Sie sind auf Seite 1von 5

Implementing a WLAN: Good

Planning is the Key to Success


Introduction Channelization and deployment standards play an important role in
Wireless LAN (WLAN) technology has matured and become a practical WLAN implementations. A channel represents a narrow band of
alternative to traditional networks. It offers the kind of anywhere/anytime radio frequency. Since radio frequency modulates within a band of
connectivity that today’s highly mobile workforce has come to expect. frequencies, there is a limited amount of bandwidth within any given
Wireless LANs can provide full access to network resources from any range to carry data, which impacts the overall capacity of the WLAN.
place within range of an Access Point (AP). It is important that the frequencies do not overlap or the throughput
would be significantly lowered as the network sorts and reassembles
On one level, a wireless LAN is very much like a wired LAN. There are
the data packets sent over the air. There are a few basic deployment
endpoint devices (servers, workstations, printers) enabled by network
standards from which to choose, with more being tested. Four
cards and data is transferred with network communication protocols.
considerations will be discussed in this paper, including 802.11b,
Instead of traveling on fiber or copper, data is transferred with Radio
802.11g, 802.11a and 802.11i.
Frequency (RF) signals.
Data rates up to 6 Mbps of effective throughput (throughput used for
Wireless LANs make it easier for employees to stay on line and in
data transfer vs. overhead) can be supported with an 802.11b deployment.
touch. The increased flexibility of Wireless LANs enables more
This selection is often chosen if there are a small number of users per
productive work teams, supports greater employee collaboration and
AP, if WLAN access is needed for handheld PCs or if an existing
contributes to employee satisfaction. Workers like the mobility and
802.11b WLAN needs to be expanded to accommodate more traffic.
sense of empowerment that a WLAN can provide.
802.11b does penetrate walls and provide good indoor range. To
Since it has become a popular technology used within a residence, prevent interference with other equipment, the physical environment
many businesses are familiar with the basics of wireless networking. should be free of other wireless devices, such as cordless phones,
The ease of setting up a WLAN is contributing to its rapid adoption. microwaves or elevators utilizing the same 2.4 GHz frequency.
However, a successful WLAN implementation requires the same kind of
Because it can provide effective throughput up to 25 – 30 Mbps, 802.11g
advanced detailed planning and attention to detail as any other
may be a good option for businesses needing more throughput.
network deployment.
Businesses using an existing 801.11b network can upgrade to 802.11g
since they both operate on the 2.4 GHz frequency. Applications needing
Networking Requirements
high bandwidth and speed, such as large graphics, audio, data and video
Analysis and Deployment Considerations files, are commonly used with this selection. Similar to 802.11b, 802.11g
The first step in a WLAN implementation is to conduct a thorough penetrates walls, offers good indoor range and may experience
business analysis to verify that wireless technology will meet business interference from other devices on the same frequency.
needs and deliver the required functionality. The physical environment
(indoors, outdoors or both), the kind of traffic the WLAN will need to Another deployment selection that offers enhanced throughput to
carry (data, voice, video or all of the above) and the type of business support applications requiring high bandwidth is 802.11a. This
function it is intended to serve (such as conferencing, customer service selection provides lower interference with other devices than 802.11b,
or sales support) should be considered. It is also important to factor in but typically has a slightly shorter indoor and outdoor range than
future application requirements, growth and scalability as part of the 802.11b and 802.11g. 802.11a operates on a 5 GHz band, which is a
initial assessment. different and wider frequency spectrum than 802.11b and 802.11g,
allowing more channels and more overall throughput. The wider
Implementing a WLAN ______________________________________________________________________________________________________________________ 2

frequency band allows 802.11a to support up to eight non-overlapping • 5 – 10 power users who are constantly on the network and deal
channels. 802.11b and 802.11g support up to three non-overlapping with large files
channels. Frequency ranges and channels may vary by country.
To increase capacity, more APs may be added, which gives users more
The number of radio frequency channels required by an organization is opportunity to enter the network. Networks are optimized when the
determined by assessing usage requirements. For example, a public APs are set to different channels.
hotspot such as a lobby can usually be well supported by the 802.11b
A newer standard that has been developed addresses security
standard for e-mail support or viewing web sites. A conference room
weaknesses regarding both authentication and encryption protocols.
may be better served by the 802.11a standard for transfer and
This selection, 802.11i, encompasses 802.1X, Temporal Key Integrity
collaborative work with data files. A home office might be best suited
Protocol (TKIP) and Advanced Encryption Standard (AES) protocols.
by a 802.11g-based network to help enable good application
performance for virtual office workers.
The Site Survey
The number of simultaneous users that an AP can support depends With the requirements and deployment confirmed, it’s time for a site
mostly on the amount of data traffic traveling at a time (heavy versus light survey. The best surveys are done literally on-site. Modeling tools
downloads and uploads). Bandwidth is shared among users on a WLAN can simulate an environment without an actual visit, but they are only
as with wired network connections. Network performance, as gauged by as good as the source data. Key elements to be determined in this
the number of simultaneous users, hinges on the combined computing survey are identifying the number and placement of APs and assessing
activity. For example, with 802.11b, each hardware access point has up to the attenuation of radio frequency obstacles.
6 Mbps effective throughput. This capacity is adequate for:
The speed at which a WLAN performs depends on many things, such
• 15 – 25 nominal users who are mostly idle and check on as the efficiency of the wired network, the configuration of the
occasional text based e-mail building, and the type of WLAN employed. As a general rule for all
WLANs, data throughput decreases as the distance between the
• 10 – 15 mainstream users who frequently use e-mail and WLAN access point and the wireless client increases. An assessment
download and upload moderately sized files of AP signal strength using various antenna and AP configurations

Obstruction Degree of Attenuation Example


Open space None Cafeteria, courtyard

Wood Low Inner wall, office partition, door, floor

Plaster Low Inner wall (old plaster lower than new plaster)

Synthetic materials Low Office partition

Cinder block Low Inner wall, outer wall

Asbestos Low Ceiling

Glass Low Non-tinted window

Metal tinted glass Low Tinted window

Wire mesh in glass Medium Door, partition

Human body Medium Large group of people

Water Medium Damp wood, aquarium, organic inventory

Bricks Medium Inner wall, outer wall, floor

Marble Medium Inner wall, outer wall, floor

Ceramic (metal content or backing) High Ceramic tile, ceiling, floor

Paper High Roll or stack of paper stock

Concrete High Floor, outer wall, support pillar

Bulletproof glass High Security booth

Silvering Very High Mirror

Metal Very High Desk, office partition, reinforced concrete, elevator


shart, filing cabinet, sprinkler system, ventilator
Implementing a WLAN ______________________________________________________________________________________________________________________ 3

helps determine the number and placement of required APs needed One way to make a WLAN more secure is to limit its reach. At the
to provide adequate radio coverage. This process involves: design stage, the WLAN’s engineers should be clear about how far
and wide wireless access is really needed, so they can select APs that
• Gathering facility drawings and blueprints, documenting wiring
will shape the signal’s range and direction. It’s also a good idea to
such as the location of host systems and documenting power
isolate the WLAN from the rest of the network with an internal firewall
outlets and structural elements (such as metal firebreaks and walls,
or Wireless DMZ.
doorways and passageways).
Several security technologies can provide added levels of protection
• Assessing environmental radio coverage including the selection of
for WLANs:
AP devices and radio for the installation areas where signal
interference is avoided or minimized. The optimal positioning of • Service Set Identifier (SSID) identifies the WLAN. Clients must be
access points and antennas is also determined. configured with the correct SSID to access their WLAN. The SSID
should not be broadcast and the key should be shared only with
• Assessing channel interference and conducting testing to help
those having legitimate need to access the network. Finally, the
ensure radio transmissions do not overlap.
SSID should be changed periodically.
• Choosing antenna placement including positioning of omni-
• Media Access Control (MAC) is access based on a filtering system of
directional and directional antenna.
MAC addresses configured for a specific LAN switched port. It
• Establish diversity reception including overcoming interference or restricts WLAN access to computers that are on a list created for
fading by positioning multiple antennas in certain locations. each AP on the WLAN network. It also restricts the connection of
APs and the LAN switch port.
• Assessing electrical systems including review of AP electrical
installation alternatives to prevent performance degradation on • Wired Equivalent Privacy (WEP) is an encryption method that
inherent or random electrical problems. protects WLAN data streams between clients and APs as specified
by the 802.11 standard. There have been flaws identified in this
• Redundancy should be considered for conference rooms, cafeterias security mechanism and its effectiveness is uncertain.
and other multiuse spaces to help ensure good throughput.
• IEEE 802.1X is a security standard featuring a port-based
Attenuation of radio frequency obstacles should also be considered as authentication framework and dynamic distribution of session keys
part of the site survey and assessment. Both the ability of radio waves for WEP encryption. A radius server is required.
to transmit and receive information and the speed of transmission are
impacted by the nature of any obstructions in the signal path. The • IEEE 802.11i is an upcoming security method being developed by
illustration on page 2 shows the relative degree of attenuation for the IEEE that features 802.1X authentication and includes
common obstructions. Advanced Encryption Standard (AES) for added protection. Another
enhancement, Temporal Key Integrity Protocol (TKIP), allows
Wood floors can cause floor-to-floor interaction between APs. It is encryption keys to be changed frequently.
important to ensure that channel selections are appropriate for
vertically adjacent access points. All office and room doors should be • Wi-Fi Protected Access (WPA) is a method that addresses the
closed before beginning the survey in order to assess reception at its encryption issues of WEP by utilizing Temporal Key Integrity
lowest level. The corner of a room should be avoided as a placement Protocol, which wraps around WEP and changes the encryption key
area for an access point. If placed in a corner, about 75% of the AP frequently. WPA also includes the authentication benefits of 802.1X.
coverage is wasted. This also gives unauthorized users outside the
• Extensible Authentication Protocol (EAP) is a point-to-point protocol
room a better chance to access the AP.
that supports multiple authentication methods. The support of EAP
To understand what other frequencies might be present in the proposed types depends upon vendor implementation. EAP provides the
WLAN space, surveys should also include an RF spectrum analysis. framework for the client, the authenticator (the wireless access
device or access point) and the authentication server to authenticate
Security Considerations each other and communicate the encryption keys.
Security is often cited as a key concern in a WLAN implementation, as
Providing security features to a WLAN involves coordinating multiple
it can be a potential open door to the network. Before deployment,
elements. WPA protocol is normally recommended over WEP protocol.
the WLAN’s security issues should be clarified stating clearly what kind
Strong encryption should be used and the default administrative
of authentication measures and encryption methods will be used.
password should be frequently changed. A “strong” password should
Developing and documenting a WLAN security policy is a good first be used, containing at least eight characters, with a combination of
step. Many security breaches can be traced to policy failures, not letters and numbers. The Service Set Identifier (SSID) should not be
technology failures. WLAN security policies should be similar to any broadcast because it forces users to know the name of the network
other network security policy, with a stated purpose, a clear scope and in order to connect. Rogue users won’t see the WLAN as an
assigned responsibilities. available network.
Implementing a WLAN ______________________________________________________________________________________________________________________ 4

Regular network audits should be performed to identify and disable or


reconfigure rogue APs. Rogue APs are those installed without the IT
Automotive Company Overcomes WLAN Design Issues
department’s knowledge. These APs are not configured with any
security settings and may leave an open door for unauthorized access Business Situation
to the network. Some rogue APs may not be connected to the
An automotive manufacturing company wanted to
network. However, due to their presence, users may attempt to use
implement a WLAN to help boost productivity and
the AP by providing valid user authentication information (such as user
efficiencies for multiple business units. The network
ID and password), which can be retrieved via other methods such as
design needed to handle several diverse requirements:
unauthorized hacking and exploitation. From a physical standpoint, in
areas requiring limited access, access points should be placed adjacent • Each business unit required separate access to specific
to or straddling the high-security area. resources – segmentation and separation of resources
was required for confidentiality
Businesses may want to consider making the use of virtual private
networks (VPNs) part of their security policy. In doing this, users • The same wireless network needed to provide access to
would need to use a VPN to enter the corporate network through a guests as well as internal restricted resources
wireless access point.
• Guests should only have access to the Internet
Equipment
• Wireless access could not reach beyond the
With the right up-front planning, the actual implementation of a WLAN
host buildings
is largely a plug-and-play activity. WLANs are engineered with a few
types of components. A typical network infrastructure is composed of • The wireless network needed to have a variety of
the following equipment: security features to help prevent it from being a
gateway into the rest of the corporate network
• Hardware – WLANs consist of two main building blocks, including
an AP that connects to the network and a wireless adapter Networking Solution
installed in the computing device.
Senior Security Consultants were provided to review the
• Access point (AP) – An AP is a small box, usually with one or two current network design. A wireless site survey was
antennas. This radio-based receiver/transmitter is connected to the performed to identify access point and signal strength
wired LAN (or broadband connection) using Ethernet cables. needs. Authorized wireless hacking methodologies, such
as wireless detection, sniffing and network scanning, were
• Antennas and bridges – Antennas enhance radio frequency
conducted to check the performance of the design.
coverage, extending the range of an 802.11 WLAN (See the Age of
the Wireless LAN for more information). Bridges provide a point-to- Several troublesome design issues were discovered, including:
point wireless connection between two LANs.
• The signal was available in the parking lot and beyond
• Wireless adapter – A wireless adapter functions like a network
interface card (NIC) in that it allows the client computing device • There was no authentication on the WLAN
access to the network by means of the wireless AP. • The WLAN was connected to the server segment
• Clients – Clients are items such as workstations, laptops, phones, without a firewall
printers or other WNIC-enabled devices. Authentication issues were rectified by implementing
Most devices on a WLAN are referred to as stations and are equipped Wired Equivalent Privacy (WEP – is a scheme that is part
with Wireless Network Interface Cards (WNICs). A service set is a of the IEEE 802.11 wireless networking standard to help
collection of stations that can communicate with each other. Service secure IEEE 802.11 wireless networks), which was the only
sets are connected at some point to a Distribution System, which is safeguard available for the procured equipment. Configuration
usually a wired LAN. changes and detailed network design recommendations
were provided to restrict access to the WLAN, restrict
Depending upon security requirements and policies of the user, an access between the WLAN and the corporate network and
authentication server may be needed to validate the user and the AP. address common architectural practices. Specifically, the
A management server may be needed to help monitor and maintain company was shown how to restrict users to appropriate
the WLAN. Advanced network management may require a gateway network resources. For example, lobby guests were
server that provides Quality of Service for different groups of users segmented away from the rest of the network. Finally,
and applications. corporate servers were firewalled away from the wireless
LAN and additional layers of authentication were
It is important to check for interoperability between the network
implemented to help ensure authorized access. The
infrastructure and client-side WLAN components. It is also important
automotive manufacturer was left with a WLAN solution
to verify that the clients are on the correct frequency by selecting
that helped improve employee productivity and
appropriate channels on the APs. 802.11a products are inherently
accommodate the access needs of the business.
incapable of communicating with 802.11b products because they
Implementing a WLAN ______________________________________________________________________________________________________________________ 5

operate on separate frequencies. Even though 802.11b and 802.11g programs providing wireless connectivity to a small segment of a larger
products operate on the same frequency, due to modulation environment. Other times, a wireless network solution must be
differences, they need to be designed for dual mode operation or implemented across the entire organization. Many businesses take a
upgraded to ensure compatibility. Build-and-Test approach, bringing up one segment of the WLAN at a
time, then testing and approving it before moving on to the next
APs should be placed in strategic areas to provide adequate coverage.
segment. Each segment test also checks the deployed security features.
Many IT managers avoid outside facing walls to help minimize security
threats from people in parking lots. Overlapping of coverage is Summary
important for maintaining a continuous connection around a building. WLANs help increase productivity and team collaboration and help
APs should be set to different channels to avoid cross talk, or colliding facilitate more efficient decision making. Compared to a wired
with signals that degrade performance while the data packets are network, WLANs can provide a more flexible technical infrastructure,
sorted and put together correctly. at a reduced cost. Since they can be installed or relocated quickly,
New architectural direction incorporates wireless band controllers WLANs offer natural business continuity advantages.
to support APs. The controllers do authentication, aid in QOS, A successful WLAN implementation is a matter of striking the right
and collect statistics. Today, that information allows for a more balance between functionality, performance and security objectives.
scalable implementation. With careful planning and the right advice from experienced
professionals, businesses can expect to benefit from what the wireless
Roll Out
technology has to offer.
Once the design of the WLAN is established, it is important to develop
a plan for deployment. Deployments sometimes consist of pilot

For more information contact your AT&T Representative or visit us at www.att.com/business.

07/13/07 AB-1111
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures.

Das könnte Ihnen auch gefallen