Académique Documents
Professionnel Documents
Culture Documents
D03554630
TM585
Tahereh Daneshi
DeVry University-Online
Oct. 25th – Dec 21st
December 12th, 2010
Introduction
(100-User Wireless LAN Design & Implementation Analysis)
This document will endeavor to provide a written analysis concerning the design
and implementation of a wireless LAN (WLAN) for a firm comprised of one hundred
employees. In illustrating the WLAN design, I will make reference to several sources
regarding related content that I’ve found to be pertinent and of practical benefit to both
myself and the reader, not least of which will be “Top-Down Network Design”, by
Priscilla Oppenheimer, an instructional text which describes a method of network design
that’s based upon what can readily be found comparatively evident in the overall
networking community, to be the most logical and efficient sequence of steps necessary
in the creation of a network. Having stated this, it is of value for the reader to know that
the aforementioned sequence of steps, as examined in Oppenheimer’s work, will
correspond closely to the order of WLAN design and management issues that I’ll be
addressing in this document, and can be referenced via the documentation found at the
end of this article, under the same title and author.
The major design and management issues found peculiar to a WLAN involve
those that pertain specifically to the transmission and reception of radio frequency (RF)
waves. For example, the strategic placement of access points, devices designed to send
and receive radio signals between nodes, which leads to the consideration of any physical
materials that will hinder radio signals throughout the WLAN. Protocols and standards
that are related particularly to wireless technology, such as IEEE 802.1, are also worthy
of our attention, as they correlate directly to the diverse characteristics of WLANs.
Physical wiring necessary as well, ultimately, serving to facilitate and support WLAN
communications. Obviously, there are more topics of relative import than can be
mentioned in these few opening lines, save that I will endeavor here to present you with a
wireless network design that is both, optimally scaleable, with regard to accommodating
the demands of its purpose, while likewise serving to meet the feasible potentiality of
future requirements in a manor that is consistent with the most practical and ideal
solution available within the parameters of the prescribed WLAN specifications.
Problem Statement
(Network Design & Management Concentrations)
After careful and prolonged consideration of the described ‘Terminal Course
Objectives (TCO)’, themselves serving to illustrate the primary elements and principal
divisions of concentration most suitably related to network design, I’ve had trouble only
in choosing which TCOs to omit from the subject matter of central focus, this being due
largely to the overlapping and complementary nature of networking topics in general. At
length, the scope of the following analysis has been refined within the context of TCO-B,
concerning the ideal formulation and configuration of a network that facilitates optimal
performance, as well as TCO-F, regarding the elements of a sound strategy for fostering a
maximum state of security within a 100-user WLAN. Bear in mind that the issues
addressed here will necessarily involve topics specific to other TCOs, as the integrated
nature of their content requires they are at least made mention of, if only in conjunction
to those I’ve chosen. My intention here, however, is to present the most plausible method
and means by which the specified WLAN may be configured, so as to be conducent to
performance and security, as it could be argued that an optimal state of these combined
network attributes will afford management’s efforts with the space necessary from which
to iron out and overcome any additional issues that will inevitably arise.
Analysis
(Network Design Methodology, Variability, & Attribution)
As mentioned in the introduction, the concept flow of this document will follow
the top-down approach to network design. More specifically, as a form of structured
design, the top-down approach is described by Oppenheimer, P, as “focusing on the
requirements, applications, and a logical structure before the selection of physical devices
and products to implement the design.” Consequently, having identified the network as a
WLAN has done a portion of the work already. The idea here is simple, we can’t know
what would be best to use until we know exactly what it is we are using it for, and so the
rationale behind this paper’s organization follows suit. Unfortunately, the greater part of
this WLAN will present the difficult challenge of ascribing value to the majority of
variables that are present. Discouraging as it may sound, there’s a simple means to
overcome this obstacle, which will be discuss below at greater length. With this in mind,
the general sequences of design and concept flow aren’t disrupted, and the underlying
structural current of thought in this document will proceeded naturally, top-down.
Serving also as a useful guideline to sufficiently understanding the content and the
methodology behind the WLAN’s design, the sequence of decisions made throughout the
top-down approach utilized here coincides also with a more generalized life-cycle-
development process, characterized by the following four steps: of I.) Analyze the
requirements, II.) Develop the logical design, III.) Develop the physical design, and lastly
IV.) Test, optimize, and document the design. (Oppenheimer, P.). While adhering to these
structural aids, (Top-Down Network Design and Life-Cycle-Development-Process) let us
move now within view of the first variables entering into the realm of considerations,
which are found relating to the piecing together of a wireless local area network.
reference to the physical location and its characteristics is that there is little that can be
done in the way of a site survey. To help remedy this difficulty, as I’ve already
outside of the complex. To that extent, by accounting for such obstacles, the degree to
which actual sources of interference are eventually found to impede upon wireless signals
The first consideration arising are the various protocols, addressing schemes, and
routing solutions. Beginning with standards, IEEE 802.11n, the latest and greatest
transmission bandwidth by being able to support more than one antenna’s signal at a
time, in addition to bearing more resistance from interference. (Mitchell, B). I will be
implementing a wireless mesh network for this WLAN, as in addition to support for as
many as seventy routing protocols, the mesh topology also permits for the most ideal
configuration for connectivity and thus performance. This brings me to the routing
with security. (Webopedia). OSPF provides support for the currently underway
conversion to Ipv6, which caters to the networks future, provides smart topology
detection for loopless packet routing, perfect for a wireless mesh network. (Webopedia).
WAN, WLAN providers are nearly a dime a dozen. I’ve found a good listing of
WAN providers with links to their sites at Clarity-Consulting.com, and have potentially
narrowed the search down to between D-link, Cisco, and Intel. One more variable I
haven’t considered yet, which needs to be addressed before moving on is security. WPA2
is currently the latest and best wireless encryption algorithm available, which supports
dynamic key encryption, which basically means that the encryption key isn’t static, or
doesn’t stay the same forever. (Hughs, A.). Having identified the components of the
logical design, it’s now time to move onto the physical design.
Link, if for no other reason than my own personal history of satisfaction with both their
products and their service, not to mention the difference between those service providers
I’d previously narrowed my search down to basically offer the same deals. I’m also going
to be using D-link hardware form the network. For access points, I’ll be using the D-link
DAP-2590, a little costly by the way of access points, but worth every penny. The DAP
comes with two antennas for optimal coverage and was benchmarked at 14 times faster
than the fastest 802.11g router. (D-Link.com). I’ll also be using D-Link network storage,
print servers, and switches. In addition to the hardware security implementation of the D-
link firewall, there will ofcourse be detailed security policies set in place to complement
the technology.
Recommendation for Implementation
Obviously, there are countless ways to configure a wireless network, but
ultimately, the components and protocols I have included in this paper should serve to
optimal level of each, while at the same time providing space for future expansions and
altercations. I sincerely hope that everything you wished to be present here, in fact is, but
either way, it was a real experience endeavoring to put this WLAN together.
References
http://www.clarity-consulting.com/wireless_solution_providers.htm#WLAN
http://www.dlink.com/category/productcategories/?cid=17
Hughs, A. (2010). Wireless Security Protocols. Ehow.com. Retrieved Dec 12, 2010, from
http://www.ehow.com/list_6691649_wlan-security-protocols.html
http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm
Webopedia. (2010). Wireless Mesh Networks. Retrieved Dec 12th, 2010 from,
http://www.webopedia.com/TERM/W/wireless_mesh_network_WMN.html
Webopedia. (2010). Open Shortest Path First. Retrieved Dec 12th, 2010 from,
http://www.webopedia.com/TERM/O/OSPF.html