, Image Data, Configuration Status, Data
Check, Run (data), Run (control), etc.
• The DHCP Ack message carries:
▫ IP address of an AP
▫ Lease duration
▫ Gateway
▫ DNS server IP
▫ After the AP obtains the AC IP address, it negotiates with the AC. After the AP
receives a Discovery Response message from the AC, it starts to establish a
CAPWAP tunnel with the AC. The DTLS protocol can be used to encrypt and
transmit UDP packets.
▫ 1. Check whether the AP is in the blacklist. If so, the AP access is not allowed. If
not, the AC precedes the step 2.
▫ 2. Check the AP authentication mode. If the AC does not have strict requirements
for the AP to join and the authentication mode is non-authentication, then all APs
that meet the condition in step 1 are allowed to join the AC. It is recommended that
MAC address or SN authentication be used to strictly control AP access. If MAC
address or SN authentication is used, the AC precedes the next step.
▫ 4. Check whether the MAC address or SN of the AP is in the whitelist. If so, the AP
is allowed to join the AC. If not, the AC adds the AP to the unauthorized AP list.
▫ If so, the AC rejects the access of the AP. That is, the AC does not respond to the
AP's Discovery or Join Request message. As a result, the AP does not receive a
Discovery or Join Response message and cannot perceive the presence of the AC.
In this case, the AP continues to discover other ACs based on the preconfigured or
dynamically obtained AC list. If the timer for the AP to wait for the Join Response
message expires, the AP starts the AC discovery process again.
▫ If not, the AC adds the AP to the unauthorized AP list. To allow the AP to join the
AC, you need to enter the MAC address or SN of the AP and manually confirm the
information to bring the AP online.
• The AP determines whether its system software version is the same as that specified in
the received Join Response message. If the two versions are different, the AP upgrades
its software version. After the AP is upgraded, the AP restarts automatically and repeats
all the previous authentication steps. If the two versions are the same or no version is
specified in the Join Response message, the AP can directly enter the next phase without
being upgraded.
• The AP sends a Keepalive message to the AC. A data tunnel is established after the
message is received by the AC, and then the AP enters the normal state.
• By default, the AP sends data heartbeat messages at an interval of 25s to check whether
the data link is normal.
• Note: After an AP joins an AC, it obtains the current configuration from the AC. Then the
AC manages the AP and delivers service configurations to it.
• PS-Poll mode
▫ IEEE 802.11 defines two working modes for STAs: active mode and PS mode.
▫ When a STA is in PS mode, the AP needs to buffer the data destined for the STA,
and the power management bit in Beacon broadcast frames is set to 1.
▫ After the STA wakes up from the PS mode, it checks the power management bit in
Beacon frames. If the power management bit is set to 1, the STA enters the active
mode and sends a PS-Poll frame to the AP to retrieve the buffered data frames.
▫ By default, the duration of a PS-Poll frame is the time required to transmit an ACK
frame plus one short interframe space (SIFS).
• Active scanning:
▫ Sending a Probe Request frame containing an SSID: applies when a STA actively
scans wireless networks to access a specified wireless network.
▫ Sending a Probe Request frame containing no SSID: applies when a STA actively
scans wireless networks to determine whether wireless services are available.
• In passive scanning mode, a STA only listens to Beacon frames and does not send Probe
frames, which saves resources. However, it takes a longer time to obtain the AP list in this
mode than in active scanning mode. However, the time difference is only several seconds,
which is acceptable to users.
• A STA supports both passive scanning and active scanning, so that it can discover an AP
and connect to it quickly.
• After a STA is connected to an AP, both active scanning and passive scanning are
allowed. However, some vendors may not implement both active scanning and passive
scanning because this is not a mandatory requirement.
• The interval at which Beacon frames are sent can be dynamically adjusted. A shorter
interval indicates that an AP can be discovered earlier.
• A WLAN needs to ensure validity and security of STA access. Before accessing the
WLAN, a STA must pass identity authentication, which is known as link authentication.
Link authentication is usually considered as the start point for STAs to connect to an AP
and access the WLAN.
▫ The STA uses the preconfigured key to encrypt the challenge and sends it to the
AP.
▫ The AP uses the preconfigured key to decrypt the encrypted challenge and
compares the decrypted challenge with the challenge sent to the STA. If the two
challenges are the same, the STA is authenticated successfully. Otherwise, the STA
authentication fails.
• STA association in the AC + Fit AP architecture consists of the following steps:
▫ The AP receives the Association Request message, encapsulates the message into
a CAPWAP message, and sends the CAPWAP message to the AC.
▫ The STA has set up a link with AP1 and sends Probe Request frames on various
channels. After AP2 receives a Probe Request frame over channel 6 (channel used
by AP2), it sends a Probe Response frame to the STA on channel 6. After the STA
receives response frames, it evaluates which AP is more suitable to associate. In
this case, the STA determines to associate with AP2.
▫ The STA sends an Association Request frame to AP2 on channel 6, AP2 replies
with an Association frame, so the association between the STA and AP2 is
established. During the entire roaming process, the association relationship
between the STA and AP1 is maintained.
▫ To disassociate from AP1, the STA sends a Disassociation frame to AP1 over
channel 1 (channel used by AP1).
• Intra-AC roaming: A STA is associated with the same AC.
• Inter-AC roaming: A STA associates with different ACs.
• Inter-AC tunnel: To support inter-AC roaming, ACs in a mobility group need to
synchronize STA and AP information with each other. Therefore, the ACs set up a tunnel
to synchronize data and forward packets. An inter-AC tunnel is set up using the CAPWAP
protocol. As shown in the figure, AC1 and AC2 set up a tunnel for data synchronization
and packet forwarding.
• Mobility server
▫ To enable STA roaming between ACs in a mobility group, you can configure an AC
as the mobility server to maintain the membership table of the mobility group and
deliver member information to ACs in the group. In this way, ACs in the mobility
group can identify each other and set up inter-AC tunnels.
▫ A mobility server can be an AC outside or inside a mobility group.
▫ An AC can function as the mobility server of multiple mobility groups, but can be
added to only one mobility group.
▫ A mobility server managing other ACs in a mobility group cannot be managed by
another mobility server. That is, if an AC functions as a mobility server to
synchronize roaming configurations to other ACs, it cannot be managed by another
mobility server or synchronize roaming configurations from other ACs. (An AC with a
mobility group configured cannot be configured as a mobility server.)
▫ As a centralized configuration point, a mobility server must be able to communicate
with all managed ACs but does not need to provide high data forwarding capability.
• Layer 2 roaming: A STA switches between two APs (or multiple APs) that are bound to
the same SSID and have the same service VLAN ID (within the same IP address
segment). During roaming, the access attributes (such as the service VLAN and obtained
IP address) of the STA do not change, and packet loss and reconnection do not occur.
• Layer 3 roaming: Before and after roaming, the service VLANs of the SSIDs are different,
and APs provide different Layer 3 service networks with different gateways. In this case,
to ensure that the IP address of a roaming STA remains unchanged, the STA's traffic
needs to be sent back to the AP on the initial access network segment to implement inter-
VLAN roaming.
• Sometimes, two subnets may have the same service VLAN ID but are different subnets.
Based on the VLAN ID, the system may incorrectly consider that STAs roam between the
two subnets at Layer 2. To prevent this situation, configure a roaming domain to
determine whether the STAs roam within the same subnet. The system determines Layer
2 roaming only when STAs roam within the same VLAN and same roaming domain;
otherwise, the system determines Layer 3 roaming.
• Intra-AC roaming: If a STA roams within the coverage of the same AC, the roaming is
intra-AC roaming. As shown in the figure, the STA roams from HAP to FAP, which is intra-
AC roaming.
• In Layer 3 roaming, the STA is not in the same subnet before and after roaming. To
allow the STA to access the same network as before roaming, the STA's traffic needs to
be forwarded to the original subnet through a tunnel.
• In tunnel forwarding mode, service packets exchanged between the HAP and AC are
encapsulated through the CAPWAP tunnel, and the FAP and AC can be considered in the
same subnet. Instead of forwarding the packets back to the HAP, the AC directly forwards
the packets to the upper-layer network.
• In direct forwarding mode, the HAP functions as the home agent by default after a STA
roams to another AP.
• The STA's traffic is forwarded by the home agent to ensure that the STA can still access
the original network after roaming.
• If the AC and user gateway can communicate at Layer 2, you can configure the HAC as
the home agent to reduce traffic load on the HAP. This also reduces the length of the
tunnel between the FAP and the home agent, and improves the forwarding efficiency.
• In Layer 3 roaming, the STA is not in the same subnet before and after roaming. To allow
the STA to access the same network as before roaming, the STA's traffic needs to be
forwarded to the original subnet through a tunnel.
• In tunnel forwarding mode, service packets between the HAP and HAC are encapsulated
with the CAPWAP header. In this case, the HAP and HAC can be considered on the
same subnet. Instead of forwarding the packets back to the HAP, the HAC directly
forwards the packets to the upper-layer network.
• In direct forwarding mode, service packets between the HAP and HAC are not
encapsulated with the CAPWAP header. Therefore, whether the HAP and HAC reside on
the same subnet cannot be determined. In this case, packets are forwarded back to the
HAP by default. If the HAP and HAC reside on the same subnet, you can configure a
higher-performance HAC as the home agent. This reduces the load on the HAP and
improves the forwarding efficiency.
• In direct forwarding mode, service packets between the HAP and HAC are not
encapsulated with the CAPWAP header. Therefore, whether the HAP and HAC reside on
the same subnet cannot be determined. In this case, packets are forwarded back to the
HAP by default. If the HAP and HAC reside on the same subnet, you can configure a
higher-performance HAC as the home agent. This reduces the load on the HAP and
improves the forwarding efficiency.
• Configure a mobility group.
▫ If a mobility server is specified, configure the mobility group on the mobility server.
▫ If no mobility server is specified, configure a mobility group for each member AC.
• D
• ACD
• The 4 times bandwidth increase is based on theoretical rate. Currently, the theoretical rate
of the Wi-Fi 5 (wave2) is 2.5 Gbps. The theoretical rate of Wi-Fi 6 is 9.6 Gbps.
• The number of concurrent users is increased by 4 times. In real tests, at 2 Mbps per user,
Wi-Fi 5 can support 100 concurrent users, while Wi-Fi 6 can support 400.
• The service latency is 20 ms in the Wi-Fi 6 standard (the average latency of Wi-Fi 5 is
about 30 ms). With Huawei smart radio application acceleration technology, the service
latency can be further reduced to 10 ms.
▫ Users are differentiated by time. In each time segment, one user occupies all
subcarriers.
• OFDMA:
• TWT wakes up the Wi-Fi function of STAs on demand, reducing the power consumption
of the STAs by 30%.
• TWT was first proposed in the 802.11ah standard. This mechanism is designed to save
energy for IoT devices, especially devices with low traffic volume such as smart meters.
This allows IoT devices to stay in the sleep state as long as possible, reducing power
consumption. After a TWT agreement is established, a STA wakes up after a longer
period of time, without the need of receiving a Beacon frame. The 802.11ax standard
improves on TWT by defining rules for STA behavior and implementing channel access
control on the premise of meeting energy saving requirements. TWT is classified into
unicast TWT and broadcast TWT.
• AC6800V is a high-performance wireless access controller (AC) designed for large
enterprise campuses, enterprise branches, and campus networks. Working with Huawei-
developed server platform, AC6800V can manage a maximum of 10K APs and provide up
to 60 Gbps forwarding performance.
• Large capacity and high performance: AC6800V provides 6 GE ports and 6 10GE ports,
as well as up to 60 Gbps forwarding performance. AC6800V can manage up to 10K APs
and 100K access users.
• Flexible data forwarding modes: direct forwarding and tunnel forwarding; flexible user
rights control: user- and role-based access control
• Abundant O&M methods: various network O&M methods, including eSight, web platform,
and Command Line Interface (CLI)
• AC6805 is a high-end wireless AC for large enterprise campuses, enterprise branches,
and school campuses. It can manage up to 6K access points (APs) and provide 40 Gbps
forwarding performance. It features high scalability and offers users considerable flexibility
in configuring the number of managed APs. Working with Huawei's full series 802.11ax,
802.11ac, and 802.11n APs, AC6805 delivers an adaptable solution for large and midsize
campus networks, enterprise office networks, wireless metropolitan area networks (MANs),
and hotspot coverage networks.
• Reset button:
▫ Press the reset button (for no more than 3 seconds) to reset the AC manually.
Resetting the AC will cause service interruption. Exercise caution when you press
the reset button.
▫ Press and hold down the reset button (for more than 5 seconds) to restore factory
defaults of the AC.
• Combo port:
▫ The combo port can be used as one 40GE QSFP+ Ethernet port or four 10GE SFP+
Ethernet ports. By default, QSFP+ port 1 works, and SFP+ ports 1 to 4 are
unavailable. When any SFP+ port is enabled, QSFP+ port 1 becomes unavailable.
• AirEngine 9700-M is a high-specification wireless access controller (AC) for midsize and
large enterprise campuses, enterprise branches, and school campuses. It can manage up
to 2000 access points (APs) and provide up to 20 Gbps forwarding performance. Working
with Huawei's full series 802.11ac and 802.11ax APs, AirEngine 9700-M delivers an
adaptable solution for midsize and large campus networks, enterprise office networks,
wireless metropolitan area networks (MANs), and hotspot coverage networks.
• Reset button:
▫ Press the reset button (for no more than 3 seconds) to reset the AC manually.
Resetting the AC will cause service interruption. Exercise caution when you press
the reset button.
▫ Press and hold down the reset button (for more than 5 seconds) to restore factory
defaults of the AC.
• Combo port:
▫ The combo port can be used as one 40GE QSFP+ Ethernet port or four 10GE SFP+
Ethernet ports. By default, QSFP+ port 1 works, and SFP+ ports 1 to 4 are
unavailable. When any SFP+ port is enabled, QSFP+ port 1 becomes unavailable.
• AC6508 is a small-capacity box wireless access controller (AC) for small and midsize
enterprises. It can manage up to 256 APs. In addition, the device integrates the GE
Ethernet switch function, achieving integrated access for wired and wireless users. The
number of APs that can be managed by the AC can be flexibly configured, providing good
scalability. Working with Huawei's full series 802.11ax, 802.11ac, and 802.11n APs,
AC6508 delivers an adaptable solution for small and midsize campus networks, enterprise
office networks, wireless metropolitan area networks (MANs), and hotspot coverage
networks.
• Reset button:
▫ Press the reset button (for no more than 3 seconds) to reset the AC manually.
Resetting the AC will cause service interruption. Exercise caution when you press
the reset button.
▫ Press and hold down the reset button (for more than 5 seconds) to restore factory
defaults of the AC.
• Huawei AirEngine 8760-X1-PRO is a next-generation flagship indoor access point (AP)
that complies with the Wi-Fi 6 standard. The AP uses built-in smart antennas to move Wi-
Fi signals with users, significantly enhancing users' wireless network experience. The AP
provides uplink optical and electrical ports, allowing customers to select different
deployment modes based on scenarios. These strengths make AirEngine 8760-X1-PRO
ideal for scenarios such as enterprise office, government, higher education, and
primary/secondary education.
• Security slot: connects to a security lock.
• USB: USB 2.0 port that connects to a USB flash drive or extends an IoT application.
• SFP+: Ethernet port that can work at the rate of 1 Gbps or 10 Gbps through auto-sensing
and works with a matching optical module.
• Default button: Reset button used to restore factory defaults and restart the device if you
press and hold down the button for more than 3 seconds.
• USB: USB 2.0 port that connects to a USB flash drive or extends an IoT application.
• SFP+: Ethernet port that can work at the rate of 1 Gbps or 10 Gbps through auto-sensing
and works with a matching optical module.
• Default button: Reset button used to restore factory defaults and restart the device if you
press and hold down the button for more than 3 seconds.
• USB: USB 2.0 port that connects to a USB flash drive or extends an IoT application.
• 5GE/PoE_IN: 100M/1000M/2.5G/5G port that connects to the wired Ethernet and supports
PoE input.
• Default button: Reset button used to restore factory defaults and restart the device if you
press and hold down the button for more than 3 seconds.
• USB port: USB 2.0 port that connects to a USB flash drive or other storage devices to
extend the storage space of the AP.
• Default button: Reset button used to restore factory defaults and restart the device if you
press and hold down the button for more than 3 seconds.
• GE0 to GE2: 10M/100M/1000M auto-sensing port that connects to the wired Ethernet.
• PASS-THRU: a pair of RJ45 passthrough ports for transparent data transmission and
interconnection with Ethernet cables or telephone lines.
• SFP+: Ethernet port that can work at the rate of 1 Gbps or 10 Gbps through auto-sensing
and works with a matching optical module.
• AirEngine 9700D-M is a central AP launched by Huawei, and has four 10GE uplink ports
and twenty-four GE downlink ports. AirEngine 9700D-M can connect to remote units (RUs)
in compliance with Wi-Fi 6 through Ethernet cables to centrally process and forward
services. Such a wireless network formed by the central AP and RUs can fully utilize the
RU throughput. Additionally, only one AP license is required, reducing customer
investment. AirEngine 9700D-M can be deployed in an equipment room, weak-current
well, or corridor, and RUs are deployed in rooms. Such an architecture is recommended
for environments with high-density rooms and complex wall structure, such as schools,
hotels, hospitals, and office meeting rooms.
• The RUs do not occupy AC licenses. The AC needs to manage only the AirEngine
9700D-M. As a result, only 200 APs are required to cover nearly 10,000 rooms.
• AirEngine 9700D-M is a central AP launched by Huawei, and has four 10GE uplink ports
and twenty-four GE downlink ports. AirEngine 9700D-M can connect to remote units (RUs)
in compliance with Wi-Fi 6 through Ethernet cables to centrally process and forward
services. Such a wireless network formed by the central AP and RUs can fully utilize the
RU throughput. Additionally, only one AP license is required, reducing customer
investment. AirEngine 9700D-M can be deployed in an equipment room, weak-current
well, or corridor, and RUs are deployed in rooms. Such an architecture is recommended
for environments with high-density rooms and complex wall structure, such as schools,
hotels, hospitals, and office meeting rooms.
• GE electrical port: twenty-four 10M/100M/1000M auto-sensing Ethernet ports that are
used for downlink data transmission and support PoE output.
• SFP+: four 10GE SFP+ Ethernet ports that can work at the rate of 1000 Mbps through
auto-sensing. They can transmit and receive data at a rate of 1000 Mbps or 10 Gbps.
• Console port: connects to the maintenance terminal for AP configuration and
management.
• ETH: reserved for later use.
• USB port: USB 2.0 port that connects to a USB flash drive to transfer configuration files
and upgrade files.
• PNP: reset button. Pressing this button will restart the AP. Pressing and holding down this
button for more than 6 seconds will restore factory defaults of the AP and restart the AP.
• Ground point: connects a ground cable to the AP.
• Power socket: connects to the power supply through an AC power cable.
• AirEngine 8760R-X1E is a next-generation flagship outdoor AP in compliance with the Wi-
Fi 6 standard. It provides excellent outdoor coverage performance and IP68 waterproof,
dustproof, and surge protection capabilities. AirEngine 8760R-X1E provides uplink optical
and electrical ports, allowing customers to select different deployment modes and saving
customers' investment. These strengths make AirEngine 8760R-X1E ideal for high-
density scenarios such as stadiums, squares, pedestrian streets, and amusement parks.
• GE/PoE_OUT: 10M/100M/1000M port that connects to the wired Ethernet and supports
PoE output.
• SFP+: Ethernet port that can work at the rate of 1 Gbps or 10 Gbps through auto-sensing
and works with a matching optical module.
• Default button: Reset button used to restore factory defaults and restart the device if you
press and hold down the button for more than 3 seconds.
• Antenna port: connects to a 2.4 GHz/5 GHz dual-band antenna for transmitting and
receiving service signals. The port type is N-type female. The 2.4G&5G_E/IoT port can be
connected to an IoT antenna.
• Advantages of smart antennas:
▫ Wide coverage: A smart antenna concentrates energy more effectively and has a
high gain, therefore providing wide coverage. A smart omnidirectional antenna's
coverage scope is equivalent to a directional antenna's coverage scope.
▫ Low radio pollution: Smart antennas provide satisfied power for STAs using low
transmit power. This reduces the pollution of electromagnetic waves to the
environment.
• When Ethernet cables are used as the power supply medium, DC resistance will cause
voltage drop and consumes power of the power supply end. Considering this, an Ethernet
cable with smaller DC resistance consumes less power of the system.
• Ethernet cable routing accounts for 50% to 60% of the entire network engineering
workload. In addition, there are some engineering activities that affect the buildings, such
as cable routing through walls and pipes, and cable burying. As such, high-spec Ethernet
cables are generally used to meet future network upgrade requirements. In addition,
signal crosstalk and Ethernet cable twisting, or even jumper connections may exist in
actual environments. With this in mind, it is recommended that the maximum length of an
Ethernet cable be 80 m.
• In outdoor scenarios, power supply and data transmission of an AP are generally
separated. PoE modules are connected to the nearest power grid (AC) to supply power to
APs. However, Ethernet cables are not long enough to meet data access requirements. In
this case, optical fibers are used to transmit data. Optical fibers can significantly increase
the data transmission distance between network nodes. For example, the transmission
distance can reach 550 m when multimode optical modules are used together with
multimode optical fibers. The transmission distance can reach 2 km, 10 km, or even 80
km when single-mode optical modules are used together with single-mode optical fibers.
• 1. A
• To distinguish BSSs, each BSS must have a unique BSSID. Therefore, the BSSID uses the
MAC address of the AP to ensure its uniqueness. BSSIDs reside at 802.11 MAC layer
and are used by APs to forward 802.11 packets.
• An SSID cannot be equal to a BSSID. Different BSSs can have the same SSID. If a BSSID
is compared to the "ID card" of a BSS, the SSID is the name of the BSS. The WLAN
names you search for on your STA are SSIDs.
• A BSSID uses the MAC address of an AP. Therefore, the number of required MAC
addresses is the same as the number of VAPs supported by an AP.
• The use of VAPs simplifies WLAN deployment, but it does not mean that we need to
configure as many as VAPs. VAPs must be planned based on actual requirements.
Simply increasing the number of VAPs will increase the time for STAs to find SSIDs and
makes AP configuration more complex. Additionally, a VAP is not equivalent to a real
AP. All VAPs virtualized from a physical AP share software and hardware resources of
the AP, and all users associated with these VAPs share the same channel resources. The
capacity of an AP will not change or multiply with the increasing number of VAPs.
• The uplink network of an AP is usually an Ethernet network. Therefore, to connect to
an uplink network, the AP must provide wired interfaces in addition to wireless radios.
After receiving wireless packets from a STA, an AP converts the packets into wired
packets and sends them to the uplink network. The uplink network then forwards the
packets to another AP. The uplink network of an AP can also be a wireless network.
For example, in areas where cables are difficult to lay out, APs can wirelessly connect
to other APs working in bridge mode or connect to a mobile network by extending the
LTE function on the APs.
• The SSID of each BSS is called an extended service set identifier (ESSID), which is used
to notify STAs of a continuous WLAN.
• Fat AP architecture
▫ This architecture is also called autonomous network architecture because it does
not require a dedicated device for centralized control and can implement
functions such as wireless user access, service data encryption, and service data
packet forwarding.
▫ Applicable scope: home
▫ Characteristics: A Fat AP works independently and requires separate
configurations. It provides only simple functions and is cost-effective.
▫ Disadvantages: The increase in the WLAN coverage area and the number of
access users requires more and more Fat APs. No unified control device is
available for these independently working Fat APs. Therefore, it is difficult to
manage and maintain the Fat APs.
• The AC and Fit APs communicate through CAPWAP. With CAPWAP, APs automatically
discover the AC, the AC authenticates the APs, and the APs obtain the software
package and the initial and dynamic configurations from the AC. CAPWAP tunnels are
established between the AC and APs. CAPWAP tunnels include control and data
tunnels. The control tunnel is used to transmit control packets (also called
management packets, which are used by the AC to manage and control APs). The data
tunnel is used to transmit data packets. The CAPWAP tunnels allow for Datagram
Transport Layer Security (DTLS) encryption, so that transmitted packets are more
secure.
• Compared with the Fat AP architecture, the "AC + Fit AP" architecture has the
following advantages:
addition, the channels and power of APs on the entire network are automatically
• Security: Fat APs cannot be upgraded in a unified manner, which cannot ensure
the latest security patches are installed for all AP versions. In the "AC + Fit AP"
architecture, security capabilities are mainly implemented on the AC, and we only
need to perform the software upgrade and security configuration on the
AC. This allows for quick global security settings. Additionally, to prevent
process. The AC also implements some security functions that are not
• In Layer 3 networking, the AC and Fit APs are in different network segments, making
the configuration complex. The intermediate network must ensure that the Fit APs and
AC are reachable to each other. Additional configurations are required to enable the
Fit APs to discover the AC. Layer 3 networking is suitable for medium- and large-scale
networks. When ACs and APs are connected through a Layer 3 network and the APs
discover an AC in DHCP/DNS mode (the AC functioning as the DHCP server), the
devices between the APs and the AC must support the DHCP relay function.
• To meet the requirements of large-scale networking, multiple APs on the network need
to be centrally managed. The traditional WLAN architecture cannot meet the
requirements of large-scale networking. Therefore, the Internet Engineering Task Force
(IETF) sets up the CAPWAP working group and formulates the CAPWAP protocol. This
protocol defines how an AC manages and configures APs. That is, a CAPWAP tunnel is
established between an AC and an AP, through which the AC manages and controls
the AP.
▫ CAPWAP data and control packets are transmitted on different UDP ports:
• The AC only manages APs, and service data is forwarded locally. Management traffic is
encapsulated in the CAPWAP tunnel and terminated on the AC, whereas AP service
data traffic is directly forwarded by the AP to a switching device without CAPWAP
encapsulation.
• The data forwarding mode is commonly used. Wireless user service data does not need
to be processed by an AC, eliminating the bandwidth bottleneck and facilitating the
usage of existing security policies. Therefore, this mode is recommended for converged
network deployment.
• Direct forwarding is often used in in-path networking mode. This networking mode
simplifies the network architecture and applies to small- and medium-scale centralized
WLANs.
• Direct forwarding can also be used in off-path networking mode. In this mode, wireless
user service data does not need to be processed by an AC, eliminating the bandwidth
bottleneck and facilitating the usage of existing security policies. This mode applies to
▫ Uplinks can back up each other. The master and backup devices in a VRRP group
can track the status of uplink interfaces. The master/backup status of an AC may
be different from its downlink status.
• During the network design, consider the redundancy design for devices and links and
deploy switchover policies. In this way, even if a single point of failure occurs, the
system functions are not affected. The AC backup design is essential to the "AC + Fit
AP" architecture.
• In addition to the active/standby HSB mode, the load balancing mode is supported. In
load balancing mode, you can specify AC1 as the active AC for some APs and AC2 as
the active AC for other APs, so that the APs set up primary CAPWAP tunnels with their
• Dual-link HSB frees active and standby ACs from location restrictions and allows for
flexible deployment. The two ACs can implement load balancing to make efficient use
• HSB service backup in real time involves backup for the following information:
▫ AP entries
• The HSB channel can be carried by a directly connected physical link between two ACs
or by a switch.
• When the CAPWAP tunnel between an AP and the active AC is disconnected, the AP
attempts to establish a CAPWAP tunnel with the standby AC. After the new CAPWAP
tunnel is established, the AP restarts and obtains configurations from the standby AC.
During this process, services are affected.
WAN authentication bypass typically applies to HQ-branch networks where branch
networks connect to the HQ network across a WAN. In traditional solutions, most
WLAN services are centrally processed by ACs, posing high requirements for the WAN,
for example, large bandwidth, low delay, and high stability. However, in actual
scenarios, enterprise private lines are not often used between the HQ and branches.
They often lease carrier networks, so the quality of intermediate networks cannot be
ensured, resulting in poor network security and user experience.
To solve the preceding problems, branch AP groups are created in branches, and
services such as user access and access authentication are processed by APs. This
approach reduces the dependency of branches on the HQ. If a branch is disconnected
from the HQ, branch users can still use the WLAN.
Implementation process: In the "AC + Fit AP" architecture, user authentication is
performed on the AC, and only rights control is performed on the AP. Therefore, access
authentication configurations are not deployed on the AP. When the WAN is
interrupted and the AC and APs are disconnected, the APs need to have the local
authentication function configured and authenticate newly accessed STAs. In this case,
the AC needs to deliver access authentication configurations to the APs.
▫ Delivery of the same configuration information on the AP and AC: To reduce the
workload of the administrator, configurations in the VAP profile are reused for
the same configuration on the AP and AC. Delivered configurations include the
authentication profile bound to the VAP profile, as well as the 802.1X and MAC
access profiles bound to the authentication profile.
• After a cloud AP is deployed, the network administrator does not need to go to the site
for cloud AP software commissioning. After being powered on, the cloud AP
automatically connects to the specified cloud management platform to load system
files such as the configuration file, software package, and patch file. In this manner,
the cloud AP can go online with zero-touch configuration. The network administrator
can deliver configurations to the cloud AP through the cloud management platform at
anytime and anywhere, facilitating batch service configurations.
• Some micro and small enterprises need to build their own wireless networks that are
managed independently without the cloud management architecture. If the Fat AP
architecture is used, APs cannot be managed and maintained in a unified manner, and
users cannot enjoy good roaming experience. If the "AC + Fit AP" architecture is used,
only a few APs are required due to the small number of STAs and the small wireless
coverage area, but the AC and license costs are high. If an AP can manage other APs
and provide unified O&M capability and continuous roaming experience, the
enterprises' requirement can be met. The leader AP architecture designed by Huawei
will work.
• The leader AP architecture involves APs only. After purchasing APs, a user can set one
AP to the leader AP mode and connect the other APs to the network in Fit AP mode.
The other APs communicate with the leader AP at Layer 2. After the leader AP
broadcasts its role on the Layer 2 network, the other APs automatically discover and
connect to the leader AP. Similar to the AC, the leader AP provides unified access
management, configuration, and O&M based on CAPWAP tunnels, enabling centralized
wireless resource management and roaming management. Users only need to log in to
the leader AP and configure wireless services. After the configuration, all APs provide
the same wireless services, and STAs can roam between different APs.
• Simple network planning: The cloud-based or offline WLAN planning tool (WLAN
Planner) provides building drawings, automatic deployment, and many more
capabilities, making network planning easy and efficient.
• Customer benefits:
1. Simple management: The AC only needs to manage a small number of central APs,
and only 200 APs require management to cover about 10,000 rooms.
2. Flexible deployment and full signal coverage without coverage holes: A central AP
connects to RUs through network cables, causing no wall penetration loss or feeder
loss and providing high-quality signal coverage. The RUs support various mounting
modes such as junction box-, wall-, and ceiling-mounting.
3. Long-distance coverage: Different from traditional APs with antennas that support
only 15 m coverage distance, the central AP can connect to RUs through network
cables at a maximum distance of 100 m, expanding the network deployment scope
by several times. If the central AP is deployed in a corridor, it can provide long-
distance coverage (exceeding 100 m).
• A
• A configuration file is a collection of command lines. Current configurations are stored in a
configuration file so that the configurations are still effective after the device restarts.
Users can view configurations in the configuration file and upload the configuration file to
other devices to implement batch configuration.
• A patch is a kind of software compatible with the system software. It is used to fix bugs in
system software. Patches can also fix system defects and optimize some functions to
meet service requirements.
• To manage files on a device, log in to the device through either of the following modes:
▫ NVRAM is nonvolatile. Writing logs to the flash memory consumes CPU resources
and is time-consuming. Therefore, the buffer mechanism is used. Specifically, logs
are first saved to the buffer after being generated, and then written to the flash
memory after the timer expires or the buffer is full.
▫ The flash memory and SD card are nonvolatile. Configuration files and system files
are stored in the flash memory or SD card. For details, see the product
documentation.
▫ SD cards are external memory media used for memory expansion. The USB is
considered an interface. It is used to connect to a large-capacity storage medium for
device upgrade and data transmission.
▫ Patch and PAF files are uploaded by maintenance personnel and can be stored in a
specified directory.
• BootROM is a set of programs added to the ROM chip of a device. BootROM stores the
device's most important input and output programs, system settings, startup self-check
program, and system automatic startup program.
• The startup interface provides the information about the running program of the system,
the running VRP version, and the loading path.
• To limit users' access permissions to a device, the device manages users by level and
establishes a mapping between user levels and command levels. After a user logs in to a
device, the user can use only commands of the corresponding levels or lower. By default,
the user command level ranges from 0 to 3, and the user level ranges from 0 to 15. The
mapping between user levels and command levels is shown in the table.
• Note: The login page, mode, and IP address may vary according to devices. For details,
see the product documentation.
• Use a console cable to connect the console port of a device with the COM port of a
computer. You can then use PuTTY on the computer to log in to the device and perform
local commissioning and maintenance. A console port is an RJ45 port that complies with
the RS232 serial port standard. At present, the COM ports provided by most desktop
computers can be connected to console ports. In most cases, a laptop does not provide a
COM port. Therefore, a USB-to-RS232 conversion port is required if you use a laptop.
• The console port login function is enabled by default and does not need to be pre-
configured.
• Many terminal simulators can initiate console connections. PuTTY is one of the options for
connecting to VRP. If PuTTY is used for access to VRP, you must set port parameters.
The figure in the slide shows examples of port parameter settings. If the parameter values
were ever changed, you need to restore the default values.
• After the settings are complete, click Open. The connection with VRP is then set up.
• By default, the SSH login function is disabled on a device. You need to log in to the device
through the console port and configure mandatory parameters for SSH login before using
the SSH login function.
• The CLI is an interface through which users can interact with a device. When the
command prompt is displayed after a user logs in to a device, it means that the user has
entered the CLI successfully.
• The user view is the first view displayed after you log in to a device. Only query and tool
commands are provided in the user view.
• In the user view, only the system view can be accessed. Global configuration commands
are provided in the system view. If the system has a lower-level configuration view, the
command for entering the lower-level configuration view is provided in the system view.
• After you log in to the system, the user view is displayed first. This view provides only
display commands and tool commands, such as ping and telnet. It does not provide any
configuration commands.
• You can run the system-view command in the user view to enter the system view. The
system view provides some simple global configuration commands.
• The dir [/all] [ filename | directory ] command displays information about files in the current
directory.
• The more [/binary] filename [ offset ] [ all ] command displays the content of a text file.
• In this example, the dir command is run in the user view to display information about files
in the flash memory.
• Common commands for operating directories include cd directory, mkdir directory, and
rmdir directory.
• The mkdir directory command creates a directory. A directory name can contain 1 to 64
characters.
• The rmdir directory command deletes a directory from the file system. A directory to be
deleted must be empty; otherwise, it cannot be deleted using this command.
• The copy source-filename destination-filename command copies a file. If the target file
already exists, the system displays a message indicating that the target file will be
replaced. The target file name cannot be the same as the system startup file name.
Otherwise, the system displays an error message.
• The delete [/unreserved] [ /force ] { filename | devicename } command deletes a file. If the
unreserved parameter is not specified, the deleted file is moved to the recycle bin. A file in
the recycle bin can be restored using the undelete command. However, if the /unreserved
parameter is specified, the file is permanently deleted and cannot be restored any more. If
the /force parameter is not specified in the delete command, the system displays a
message asking you whether to delete the file. However, if the /force parameter is
specified, the system does not display the message. filename specifies the name of the
file to be deleted, and devicename specifies the name of the storage medium.
• The reset recycle-bin [ filename | devicename ] command permanently deletes all or a
specified file in the recycle bin. filename specifies the name of the file to be permanently
deleted, and devicename specifies the name of the storage medium.
• Generally, more than one device is deployed on a network, and the administrator needs to
manage all devices in a unified manner. The first task of device commissioning is to set a
system name. A system name uniquely identifies a device. The default system name of an
AR series router is Huawei, and that of an S series switch is HUAWEI. A system name
takes effect immediately after being set.
• To ensure successful coordination with other devices, you need to correctly set the
system clock. System clock = Coordinated Universal Time (UTC) ± Time difference
between the UTC and the time of the local time zone. Generally, a device has default UTC
and time difference settings.
▫ You can run the clock datetime command to set the system clock of the device. The
date and time format is HH:MM:SS YYYY-MM-DD. If this command is run, the UTC
is the system time minus the time difference.
▫ You can also change the UTC and the system time zone to change the system
clock.
▫ If a region adopts the daylight saving time, the system time is adjusted according to
the user setting at the moment when the daylight saving time starts. VRP supports
the daylight saving time function.
• Each type of user interface has a corresponding user interface view. A user interface view
is a command line view provided by the system for you to configure and manage all
physical and logical interfaces working in asynchronous interaction mode, implementing
unified management of different user interfaces. Before accessing a device, you need to
set user interface parameters. The system supports console and VTY user interfaces. The
console port is a serial port provided by the main control board of a device. A VTY is a
virtual line port. A VTY connection is set up after a Telnet or SSH connection is
established between a user terminal and a device, allowing the user to access the device
in VTY mode. Generally, a maximum of 15 users can log in to a device through VTY at the
same time. You can run the user-interface maximum-vty number command to set the
maximum number of users that can concurrently access a device in VTY mode. If the
maximum number of login users is set to 0, no user can log in to the device through Telnet
or SSH. The display user-interface command displays information about a user interface.
• The maximum number of VTY interfaces may vary according to the device type and used
VRP version.
• To run the IP service on an interface, you must configure an IP address for the interface.
Generally, an interface requires only one IP address. For the same interface, a newly
configured primary IP address replaces the original primary IP address.
• You can run the ip address { mask | mask-length } command to configure an IP address
for an interface. In this command, mask indicates a 32-bit subnet mask, for example,
255.255.255.0; mask-length indicates a mask length, for example, 24. Specify either of
them when configuring an IP address.
• When configuring an IP address for a physical interface, check the physical status of the
interface. By default, interfaces are up on Huawei routers and switches. If an interface is
manually disabled, run the undo shutdown command to enable the interface after
configuring an IP address for it.
• The reset saved-configuration command deletes the configurations saved in a
configuration file or the configuration file. After this command is run, if you do not run the
startup saved-configuration command to specify the configuration file for the next startup
or the save command to save current configurations, the device uses the default
parameter settings during system initialization when it restarts.
• The display startup command displays the system software for the current and next
startup, backup system software, configuration file, license file, and patch file, as well as
voice file.
• The reboot command restarts a device. Before the device reboots, you are prompted to
save configurations.
• For some devices, after the authentication-mode password command is entered, the
password setting page will be displayed automatically. You can then enter the password
at the page that is displayed. For some devices, you need to run the set authentication-
mode password password command to set a password.
• To save configurations, run the save command. By default, configurations are saved in
the vrpcfg.cfg file. You can also create a file for saving the configurations. In VRPv5, the
configuration file is stored in the flash: directory by default.
• The display startup command displays the system software for the current and next
startup, backup system software, configuration file, license file, and patch file, as well as
voice file.
▫ Startup system software indicates the VRP file used for the current startup.
▫ Next startup system software indicates the VRP file to be used for the next startup.
▫ Startup saved-configuration file indicates the configuration file used for the current
system startup.
▫ Next startup saved-configuration file indicates the configuration file to be used for
the next startup.
▫ When a device starts, it loads the configuration file from the storage medium and
initializes the configuration file. If no configuration file exists in the storage medium,
the device uses the default parameter settings for initialization.
• Optimize system resources: The hardware performance of the device can be fully used to
improve the system smoothness.
• Add new functions: Provide customers with required product features to improve user
experience.
• You can download the required system software from Huawei official website.
• Before using FTP to download files, ensure that the AC can communicate with the FTP
server and set up an FTP connection.
• To upgrade the functions or versions of an existing WLAN, perform an in-service upgrade
for APs or load patches on the WLAN.
▫ Upgrade of a single AP: allows you to upgrade a single AP to check whether the
upgrade version can function properly. If the upgrade is successful, upgrade other
APs in batches.
• Similar to the in-service upgrade, in-service patch loading allows you to load the patch for
a single AP, APs of a specified type, or APs in a specified AP group.
• Three AP upgrade modes are supported. Run the following commands as required.
▫ Run the ap update mode ftp-mode command to set AP upgrade to FTP mode.
▫ Run the ap update mode sftp-mode command to set AP upgrade to SFTP mode.
• Before upgrading an AP through an AC, ensure that the AP can go online on the AC and
the AP upgrade file is saved in the root directory of the AC.
• If the AP is in vmiss state and cannot be upgraded for a long time, you can run the restart
command to restart the AP.
• 1. Prepare the environment: Configure the IP address and FTP server software on the
PC. Download the Fat AP software package of the target version to the FTP server.
Check network connectivity and the indicator states of the AP.
• 2. Check AP information: On the PC, log in to the AP through the console port to check
the version and working mode of the AP.
• 3. Start switching: Run the ap-mode-switch fat ftp filename server-ip-address user-name
password [ port] command in the system view. Then restart the AP.
• 4. Verify the switching: Log in to the AP again and check the working mode of the AP.
• The default IP address of the AP is 169.254.1.1/24, the user name is admin, and the
password is admin@Huawei.com.
• Command: country-code country-code
▪ AU: Australia
▪ CA: Canada
▪ DE: Germany
▪ FR: France
▪ ...
• Command: ssid ssid
▫ To start an SSID with a space, you need to encompass the SSID with double
quotation marks ("), for example, " hello". The double quotation marks occupy two
characters. To start an SSID with a double quotation mark, you need to add a
backslash (\) before the double quotation mark, for example, \"hello. The backslash
occupies one character.
• Service Requirements
• Networking Requirements
• Configuration roadmap:
▫ Switch configuration:
▪ [SW-GigabitEthernet0/0/1]quit
▫ AP configuration:
▪ [AP-GigabitEthernet0/0/0]quit
• 1. ABC
• As WLAN technologies use radio signals to transmit service data, service data can be
easily intercepted or tampered with by attackers when being transmitted on open wireless
channels. Configuring WLAN security can protect WLANs against attacks and secure
information and services of authorized users..
▫ User access security: Link authentication and access authentication are used to
ensure validity and security of user access on wireless networks.
▫ Service security: Protects service data of authorized users from being intercepted by
unauthorized users during transmission.
• The STA sends an authentication request to the AP.
• The STA uses the preset key to encrypt the challenge and sends the encrypted challenge
to the AP.
• The AP receives the encrypted challenge, decrypts it by using a preset key, and then
compares the decrypted challenge with the one previously sent to the STA. If they are the
same, the authentication is successful. Otherwise, the authentication fails.
• WEP uses the RC4 algorithm to encrypt data through a 64-bit, 128-bit, or 152-bit
encryption key. Each encryption key contains a 24-bit initialization vector (IV) generated
by the system. Therefore, the length of the key configured on the WLAN server and client
is 40 bits, 104 bits, or 128 bits. WEP uses a static key. All STAs associated with the same
SSID use the same key to join a WLAN.
• A WEP security policy defines a link authentication mechanism and a data encryption
mechanism.
▫ If open system authentication is used, WEP encryption is not required during link
authentication. After a user goes online, service data can be encrypted by WEP or
not, depending on the configuration.
• To solve the problems with WEP, Wi-Fi Alliance introduced the Wi-Fi Protected Access
(WPA). In addition to the RC4 algorithm, WPA defines the Temporal Key Integrity Protocol
(TKIP) encryption algorithm on the basis of WEP, uses the 802.1X identity authentication
framework, and supports Extensible Authentication Protocol-Protected Extensible
Authentication Protocol (EAP-PEAP) and EAP-Transport Layer Security (EAP-TLS)
authentication.
• Subsequent to WPA, IEEE 802.11i defined WPA2, which uses a more secure encryption
algorithm: Counter Mode with CBC-MAC Protocol (CCMP).
• For the sake of better compatibility, both WPA and WPA2 can use 802.1X access
authentication and the TKIP or CCMP encryption algorithm. With almost the same security
level, WPA and WPA2 mainly differ in the protocol packet format.
• To sum up, the WPA or WPA2 security policy involves four phases: link authentication,
access authentication, key negotiation, and data encryption.
• In PSK authentication, a key must be configured on a STA. Then an AP negotiates with
the STA through four-way handshake to validate the STA's key. The WPA-PSK mode can
be used on networks with low security requirements.
• PSK authentication requires that a WLAN client and a WLAN server be configured with
the same pre-shared key. A client and a server authenticate each other through key
negotiation. During key negotiation, the client and server use their pre-shared keys to
decrypt the messages sent from each other. If the messages are successfully decrypted,
the client and server have the same pre-shared key.
• When PSK authentication is used in WPA/WPA2, only one pre-shared key needs to be
entered in advance on each WLAN node. Although the deployment is simple, the pre-
shared key is the same for all clients that connect to the same WLAN, which results in the
key being shared to unauthorized users.
• As shown in the figures, in WPA/WPA2-PSK authentication, all clients connected to the
specified SSID use the same key, which may bring security risks. In WPA/WPA2-PPSK
authentication, users connected to the same SSID can have different keys and be
authorized with different permissions. If a user has multiple client devices, these client
devices can connect to a WLAN using the same PPSK user account.
• WPA/WPA2-PPSK authentication has the following characteristics:
▫ Users connected to the same SSID can have different keys.
▫ This authentication mode is easy to configure and deploy.
▫ If a user has multiple client devices, these client devices can access a WLAN by
using the same PPSK user account.
▫ A PPSK user is bound to a user group or an authorized VLAN. Therefore, different
PPSK users can be authorized with different permissions.
• As WLANs use open transmission media, data is facing great risks if no encryption
mechanism is used on transmission links. Anyone with an appropriate tool can intercept
unprotected data transmitted on open transmission medium.
▫ Integrity means that data is not being tampered with during transmission.
▫ Authentication is the basis for all security policies. Data validity partially depends on
reliability of the data source, so the data receiver must verify correctness of the data
source. A system must protect data through authentication. Authorization and
access control are both based on data authenticity. Before allowing a user to access
any data, the system must verify the user's identity.
• Authentication has been described in the preceding slides. Therefore, WLAN encryption is
to ensure data confidentiality and integrity.
• The 802.1X authentication system uses the Extensible Authentication Protocol (EAP) to
implement information exchange between the supplicant, authenticator, and
authentication server. Common 802.1X authentication protocols include Protected
Extensible Authentication Protocol (PEAP) and Transport Layer Security (TLS). Their
differences are as follows:
▫ PEAP: The administrator assigns a user name and password to the user. The user
enters the user name and password for authentication when accessing a WLAN.
▫ TLS: Users use certificates for authentication. This authentication mode is usually
used together with enterprise apps, such as Huawei AnyOffice.
• Advantages:
▫ Ease of use: In most cases, portal authentication does not require the client to have
additional software installed and allows the client to be directly authenticated on a
web page.
• If a STA's MAC address is stored on the RADIUS server, the RADIUS server checks the
user name and password (both are the MAC address) and directly authorizes the STA.
Then the STA can access the network without entering the user name and password.
• If the STA's MAC address expires on the RADIUS server, the RADIUS server deletes the
STA's MAC address. MAC address authentication fails and the access device pushes the
portal authentication page to the STA. In this case, the user needs to enter the user name
and password for identity authentication.
• Command: security open
▫ security wep share-key: When the WEP authentication mode is set to shared key:
▪ If this parameter is specified, the shared key is used to authenticate STAs and
encrypt service packets
▪ If this parameter is not specified, the shared key is used only to encrypt
service packets.
▫ security wep dynamic: Sets the WEP authentication mode to dynamic WEP.
• Command: wep key key-id { wep-40 | wep-104 | wep-128 } { pass-phrase | hex } key-value
• Configuration roadmap:
▫ Select a language.
▪ The web system supports English and Chinese and automatically adapts to
the language used by the web browser.
▪ The default user name and password are admin and admin@huawei.com,
respectively.
▪ To ensure security of the web system, you are prompted to change the
password upon the first login, and log in again.
• Click the logout icon on the upper right of the page to return to the login page.
▫ A country code identifies the country in which the APs are deployed. Country codes
regulate different AP radio attributes, including the transmit power and supported
channels. Correct country code configuration ensures that radio attributes of APs
comply with local laws and regulations.
▫ Specify a unique IP address, VLANIF interface, or loopback interface for each AC.
In this manner, APs connected to an AC can learn the specified IP address or the IP
address of the specified interface to establish CAPWAP tunnels with the AC for
communication. This specified IP address or interface is called the source address
or interface.
▫ APs can establish CAPWAP tunnels with the AC only after the AC's source interface
or address is specified.
• Add APs: Configure the AP authentication mode and enable APs to go online.
▫ You can add APs by manual configuration, automatic discovery, and manual
confirmation, that is, importing APs before they go online, configuring the AC to
automatically discover APs, and manually confirming APs in the unauthenticated AP
list.
• There are a large number of APs on a WLAN, among which many require the same
configurations. To simplify AP configurations, add these APs to an AP group and perform
configurations uniformly in the AP group. However, APs may have different configurations.
These configurations cannot be uniformly performed but can be directly performed on
each AP. Each AP will be added and can be added to only one AP group when going
online. If an AP obtains both AP group and specific configurations from an AC, the AP
specific configurations are preferentially used.
• The following profiles can be bound to an AP group and AP: regulatory domain profile, AP
system profile, radio profile, and VAP profile. Regulatory domain profile:
▪ A country code identifies the country in which the APs are deployed. Country
codes regulate different AP radio attributes, including the transmit power and
supported channels. Correct country code configuration ensures that radio
attributes of APs comply with local laws and regulations.
▪ A calibration channel set limits the dynamic adjustment range for AP channels
when the radio calibration function is configured. Exclude radar channels and
the channels that are not supported by STAs from the calibration channel set.
▫ Radio profile:
▪ You can adjust and optimize radio parameters to adapt to different network
environments, enabling APs to provide required radio capabilities and
improving signal quality. After parameters in a radio profile are delivered to an
AP, only the parameters supported by the AP can take effect.
▪ Configurable parameters include the radio type, radio rate, multicast rate of
radio packets, and interval at which an AP sends Beacon frames.
• SSID profile: allows you to configure an SSID name for a WLAN and other functions,
including:
▫ SSID hiding: When creating a WLAN, configure an AP to hide the SSID name to
ensure WLAN security. In this manner, only the STAs that know the SSID can
connect to the WLAN.
▫ Maximum number of STAs on a VAP: More access STAs on a VAP indicate less
network resources that are available to each STA. To ensure Internet access
experience, you can configure a proper maximum number of access STAs on a
VAP based on site requirements.
▫ SSID hiding when the number of STAs reaches the maximum: With this function,
when the number of access STAs on a WLAN reaches the maximum, the SSID of
the WLAN is hidden so that new STAs cannot find the SSID.
• Security profile: allows you to configure a WLAN security policy to authenticate STAs and
encrypt STA packets, securing both the WLAN and STAs.
▫ [SW-GigabitEthernet0/0/1] quit
▫ [SW-GigabitEthernet0/0/2] quit
• 1. CD
• Regulatory domain profile:
▫ A country code identifies the country in which the APs are deployed. Country codes
regulate different AP radio attributes, including the transmit power and supported
channels. Correct country code configuration ensures that radio attributes of APs
comply with local laws and regulations.
▫ Specify a unique IP address, VLANIF interface, or loopback interface for each AC.
In this manner, APs connected to an AC can learn the specified IP address or the IP
address of the specified interface to establish CAPWAP tunnels with the AC for
communication. This specified IP address or interface is called the source address
or interface.
▫ APs can establish CAPWAP tunnels with the AC only after the AC's source interface
or address is specified.
• Add APs: Configure the AP authentication mode and enable APs to go online.
▫ You can add APs by manual configuration, automatic discovery, and manual
confirmation, that is, importing APs before they go online, configuring the AC to
automatically discover APs, and manually confirming APs in the unauthenticated AP
list.
• There are a large number of APs on a WLAN, among which many require the same
configurations. To simplify AP configurations, add these APs to an AP group and perform
configurations uniformly in the AP group. However, APs may have different configurations.
These configurations cannot be uniformly performed but can be directly performed on
each AP. Each AP will be added and can be added to only one AP group when going
online. If an AP obtains both AP group and specific configurations from an AC, the AP
specific configurations are preferentially used.
• The following profiles can be bound to an AP group and AP: regulatory domain profile, AP
system profile, radio profile, and VAP profile. Regulatory domain profile:
▪ A country code identifies the country in which the APs are deployed. Country
codes regulate different AP radio attributes, including the transmit power and
supported channels. Correct country code configuration ensures that radio
attributes of APs comply with local laws and regulations.
▪ A calibration channel set limits the dynamic adjustment range for AP channels
when the radio calibration function is configured. Exclude radar channels and
the channels that are not supported by STAs from the calibration channel set.
▫ Radio profile:
▪ You can adjust and optimize radio parameters to adapt to different network
environments, enabling APs to provide required radio capabilities and
improving signal quality. After parameters in a radio profile are delivered to an
AP, only the parameters supported by the AP can take effect.
▪ Configurable parameters include the radio type, radio rate, multicast rate of
radio packets, and interval at which an AP sends Beacon frames.
• SSID profile: allows you to configure an SSID name for a WLAN and other functions,
including:
▫ SSID hiding: When creating a WLAN, configure an AP to hide the SSID name to
ensure WLAN security. In this manner, only the STAs that know the SSID can
connect to the WLAN.
▫ Maximum number of STAs on a VAP: More access STAs on a VAP indicate less
network resources that are available to each STA. To ensure Internet access
experience, you can configure a proper maximum number of access STAs on a
VAP based on site requirements.
▫ SSID hiding when the number of STAs reaches the maximum: With this function,
when the number of access STAs on a WLAN reaches the maximum, the SSID of
the WLAN is hidden so that new STAs cannot find the SSID.
• Security profile: allows you to configure a WLAN security policy to authenticate STAs and
encrypt STA packets, securing both the WLAN and STAs.
▫ ap-id: specifies the ID of an AP. The value is an integer that ranges from 0 to 8191.
▫ type-id type-id: specifies the ID of an AP type. The value is an integer that ranges
from 0 to 255.
▫ ap-mac ap-mac: specifies the MAC address of an AP. The value is in H-H-H format.
An H is a 4-digit hexadecimal number.
▫ To start an SSID with a space, you need to encompass the SSID with double
quotation marks ("), for example, " hello". The double quotation marks occupy two
characters. To start an SSID with a double quotation mark, you need to add a
backslash (\) before the double quotation mark, for example, \"hello. The backslash
occupies one character.
• Command: display vap { ap-group ap-group-name | { ap-name ap-name | ap-id ap-id } [
radio radio-id ] } [ ssid ssid ]
▫ ap-id ap-id: displays information about service VAPs on the AP with a specified ID.
The AP ID must exist.
▫ radio radio-id: displays information about service VAPs of a specified radio. The
value is an integer that ranges from 0 to 2.
▫ ssid ssid: displays information about service VAPs of a specified SSID. The SSID
must exist.
▫ [SW-GigabitEthernet0/0/1] quit
▫ [SW-GigabitEthernet0/0/2] quit
• AC configuration:
▫ [AC-GigabitEthernet0/0/1] quit
• 1. B
• The binary command sets the file transfer mode to binary on an FTP client.
• The ASCII mode is used to transfer plaintext files, and the binary mode is used to transfer
application files, such as system software (with the file name extension of .cc or .pat),
images, video files, compressed files, and database files.
• Parameter description of the ping command
▫ -a: specifies the source IP address of the ICMP Echo Request message. If the
source IP address is not specified, the IP address of the outbound interface is used
as the source IP address of the ICMP Echo Request message.
▫ -c: specifies the number of times for sending ICMP Echo Request messages. The
default value is 5. If the network quality is poor, you can increase the parameter
value to determine the network quality based on the packet loss rate.
▫ -f: indicates that packets are not fragmented when they are sent. The device
discards the packets if the packet size exceeds the MTU.
▫ -s: specifies the length of an ICMP Echo Request message, excluding the IP header
and ICMP header.
▫ -t: specifies the timeout interval of ICMP Echo Reply messages. You can set a
larger timeout interval if the network is unstable. The default value is 2 seconds. If
the device receives no Echo Response message within 2 seconds, it determines
that the destination is unreachable.
• Outdoor antennas are the most important part in an outdoor WLAN project. Antenna types
decide whether signals can be stably transmitted in a long distance. When selecting
antenna types, consider the antenna's coverage range and angle. For a short coverage
range, low-gain omnidirectional or directional antennas are recommended. For a long
coverage range, high-gain directional antennas are recommended. For outdoor long-
distance point-to-point transmission, high-gain small-angle antennas are recommended.
• Directional antennas can provide a high gain. Generally, an antenna with a smaller angle
provides a higher gain and therefore supports a longer signal transmission distance.
However, such antennas are difficult to install and adjust. They must be properly aligned
to each other on the transmitter and receiver to ensure efficient signal transmission.
Therefore, such antennas are suitable for long-distance transmission but must be properly
placed.
• Advantages of smart antennas:
▫ Large coverage area: Smart antennas bring centralized energy and high gain,
providing a large coverage range. The coverage range of a smart omnidirectional
antenna is equivalent to that of a directional antenna.
▫ Low pollution to the environment: A smart antenna provides satisfied power for
STAs using low transmit power. This reduces the electromagnetic wave pollution to
the environment.
• An element with the arms of the same length is called a symmetric element. A half-wave
symmetric element has a length of 1/4 wavelength and a full length of 1/2 wavelength on
each arm.
• Half-wave symmetric elements can be used independently or as the feed source of a
parabolic antenna. In addition, multiple half-wave symmetric elements can constitute an
antenna array.
• When the two conducting wires are close to each other, the electric field is limited
between them and the radiation is weak. When two conducting wires are far away from
each other, the electric field is enlarged and the radiation is enhanced.
• When the two conducting wires are too close to each other and form a straight line, they
become an antenna.
• When the wire length is 1/4 of the signal wavelength, the radiation is the maximum, which
is called the basic element.
• When the two conducting wires are charged, an electric field is produced between the two
poles. A magnetic field is produced when current flows between the metal bodies.
• When the two conducting wires are slightly farther from each other, an electric field and a
magnetic field will be produced in the space around the metal bodies.
• If the conducting wires form a straight line, an electromagnetic field is produced outside
the wires.
• When the length of a conducting wire (L) is far smaller than the wavelength (λ), the
radiation is weak. When the conducting wire length is almost the same as the wavelength,
current on the conducting wire greatly increases, producing strong radiation. Such straight
conducting wire that can produce strong radiation is called element.
• Due to the characteristics of electrical waves, the horizontally polarized signals generate
current when approaching to the ground. Polarized current generates heat due to ground
impedance. As a result, electrical field signals are attenuated. The vertically polarized
signals do not generate current, so energy will not be attenuated. Therefore, vertical
polarization is widely used in mobile communication. For example, Huawei uses vertically
polarized antennas or ±45° dual-polarized antennas in wireless communication
systems.
• The polarization direction of the antenna is the electric field direction of the
electromagnetic field of antenna radiation.
▫ If the electric field of the radio wave is perpendicular to the ground, the radio wave is
a vertical polarization wave.
▫ If the electric field of the radio wave is parallel to the ground, the radio wave is a
horizontal polarization wave.
• A dual-polarized antenna is a combination of vertically polarized antennas and
horizontally polarized antennas, or a combination of +45° polarized antennas and -45°
polarized antennas.
• With development of new technologies, dual-polarized antennas are widely used now.
There are two polarization modes: vertical and horizontal polarization and ±45°
polarization. The ±45° polarization mode has better performance than the vertical and
horizontal polarization modes. Therefore, the ±45° polarization mode is used in most
cases. A dual-polarized antenna combines two orthogonal antennas with polarization
directions of +45° and –45° and works in duplex mode, which greatly reduces the
number of antennas in each cell. In addition, the orthogonal polarization (±45°) ensures
the good effect of receive diversity.
• Vertically and horizontally polarized waves are received by antennas with vertical and
horizontally polarization characteristics, respectively. Right-handed and left-handed
circular polarization waves are received using antennas with right-handed and left-handed
circular polarization characteristics, respectively. If the polarization direction of the
incoming waves is different from that of the receiving antenna, polarization loss occurs.
For example, polarization loss occurs when a +45° polarization antenna is used to
receive vertically or horizontally polarized waves, or when a vertically polarized antenna is
used to receive +45° polarization or –45° polarization waves. Similarly, when the
circular polarization antenna receives linear polarization waves or vice versa, signals are
attenuated. The received signals may be only a half of the total signals.
• As shown in the preceding figure, when the transmit antenna is vertically placed and the
receive antenna is horizontally placed, the receive antenna cannot receive signals from
the transmit antenna. The electric field polarization direction of electromagnetic waves
emitted by the transmit antenna is vertical. When the vertical electric field acts on the
receive antenna, the electrons on the antenna conductor cannot move under the electric
field. Therefore, the electric field cannot generate current.
• When both the transmit antenna and the receive antenna are placed vertically, the
polarization direction of electromagnetic waves emitted by the transmit antenna is vertical.
When the vertical electric field acts on the receive antenna, electrons on the antenna
move vertically under the electric field. Therefore, the receive antenna generates current.
• A gain is the ratio of the signal output of a system to the signal input of the same system.
Assume that the transmit antenna is an ideal undirectional source and the input power is
100 W. If the transmit antenna is a directional antenna with a gain of 13 dB (20 times the
original signal), only 5 W (100/20) of input power is required. That is, an antenna's gain is
the amplifier of input power of the undirectional ideal radiation source.
• If the antenna gain is measured based on half-wave symmetric elements, the gain unit is
dBd.
• When selecting gain, ensure that the beam matches the coverage distance. If the
coverage distance is small, select low-gain antennas with wide vertical lobes to ensure
the coverage effect in the area near the antenna.
▫ 0 dBm = 1 mW
▫ 3 dBm = 2 mW
▫ -3 dBm = 0.5 mW
▫ 10 dBm = 10 mW
▫ When transmitting signals within 100 m on the 2.4 GHz frequency band, the power
loss of a 1/2-inch feeder is about 12.1 dB.
▫ If the power of A is 12 dBd and that of B is 14 dBd, the gain of A is 2 dB lower than
that of B.
• Different antennas have different radiation patterns. Radiation patterns of some antennas
have many lobes. The lobe with the maximum radiation is the main lobe, and the other
lobes are back and side lobes. The areas between the main lobe and side lobes have
weak radiation.
• At the two sides of the main lobe, the radiation is reduced by 3 dB (power density is
reduced by half). The angle between the two sides is defined as beamwidth (also called
main-lobe width or half-power angle). A smaller beamwidth indicates better directionality,
larger coverage, and stronger anti-interference capabilities.
• When deploying antennas, note that side lobes will interfere with peripheral cells.
Generally, the main-lobe radiation needs to be enhanced, and side-lobe radiation needs
to be suppressed. However, in the areas near the antennas, we can enhance the side-
lobe radiation to eliminate coverage holes.
• There is another beamwidth (10 dB). It is the angle between the points in the main lobe
that are down from the maximum radiation by 10 dB (power density reduced to one tenth).
• The FBR is valid only for directional antennas. It refers to the ratio of the power density in
the antenna forward maximum radiation direction to the power density in the backward
maximum radiation direction within ±30-degree range. The FBR reflects the capability of
an antenna to suppress backward interference.
▫ Select antennas based on the frequency band. To reduce engineering and purchase
costs, use broadband antennas when both the broadband and narrowband
antennas meet the specifications. A broadband antenna differs from a dual-band
antenna in that the broadband antenna does not have additional power feeding
ports.
• Beamwidth
▫ horizontal and vertical beamwidths are supported, which depend on and affect each
other. Antennas are selected based on the coverage range and interference control.
In urban areas, use antennas whose horizontal beamwidth is less than or equal to
65ºto reduce cell handovers. In suburban areas, use antennas with the horizontal
beamwidth of 80ºto 90ºto enhance coverage and avoid coverage holes.
• Gain
▫ Low-gain antennas have narrow beams and good directionality. They are mainly
used for indoor coverage and coverage hole compensation in outdoor areas, such
as behind buildings, new residential communities, and new professional markets.
Medium-gain antennas are applicable to urban areas. On the one hand, the volume
and size of such antennas are suitable. On the other hand, signals are evenly
distributed within a short coverage radius thanks to the large vertical beamwidth.
High-gain antennas are applicable to wide and open areas, for example, highways,
railways, tunnels, and long and narrow areas.
• For a coverage range of less than 300 m: Use omnidirectional antennas when the
coverage area is round or square and the antennas can be deployed in the center.
• Use directional antennas in long and narrow coverage areas, such as scenic spots,
streets, and tunnels.
• A pole is required for installing a directional antenna. The height of the pole depends on
its diameter, fixing mode, and wind speed. It is recommended that the length of a pole on
the rooftop be within 1 m to 3 m and not exceed 5 m.
• The radiation pattern is a graphical description of the relative field strength of the antenna.
As the antenna radiates to three-dimensional space, several patterns are required for
description.
• Dual-band antennas can work on both the 2.4 GHz and 5 GHz frequency bands. In this
way, dual-band APs can be configured with only one type of antenna, facilitating
installation and purchase. The antenna also features a low omnidirectional gain. It
achieves 360-degree coverage and reduces the maximum power density in the
omnidirectional direction with the same transmit power.
• Without specific bandwidth requirement: If the coverage range is less than 300 m,
antennas with the gain of 11 dBi ± 3 dBi are recommended.
• Without specific bandwidth requirement: If the coverage range is greater than or equal to
300 m, antennas with the gain of 18 dBi ± 3 dBi are recommended.
• Without specific bandwidth requirement: If the coverage range is less than 300 m,
antennas with the gain of 11 dBi ± 3 dBi are recommended.
• Without specific bandwidth requirement: If the coverage range is greater than or equal to
300 m, antennas with the gain of 18 dBi ± 3 dBi are recommended.
• This slide introduces the formula for calculating the signal field strength and the network
adapter parameters of common STAs.
• Note that the table lists common typical values, which may vary according to vendors.
• Formula for calculating the uplink signal field strength (without interference, cable loss,
and obstacle loss):
• For example, in a rural area, an external antenna (11 dBi) is connected to an AP, the
uplink signal field strength of a STA (a laptop as an example) on the 2.4 GHz frequency
band at 300 m is:
▫ After the 10 dB system margin is subtracted from the signal field strength, we get
the optimal receiver sensitivity (–71 dBm) of the AP.
• An antenna has two horizontal and vertical beamwidths.
▫ Horizontal beamwidth: indicates the beamwidth after the main lobe power of the
horizontal beam decreases by 3 dB. It is also called horizontal half-power angle.
▫ Vertical beamwidth: indicates the beamwidth after the main lobe power of the
vertical beam decreases by 3 dB. It is also called vertical half-power angle
• There is another beamwidth (10 dB). It is the angle between the points in the main lobe
that are down from the maximum radiation by 10 dB (power density reduced to one tenth).
• Combiner, power splitter, and coupler are commonly used passive components used in
an indoor distribution system. The combiner is mainly applied to multi-system
(GSM/CDMA/3G/WLAN), or to different WLAN frequency bands. The coupler is used to
unequally divide power and splitter is used to equally divide power.
• The splitter equally divides energy to provide a wide frequency band by matching
cascaded impedance conversion lines and isolation resistors.
• Note:
▫ The output arms of a cavity splitter are not isolated. Therefore, the cavity splitter
cannot be used as a combiner.
▫ When working for a long time, the cavity splitter is stabler than the microstrip splitter.
▫ When connecting components, ensure that the interfaces are reliably connected.
Otherwise, interface performance may degrade and the system cannot work.
• Product type
▫ Couplers are classified into cavity coupler and microstrip coupler based on power
distribution.
• Note:
▫ When working for a long time, the cavity coupler is stabler than the microstrip
coupler.
▫ When connecting components, ensure that the interfaces are reliably connected.
Otherwise, interface performance may degrade and the system cannot work.
• A combiner combines signals of multiple systems into a set of antenna system. In a
wireless antenna system, input and output signals on different frequency bands are
combined, and the antenna system is connected to the console through a feeder. This
saves feeders and prevents antenna switching.
• In the WLAN field, combiners include single-band combiners (2.4 GHz) and multi-band
combiners.
• A combiner can reduce the number of antennas and feeders, save the antenna installation
space, and improve the isolation between transmitters. Common combiners include dual-
band combiners and triple-band combiners.
• A coaxial cable has the inner conductor and the outer shield sharing a geometric axis. A
common coaxial cable has an inner conductor surrounded by a tubular insulation layer,
surrounded by a tubular conducting shield. The cable is wrapped by a PVC jacket. The
coaxial cable transmits high-frequency signals with little loss, prevents interference, and
provides high bandwidth.
• There are two types of coaxial cables: 50 Ω and 75 Ω. The 75 Ω coaxial cable is used for
the CATV system, and the 50 Ω coaxial cable is used for radio communication.
• An RF coaxial cable transmits signals and energy within the radio frequency range. RF
coaxial cables are classified into three types based on functions: CATV coaxial cable,
radio coaxial cable, and leakage coaxial cable.
• When signals are transmitted in a feeder, impedance loss and media loss are generated.
The loss increases when the feeder length and working frequency increase. Therefore,
the feeder should not be too long.
• An RF coaxial connector (RF connector for short) is installed on a cable or instrument to
separate or combine electricity.
• Compared with other electrical components, the RF connector has a shorter history. The
UHF connector invented in 1930 is the earliest RF connector. During the World War II,
radar, broadcasting station, and microwave communication technologies developed fast.
Accordingly, the type N, C-type, BNC, and TNC connectors were developed. After 1958,
the SMA, SMB, and SMC connectors were developed. In 1964, the US issued the MIL-C-
39012 RF coaxial connector specifications. Then, the RF connectors were standardized
and commonly used.
• RF connector type:
▫ For example, SMA-50JK represents the SMA-type 50 Ω converter. One end is male
and the other end is female. BNC/SMA-50JK represents the converter with BNC
male and SMA female, and the impedance is 50 Ω.
• Surge protection devices are usually deployed between the electrical conduction and
ground, and connected to the protected devices in parallel mode. When voltage exceeds
the upper limit, a surge protection device limits voltage to protect the device. When
voltage is restored, the surge protection device restores to ensure proper system power
supply.
• An antenna surge protector provides the following functions: transmits wireless signals
and protects interfaces, transmits control signals and protects receiving devices, protects
television satellite devices, monitors signal transmission, protects receiving devices,
protects wireless communication devices, and protects other radio devices.
• 1. AD
• 2. 23 dBm = ? mW
▫ +23 dBm can be divided into +10 dBm, +10 dBm, and +3 dBm.
▪ 1 mW x 10 = 10 mW
▪ 10 mW x 10 = 100 mW
▪ 100 mW x 2 = 200 mW
• A WLAN uses radio signals (high-frequency electromagnetic waves) to transmit data. The
strength of radio signals becomes weaker as the transmission distance increases. In
addition, adjacent radio signals cause interference overlapping. All these factors reduce
the signal quality or even cause network unavailability. To improve the WLAN quality and
meet customers' requirements on network construction, WLAN planning and design are
required. During WLAN planning and design, the AP models and quantity, installation
positions and modes, and cable deployment modes need to be planned to ensure
pervasive wireless network coverage, fast Internet access, and optimal network
experience. If WLAN planning and design are not performed in the early stage, rework
may be required after APs are installed. This is because network optimization after APs
are installed may require AP reinstallation and re-cabling.
• Specifying requirements
▫ Determine the network service type, user distribution, and service changes, and
determine the coverage target and key coverage areas.
• Site survey
▫ Collect information about the coverage area to guide subsequent solution design.
▫ Frequency planning
▫ Link budget
▫ Capacity planning
• Engineering implementation
• Acceptance test
▫ After the construction is complete, Huawei network test tools are used to perform
the acceptance test and issue the acceptance report. After the acceptance test is
passed, the entire network planning process is complete.
▫ Optimize the AP and antenna layout based on the trial network quality evaluation
test.
• Signal coverage is not provided for areas with few wireless requirements, such as
bathrooms, staircases, equipment rooms, and archive rooms.
• Generally, the signal strength of indoor dual-band APs should be greater than -65 dBm,
and that of outdoor dual-band APs should be greater than -70 dBm.
• Concurrency indicates that both uplink and downlink services are performed.
• SD video: 2 Mbps
• Key coverage area: dorm room, library, classroom, hotel room, lobby, meeting room,
office room, exhibition hall, etc.
• The area division must be confirmed with the customer and marked on the drawing
provided by the customer to facilitate subsequent planning.
• You can obtain the antenna gain from the product documentation.
• Received signal field strength = AP's transmit power + Antenna gain – Transmission
attenuation – Penetration loss
• When the signal transmission distance is 20 m, the signal field strength (5.8 GHz) is
calculated as follows:
• Antenna gain: Indoor APs generally use built-in omnidirectional antennas, and the
antenna gain is 3 dBi.
• EIRP: Effective Isotropic Radiated Power
• Antenna selection
▫ Antenna gain: Determine the antenna gain based on the AP transmit power,
coverage distance, and bandwidth requirements.
▫ Antenna engineering parameters: The azimuth and downtilt are adjustable during
deployment. Plan the azimuth and downtilt based on site requirements.
• Total bandwidth = Number of users x Concurrency rate x Bandwidth for each user
• The maximum number of concurrent STAs (dual radios) is based on 2.4 GHz and 5 GHz
frequency bands.
• The maximum number of concurrent STAs (triple radios) is based on one 2.4 GHz
frequency band and two 5 GHz frequency bands.
• The preceding table assumes that the AP supports 802.11ax 8*8 HT20 mode. The
following sections assume that APs support 802.11ax 8*8 HT20 and STAs support
802.11ax dual spatial streams.
• Bandwidth required by a single user (Excellent) in a meeting room = 8*50% + 16*10% +
0.25*10% + 32*10% + 32*5% + 0.5*15% = 10.5 Mbps
• The total number of users refers to the total number of STAs connected to the WLAN in
this scenario.
• The number of concurrent STAs is the concurrency rate multiplied by the total number of
users, and refers to the number of users that are connected to the WLAN and transmit
data.
• If the AP's channels conflict with channels of users' Wi-Fi devices, adjust the channel
distribution.
• If channel conflicts cannot be avoided by adjusting APs' channel distribution, discuss with
the owners of the Wi-Fi devices to re-distribute the channels.
• Local power supply is inconvenient. Exposed power cables affect the appearance and
bring security risks.
• The PoE module supplies power and does not require power supply. However, a potential
fault point is added, which is inconvenient for maintenance.
• PoE power supply is used, which facilitates construction and solves the problem of difficult
power supply. The power supply is stable and secure.
• Hybrid cable: Currently, optical data is transmitted over the network port, and the
transmission distance can reach 200 m.
▫ Advantage: The cost of one-time cabling is low and the service life is long. Hybrid
cables apply to long-distance power supply scenarios and reduces the PoE power
supply distance.
▫ Disadvantage: Hybrid optical-electrical switches are required, resulting in high costs.
Optical modules are expensive, and one cable occupies two physical ports (one
optical port and one electrical port). This means that more switches are used.
• Cabling design rules:
▫ In normal cases, the length of network cables cannot exceed 100 m due to signal
attenuation. However, in actual projects, network cables are used to supply power to
APs. If the length of a network cable exceeds 80 m, the network is affected.
Therefore, it is recommended that the length of a network cable be less than or
equal to 80 m.
▫ During cabling planning, communicate with the customer in advance about all the
lines to prevent the construction progress from being affected by the customer's
disagreement on the construction due to the property and aesthetic factors.
• Outdoor installation mode:
▫ The azimuth and downtilt of an antenna can be flexibly adjusted based on the
auxiliary mounting kits.
• Device selection:
▫ In indoor settled deployment scenarios, the latest indoor AirEngine Wi-Fi 6 model
can be used. Compared with a Wi-Fi 5 AP, the AirEngine Wi-Fi 6 indoor model has
higher performance, supports access of STAs complying with multiple protocols,
and has industry-leading smart antennas. Therefore, signals can move with users
and are more stable.
• Coverage design:
▫ Use obstacles with high signal attenuation, such as load-bearing walls, to divide a
large coverage area into multiple small coverage areas. In this project, the office
area and meeting room are divided into eight areas. A single AP can meet the
requirements of each area. Therefore, a total of eight APs are required.
• Deployment design:
• 2. ABD
▫ In the 5.8 GHz frequency band, non-overlapping channels 149, 153, 157, 161, and
165 are used, with 20 MHz of separation between each two channels.