Chap1 & Chap2 HNS L 4 Build A Small Wireless LAN
Chap1 & Chap2 HNS L 4 Build A Small Wireless LAN
Chap1 & Chap2 HNS L 4 Build A Small Wireless LAN
COLLEGE
HARDWARE AND NETWORKING SERVICE LEVEL – IV
Unit of Competence: : Build a small wireless LAN
Unit one: Confirm client and equipment requirements
Network layer Introduction of private IP addresses requires a new addressing plan. Certain LANs must
also be segmented. Routing must be redesigned to support the new addressing plan and to
provide greater reliability and redundancy.
Data link layer The central office backbone and some branch offices require redundant equipment and
redundant links are needed. The organization also requires a campus wireless radio
frequency (RF) site survey to determine mobility deployment options and equipment scope.
Personnel Two engineers with college degrees and Cisco Certified Network Associate ( Plans to hire additional engineers for network
CCNA) certifications for network maintenance; one has Cisco Certified Network maintenance; need technical development plan for
Professional (CCNP) certification staff
Three engineers for various operating systems and applications maintenance
Policy Prefers a single vendor and standardized protocols Current equipment is Cisco; prefers to stay with
Cisco
Schedule Plans to introduce various new applications in the next nine months New applications that will be introduced shortly are
videoconferencing, groupware, and IP telephony
Technical Goals
Technical Goals
• The technical goals of the project must also be determined before the design starts.
• Some sample questions the designer might ask to help determine technical goals include
the following:
What infrastructure issues exist or will exist related to your applications rollouts?
What skill sets does your technical staff need to acquire?
Does your current network have any performance issues?
Which portions of your network are considered mission-critical?
• The following list describes some common technical goals:
Improve network performance: An increase in the number of users and the introduction of
new applications might degrade network performance, especially responsiveness and
throughput.
Decrease expected downtime and related expenses: When a network failure occurs,
downtime must be minimal, and the network must respond quickly to minimize related
costs.
Modernize outdated technologies: The emergence of new network technologies and
applications demands regular updates to and replacement of outdated equipment and
technologies.
Improve scalability of the network: Networks must be designed to provide for upgrades
and future growth.
Simplify network management: Simplify network management functions so that they are
easy to use and easily understood.
• Depicts the desired technical goals that were gathered for the sample
company
Technical Goals Importance Comments
Performance 2O Important in the central site, less important in branch offices
Security 15 The critical data transactions must be secure
Availability 25 Should be 99.9%
Adaptability (to new 1O
technologies)
Scalability 25 The network must be scalable
Good network design addresses constraints by identifying possible trade-offs, such
as the following:
Existing equipment: The network design process is usually progressive; legacy equipment
must coexist with new equipment.
Bandwidth availability: Insufficient bandwidth in parts of the network where the bandwidth
cannot be increased because of technical constraints must be resolved by other means.
Application compatibility: If the new network is not being introduced at the same time as
new applications, the design must provide compatibility with old applications.
Lack of qualified personnel: Lack of qualified personnel suggests that the designer must
consider the need for additional training; otherwise, certain features might have to be dropped.
Technical Constraints for
Technical Constraints Gathered Data (Current Comments
Situation)
Existing equipment Coaxial cable The cabling must be replaced with twisted pair to the
desktop, and fiber optics for uplinks and in the core
Bandwidth availability 64-kbps WAN link Upgrade bandwidth; change to another service provider
because the current one does not have any other links to
offer
Wireless Devices: Various wireless devices, such as smartphones, tablets, and laptops,
have built-in batteries that power their wireless capabilities. These devices need to be
periodically recharged to maintain their wireless functionality.
Unit Two: Install and configure wireless access point
2.1. Selecting access point device
What is a wireless access point?
A wireless access point is a device used to create a WLAN. Businesses in large offices or
buildings often use wireless access points. This device is connected to an internet hub, wired
router, or switch using an Ethernet cable. Then project the Wi-Fi signal to the designated
area. It is best to understand your business needs before you make a choice. Consider some
of the above, or ask an expert for recommendations.
Router-switch–your professional IT provider.
Things to Consider
When choosing a wireless access point, keep the following points in mind.
Range
The range that an AP can cover is an important parameter, and a WAP with a
larger coverage area is more beneficial.
Speed
The rate at which information travels is also something we need to consider, usually measured
in bps (bits per second), kilobits, megabits, or gigabits. In general, if the exact 802.11n
protocol is supported, wireless AP speeds can reach 300Mbps or higher, six times faster than
802.11n. The WAP that supports the 802.11ac protocol can reach 1200Mbps.
Gain Antenna
The antenna of the wireless AP is basically built-in, it is not external like the antenna of the
router. The antenna of the wireless AP is very important, it will directly affect the signal
strength and transmission range of the wireless AP. When buying a wireless AP, it is best to
choose one with a booster antenna.
Guest Access
When people use their phones and computers over the Internet, security issues are not
expected. Modern systems have intelligent guest access systems that apply corporate security
policies.
No Hardware Controllers
• In the past, access points also required IT technicians with specialized knowledge to operate
from a computer. However, with the advancement of technology, these are no longer
necessary. The latest Wi-Fi 6 access points, for example, use software control in the network
and do not require an external controller. Software-based control has many benefits over
previous hardware-dependent access points.
Wi-Fi Technology
Choose devices using MESH, MIMO and POE access point technologies based on your
business needs. MESH technology can be used in home and commercial equipment. POE
technology adopts low-power cabling technology and can transmit signals up to 100M.
Price
It is not that the higher the price, the better the AP. Sometimes the high price will not only
increase the cost, but also cause waste of product function and performance. Too low a price
can tempt people to buy inferior or counterfeit products.
Installing and configure access points
Wireless devices (also known as access points) provide a secure, affordable, and easy-to-use
wireless LAN solution that combines mobility and flexibility with the enterprise-class
features required by networking professionals.
When configured as an access point, the wireless device serves as the connection point
between wireless and wired networks or as the center point of a stand-alone wireless
network. In large installations, wireless users within radio range of an access point can roam
throughout a facility while maintaining seamless, uninterrupted access to the network.
Here we are providing an example of how to configure a wireless access point (a DLink
access point, in this case). Please take the following technics:
1. Change the default admin password.
2. Change the default SSID to something of your choosing.
3. Enable encryption.
4. Disable the DHCP Server function, if your access point has this feature
5. Register the hardware (MAC) address of your wireless card.
The Wireless Access Point (WAP) is a networking devices that enables the capability for
wireless-capable devices to connect to a wired network. Introducing a WAP to your existing
wired network is instrumental to accommodating those devices only capable of wireless
connection
• Wireless Access Point
• Wireless devices (also known as access points) provide a secure, affordable, and easy-to-use
wireless LAN solution that combines mobility and flexibility with the enterprise-class features
required by networking professionals. When configured as an access point, the wireless device
serves as the connection point between wireless and wired networks or as the center point of a
stand-alone wireless network.
Configure Services
The Configure Services method is a place where you can register your dependent classes
with the built-in IoC container. After registering dependent class, it can be used anywhere in
the application. You just need to include it in the parameter of the constructor of a class
where you want to use it. The IoC container will inject it automatically.
ASP.NET Core refers dependent class as a Service. So, whenever you read "Service" then
understand it as a class, which is going to be used in some other class.
What are Managed LAN Services?
• Managed LAN Services (MLS) is a term used to describe a service provided by a third
party service provider to manage a company’s local area network (LAN). This type of
service provides remote monitoring and maintenance of the company’s network
infrastructure.
• This type of service allows companies to reduce their IT costs and increase productivity. The
main advantage of MLS over other solutions is its ability to provide 24/7 support and
proactive monitoring. It also offers an easy way to access your network remotely.
A Local Area Network (LAN) is a high-speed communication system. It allows users
to share information and connect to other computers and peripherals. A LAN is usually
connected to a server via a router. Some types of LANs are wireless while others are wired.
Your company may already have an existing LAN, or you might need to create one. You will
need to buy equipment such as switches, routers, and hubs. Depending on the size and type
of your network, you might also need to purchase servers, printers, fax machines, and
modems.
If you want to use a managed LAN service, you should contact a local IT service provider
who specializes in these kinds of services.
Benefits of Using Managed LAN Services?
Security: A managed LAN services provider can secure your network by
installing firewalls, intrusion detection/prevention systems, and other security
products.
Network Monitoring: A managed LAN services company can monitor your
network 24 hours a day, seven days a week. It can alert you when there are
problems with your network.
Improved Network Performance: managed LAN service providers usually offer faster
speeds than you could get from a public Internet access point. You won’t have to wait as long
to download large files.
Cost Savings: Managed LAN service providers offer lower rates than you would pay for
similar services.
Reliability: Most managed LAN service providers guarantee 99% uptime. If they fail to
deliver this level of reliability, they will reimburse you for the downtime.
24-Hour Availability: Most managed LAN service providers offer 24-hour availability. If an
issue arises, they will resolve it immediately.
Testing access point for connection and security
When planning the testing of a WLAN, consider the following forms of testing:
Signal coverage testing: Signal coverage testing determines where client devices are able to
satisfy coverage requirements. This testing may be part of performing a WLAN site survey or
done after the network is installed to determine the as-installed signal coverage
Performance testing: Performance testing determines whether the WLAN can satisfy user
needs for using specific applications over the WLAN.
In-motion testing: In-motion testing determines whether users can continue to make use of
applications while roaming throughout the coverage areas, especially when the roaming
requires handoffs between access points.
Security vulnerability testing: Security vulnerability testing ensures that the WLAN
implements required security mechanisms and offers sufficient protection to unauthorized
access and passive monitoring.
Acceptance/verification testing: After installing a WLAN, it is important to run a series of
acceptance/verification tests to ensure that the WLAN satisfies all requirements. This is
especially important if the organization is having a contractor install the WLAN.
Simulation testing: In some cases, such as when implementing a very large WLAN, it may
be beneficial to simulate the behavior of the WLAN before actually installing it. This can
provide helpful feedback when designing the system, especially if the WLAN will have
critical performance requirements.
Prototype testing: Prototype testing involves implementing an individual function of the
WLAN that is not well understood before deploying the complete system. For example, an
organization may not be very familiar with 802.1X authentication systems and may benefit by
implementing the 802.1X authentication in a lab environment with a limited number of test
client devices.
Pilot testing: Before installing the WLAN across the entire organization, which may include
numerous buildings and different applications, it is strongly advisable to install the system in
a limited number of facilities (ideally one) and make that one work effectively first. After you
work out all the problems, you can install the WLAN at the remaining location without the
need for extensive rework because the problems will likely have been solved during the pilot
testing.
Upgrading legacy equipment
The infinilink team designed and implemented an integrated management system that
provides visibility and control over the entire network infrastructure, reducing complexity
and fragmentation of the ICT system.
Upgrading the ICT system:
The modernization of the system required the replacement of multiple hardware
and software elements, the integration of old equipment and the implementation
of new systems and applications. Very important was that the entire process was
carried out without interrupting ongoing operations, with minimal downtime.
Outcome: reduce downtime, improve data management and increase
productivity.
Implementation of new work processes and communications:
Together with the client, we developed new processes that are compatible with
the existing system and easy to adopt by the client’s staff. The infinilink team
worked closely with client staff to ensure that the new processes optimized
efficiency and productivity of operations.
Outcome: increase productivity, reduce errors and improve communication on
operations between staff members.
Training users on the new ICT system:
The successful implementation of the new ICT system depended on the ability
of the client’s staff to use it. The infinilink team provided the client’s employees
with comprehensive training on the features and functionality of the new
system, as well as on-site support to ensure staff could use the system
confidently and effectively.
Outcome: increase staff confidence, reduce errors and increase productivity.
Consultancy to executive management on ICT system optimizations:
Team has identified ICT areas affecting the client’s business processes that need
optimization. We provide concrete recommendations to the executive
management of the client company, leading to continuous improvement of
system performance and efficiency.
Outcome: improve system performance, increase efficiency and reduce costs.
Full ICT system responsibility for continuous support of business and
production processes:
To support business and production processes, we ensure that the system is
always working optimally. We monitor system performance and take proactive
measures to prevent outages and ensure continuity of operations
Outcome: reducing downtime, improving system performance and increasing
productivity, with a positive effect on the quality of the client company’s
products.
The end of chapter 1 and 2
•