Built Small WLAN Level IV (2017) Notes
Built Small WLAN Level IV (2017) Notes
WLAN stands for Wireless Local Area Network, which is a network that uses radio waves or light to
connect devices without physical cables. WLANs are commonly used in homes, offices, and public places
to provide wireless internet access.
UNIT ONE: Confirm client and equipment requirements
Scope Levels
Planned Applications:
o Types: E-mail, groupware, voice networking, web browsing, video on demand, databases, file
sharing, etc.
o Importance: Classified as critical, important, or not important.
o Example:
Critical: Cisco Digital Media System (VoD), Oracle database, custom customer
support apps.
Important: Microsoft Outlook (email), Cisco Unified Meeting Place (groupware).
1. Security:
o Firewalls, virus scanning, intrusion prevention.
o Authentication and authorization systems.
2. Quality of Service (QoS): Prioritize critical traffic (voice, database) over less important traffic
(HTTP).
3. Network Management:Use centralized tools like HP Open View, Cisco Works.
4. High Availability: Redundant paths and devices to avoid single points of failure.
5. IP Multicast: Needed for video conferencing and e-learning.
6. Voice: Migration to IP telephony.
7. Mobility: Employee mobility and guest access for clients
A.Typical Constraints
1. Budget: Limited resources may lead to compromises in availability, performance, scalability, and
manageability.
2. Personnel: Insufficient or untrained staff may impact network design considerations.
3. Policies: Organizational policies on protocols, standards, vendors, and applications must be
understood and adhered to.
4. Schedule: Project timelines need approval from executive management to prevent deadline disputes.
B.Technical Goals
1. Improve Network Performance: Address issues like responsiveness, throughput, and resource
utilization as user and application demands increase.
2. Minimize Downtime and Costs: Ensure quick recovery from failures to reduce downtime and related
expenses.
3. Modernize Technologies: Replace outdated equipment to meet demands of new technologies and
applications.
4. Enhance Scalability: Design for future growth and upgrades.
5. Simplify Management: Ensure network management is straightforward and user-friendly.
C.Technical Constraints
1. Purpose of Requirements:
o Establishes the foundation for design without detailing specific technologies or configurations.
2. Key Requirement Types:
o Applications: Define user needs (e.g., web browsing, email, or specialized systems like hospital
monitoring).
o Environment: Document operating locations (e.g., floor plans, site surveys, and photos).
o Coverage Areas: Specify areas needing access (e.g., offices, elevators, or cafeterias) to avoid
unnecessary costs.
o End Users: Identify user mobility (mobile vs. stationary) for roaming and IP management.
o Client Devices: List device specifications to ensure compatibility and legacy support.
o Existing Infrastructure: Document infrastructure components (e.g., closets, PoE, authentication
servers).
o Security: Define data sensitivity and encryption/authentication needs.
o Funding: Outline available budget or offer cost options for varied coverage needs.
o Schedules: Establish realistic timelines aligned with project goals.
1. Wireless Connectivity: Data transmission between devices without physical cables using Wi-Fi,
Bluetooth, or cellular networks.
2. Power Requirements for Wireless Devices:
o Wireless Routers: Powered by an electrical outlet for continuous function and signal
transmission.
o Wireless Access Points: Powered via electrical outlet or Power over Ethernet (PoE), which
transmits both data and power through one Ethernet cable.
o Wireless Cameras: Can be battery-powered for flexibility or plugged into an electrical outlet for
continuous power.
o Wireless Devices (Smartphones, Tablets, Laptops): Powered by built-in rechargeable batteries
for wireless functionality.
END OF UNIT ONE QUESTIONS
I. Write True if the Statement is Correct Otherwise False for the Following Questions
a) Microsoft Outlook
b) Cisco Unified Meeting Place
c) Oracle database
d) Web browsing
3. What is the purpose of performing a site survey when placing wireless access points (WAPs)?
a) Budget
b) Technical goals
c) Schedule
d) Policies
5. Which wireless network security practice helps prevent unauthorized access by hiding the
network name?
a) WPA3
b) Enable MAC filtering
c) Disable SSID broadcast
d) Use Firewalls
6. What is the main goal of defining technical constraints during network design?
7. Which layer of the network design focuses on redundancy in equipment and links?
a) Network layer
b) Data Link layer
c) Application layer
d) Transport layer
8. What is the primary benefit of using Power over Ethernet (PoE) for wireless access points?
9. Which factor is most important when determining the placement of a wireless access point?
11. Which of the following is considered a technical goal for network design?
12. What should be avoided when placing wireless access points to ensure good coverage?
What is a Wireless Access Point (WAP)? A WAP is a device used to create a Wireless Local
Area Network (WLAN). It connects to a router, hub, or switch via Ethernet and projects Wi-Fi
signals across a designated area.
Things to Consider When Selecting a WAP:
1. Range: Choose a WAP with a large coverage area to reduce the number and cost of access
points. Most enterprise WAPs cover 5,000–10,000 sq. ft.
2. Speed: Look for WAPs supporting 802.11ac (up to 1200Mbps) for faster speeds.
3. Gain Antenna: WAPs with built-in or booster antennas provide better signal strength and
coverage.
4. Guest Access: Ensure intelligent guest access systems for secure, controlled network usage.
5. No Hardware Controllers: Modern WAPs like Wi-Fi 6 do not require hardware controllers
and use software-based control.
6. Wi-Fi Technology: Consider MESH, MIMO, and POE technologies based on your needs.
7. Price: Ensure value for money. Avoid overly expensive or very cheap WAPs that may lead
to waste or poor performance.
WAP Installation: WAPs connect wireless and wired networks or create standalone wireless
networks. In large setups, users can roam within the radio range while maintaining network access.
Steps for Configuring a WAP (e.g., DLink Access Point):
1. Change the default admin password for security.
2. Set a custom SSID for the network.
3. Enable encryption to secure the wireless network.
4. Disable the DHCP server function, if applicable.
2.3 Configure Services
The Configure Services method allows you to register dependent classes with an IoC (Inversion of
Control) container in ASP.NET Core, enabling automatic injection into other classes.
In ASP.NET Core, a "Service" is a class used in other classes.
MLS is a third-party service to manage a company's LAN, providing remote monitoring and
maintenance.
Benefits include 24/7 support, proactive monitoring, cost reduction, and improved network
performance.
Client Needs: Improve operations by integrating old equipment into a modern ICT system.
ICT Priorities: Networking legacy equipment, upgrading the ICT system, and optimizing work
processes.
Solution:
o Integrated management system to reduce fragmentation.
o Replaced hardware/software with minimal downtime.
o Developed new processes for better efficiency.
o Provided comprehensive staff training and continuous support.
o Offered consultancy for ongoing system optimization.
Outcome: Improved productivity, reduced errors, and better communication.
Operation Sheet 2.1
Operation title: Configuring a Wireless Access Point
Purpose: To Configuring a Wireless Access Point
1. A Wireless Access Point (WAP) connects wireless devices to a wired network using Wi-Fi signals.
2. WAPs with built-in antennas do not affect the signal strength or coverage area.
3. Modern WAPs like Wi-Fi 6 require hardware controllers for management.
4. Managed LAN Services (MLS) provide 24/7 support and proactive monitoring to improve network
performance.
5. Performance testing ensures that a WLAN can meet security standards.
Wireless Local Area Network (WLAN): A network using radio waves instead of wires to
communicate between devices.
Access Point (AP): A device enabling wireless communication for devices to connect to a network,
bridging wireless and wired systems.
Service Set Identifier (SSID): A unique identifier for wireless clients to connect to a specific AP. It
acts as a shared password between the AP and clients.
Authentication Methods:
o Open System Authentication: Default protocol for 802.11, involving basic authentication
without encryption.
o Shared Key Authentication: A challenge-response mechanism using WEP and a shared
secret key.
Network Topologies:
o Ad-Hoc Mode: No AP involved, allowing direct communication between wireless devices.
o Infrastructure Mode: Involves APs and is scalable for larger networks.
Wired Equivalent Privacy (WEP): Early encryption method for wireless networks, but insecure
due to key-scheduling flaws.
Wi-Fi Protected Access (WPA): Improved security protocol addressing WEP's flaws using TKIP
for encryption. WPA2 enhances security with AES encryption.
WPA3: A new standard building on WPA2, offering stronger authentication, cryptographic
strength, and protections like forward secrecy. It includes WPA3-Personal and WPA3-Enterprise
for different network needs.
Low Deployment Cost: Wireless networks are inexpensive, but they are vulnerable to attacks due to
design flaws in the 802.11 standard.
Common Threats:
o Parking Lot Attack: Attackers intercept signals outside the intended coverage area, such as in
parking lots, to access internal networks.
o Shared Key Authentication Flaw: Attackers can exploit the shared key method by intercepting
authentication challenges and responses.
o SSDI Flaw: Default SSIDs are vulnerable, and if not changed, they can be captured and exploited.
Even with encryption like WEP, SSIDs may still be broadcast in clear text, allowing attackers to sniff
them and gain access.
Types of Attacks:
o Accidental Association: Connecting to unintended networks.
o Malicious Association: Rogue access points stealing data (e.g., public Wi-Fi).
o Ad-Hoc Networks: Direct data exchange between two computers.
o Nontraditional Networks: Bluetooth eavesdropping.
o MAC Spoofing: Impersonating a device.
o Man-In-The-Middle: Using rogue access points to intercept data.
o DoS Attacks: Disrupting network activity.
o Network Injection: Spoofing management messages.
Countermeasures:
o Disable SSID broadcast, use cryptic SSIDs, and reduce signal strength.
o Use encryption, 802.1x access control, and strong password protection.
o Implement MAC filtering.
Security Modes:
o None (Plain text): No encryption; not secure for regular use.
o Static WEP: Uses a static key (64-bit or 128-bit) for data encryption but still vulnerable.
WEP Settings: Key Index, Key Length (64/128 bits), Key Type (ASCII/Hex), and
Shared Key Authentication.
o Dynamic WEP: Uses 802.1x and EAP for dynamically generated encryption keys.
II.Matching Questions:
A B
1. WEP a. Attack where the attacker intercepts signals outside the intended coverage
area
2. WPA3 b. Uses dynamic encryption keys generated by 802.1x and EAP
3. MAC Spoofing c. A protocol with strong cryptographic strength and forward secrecy
4. DoS Attack d. Attack where a device impersonates another device’s MAC address
5. Parking Lot Attack e. An attack that disrupts the network by overwhelming it with traffic
IP Address: A unique identifier for a device on the internet or a local network. It ensures proper
routing of data between devices using the TCP/IP protocol.
MAC Address: A 12-digit physical address assigned to each network device. It operates at the data
link layer and is fixed by the manufacturer.
Ping: A tool that checks if a host is accessible via an IP network. It sends ICMP echo requests and
measures the round-trip time for packets.
ARP (Address Resolution Protocol): Translates IP addresses to MAC addresses, enabling devices to
communicate over a network by associating the physical MAC address with an IP address.
Identifying Devices on a Wi-Fi Network:
o Manually: Log into the router’s web interface to view connected devices.
o Automatically: Use network scanning tools like Nexpose, Nessus, Nmap, and Zenmap to
gather details about devices connected to your network.
Edge Computing: Processes data closer to the source (local devices/servers), reducing latency,
bandwidth usage, and energy consumption.
Caching: Stores frequently accessed data locally, improving speed, reducing server load, and
saving bandwidth.
Benefits: Faster responses, less congestion, energy conservation, and efficient data handling.
User Documentation Goals: Help users learn system usage, troubleshoot issues, and resolve
problems efficiently.
Documentation Standards: Ensure consistency and clarity for users at all organizational levels.
Media Types:
o Online: Easily updated, accessible, and cost-effective.
o Paper: Traditional, inexpensive for small quantities but hard to update.
Content Considerations: Focus on user needs, clear layout, and appropriate visuals.
Templates: Use standard templates (Word, HTML, online help) for consistency in design and
content.
Multiple Choice Questions
Wireless Network Monitoring: Involves tracking key aspects like coverage, signal strength, and
performance data for access points to maintain network health.
Need for Monitoring: Crucial as wireless networks don't have physical interfaces. Monitoring
prevents outages and downtime, ensuring business continuity.
Wireless Network Strength: Weak network leads to slow connections or disconnections.
Monitoring the number of access points and their performance is vital.
Effective Utilization: Track network usage metrics like CPU, memory, and disk utilization to
prevent overutilization and downtime. Alerts can be set for thresholds to prevent issues.
Document Security: Involves protecting documents from threats like hackers, loss, and
unauthorized access or sharing.
Securing Documents: Ensure confidentiality and integrity by using encryption, proper access
controls, and monitoring who shares or edits documents.
Document Security
1. Digitize Your Documents: Convert paper documents into digital formats and apply security
measures to protect them. Shred the paper copies to ensure confidentiality.
2. Use Password Protection: Apply password protection to sensitive files, especially on mobile
devices, to prevent unauthorized access in case of device theft.
3. Password Protecting Microsoft 365 Documents: Use the "Encrypt with Password" option in
Microsoft 365 to secure documents.
4. Use Strong Passwords: Create complex passwords with a mix of letters, numbers, and special
characters. Avoid common words and personal references. A strong password should be at least 8
characters long.
5. Encrypt Your Files: Use encryption software or built-in encryption systems (e.g., Windows or
macOS) to secure files and protect them from unauthorized access.
6. Avoid Emailing Documents: Instead of emailing sensitive documents, use secure alternatives like
cloud storage links or digital signatures to prevent unauthorized distribution.
7. Cloud Storage: Use cloud storage services that allow secure sharing of documents via links with
restricted access, avoiding attachment-based sharing.
8. Digital Signatures: Use services like DocuSign for document signing to keep files secure and
ensure they remain uneducable after all parties have signed.