M03 - Build A Small Wireless LAN
M03 - Build A Small Wireless LAN
M03 - Build A Small Wireless LAN
SERVICE LEVEL-IV
Based on November, 2023 Version-II
November, 2023
Addis Ababa, Ethiopia
Table of Contents
Acknowledgement..........................................................................................................................iii
Acronyms........................................................................................................................................iv
Introduction to module....................................................................................................................v
Unit One: Confirm client and equipment requirements..................................................................1
1.1. Client and organizational requirements.......................................................................2
1.2. Wireless device technical requirements.....................................................................14
1.3. Identify components to be installed to meet the technical requirements...................16
1.4. Selecting appropriate position for access point.........................................................16
1.5. Cabling and power requirements...............................................................................17
Self-check 1...................................................................................................................................19
Unit Two: Install and configure wireless access point..................................................................20
2.1. Selecting access point device........................................................................................21
2.2. Installing and configure access points..........................................................................22
2.3. Configure Services........................................................................................................24
2.4. Testing access point for connection and security..........................................................25
2.5. Upgrading legacy equipment........................................................................................26
Self-check 2...................................................................................................................................29
Operation Sheet 2.1.......................................................................................................................30
LAP Test........................................................................................................................................32
Unit Three: Configure network.....................................................................................................33
3.1. Introduction to Wireless Security Threats.....................................................................34
3.2. Configuring security and other key parameters............................................................38
3.3. Testing security and firewall arrangements..................................................................40
3.4. Testing network compatibility and access....................................................................41
Self-check 3...................................................................................................................................43
Unit Four: Train users....................................................................................................................44
4.1 Determine devices to be connected to the network...................................................45
4.2 Demonstrating how pairing and log-on.....................................................................48
4.3 Traffic capacity issues...............................................................................................48
4.4 Developing user documentation................................................................................50
Self-check 4...................................................................................................................................52
Page i of lxxii Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
Unit Five: Monitor and administer wireless network....................................................................54
5.1. Monitoring wireless network performance................................................................55
5.2. Debugging networking issues....................................................................................56
5.3. Documenting and storing securely current settings...................................................57
Self-check-5...................................................................................................................................61
Reference.......................................................................................................................................62
Developers Profile.........................................................................................................................63
Page ii of lxxii Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
Acknowledgement
Ministry of Labor and Skills wish to extend thanks and appreciation to the many
representatives of TVET instructors and respective industry experts who donated their time and
expertise to the development of this Teaching, Training and Learning Materials (TTLM)
Page iii of Author/Copyright Module title: - Build a small wireless LAN Version -1
lxxii Ministry of Labor and Skills level -IV November, 2023
Acronyms
Module units
Confirm client and equipment requirements
Select, install and configure wireless access point
Configure network
Train users
Monitor and administer wireless network
Page v of lxxii Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
Unit One: Confirm client and equipment requirements
This learning unit is developed to provide the trainees the necessary information regarding the
following content coverage and topics:
Client and organizational requirements
wireless device technical requirements
Identifying components
Selecting position for access point
Cabling and power requirements
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Understand client and organizational requirements
Identify wireless device technical requirements
Identify components
Select position for access point
Understand cable and power requirements
Determining requirements includes extracting initial requirements from the customer and then
refining these with other data that has been collected from the organization.
Extracting Initial Requirements
Initial design requirements are typically extracted from the Request for Proposal (RFP) or
Request for Information (RFI) documents that the customer issues. An RFP is a formal request to
vendors for proposals that meet the requirements that the document identifies. An RFI is
typically a less formal document an organization issues to solicit ideas and information from
vendors about a specific project.
The first step in the design process should be pre-documenting (sifting, processing, reordering,
translating, and so forth) the design requirements and reviewing them with the customer for
verification and approval, obtaining direct customer input, in either oral or written form. Figure
1-1 illustrates an iterative approach to developing the design requirements document.
As illustrated in Figure1the process of gathering requirements can be broken down into five
steps. During these steps (which are sometimes called milestones), the designer discusses the
project with the customer's staff to determine and gather the necessary data, including
appropriate documentation.
The process is not unidirectional; the designer might return to a step and make additional
inquiries about issues as they arise during the design process. The next five sections detail these
steps.
Planned Applications and Network Services
The designer must determine which applications the customer is planning to use and the
importance of each of these applications. Using a table helps organize and categorize the
applications and services planned; the table should contain the following information:
Recall that infrastructure services include security, QoS, network management, high availability,
and IP multicast. Software distribution, backup, directory services, host naming, and user
authentication and authorization are examples of other services and solutions that are deployed to
support a typical organization's many applications. Table 1-3 shows sample data that was
gathered about the infrastructure services planned for the sample company, Corporation X.
Organizational Goals
Every design project should begin by determining the organizational goals that are to be
achieved. The criteria for success must be determined, and the consequences of a failure
understood.
Network designers are often eager to start by analyzing the technical goals before considering the
organizational goals and constraints. However, detailed attention to organizational goals and
constraints is important for a project's success. In discussions about organizational goals, the
designer obtains knowledge about the customer's expectations of the design's positive outcomes
for the organization. Both short- and long-term goals should be identified.
This is an opportunity to determine what is important to the customer. Some sample questions a
designer might ask to help determine organizational goals include the following:
What are you trying to accomplish with this project
Page 6 of 72 Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
What business challenges are you currently facing?
What are the consequences of not resolving these issues?
What is the major objective of this project?
What is driving the change?
What other technology projects and business initiatives will affect your group in the next
two to five years?
What skill sets does your technical staff currently have?
What is your goal for return on investment?
Organizational goals differ from organization to organization. The following are some typical
goals that commercial organizations might have:
Increase the operation's generated revenue and profitability. A new design should reduce
costs in certain segments and propel growth in others. The network designer should
discuss with the customer any expectations about how the new network will influence
revenues and profits.
Shorten development cycles and enhance productivity by improving internal data
availability and interdepartmental communications.
Improve customer support and offer additional customer services that can expedite
reaction to customer needs and improve customer satisfaction.
Open the organization's information infrastructure to all key stakeholders (prospects,
investors, customers, partners, suppliers, and employees), and build relationships and
information accessibility to a new level.
Table 1. 4 data gathered about the organizational goals of a sample company
Organizational Gathered Data Comments Organizational Gathered Data
Goal (Current Situation) Goal (Current Situation)
Increase Corporation Y Better products Increase Corporation Y
competitiveness Corporation Z Reduced costs competitiveness Corporation Z
Reduce cost Repeating tasks— Single data-entry Reduce cost Repeating tasks—
entering data point Easy-to-learn entering data
multiple times, applications multiple times,
time- Simple data time-
exchange
consuming tasks consuming tasks
Improve customer Order tracking and Introduction of Improve customer Order tracking and
Organizational Constraints
What are your major concerns with the implementation of a new solution?
Are other planned technology projects and business initiatives compatible with your
current infrastructure and technology solutions?
Are there any policies in place that might affect the project?
Typical constraints include the following:
Budget: Reduced budgets or limited resources often force network designers to
implement an affordable solution rather than the best technical solution. This usually
entails some compromises in availability, manageability, performance, and scalability.
Policies: Organizations have different policies about protocols, standards, vendors, and
applications; to design the network successfully, the designer must understand these
policies.
Schedule: The organization's executive management must discuss and approve
the project schedule to avoid possible disagreements about deadlines.
Technical Goals
The technical goals of the project must also be determined before the design starts. Some sample
questions the designer might ask to help determine technical goals include the following:
What infrastructure issues exist or will exist related to your applications rollouts?
Improve network performance: An increase in the number of users and the introduction
of new applications might degrade network performance, especially responsiveness and
throughput.
Note Performance is a general term that includes responsiveness, throughput, and
resource utilization. The users of networked applications and their managers are usually
most sensitive to responsiveness issues; speed is of the essence.
Decrease expected downtime and related expenses: When a network failure occurs,
downtime must be minimal, and the network must respond quickly to minimize related
costs.
Modernize outdated technologies: The emergence of new network technologies and
applications demands regular updates to and replacement of outdated equipment and
technologies.
Improve scalability of the network: Networks must be designed to provide for upgrades
and future growth.
Simplify network management: Simplify network management functions so that they
are easy to use and easily understood.
Table 1-6 depicts the desired technical goals that were gathered for the sample company,
Corporation X, along with their importance rating and additional comments. In this example, the
designer sees that the customer places great importance on availability, scalability, and
performance; this suggests that the network design should include redundant equipment,
redundant paths, use of high-speed links, and so forth.
Table 1. 6. Depicts the desired technical goals that were gathered for the sample company
Technical Goals Importance Comments
Performance 2O Important in the central site, less important in branch offices
Security 15 The critical data transactions must be secure
Availability 25 Should be 99.9%
Technical Constraints
Network designers might face various technical constraints during the design process.
Some sample questions the designer might ask to help determine technical constraints
include the following:
How do you determine your technology priorities?
Do you have a technology refresh process?
What urgent technical problems require immediate resolution or mitigation?
Do you have a plan for technical development for your staff in specific areas?
Do any applications require special network features (protocols and so forth)?
Good network design addresses constraints by identifying possible trade-offs, such as the following:
The importance of wireless network security cannot be understated. With the proliferation of
mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and
other cyber security threats has increased exponentially.
While there are many different steps that can be taken to secure a wireless network, these 12 best
practices are essential for ensuring that your data and devices are safe from malicious actors
Enabling Two-Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security to the login process. It requires users to
enter both a username and password, as well as a code that is generated by an authenticator app.
This makes it more difficult for someone to gain unauthorized access to the network.
Using A Strong Password
Using a strong password is one of the most important best practices for wireless network
security. A strong password is at least eight characters long and includes a mix of upper- and
lower-case letters, numbers, and symbols. Passwords should be changed regularly to ensure that
they remain secure.
Encrypting Data
Page 12 of 72 Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
Encrypting data is another important best practice for wireless network security. Data encryption
scrambles data so that it can only be decrypted and read by authorized users. This helps to
protect sensitive information from being accessed by unauthorized individuals.
Disabling SSID Broadcast
Disabling SSID broadcast is another best practice for wireless network security. When SSID
broadcast is enabled, it allows anyone within range of the wireless network to see the network's
name. You can disable SSID broadcast by accessing the wireless router's configuration page and
disabling the SSID broadcast feature.
Using MAC Filtering
Using MAC filtering is another best practice for wireless network security. MAC addresses are
unique identifiers assigned to devices that connect to a network.
Enabling WPA3 Security
Enabling WPA3 security is another best practice for wireless network security. WPA3 is the
most recent and most secure wireless security protocol. It provides stronger protection than
WPA2 and should be used whenever possible.
Using A VPN
Using a VPN is another best practice for wireless network security. A VPN encrypts all traffic
between a device and the VPN server, making it more difficult for someone to eavesdrop on the
connection. This is especially important when using public Wi-Fi networks, as they are often less
secure than private ones.
Disabling Remote Administration
Disabling remote administration is another best practice for wireless network security. When
remote administration is enabled, it allows anyone with the proper credentials to access the
router's configuration page and make changes to the network. This can be a security risk, as it
allows unauthorized individuals to potentially gain access to the network.
Changing the default password
Changing the default password is another best practice for wireless network security. Many
routers come with a default password that is easy to guess. This can be a security risk, as it
allows unauthorized individuals to potentially gain access to the network..
Using a Firewall
Universal Plug and Play (UPnP) is a protocol that allows devices to automatically discover and
connect to each other. This can be a security risk, as it allows unauthorized devices to potentially
gain access to the network. To disable UPnP, access the wireless router's configuration page and
disable the feature. You can also disable UPnP on individual devices by accessing the settings
menu.
Disabling Unnecessary Services
You often find that routers come with a number of unnecessary services enabled. These can be a
security risk, as they can provide potential attackers with information about the network. To
disable unnecessary services, access the wireless router's configuration page and disable any
services that are not needed. This will help to reduce the attack surface of the network. Common
unnecessary services include things like telnet, SSH, and HTTP.
Requirements define what the wireless network must do, which provides the foundation for the
design. Requirements for a wireless network include needs, such as signal coverage in all
elevators and support for voice telephony. Leave the technical details, such as specific
technologies (such as 2.4GHz vs. 5GHz 802.11n), components, and configuration settings to the
designers after all requirements are well-defined and agreed upon.
Requirements to consider
Before implementing a wireless network, consider the following types of requirements:
a. Applications.
Ultimately, the wireless network must support user applications, so be sure to fully define them
in the requirements. This could be general office applications, such as web browsing, email, and
file transfer, or it could be wireless patient monitoring in a hospital or voice telephony in a
warehouse. Be as specific as possible. The application requirements enable designers to specify
applicable throughput, technologies and products when designing the system.
In order to build a wireless network infrastructure, a company needs to consider the placement of
multiple access points around their campus. Access points connect to a wired network and allow
devices to connect to that network via the access point wirelessly. They are the cornerstone of
The building materials of the structures your business operates in can cause varying degrees of
wireless signal interference or blockage. Concrete, brick, and other dense materials are infamous
for blocking Wi-Fi signals. Your team should place access points in areas that provide the best
area of coverage when considering the building materials around it.
2. Wireless Access Points: Similar to routers, wireless access points are devices that provide
wireless connectivity in a specific area or location. They may be powered through an
electrical outlet or, in some cases, through Power over Ethernet (PoE) technology, which
allows both data and power to be transmitted over the same Ethernet cable.
3. Wireless Cameras: Wireless security cameras or other types of wireless cameras may be
powered by batteries or by connecting them to an electrical outlet. Battery-
powered wireless cameras are often designed for flexibility and portability,
while those connected to an outlet can provide continuous power.
4. Wireless Devices: Various wireless devices, such as smartphones, tablets, and laptops,
have built-in batteries that power their wireless capabilities. These devices need to be
periodically recharged to maintain their wireless functionality.
A wireless access point is a device used to create a WLAN. Businesses in large offices or
buildings often use wireless access points. This device is connected to an internet hub, wired
router, or switch using an Ethernet cable. Then project the Wi-Fi signal to the designated area. It
is best to understand your business needs before you make a choice. Consider some of the above,
or ask an expert for recommendations. Router-switch–your professional IT provider.
Things to Consider
As more and more enterprises upgrade their wireless network environment, people also have
doubts about choosing a wireless access point. When choosing a wireless access point, keep the
following points in mind.
1. Range
The range that an AP can cover is an important parameter, and a WAP with a larger coverage
area is more beneficial. Because it means the number and cost of access points can be reduced.
Purchasing WAPs with additional coverage areas can reduce costs for businesses. Most
enterprise wireless access points are capable of covering an area of 5,000 to 10,000 square feet.
2. Speed
The rate at which information travels is also something we need to consider, usually measured in
bps (bits per second), kilobits, megabits, or gigabits. In general, if the exact 802.11n protocol is
supported, wireless AP speeds can reach 300Mbps or higher, six times faster than 802.11n. The
WAP that supports the 802.11ac protocol can reach 1200Mbps.
3. Gain Antenna
The antenna of the wireless AP is basically built-in, it is not external like the antenna of
the router. The antenna of the wireless AP is very important, it will directly affect the signal
strength and transmission range of the wireless AP. When buying a wireless AP, it is best to
choose one with a booster antenna.
4. Guest Access
Data breaches and other cyber security issues are happening every day now. When people use
their phones and computers over the Internet, security issues are not expected. Modern systems
have intelligent guest access systems that apply corporate security policies. This ensures that
guests stay safe on the network. Also, there is no need to worry about access from unsecured
devices.
Managed LAN Services (MLS) is a term used to describe a service provided by a third party
service provider to manage a company’s local area network (LAN). This type of service provides
remote monitoring and maintenance of the company’s network infrastructure.
This type of service allows companies to reduce their IT costs and increase productivity. The
main advantage of MLS over other solutions is its ability to provide 24/7 support and proactive
monitoring. It also offers an easy way to access your network remotely.
A Local Area Network (LAN) is a high-speed communication system. It allows users to share
information and connect to other computers and peripherals. A LAN is usually connected to a
server via a router. Some types of LANs are wireless while others are wired.
Your company may already have an existing LAN, or you might need to create one. You will
need to buy equipment such as switches, routers, and hubs. Depending on the size and type of
your network, you might also need to purchase servers, printers, fax machines, and modems.
If you want to use a managed LAN service, you should contact a local IT service provider who
specializes in these kinds of services. They will be able to help you decide which kind of
managed LAN service is right for you.
5. Full ICT system responsibility for continuous support of business and production
processes:
To support business and production processes, we ensure that the system is always working
optimally. We monitor system performance and take proactive measures to prevent outages and
ensure continuity of operations
Outcome: reducing downtime, improving system performance and increasing productivity, with
a positive effect on the quality of the client company’s products.
Self-check 2
Part-II True or False
Low deployment costs make wireless networks attractive to users. However, the easy availability
of inexpensive equipment also gives attackers the tools to launch attacks on the network. The
design flaws in the security mechanisms of the 802.11 standard also give rise to a number of
potential attacks, both passive and active. These attacks enable intruders to eavesdrop on, or
tamper with, wireless transmissions.
"Parking Lot" Attack
Access points emit radio signals in a circular pattern, and the signals usually extend beyond the
physical boundaries of the area they intend to cover. Signals can be intercepted outside buildings,
or even through the floors in multi-story buildings. As a result, attackers can implement a
"parking lot" attack, where they actually sit in the organization’s parking lot and try to access
internal hosts via the wireless network.
Shared Key Authentication Flaw
Shared key authentication can easily be exploited through a passive attack by eavesdropping on
both the challenge and the response between the access point and the authenticating client. Such
an attack is possible because the attacker can capture both the plaintext (the challenge) and
the cipher text (the response).
Service Set Identifier Flaw
Access points come with default SSIDs. If the default SSID is not changed, these units can easily
be compromised. In addition, SSIDs are sent over the air as clear text if WEP is disabled,
allowing the SSID to be captured by monitoring network traffic. For some products, even when
WEP is enabled, management messages containing the SSID will still be broadcasted in clear
text by access points and clients, making it possible for an attacker to sniff SSIDs and gain
access to the wireless LAN.
Data passing through a wireless LAN with WEP disabled (which is the default setting for most
products) is susceptible to eavesdropping and data modification attacks. However, even when
WEP is enabled, the confidentiality and integrity of wireless traffic is still at risk because a
number of flaws in WEP have been revealed which seriously undermine its claims to security. In
particular, the following attacks on WEP are possible:
Passive attacks to decrypt traffic based on known plaintext and chosen cipher text
attacks;
Passive attacks to decrypt traffic based on statistical analysis on cipher texts;
Active attacks to inject new traffic from unauthorized mobile stations;
Active attacks to modify data; or
Active attacks to decrypt traffic, based on tricking the access point into redirecting
wireless traffic to an attacker's machine.
3.1.2. The most wireless Network Threats
Malicious Association: Malicious access points (Free public Wi-Fi) can steal
passwords.
Man-In-The-Middle Attacks: Using rogue access point between the user and the real
access point
Denial of Service (DoS): Keep the media busy 8. Network Injection: Spoof
routing/management messages
The below are a counter measurements that to reduce Wireless Network Threats
Turn-off SSID broadcast
Use Cryptic SSID names
protected against exploitation. Firewalls serve as the first line of defense in network security,
crucial in safeguarding your internal network from cyber threats. With hackers perpetually on the
lookout for open ports and misconfigurations, the relevance of firewall testing becomes
paramount. In this guide, we delve into the varied methods and tools to ensure your firewall is
operating optimally.
Regular firewall testing ensures the integrity of your network, keeping malware, tunneling
attempts, and hackers at bay. Always remember to check the permissions, access control list
(ACL), DMZ settings, and file sharing formats to ensure that your firewall and network devices
are protected.
Importance of Firewall testing
The essence of firewall testing lies in its ability to critically evaluate the functionality of your
firewall. By identifying open ports, misconfigurations, or potential backdoors, you can thwart
hackers. In essence, firewall testing is like auditing your network security.
Methods for Testing Firewall Security
The primary techniques for firewall security testing are penetration testing and port scanning.
These methods, when executed appropriately, expose vulnerabilities, shedding light on the
type of firewall’s strengths and weaknesses.
Penetration Testing
Firewall penetration testing, usually undertaken by penetration testers, simulates cyber attacks on
your network devices, similar to how a hacker would infiltrate systems. This form of security
testing mimics actual threats, thus gauging the robustness of your firewall policy and other
defenses.
Port Scanning
Port scanning is an indispensable tool in identifying open and closed ports within your internal
network. Tools like Nmap, Netcat, and ShieldsUp play pivotal roles in this. Since open ports can
be gateways for malware and cyber attacks, it’s crucial to determine and seal any unnecessary
ones.
Firewall Testing Tools
Windows, especially its operating system Windows 10, comes with robust built-in features for
firewall testing. Microsoft’s firewall policy allows intricate customization, which can be audited
using the Windows Defender Firewall with Advanced Security. Additionally, tools like Netcat
can help in understanding routes, routers, and potential issues in routing.
Secure the Firewall
Self-check 3
Part I: Choose the best Answer
Page 43 of 72 Author/Copyright Module title: - Build a small wireless LAN Version -1
Ministry of Labor and Skills level -IV November, 2023
_______1. _________ can easily be exploited through a passive attack by eavesdropping on both the
challenge and the response
A. Shared Key Authentication Flaw C. all
B. Parking Lot" Attack D. none
_______2. Which one is wireless Network Threats
A.
B. Accidental Association: D. Ad-Hoc Networks
C. Malicious Association: E. All
_______3. From the following which one is a counter measurements that to reduce Wireless
Network Threats
A. Turn-off SSID broadcast C. Use encryption
B. Use Cryptic SSID names D. All
_______4. .—is either 64 bits or 128 bits as the length of the key.
A. Key Type. C. Key Length
B. WEP Keys D. All
Part- II: Matching
A B
_______1. Service Set Identifier A. hardware device that allows wireless communication devices,
_______2. .AD-hoc B. identification that allows wireless clients to communicate with
an appropriate access point
_______3. Wireless Local Area C. a type of local area network that uses high frequency radio
Network waves rather than wires to communicate between network-
enabled devices
_______4. Access Point D. one of the networking topologies provided in the 802.11
standard
Self-check 4
Part-I: Say True or False
1. Books, manuals, computer-based tutorials and online help are all media for user
documentation.
Self-check-5
Part I:- Say True or False
______1. Wireless network strength can be improved by using signal boosters or range extenders.
______2. Encrypting your files before storing them in cloud storage provides an additional layer of
security.
Reference
List of Book
1. Wi-Fi Home Networking Just the Steps For Dummies" by Danny Briere and Hurley
7. The Book of Wi-Fi: Install, Configure, and Use 802.11b Wireless Networking" by John
1. https://www.free-power-point-templates.com/articles/creating-business-cards-in-
microsoft-publisher/
2. https://www.wikihow.com/Make-a-Certificate-Using-Microsoft-Publisher
3. https://purplesec.us/firewall-penetration-testing