0% found this document useful (0 votes)
171 views21 pages

L3 - Computer System - WIRELESS LOCAL AREA NETWORK SET UP - WLAN

This document outlines a module on wireless local area network (WLAN) setup. The module aims to teach students how to setup a WLAN, with 4 key elements of competence: applying WLAN concepts, conducting site surveys, configuring and maintaining WLANs, and documenting work. It provides learning outcomes and content for each element, covering topics such as WLAN standards, infrastructure components, topologies, and security considerations. The overall goal is for students to leave with the skills to properly setup a functional and secure WLAN.

Uploaded by

Innox
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views21 pages

L3 - Computer System - WIRELESS LOCAL AREA NETWORK SET UP - WLAN

This document outlines a module on wireless local area network (WLAN) setup. The module aims to teach students how to setup a WLAN, with 4 key elements of competence: applying WLAN concepts, conducting site surveys, configuring and maintaining WLANs, and documenting work. It provides learning outcomes and content for each element, covering topics such as WLAN standards, infrastructure components, topologies, and security considerations. The overall goal is for students to leave with the skills to properly setup a functional and secure WLAN.

Uploaded by

Innox
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

MODULE: WIRELESS LOCAL AREA NETWORK SETUP (WLAN)

COMPETENCE: Setup wireless local area network (WLAN)

REQF Level: 3 Learning hours

Credits: 80

Sector: ICT

Sub-sector: Computer Systems Technology

MODULE OUTLINE
Elements of competence Performance criteria
1. Apply WLAN Concepts 1.1 Proper description of SSID technology and its
functionality
1.2 Proper description of wireless network
operations
1.3 Proper Identification of Wireless WLAN threats
2. Plan and Conduct Site survey 2.1 Proper analysis of facilities and existing
wireless &wired networks 2.2 Systematic
identification of Security requirements 2.3
Appropriate identification of tools, equipment and
materials used in Wireless local area Network
(WLAN) 2.4 Systematic design and interpretation
of Building blueprint
3. Configure and maintain WLAN 3.1 Systematic implementation of WLAN 3.2
Relevant application of security to the technology
applied 3.3 Efficient test of access point and
verifying wireless connection and security
arrangements 3.4 Efficient Troubleshooting of
WLAN Problems
4. Document the work done 4.1 Accurate documentation of review process 4.2
Effective reporting procedures of the task
accomplished are in place and used 4.3 Methodical
Writing of the technical journal and
recommendation

1|Page
CONTENT

Learning Unit 1: Apply WLAN Concepts

Learning Outcomes:

1.1. Describe WLAN technology and its functionality

1.2. Describe WLAN operations

1.3. Identify WLAN threats

LO 1.1. Describe WLAN technology and its functionality

 Why use wireless?

- Why have Wireless LANs become so popular?

Wireless is cheaper and easier to operate, allow mobility, easy to extend.


 Wireless LANs

A wireless local area network (WLAN) is a wireless computer network that links two or more devices
using wireless communication within a limited area such as a home, school, computer laboratory, or
office building. This gives users the ability to move around within a local coverage area and yet still be
connected to the network.

 Comparing a WLAN to a LAN

2|Page
Other Comparison

WLAN Ethernet LAN

The WLAN devices are based on IEEE 802.11 family of The Ethernet LAN devices are based on IEEE 802.3
standards. standards.

WLAN devices use high energy radio frequency waves Ethernet LAN devices use electric signals to
to transmit the data. transmit the data.

Radio frequency waves travel in the space. Hence a Electric signals flow over the cables. Hence wired
physical connection is not needed between the connection is needed between devices which are
devices which are connected to the WLANs. connected to the Ethernet LANs.

WLAN uses half duplex mechanism for


Ethernet supports full duplex mechanism for
communication.
communication when a switch connects using a

3|Page
single device rather than hub.

WLANs suffer from interference of various types LANs suffer less interference as electric signals
during travel from source to the destination. travel using cables.

WLANs use CSMA/CA to avoid collisions in the Ethernet LANs use CSMA/CD to detect collisions in
network. the network.

Refer WLAN tutorial Refer IEEE 802.3 Ethernet standards

 WLANs Standards

There are four basic types of transmissions standards for wireless networking. These types are
produced by the Institute of Electrical and Electronic Engineers (IEEE). These standards define all
aspects of radio frequency wireless networking. They have established four transmission standards;
802.11, 802.11a, 802.11b, 802.11g, 802.11n.

The basic differences between these four types are connection speed and radio frequency.

- Wi-Fi Certification

Wi-Fi certification certifies Wi-Fi products stating if they conform to certain standards
of interoperability.

Certification types

Mandatory:

-Core MAC/PHY interoperability over 802.11a, 802.11b, 802.11g, and 802.11n. (at least one)

-Wi-Fi Protected Access 2 (WPA2) security, which aligns with IEEE 802.11i. WPA2 is available in two
types: WPA2-Personal for consumer use, and WPA2 Enterprise, which adds EAP authentication.

Optional:

4|Page
- Tests corresponding to IEEE 802.11h and 802.11d.
- WMM Quality of Service,
- WMM Power Save,
- Wi-Fi Protected Setup
 Supporting Mobility
 Benefits of Wireless

Wi-Fi Direct

In October 2010, the Alliance began to certify Wi-Fi Direct, that allows Wi-Fi-enabled devices to
communicate directly with each other, without going through a wireless access point or hotspot. Since
2009 when it was first announced, some suggested Wi-Fi Direct might replace the need for Bluetooth on
applications that do not rely on Bluetooth low energy.

Wi-Fi Aware

Wi-Fi Aware is an interoperability certification program announced in January 2015, that enables device
users when in the range of a particular access point or another compatible device to receive
notifications of applications or services available in the proximity.

- Supporting Mobility

Wireless allows users to move around freely within the area of the network with their laptops, handheld
devices etc and get an internet connection.

- Benefits of Wireless

1). Increased mobility and collaboration

 Roam without losing your connection

 Work together more effectively


2). Improved responsiveness

 Connect to the information you need when you need it

 Provide better customer service


3). Better access to information

 Connect hard-to-reach areas

 Improve your processes


4). Easier network expansion

 Add users quickly

 Grow your network cost-effectively

5|Page
5). Enhanced guest access

 Give secure network access to customers and business partners


Offer a value-added service

 Wireless infrastructure components

- Wireless NICs

A wireless network interface controller (WNIC) is a network interface controller which connects to a
wireless radio-based computer network.

- Wireless Home Router

A wireless router is a device that performs the functions of a router and also includes the functions of a
wireless access point. It is used to provide access to the Internet or a private computer network.

Examples: Linksys, TP-Link , Netgear , Samsung Connect Home router, Norton Core router.

- Wireless Access Points

A wireless access point (WAP) is a hardware device or configured node on a local area network (LAN)
that allows wireless capable devices and wired networks to connect through a wireless standard,
including Wi-Fi or Bluetooth.

- Wireless Antennas

There are two basic types of antennas for WLAN and cellular products: Omni-directional and directional.
The two types are categorized by the direction in which they beam radio signals.

Omni-directional

Omni-directional antennas are designed to radiate signals equally in all directions. Use this type of
antenna if you need to transmit from a central node, such as an access point, to users scattered all
around the area.

Directional

Directional antennas provide a more focused signal than omnidirectional antennas. Signals are typically
transmitted in an oval shaped pattern with a beam width of only a few degrees. With higher gain,
directional antennas can also be used outdoors to extend point-to-point links over a longer transmission
distance, or to form a point-to-multipoint network.

 Small Wireless Deployment Solutions

It may be a wireless network for a small organization requiring two APs and supporting a small group of
users.

6|Page
It may be small organizations that want to simplify their wireless deployment using several APs.

Access points with clustering capability

Clustering capability makes it easy to set up, configure, and manage a growing wireless network.

For APs that support the clustering of APs without the use of a controller, the cluster provides a single
point of administration and enables the administrator to view the deployment of APs as a single wireless
network, rather than a series of separate wireless devices.

A cluster can be formed between two APs if the following conditions are met:

 Clustering mode is enabled on the APs.


 The APs joining the cluster have the same Cluster Name.
 The APs are connected on the same network segment.
 The APs use the same radio mode (i.e., both radios use 802.11n.).

 802.11 WLAN Topologies

 Wireless Topology Modes

Wireless LANs can accommodate various network topologies: Ad Hoc mode, Infrastructure mode

 Ad Hoc Mode

Ad hoc mode is based on the Independent Basic Service Set (IBSS). In IBSS, clients can set up connections
directly to other clients without an intermediate AP. This allows you to set up peer-to-peer network
connections and is sometimes used in a SOHO.

 Infrastructure Mode

Infrastructure mode was designed to deal with security and scalability issues. In infrastructure mode,
wireless clients can communicate with each other, albeit via an AP. Two infrastructure mode
implementations are in use:

Basic Service Set (BSS)

Extended Service Set (ESS)

In BSS mode, clients connect to an AP, which allows them to communicate with other clients or LAN
based resources. The WLAN is identified by a single SSID; however, each AP requires a unique ID, called
a Basic Service Set Identifier (BSSID), which is the MAC address of the AP’s wireless card. This mode is
commonly used for wireless clients that don’t roam, such as PCs.

In ESS mode, two or more BSSs are interconnected to allow for larger roaming distances. To make this
as transparent as possible to the clients, such as PDAs, laptops, or mobile phones, a single SSID is used
among all of the APs. Each AP, however, will have a unique BSSID.

7|Page
Formative Assessment 1.1

Learning Outcome 1.2: Describe WLAN operations

 Introduction to wireless network operations

Wireless networks operate using radio frequency (RF) technology, a frequency within the
electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to
an antenna, an electromagnetic field is created that then is able to propagate through space.

 Wireless operations

- 802.11 Frame Structure

802.11 devices exchange variable length frames, which have a slightly different structure than the
simple frame format used in Ethernet LANs. An 802.11 frame contains a fixed length header, a variable
length payload that may contain up 2324 bytes of user data and a 32 bits CRC.

An 802.11 data frame is shown below.

- 802.11 Frame Structure Control Frames

Control frames are simpler than data frames. They contain a Frame Control, a Duration field and one or
two addresses.

8|Page
- Wireless Frame Type

Wireless LANs use the 802.11 frame structure. Wireless frame types are in three categories:

Management frame, control frame and data frame.

- Management Frames

Management frame is used for joining and leaving a wireless cell. Management frame types include
association request, association response, and re-association request, Beacon, Probe request, probe
response, authentication request, authentication response, de-authentication, re-association request,
re-association response, announcement traffic indication message (ATIM).

- Control Frames

Control frame is used to acknowledge when data frames are received. Control frame types include:
Request to send (RTS), Clear to sent (CTS), Acknowledgement, Power-save-poll (PS-Poll), contention free
end (CF-End), Contention free end + Acknowledgement (CF-End +ACK), CF-ACK, CF-ACK+CF-Poll.

- CSMA/CA

SMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in
802.11 networks. Unlike CSMA/CD (Carrier Sense Multiple Access/Collision Detect) which deals with
transmissions after a collision has occurred, CSMA/CA acts to prevent collisions before they happen.

- Discovering APs

AP Discovery is a feature that allows network administrator to check the access points nearby and the
channels they are using, it helps to find the best channel to use to avoid Wi-Fi interference.

1. Go Wireless LAN >> AP Discovery.

2. Click Scan and wait for about 5 seconds, the found APs will be listed.

Illustration (don’t draw it in notes):

9|Page
1. Click Statistics to check the channels that are being used.

(illustration: don’t draw it)

10 | P a g e
 Channel Management

When Channel Management is enabled, the Access Point automatically assigns wireless radio channels
used by clustered access points. The automatic channel assignment reduces mutual interference (or
interference with other access points outside of its cluster) and maximizes Wi-Fi bandwidth to help
maintain the efficiency of communication over the wireless network.

- Frequency Channel Saturation

"Channel saturation" happens when too many Wireless Access Points ("WAP") have a Wi-Fi Network
SSID operating on the same channel and are too close together. This causes interference which in turn
causes network slowness and network disconnects.

Note: WAP that are broadcasting the same SSID should be on different channels to prevent
interference. There are three channels (1, 6, 11) that do not overlap and should be used effectively for
channel management by WAP that are located physically close to each other.

- Selecting Channels

Selecting one or more channels is an important part of setting up a WLAN correctly. There are up to 11
channels that Wi-Fi devices can use in the 2.4 GHz frequency band. When setting the channels on your
APs, try to stick with 1, 6, or 11. They are the only channels that don’t overlap.

Formative Assessment 1.2

Learning Outcome 1.3: Identify WLAN threats

 WLANs threats

A WLAN is susceptible to many different types of threats both from outside the network and within

11 | P a g e
the network. Those threats include but not limited to: Data Interception, Denial of Service, Rogue Access
Points, Wireless Intruders, Misconfigured Access Point, Evil Twin Access Points.

- DoS Attack

A Denial-of-Service (DoS) attack is an attack meant to shut down a network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information
that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees,
members, or account holders) of the service or resource they expected.

- Management Frame DoS Attacks

Management Frame DOS Attack is an attack by which a malicious user could intentionally initiate a DoS
attack using RF jamming devices that produce accidental interference.

It is likelier that they will attempt to manipulate management frames to consume the AP resources and
keep channels too busy to service legitimate user traffic.

Two types:

A spoofed disconnect attack

A CTS flood

- Rogue APs

A rogue access point is a wireless access point that has been installed on a secure network without
explicit authorization from a local network administrator, whether added by a well-meaning employee
or by a malicious attacker.

 Man-in-the-Middle Attack

A man-in-the-middle attack is a WLAN attack that requires three players. There’s the victim, the entity
with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the
victim’s communications. Critical to the scenario is that the victim isn’t aware of the man in the middle.

Man-in-the-middle attacks come in two forms, one that involves physical proximity to the intended
target, and another that involves malicious software, or malware.

Formative Assessment 1.3

12 | P a g e
2. Plan and Conduct Site survey

The first step in a wireless LAN (WLAN) deployment is to ensure that desired operation begins with a site
survey to assess the Radio Frequency (RF) behavior in a specific environment. Many issues can arise in a
wireless network due to poor planning and coverage.

Learning Outcome 2.1: Analyze facilities and existing WIFI &WIRED network

 Site planning process

When conducting a wireless site survey, consider the following:

1. Understand the wireless requirements.

2. Obtain a facility diagram.

3. Visually inspect the facility.

4. Assess existing network infrastructure.

5. Identify coverage areas.

6. Determine preliminary access point locations.

7. Verify access point locations.

8. Document findings.

Planning steps:

- Perform an initial environment evaluation

It refers to a limited environmental study which describes a proposed project,


the environment surrounding that project, and identifies and evaluates any likely impacts on
that environment.

Environment types:

Low-Complexity Environments

High-Complexity Environments

13 | P a g e
- Select the proper APs for the deployment

Wireless site survey software identifies access point, data rate, signal strength, and signal quality. You
can load this software on a laptop and test the coverage of each preliminary access point location.
Alternately, you can use a third party site survey tool available from several different companies, such
as AirMagnet, Berkeley Varitronics Systems, and Ekahau.

- Enter the collected and determined information into Visual RF Plan

Visual RF gives accurate view of your entire network.

 Environment evaluation

- Physical site survey

Passive physical site survey methodology

Passive surveys are surveys that are performed with a listen-only mode. The survey client never
associates to the access point (AP). Such surveys can be helpful when you look for rogue devices or you
want a good gauge of downlink RF coverage from the infrastructure devices.

These can be accomplished with a passive survey:

-Identify rogues

-Locate RF trouble zones quickly

-Validate final RF setting

-Perform initial surveys

Active survey methodology

Active surveys are performed with the survey client associated to the APs used throughout the survey.
When a client is associated, it performs all the tasks a typical 802.11 client performs, which includes rate
shifting data rates as the RF condition changes and performs retransmissions. Active surveys are
commonly used for new WLAN deployments because they provide the most details upon which to base
a design.

Spectrum clearing methodology

Characterize site spectral content

Identify and locate sources of undesired/unlicensed transmissions

Signals can be continuous or transient

- Survey Methods

14 | P a g e
- RF site survey

- Analysis of existing system

a. Current network usage


b. Future network usage

Formative Assessment 2.1

Learning Outcome 2.2: Identify Security requirements

 Authentication

 Confidentiality

 Auditing

Formative Assessment 2.2

Learning Outcome 2. 3: Identify tools, equipment and materials used in Wireless local area Network -
WLAN)

 Spectrum analyzer

 Protocol analysis software

 Laptop with PC Card and utilities

 Access point

 Antennas

 Batteries

 Binoculars

 Communication devices

 Camera

 Measuring devices

 Mounting tools and devices

 Marking tape

 Rolling carts

Formative Assessment 2.3

15 | P a g e
Learning Outcome 2. 4: Design and interpret Building blueprint

 Draw a schematic diagram of the system using:

- Edraw max,

Packet Tracer,

Visual RF

Formative Assessment 2.4

16 | P a g e
Learning unit 3: Configure and maintain WLAN

Learning Outcome 3.1: Implement WLAN

 Installing, configuring and managing the following

- WLAN devices:

Access points

Enterprise WLAN switches and controllers

Remote office WLAN switches and controllers

Power over Ethernet injectors and switches

WLAN bridges

Residential WLAN gateways

Enterprise encryption gateways

WLAN mesh routers

 Installing, Configuring, and Managing

- WLAN Client Devices :

PC Cards

USB, Compact Flash, and SD devices

PCI and Mini−PCI cards

Wireless presentation gateways

Formative Assessment 3.1

Learning Outcome 3.2: Apply security to the technology applied

 Identifying and Preventing WLAN Security Attacks

- Eavesdropping

- Hijacking

- Man−in−the−middle

- Denial of service -DoS)

17 | P a g e
- Management interface exploits

- Encryption cracking

- Authentication cracking

- MAC spoofing

- Peer−to−peer attacks

- Social engineering

Formative Assessment 3.2

Learning Outcome 3.3: Troubleshoot local area network

 Wireless LAN Testing Considerations

- Signal Coverage Testing

- Performance Testing

- In-Motion Testing

- Security Vulnerability Testing

- Acceptance/Verification Testing

- Simulation Testing

- Prototype Testing

- Pilot Testing

 Test Documentation

- Background

- Test team

- Requirements summary

- Test methods and tools

- Test results and analysis

- Recommendations

Formative Assessment 3.3

18 | P a g e
Learning Outcome 3.4: Troubleshoot WLAN Problems

 Troubleshooting Wireless Station Connection to AP

- Can Any Wireless Stations Connect to the AP?

- Troubleshooting Wireless Stations

- Wireless Network Detected

- Signal Interference

- Site Survey

- Station Status

- Using the Correct SSID

- Station Configuration

- Correct Security Settings

- TCP/IP Protocol Installed and Configured

 Troubleshooting AP Connection to Wired LAN

- Port Configuration on Wired/Wireless

- Network Cable

- Troubleshooting the AP

- Check for Power Issues with the AP

- Check for Booting Issues with the AP

- Check AP LED Behavior

- Check AP Has Correct IP Address

- Check AP is Broadcasting the SSID

- Check AP Radio Settings

Formative Assessment 3.4

19 | P a g e
Learning unit 4: Document the work done

Learning Outcome 4.1: Document the work done

 Description of network status before

- Status of network infrastructure

- describe problems found

 Review of user manual and previous report

 Suggestion of solutions on problems found

 Description of solution implementation

 Description of procedures of the task accomplished

 Network Devices, equipment and materials used

 Description of the network status after work

 Technical journal and recommendation report

Formative Assessment 4.1

Learning Outcome 4.2: Develop the design concept according to selected materials

 Description of network status before

- Status of network infrastructure

- describe problems found

 Review of user manual and previous report

 Suggestion of solutions on problems found

 Description of solution implementation

 Description of procedures of the task accomplished

 Network Devices, equipment and materials used

 Description of the network status after work

 Technical journal and recommendation report

Formative Assessment 4.2

20 | P a g e
Learning Outcome 4.3: Apply hardwood floor

 Description of network status before

- Status of network infrastructure

- describe problems found

 Review of user manual and previous report

 Suggestion of solutions on problems found

 Description of solution implementation

 Description of procedures of the task accomplished

 Network Devices, equipment and materials used

 Description of the network status after work

 Technical journal and recommendation report

Formative Assessment 4.3

21 | P a g e

You might also like