0% found this document useful (0 votes)
15 views7 pages

ADVANCE WIRELESS NETWORK Lect 1 & 2 - 094844

314 lecture
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

ADVANCE WIRELESS NETWORK Lect 1 & 2 - 094844

314 lecture
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Wireless LAN (WLAN) Technical Principles and Products

Introduction to WLANs
 Definition: WLANs enable wireless connectivity within a limited area, eliminating the need for physical
wired connections.
 Applications: Used in homes, offices, public spaces, and industries for internet access, file sharing, and
device connectivity.

WLAN Components
 Access Points (APs): Serve as central connection points for wireless clients, bridging wireless devices to
the wired network.
 Wireless Clients: Devices like laptops, smartphones, and IoT gadgets that connect to WLANs.
 WLAN Controllers: Manage multiple APs, offering centralized configuration, security, and monitoring.

Technical Principles
 Radio Frequency (RF) Technology: Operates within the 2.4 GHz and 5 GHz bands, using modulation
techniques like OFDM for data transmission.
 Multiple Input Multiple Output (MIMO): Employs multiple antennas for data transmission and
reception, enhancing performance and reliability.
 Channel Bonding: Combines adjacent channels to increase bandwidth and optimize performance.
 Security Protocols: WPA2/WPA3 encrypt data and secure network access.

WLAN Standards
 IEEE 802.11 Standards: Encompass various versions like 802.11a/b/g/n/ac/ax, each offering different
features, data rates, and frequency bands.
 Wi-Fi Alliance Certifications: Ensure compatibility and interoperability among devices adhering to
IEEE 802.11 standards.

WLAN Products
 Access Points: Available in standalone or managed models, varying in features and capacities to suit
different deployment scenarios.
 WLAN Controllers: Manage multiple APs, offering centralized management, configuration, and
monitoring.
 WLAN Management Software: Facilitates network administration, providing tools for configuration,
troubleshooting, and analytics.

Emerging Technologies
 Wi-Fi 6 (802.11ax): Latest standard offering higher data rates, improved efficiency, and better
performance in dense environments.
 Mesh Networking: Utilizes multiple APs to create a seamless wireless network, extending coverage and
enhancing reliability.
 IoT Integration: WLANs increasingly connect IoT devices, leading to developments in low-power, long-
range connectivity standards like 802.11ah.

Conclusion
 WLANs play a crucial role in modern connectivity, offering flexibility, mobility, and scalability.
 Understanding technical principles and product offerings is essential for designing, deploying, and
managing WLANs effectively.
The Basic Wireless Configuration Method
Wireless configuration involves setting up a Wireless Local Area Network (WLAN) by configuring
access points (APs) or routers to provide wireless connectivity to devices.
Importance:
 Wireless configuration enables flexibility, mobility, and scalability in network connectivity, allowing
devices to connect to the internet and communicate with each other without the constraints of physical
wired connections.

WLAN Components
Access Points (APs):
 Serve as central connection points for wireless clients, bridging wireless devices to the wired network
infrastructure.
 May be standalone devices or integrated into routers.
Wireless Clients:
 Devices such as laptops, smartphones, tablets, and IoT gadgets that connect to WLANs for internet
access and communication.
WLAN Controllers:
 Manage multiple APs in large-scale deployments, offering centralized configuration, security, and
monitoring capabilities.

Basic Wireless Configuration Steps


Accessing the AP or Router Interface:
 Connect a computer to the AP/router using an Ethernet cable or through a wireless connection.
 Open a web browser and enter the default IP address of the AP/router in the address bar (e.g.,
192.168.1.1 or 192.168.0.1).
Logging in to the AP or Router:
 Enter the default username and password for the AP/router to access its management interface.
 These default credentials are often provided in the device's documentation.
Navigating to Wireless Settings:
 Once logged in, navigate to the wireless settings section of the AP/router's interface. This is typically
found under a tab or menu labeled "Wireless" or "Wi-Fi."
Enabling Wireless Functionality:
 Locate the option to enable wireless functionality (usually a checkbox or toggle switch) and ensure that
it is enabled.
Configuring Basic Wireless Settings:
 Set the Network Name (SSID): Choose a unique name for your wireless network that will be displayed
when devices search for available networks.
 Select Security Type: Choose the appropriate security type (e.g., WPA2-PSK) to secure your wireless
network.
 Set Password/Pre-shared Key (PSK): Enter a strong passphrase that devices will need to connect to the
wireless network.
Saving and Applying Settings:
 After configuring the wireless settings, save the changes by clicking on the "Apply" or "Save" button in
the interface.

Connecting Devices to the Wireless Network


Search for Available Networks:
 On wireless devices (e.g., laptops, smartphones), search for available Wi-Fi networks.
Select Network SSID:
 Select the SSID of your wireless network from the list of available networks.
Enter Wi-Fi Password:
 Enter the Wi-Fi password/PSK configured earlier when prompted.
Verify Connectivity:
 Once entered, the device should connect to the wireless network. Verify internet connectivity and
communication with other devices on the network.

Conclusion
 The basic wireless configuration method involves accessing the AP/router interface, configuring
wireless settings, and connecting devices to the wireless network.
 Understanding these steps is essential for setting up and managing WLANs effectively, providing
connectivity to wireless devices in various environments.

Upgrading WLAN Devices


Upgrading WLAN devices refers to the process of updating the firmware or hardware components of
wireless access points (APs), routers, controllers, and other network infrastructure to improve
performance, security and feature capabilities.
Importance:
 Regular upgrades are crucial for maintaining the reliability, security, and compatibility of WLAN
networks.
 Upgrades often include bug fixes, security patches, performance enhancements, and support for new
features and standards.

Pre-Upgrade Preparation
Backup Configuration:
 Before performing any upgrades, it's essential to backup the configuration settings of WLAN devices to
avoid data loss or configuration errors.
 Most WLAN devices provide options to export configuration files through the management interface.
Review Release Notes:
 Prior to upgrading, review the release notes provided by the manufacturer for the firmware or software
version being installed.
 Release notes contain important information about new features, bug fixes, known issues, and upgrade
procedures.

Upgrading WLAN Firmware


Access Device Management Interface:
 Log in to the management interface of the WLAN device using a web browser or dedicated management
software.
 Navigate to the firmware upgrade section, typically found under system settings or maintenance.
Download Firmware:
 Download the latest firmware version from the manufacturer's official website or through the device's
management interface if automatic download options are available.
Upload Firmware:
 Upload the downloaded firmware file to the WLAN device through the management interface.
 Follow on-screen instructions to initiate the firmware upgrade process.
Monitor Upgrade Progress:
 During the upgrade process, monitor the progress through the management interface.
 Do not interrupt power or network connectivity to the device until the upgrade is complete.

Post-Upgrade Verification
Confirm Successful Upgrade:
 After the upgrade process completes, verify that the device has successfully rebooted and is operational.
 Check the firmware version in the device settings to ensure it matches the upgraded version.
Test Functionality:
 Test WLAN functionality by connecting wireless devices to the network and verifying connectivity.
 Ensure that all network services and features are functioning correctly after the upgrade.

Best Practices and Considerations


Scheduled Maintenance:
 Plan upgrades during scheduled maintenance windows to minimize disruption to network operations.
 Notify users in advance about planned maintenance activities and potential downtime.
Rollback Plan:
 Always have a rollback plan in place in case of issues or unexpected complications during the upgrade
process.
 Maintain backups of previous firmware versions and configuration settings to facilitate rollback if
necessary.

Conclusion
 Upgrading WLAN devices is essential for maintaining the performance, security, and reliability of
wireless networks.
 By following proper procedures and best practices, WLAN upgrades can be performed efficiently and
with minimal risk to network operations.
These lecture notes provide a comprehensive overview of the process and best practices for upgrading WLAN
devices, ensuring the smooth and successful operation of wireless networks.

Layer 2 WLAN Networking and Layer 3 WLAN Networking


WLAN (Wireless Local Area Network) networking involves the configuration and management of
wireless networks to enable connectivity between devices within a specific area without the need for
physical wired connections.
Importance:
 WLAN networking provides flexibility, mobility, and scalability, allowing devices to connect to the
internet and communicate with each other wirelessly.
 Understanding different networking layers is crucial for designing, deploying, and managing WLANs
effectively.

Layer 2 WLAN Networking


 Layer 2 WLAN networking operates at the Data Link Layer (Layer 2) of the OSI (Open Systems
Interconnection) model.
 It primarily involves the configuration and management of wireless access points (APs) and the
distribution of wireless traffic within the same subnet.
Characteristics:
 Wireless devices connect to the same broadcast domain and share the same IP subnet.
 APs operate in bridge mode, forwarding traffic between wireless devices and the wired network without
performing IP routing.
Advantages:
 Simplified network architecture with reduced overhead.
 Seamless integration with existing wired LAN infrastructure.
 Suitable for small to medium-sized deployments with a single subnet.

Layer 3 WLAN Networking


Overview:
 Layer 3 WLAN networking operates at the Network Layer (Layer 3) of the OSI model.
 It involves the use of routing protocols and Layer 3 devices (routers or Layer 3 switches) to route traffic
between different subnets within the WLAN.
Characteristics:
 Wireless devices connect to different IP subnets, enabling segmentation and isolation of network traffic.
 APs operate in conjunction with Layer 3 devices to perform IP routing and facilitate communication
between wireless devices in different subnets.
Advantages:
 Enhanced network scalability and flexibility, allowing for the creation of multiple VLANs (Virtual
LANs) and subnets.
 Improved network security through segmentation and isolation of network traffic.
 Suitable for large-scale deployments with complex network requirements.

Implementation Considerations
Layer 2 WLAN Implementation:
 Simple to deploy and manage, ideal for small to medium-sized deployments with a single subnet.
 Limited scalability and security compared to Layer 3 WLANs.
Layer 3 WLAN Implementation:
 More complex to configure and manage, suitable for large-scale deployments with multiple subnets and
VLANs.
 Offers greater scalability, flexibility, and security features compared to Layer 2 WLANs.

Conclusion
 Understanding the differences between Layer 2 WLAN networking and Layer 3 WLAN networking is
essential for designing WLANs that meet the requirements of different environments and network
architectures.
 Considerations such as scalability, security, and management complexity should be taken into account
when choosing between Layer 2 and Layer 3 WLAN implementations.

WLAN Service Configuration Process and Commands


 WLAN service configuration involves the process of setting up and managing Wireless Local Area
Network (WLAN) services on network devices such as access points (APs) and wireless controllers.
 Configuration encompasses various aspects including network settings, security policies, quality of
service (QoS), and device management.
Importance:
 Proper WLAN service configuration ensures reliable wireless connectivity, network security, and
efficient management of wireless resources.
 Understanding WLAN configuration processes and commands is essential for network administrators
responsible for deploying and maintaining WLAN infrastructure.

WLAN Service Configuration Process


Pre-Configuration Planning:
 Identify network requirements, such as coverage area, number of users, and application needs.
 Determine WLAN architecture, including the deployment of APs, WLAN controllers, and other network
devices.
Access Point Configuration:
 Configure basic settings such as SSID, security mode (WPA2-PSK or WPA2-Enterprise), and
encryption type (AES).
 Set up radio channels, transmit power, and antenna configurations to optimize coverage and minimize
interference.
Security Configuration:
 Implement security measures such as enabling encryption (WPA2), setting up pre-shared keys (PSKs) or
implementing 802.1X authentication for enterprise networks.
 Configure access control lists (ACLs) to restrict access to authorized devices and prevent unauthorized
access.
Quality of Service (QoS) Configuration:
 Configure QoS policies to prioritize certain types of traffic (e.g., voice or video) over others, ensuring
optimal performance for critical applications.
Device Management:
 Set up management interfaces and protocols (e.g., SNMP, SSH, or HTTPS) for remote management and
monitoring of WLAN devices.
 Configure logging and alerting mechanisms to track device status and security events.

Common WLAN Configuration Commands


Access Point (AP) Configuration Commands:
 config terminal: Enter global configuration mode.
 interface <interface>: Access specific interface configuration mode (e.g., wireless interface).
 ssid <SSID>: Configure the wireless network SSID.
 encryption mode <mode>: Set encryption mode (e.g., aes-ccm for AES encryption).
 authentication <authentication-type>: Configure authentication type (e.g., open, PSK, or 802.1X).
WLAN Controller Configuration Commands:
 config wlan create <WLAN-ID> <SSID>: Create a WLAN profile with a specified WLAN ID and
SSID.
 config wlan security <WLAN-ID> <security-type>: Configure WLAN security settings (e.g., WPA2).
 config wlan enable <WLAN-ID>: Enable the WLAN profile for client access.
 config wlan interface <WLAN-ID> <interface>: Associate WLAN profile with a specific interface
(e.g., AP interface).

Conclusion
 WLAN service configuration involves planning, implementing, and managing various aspects of
wireless network settings, security, QoS, and device management.
 Familiarity with WLAN configuration processes and commands is essential for network administrators
to deploy and maintain reliable and secure wireless networks.

WLAN Radio Resource Management


 WLAN Radio Resource Management (RRM) refers to the process of optimizing the allocation and
utilization of radio frequency (RF) resources within a Wireless Local Area Network (WLAN).
 RRM aims to enhance wireless network performance, reliability, and scalability by efficiently managing
RF channels, power levels, and other radio parameters.
Importance:
 Effective RRM is critical for ensuring optimal WLAN performance, especially in environments with
high client density, interference, and dynamic RF conditions.
 RRM algorithms and mechanisms automate the management of RF resources, reducing the need for
manual intervention and improving network efficiency.

Key Components of WLAN RRM


Channel Allocation:
 RRM algorithms dynamically assign RF channels to access points (APs) based on factors such as
channel utilization, interference levels, and signal strength.
 Channel allocation aims to minimize co-channel interference and maximize channel availability for data
transmission.
Transmit Power Control (TPC):
 TPC mechanisms adjust the transmit power of APs to optimize coverage and minimize interference.
 TPC algorithms aim to maintain consistent signal strength and reduce signal overlap between
neighboring APs.
Load Balancing:
 Load balancing algorithms distribute client devices across multiple APs to prevent overloading of
individual APs and uneven distribution of network traffic.
 Load balancing improves network performance, throughput, and client experience by evenly distributing
client load.
Interference Mitigation:
 RRM techniques detect and mitigate sources of RF interference, such as neighbouring WLANs,
Bluetooth devices, microwave ovens, and other electronic devices.
 Interference mitigation strategies include dynamic channel switching, frequency hopping, and adaptive
modulation techniques.

RRM Algorithms and Mechanisms


Dynamic Channel Assignment (DCA):
 DCA algorithms automatically adjust RF channel assignments based on real-time RF conditions and
network traffic patterns.
 DCA aims to minimize co-channel interference, adjacent channel interference, and signal degradation
caused by RF interference.
Auto Power Adjustment (APA):
 APA mechanisms dynamically adjust AP transmit power levels to optimize coverage, reduce
interference, and conserve energy.
 APA algorithms use feedback mechanisms and RF measurements to adjust transmit power levels based
on environmental conditions.
Client Steering and Band Steering:
 Client steering mechanisms guide client devices to connect to the optimal AP based on factors such as
signal strength, AP load, and client capabilities.
 Band steering encourages dual-band capable clients to connect to the less congested 5 GHz band instead
of the crowded 2.4 GHz band.

Challenges and Considerations


Spectrum Congestion:
 WLANs operate in shared RF spectrum, leading to congestion and interference from neighbouring
networks and non-WLAN devices.
 Effective RRM strategies are required to mitigate spectrum congestion and optimize WLAN
performance.
Dynamic RF Conditions:
 RF conditions can vary dynamically due to factors such as environmental changes, client mobility, and
interference sources.
 RRM mechanisms must adapt to changing RF conditions in real-time to maintain optimal network
performance.

Conclusion
 WLAN Radio Resource Management (RRM) plays a crucial role in optimizing the allocation and
utilization of RF resources within wireless networks.
 By dynamically adjusting RF parameters such as channel allocation, transmit power, and client
distribution, RRM enhances WLAN performance, reliability, and scalability.

You might also like