Introduction of Wireless Networking Technologies
The very first step in the deployment of WLAN is to make sure
the required operation initializes with the site survey of the network for the
assessment of the behavior of radio frequency within the particular environment.
In the wireless network, several issues can arise because of the poor coverage
as well as poor planning for this purpose. One thing is discovered that several
site surveys are not executed accurately, or the site survey is lost completely.
The main purpose of this assignment is to provide the brief information as well
as the guidelines for proper planning, preparation, as well as the
identification of the access points as well as the roaming spots of the BCU
network within one particular building and the specific floor. In the report, a
brief survey is conducted as well as the sketch floor map of the selected site
to survey. In the site map, the roaming spots are also located. Furthermore, the
installation of the new wireless network, the process of planning and designing
is described by the wireless site surveys. The roaming capability, rates of
data, the service quality as well as the coverage of wireless network should be
looked at them and to identify the challenges earlier finding the best ever
solution. The report is also telling about the categories of site surveys.
There are three main categories that are discussed which are mentioned here for
the convenience. The passive site survey, active site survey as well as the
predictive site survey. The wireless site survey has several best approaches
including equipment, assessment, access points, testing as well as the
analysis. These approaches are explained in the report in further sections. The
planning for a wireless site survey is also discussed in the report.
II. Site Survey Planning of Wireless Networking
Technologies
To gain the very best results, it deserves
if the business of the user is going to use the wireless site survey. The
preparation is a vital component that will enable the user to make it happen. The
organization must have to schedule the survey at a time because of the crucial
element where the minimal disruption will be caused by the operation of the
business. The picking a week or the day could be involved where the business is
expected for becoming slower a little bit because of the seasonal trends or the
training of the staff. On the other side, it can also give the meaning of conducting
the site survey for the completion of the hours of the business. Furthermore, the
professional network engineer who has the ability to give the reliable as well
as fast service which is vital for having the wireless network survey. The user
is allowed by the field engineer for finding the easy way for this. In the
last, it is also required for making sure that the premises of the business of
the organization are safe and secure for the engineer [1].
III Approaches
of Wireless Site Survey of Wireless Networking Technologies
To perform a site survey for wireless LAN separately from the
hiring of the right engineer at the right time, there are many different types
of challenges as well as issues for the consideration of how to conduct a
survey for the wireless network. As the owner or administrator of the information
technology of the website, it is commanding that the user understands them. The
mentioned approaches are used for the site survey of the current area network [2].
A. Equipment of Wireless Networking
Technologies
With a simple wireless internet adapter, the
active, as well as passive surveys, may be completed but the predictive surveys
need particular equipment. The size of the building will influence the actual
specification of the concluding item and the intended use. Furthermore, on the
facilities of the hardware, it will require the software to run the number of tests
for it. The running of any kind of the operating system such as Windows, IOS, Android,
or other operating system’s applications may relate to such kind of software,
which depends upon the needs of the business [3].
B. Assessment of Wireless Networking
Technologies
The assessment of the current network
infrastructure is the key to whether the organization currently fully boasts
the facilities of the wireless network in specific regions. The visual
inspections of the regions, as well as the networking devices and the
networking facilities which are being used, should be completed by the
engineers. The identification of any current features, as well as the
determination of the capacity or the capability, can be adapted as well as
utilized to implement the network wirelessly may also assist in the designing
of the network as well as the installation processes. The user has to make sure
that it may also minimize the actual costs on the network through the reduction
of the requirements of the equipment [4].
C. Access Points of Wireless Networking
Technologies
The huge emphasis on the concept of the
access points should be placed by the wireless site survey, which is necessarily
the gateways that are used for the connection of wireless devices with the
existing network. Furthermore, it is also making a connection with the internal
network for the outdoor digital world. The close attention should be paid by
the network engineers for plans of the floor as well as tried for
identification of the highest point to place the access points. Moreover, the
threat of obstructions will be reduced to signals as well as satellites by it. To
airwave pollution of the traffic as well as the factor in the outside
obstructions, it is very significant for the engineers of the network.
D. Testing of Wireless Networking
Technologies
The testing phase is the very significant
part of any kind of implementation as well as an installation because it is the
only process which is capable for finding the problems in the system as well as
it can also remove all kind of ambiguities from the system which is
implemented. During the phase of planning of the implementation of the wireless
LAN as well as the phase of the installation of the network, the network
engineers require for testing the coverage of the wireless network throughout
all of the areas of the building of the network where the wireless network
facilities are required potentially. The
best ever way for doing this is through going or walking across along with the
computing devices that will measure the network situation on the current or
targeted area.
Along with the download as well as the
upload speeds, the strength of the signals of collected data in the manner
confirms that the plans of the network are working as wanted or want extra
consideration by the further access point in the device for making the strong
connection with the network.
E. Analysis of Wireless Networking
Technologies
The analysis is a very important part of any
kind of survey and the testing of the system to make changes as well as making improvements
into the system. It is a very significant phrase because every kind of ambiguities,
issues, and problems, as well as the plus points, are also mentioned or listed.
It is actually the comparison of the system as well as the comparison of the
different techniques, areas, speeds as well as different kind of solutions
which can be proposed for the current system. Furthermore, the network
engineers are allowed by the analysis of the data which is collected from the
testing by using the tool for the site survey of the wireless LAN to pinpoint
any areas where the network is the filtering. More indication can be given by the
filtering results through the assured access points. For the improvements, it
will be led hopefully after running the second test, adjusting, or adding the new
equipment or access points. It should be highlighted by the cross-comparison of
the outcomes of the different types of tests, in which the adjustments have
worked. In all of the locations or the areas, the objective is to reach total
bars on the indicators of the connection of all networking devices. In the
last, further tests on the network. Should be reserved as the changing of the
requirements as well as the changing in the environment that can affect the
overall workability of the network in the future.
IV.
Architecture of Wireless Networking Technologies
Two types of direct trust relations, as well as one, are
indirect, are implemented by the federations such as eduroam. The relation of
the trust of among the Idp as well as the end-user which is operated by the organization
of the home of the user, as well as among a the Idp within eduroam, the operator
of such network goes at the visited area or the floor. Furthermore, the trust
relationship among IdP, as well as the user, is concluded by mutual
authentication. Moreover, trust is also established by the SP as well as IdPs by
using the radius hierarchy. The transitive relation of trust is provided by two
forms of trust relationships into the turn, which develops the SP trust the
user to use resources of its network.
How the Client Roam is triggered?
The client roam is triggered explained here that roaming
automatically makes the connections to the access point with the device of the
client with the strongest signal in the RF environment. The request of the
client go the access point authenticator that the radius server save the data
in database which send back to authenticator after processing. After
authentication, client or guest can use the services of internet.
What happens to the students eduroam account when they
leave the university?
The students in the university connected with the network of
the university via their registered profiles. The area is assigned to the
students who can use the services. When they leave the university, they cannot
use the internet services outside the university boundary.
Describe the authentication and de-authentication process?
Eduroam is secure, world-wide roaming access service
developed. Authentication concerns with the security of network in the
university. The request is transferred to the authenticator who will sends the
data to database for registration. Every data entry is also authenticated in
this step. The radius server sends the data after saving in database to
authenticator again where the student is successfully given permission to
access the account. On the other side, the eduroam operator searches the disconnected
accounts or users on this network and the memory will be cleared after
filtering it. In de authentication, the attacker can attack on the network
where the authenticator can block the data as well as suspicious IP address and
remove from the network.
Describe any combination of IEEE 802.11 standards used to
provision edurroam.
The combination of IEEE 802.11 standards used for the
provision of eduroam is discussed such as the wireless LANs untethered network
which mostly used on mobile and laptops. The standard of IEEE 802.11 is Mac
protocol which is unlicensed frequency spectrum from 900Mhz to 2.4 Ghz.
Describe the various security protocols which make eduroam
one of the most used wireless roaming solution in academia.
The various security protocols that can make eduroam most
used wireless roaming solution in university. The Mac protocols of 802.11 can
be used for this purport as well as it can make it better.
Evaluate the data rate before, during and after the
roaming event? Include any data you have recorded while you undertake the work required
in the first part of the task.
The data of the clients or the users in the university using
the services of eduroam vary on the usage. The data before roaming was low but
during the roaming and after the roaming, the data did increased
Provide suggestions on how eduroam would be improved in
terms of security, QOS, roaming and coverage.
The wireless project drivers of eduroam system or the need of
the computer for updating on the regular basis. The operating system as well as
the protocols should also be updated after some times.
V. Recommendations of Wireless Networking
Technologies
There are some issues with this system that need to be improved.
It is recommended that the determination of the particular area or the floor
which lies within the scope as well as out of the scope for conducting the
survey to carry the wireless LAN survey of the site. Furthermore, they display
the noise floor by considering the heat maps. Proper determination and
evaluation of the key interfaces. The heat maps are intended to provide with
the coverage by RF along with the consideration of the targets SNR legend and
the SNR. Carry out the initial surveys more accurately and the validation for
the final settings of RF. By taking into consideration, these recommendations
the WLAN site survey can better be managed and the desired outcomes can be
obtained as per the users [5].
VI.conclusion of Wireless Networking Technologies
I have concluded that preparation is a vital component that
will enable the user to make it happen. The professional network engineer has
the ability to give reliable, as well as fast service which is vital for having
the wireless network survey. As the owner or administrator of the information
technology of the website, it is commanding that the user understands them. The
size of the building will influence the actual specification of the concluding
item and the intended use. The identification of any current features, as well
as the determination of the capacity or the capability, can be adapted as well
as utilized to implement the network wirelessly may also assist in the
designing of the network as well as the installation processes. Moreover, the
threat of obstructions will be reduced to signals as well as satellites by it. Furthermore,
the installation of the new wireless network, the process of planning and
designing is described by the wireless site surveys.
VII. References
of Wireless Networking Technologies
[1]
|
J. Florwick, J. Whiteaker
and A. C. A. &. J. Woodhams, " Wireless LAN design guide for high-density
client environments in higher education. .," Cisco Systems Design
Guide, 2013.
|
[2]
|
F. D. &. M. H. Lim,
" A survey of problems and approaches in wireless-based indoor
positioning," In 2016 International Conference on Indoor Positioning
and Indoor Navigation (IPIN), pp. 1-7, 2016.
|
[3]
|
C. Wu, Z. Yang and Y. L.
&. W. Xi, "WILL: Wireless indoor localization without a site
survey," IEEE Transactions on Parallel and Distributed Systems, pp.
839-848, 2012.
|
[4]
|
S. Zvanovec and P. P. &.
M. Klepal, "Wireless LAN networks design: site survey or propagation
modeling?," Radioengineering, vol. 12, no. 4, pp. 42-49, 2003.
|
[5]
|
S. E. Hrastar, " U.S.
Patent No. 7,522,908," Washington, DC: U.S. Patent and Trademark
Office, 2009.
|