Wireless CW NIHAN 21038437
Wireless CW NIHAN 21038437
Wireless CW NIHAN 21038437
Coursework Assignment
Coursework Coversheet
1. Print this coversheet and securely attach both pages to your assignment. You can help us ensure work is
marked more quickly by submitting at the specified location for your module. You are advised to keep a copy
of every assignment.
2. Coursework deadlines are strictly enforced by the University.
3. You should not leave the handing in of work until the last minute. Once an assignment has been submitted
it cannot be submitted again.
Academic Misconduct: Plagiarism and/or collusion constitute academic misconduct under the
University's Academic Regulations. Examples of academic misconduct in coursework: making available your
work to other students; presenting work produced in collaboration with other students as your own (unless an
explicit assessment requirement); submitting work, taken from sources that are not properly referenced, as
your own. See: http://www.londonmet.ac.uk/academic-misconduct/ By printing and submitting this
coversheet with your coursework you are confirming that the work is your own.
Group assignments only: please enter student ID numbers and names for all group members below:
Coursework Coversheet
Additional Comments
You are reminded that there exist regulations concerning plagiarism. Extracts from these
regulations are printed overleaf. Please sign below to say that you have read and understand
these extracts:
Mohame Farook
21038437
Mohamed Nihan
Date: 10-Jan-2022
Contents
1. Part - 1 ..................................................................................................................................... 7
1.1. Introduction .................................................................................................................... 7
1.2. City Map .......................................................................................................................... 8
1.3. Basic Mobile Network Architecture ............................................................................. 9
1.4 2G Cellular Network Solution for Kansas City ......................................................... 10
1.4.1. Base Transceiver Station (BTS) for Kansas City ............................................................ 10
1.4.2. Total Quantities of Base Transceiver Station ............................................................... 10
1.4.3 Required Equipment and Cost Estimation .................................................................... 12
2. Part 2 ......................................................................................................................................... 14
2.1 Background Information ................................................................................................... 14
2.1.1. Radio Studio.................................................................................................................. 14
2.1.2. Control Room ............................................................................................................... 14
2.1.3. Transmission Station .................................................................................................... 14
2.2. FM Transmitter Solid State Compact for Broadcast Radio AXON 500W .................. 15
2.2.1. Technical Characteristics .............................................................................................. 15
2.2.2. STL Transmitter & Receiver .......................................................................................... 15
2.2.3. STL Link Antennas Log 790-960 Mhz ............................................................................ 16
2.2.4. FM Transmit Antenna ................................................................................................... 17
2.2.5. Specification ................................................................................................................. 18
2.2.6. Attenuation of Coaxial Cable ........................................................................................ 19
2.3. Bill Of Quantity ................................................................................................................. 25
3. Part 3 ......................................................................................................................................... 28
3.1. Task 1.................................................................................................................................. 28
3.1.1. Floor Map and Site Survey............................................................................................ 28
3.1.2. Challenges you might face when the installation of the network and documentation
are happening......................................................................................................................... 31
3.1.3. The number of devices, types, purpose, and justifications (use CISCO devices). ........ 31
3.1.4. Protocols that you are going to use and justification .................................................. 35
3.2. Task 2.................................................................................................................................. 36
3.2.1. The solution architecture (roaming enables) with justifiable topology. ...................... 36
3.2.2. Wireless framework types used and why? Justify using speed, cost, compatibility, etc.
................................................................................................................................................ 37
3.3. Task 3.................................................................................................................................. 38
3.3.1. Explain 802.1x & Extensible Authentication Protocol (EAP) used in the wireless
client authentication process including LEAP, EAP-FAST, PEAP & EAP-TLS. .......................... 38
3.3.2. Explain WEP, WPA, WPA2, WPA3, and their differences. In WPA 2 you need to
explain WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) ............................... 40
4. Task 4 ..................................................................................................................................... 42
4.1. Scenario 1: Hotel Guest.................................................................................................... 42
4.2. Scenario 2: Hotel Staff ..................................................................................................... 42
4.3. Scenario 3: Hotel Admin .................................................................................................. 43
4.4. SSID Assignment............................................................................................................... 43
1. Part - 1
Consider a city of your choice that has a population of about 100,000 – 500,000. (Name
this city) Assume suitable demography for the city to estimate the would-be users of a
mobile communication facility. Applying typical norms, obtain the demand on such facility
in terms offered traffic load. Assume you have 5 MHz of spectrum in the GSM band. (900
MHz). Design a mobile communication system to cater to the city. You may base your
design on the 2G GSM technology. Specify the parameters you will take as the basis for
your system. These may include variables such as cluster size, cell sizes along with intended
co-channel reuse distances, acceptable signal-to-noise ratio, aimed grade of service, etc.
You should be able to come up with the number of base stations required in your system as
the absolute minimum. As an extension to the assignment, you may consider estimating the
cost of the implementation of your system. Among the costs to consider would be items
such as the license cost of spectrum hire, the equipment cost at base stations and the mobile
switching centers, the lease cost of the fixed network that connects base stations and the
mobile switching centers, etc.
1.1. Introduction
Kansas City is located in Missouri state in United State of America. This is a 38th largest
city in USA with 501,957 population. The city land area is 314mi2 and the density of the
population is 1,594 per mi2. Kansas is geographically a flat land area, there are no mountain
or any obstruction are not available in the city.
XYZ GSM is a cellular service provider, and the company decided to expand the cellular
services in Kansas City in upcoming days. Presently company willing to start with in 2G
cellular service in all area in Kansas City.
The Mobile switching center is located in middle of the Kansas City. Base station has
located as per the Radio frequency planner.
1.2. City Map
Mobile network architecture divided into 4 parts which is Mobile Station, Base Station
Subsystem, Network Switching Subsystem and External Network. Following components
are will be required each part.
4. External Network
4.1. Public Land Mobile Network (PLMN)
4.2. Integrated Services Digital Network (ISDN)
4.3. Public Switched Telephone Network (PSTN)
1.4 2G Cellular Network Solution for Kansas City
Clutter loss
Clutter type Mobile Unit №1 loss, dB Mobile Unit №2 loss, dB Clutter height, m
Open/rural: 0 0 0
Water: 0 0 0
Trees: 21.3 20.1 13
Suburban: 15.1 12.5 7
Urban: 18 21.6 15
Dense urban: 20 23.4 18
1.4.3 Required Equipment and Cost Estimation
02 Huawei Cabinet 12 12
13
2. Part 2
You are hired as a wireless networking consultant by a businessman who wants to start a
new radio station. You are supposed to give a detailed report to him about the costs and
equipment that are necessary for the station (wireless networking equipment). You are
supposed to find what are the unused (free) FM frequencies in Sri Lanka and what are the
major necessary equipment that is needed when starting a radio channel. In that report, you
need to explain why you are choosing the equipment, brand, cost and what are the
alternatives for that equipment. Finally, calculate the total basic cost when starting a radio
channel in Sri Lanka. You should include pictures, tables, diagrams, and links that you are
used for the reference
The goal of our project was to design a low cost and user-friendly FM radio receiver.
When we are planning to design a radio station there will be three main categories
• Studio Room
• Control Center
• Transmitter
2.1.1. Radio Studio
This is the place where will be having a table with Microphones, Headphones, Audio
mixers Audio Processors and Control PCs etc… Studio room will be designed with sound
lock system and trying to prevent the unnecessary sound coming from Outside.
2.1.2. Control Room
Control room will be the place which is the signal receive from studio room and it will be
connect with other resources such as PSTN connection, Satellite Connection and it will be
send the data to Transmission Station.
2.1.3. Transmission Station
Transmitter is generating a gain to the received data from control room and it will transmit
it to the listeners. Normally Transmitter is located in outside city boundaries. Transmitters
have different types of capacities like 1KW, 100KW, 250KW. Transmitter locations are
decided based on their capacity. If transmitter is located near the control room we can use
the cable connection (audio cable with 0 loss up to 100m) to the transmitter unit to the audio
processor. If it is located in away from the CR STL transmitters will be use for
communication.
Our project uses a FM receiver integrated circuit to perform the pre-processing units that
are needed before the desired audio signals can be heard. The radio frequency is too fast
for processing with our available hardware. FM (frequency modulated) radio signals are
broadcast on a carrier frequency within the Frequency range: 87.5-108 MHz, 10 KHz/Step.
We are using frequency 106.3 Each station is provided 0.2MHz to broadcast their signal
(in Sri Lanka), however, a maximum of .15MHz is typically used to prevent interference
14
with adjacent channels. The incoming signal needs to first be demodulated, which involves
multiple stages including the Low-Noise Amplifier, Frequency mixer, and other hardware-
level FM signal processing units. We use 500W FM Transmitter FM Radio Receiver to
perform these preprocessing stages for us. It is worth mentioning at this point that we at
times refer to the 500W FM Transmitter receiver from AXON.
The Studio Transmission Link will be transmitted studio audio from studio room to the
transmitter station this is accomplished through the wireless transmission. Can be use
high gain FM antennas to this communication. We will be STL Link antennas with high
gain.
15
2.2.3. STL Link Antennas Log 790-960 Mhz
Features of antenna
PARAMETER VALUE
Frequency 790÷960MHz
Impedance 50 Ohm
VSWR <1,4
Gain 10dBi
Polarization V or H
Rf Power 30W
Connector NF
Material Aluminium
Number of elements 9
Length 630 mm
Width 190 mm
Weight 0,8 Kg
16
2.2.4. FM Transmit Antenna
Once FM transmitter receive the signal from audio processor it will send the signal to
transmitting antenna which is located in tower to transmit data without any obstacles.
This tower will be located in a height to maintain a fair transmission from the transmitter
it will be connected using Coaxial cable then depend on the site can be select which type
of antenna will be suitable for transmission.
A transducer is a device that converts one physical quantity into another. The antenna is a
transducer, and the conversion takes place between an "electric current" and an
"electromagnetic field". There are two types of antennas: a Transmitter Antenna and a
Receiver Antenna. The transmitting antenna converts the electric current generated by the
transmitter into an electromagnetic field that is radiated. The receiving antenna converts
the received magnetic field into an electric current. The receiver uses this electric current
to extract the information it contains.
• Directional Antennas
• Omni Directional Antennas
• Polarized Antennas
For this project we will be use Stainless Steel 8 Dipoles, FM Antenna System with
15kW, Max power and will be use
17
2.2.5. Specification
Omnidirectional,
Vertical polarization
16 7/16 dipoles,
1 x 158-7/16 splitter,
Maximum power 15 kW
Gain= 11dBd
ERP = Transmitter power in Watt x 10^((Gain of the antenna system in dBb - loses
of the cable) / 10)
18
2.2.6. Attenuation of Coaxial Cable
19
Following table will be indicate the relation between ERP and distance in rural areas
Following values are showing the approximate distance covering with the antenna heights
20
In the proposed system we will be using following equipment
= 40735 W
As per the above table 241 km can be cover with 10000W ERP and the 4 times of
multiplexing ERP can be double the distance of coverage. So theoretically it can be
transmitted data up to 482 km radius of distance. But it will be limited the distance of
installation height of the antenna as well as we proposed 100m Hight of antenna will be
cover only 36 km radius of distance only.
STL-TR3-10-A
The RF signal is also free of spurious and harmonic components to a degree greater than
that required by CCIR, Europe, USA. UE And most other national standards.
Maximum attention has been put into producing a modulated signal of High-Fidelity
quality, with high noise signal ratio and very low distortion
21
STL Transmitter Technical Features
PARAMETER VALUE
Frequency Range 820~960 MHz -20MHz sub-band
Type of Modulation FM Class F3
VCO Tuning 25 MHz
Frequency Stability +/- 2,5ppm (Bettr 0n request)
Synthesizer Step 25KHz
Power Output 10 Watts
Spurious Emission < -80 dB or better
Harmonic Emission < -65 dB (-80 dB on request)
Stereo Separation > 55 dB @ 1 KHz
Distorsion < 0.2% (TYP 00.8 %) @ 1KHz)
Base Band 30 Hz - 60 KHz within 0.15 dB
Unweighted S/N Ratio > 74 dB rms at 30 Hz ~ 20 KHz
Enphasis 50 or 75 us selectable
RF Connectors N-F 50 ohm
Input Base Band Imp. 2 Kohm
Input Mono Impedence 600 Ohm
Cooling Forced air
OP. Temperature Range 0 ÷ +45°C
Maximum Umidity 90%
AC Supply 100 ÷ 240 Volt; 47 ÷ 63 Hz
Dimension 1 Units Rack 19― 44 cm Depth
Weight 6.5 Kg
22
STL Receiver Technical Features
PARAMETER VALUE
Frequency Ranges 170~490 MHz - 20MHz sub-band
Type of Modulation FM Class F3
VCO Tuning 25 MHz
Frequency Stability ± 2.5 ppm (Better on request)
Synthesizer Step 25KHz
Image Rejection 60dB Typ.
RN Noise Figure 6dB or lower
Stereo Separation > 45 dB @ 1 KHx
Distorsion < 0.5% (TYP 0.2 % @ 1KHz)
Base Band 30 Hz - 60 KHz within 0.08 dB
S/N Ratio > 72 dB with 0.2 mV input (Typ 78 dB)
Deenphasis 50 or 75 μS int. selectable
RF Connectors N-F 50 ohm
B. Band-IF Conn. BNC-F
Base-Band Imp. < 30 ohm
Cooling Forced air
P. Temp. Range 0 ÷ +45°C
Maximum Umidity 90%
AC Supply 100 ÷ 240 Volt; 47 ÷ 63 Hz
Dimension 1 Units Rack 19” 44 cm Depth
Weight 5.8 Kg
23
Audioart Console Mixer
24
2.3. Bill Of Quantity
Sl
Description Model No. Make Qty USD
No. Units
Transmitter
FM Transmitter Solid
1 State Compact for AXON 500W TEKO 1 Nos
399.94 399.94
Broadcast Radio
Receiver
STL Link Receiver &
STL-TR3-10-
2 Transceiver Band 820- TEKO 1 Nos
A 2,098.00 2,098.00
960 MHz
Antenna
STL Link
STL Link Antennas
3 Antennas Log TEKO 1 Nos
Log 790-960 Mhz 1,689.00 1,689.00
790-960 Mhz
Antenna Mounting
4 Hardware Local 1 Nos
brecket 80.00 80.00
Audio Processor
WHEATSTONE
AUDIOARTS 08
AUDIOARTS
5 8 CHANNEL TEKO 1 Nos
08 1,582.00 1,582.00
ANALOG RADIO
MIXER
Mixing Console
D&R Air lite USB 8-
Channel Triple Input
6 D&R Airlite TEKO 1 Nos
Console 1,750.00 1,750.00
3xMic/4xUSB/VOIP
Back end device
Bose Design Max
7 DM3SE Bose 1 Nos
DM3SE black 153.00 153.00
Cue/Preview Speaker
(Black) Portable
8 XB21 Bose 1 Nos
Wireless Bluetooth 95.00 95.00
Speaker
Headphones AKG K52
9 Closed-back K52 Sony 1 Nos
75.00 75.00
Headphones
Microphone Audio-
10 Technical AT2020 Pop AT2020 Shure 2 Nos
102.00 204.00
killer Set
Phone Talkback
System
11 Monitor 21" Samsung 1 Nos
89.00 89.00
25
Computer with
12 PC HP 1 Nos
Windows LIC 1,254.00 1,254.00
Dell PowerEdge
13 Server with Windows DL380 Server HP 1 Nos
1,439.00 1,439.00
LIC
Cables
14 Multipair Audio Cable 6-8 core Norden 1 Nos
195.00 195.00
cocxial
15 cocxial Cables 1 Nos
copper Norden 175.00 175.00
Network Switch
Cisco
16 Network Switch HP 1 Nos
Catalyst 1000 936.00 936.00
CD Players,
CD Players, DAT
Machines, Mini Disk
17 CD Players Bose 1 Nos
Players, and Turn 257.00 257.00
Tables all in one
Service
Frequency approved
18 Service Service 1 Nos LS
charge-sri lanka
19 documentation Local Local LS Nos
175.00 175.00
Installation, Testing
& Commissioning &
Configuration
20 Installation, Local Local LS LS
1,950.00 1,950.00
Total Amount in
USD 14,595.94
26
27
3. Part 3
As a network engineer, you are hired to give a wireless solution for a building that is going
to open soon. This building has 4 floors. As the network engineer, you need to concern
about the following,
➢ All the floors must be covered with Wi-Fi and speed should be almost the same
everywhere.
➢ Security and role-based logins must be made, and the network should be restricted to
certain user categories.
➢ Newer technologies must use.
➢ All the devices and protocols that you are going to use should be documented.
3.1. Task 1
As the network engineer task one of your roles is to perform a site survey. In the site survey,
you can use suitable models, techniques & software as your preference and mainly you
need to describe the following. Assumptions should be documented.
1. Challenges you might face when the installation of the network and documentation are
happening.
2. The number of devices, types, purpose, and justifications (use CISCO devices).
3. Protocols that you are going to use and justification.
4. Building structure and distance (you can decide).
5. The total area needs to be cover & the Wi-Fi coverage area by your solution.
28
1st Floor Wi-Fi Coverage Area
29
3rd Floor Wi-Fi Coverage Area
30
3.1.2. Challenges you might face when the installation of the network and
documentation are happening.
1. Finding the Building wall types such us Brick wall, Shaft, Glass wall, Partition wall and Lift
area.
2. Define the number of users based on the location.
3. Calculate the bandwith depents on the crowd.
4. Choosing the model of Access point based on the locaiton and desity. Example indoor type
or external type.
5. Finding the deadspot based on the floor map
6. High availablity Challenge for single point of failure for priority areas.
3.1.3. The number of devices, types, purpose, and justifications (use CISCO devices).
31
Dvices Description Qty Puporse
Cisco AP1850i 37 Indoor small rooms and small crowd area
Cisco AP2802i 5 Indoor meadim room and avarage crowd area
Cisco AP3802i 2 Indoor Large area coverage and high crowd area
Cisco AP1562E 5 External Area weatherproof type
Cisco 9300 Switch 24 Port 5 Edge switch
Cisco 9500 Switch Core 2 Core switch
Cisco 9800-L-C WLC 1 Wireless LAN Controller
Cisco ISE 1 RADIUS server
Cisco 5508 ASA Firewall 1 Security
3.1.3.1. Datasheet
https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1850-series-access-
points/datasheet-c78-734256.html
https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-2800-series-access-
points/datasheet-c78-736497.html
32
https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-3800-series-access-
points/datasheet-c78-741682.html
https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1560-series/datasheet-
c78-737416.html
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9300-series-switches/nb-
06-cat9300-ser-data-sheet-cte-en.html
33
06. CISCO 9500 SWITCH
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9500-series-switches/nb-
06-cat9500-ser-data-sheet-cte-en.html
https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9800-series-wireless-
controllers/datasheet-c78-742434.html
https://www.cisco.com/c/en/us/products/collateral/security/identity-services-
engine/data_sheet_c78-656174.html
34
09. CISCO ASA5508 FIREWALL
https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/datasheet-
c78-742475.html
3.1.4.1. 802.11n
• Working as very fast.
• 802.11n is MIMO support protocol. At the same timie working as send and receive in a
one data stream.
• Support two channels simultaniously. 802.11n working with 20MHz to 40MHz
• Support latest security fetures such us WPA2.
3.1.4.2. 802.11ac
• Absalute speed. It’s supporting more than 7Gbps.
• Long range data transmission
• Support beam-forming function, it will get better wireless throughput result.
• MU-MIMO suport.
• More channel bonding
3.1.4.3. 802.1x
• Setting up a authentication policy using 802.1X, RADIUS, and the RADIUS proxy
• 802.1x supports several authentication methods like Username & password, token card,
one time password (OTP) etc.
• 802.1x supports several type of end devices lik Laptop, PDA, Surveilance camera etc.
35
3.2. Task 2
Task two of your work is to provide a solution to cover the area that you have surveyed in
Task 1.
Roaming is very important in WLAN for mobility. Because when move the end-device one
BSS into another BSS the connection should be continue without dropping any packet of
data. To keep alive the end user APs will be installed within 15% of overlapping signals
coverages and will be configure non overlapping channels with neighbor Aps.
36
3.2.2. Wireless framework types used and why? Justify using speed, cost,
compatibility, etc.
The Standard IEEE 802.11n is referred as WiFi 4. This WiFi Standard is successor to IEEE 802.11g
(i.e., WiFi 3). This is the wifi standard in which MIMO has been introduced. Beamforming has been
introduced but interoperability have not been tested. It supports legacy fallbacks to previous wifi
versions viz. wifi-1, wifi-2 and wifi-3. It supports 20 MHz and 40 MHz bandwidths. Due to use of
MIMO and higher BW (i.e., 40 MHz) data rates up to 150Mbps can be achieved. WiFi-4 devices
can support range of about 70 meters in indoor and about 250 meters in outdoor environments.
MIMO configurations supported by WiFi-4 devices include 2T3R and 4T4R. Modulation schemes
such as BPSK, QPSK, 16QAM and 64QAM are used.
The Standard IEEE 802.11ac is referred as WiFi 5. This WiFi standard is successor to IEEE 802.11n
(i.e. WiFi 4). This is the first wifi standard in which beamforming has been added to the MIMO and
multi-user MIMO feature are also introduced. WiFi-5 supports higher throughput due to addition
of higher bandwidths ( upto 160 MHz ), multi-user MIMO, higher number of spatial streams ( upto
8) and higher number of modulation schemes (256 QAM). It operates on 5 GHz and supports
legacy multi-carrier (OFDM) and single carrier (DSSS, CCK) modulation schemes and baseband
modulation types (BPSK, QPSK, 16QAM, 64 QAM, 256QAM) Various channel Bandwidths are
supported which include 20 MHz, 40 MHz, 80 MHz and 160 MHz. WiFi-5 supports maximum data
rate of 6.93 Gbps ( using 160MHz bandwidth, 8 spatial streams, MCS9, 256QAM, with short guard
interval) and coverage range of approx. 80 m with 3 antennas (about 10 meters more than wifi-
4). MIMO configuration up to 4 x 4 can be employed. It supports single user transmission as well
as multi-user transmissions.
37
Security
You need to choose the best security technology available according to your justification.
The organization will give you a Wireless Lan Controller (WLC) and a RADIUS server.
Therefore, using those devices are required when you go for the security solution.
3.3. Task 3
3.3.1. Explain 802.1x & Extensible Authentication Protocol (EAP) used in the wireless
client authentication process including LEAP, EAP-FAST, PEAP & EAP-TLS.
The picture showing an end user device trying to connect the LAN through the WLAN.
The WLAN is an IEEE 802.1x Port-Based Network Access Control (PNAC) authentication
mechanism. The end user has to provide the USERNAME and PASSWORD to access the
Network. RADIUS server will be provided network access based on the credential.
• The authenticator (the server) sends a Request to authenticate the peer (the client).
• The peer sends a Response packet in reply to a valid Request.
• The authenticator sends an additional Request packet, and the peer replies with a
Response. The sequence of Requests and Responses continues as long as
needed. EAP is a ‘lock step’ protocol, so that other than the initial Request, a new
Request cannot be sent prior to receiving a valid Response.
• The conversation continues until the authenticator cannot authenticate the peer
(unacceptable Responses to one or more Requests), in which case the
authenticator implementation MUST transmit an EAP Failure (Code 4).
Alternatively, the authentication conversation can continue until the authenticator
determines that successful authentication has occurred, in which case the
authenticator MUST transmit an EAP Success (Code 3).
38
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version
of EAP, the authentication protocol used in wireless networks and Point-to-Point
connections. LEAP is designed to provide more secure authentication for 802.11 WLANs
(wireless local area networks) that support 802.1X port access control
39
3.3.2. Explain WEP, WPA, WPA2, WPA3, and their differences. In WPA 2 you need
to explain WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES)
The first wireless security protocol which is approved in 1999. WEP is used the Physical
and Data Link layers which is the 2 lowest levels of the OSI model. It was expected to
provide the same security level for wireless system as wired network. At that time wireless
devices were limited to 64-bit encryption. Even though it was breaking the rules and
increased it 128-bit and it uses Rivest Cipher 4 (RC4) encryption method. But it was not
helpful to keep end-to-end security, WEP keys were easy to crack and it was highly
vulnerable protocol that cannot be bear it is responsibilities which is expected.
In 2003 Wi-Fi Alliance was intruded WPA protocol as an alternative solution for weak
WEP protocol. 256-bit encryption and it uses Temporal Key Integrity Protocol (TKIP) and
RC4 as encryption methods in WPA. In WPA they have introduced 2 modes as WPA
Personal & WPA Enterprise. WPA personal standard is a common method to secure the
wireless network and it is suitable for home networks. In WPA enterprise mode it is using
deferent encryption method and it is most suitable for business environments which they
have to use more security and it required the deployment of RADIUS server as well.
3.3.2.3. WPA2
In 2004 there was a significant improvement in WPA security protocol and it is introduced
the Advanced Encryption System (AES) which provides higher security and performance
in the System. It was using CCMP and AES encryption methods. But still there are some
vulnerabilities which is matters in enterprise networks.
TKIP and AES are two different types of encryptions that can be used by a Wi-Fi network.
TKIP is an older encryption protocol introduced with WPA to replace the very-insecure
WEP encryption at the time and AES is a more secure encryption protocol introduced with
WPA2.
• WPA2-PSK (TKIP): This uses the modern WPA2 standard with older TKIP
encryption. This isn’t secure, and is only a good idea if you have older devices
that can’t connect to a WPA2-PSK (AES) network.
• WPA2-PSK (AES): This is the most secure option. It uses WPA2, the latest Wi-Fi
encryption standard, and the latest AES encryption protocol. On some devices, just
40
see the option “WPA2” or “WPA2-PSK.” If it is only that option available mean it
will probably just use AES encryption
3.3.2.4. WPA3
In 2018 WPA3 has introduced with significant upgrades to WPA2 as well in WPA3 it uses
AES encryption algorithm and it replaces Pre-Shared Key (PSK) with WPA3 (Wi-Fi
Protected Access 3) represents the latest generation in mainstream security for wireless
networks. It improves the level of security compared to the widely popular WPA2 standard
(released in 2004), yet maintains backward compatibility.
41
4. Task 4
Suggest a wireless security model for the above scenario and justify your suggestions. You
can use diagrams & datasheets.
The HAMDAN HOTEL wireless network will be provided two types of SSID
1. For Guest User : HAMDAN GUEST
2. For Hotel Staff and Admin : HAMDAN HOTEL
The following scenario will be elaborate the function of the security model:
Hotel guest users will be access with open network assigned the SSID as HAMDAN
GUEST. The guest no need to type any password. They can access only internet through
assigned VLAN 10 for Guest.
Hotel Staff users will be access with secured network assigned the SSID as HAMDAN
HOTEL. The hotel staff will be entering their USERNAME & PASSWORD assigned in
the CISCO ISE RADIUS Server once they are connected to the WLAN. They can access
internal allocated network and server through assign VLAN 20 for staff.
42
4.3. Scenario 3: Hotel Admin
Hotel Admin users will be access with secured network assigned the SSID as HAMDAN
HOTEL. The hotel admin will be entering their USERNAME & PASSWORD assigned
in the CISCO ISE RADIUS Server. They can access entire network without any limit
through assign VLAN 100 for Admin.
Based on the VLAN configuration the RADIUS server will be given the network access
for the end users.
• If they are guest : internet access only (VLAN 10)
• If they are staff : Specified Internal Servers, printers & shared folder access
& Internet Access(VLAN 50)
• If they are admin : Access all the entire network. (VLAN 100)
43
Reference
https://doubleoctopus.com/security-wiki/protocol/extensible-authentication-
protocol/
https://www.securew2.com/solutions/802-1x
https://www.tekobroadcast.com/
https://www.minim.com/blog/wifi-4-vs-wifi-5-vs-wifi-6
https://community.fs.com/blog/wep-vs-wpa-vs-wpa2-vs-wpa3.html
https://shop.tekobroadcast.com/fm-broadcast-transmitters/medium-power
https://www.agilebroadcast.com.au/product/audioarts-08-audio-console/
https://www.cisco.com
https://www.britannica.com/technology/TCP-IP
44