Homer and Bart and WiFi

Phil Morgan • May 25, 2017

I find myself explaining layer 1 physical spectrum analysis quite a lot these days.

Spectrum Analysis is everywhere today. There is Cisco Spectrum Expert, and CleanAir (now the chip is installed in every Enterprise Cisco AP). There is also Metageek Chanalyzer, and of course Cisco Meraki has it built in.

Identifying the different signals can be quite important to a wireless engineer in their day-to-day job.

I wanted to write this blog entry to introduce you to two of the most common signals that can be seen in the 2.4GHz and 5GHz range: DSSS and OFDM. (DSSS is 2.4GHz only, whilst OFDM operates in 2.4GHz and 5GHz.

DSSS is the mode of operation of 802.11 Prime (DSSS), and of 802.11b (HR-DSSS). OFDM is the mode of operation of 802.11a (OFDM), 802.11g (ERP-OFDM), 802.11n(HT), and 802.11ac (VHT).

So, what is an easy way to identify and remember these signals?

Well, this is where Homer and Bart (two of my favorite Simpsons characters) come into play.

Let’s imagine that Homer and Bart are up to no good (quite a common occurrence for this pair), and for some reason they have decided to hide behind a wall. Now let’s further imagine this wall is not quite tall enough to fully hide them, thus their heads are visible…

What you get is something like we see in Diagram 1

A cartoon of homer simpson and bart simpson on a graph.

DIAGRAM 1

In Diagram 1, we see two shapes, one that looks like Homer, and one that looks like Bart. Homer is effectively the shape of a DSSS transmission, and Bart is the shape of an OFDM transmission. There you have it! Easy to remember spectrum analysis.

So, taking a look at Diagram 2 below, we see again two shapes. At channel 6 we see a DSSS transmission, and at channel 11 we see an OFDM transmission.

A computer screen shows a graph that says real time fft

DIAGRAM 2: Actual Spectrum Expert Capture

 

Frequently people ask me, “Is that a “b” AP at channel 6, and a “g” AP at channel 11?” This is very important to stop and think about. These shapes actually show a “b” (or 802.11 Prime) DSSS transmission at channel 6, and a “g” ERP-OFDM transmission at channel 11. There is a lot of other information to take into account, but that is beyond the scope and intent of this article. This will be addressed in a different blog entry.

The take away is that, at channel 6, there was a “b” (or Prime) DSSS transmission and, at channel 11, there was a “g” ERP-OFDM transmission. Does that mean the AP at channel 6 is a “b” AP? Does it mean the AP at channel 6 was talking to a “b” client? The answer to both of these is maybe! All we know for sure is that there was a “b/Prime” DSSS transmission that we caught on channel 6, it could be a “b/Prime” (DSSS) AP, it could be a “g” (ERP-OFDM) AP talking to a “b/Prime” client, or it could simply be a “g” (ERP-OFDM) AP transmitting a Beacon at its lowest Basic/Mandatory speed – 1Mbps (802.11 Prime speed) that is sent out using DSSS.
So happy hunting for the “Homers” and “Barts”, and we’ll see you next month!

 

 

Blog Update Jun 2018

We all know Ekahau works really well with MetaGeek Chanalyzer, but what you may not know is the super-duper Ekahau SideKick seems to be taking over as a Spectrum Analyzer of choice, in its own right.

Will be doing more blog information on the SideKick soon…

(BTW, that last entry is from Wlan Professionals. Wlan Professionals is great community to get involved with, and is run by Keith Parsons, who is a legend in the WiFi community. They have blogs, podcasts and videos that are a great source of information. They also run great conferences throughout the year, one in the US and one in Europe. I try to attend WlanPros, Phoenix (US), every year.)

 

If you are looking to make your mark in the IT Industry, then NC-Expert offers excellent training courses aimed at relevant IT industry certifications – contact us today to get started.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.
Share by: