L3 - Computer System - WIRELESS LOCAL AREA NETWORK SET UP - WLAN
L3 - Computer System - WIRELESS LOCAL AREA NETWORK SET UP - WLAN
Credits: 80
Sector: ICT
MODULE OUTLINE
Elements of competence Performance criteria
1. Apply WLAN Concepts 1.1 Proper description of SSID technology and its
functionality
1.2 Proper description of wireless network
operations
1.3 Proper Identification of Wireless WLAN threats
2. Plan and Conduct Site survey 2.1 Proper analysis of facilities and existing
wireless &wired networks 2.2 Systematic
identification of Security requirements 2.3
Appropriate identification of tools, equipment and
materials used in Wireless local area Network
(WLAN) 2.4 Systematic design and interpretation
of Building blueprint
3. Configure and maintain WLAN 3.1 Systematic implementation of WLAN 3.2
Relevant application of security to the technology
applied 3.3 Efficient test of access point and
verifying wireless connection and security
arrangements 3.4 Efficient Troubleshooting of
WLAN Problems
4. Document the work done 4.1 Accurate documentation of review process 4.2
Effective reporting procedures of the task
accomplished are in place and used 4.3 Methodical
Writing of the technical journal and
recommendation
1|Page
CONTENT
Learning Outcomes:
A wireless local area network (WLAN) is a wireless computer network that links two or more devices
using wireless communication within a limited area such as a home, school, computer laboratory, or
office building. This gives users the ability to move around within a local coverage area and yet still be
connected to the network.
2|Page
Other Comparison
The WLAN devices are based on IEEE 802.11 family of The Ethernet LAN devices are based on IEEE 802.3
standards. standards.
WLAN devices use high energy radio frequency waves Ethernet LAN devices use electric signals to
to transmit the data. transmit the data.
Radio frequency waves travel in the space. Hence a Electric signals flow over the cables. Hence wired
physical connection is not needed between the connection is needed between devices which are
devices which are connected to the WLANs. connected to the Ethernet LANs.
3|Page
single device rather than hub.
WLANs suffer from interference of various types LANs suffer less interference as electric signals
during travel from source to the destination. travel using cables.
WLANs use CSMA/CA to avoid collisions in the Ethernet LANs use CSMA/CD to detect collisions in
network. the network.
WLANs Standards
There are four basic types of transmissions standards for wireless networking. These types are
produced by the Institute of Electrical and Electronic Engineers (IEEE). These standards define all
aspects of radio frequency wireless networking. They have established four transmission standards;
802.11, 802.11a, 802.11b, 802.11g, 802.11n.
The basic differences between these four types are connection speed and radio frequency.
- Wi-Fi Certification
Wi-Fi certification certifies Wi-Fi products stating if they conform to certain standards
of interoperability.
Certification types
Mandatory:
-Core MAC/PHY interoperability over 802.11a, 802.11b, 802.11g, and 802.11n. (at least one)
-Wi-Fi Protected Access 2 (WPA2) security, which aligns with IEEE 802.11i. WPA2 is available in two
types: WPA2-Personal for consumer use, and WPA2 Enterprise, which adds EAP authentication.
Optional:
4|Page
- Tests corresponding to IEEE 802.11h and 802.11d.
- WMM Quality of Service,
- WMM Power Save,
- Wi-Fi Protected Setup
Supporting Mobility
Benefits of Wireless
Wi-Fi Direct
In October 2010, the Alliance began to certify Wi-Fi Direct, that allows Wi-Fi-enabled devices to
communicate directly with each other, without going through a wireless access point or hotspot. Since
2009 when it was first announced, some suggested Wi-Fi Direct might replace the need for Bluetooth on
applications that do not rely on Bluetooth low energy.
Wi-Fi Aware
Wi-Fi Aware is an interoperability certification program announced in January 2015, that enables device
users when in the range of a particular access point or another compatible device to receive
notifications of applications or services available in the proximity.
- Supporting Mobility
Wireless allows users to move around freely within the area of the network with their laptops, handheld
devices etc and get an internet connection.
- Benefits of Wireless
5|Page
5). Enhanced guest access
- Wireless NICs
A wireless network interface controller (WNIC) is a network interface controller which connects to a
wireless radio-based computer network.
A wireless router is a device that performs the functions of a router and also includes the functions of a
wireless access point. It is used to provide access to the Internet or a private computer network.
Examples: Linksys, TP-Link , Netgear , Samsung Connect Home router, Norton Core router.
A wireless access point (WAP) is a hardware device or configured node on a local area network (LAN)
that allows wireless capable devices and wired networks to connect through a wireless standard,
including Wi-Fi or Bluetooth.
- Wireless Antennas
There are two basic types of antennas for WLAN and cellular products: Omni-directional and directional.
The two types are categorized by the direction in which they beam radio signals.
Omni-directional
Omni-directional antennas are designed to radiate signals equally in all directions. Use this type of
antenna if you need to transmit from a central node, such as an access point, to users scattered all
around the area.
Directional
Directional antennas provide a more focused signal than omnidirectional antennas. Signals are typically
transmitted in an oval shaped pattern with a beam width of only a few degrees. With higher gain,
directional antennas can also be used outdoors to extend point-to-point links over a longer transmission
distance, or to form a point-to-multipoint network.
It may be a wireless network for a small organization requiring two APs and supporting a small group of
users.
6|Page
It may be small organizations that want to simplify their wireless deployment using several APs.
Clustering capability makes it easy to set up, configure, and manage a growing wireless network.
For APs that support the clustering of APs without the use of a controller, the cluster provides a single
point of administration and enables the administrator to view the deployment of APs as a single wireless
network, rather than a series of separate wireless devices.
A cluster can be formed between two APs if the following conditions are met:
Wireless LANs can accommodate various network topologies: Ad Hoc mode, Infrastructure mode
Ad Hoc Mode
Ad hoc mode is based on the Independent Basic Service Set (IBSS). In IBSS, clients can set up connections
directly to other clients without an intermediate AP. This allows you to set up peer-to-peer network
connections and is sometimes used in a SOHO.
Infrastructure Mode
Infrastructure mode was designed to deal with security and scalability issues. In infrastructure mode,
wireless clients can communicate with each other, albeit via an AP. Two infrastructure mode
implementations are in use:
In BSS mode, clients connect to an AP, which allows them to communicate with other clients or LAN
based resources. The WLAN is identified by a single SSID; however, each AP requires a unique ID, called
a Basic Service Set Identifier (BSSID), which is the MAC address of the AP’s wireless card. This mode is
commonly used for wireless clients that don’t roam, such as PCs.
In ESS mode, two or more BSSs are interconnected to allow for larger roaming distances. To make this
as transparent as possible to the clients, such as PDAs, laptops, or mobile phones, a single SSID is used
among all of the APs. Each AP, however, will have a unique BSSID.
7|Page
Formative Assessment 1.1
Wireless networks operate using radio frequency (RF) technology, a frequency within the
electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to
an antenna, an electromagnetic field is created that then is able to propagate through space.
Wireless operations
802.11 devices exchange variable length frames, which have a slightly different structure than the
simple frame format used in Ethernet LANs. An 802.11 frame contains a fixed length header, a variable
length payload that may contain up 2324 bytes of user data and a 32 bits CRC.
Control frames are simpler than data frames. They contain a Frame Control, a Duration field and one or
two addresses.
8|Page
- Wireless Frame Type
Wireless LANs use the 802.11 frame structure. Wireless frame types are in three categories:
- Management Frames
Management frame is used for joining and leaving a wireless cell. Management frame types include
association request, association response, and re-association request, Beacon, Probe request, probe
response, authentication request, authentication response, de-authentication, re-association request,
re-association response, announcement traffic indication message (ATIM).
- Control Frames
Control frame is used to acknowledge when data frames are received. Control frame types include:
Request to send (RTS), Clear to sent (CTS), Acknowledgement, Power-save-poll (PS-Poll), contention free
end (CF-End), Contention free end + Acknowledgement (CF-End +ACK), CF-ACK, CF-ACK+CF-Poll.
- CSMA/CA
SMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in
802.11 networks. Unlike CSMA/CD (Carrier Sense Multiple Access/Collision Detect) which deals with
transmissions after a collision has occurred, CSMA/CA acts to prevent collisions before they happen.
- Discovering APs
AP Discovery is a feature that allows network administrator to check the access points nearby and the
channels they are using, it helps to find the best channel to use to avoid Wi-Fi interference.
2. Click Scan and wait for about 5 seconds, the found APs will be listed.
9|Page
1. Click Statistics to check the channels that are being used.
10 | P a g e
Channel Management
When Channel Management is enabled, the Access Point automatically assigns wireless radio channels
used by clustered access points. The automatic channel assignment reduces mutual interference (or
interference with other access points outside of its cluster) and maximizes Wi-Fi bandwidth to help
maintain the efficiency of communication over the wireless network.
"Channel saturation" happens when too many Wireless Access Points ("WAP") have a Wi-Fi Network
SSID operating on the same channel and are too close together. This causes interference which in turn
causes network slowness and network disconnects.
Note: WAP that are broadcasting the same SSID should be on different channels to prevent
interference. There are three channels (1, 6, 11) that do not overlap and should be used effectively for
channel management by WAP that are located physically close to each other.
- Selecting Channels
Selecting one or more channels is an important part of setting up a WLAN correctly. There are up to 11
channels that Wi-Fi devices can use in the 2.4 GHz frequency band. When setting the channels on your
APs, try to stick with 1, 6, or 11. They are the only channels that don’t overlap.
WLANs threats
A WLAN is susceptible to many different types of threats both from outside the network and within
11 | P a g e
the network. Those threats include but not limited to: Data Interception, Denial of Service, Rogue Access
Points, Wireless Intruders, Misconfigured Access Point, Evil Twin Access Points.
- DoS Attack
A Denial-of-Service (DoS) attack is an attack meant to shut down a network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information
that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees,
members, or account holders) of the service or resource they expected.
Management Frame DOS Attack is an attack by which a malicious user could intentionally initiate a DoS
attack using RF jamming devices that produce accidental interference.
It is likelier that they will attempt to manipulate management frames to consume the AP resources and
keep channels too busy to service legitimate user traffic.
Two types:
A CTS flood
- Rogue APs
A rogue access point is a wireless access point that has been installed on a secure network without
explicit authorization from a local network administrator, whether added by a well-meaning employee
or by a malicious attacker.
Man-in-the-Middle Attack
A man-in-the-middle attack is a WLAN attack that requires three players. There’s the victim, the entity
with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the
victim’s communications. Critical to the scenario is that the victim isn’t aware of the man in the middle.
Man-in-the-middle attacks come in two forms, one that involves physical proximity to the intended
target, and another that involves malicious software, or malware.
12 | P a g e
2. Plan and Conduct Site survey
The first step in a wireless LAN (WLAN) deployment is to ensure that desired operation begins with a site
survey to assess the Radio Frequency (RF) behavior in a specific environment. Many issues can arise in a
wireless network due to poor planning and coverage.
Learning Outcome 2.1: Analyze facilities and existing WIFI &WIRED network
8. Document findings.
Planning steps:
Environment types:
Low-Complexity Environments
High-Complexity Environments
13 | P a g e
- Select the proper APs for the deployment
Wireless site survey software identifies access point, data rate, signal strength, and signal quality. You
can load this software on a laptop and test the coverage of each preliminary access point location.
Alternately, you can use a third party site survey tool available from several different companies, such
as AirMagnet, Berkeley Varitronics Systems, and Ekahau.
Environment evaluation
Passive surveys are surveys that are performed with a listen-only mode. The survey client never
associates to the access point (AP). Such surveys can be helpful when you look for rogue devices or you
want a good gauge of downlink RF coverage from the infrastructure devices.
-Identify rogues
Active surveys are performed with the survey client associated to the APs used throughout the survey.
When a client is associated, it performs all the tasks a typical 802.11 client performs, which includes rate
shifting data rates as the RF condition changes and performs retransmissions. Active surveys are
commonly used for new WLAN deployments because they provide the most details upon which to base
a design.
- Survey Methods
14 | P a g e
- RF site survey
Authentication
Confidentiality
Auditing
Learning Outcome 2. 3: Identify tools, equipment and materials used in Wireless local area Network -
WLAN)
Spectrum analyzer
Access point
Antennas
Batteries
Binoculars
Communication devices
Camera
Measuring devices
Marking tape
Rolling carts
15 | P a g e
Learning Outcome 2. 4: Design and interpret Building blueprint
- Edraw max,
Packet Tracer,
Visual RF
16 | P a g e
Learning unit 3: Configure and maintain WLAN
- WLAN devices:
Access points
WLAN bridges
PC Cards
- Eavesdropping
- Hijacking
- Man−in−the−middle
17 | P a g e
- Management interface exploits
- Encryption cracking
- Authentication cracking
- MAC spoofing
- Peer−to−peer attacks
- Social engineering
- Performance Testing
- In-Motion Testing
- Acceptance/Verification Testing
- Simulation Testing
- Prototype Testing
- Pilot Testing
Test Documentation
- Background
- Test team
- Requirements summary
- Recommendations
18 | P a g e
Learning Outcome 3.4: Troubleshoot WLAN Problems
- Signal Interference
- Site Survey
- Station Status
- Station Configuration
- Network Cable
- Troubleshooting the AP
19 | P a g e
Learning unit 4: Document the work done
Learning Outcome 4.2: Develop the design concept according to selected materials
20 | P a g e
Learning Outcome 4.3: Apply hardwood floor
21 | P a g e