Wireless Local Area Network Design
Wireless Local Area Network Design
FACULTY OF ENGINERING
PROJECT: 068
F17/10456/03
A project submitted in partial fulfillment of the requirement for the award of B.Sc
Degree in Electrical & Electronics Engineering, University of Nairobi
DEDICATION
ii
ACKNOWLEDGEMENT
The completion of this work would not have been possible without the assistance of
many people who devoted their time, energy and knowledge. Very special thanks to DR.
supervisor of my project, for discussions, counsel and guiding me from the beginning to
My appreciation also goes to my parents and entire family for their constant support
throughout the tumultuous pursuit of my academic goals. Special thanks to Mr. Kogi and
the ICT- center Team for their assistance during the research work.
iii
Contents
Table of abbreviations……………………………………………………………………vi
ABSTRACT…………………………………………………………………………….viii
CHAPTER ONE: Introduction ........................................................................................ 1
1.1 Functional Specification for the UONWLAN infrastructure ................................... 2
CHAPTER TWO: Literature review ................................................................................ 4
2.1 Current Wireless Network standards ...................................................................... 4
2.2 Wireless LAN Requirements ................................................................................. 6
2.3 WLAN Components .............................................................................................. 7
2.3.1 Wireless station ............................................................................................... 7
2.3.2 Access Point (AP) ........................................................................................... 8
2.3.3 Wireless LAN Controllers ............................................................................... 9
2.3.4 WLAN Range ................................................................................................. 9
2.3.5 Channels and roaming ................................................................................... 10
2.4 WLAN Technology and architecture.................................................................... 11
2.4.1 Narrowband Technology ............................................................................... 11
2.4.2 Spread spectrum Technology ........................................................................ 12
2.4.3 Frequency Hopping Spread Spectrum ........................................................... 12
2.4.4 Direct Sequence Spread Spectrum................................................................. 12
2.5 WLAN architecture ............................................................................................. 13
2.5.1 Adhoc mod ................................................................................................... 13
2.5.2 Infrastructure network ................................................................................... 14
2.6 Virtual LANs ....................................................................................................... 15
2.7 Configuring VLANs ............................................................................................ 16
2.7.1 Configuring Static VLANs ............................................................................ 16
2.8 Types of VLAN membership ............................................................................... 17
2.8.1 Layer 1 VLAN: Membership by Port ............................................................ 17
2.8.2 Layer 2 VLAN: Membership by MAC Address ............................................ 18
2.8.3 Layer 2 VLAN: Membership by Protocol Type ............................................. 18
2.8.4 Layer 3 VLAN: Membership by IP Subnet Address ...................................... 18
2.8.5 Higher Layer VLANs .................................................................................... 20
2.9 Types of Connections .......................................................................................... 20
2.9.1 Trunk Link .................................................................................................... 20
2.9.2 Access Link .................................................................................................. 20
2.9.3 Hybrid Link .................................................................................................. 21
2.10 Security of 802.11 wireless LANS ..................................................................... 22
2.10.1 Basic security services ................................................................................ 22
2.10.2 Wi-Fi Protected Access (WPA and WPA2) ................................................. 22
2.10.3 Features of WPA2 security.......................................................................... 23
CHAPTER THREE: The UON network topology and WLAN design ........................... 25
3.1 Overview ............................................................................................................. 25
3.2 Layered Approach ............................................................................................... 26
3.3 Logical design view ............................................................................................. 26
iv
3.4 ICT Center:.......................................................................................................... 28
3.5 Core servers ......................................................................................................... 29
3.7 VLAN classification ............................................................................................ 30
3.8 Main Campus scenario ......................................................................................... 34
3.8.1 Administration block..................................................................................... 35
3.8.2 JKML zone ................................................................................................... 36
3.8.3 Faculty of engineering................................................................................... 37
3.9 Membership access .............................................................................................. 39
3.10 Connection of the workstations .......................................................................... 39
3.11 Student portal .................................................................................................... 40
3.12 UON WLAN security measures ......................................................................... 40
3.12.1 Use of VLANs ............................................................................................ 40
3.12.2 Mac addressing ........................................................................................... 40
3.12.3 Use of RADIUS authentification ................................................................. 41
3.12.4 Use of security switches and firewall........................................................... 41
3.12.3 reduced broadcasting strength of APs where possible .................................. 42
CHAPTER FOUR: Conclusion ..................................................................................... 43
4.1 Solution benefits .................................................................................................. 43
4.2 User experience ................................................................................................... 44
4.3 Recommendation ................................................................................................. 44
v
Table of abbreviations
AES Advanced Encryption Standard
AES-CCMP Advanced Encryption Standard-Counter-
Mode/CBC-MAC Protocol
AP Access Point
BSS Basic Service Set
DES Data Encryption Standard
EAP-TLS Extensible Authentication Protocol-
Transport Layer Security
IEEE Institute of Electrical and Electronics
Engineers
IP Internet Protocol
MAC Media Access Controller
PCMCIA Personal Computer Memory Card
International Association
RADIUS Remote Authentication Dial-In User
Service
SSID Service Set ID
USB Universal Serial Bus
WEP Wireless Equivalent Privacy
WIDS Wireless Intrusion Detection System
Wi-Fi Wireless Fidelity
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access 2
UON University of Nairobi
EAP Extensible Authentication Protocol
TPID Tag Protocol identifier
TCI Tag Control Information
FTP file transfer protocol
KDN Kenya Data Networks
IBSS Independent Basic Service Set
DSSS Direct Sequence Spread Spectrum
FHSS Frequency Hopping Spread Spectrum
vi
HCCA HCF Controlled Channel Access
EDCA Enhanced Distributed Channel Access
OFDM Orthogonal Frequency Division
Multiplexing
ICT Information Communication Technology
ISM Industrial Scientific Medical
JKML Jomo Kenyatta Memorial Library
vii
ABSTRACT
The objective of this project is to understand the current network topology of UON and to
come up with a design of a local wireless network for the University of Nairobi (UON
WLAN) built upon the 802.11 wireless network standards.
Design methodology included the analyzing of requirements that the entire campus
fraternity needs. Inter-network structure was then developed and addressing and naming
conventions set up. All of these are covered in chapter four of this report.
It was found out that, 18 access points are required to cover the entire main campus
airspace, the JKML and faculty of engineering. These APs will be operating in the 2.4
GHz ISM band with adjacent APs being on different channels to avoid crosstalk and
interference.
UON WLAN will serve to provide community-oriented communication and forums with
services provided from a central server, and also act as a gateway for high-speed, low-
cost Internet access. The installed network will comprise of a scalable node-based server
architecture situated in the ICT center in Chiromo Campus, and a number of wireless
devices situated in convenient locations within the entire university. The server-ware will
provide library services, archiving and media services, accessible to the local University
network, as well as providing access to the Internet. These services will be delivered to
locations within the University of Nairobi wireless network. Internet access will initially
be delivered through broadband Internet service providers, with a view to the use of other
equipment, such as fiber for ultra-broadband connectivity, as and when the need arises.
viii
ix
CHAPTER ONE: INTRODUCTION
WLANs provide an alternative to the high installation and maintenance costs incurred by
traditional additions, deletions, and changes experienced in wired LAN infrastructures.
Physical and environmental necessity is another driving factor in favor of WLANs.
Typically, new building architectures are planned with network connectivity factored into
the building requirements. However, users inhabiting existing buildings may find it
infeasible to retrofit existing structures for wired network access. Lastly, the operational
environment may not accommodate a wired network, or the network may be temporary
and operational for a very short time, making the installation of a wired network
impractical. Examples where this is true include ad hoc networking needs such as
conference registration centers and campus classrooms.
The UON WLAN design focuses itself in people’s mobility, allowing students and
lecturers to have an efficient and clever access to services and contents that the
University gives out. In this way, all of the University services are being virtually
duplicated in order to build a virtual University which allows its users to fulfill all of their
needs.
The solution is drawn in a way that the access to the information and to the services will
be possible under any circumstance, by having a high degree of redundancy in the level
of components and in the level of hardware and communications. This solution provides
infrastructure support for the University to deliver the following application services:
• Mail Server
• Application Server
1
• SQL Server
• Intranet & Extranet Web Servers
• Internet Server, Proxy Server
• Security, Authentication and Remote Access
Facing that, the web technology is the most adequate tool to build the platform that
aggregates the several system components.
In this interface there are informatics resources of several natures and accessibilities,
from html files to full databases. With the installations of access points, the access
conditions which allow users to interact among themselves and to the University services
are created.
§ A recent report from In-Stat shows that the wireless market has grown from 140
million wireless chipsets a year in 2005 to 430 million in 2009. The emergence of
new security standards has also increased confidence in WLANs. Users are
becoming more familiar with the technology and are increasingly expecting
wireless access to be available. There is a wide range of products and standards
involved in WLAN technology and more continue to emerge.
2
desirable. Careful planning of what areas need wireless coverage will be required to
ensure that flexible working via wireless technologies is achieved.
Ø Design criteria
• Wireless networking equipment shall conform to the IEEE 802.11a/b/g standards.
• Wireless networks shall be secured.
3
CHAPTER TWO: LITERATURE REVIEW
4
• has nominal data speeds of 54Mbps
• has actual data speeds of 18-30Mbps. These drop to around 60% of the available data
rate in the presence of 802.11b equipment
• Offers three non-overlapping channels
• is backwards compatible with 802.11b equipment.
• is less power efficient than 802.11b, so 802.11b may continue to be more common in
some mobile devices such as PDAs
• uses Orthogonal Frequency Division Multiplexing (OFDM), so benefits from some
resiliency to RF interference and multi-path distortion
d) IEEE 802.11h
This is an addition to the 802.11a standard. It includes Transmit Power Control (TPC) to
limit transmission power and Dynamic Frequency Selection (DFS) to protect sensitive
frequencies. These changes protect security of military and satellite radar networks
sharing some of this spectrum. It is possible to use 802.11h to reduce AP cell sizes by
increasing the density of AP coverage.
e) IEEE 802.11e
There are two strands to the standard.
i. Enhanced Distributed Channel Access (EDCA)
ii. HCF Controlled Channel Access (HCCA).
EDCA prioritizes transmission of packets and reduces transmission times according to
different access categories, but provides no service guarantees. HCCA centrally manages
access by polling clients and scheduling a time for transmission, reducing contention.
HCCA uses traffic classes and precise QoS parameters can be set for individual
applications. EDCA is expected to be implemented on all equipment, but HCCA may be
reserved for particularly time sensitive applications such as VoIP.
f) 802.11n
802.11n uses Multiple Input Multiple Output (MIMO) technology. MIMO involves the
use of at least 2 antennas for transmitting data and an equal or greater number for
receiving. The multiple antennas are tuned to the same channel, but each transmits a
different data stream. However there are cost and power implications in having multiple
RF units.
5
g) 802.11r
IEEE 802.11r is a standard in development for fast roaming between access points. In
secure WLANs the requirement to re-authenticate with each access point as a user moves
around creates a delay that can disrupt low latency applications such as voice and video.
h) 802.11s
This is a standard for wireless mesh networks particularly to cover large areas of towns
and cities, or in rural areas.
i) 802.16/ WiMAX
WiMAX (Worldwide Interoperability for Microwave Access) is a high speed wireless
technology based on IEEE 802.16 standards. WiMAX is intended to provide wireless
broadband coverage over a large area and has built in quality of service (QoS) and
security features. WiMAX can work in licensed and unlicensed spectrum and in-line of-
sight and non-line-of-sight implementations. It should offer wireless broadband access at
a theoretical shared peak rate of 72Mbps and a maximum range of 50km.
j) Ultra-Wideband
Ultra-Wideband (UWB) is an emerging wireless technology intended to provide high
speed, low power wireless connections (100Mbps-2Ghz) over short distances (10m). It is
expected to be used for cable replacement applications and for multimedia networking in
the home. Ultra- Wideband is based on pulsing a signal in very short bursts across a very
wide bandwidth. Data is sent by altering the amplitude, phase or position of the pulses.
k) ZigBee/ 802.15.4
ZigBee is a wireless sensor network technology specification based on the IEEE 802.15.4
standard. It is a low cost, low power, low data rate wireless networking standard for
sensor and control networks.
6
· Full connectivity among attached stations.
· Broadcast Capability
In addition there are a number of requirements specific to wireless LAN environment:
Ø Throughput:
The MAC protocol should make as efficient use as possible of the wireless media to
maximize capacity.
Ø Number of nodes
The wireless LAN may need to support hundreds of nodes across multiple cells.
Ø Service Area
A typical coverage area for WLAN has a diameter of 100 to 300 meters.
Ø Connection to backbone LAN
For infrastructure WLAN this is easily accomplished through the access points (AP) that
connect to both type of LAN
Ø Power consumption
Mobile workers use battery and powered work stations that need to have a long battery
life cycle when used with wireless adapters. Typical wireless LAN implementations have
features to reduce power consumptions while not using the network, such as sleep mode.
Ø Transmission Robustness And Security
Unless properly design a WLAN may be interference prone and easily eavesdropped. The
design of a WLAN must permit reliable transmission even in noisy environment and
should provide some level of security from eavesdropping.
7
A wireless station or client is typically a laptop or notebook personal computer (PC) with
Wireless Network Interface Card (NIC). A WLAN client may also be a desktop or
handheld device within publicly addressed area.
The access point (AP) functions as a base station for the wireless network aggregating
multiple wireless stations to the wired network. Access Points (AP) may also provide a
bridging function. Bridging connects two or more networks together and allows them to
communicate.
Bridging involves:
a).Point –to-Point bridging:
In a point-to-Point architecture two LANs are connected to each other via the LANs
respective APs as shown in Fig. 2.0
In the example, wireless data is being transmitted from Laptop A to Laptop B, from one
building to the next using each building’s appropriately positioned AP. Laptop A
connects to the closest AP within the building A. The receiving AP in building A then
transmits the data (over the wired LAN) to the AP bridge located on the building. That
AP Bridge then transmits the data to the bridge on nearby building B. The building’s AP
Bridge then sends the data over its wired LAN to Laptop B.
b)Multipoint Bridging:
One student on a LAN is connected to several other subnets on another LAN via each
subnets AP. For example, if a computer on Subnet A needed to connect to computers on
Subnets B, C, and D, Subnet A’s AP would connect to B’s, C’s, and D’s respective APs.
8
Enterprises may use bridging to connect LANs between different buildings on corporate
campuses. Bridging AP devices are typically placed on top of buildings to achieve greater
antenna reception.
The AP grouping feature of the WLC allows a single WLAN to be supported across
multiple dynamic interfaces (VLANs) on the controller. This is done when a group of
APs is mapped to a specific dynamic interface. APs can be grouped logically by
employee workgroup or physically by location. AP Group VLANs are used in a setup
where a Universal WLAN service set identifier [SSID] is required but clients need to be
differentiated (placed on different interfaces configured on the WLC) by virtue of
physical LAPs they associate with.
When a client joins a WLAN, the interface used is determined by the LAP it is associated
with, and by looking up the AP Group VLAN and WLAN for that LAP. The AP Group
VLANs feature is an additional method used to limit the broadcast domains to a
minimum. This helps to manage load balancing and bandwidth allocation more
effectively.
The reliable coverage range for 802.11 WLANs depends on several factors;
· Data rate required and capacity.
· Sources of RF interference.
· Physical area characteristics.
Theoretical ranges are from 25meters (11Mbps) in a closed office, to 485meters (1Mbps)
in open area. Through empirical analysis the typical range for connectivity of
802.11equipment, is approximates 25 meters (163 feet) indoors. A range of 100 meters in
open space makes WLAN the ideal technology for many campus applications. It is
important to recognize that special high gain antennas can increase the range of several
miles.
9
Fig.2.1 range of typical WLAN
The 802.11b and 802.11g standards working in the 2.4 GHz frequency range have 13
channels available. However, to avoid crosstalk and interference there are effectively
only 3 non-overlapping channels that can be used (usually set at 1, 6 and 11).
Adjacent APs need to be set to different channels. This means that only 3 access points
can be used in parallel; Channel 6, Channel 11 and Channel 1.
10
As 802.11b/g and 802.11a operate in a different frequency range they are not compatible
with each other. However, 802.11b/g and 802.11a networks can be used side by side to
increase capacity. In general both 802.11b and 802.11g (as they work in the 2.4GHz
frequency) have a greater range than 802.11a. In practice, to obtain the same network
coverage, the user may require up to four times as many access points when using an
802.11a network.
If 802.11g devices and 802.11b devices are in dialogue with each other then the data rates
will be dictated by the 802.11b device. If two or more 802.11g devices are in dialogue
with each other but there are 802.11b devices in the same network, then 802.11g data
rates will drop but may well still be more than the practical rates of 802.11b. There are
802.11g access points, or dual or tri-band access point incorporating 802.11g which can
be set to only recognize 802.11g equipment. This obviously prevents the 802.11b
equipment from working on the 802.11g network but there are times when this may be
desirable.
A narrowband radio system transmits and receives user information on a specific radio
frequency. Narrowband radio keeps the radio signal frequency as narrow as possible just
to pass the information. Undesirable crosstalk between communications channels is
avoided by carefully coordinating different Users on different channel frequencies. In a
radio system, privacy and non interference are accomplished by the use of separate radio
frequencies.
Spread Spectrum is a modulation technique that spreads the data transmission across the
entire available frequency band. By spreading the signal across the entire band, the signal
becomes less vulnerable to noise or interference. Spread spectrum also permits many
11
users to share the same frequency band with Minimal interference from other users or
from devices (such as microwave ovens). The goal is to use more bandwidth than the
system really needs for transmission to reduce the impact of localised interferences (bad
frequencies) on the system. The original 802.11 standard had specifications for 1Mbps
and 2Mbps wireless Ethernet transmissions using Spread Spectrum in the 2.4 GHz band
(ISM-band). The transmissions use 100 milli watts maximum. There are two different
types of spread spectrum transmissions defined for the Physical Layer;
Ø Frequency Hopping Spread Spectrum (FHSS)
Ø Direct Sequence Spread Spectrum (DSSS)
With FHSS, transmitters and receivers are synchronized to hop from channel to channel
in predetermined (pseudo random) sequence. The predefined hopping sequence is only
known to the transmitting and receiving station. By doing so, it is very difficult for
someone to catch up the signal. In the 802.11 standard, 79 channels are defined within the
2.4GHz band. If one channel is jammed, the data is simply retransmitted on the next
channel in the hopping sequence. Networks using 802.11 and FHSS are limited to
maximum 2Mbps.Properly synchronized; the net effect is to maintain a single logical
channel. To an unintended receiver, FHSS appears to be short-duration impulse noise.
Under DSSS the information to be transmitted is divided into small pieces. These small
pieces are spread across the entire available frequency band. The pieces of information
are encoded by using a redundant pattern, called a chip. This chip is only known by the
transmitting and receiving device. This makes it difficult for an intruder to intercept and
decipher wireless data encoded in this manner. The redundant pattern also makes it
possible to recover data without retransmitting it if one or more bits are damaged. This
means that the signal is less susceptible for interference.
The longer the chip, the greater the probability that the original data can be recovered (of
course, the more bandwidth required). Even if one or more bits in the chip are damaged
12
during transmission, statistical techniques embedded in the radio can recover the original
data without the need for retransmission. To an unintended receiver, DSSS appears as
low-power signal.
Only wireless devices are present in this network, that is, no APs are required. It is meant
to easily interconnect mobile devices that are in the same area. Client stations are
grouped in to a single geographic area, like, for example in the same room. Beaconing
and synchronization are handled by a station (laptop).Some enhancements are not
available to the ad hoc network such as relying frames between two stations that cannot
hear each other. The interconnected devices in the Ad hoc mode are referred to as
Independent Basic Service Set (IBSS).
The Ad hoc configuration is similar to a peer-to-peer office network in which no node is
required to function as a server. Fig2.3 shows the Ad hoc topology.
13
2.5.2 Infrastructure network
This is the fundamental 802.11 WLAN topology. The Infrastructure is meant to extend
the range of the wired LAN to Wireless LAN cells. A laptop or other moving device may
move from cells to cell (from AP to AP) while maintaining access to resources of the
LAN. This topology is useful for providing wireless coverage of building or campus area.
A WLAN environment has wireless client station that use radio modems to communicate
to an access point (AP). Fig.2.4 shows a rough sketch of the infrastructure network.
STA3
AP- Access Point
STA- station
STA4
AP2
AP1
Distribution
STA1
STA2
The client stations are generally equipped with Network Interface Card (NIC) .By
deploying multiple Access Point’s with overlapping coverage areas organizations can
achieve broad network coverage. WLAN technology can be used to replace wired LAN
totally and to extend LAN infrastructure. Most WLANs operate in the Infrastructure
mode described above. The device characterized as a station in wireless LAN system first
has to identify the available access points and networks. This is done through monitoring
beacon frames from access points announcing themselves or actively probing for a
particular network by probe frames. The station chooses a network from those available
and goes through an authentication process with the access point.
Once the access point and the station have verified each other the association process is
started. Association allows the access point and station to exchange information and
capabilities. The Access Point uses this information and shares it with other access points
in the network to disseminate knowledge of station’s current location on the network.
Only after association is complete can other station transmit or receive frames on the
network.
14
In Infrastructure mode, all network traffic from wireless stations on the network goes
through an access point to reach the destination on either the wired or wireless LAN.
Access to the network is managed using Carrier Sense Multiple Access & Collision
Avoidance (CSMA/CA) protocol. The Station will listen for data transmission for
specified period of time before attempting to transmit; this is carrier sense medium access
portion of the protocol. The station must wait a specific period of time, after the networks
becomes clear before transmitting. This delay plus the receiving station transmitting an
acknowledgement indicating a successful reception form the collision avoidance portion
of the protocol. In Infrastructure mode, either the sender or receiver is always the access
point. The periodic beacon frames sent by the access point handle synchronization
between stations on network. These frames contain the access point’s clock value at the
time of transmission so can be used to check for drift at the receiving station.
Synchronization is required for various reasons having to do with the wireless protocols
and modulation schemes.
15
4094 possible VLAN IDs can be selected. Only 512 unique IDs can be used
simultaneously.
Tagging an Ethernet frame requires the addition of a tag header to the frame. The header
is inserted immediately following the destination MAC address and the Source MAC
address. The tag header consists of two bytes of Ethernet Tag Protocol identifier (TPID,
0x8100) and two bytes of Tag Control Information (TCI). Fig 2.5 shows the Ethernet Tag
Header format.
By default, a single VLAN is configured for every port, which groups all ports into the
same broadcast domain, just as if there were no VLANs at all, VLAN tagging for the
switch port turned off.
a) One hostname is created for each VLAN that will be configured for each adapter
on the server.
The following naming format is used, which includes both the VID and the physical point
of attachment (PPA):
VLAN logical PPA = 1000 * VID + Device PPA
Example: ixge123000 = 1000*123 + ixge
this format limits the maximum number of PPAs (instances) that can be configured to
1000 in the /etc/path_to_inst file.
16
For example, on a server with the Sun 10-Gigabit Ethernet adapter having an instance of
0, belonging to a member of two VLANs, with VID 123 and 224, you would use
ixge123000 and ixge224000, respectively, as the two VLAN PPAs.
b) the ifconfig command is used to configure a VLAN virtual device, for example:
c) On the switch, VLAN tagging and VLAN ports are set to coincide with the
VLANs that are set up on the server.
Membership in a VLAN can be defined based on the ports that belong to the VLAN. For
example, in a bridge with four ports, ports 1, 2, and 4 belong to VLAN 1 and port 3
belongs to VLAN 2 as shown in table1.
Port VLAN
1 1
2 1
3 2
4 1
17
The main disadvantage of this method is that it does not allow for user mobility. If a user
moves to a different location away from the assigned bridge, the network manager must
reconfigure the VLAN.
Here, membership in a VLAN is based on the MAC address of the workstation. The
switch tracks the MAC addresses which belong to each VLAN as shown in table2. Since
MAC addresses form a part of the workstation's network interface card, when a
workstation is moved, no reconfiguration is needed to allow the workstation to remain in
the same VLAN. This is unlike Layer 1 VLANs where membership tables must be
reconfigured. The main problem with this method is that VLAN membership must be
assigned initially but this offers a better security measure.
VLAN membership for Layer 2 VLANs can also be based on the protocol type field
found in the Layer 2 header as shown in table 3.
Membership is based on the Layer 3 header. The network IP subnet address can be used
to classify VLAN membership as shown in table 4.
In this method, IP addresses are used only as a mapping to determine membership in
VLANs. No other processing of IP addresses is done.
In Layer 3 VLANs, users can move their workstations without reconfiguring their
network addresses.
18
Table 2: Assignment of MAC addresses to different VLANs.
12563498746 1
2389234873743 2
3045834758445 2
5483573475843 1
Protocol VLAN
IP 1
IPX 2
IP Subnet VLAN
23.2.24 1
26.21.35 2
19
2.8.5 Higher Layer VLANs
All the devices connected to a trunk link, including workstations, must be VLAN-aware.
All frames on a trunk link must have a special header attached. These special frames are
called tagged frames.
20
VLAN-unaware device can be a LAN segment with VLAN-unaware workstations or it
can be a number of LAN segments containing VLAN-unaware devices (legacy LAN).
This is a combination of the previous two links. This is a link where both VLAN-aware
and VLAN-unaware devices are attached as shown in fig 2.8. A hybrid link can have both
tagged and untagged frames, but all the frames for a specific VLAN must be either
tagged or untagged.
21
2.10.1 Basic security services
The three basic security services defined by IEEE for the WLAN environment are as
follows:
· Authentication
The primary goal is to provide a security service to verify the identity of
communicating client stations. This provides access control to the network by denying
access to client stations that cannot authenticate properly.
· Privacy
Privacy is a second goal of WLAN security. The intent is to prevent information
compromise from passive attack.
· Integrity
Security service developed to ensure that messages are not modified in transit
between the wireless clients and the access point in an active attack.
22
b) WPA and WPA2 key management
With 802.1x, the rekeying of unicast encryption keys is optional. Additionally, 802.11
and 802.1x provide no mechanism to change the global encryption key used for multicast
and broadcast traffic. With WPA, rekeying of both unicast and global encryption keys is
required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP)
changes the key for every frame and the change is synchronized between the wireless
client and the wireless access point (AP). For the global encryption key, WPA includes a
facility for the wireless AP to advertise the changed key to the connected wireless clients.
WPA2 replaced WPA; WPA2 implements the mandatory elements of 802.11i. In
particular, it introduces a new AES-based algorithm, CCMP, which is considered fully
secure.
c) Temporal Key Integrity Protocol (TKIP)
For 802.11, Wired Equivalent Privacy (WEP) encryption is optional. For WPA2,
encryption using TKIP is required. TKIP replaces WEP with a new encryption algorithm
that is stronger than the WEP algorithm but that uses the calculation facilities present on
existing wireless devices to perform encryption operations. TKIP also provides for the
following:
· The verification of the security configuration after the encryption keys are
determined.
· The synchronized changing of the unicast encryption key for each frame.
· The determination of a unique starting unicast encryption key for each pre-shared
key authentication.
d) Michael
With 802.11 and WEP, data integrity is provided by a 32-bit integrity check value (ICV)
that is appended to the 802.11 payload and encrypted with WEP. Although the ICV is
encrypted, you can use cryptanalysis to change bits in the encrypted payload and update
the encrypted ICV without being detected by the receiver.
With WPA, a method known as Michael specifies a new algorithm that calculates an 8-
byte message integrity code (MIC) using the calculation facilities available on existing
wireless devices. The MIC is placed between the data portion of the IEEE 802.11 frame
and the 4-byte ICV. The MIC field is encrypted together with the frame data and the ICV.
23
e) AES support
WPA2 defines the use of Advanced Encryption Standard (AES) as an additional
replacement for WEP encryption. Because you may not be able to add AES support
through a firmware update to existing wireless equipment, support for AES is optional.
f) Supporting a mixture of WPA2 and WEP wireless clients
To support the gradual transition of WEP-based wireless networks to WPA, a wireless
AP can support both WEP and WPA2 clients at the same time. During the association,
the wireless AP determines which clients use WEP and which clients use WPA2. The
support of a mixture of WEP and WPA clients is problematic. The global encryption key
is not dynamic because WEP-based clients cannot support it. All other benefits to the
WPA clients are maintained, including integrity.
g) Remote Access Dialing User Service (RADIUS)
RADIUS is a widely deployed protocol for network access authentication,
authorization and accounting (AAA). RADIUS is simple, efficient and easy to implement
making it possible for RADIUS to fit into the most inexpensive embedded devices. In
terms of security, RADIUS includes its own application-layer integrity protection and
authentication, as well as confidentiality for "hidden attributes".
24
CHAPTER THREE: THE UON NETWORK TOPOLOGY AND
WLAN DESIGN
3.1 Overview
There are three main areas of the University campus that drive the requirements of
wireless access-solution; these are Students, Lecturers and University Services.
Ø Students require the ability to have:
• Full access to university services at any given time
• Easy methods for exchange of information
• Constants access to research and organizational tools
• Buy online books at lower prices
• e-Learning
Ø Lectures require the ability to:
• Full access to university services at any given time (online inscriptions, etc.);
• Exchange of information.
• Research and organizational tools
• Provide “e-Books”
• “e-Learning”
Ø University Services need:
• Optimize resources and efficiency at any given time.
• Knowledge and information exchange.
• Management tools.
• Information and transactions for lectures and students.
• Interaction with the Ministry of Science and Higher Education.
• “e-Learning”.
Two types of information are considered:
• Internal administration information and Management of the University Students,
with restricted access to internal staff, and with access protection via.
• Scientific Information made available via lectures and students, and via all the
information library and online scientific magazines subscription.
25
Each student, lecturer or university employee has a single unique access code (login and
password). Once logged on they will have access to those services that their status and
login ID is enabled for.
LIBRARY: Using the university portal it is possible to make a search in all the scientific
information produced by the university (studies, information about the departments,
articles, etc), information created and made available by lecturers and students.
VIRTUAL UNIVERSITY: Is a set of interconnected information between the university
and the students and lectures, like schedules, curricular plans, financial information, will
be available, making possible to free the students and lectures from the normal working
time of these services.
E-MAIL / WEB MAIL – The student will have one e-mail account that can be used to
communicate with the lecturers and other students.
STORAGE AREA: Each student will have their own personal data area, in the file server,
with security and backup of the information. This area can be used for the student to
archive information that is necessary for their studies.
PORTAL: A portal where the lectures will publish their own web pages will be available.
26
Fig.3.0: The Layered Approach
27
Fig. 3.1: A logical representation of the campuses connections’ to the core servers.
28
3.5 Core servers
When a user connects, the NAS sends a RADIUS Access-Request message to the AAA
Server, relaying information like the user's name and password, type of connection (port),
NAS identity, and a message Authenticator. Upon receipt, the AAA Server uses the
packet source, NAS identity, and Authenticator to determine whether the NAS is
permitted to send requests. If so, the AAA Server tries to find the user's name in its
database. It then applies the password and other attributes carried in the Access-Request
to decide whether access should be granted to this user.
b) DHCP servers
This is the server dedicated to assigning IP addresses to the wireless network clients.
After accessing the UONWLAN, the DHCP server automatically assigns you a unique IP
address.
29
The integrated wireless controller adds new levels of security, including features such as
intrusion detection, RF (radio frequency) management for self-configuration, and self-
healing, and will allow users to roam between access points and across bridged networks.
Main campus network is as shown in figure 6.2. The main switch is located at the JKML
building, and then distributed to various departmental switches where APs are connected.
30
Fig 3.2: structure of UON WLAN
If a department has users in different locations, they need access to servers and printers as
if they were all in the same building. Figure 3.3 illustrates this concept, logically grouping
the VLANs by function, traffic patterns, and workgroups.
This network is independent of physical location and group users into logical
workgroups.
31
LibServ VLAN is represented by “L”. Their primary function is to access database, for
example lecture notes. Admin VLAN is comprised of users that require access to local
servers and the mainframe, these are administrator staff that have the right to configure,
add or change a clients access to the UON WLAN network; it’s denoted by letter “X”.
MainOFc VLAN has users on different parts of the University with access to a different
server and is shown as “M”. VLANs 1 and 2 represent different departments with servers
in their respective buildings. Any inter-VLAN traffic must first traverse a layer-3 device
in order to communicate with another VLAN. Thus, logical segmentation not only
optimizes bandwidth utilization, but also provides security by isolating segments behind
layer-3 devices, which typically can filter traffic using access control lists (ACLs).
Even if two nodes share a common IP subnet, they will not be able to directly
communicate if they are in separate VLANs.
Figure 3.4 shows different VLANs accessing the network via a single AP. The physical
LAN network consists of switches, access points, controllers, servers and clients. The
LAN is logically organized into different VLANs that are connected to the main network
by an AP. The figure shows four VLANs accessing the same AP but routed to different
servers.
32
Fig. 3.3 logically grouped VLANs
Figure 3.4: different VLANs accessing the network via a single AP but routed to different servers
33
Due to the tagging VLAN capabilities of these devices, the data sever is able to
communicate with more than one VLAN in the network, but continues to maintain
broadcast separation between all of them.
Proper APs positioning on the campus environment result in total coverage by the
wireless network as shown in figure 3.5. We have the entire outside surrounding covered.
The numbers 1, 6 and 11 denote channels 1, 6 and 11 respectively. Access points are
placed on top of buildings at the center of the shown coverage rings. The rings have a
radius of 50m thus covering a distance of 100m in open space. Red dots at the center of
the rings pinpoint the exact location of APs.
34
Fig 3.5: aerial view of main campus wireless coverage area
One AP is placed on Gandhi wing depicted as GW in fig 3.5 and set to channel 1.
Another AP is put up on the building housing the bookshop (BS). Hyslop H, fountain of
knowledge area (FG), 844 building and education building (EB) all have APs placed on
their roof tops with overlapping channels set in a way that no interference result from
other neighboring APs.
Administration block houses main offices of the entire university. This calls for more
services. Voice services with QoS should be added on top of data service that is to be
delivered wirelessly. Conversational voice has much more stringent delay requirements
than any other application. The traffic streams generated by voice and data applications
35
have very different characteristics and it is even more challenging to meet the
requirements of both types of traffic with one network if excellent voice quality is to be
achieved. A mixed voice and data environment deployed with the current 802.11 standard
without any Quality of Service (QoS) mechanism is unlikely to result in satisfactory
experience, especially for the voice users.
A workaround involves separating voice and data traffic users by frequency bands; This
approach is implemented with multi-mode APs and requires two channels per cell, one in
the 2.4-GHz band and another one in the 5-GHz band. Dual-band access points with two
radios can simultaneously support both 2.4 GHz (802.11b/g) and 5 GHz (802.11a) RF
bands, therefore all IP phones will be configured to use the 5GHz band. This yields good
voice quality over the WLAN on the administration block. QoS allows for prioritized
traffic management, IT administrator will assign different priority levels to different
users. Network administrators may assign a lower priority to visitors sharing the network,
provide more resources to employees working on critical tasks, and applications like
video streaming or teleconferencing can be effectively achieved.
Jomo Kenyatta Memorial Library is the main research center in main campus. It can
accommodate a large number of students. Although it offers a vast list of services, its
only access is limited to computer labs fixed in the various departments and four
computers inside the library. JKML has five flours (basement, ground, first, second and
third) each spanning a length of about 50 meters and a height of 3 meters.
With one access point covering a radius of approximately 25 meters, each floor will have
1 AP placed as shown in Fig.3.6. The whole library will be adequately covered with
wireless access. Ground floor has one AP running on channel 1, first floor has one AP
running on channel 11, second floor one AP running on channel 6 and finally third floor
one AP running on channel 1. APs are placed such that no similar channels overlap and
such that the whole library is covered.
36
Amount of co-channel coverage overlap is determined by both AP placement and AP
frequency assignment. Coverage area is in terms of specified received signal strength.
This threshold level is selected in order to provide an adequate signal- to-noise ratio
(S/N) and some additional margin. If one measures an ambient noise level of –95 dBm
and a 10 dB S/N is needed to ensure excellent performance, then an extra 5 dB margin is
allowed for noise levels higher than –95 dBm. In this case one would select a threshold of
–80 dBm.
Faculty of engineering has four departments and numerous lecture rooms in three blocks;
Electrical and electronics department, mechanical department and civil department.
These are connected to the JKML through Ethernet link. Each block has one switch in the
ground floor. This switch in ground floor is connected to a switch in each floor. The
American wing building has a length of 50m. With an AP covering a radius of 25m, 2
37
APs can be used to effectively cover the entire building and its surrounding as shown
figure 3.7. The APs are positioned on the second floor on near far ends; therefore equal
broadcasting power is achieved on the left and right sides of the building. The figure
shows a sketch of front view of the building.
38
3.9 Membership access
Membership in the UON WLAN is based on the MAC addressing of a workstation. The
MAC address of a station is registered by an administrator and the required VLAN
membership assigned. The switch tracks the MAC addresses which belong to each
VLAN as shown in table 5. Since MAC addresses form a part of the workstation's
network interface card, when a workstation is moved, no reconfiguration is needed to
allow the workstation to remain in the same VLAN.
The 802.1Q draft standard defines Layer 1 and Layer 2 VLANs only. Protocol type based
VLANs and higher layer VLANs have been allowed for, but are not defined in this
standard. As a result, these VLANs will remain proprietary.
1212354145121 L
2389234873743 X
3045834758445 L
5483573475843 M
39
Fig.3.9: Hybrid link containing both VLAN-aware and VLAN-unaware devices.
VLANs help to secure and control access of data to specific personnel. For example the
student VLAN is not supposed to access servers with administration data.
For one to be configured to use the UON WLAN, he or she should contact the network
administrator with their portable devices for the Mac addresses of their devices to be
registered and assigned the required VLAN.
The VMPS server contains a database of all workstation MAC addresses, along with the
associated VLAN the MAC address belongs to. This way, we essentially have a VLAN-
to-MAC address mapping. Table 6 shows an example of mapping relationship that exists
in the VMPS server. As shown, each MAC address, which translates to a host on the
network, is mapped to a VLAN, allowing this host to move inside the network,
40
connecting to any switch that is part of the VMPS network and maintain its VLAN
configuration.
RADIUS, an IETF standard security management protocol, enables control over which
users can connect to a network, and over what resources they can access. Wireless-
optimized extensions to RADIUS enable wireless users to be strongly authenticated at
access points using X.509 digital certificates. Administrators can enforce policies on user
sessions, to specify the length of an encryption key and the time interval for its auto-
renegotiation. Collectively, these features can negate most of WEP’s known
vulnerabilities and exponentially increase the complexity and difficulty of intrusion
attempts.
Security switches are stationed between APs and the network as shown in fig3.10. Every
station connecting to the network has to pass through a security switch for verification
purposes.
41
Fig 3.10; placement of security switches and firewall in a wireless network
The broadcast strength of WLAN access points is reduced, when possible, to keep it
within the necessary area of coverage only. Coverage of unintended areas is avoided. APs
are configured to ignore probe requests with a null SSID, thus requiring the client know
this value before being able to connect to the network.
42
CHAPTER FOUR: CONCLUSION
With this UONWLAN design, students can have a powerful work tool that can be used to
queries, researches, university projects and several other activities. As bigger is the use of
these equipments from the students, more will be their degree of freedom and work
capability.
The computerization of our teaching staff is a UoN competitive advantage, since it
creates an extremely dynamic and flexible work environment, allowing lecturers be in a
permanent contact and interaction with their students, which is the fundamental basis to
e-learning.
For being equipped with wireless network the campuses of our University have the
following advantages:
· Interaction among students and teachers
· The low implementation cost, when compared to the process of laying a physical
network, knowing that the major costs would be always derived from the
workmanship, the project to do so, and making changes in the buildings structure
(gutters, ditches, cabling, and so on). The maintenance and administration of a
wireless network it’s more easy and effective than a physical one which relieves
some of the existing overload in our ICT Centre.
The main functions/applications that can be deployed in the wireless network are:
§ Digital Library
§ Publisher and virtual Bookstore
§ Virtual lecturer’s administrative services
§ Virtual student’s administrative services
§ Web-mail
§ E-learning
43
of freedom and at the same time have the possibility of permanently accessing those
contents.
Permanent and immediate access from anywhere in our University campuses to the
information that the University gives out with its consequent:
a. Mobility
b. Flexibility
c. Readiness
d. Fastness
e. Bigger interaction among them
f. Greater work capacity
g. Greater proficiency of contents
h. Services decentralization
i. Easier technology to set up and maintain, and, consequently more
profitable
4.3 Recommendation
Building by building AP positioning-plan is needed for effective service rendering.
Students’ hostels can be covered effectively by placing APs securely and appropriately in
the respective building.
The experience of understanding the UON network topology and designing a WLAN has
been invaluable. Through the process of this project, practical knowledge has been gained
about realistic projects in industry. After having such a positive experience, the future
seems promising and bright.
44
References
[1] Tom Carpenter, Joel Barrett: Certified Wireless Network Administrator Official
Study Guide, 4th edition, published by: Tata McGraw-Hill Publishing Company Limited.
2007
[2] Todd Lammle,: Cisco Certified Network Associate Study Guide, 6th edition,
published by: Wiley publishing, Inc. 2007
[3] David Passmore, John Freeman, ``The Virtual LAN Technology Report,'' March 7,
1997, http://www.3com.com/nsc/200374.html
[4] IEEE, ``Draft Standard for Virtual Bridge Local Area Networks,'' P802.1Q/D1, May
16, 1997,
[5] Mathias Hein, David Griffiths, Orna Berry, ``Switching Technology in the Local
Network: From LAN to Switched LAN to Virtual LAN,'' February 1997,
[8] www.hp.com/rnd/pdf_html/wirelessLANsite_assessment.htm
[9] http://en.wikipedia.org/wiki/WLAN
45