Build A Small Wireless LAN
Build A Small Wireless LAN
SERVICE LEVEL-IV
1
Unit One: Confirm client and equipment requirements
1.1. Client and organizational requirements
As the organization's network grows, so does the organization's dependency on the network and
the applications that use it. Network-accessible organizational data and mission-critical
applications that are essential to the organization's operations depend on network availability.
To design a network that meets customers' needs, the organizational goals, organizational
constraints, technical goals, and technical constraints must be identified. This section describes
the process of determining which applications, network services already exist, and which ones
are planned, along with associated organizational and technical goals and constraints. We begin
by explaining how to assess the scope of the design project. After gathering all customer
requirements, the designer must identify and obtain any missing information and reassess the
scope of the design project to develop a comprehensive understanding of the customer's needs.
1.2 Identify Required Information
Determining requirements includes extracting initial requirements from the customer and then
refining these with other data that has been collected from the organization.
Extracting Initial Requirements
Initial design requirements are typically extracted from the Request for Proposal (RFP) or
Request for Information (RFI) documents that the customer issues.
An RFP is a formal request to vendors for proposals that meet the requirements that the
document identifies.
An RFI is typically a less formal document an organization issues to solicit ideas and
information from vendors about a specific project.
1.3. Gathering Network Requirements
As illustrated in Figure1the process of gathering requirements can be broken down into five
steps. During these steps (which are sometimes called milestones), the designer discusses the
project with the customer's staff to determine and gather the necessary data, including
appropriate documentation.
2
Figure Gathering Data for Design Requirements
Organizational Goals
Every design project should begin by determining the organizational goals that are to be
achieved. Network designers are often eager to start by analyzing the technical goals before
considering the organizational goals and constraints. However, detailed attention to
organizational goals and constraints is important for a project's success. In discussions about
organizational goals, the designer obtains knowledge about the customer's expectations of the
design's positive outcomes for the organization. Both short- and long-term goals should be
identified.
This is an opportunity to determine what is important to the customer.
Some sample questions a designer might ask to help determine organizational goals
include the following:
What are you trying to accomplish with this project
What business challenges are you currently facing?
3
What are the consequences of not resolving these issues?
What is the major objective of this project?
What is driving the change?
What other technology projects and business initiatives will affect your group in the next
two to five years?
What skill sets does your technical staff currently have?
What is your goal for return on investment?
Organizational goals differ from organization to organization.
The following are some typical goals that commercial organizations might have:
Increase the operation's generated revenue and profitability. A new design should reduce
costs in certain segments and propel growth in others. The network designer should
discuss with the customer any expectations about how the new network will influence
revenues and profits.
Shorten development cycles and enhance productivity by improving internal data
availability and interdepartmental communications.
Improve customer support and offer additional customer services that can expedite
reaction to customer needs and improve customer satisfaction.
Open the organization's information infrastructure to all key stakeholders (prospects,
investors, customers, partners, suppliers, and employees), and build relationships and
information accessibility to a new level.
Organizational Constraints
When assessing organizational goals, it is important to analyze any organizational constraints
that might affect the network design. Some sample questions the designer might ask to help
determine organizational constraints include the following:
What in your current processes works well?
What in your current processes does not work well?
Which processes are labor-intensive?
What are the barriers for implementation in your organization?
What are your major concerns with the implementation of a new solution?
What projects already have budget approval?
4
Are other planned technology projects and business initiatives compatible with your
current infrastructure and technology solutions?
Do you have a budget for technical development for your staff?
Are there any policies in place that might affect the project?
Typical organization constraints include the following:
Budget:
Personnel
Policies
Schedule
Technical Goals
The technical goals of the project must also be determined before the design starts. Some sample
questions the designer might ask to help determine technical goals include the following:
What infrastructure issues exist or will exist related to your applications rollouts?
What skill sets does your technical staff need to acquire?
Does your current network have any performance issues?
Which portions of your network are considered mission-critical?
The following list describes some common technical goals:
Improve network performance:
Decrease expected downtime and related expenses:
Modernize outdated technologies
Improve scalability of the network
Simplify network management
Good network design addresses constraints by identifying possible trade-offs,
such as the following:
5
Application compatibility: If the new network is not being introduced at the same time
as new applications, the design must provide compatibility with old applications.
Lack of qualified personnel: Lack of qualified personnel suggests that the designer must
consider the need for additional training; otherwise, certain features might have to be
dropped. For example, if the network proposal includes the use of IP telephony but the
network administrators are not proficient in IP telephony, it might be necessary to
propose an alternative solution.
Table 1.3.Technical Constraints for
Technical Constraints Gathered Data (Current Comments
Situation)
Existing equipment Coaxial cable The cabling must be replaced with
twisted pair to the desktop, and fiber
optics for uplinks and in the core
Bandwidth availability 64-kbps WAN link Upgrade bandwidth; change to another
service provider because the current one
does not have any other links to offer
Application IP version 6 (IPv6)-based New network equipment must support
compatibility applications IPv6
1.1.3. Assigning appropriate authority
The importance of wireless network security cannot be understated. With the proliferation of
mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and
other cyber security threats has increased exponentially.
While there are many different steps that can be taken to secure a wireless network, these
12 best practices are essential for ensuring that your data and devices are safe
from malicious actors /best practice for wireless network security/
1. Enabling Two-Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security to the login process. It requires users to
enter a username and password, as well as a code that is generated by an authenticator app. This
makes it more difficult for someone to gain unauthorized access to the network.
2. Using a Strong Password
6
A strong password is at least eight characters long and includes a mix of upper- and lower-case
letters, numbers, and symbols. Passwords should be changed regularly to ensure that they remain
secure.
3. Encrypting Data
Data encryption scrambles data so that it can only be decrypted and read by authorized users.
This helps to protect sensitive information from being accessed by unauthorized individuals.
4. Disabling SSID Broadcast
When SSID broadcast is enabled, it allows anyone within range of the wireless network to see
the network's name. You can disable SSID broadcast by accessing the wireless router's
configuration page and disabling the SSID broadcast feature.
5. Using MAC Filtering
Using MAC filtering is another best practice for wireless network security. MAC addresses are
unique identifiers assigned to devices that connect to a network.
6. Enabling WPA3 Security
WPA3 is the most recent and most secure wireless security protocol. It provides stronger
protection than WPA2 and should be used whenever possible.
7. Using A VPN
A VPN encrypts all traffic between a device and the VPN server, making it more difficult for
someone to eavesdrop on the connection. This is especially important when using public Wi-Fi
networks, as they are often less securing than private ones.
8. Disabling Remote Administration
When remote administration is enabled, it allows anyone with the proper credentials to access
the router's configuration page and make changes to the network. This can be a security risk, as it
allows unauthorized individuals to potentially gain access to the network.
9. Changing the default password
Many routers come with a default password that is easy to guess. This can be a security risk, as it
allows unauthorized individuals to potentially gain access to the network...
10. Using a Firewall
A firewall helps to protect the network by blocking incoming traffic that is not authorized. This
can be especially important in preventing attacks from malware and other malicious software.
11. Disabling UPnP
7
Universal Plug and Play (UPnP) is a protocol that allows devices to automatically discover and
connect to each other. This can be a security risk, as it allows unauthorized devices to potentially
gain access to the network. To disable UPnP, access the wireless router's configuration page and
disable the feature. You can also disable UPnP on individual devices by accessing the settings
menu.
12. Disabling Unnecessary Services
You often find that routers come with a number of unnecessary services enabled. These can be a
security risk, as they can provide potential attackers with information about the network. To
disable unnecessary services, access the wireless router's configuration page and disable any
services that are not needed. This will help to reduce the attack surface of the network. Common
unnecessary services include things like telnet, SSH, and HTTP.
Requirements define what the wireless network must do, which provides the foundation for the
design. Requirements for a wireless network include needs, such as signal coverage in all
elevators and support for voice telephony. Leave the technical details, such as specific
technologies (such as 2.4GHz vs. 5GHz 802.11n), components, and configuration settings to the
designers after all requirements are well-defined and agreed upon.
Requirements to consider
Before implementing a wireless network, consider the following types of requirements:
a. Applications.
b. Environment.
c. Coverage areas.
d. End users.
e. Client devices.
f. Existing infrastructure.
g. Security.
h. Funding.
9
F. Use Power over Ethernet (PoE): PoE allows WAPs to receive power over the same
cable that carries the network data, making it easy to install them in a variety of locations.
G. Use wireless planning tools: wireless planning tools can help to predict coverage,
capacity, and performance of wireless networks, by simulating the environment and giving
you an idea of how the wireless network will perform.
2. Wireless Access Points: Similar to routers, wireless access points are devices that provide
wireless connectivity in a specific area or location. They may be powered through an
electrical outlet or, in some cases, through Power over Ethernet (PoE) technology, which
allows both data and power to be transmitted over the same Ethernet cable.
3. Wireless Cameras: Wireless security cameras or other types of wireless cameras may be
powered by batteries or by connecting them to an electrical outlet. Battery-
powered wireless cameras are often designed for flexibility and portability,
while those connected to an outlet can provide continuous power.
4. Wireless Devices: Various wireless devices, such as smartphones, tablets, and laptops,
have built-in batteries that power their wireless capabilities. These devices need to be
periodically recharged to maintain their wireless functionality.
17
Unit Two: Install and configure wireless access point
2.1. Selecting access point device
What are wireless access points?
A wireless access point is a device used to create a WLAN. Businesses in large offices or
buildings often use wireless access points. This device is connected to an internet hub, wired
router, or switch using an Ethernet cable. Then project the Wi-Fi signal to the designated area. It
is best to understand your business needs before you make a choice. Consider some of the above,
or ask an expert for recommendations. Router-switch–your professional IT provider.
Things to Consider
As more and more enterprises upgrade their wireless network environment, people also have
doubts about choosing a wireless access point. When choosing a wireless access point, keep the
following points in mind.
1. Range
The range that an AP can cover is an important parameter, and a WAP with a larger coverage
area is more beneficial. Because it means the number and cost of access points can be reduced.
Purchasing WAPs with additional coverage areas can reduce costs for businesses. Most
enterprise wireless access points are capable of covering an area of 5,000 to 10,000 square feet.
2. Speed
The rate at which information travels is also something we need to consider, usually measured in
bps (bits per second), kilobits, megabits, or gigabits. In general, if the exact 802.11n protocol is
supported, wireless AP speeds can reach 300Mbps or higher, six times faster than 802.11n. The
WAP that supports the 802.11ac protocol can reach 1200Mbps.
3. Gain Antenna
The antenna of the wireless AP is basically built-in, it is not external like the antenna of
the router. The antenna of the wireless AP is very important, it will directly affect the signal
strength and transmission range of the wireless AP. When buying a wireless AP, it is best to
choose one with a booster antenna.
4. Guest Access
Data breaches and other cyber security issues are happening every day now. When people use
their phones and computers over the Internet, security issues are not expected. Modern systems
have intelligent guest access systems that apply corporate security policies. This ensures that
19
guests stay safe on the network. Also, there is no need to worry about access from unsecured
devices.
5. No Hardware Controllers
In the past, access points also required IT technicians with specialized knowledge to operate
from a computer. However, with the advancement of technology, these are no longer necessary.
The latest Wi-Fi 6 access points, for example, use software control in the network and do not
require an external controller. Software-based control has many benefits over previous hardware-
dependent access points.
6. Wi-Fi Technology
Choose devices using MESH, MIMO and POE access point technologies based on your business
needs. MESH technology can be used in home and commercial equipment. POE technology
adopts low-power cabling technology and can transmit signals up to 100M.
7. Price
It is not that the higher the price, the better the AP. Sometimes the high price will not only
increase the cost, but also cause waste of product function and performance. Too low a price can
tempt people to buy inferior or counterfeit products.
19
end user device. It is like creating or deploying another network purely for wireless devices but
still an essential part of your existing wired network such as the diagram displayed below in this
wireless access point setup diagram.
Wireless devices (also known as access points) provide a secure, affordable, and easy-to-use
wireless LAN solution that combines mobility and flexibility with the enterprise-class features
required by networking professionals. When configured as an access point, the wireless device
serves as the connection point between wireless and wired networks or as the center point of a
stand-alone wireless network. In large installations, wireless users within radio range of an
access point can roam throughout a facility while maintaining seamless, uninterrupted access to
the network
19
ASP.NET Core refers dependent class as a Service. So, whenever you read "Service" then
understand it as a class, which is going to be used in some other class.
2.1.1 What are Managed LAN Services?
Managed LAN Services (MLS) is a term used to describe a service provided by a third party
service provider to manage a company’s local area network (LAN). This type of service provides
remote monitoring and maintenance of the company’s network infrastructure.
This type of service allows companies to reduce their IT costs and increase productivity. The
main advantage of MLS over other solutions is its ability to provide 24/7 support and proactive
monitoring. It also offers an easy way to access your network remotely.
A Local Area Network (LAN) is a high-speed communication system. It allows users to share
information and connect to other computers and peripherals. A LAN is usually connected to a
server via a router. Some types of LANs are wireless while others are wired.
Your company may already have an existing LAN, or you might need to create one. You will
need to buy equipment such as switches, routers, and hubs. Depending on the size and type of
your network, you might also need to purchase servers, printers, fax machines, and modems.
If you want to use a managed LAN service, you should contact a local IT service provider who
specializes in these kinds of services. They will be able to help you decide which kind of
managed LAN service is right for you.
2.1.2. Benefits of Using Managed LAN Services?
Security: A managed LAN services provider can secure your network by installing
firewalls, intrusion detection/prevention systems, and other security products.
Network Monitoring: A managed LAN services company can monitor your network
24 hours a day, seven days a week. It can alert you when there are problems with
your network.
Improved Network Performance: managed LAN service providers usually offer
faster speeds than you could get from a public Internet access point. You won’t have
to wait as long to download large files.
Cost Savings: Managed LAN service providers offer lower rates than you would pay
for similar services.
Reliability: Most managed LAN service providers guarantee 99% uptime. If they fail
to deliver this level of reliability, they will reimburse you for the downtime.
19
24-Hour Availability: Most managed LAN service providers offer 24-hour
availability. If an issue arises, they will resolve it immediately.
In conclusion, managed LAN services are beneficial because they help improve your
business’s productivity and save you money by reducing the cost of maintaining your
network infrastructure.
19
A Service Set Identifier (SSID) is a configurable identification that allows wireless clients to
communicate with an appropriate access point. With proper configuration, only clients with
correct SSID can communicate with the access points. In effect, the SSID acts as a single
shared password between access points and clients.
d. Open System Authentication
Open System Authentication is the default authentication protocol for the 802.11 wireless
standards. It consists of a simple authentication request containing the station ID and an
authentication response containing success or failure data. Upon successful authentication, both
stations are considered mutually authenticated.
e. Shared Key Authentication
Shared Key Authentication is a standard challenge and response mechanism that makes use of
WEP and a shared secret key to provide authentication. Upon encrypting the challenge text with
WEP using the shared secret key, the authenticating client will return the encrypted challenge
text to the access point for verification.
f. Ad-Hoc Mode
Ad-hoc mode is one of the networking topologies provided in the 802.11 standard. It consists of
at least two wireless stations where no access point is involved in their communication. Ad-hoc
mode WLANs are normally less expensive to run, as no APs are needed for their
communication.
g. Infrastructure Mode
Infrastructure mode is another networking topology in the 802.11 standard, in addition to ad-hoc
mode. It consists of a number of wireless stations and access points. The access points usually
connect to a larger wired network. This network topology can scale to form large-scale networks
with arbitrary coverage and complexity.
h. Wired Equivalent Privacy Protocol
Wired Equivalent Privacy (WEP) Protocol is a basic security feature in the IEEE 802.11
standard, intended to provide confidentiality over a wireless network by encrypting information
sent over the network. A key-scheduling flaw has been discovered in WEP, so it is now
considered as unsecured because a WEP key can be cracked in a few minutes with the aid of
automated tools. Therefore, WEP should not be used unless a more secure method is not
available.
i. Wi-Fi Protected Access
19
Wi-Fi Protected Access (WPA) is a wireless security protocol designed to address and fix the
known security issues in WEP. WPA provides users with a higher level of assurance that their
data will remain protected by using Temporal Key Integrity Protocol (TKIP) for data encryption.
802.1 x authentications have been introduced in this protocol to improve user authentication.
Wi-Fi Protected Access 2 (WPA2), based on IEEE 802.11i, is a new wireless security protocol
in which only authorized users can access a wireless device, with features supporting
stronger cryptography(e.g. Advanced Encryption Standard or AES), stronger authentication
control (e.g. Extensible Authentication Protocol or EAP), key management, replay attack
protection and data integrity.
Wi-Fi Protected Access 3 (WPA3) is a new wireless security standard built on WPA2 but
brings new features to enhance Wi-Fi security for more robust authentication and enhanced
cryptographic strength, while maintaining resiliency of mission critical networks.
19
4.1 Developing user documentation
4.1.2Determine documentation standards
Computer users need documentation so that they can make the best use of their computers as
work tools. A computer system can assist them to do their work efficiently and effectively but
they need to be able to do three things: • learn how to use the system and its applications • know
how to get help when they need to learn more • know what to do when they experience
problems. Users will be working across all parts and levels of an organization carrying out
different functions such as data entry, financial administration, executive and middle
management. However, user documentation is for anyone in an organization who needs
assistance with these three tasks
4.1.2User documentation and appropriate media
Books, manuals, computer-based tutorials and online help are all media for user documentation.
Traditionally user documentation has consisted of a range of paper based documents. However,
we are no longer limited to these, and organizations are shifting their paper-based user
documentation to an online form. There are very good reasons for this:
Increased productivity: - users have up-to-date, comprehensive information that they
can access quickly and easily.
Increased corporate intelligence:- information is stored centrally but distributed
universally
consistency and quality:- documentation appears in the same format and is easily
updateable
What to include in user documentation
It’s a good idea at this stage to think about the content that you will include in the user
documentation. This is so you can estimate the number of pages, the complexity of the content
and what the graphic and text components will be. The content will have some influence on:
Design of the documentation, including layout, use of text and graphics
Medium, eg paper-based or online
The time and resources needed to develop the documentation.
You can consider paper-based documentation, online documentation or a combination of both.
The media type you choose will be influenced by the:
Purpose of the documentation
19
User needs and characteristics
Content (subject matter). Always keep in mind that you need to include a range of items
that allow users to access the required information quickly and easily. There are
advantages and disadvantages to online and paper media.
Always keep in mind that you need to include a range of items that allow users to access the
required information quickly and easily. There are advantages and disadvantages to online and
paper media.
Media Advantages Disadvantages
conventional, most people are used to paper products hard to maintain
Paper easy and fast to prepare control of
inexpensive to produce different
requires readily available software versions
costly to update
Online • convenient Advantages • can be expensive
• easy to reach many people geographically dispersed • requires
• can be colorful and fun specialized software
• can link to other related documents
• easy to maintain version control
• not costly to update
Once you have determined the documentation requirements, you can develop a template that
meets those requirements and makes the job easier. A template is a file that contains a standard
layout, styles and fonts that are used in the production of the documentation. When you want to
create a file for user documentation, you open the standard template, usually in Word, and the
layout, fonts and styles are already set up in the document. All you need to do is start writing.
Everyone uses the same template, so there is a consistent look and feel to all of the user
documentation.
The template may be:
A Word template
An HTML template
An online help template.
19