0% found this document useful (0 votes)
18 views21 pages

Built Small WLAN Level IV (2017) Notes

Uploaded by

asa962583
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views21 pages

Built Small WLAN Level IV (2017) Notes

Uploaded by

asa962583
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

GLOBAL COLLEGE, AMBO CAMPUS

Build a small wireless LAN for HNS Level IV (2017)


Short Notes
Set: By: Kasu@B.
MODULE UNITS
1. Confirm client and equipment requirements
2. Select, install and configure wireless access point
3. Configure network
4. Train users
5. Monitor and administer wireless network

Learning objectives of the Module


At the end of this session, the students will able to:

 Install, configure and test at least two wireless access points


 Identify and resolve wireless network issues on at least two wireless local area networks
 develop and document user training material

WLAN stands for Wireless Local Area Network, which is a network that uses radio waves or light to
connect devices without physical cables. WLANs are commonly used in homes, offices, and public places
to provide wireless internet access.
UNIT ONE: Confirm client and equipment requirements

(Eegumsa Barbaachisummaa Maamilaa fi Meeshaalee Mirkaneessuu)

1.1 Client and Organizational Requirements:

 Importance: Network dependency grows with organizational growth.


 Process:
o Identify goals, constraints, existing/planned applications, and network services.
o Gather customer requirements, assess missing data, and redefine the project scope.

Assessing Network Design Scope:

 Determine if the design is:


o For a new/modifying existing network
o For the whole network, subset, or segment
o Addressing one function or overall functionality

Scope Levels

1. Entire Network: Backbone redesign, LAN upgrades to Fast Ethernet.


2. Network Layer: New IP addressing plan and segmentation for reliability.
3. Data Link Layer: Redundancy in equipment and links, wireless RF site survey for mobility.

1.1.1 Identify Required Information:

 Extract Initial Requirements:


o From RFP/RFI documents issued by customers.
o Use an iterative process to clarify requirements:
1. Extract customer input.
2. Create draft design requirements.
3. Verify and refine with customer feedback.
4. Repeat until requirements are finalized.

Gathering Network Requirements

Process of Gathering Requirements (Five Steps):

1. Identify planned network applications and services.


2. Determine organizational goals.
3. Identify possible organizational constraints.
4. Define technical goals.
5. Identify technical constraints.
 Iterative Process: Steps may be revisited for clarifications during the design process.

Planned Applications and Network Services:

 Planned Applications:
o Types: E-mail, groupware, voice networking, web browsing, video on demand, databases, file
sharing, etc.
o Importance: Classified as critical, important, or not important.
o Example:
 Critical: Cisco Digital Media System (VoD), Oracle database, custom customer
support apps.
 Important: Microsoft Outlook (email), Cisco Unified Meeting Place (groupware).

1. Security:
o Firewalls, virus scanning, intrusion prevention.
o Authentication and authorization systems.
2. Quality of Service (QoS): Prioritize critical traffic (voice, database) over less important traffic
(HTTP).
3. Network Management:Use centralized tools like HP Open View, Cisco Works.
4. High Availability: Redundant paths and devices to avoid single points of failure.
5. IP Multicast: Needed for video conferencing and e-learning.
6. Voice: Migration to IP telephony.
7. Mobility: Employee mobility and guest access for clients

1.1.2 Organizational Constraints

A.Typical Constraints

1. Budget: Limited resources may lead to compromises in availability, performance, scalability, and
manageability.
2. Personnel: Insufficient or untrained staff may impact network design considerations.
3. Policies: Organizational policies on protocols, standards, vendors, and applications must be
understood and adhered to.
4. Schedule: Project timelines need approval from executive management to prevent deadline disputes.

B.Technical Goals

1. Improve Network Performance: Address issues like responsiveness, throughput, and resource
utilization as user and application demands increase.
2. Minimize Downtime and Costs: Ensure quick recovery from failures to reduce downtime and related
expenses.
3. Modernize Technologies: Replace outdated equipment to meet demands of new technologies and
applications.
4. Enhance Scalability: Design for future growth and upgrades.
5. Simplify Management: Ensure network management is straightforward and user-friendly.

C.Technical Constraints

1. Questions to Identify Constraints:


o Technology priorities and refresh plans.
o Immediate technical problems.
o Staff development for specific technologies.
o Applications needing special network features.
2. Addressing Constraints:
o Ensure legacy and new equipment compatibility.
o Resolve bandwidth issues with alternative solutions.
o Maintain compatibility with old and new applications.
o Provide training or simpler options for unskilled personnel.

1.1.3 Assigning Appropriate Authority for Wireless Network Security

1. Key Practices for Securing Wireless Networks:


o Enable Two-Factor Authentication (2FA): Adds an extra layer of login security.
o Use Strong Passwords: Mix of characters, updated regularly.
o Encrypt Data: Protects sensitive information from unauthorized access.
o Disable SSID Broadcast: Hides network name to prevent unauthorized discovery.
o Enable MAC Filtering: Restricts access to specific devices.
o Use WPA3 Security: Latest and strongest wireless security protocol.
o Use a VPN: Encrypts traffic, especially on public Wi-Fi.
o Disable Remote Administration: Prevents unauthorized configuration changes.
o Change Default Passwords: Mitigates risks from easily guessed router defaults.
o Use Firewalls: Blocks unauthorized incoming traffic.
o Disable UPnP: Prevents unauthorized device connections.
o Disable Unnecessary Services: Reduces network vulnerabilities by turning off unused features.

1.1.4 Define Wireless Network Requirements

1. Purpose of Requirements:
o Establishes the foundation for design without detailing specific technologies or configurations.
2. Key Requirement Types:
o Applications: Define user needs (e.g., web browsing, email, or specialized systems like hospital
monitoring).
o Environment: Document operating locations (e.g., floor plans, site surveys, and photos).
o Coverage Areas: Specify areas needing access (e.g., offices, elevators, or cafeterias) to avoid
unnecessary costs.
o End Users: Identify user mobility (mobile vs. stationary) for roaming and IP management.
o Client Devices: List device specifications to ensure compatibility and legacy support.
o Existing Infrastructure: Document infrastructure components (e.g., closets, PoE, authentication
servers).
o Security: Define data sensitivity and encryption/authentication needs.
o Funding: Outline available budget or offer cost options for varied coverage needs.
o Schedules: Establish realistic timelines aligned with project goals.

1.1.5 Selecting Appropriate Position for Access Point

1. Importance of WAP Placement: Ensures good coverage, capacity, and performance.


2. Best Practices:
o Site Survey: Identify coverage gaps, high-demand areas, and interference sources.
o Ceiling-Mounted WAPs: Provide wider and more uniform coverage than wall-mounted
options.
o Central Placement: Place WAPs at the center of the coverage area for optimal performance.
o Avoid Obstructions: Keep WAPs away from walls, furniture, and other physical barriers.
o Multiple WAPs: Use several WAPs in large areas to improve coverage and prevent congestion.
o Power over Ethernet (PoE): Simplifies installation by combining power and data through one
cable.
o Wireless Planning Tools: Simulate network performance to optimize placement.

1.1.6 Cabling and Power Requirements for Wireless Devices

1. Wireless Connectivity: Data transmission between devices without physical cables using Wi-Fi,
Bluetooth, or cellular networks.
2. Power Requirements for Wireless Devices:
o Wireless Routers: Powered by an electrical outlet for continuous function and signal
transmission.
o Wireless Access Points: Powered via electrical outlet or Power over Ethernet (PoE), which
transmits both data and power through one Ethernet cable.
o Wireless Cameras: Can be battery-powered for flexibility or plugged into an electrical outlet for
continuous power.
o Wireless Devices (Smartphones, Tablets, Laptops): Powered by built-in rechargeable batteries
for wireless functionality.
END OF UNIT ONE QUESTIONS

I. Write True if the Statement is Correct Otherwise False for the Following Questions

1. Network dependency decreases as an organization grows.


2. A site survey is important to identify areas with poor coverage and high demand for WAP placement.
3. All wireless access points should be wall-mounted for optimal performance.
4. Organizational policies on protocols, standards, and applications must be adhered to during network
design.
5. Wireless devices like smartphones and tablets always require a direct connection to power for
wireless functionality.
6. WPA3 is the latest and strongest wireless security protocol.
7. Wireless access points can only be powered through an electrical outlet, not Power over Ethernet
(PoE).

II.Multiple Choice Questions

1. What is the first step in gathering network requirements?

a) Define technical constraints


b) Identify planned network applications and services
c) Determine organizational goals
d) Identify technical goals

2. Which of the following is an example of a planned network application classified as critical?

a) Microsoft Outlook
b) Cisco Unified Meeting Place
c) Oracle database
d) Web browsing

3. What is the purpose of performing a site survey when placing wireless access points (WAPs)?

a) To assess bandwidth requirements


b) To identify coverage gaps and sources of interference
c) To determine the cost of equipment
d) To evaluate power requirements
4. Which of the following is NOT considered an organizational constraint?

a) Budget
b) Technical goals
c) Schedule
d) Policies

5. Which wireless network security practice helps prevent unauthorized access by hiding the
network name?

a) WPA3
b) Enable MAC filtering
c) Disable SSID broadcast
d) Use Firewalls

6. What is the main goal of defining technical constraints during network design?

a) To improve network performance


b) To reduce the need for security
c) To ensure compatibility between old and new technologies
d) To create a detailed timeline for the project

7. Which layer of the network design focuses on redundancy in equipment and links?

a) Network layer
b) Data Link layer
c) Application layer
d) Transport layer

8. What is the primary benefit of using Power over Ethernet (PoE) for wireless access points?

a) It provides increased bandwidth


b) It reduces the need for additional power cables
c) It allows for higher data transfer speeds
d) It ensures better security

9. Which factor is most important when determining the placement of a wireless access point?

a) The brand of the access point


b) The location of other network devices
c) The proximity to obstructions and interference sources
d) The number of access points available

10. What is one of the goals of gathering network requirements?

a) To identify applications that do not require internet access


b) To reduce the number of access points needed
c) To identify and document organizational and technical constraints
d) To eliminate the need for security measures

11. Which of the following is considered a technical goal for network design?

a) Minimize downtime and costs


b) Identify organizational policies
c) Gather customer feedback
d) Create a marketing plan for the network

12. What should be avoided when placing wireless access points to ensure good coverage?

a) Placing them in the center of the coverage area


b) Using ceiling-mounted WAPs
c) Placing them near physical obstructions
d) Using multiple WAPs in large areas
Unit Two: Install and configure wireless Access point
Objectives this Unit

 Select access point device


 Install and configure access point
 Configure services
 Testing access point for connection and security
 Upgrading legacy equipment

2.1. Selecting Access Point Device

 What is a Wireless Access Point (WAP)? A WAP is a device used to create a Wireless Local
Area Network (WLAN). It connects to a router, hub, or switch via Ethernet and projects Wi-Fi
signals across a designated area.
 Things to Consider When Selecting a WAP:
1. Range: Choose a WAP with a large coverage area to reduce the number and cost of access
points. Most enterprise WAPs cover 5,000–10,000 sq. ft.
2. Speed: Look for WAPs supporting 802.11ac (up to 1200Mbps) for faster speeds.
3. Gain Antenna: WAPs with built-in or booster antennas provide better signal strength and
coverage.
4. Guest Access: Ensure intelligent guest access systems for secure, controlled network usage.
5. No Hardware Controllers: Modern WAPs like Wi-Fi 6 do not require hardware controllers
and use software-based control.
6. Wi-Fi Technology: Consider MESH, MIMO, and POE technologies based on your needs.
7. Price: Ensure value for money. Avoid overly expensive or very cheap WAPs that may lead
to waste or poor performance.

2.2. Installing and Configuring Access Points

 WAP Installation: WAPs connect wireless and wired networks or create standalone wireless
networks. In large setups, users can roam within the radio range while maintaining network access.
 Steps for Configuring a WAP (e.g., DLink Access Point):
1. Change the default admin password for security.
2. Set a custom SSID for the network.
3. Enable encryption to secure the wireless network.
4. Disable the DHCP server function, if applicable.
2.3 Configure Services

 The Configure Services method allows you to register dependent classes with an IoC (Inversion of
Control) container in ASP.NET Core, enabling automatic injection into other classes.
 In ASP.NET Core, a "Service" is a class used in other classes.

2.1.1 Managed LAN Services (MLS)

 MLS is a third-party service to manage a company's LAN, providing remote monitoring and
maintenance.
 Benefits include 24/7 support, proactive monitoring, cost reduction, and improved network
performance.

2.1.2 Benefits of Managed LAN Services

 Security: Firewall and intrusion prevention.


 Network Monitoring: 24/7 monitoring with alerts.
 Performance: Faster speeds than public Internet.
 Cost Savings: Lower rates for services.
 Reliability: 99% uptime guarantee.
 24-Hour Availability: Immediate resolution of issues.

2.4 Testing Access Points

 Signal Coverage Testing: Ensures client devices meet coverage requirements.


 Performance Testing: Confirms the WLAN supports applications.
 In-Motion Testing: Verifies roaming users maintain app access.
 Security Vulnerability Testing: Ensures network protection.
 Acceptance/Verification Testing: Confirms all WLAN requirements are met.
 Simulation/Prototype Testing: Simulates WLAN behavior before full installation.
 Pilot Testing: Tests WLAN in limited locations before full deployment.

2.5 Upgrading Legacy Equipment

 Client Needs: Improve operations by integrating old equipment into a modern ICT system.
 ICT Priorities: Networking legacy equipment, upgrading the ICT system, and optimizing work
processes.
 Solution:
o Integrated management system to reduce fragmentation.
o Replaced hardware/software with minimal downtime.
o Developed new processes for better efficiency.
o Provided comprehensive staff training and continuous support.
o Offered consultancy for ongoing system optimization.
 Outcome: Improved productivity, reduced errors, and better communication.
 Operation Sheet 2.1
 Operation title: Configuring a Wireless Access Point
 Purpose: To Configuring a Wireless Access Point

True/False Questions: End of Unit TWO

1. A Wireless Access Point (WAP) connects wireless devices to a wired network using Wi-Fi signals.
2. WAPs with built-in antennas do not affect the signal strength or coverage area.
3. Modern WAPs like Wi-Fi 6 require hardware controllers for management.
4. Managed LAN Services (MLS) provide 24/7 support and proactive monitoring to improve network
performance.
5. Performance testing ensures that a WLAN can meet security standards.

Multiple Choice Questions:

1. What is the primary function of a Wireless Access Point (WAP)?


a) To connect two wired devices
b) To connect wireless devices to a wired network
c) To increase the speed of the wired network
d) To monitor network traffic
2. Which of the following is a factor to consider when selecting a WAP?
a) Weight of the device
b) Range of coverage
c) The color of the device
d) Type of software used by the WAP
3. Which Wi-Fi standard supports speeds up to 1200Mbps?
a) 802.11n
b) 802.11ac
c) 802.11g
d) 802.11b
4. When configuring a WAP, what is the first step for security?
a) Set a custom SSID
b) Enable encryption
c) Change the default admin password
d) Disable the DHCP server
5. What is a key benefit of Managed LAN Services (MLS)?
a) The ability to monitor network activity 24/7
b) Higher costs for network maintenance
c) Limited security options
d) Inability to monitor remote networks
6. What type of testing verifies if a WLAN supports the usage of specific applications?
a) Signal Coverage Testing
b) Performance Testing
c) Acceptance Testing
d) In-Motion Testing
7. What does In-Motion Testing ensure?
a) WLAN speed
b) Network security
c) Users can access applications while roaming between access points
d) Proper encryption is enabled
8. When upgrading legacy equipment, what is a common challenge?
a) Lack of sufficient bandwidth
b) Incompatibility of old equipment with new systems
c) Increased network security risks
d) Too many Wi-Fi access points
What is the primary purpose of configuring services in ASP.NET Core?
a) To integrate legacy systems
b) To register dependent classes for automatic injection
c) To enhance security
d) To monitor network performance
9. What does the outcome of upgrading legacy equipment typically include?
a) Increased complexity and downtime
b) Improved productivity and reduced errors
c) Higher costs for maintenance
d) Decreased network performance
Unit Three: Configure network
Objectives
 Introduction to Wireless Security Threats
 Configuring security and other key parameters
 Testing security and firewall arrangements
 Testing network compatibility and access

3.1 Introduction to Wireless Security Threats (Short Notes)

Wireless Network Basics

 Wireless Local Area Network (WLAN): A network using radio waves instead of wires to
communicate between devices.
 Access Point (AP): A device enabling wireless communication for devices to connect to a network,
bridging wireless and wired systems.
 Service Set Identifier (SSID): A unique identifier for wireless clients to connect to a specific AP. It
acts as a shared password between the AP and clients.
 Authentication Methods:
o Open System Authentication: Default protocol for 802.11, involving basic authentication
without encryption.
o Shared Key Authentication: A challenge-response mechanism using WEP and a shared
secret key.
 Network Topologies:
o Ad-Hoc Mode: No AP involved, allowing direct communication between wireless devices.
o Infrastructure Mode: Involves APs and is scalable for larger networks.

Wireless Security Protocols

 Wired Equivalent Privacy (WEP): Early encryption method for wireless networks, but insecure
due to key-scheduling flaws.
 Wi-Fi Protected Access (WPA): Improved security protocol addressing WEP's flaws using TKIP
for encryption. WPA2 enhances security with AES encryption.
 WPA3: A new standard building on WPA2, offering stronger authentication, cryptographic
strength, and protections like forward secrecy. It includes WPA3-Personal and WPA3-Enterprise
for different network needs.

Wireless Network Security Threats

 Low Deployment Cost: Wireless networks are inexpensive, but they are vulnerable to attacks due to
design flaws in the 802.11 standard.
 Common Threats:
o Parking Lot Attack: Attackers intercept signals outside the intended coverage area, such as in
parking lots, to access internal networks.
o Shared Key Authentication Flaw: Attackers can exploit the shared key method by intercepting
authentication challenges and responses.
o SSDI Flaw: Default SSIDs are vulnerable, and if not changed, they can be captured and exploited.
Even with encryption like WEP, SSIDs may still be broadcast in clear text, allowing attackers to sniff
them and gain access.

3.1.2. Common Wireless Network Threats

 Types of Attacks:
o Accidental Association: Connecting to unintended networks.
o Malicious Association: Rogue access points stealing data (e.g., public Wi-Fi).
o Ad-Hoc Networks: Direct data exchange between two computers.
o Nontraditional Networks: Bluetooth eavesdropping.
o MAC Spoofing: Impersonating a device.
o Man-In-The-Middle: Using rogue access points to intercept data.
o DoS Attacks: Disrupting network activity.
o Network Injection: Spoofing management messages.
 Countermeasures:
o Disable SSID broadcast, use cryptic SSIDs, and reduce signal strength.
o Use encryption, 802.1x access control, and strong password protection.
o Implement MAC filtering.

3.2. Configuring Security and Parameters

 Security Modes:
o None (Plain text): No encryption; not secure for regular use.
o Static WEP: Uses a static key (64-bit or 128-bit) for data encryption but still vulnerable.
 WEP Settings: Key Index, Key Length (64/128 bits), Key Type (ASCII/Hex), and
Shared Key Authentication.
o Dynamic WEP: Uses 802.1x and EAP for dynamically generated encryption keys.

3.3. Testing Security and Firewall Arrangements

 Firewall Testing: Ensures firewall functionality and identifies vulnerabilities.


o Methods:
 Penetration Testing: Simulates cyber-attacks to test firewall strength.
 Port Scanning: Identifies open/closed ports using tools like Nmap.
 Testing Tools:
o Nmap, Netcat, ShieldsUp for scanning and trace route checks.
o Windows Firewall: Built-in features for firewall configuration and testing.
 Securing the Firewall:
o Disable insecure protocols (e.g., Telnet, SNMP).
o Regular backups and audit logs.
o Add stealth rules to hide the firewall from external scans.

Compatibility Testing Summary:


Definition: Compatibility testing examines how software functions across various browsers, devices,
platforms, and operating systems to identify any discrepancies.
Benefits: Improves Software Development Process: Helps identify issues early in the SDLC, ensuring
usability, scalability, and stability across platforms.
Detects Bugs Before Production: Identifies bugs in web and mobile apps before they reach production,
preventing issues in tricky areas.
Ensures Complete User Satisfaction: Ensures the software performs correctly across all platforms,
browsers, and devices.
Ensures Successful Launches: Contributes to successful product launches by identifying and resolving
compatibility issues early.

END OF UNIT QUESTIONS


I.Choose the Correct Answer for the Following Questions

1. What is the main purpose of an Access Point (AP) in a wireless network?


o A) To encrypt wireless communication
o B) To enable wireless communication and connect devices to a network
o C) To manage the network traffic
o D) To assign IP addresses to devices
2. Which of the following wireless security protocols provides the strongest encryption?
o A) WEP
o B) WPA
o C) WPA2
o D) WPA3
3. What is a common flaw in Shared Key Authentication that can be exploited by attackers?
o A) No encryption used
o B) Key-scheduling flaws
o C) Insecure SSID broadcasting
o D) Weak encryption keys
4. Which type of wireless attack involves impersonating a device to gain unauthorized access to
a network?
o A) Man-in-the-Middle Attack
o B) MAC Spoofing
o C) DoS Attack
o D) Accidental Association
5. Which of the following countermeasures can help prevent the Parking Lot Attack?
o A) Disable SSID broadcast and reduce signal strength
o B) Use WPA encryption
o
C) Disable MAC filtering
o
D) Use a static WEP key
6. What is a characteristic of Dynamic WEP encryption?
o A) Uses a static key for encryption
o B) Generates dynamic keys using 802.1x and EAP
o C) Does not encrypt the data
o D) Uses weak encryption methods

II.Matching Questions:

A B
1. WEP a. Attack where the attacker intercepts signals outside the intended coverage
area
2. WPA3 b. Uses dynamic encryption keys generated by 802.1x and EAP

3. MAC Spoofing c. A protocol with strong cryptographic strength and forward secrecy

4. DoS Attack d. Attack where a device impersonates another device’s MAC address

5. Parking Lot Attack e. An attack that disrupts the network by overwhelming it with traffic

Unit Four: Train users


Objectives
 Understand devices to be connected to the network
 Demonstrate how pairing and log-on
 Understand traffic capacity issues
 Develop user documentation

4.1 Devices to be connected to the Network

 IP Address: A unique identifier for a device on the internet or a local network. It ensures proper
routing of data between devices using the TCP/IP protocol.
 MAC Address: A 12-digit physical address assigned to each network device. It operates at the data
link layer and is fixed by the manufacturer.
 Ping: A tool that checks if a host is accessible via an IP network. It sends ICMP echo requests and
measures the round-trip time for packets.
 ARP (Address Resolution Protocol): Translates IP addresses to MAC addresses, enabling devices to
communicate over a network by associating the physical MAC address with an IP address.
 Identifying Devices on a Wi-Fi Network:
o Manually: Log into the router’s web interface to view connected devices.
o Automatically: Use network scanning tools like Nexpose, Nessus, Nmap, and Zenmap to
gather details about devices connected to your network.

4.2 Pairing and Log-on

 Identifying Devices in Your Network:


o Log into the router's administrative panel (typically at 192.168.0.1 or 192.168.1.1) to see
connected devices.
o You can restrict access or change the Wi-Fi password if unauthorized devices are detected.

4.3 Traffic Capacity Issues

 Identifying and Classifying Traffic:


o Use tools like Deep Packet Inspection (DPI), network analytics, and Quality of Service (QoS)
to monitor and categorize traffic (e.g., voice, video, IoT).
 Traffic Shaping and Management:
o Traffic Shaping: Controls the rate and volume of traffic to optimize network capacity.
o Traffic Management: Implements policies to prioritize or block certain traffic types.
 Optimizing Network Protocols and Parameters:
o Adjust protocols and parameters to reduce overhead, improve efficiency, and enhance security.
 Network Slicing and Virtualization:
o Network Slicing: Divides a physical network into logical segments for better management.
o Network Virtualization: Abstracts network functions from the hardware for greater flexibility
and scalability.

5. Implement Edge Computing and Caching

 Edge Computing: Processes data closer to the source (local devices/servers), reducing latency,
bandwidth usage, and energy consumption.
 Caching: Stores frequently accessed data locally, improving speed, reducing server load, and
saving bandwidth.
 Benefits: Faster responses, less congestion, energy conservation, and efficient data handling.

4.4 Developing User Documentation

 User Documentation Goals: Help users learn system usage, troubleshoot issues, and resolve
problems efficiently.
 Documentation Standards: Ensure consistency and clarity for users at all organizational levels.
 Media Types:
o Online: Easily updated, accessible, and cost-effective.
o Paper: Traditional, inexpensive for small quantities but hard to update.
 Content Considerations: Focus on user needs, clear layout, and appropriate visuals.
 Templates: Use standard templates (Word, HTML, online help) for consistency in design and
content.
Multiple Choice Questions

1. What is the primary function of an IP address in a network?


o A) To provide a physical address for network devices
o B) To ensure proper routing of data between devices
o C) To check if a host is accessible
o D) To manage network traffic flow
o Answer: B) To ensure proper routing of data between devices
2. Which of the following is true about a MAC address?
o A) It is a temporary identifier assigned to a network device.
o B) It is a 12-digit physical address assigned by the manufacturer.
o C) It operates at the network layer.
o D) It is assigned dynamically by the router.
3. What does the "ping" command do in a network?
o A) Checks the availability of a device via IP network
o B) Translates IP addresses to MAC addresses
o C) Increases network traffic to optimize performance
o D) Controls the rate of data transfer between devices
4. Which protocol is used to translate IP addresses to MAC addresses?
o A) TCP
o B) ARP
o C) HTTP
o D) DNS
5. How can you identify devices connected to your Wi-Fi network?
o A) Only manually through the router's web interface
o B) Only by using network scanning tools
o C) Either manually through the router’s web interface or automatically with network
scanning tools
o D) By using the ping command
6. Which tool can be used for monitoring and categorizing traffic in a network?
o A) DNS
o B) Nmap
o C) QoS
o D) DPI
7. What is the main purpose of traffic shaping in network management?
o A) To prioritize traffic types based on their importance
o B) To control the rate and volume of traffic for optimal network capacity
o C) To encrypt all network traffic for security
o D) To block unauthorized devices from accessing the network
8. What does network virtualization provide for a network?
o A) It divides a network into logical segments for better management.
o B) It abstracts network functions from the hardware for greater flexibility and scalability.
o C) It encrypts all traffic for security.
o D) It restricts traffic based on content types.
9. What is one of the key benefits of implementing edge computing?
o A) Reducing the need for network security
o B) Reducing latency and bandwidth usage by processing data closer to the source
o C) Increasing traffic congestion and overhead
o D) Decreasing the amount of data processed at local servers
10. Which of the following is a benefit of using online user documentation over paper-based
documentation?
o A) It is easier to distribute to remote users.
o B) It requires specialized software for access.
o C) It is more difficult to update.
o D) It is more expensive to produce.

Unit Five: Monitor and administer wireless network


 Monitor wireless network performance
 Debug networking issues
 Document and store securely current settings.

5.1 Monitoring Wireless Network Performance

 Wireless Network Monitoring: Involves tracking key aspects like coverage, signal strength, and
performance data for access points to maintain network health.
 Need for Monitoring: Crucial as wireless networks don't have physical interfaces. Monitoring
prevents outages and downtime, ensuring business continuity.
 Wireless Network Strength: Weak network leads to slow connections or disconnections.
Monitoring the number of access points and their performance is vital.
 Effective Utilization: Track network usage metrics like CPU, memory, and disk utilization to
prevent overutilization and downtime. Alerts can be set for thresholds to prevent issues.

5.2 Debugging Network Issues

 Physical Layer Checks:


o Use correct cables (CAT 5E or better), ensure connections are firm, and check device link
lights.
o Troubleshoot Wi-Fi by connecting via Ethernet and rebooting devices like routers, switches,
or access points.
 WAN/ISP Connectivity: Use network diagnostics tools to gather information during internet
outages for troubleshooting.
 Local Network Connectivity: Check cables and access points. Ping intermediate networks to verify
connectivity.
 DNS Connectivity: Use tools like ping and nslookup to ensure proper DNS server functioning and
check internet access.
5.3 Documenting and Storing Securely Current Settings

 Document Security: Involves protecting documents from threats like hackers, loss, and
unauthorized access or sharing.
 Securing Documents: Ensure confidentiality and integrity by using encryption, proper access
controls, and monitoring who shares or edits documents.

Document Security

1. Digitize Your Documents: Convert paper documents into digital formats and apply security
measures to protect them. Shred the paper copies to ensure confidentiality.
2. Use Password Protection: Apply password protection to sensitive files, especially on mobile
devices, to prevent unauthorized access in case of device theft.
3. Password Protecting Microsoft 365 Documents: Use the "Encrypt with Password" option in
Microsoft 365 to secure documents.
4. Use Strong Passwords: Create complex passwords with a mix of letters, numbers, and special
characters. Avoid common words and personal references. A strong password should be at least 8
characters long.
5. Encrypt Your Files: Use encryption software or built-in encryption systems (e.g., Windows or
macOS) to secure files and protect them from unauthorized access.
6. Avoid Emailing Documents: Instead of emailing sensitive documents, use secure alternatives like
cloud storage links or digital signatures to prevent unauthorized distribution.
7. Cloud Storage: Use cloud storage services that allow secure sharing of documents via links with
restricted access, avoiding attachment-based sharing.
8. Digital Signatures: Use services like DocuSign for document signing to keep files secure and
ensure they remain uneducable after all parties have signed.

Multiple Choice Questions

1. Why is wireless network monitoring important?


a) It helps to track internet speed.
b) It tracks the performance and coverage of access points to ensure network health.
c) It ensures that wireless networks are only accessible from specific locations.
d) It prevents users from connecting to the network.
2. What can result from a weak wireless network signal?
a) Faster internet speeds.
b) Disconnections or slow connections.
c) Improved network coverage.
d) More efficient data transfer.
3. What should be monitored to prevent network downtime and overutilization?
a) The physical location of access points.
b) CPU, memory, and disk utilization metrics.
c) Only internet speed.
d) The color of access point lights.
4. When troubleshooting network issues, which of the following is a recommended step for the
physical layer?
a) Check device link lights and use the correct cables.
b) Use a software tool to monitor signal strength.
c) Reboot the wireless router without checking cables.
d) Disconnect all devices to reset the network.
5. What is the role of DNS tools like ping and nslookup?
a) To check the physical connection to the internet.
b) To verify proper DNS server functioning and internet access.
c) To measure Wi-Fi signal strength.
d) To monitor CPU usage of a router.
6. Which method helps secure sensitive documents on mobile devices?
a) Use a password protection mechanism for the files.
b) Share documents via social media.
c) Store documents in an unencrypted format.
d) Save documents as text files.
7. What is the benefit of encrypting files?
a) It increases file size.
b) It prevents unauthorized access and ensures data protection.
c) It makes files more accessible to the public.
d) It reduces the file quality.
8. What is a secure alternative to emailing sensitive documents?
a) Sending documents as an unencrypted file attachment.
b) Uploading documents to cloud storage with restricted access.
c) Sharing documents through instant messaging apps.
d) Writing documents on paper and scanning them.

Have a Good Study & be Productive

You might also like