Q
Problem solve Get help with specific problems with your technologies, process and projects.

# I'm about to embark on a CWNA course, and I'm wondering how in-depth the RF math is?

## Networking

### Looking for something else?

I'm about to embark on a CWNA course, and I'm wondering how in-depth the RF math is?
The best way to get a feel for what the Certified Wireless Network Administrator (CWNA) program entails is to buy the CWNA Study Guide, and/or try your hand at the CWNA Practice Test. You'll need the study guide to complete the CWNA course anyway, and I find it to be an indispensable reference that's well worth its purchase price.

According to the CWNA website, RF technologies represent about one quarter of the CWNA exam. This includes learning how to apply RF math concepts like Watt/ Milliwatt, Decibel (dB), and gain / loss (dBm and dBi) to calculate WLAN power at the transmitter, between transmitter and antenna, and emitted by the antenna (EIRP). Although power conversion formulas include logarithms, the CWNA exam won't test your understanding of logarithmic functions -- instead, you'll use "rules of thumb" like this one: +3dB doubles the watt value; -3dB cut the watt value in half. In short, you'll only be required to demonstrate that you understand how WLAN components combine to determine RF power output and relationships between associated units of measurement.

This was last published in May 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchNetworking

• ### DNS challenges have changed, but its vital role hasn't

Developments like IPv6 and the internet of things are throwing obstacles into DNS operations. But this 'directory assistance of ...

• ### DNS functions remain vital, but must adapt as demands shift

The domain name system's tasks are simple, but essential, and the service faces challenges with the proliferation of devices that...

• ### Why IPv6 networks create DNS configuration problems

DNS data is among the most basic and crucial information required for network connectivity, but configuring DNS recursive servers...

## SearchTelecom

• ### Three-step network strategy sells big changes as more doable

A three-pronged network strategy takes an evolutionary approach to selling revolutionary technology changes internally, with a ...

• ### Wireless vendors count on 5G equipment sales for rescue

Wireless 5G equipment sales could take off in the next two years, possibly saving wireless vendors. AT&T increases the use of ...

• ### Big content providers influence undersea cable price drops

The undersea cable market has become increasingly competitive, as large content providers build new routes and wavelength prices ...

## SearchUnifiedCommunications

• ### Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• ### Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

• ### The evolution of unified communications technologies

Over the years, unified communications tools have evolved to incorporate different modes of collaboration. Enterprises need to be...

## SearchSecurity

• ### Protecting safety instrumented systems from malware attacks

Trisis malware targets safety instrumented systems and puts industrial control systems at risk. Expert Ernie Hayden reviews what ...

• ### Risk & Repeat: Cyberinsurance market gets a shake-up

In this week's Risk & Repeat podcast, SearchSecurity editors discuss a new industry partnership designed to give Apple and Cisco ...

• ### Use software forensics to uncover the identity of attackers

By analyzing the proverbial fingerprints of malicious software -- its program code -- infosec pros can gain meaningful insights ...

Close