The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by MOHAMAD LUQMAN HAKIM MOHD ZAINUDIN, 2020-11-16 03:21:10

Design wlan

Design wlan

ASSIGNMENT
20%

JULY 2020

TITLE: Implementation of secured WLAN in GMI: A case
study

SUBJECT CODE : COS 0642
SUBJECT NAME : Wireless Network & Security
ACADEMIC PERIOD : July 2020
SEMESTER : NWS SEM4
TTO NAME : Mahidir Ayup

PREPARED BY: : Mohamad Luqman Hakim Bin
NAME Mohd Zainudin
: NWS19010059
ID
TRADE :Sem 4 Network Security
SUBMISSION DATE
:

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

Table of Contents

1. Introduction....................................................................................................................................................... 3
2. Body of Content................................................................................................................................................ 4
5. Conclusion ....................................................................................................................................................... 7
6. Reference......................................................................................................................................................... 8

Page 2 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

1. Introduction

Wi-Fi is a technology that uses radio waves to transfer information from one electronic device
to the other. It’s what makes it possible for your computer to access the internet –without
cables, which is the best fact of them all to us.

A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area such
as a home, school, computer laboratory, campus, or office building. This gives users the
ability to move around within the area and remain connected to the network. Through
a gateway, a WLAN can also provide a connection to the wider Internet.

To design a WLAN network I need to Review and analysis GMI security policy, and then
interview end user about requested option device supported, followed by network placement,
next is mobility of the WLAN access if it was required by the end user and many more. For
securing WLAN I should set and Enforce WLAN policies that will vary based on individual
security and management requirements of each WLAN. Besides, use a stronger encryption
for a standard protection, followed by checking for rogue Wi-Fi access points means by
access points brought by employees, then provide a separate network for guest so they can
getting access to company internal work.

Page 3 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

2. Body of Content
The first step in a wireless LAN (WLAN) deployment is to ensure that desired operation

begins with a site survey to assess the Radio Frequency (RF) behaviour in a specific
environment. Many issues can arise in a wireless network due to poor planning and
coverage.

There are three types of surveys: Passive, Active, and Predictive. Passive surveys are
surveys that are performed with a listen-only mode, Active surveys are performed with the
survey client associated to the APs used throughout the survey, and Predictive surveys are
performed with a software program

Next is prepare for the Survey Identify Primary Requirements such as Type of facility.
Identify Customer Facility Requirements such as Campus indoor or outdoor and obtain digital
floor plans from customer. Identify Requirements for Type of Client Devices such as
Maximum transmit (Tx) power.

Next is Plan for the Survey, First is Initial Walkthrough as an example is what Access
building type is used, second is Select Proper Survey Model such as Data, Voice, Location.
Third is Determine Proper Deployment Characteristics such as Highly mobile like Many cells
had high-reliability and fast-moving clients versus nomadic or temporary position, Forth is
Specify the tools to complete the survey an example is Professional survey tool such as
Airmagnet Survey or Ekahau Site Survey. Fifth is Define Client Devices to be deployed such
as Maximum Transmitter (Tx) Power level, Receiver Sensitivity and Antenna. Sixth is
Determine Physical requirements as an example Outdoor grounding and lightning protection.

The Second step is Design architecture and antenna selection, WLANs are described
by three broad categories of architectures: autonomous, centralized or called controller-
based, and cooperative or called controller-less. In an autonomous architecture, access
points (APs) are stand-alone. APs that contain all the necessary features and capabilities to
operate without any reliance on another device. The second type of architecture is
autonomous which it relies on a centralized controller to regulate the operation of the WLAN.

The third type of architecture is Controller-less, or called cooperative is an architecture
that is based on the use of virtual management or in cloud-based systems that utilize a
minimum of wired APs and relies on a cooperative communication method between APs to

Page 4 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

manage and control a WLAN. For GMI I would recommend use cooperative architecture
which will be implementing using mesh topology will be resulting in a very robust network,
and one that is very well suited to the rigors and requirements of distributed control systems
(DCS)

The Third step is antenna selection there are a wide variety of access points for
internal and external Wi-Fi use as well as for wireless backhaul applications, as known as
point-to-point (PTP) or point-to-multipoint (PTMP). There is two types APs internal antennas
and APs with external antennas. APs with internal antennas is An indoor ceiling mount AP
with internal antennas is generally designed to be mounted on a ceiling, with most of the
antenna energy projected outwards or called horizontally and downwards or called vertically.
APs with external antennas is For 802.11n/ac features like MIMO and MU-MIMO to work
properly to achieve faster speeds, the relative placement and alignment of the antennas to
each other is critical. For GMi I recommend AP’s with external antennas because there is a
lot more flexibility in selecting this type antenna because it’s have wide coverage area.

The Forth step is Hardware consideration. Making sure that you have the correct
hardware for your business is still a crucial element to a design. No two models are
manufactured for the same situation which one model access point could be made for 200
users, while another is made for 1,000 users. It's important to note that although you will need
the proper hardware, your design is still going to be the most important thing.

The Fifth step is choose a suitable wireless router and the three most recently made
was 802.11g, 802.11n and 802.11ac. 802.11g attempts to combine the best of both 802.11a
and 802.11b. 802.11g that supports bandwidth up to 54 Mbps, and it uses the 2.4 GHz
frequency for greater range. Another is 802.11n or also sometimes known as "Wireless N"
was designed to improve on 802.11g in the amount of bandwidth supported by utilizing
multiple wireless signals and antennas that was called MIMO technology instead of one.

And lastly, 802.11ac the newest generation of Wi-Fi signaling in popular use, 802.11ac
utilizes dual band wireless technology, supporting simultaneous connections on both the 2.4
GHz and 5 GHz Wi-Fi bands. 802.11ac offers backward compatibility to 802.11b/g/n and
bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.

Page 5 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

I would choose 802.11ac because of multi-user MIMO, which can increased channel
bonding choices, and the ability to use an additional spatial stream. All of this features equate
to increased speed or improved connectivity.

The Sixth step is end user consideration, while wireless LANs provide installation and
configuration flexibility and the freedom inherent in network mobility, one of the following
factors when considering wireless LAN systems is Range or Coverage which means
interactions with typical building objects, including walls, metal, and even people, can affect
how energy propagates, and thus what range and coverage a particular system achieves.
The range of coverage for typical WLAN systems varies from under 100 feet to more than
300 feet.

The Seventh step or Last step is principle of wireless network security. The Principles
of Security can be classified as Confidentiality which means the degree of confidentiality
determines the secrecy of the information. Next is Authentication, meaning is the mechanism
to identify the user or system or the entity. Next is Integrity, meaning is to gives the assurance
that the information received is exact and accurate. Next is Non-repudiation, meaning is a
mechanism that prevents the denial of the message content sent through a network. Next is
Access control, meaning is the principle of access control is determined by role management
and rule management. And lastly is Availability, meaning is the principle of availability states
that the resources will be available to authorize party at all times.

Page 6 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

5. Conclusion
In Conclusion, the benefit from implementation of this model in point of helping

developers to download software is we will gain maximum confidentiality and security that
can ensure the comfort ability of our clients and we will ensure the development process is
private and confidential.

In point of helping in troubleshooting and identifying the problem is you’ll be able to
knock out computer problems more efficiently as you gain more experience. And to be
proactive in avoiding future crises, perhaps you can document issues so they can be referred
to by anyone who encounters similar challenges down the line.

In the point of It provides a way to understand how an internet work operates is World
Wide Web is the information pages that we can browse online. In addition, instant messaging
chat programs, MP3 music downloading, and file sharing are all things that run on top of the
basic computer network that we call the Internet.

Page 7 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

6. Reference
1. URL: https://www.controleng.com/articles/wlan-architectures/,
Topic: design architecture
2. URL: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-
controllers/116057-site-survey-guidelines-wlan-00.html
Topic: site survey
3. URL: https://www.networkcomputing.com/wireless-infrastructure/wifi-design-antenna-
selection
Topic: antenna selection
4. URL: https://www.securedgenetworks.com/blog/what-should-be-included-in-a-wireless-
network-design
Topic: hardware consideration
5. URL: https://www.semiconductorstore.com/blog/2014/WiFi-standards-802-11a-b-g-n-vs-802-
11ac-Which-is-Best/806/,
Topic: suitable wireless router
6. URL: https://wlana.com/intro/customer.html,
Topic: end user consideration
7. URL: https://www.geeksforgeeks.org/cryptography-and-network-security-principles/,
Topic: principle of wireless network security

Page 8 of 9

Wireless Network & Security – COS 0642

INDUSTRIAL ELECTRONICS DEPARTMENT

MARKS (M) WEIGHT 1st 2nd
ED Assess Assess
CRITERIA MARKS 1 234 5
ALLOC MARKS or or
Ability to ATED Unable to OBTAIN
explain the explain Able to Able to Able to Able to
objective of 20 the explain the explain the explain the explain the ED
case study introductio introduction introduction introduction introduction M/5 x 20
20 n of case of case of case of case of case study
Ability to study study 1 study 2 study 3 in 3 contents =
explain the 20 content contents contents and produce
site survey, Unable to only. only. only. summarised M/5 x 20
20 explain result. =
design the site Able to Able to Able to
architecture requireme explain the explain the explain the Able to M/5 x 20
and antenna nt site survey site survey site survey, explain the =
selection. only. and design design site survey,
Unable to architecture architecture design M/5 x 20
Ability to explain Able to only. and architecture =
explain the the explain the antenna and antenna
hardware second hardware Able to selection. selection with
consideration objective. requirement explain the good
and to choose only. hardware Able to example.
a suitable Unable to requirement explain the
wireless router explain with good hardware Able to
the third example considerati explain the
Ability to objective. only. on and to hardware
explain the choose the consideration
end-user right place and to
consideration but no choose a
and principles example. suitable
of wireless wireless
router with
network good
security. example.
*(principles
of wireless Able to Able to Able to Able to
network explain the explain the explain the explain the
security are end-user end-user end-user end-user
needs only. needs with needs and needs and
CIA) example principles of principles of
only. wireless wireless
network network
security but security with
no good
example. example.

Ability to 20 Conclusion is M/5 x 20
conclude the
case study Conclusion Conclusion Conclusion well written =
is too is simple is good but and clearly
contents No simple. with unclearly explain
conclusion example. explain. related on 3

contents.

TOTAL 100

Page 9 of 9


Click to View FlipBook Version