0% found this document useful (0 votes)
226 views13 pages

Assignment Wireless Communication

Uploaded by

Smarika Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views13 pages

Assignment Wireless Communication

Uploaded by

Smarika Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

ITNE3004 Wireless Communication and Networks

ITNE3004
Wireless Communication and Networks

Assignment

August 2020
TEAM MEMBERS
Bhintuna Shrestha 41655
Salina Khadka 42791
Sonu Maharjan 44046
Jeshika Gurung 40172
Copyright © 2015-2018 VIT, All Rights Reserved.
ITNE3004 Wireless Communication and Networks

Smarika Shrestha 44067

Contents
Introduction:.................................................................................................................................................3
Fig: Example of Campus Network.................................................................................................................3
Requirement analysis....................................................................................................................................3
Functional requirements......................................................................................................................4
Non-functional requirements...............................................................................................................4
Wireless Network Design:.............................................................................................................................5
Bandwidth requirements..............................................................................................................................5
Security Analysis:..........................................................................................................................................7
Wired Equivalent Privacy:....................................................................................................................8
WPA/WAP2:.........................................................................................................................................8
Wireless Intrusion Prevention Systems/Intrusion Detection Systems:...............................................8
Virtual private network:.......................................................................................................................8
Maintenance and Troubleshooting...............................................................................................................9
Key Features:......................................................................................................................................10
Pricing:................................................................................................................................................10
Conclusion:..................................................................................................................................................11
Bibliography................................................................................................................................................12

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

Introduction:
As we know that with the advancement of technology, a large organization covering wide areas and higher
number of network devices require more updates and advance network system. Taking this concept Faber
University requires the design of a campus network to cover for all the infrastructure that is spread over
the campus. The technology and old network that has been used up till date cannot satisfy the technically
tilted students who are the aim for the university this year. All the areas and buildings along with its
structure and capacity. This assessment will showcase the in and outs of how a network is designed,
maintained, analysed which includes the functional requirements, limitations, along with design phase
functions. We will be designing a wireless network system using Packet Tracer which has been illustrated in
detail below. We have included all the foundation principles behind the network design and have also
mentioned about the concept and its overall implementation. Along with the implementation the network
also needs to be constantly monitored using a network monitoring tool which has been explained.
Everything regarding the campus network that ranges from the requirements, monitoring tools, Packet
tracer details to the security analysis part of the assignment has been illustrated in this report. The major
motive of this report is to understand how such a large organization develops and maintains its network
and to help others know what are the evident steps that need to be taken and how to start and finish it.

Fig: Example of Campus Network[ CITATION Sch20 \l 3081 ]

Requirement analysis is the method of identifying user expectations for a new or improved product
which features, called requirements, need to be quantifiable, up to date. Similarly, the purpose of
the requirements analysis stage is to convert the requirements and higher-level requirements specified

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks
in the previous steps into measurable, discoverable, comprehensive, consistent, and stakeholder-approved
requirement.[ CITATION Mar \l 3081 ]

Functional requirements[ CITATION Sar19 \l 3081 ]


Functional requirements normally compose a system design organization where the technologies will
deliver to the universities or business from a technological point of view. The main important thing in the
universities or in the business should have is Internet as well as internet connectivity should be configured
for all users, who are accessing the network with that it should work for security mechanism where it
restrict the users from access to other office networks. Meanwhile, all universities should set up printing
services premises so that Internet access is available to all wireless users.
Moreover, a poor design can be access sometimes in the business because design does not meet the
functional requirements as considered. So, based on assume the real-world design, designer is not
completely preferring for all functional requirements. That is why, they need to depend upon other factors
indirectly, where it cannot harm the system to run.

Non-functional requirements [ CITATION Sar19 \l 3081 ]


Non-functional requirements define how the system should do it with its system characteristics such as
security, reliability, performance, maintenance, scalability. Functional requirements are not affected by
non-functional requirements. Each of them is essential to run and configured the network with certain
circumstances.
Security: Networks configured for university require advanced security algorithms to prevent attacks
on the manipulation of network data.
Availability: A highly available network requires that users access the network without interrupting the
work of the Internet.
Scalability: The network provided for universities is scalable. This means that the network can
be changed by adding more devices to the network.[ CITATION Sar19 \l 3081 ]

Wireless Network Design:

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

Bandwidth requirements
• Subnetting for WLAN users:
To design a wireless network for any organization, subnetting helps improving network
performance and speed. It also guarantees that traffic targeted for a system remains in that
subnet within a subnet, minimizing congestion. Size is one that required to be done into account
once we are planning and developing a network. One of its major strength of subnetting is that it
allows us to control our network growth. [ CITATION CBT17 \l 1033 ]
• Various WLAN protocols used:
WLAN stands for the local wireless network. A WLAN is a local area network that uses the wireless
networking. Wireless communication requires the use of high frequency radio waves distributed
via the access point. Access point is a hardware unit used as a hub to relay wireless signals. Think
is a large fountain with a single beam (access point). As long as you remain within certain radius of
the beam (coverage radius) you will still get wet (maintain signal connection). [ CITATION WLA18 \l
1033 ] WLAN provides a wireless network and links to the internet. No cords or wires for laying or
drilling are used which is easier to setup and due to this, also reduce installation fees. [ CITATION
rou12 \l 1033 ]
There are various types of WLAN protocols such as:
1. 802.11a Protocol
2. 802.11b Protocol
3. 802.11g Protocol
4. 802.11n Protocol
Among these, we have used 802.11a Protocol because technically this protocol uses the
Orthogonal Multiplexing Frequency division (OFDM), a modulation scheme which is well tailored
to the office environment, since digital information can be wirelessly transferred over multiple
frequencies. Inside a 5GHz frequency range this protocol achieves data transfer rates of up to
54Mbps. Although this frequency of 801.11a are difficult to reach walls and others. Compare to
other signals, it has less coverage signal.[CITATION Placeholder1 \l 1033 ]
• Various devices used e.g. Access Point:
A hardware system for wireless communications that provides a single wireless access point. A
wireless access point acts much like a ‘hub’ except that all users with whom the system retains an
active network link share the total bandwidth. The access point allows all the connected devices
to establish a network link during service within a certain coverage range. [ CITATION WLA18 \l
1033 ]
 WLAN controllers etc.:
Wireless network access points that allow network connectivity for wireless devices are controlled
by a Wi-Fi controller. If the business is small or medium sized, then WLAN controllers is not
necessary. In the access point, a WLAN controller is integrated. The entire Wi-Fi network can be
controlled from an access point. [ CITATION wha17 \l 1033 ]

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

• Frequency used:
Radio Frequency (RF) is used by WLAN to pass information to its specified destination. 100 MHz in
diameter which range from 2.4 GHz to 2.5 GHz frequencies are the most widely used frequency
spectrum for cellular local are networks. There are 14 channels specified by the IEE specification
for the 2.4 GHz band for the use of Wi-Fi 802.11. Therefore, the width of the broadcast channels
relies on the network. The network infrastructure used for the 802.11 transmitter. To get to the
5GHz bands are used to improve the wireless throughput on the network.
• IEEE substandard used:
All the wireless networking devices supports different level of communication standards. In
present time, IEEE 802.11b/g standard is widely accepted as it has provided wide and balanced
range, network throughout and support to device mobility as it can serve most of the
requirements of huge organizations such as universities. In wireless networks, protection is
especially critical because data is exchanged using radio signals that can easily be intercepted
without complex data encryption protocols being enforced. [CITATION Placeholder1 \l 1033 ]
• Basic Service Set (BSS):
Th BSS (Basic Service Package) is a package of all Stations that can engage with each other
another. Independent BSS and Infrastructure BSS are the two types of BSS. Each BSS has an ID
which is called BSSID and is the MAC address of the access point servicing the BSS. Independent
BSS is an ad-hoc network and does not have access points. They cannot link to any other simple
utility collection since they do not use Access Points. An infrastructure BSS can connect with the
BSS with other stations, not the same basic stations, service set by interacting with each through
Access Points.

• Extended Service Set (ESS):


An extended Service Set (ESS) is a collection of BSSs. Access Point in an extended service collection
is associated by a relation. Each SSID carries an ID which is known as SSID which is a 32-byte
(maximum) character string.

Security Analysis:[ CITATION You \l 3081 ]


Security has endured a main interest in Wired LANs throughout the whole world. Wireless LAN is
basically intended to secure networks from the safety rifts to which wireless broadcast are
affected. If someone is thinking to implement WLAN in their organization then they should make
safety a top concern. As wireless signal frequently transmits out their physical boundary, the
threats of someone trying to breach by deploying the wireless framework is advanced compare to
somebody getting physical entry to a wired interface. So, WLAN security is important as Wireless
LAN signals does not have a substantial barrier constraint plus, are prone to unauthorized entry
over network assets, emerging in the susceptibility of personal and confidential information.
Copyright © 2015-2018 VIT, All Rights Reserved.
ITNE3004 Wireless Communication and Networks

Security risk including unauthorized entry, DoS attacks, term hijacking etc. can be issues for
Wireless LANs. So, in order to control such risks, different standard verification as well as
encryption methods are merged with another entry control procedure. These days wireless LANs
has become more popular because of their reduced value of elements, ease to implement at
anytime from anywhere in the globe. Wireless LANs are established for a practical transmission of
information. Our major aim of the research is to create our network safer and more dependable.
In addition, there are 5 essential predefined objectives for wireless LANs also there are various
safety solutions accessible which is used to offer the five fundamental goals. Our team will
evaluate which safety solution is best among others to offer the better safety as well as what
types of common threats are possible plus how to control all the attacks along with their
solutions.

Fig: Creating a Secure Network [ CITATION Edw20 \l 3081 ]

Some of the wireless LANs security technologies: -


Wired Equivalent Privacy: It is an old encoding principle deploy to control safety risks. It offers safety
to wireless LAN by encoding the data transfer through the air so that the acceptor having the right
encoding key can decode the data.
WPA/WAP2: WPA/WPA2 is enhanced on WI-FI Protected Access by initiating TKIP. While still deploying
RC4 encoding, TKIP utilises a physical encoding key which is regularly reintroduced, creating it more
complex to steal. Furthermore, data integrity was enhanced by the deployment of an extra strong hashing
device.
Wireless Intrusion Prevention Systems/Intrusion Detection Systems: Intrusion detection and
prevention emphases on RF levels which includes radio scanning in order to discover rouge entry pointe or
else ad hoc networks to control network access. Moreover, developed completion are capable to signify
the network site together with possible threats, also have automatic analysis abilities so that risks could be
easily classified.
Virtual private network: it is a personal network which helps to implement a public network
system to join remote operator or area together. VPNs, having additional safety features, were
made in order to create a method for consumers to join to a system. In addition, firewalls, IPSec,
encryption as well as AAA server helps to make a VPN more secure.

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

VPN firewall helps to arrange to block plus permit only specific ports as well as it is invented to
permit only package which are not malicious. This firewall is essential so that any viruses or trojan
horses cannot accord the server. IPSec is also another safety process deploy in VPNs in order to
ensure confidential protection. It is easy network implementing two procedure to encode
information through the network. The first process is tunneling, which helps to encode overall
packets by a key, such as header. The second process is transport, which only encode the
information unit of the package but not the header. These both processes need that the operator
as well as the entry point should have the same key in order to decode the information when it
reached. The last process is AAA server, when a consumer demands a session, the demand will be
sent to the proxy server and that proxy server will decide who the operator is, what the operator
is permitted to do, also what the operator is doing. This network has amore safety as it controls
what the operators is doing. By, checking activity, the network has the capability to estimate if an
attack is going to occur depend upon specific consumer’s habits.
So, we have used some of the security tools in order to make our network secure.
Firewall: We have to install firewall in our wireless system as it helps to secure your system by
categorizing traffic as well as blocking external against gaining unauthorized entry to personal
information into your system. It not only blocks unnecessary traffic but also helps to block vicious
software against infecting your system. This firewall is essential so that any viruses or trojan
horses cannot accord the server. So, firewall should be installed so that it can offer another level
of defense which will help to maintain our network as well as the information on it secure and
protected.
Demilitarized Zone (DMZ): DMZ is also equally important foe securing network security. It is a
network which is used to linked hosts which offer a border to an untrusted outsider network that
is internet. This is also a good option as it permits entry to assets against untrusted system while
maintaining the personal network safe.
Subnetting: it is the process of segmenting a system into two different networks. It helps to
improve routing ability, system management monitor, as well as enhancing network safety. When
a system is sub netted then various tools connect with different system rather than every tool on
one system attempting to connect at the similar period. In addition, subnetting is useful network
operation which does not take too much time to learn and configure. Due to all of these
advantages, not any organization cannot stay without having subnet.
Masking: It is the method of covering initial information with adapted content. The main objective
for implementing masking to an information field is to secure information which is categorized as
individually identifiable data, critical personal information. It is deployed in order to secure
different kinds of data such as rational property, recognizable information, secured health
information and financial information including payment card data. That is why masking is also an
important network security which needs to be applied during implementing a wireless network.

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

Maintenance and Troubleshooting


A campus network of this size is not limited to just a few rooms and[ CITATION Ste18 \l 1033 ] a few
devices. Due to the huge network base of the Faber University, the wireless networks are very beneficial as
it does not require a physical connection between the various buildings and their individual networks. The
campus network that we have prepared for the University also requires an absolute solid monitoring
facility which needs to have a high range of rules and protocols, a proper Wifi management, Switch
management etc.[ CITATION Wir20 \l 1033 ] A lot of networks do take the option of utilizing more than one
monitoring tool for a network but with a large number to tools, that itself needs some level of
management. Thus, the best option is to take up a wholesome monitoring tool that will cover all the areas
of network monitoring. Having said that the monitoring of a wired network is comparatively easier because
there are no physical components involved and a lot of it is based on airwaves, analysis of certain access
points, the strength of the signal, the channels that are available etc. [ CITATION Net20 \l 1033 ]
There are many reasons that are linked with the necessity of a WLAN network monitoring tool. Some of the
reasons are mentioned below:
 Wireless campus network does not have physical interfaces, so the tool helps to monitor and keep in
check the outages or the down time. The troubleshooting of the issues is also assisted by this constant
monitoring.[ CITATION Net20 \l 1033 ]
 They are also used to measure the signal distribution over the covered area of the campus buildings.
This helps in understanding and managing the factors like the number of access points, users and the
overall wireless strength. [ CITATION Net20 \l 1033 ][ CITATION Ren18 \l 1033 ]
 The monitoring tool also helps to monitor the wireless network traffic in the whole network along with
the management of the various utilization of the wireless network.[ CITATION Net20 \l 1033 ]

The best tool that we have decided for the WLAN network monitoring is the Solar Winds NPM (Network
Performance Monitor).[ CITATION Ren18 \l 1033 ] The NPM itself is of one of the world’s leading IT
Management software Solar Winds and is a major product of the company. The Solar Winds NPM is a
package that consist of SolarWinds Heat Map and Solar Winds Wifi Monitor both of which are one of the
best monitoring tools in the market at the time.[ CITATION Mar20 \l 1033 ] Because the network we are
monitoring is a large network and requires 24/7 constant use of the network, the monitor must be very
updated and efficient. This tool that we will use allows alert setting, report creation on a lot of parameters
like device type, IP addresses, the channels that are utilized along with the number of people that are
taking use of the connection. [ CITATION Ren18 \l 1033 ]

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

Fig: Solar Winds NPM [ CITATION Net20 \l 3081 ]


Key Features:
 It provides deep visibility for the network
 It also provides Multi-vendor network monitoring
 It contains a lot of smart maps that analyze the system
 Has Netpath and PerfStack for very convenient troubleshooting
 Very good scalability for larger systems
 Very updated and advanced alerting [ CITATION Net20 \l 1033 ]

Pricing:
The cost of the NPM is also very reasonable and is based on certain elements that contribute to the actual
calculation of the price that will be charged. The license will depend on the interface which means VLANs,
the nodes that mean the equipment like routers, switches and finally the volume of the network that will
be monitored. [ CITATION Ste18 \l 1033 ]

Plan No. of elements Support and Cost in $


Maintenance
100 1 year 2955
NPM SL100  

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

250 1 year 6720


NPM SL250

500 1 year 10445


NPM SL500

1000 1 year 19345


NPM SL2000

Unlimited 1 year 32525


NPM SLX

As you can see from the above figure, every package or plan of the tool has 1 year of support and
maintenance. This software platform also has a 30-day free trial for the clients to actually try it before
purchasing it.[ CITATION Ste18 \l 1033 ] The cost plan for a huge network is of course best suited to use an
unlimited version which falls just around 32k$ per annum. [ CITATION Ren18 \l 1033 ]

Conclusion:
We have successfully designed a wireless campus network for Faber University that will efficiently manage
all the networks in the university. Overall, through this report there has been a clarified understanding on
the WLAN implementation and its security. There are so many essential necessities that need to be taken
into consideration during its design using packet tracer. On top of that the systematic representation of the
whole system design in this report has explained even the budget that is required for some of the tools. All
the functional and non-functional requirements, security analysis, maintenance method, along with the
actual design has been included with a lot of research and team effort. The wireless network is based on
pulling many more students with the new and better technological updating in the University.

Bibliography

[1 “School and Higher Education Wi-Fi Solutions,” [Online]. Available:


] https://www.cambiumnetworks.com/solutions/primary-education/. [Accessed 15 October 2020].

[2 M. Rouse, “definition/requirements-analysis,” [Online]. Available:


] https://searchsoftwarequality.techtarget.com/definition/requirements-analysis#:~:text=Requirements
%20analysis%2C%20also%20called%20requirements,often%20called%20functional%20specifications..

Copyright © 2015-2018 VIT, All Rights Reserved.


ITNE3004 Wireless Communication and Networks

[3 S. Singh, “Network requirement analysis,” 10 2019. [Online]. Available:


] https://www.researchgate.net/publication/338220481_Network_requirement_analysis.

[4 J. M. C. V. K. a. J. M. M. Young Chai, “Corporate wireless LAN security: Threats and an effective security
] assessment framework for wireless information assurance,” ResearchGate , vol. 4, no. 3, pp. 272-277.

[5 E. Curlin, “Role of Firewall Network Security in Securing Wired and Wireless Network,” 6 January 2020.
] [Online]. Available: https://adigitallamp.com/firewall-network-security/. [Accessed 15 October 2020].

[6 S. Cooper, “SolarWinds Network Performance Monitor (NPM) Review,” 19 December 2018. [Online].
] Available: https://www.comparitech.com/net-admin/solarwinds-network-performance-monitor-review/.
[Accessed 06 October 2020].

[7 “Wireless Network Monitor,” Manage Engine OpManager, [Online]. Available:


] https://www.manageengine.com/network-monitoring/wireless-network-monitoring.html. [Accessed 06
October 2020].

[8 “Network Performance Monitor,” SolarWinds, [Online]. Available: https://www.solarwinds.com/network-


] performance-monitor. [Accessed 06 October 2020].

[9 R. Larue-Langlois, “7 Best Tools for Monitoring Wireless Networks,” Addictive Tips, 10 December 2018.
] [Online]. Available: https://www.addictivetips.com/net-admin/monitoring-wireless-networks/#:~:text=In
%20one%20sentence%2C%20WiFi%20analyzers,strength%20of%20each%20SSID's%20signal.&text=There
%20are%20two%20general%20types%20of%20WiFi%20analyzers.. [Accessed 06 October 2020].

[1 M. Wilson, “Best Wifi Analyzer Software for Monitoring your Wireless Network & Traffic,” PC & Network
0] Downloads, 14 January 2020. [Online]. Available: https://www.pcwdld.com/best-wifi-analyzer-software-
windows. [Accessed 06 October 2020].

[ C. Nuggets, "informa," 31 January 2017. [Online]. Available:


1 https://www.networkcomputing.com/data-centers/5-subnetting-benefits.
]

[ "WLAN Prtocols and its type and charecterictics," Study.com, 7 may 2018. [Online]. Available:
2 https://study.com/academy/lesson/wlan-protocols-types-characteristics.html.
]

[ r. s. tech, "Router switch.com," 28 june 2012. [Online]. Available: https://blog.router-


3 switch.com/2012/06/wlan-wlan%E2%80%99s-role-advantages/#:~:text=A%20WLAN
] %20provides%20wireless%20network,edge%20of%20the%20wired%20network..

[ "Wireless Network Standard," university of pittsburgh, 15 June 2020. [Online]. Available:


4 https://www.technology.pitt.edu/help-desk/how-to-documents/wireless-network-
] standard#:~:text=Development%20of%20the%20Wireless%20Network%20Standard&text=At
Copyright © 2015-2018 VIT, All Rights Reserved.
ITNE3004 Wireless Communication and Networks

%20present%2C%20the%20IEEE%20802.11,needs%20of%20the%20University%20community..
[Accessed 16 October 2020].

[ "what is WLAN controller," cisco, 5 June 2017. [Online]. Available:


5 https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/what-is-wlan-
] controller.html.

Copyright © 2015-2018 VIT, All Rights Reserved.

You might also like