Home Page Icon
Home Page
Table of Contents for
Icons Used in This Book
Close
Icons Used in This Book
by Christopher A. L. Vinckier, Oisin Mac Alasdair, H. David Castaneda
The Business Case for Enterprise-Class Wireless LANs
Copyright
Dedications
About the Authors
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Objectives
Audience
Organization and Approach
Companion Website
1. Introduction to Wireless LAN Technologies
Value of Mobility
OSI Layers and WLANs
Layer 1: Physical Layer
Transport Medium
Topology
Data Encoding
Layer 2: Data Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
A Brief History of WLANs
How Wireless Networks Function
WLAN Modes
Ad-Hoc Mode
Infrastructure Mode
WLAN Technologies
Multiple Access Technology
Multiplex Technology
DSSS
OFDM
Duplex Technology
Access Technology
WLAN Radio Communications
Characteristics That Influence WLAN Bandwidth
Modulation
Path Loss, Power, and Antennas
Attenuation, Distortion, and Interference
Multipath
Combating External Effects
Regulatory Requirements
Different WLAN Standards
802.11b
802.11g
802.11a
Coexistence
Additional 802.11 Standards
Summary
Endnotes
2. Business Considerations
Aligning Technology Solutions with Business Considerations
Economic Considerations
Step 1: Understand Your Organizational Ecosystem
Step 2: Define the Problem That You Are Trying to Solve
Step 3: Break the Problem Down
Step 4: Define WLAN-Enabled Solution
The Role of Infrastructure
Pros and Cons of the Wired Versus Wireless World
Mobility: Pro
Convenience: Pro
Bandwidth: Con
Effect on Cost and Spending
Wired-Only LAN
Wireless-Only LAN
Hybrid Wired and Wireless LAN
Security
Challenge 1: Network Admission Control
Challenge 2: Authentication
Challenge 3: Encryption
Challenge 4: Hashing
Measuring the Business Value of Deploying Wireless
Total Cost of Ownership
Value of Ownership
Question 1: Where in the Organizational Ecosystem Can WLANs Have a Positive Impact?
Primary Activities
Secondary Activities
Question 2: How Will a WLAN Positively Influence the Identified Areas?
Quantitative Factors
Qualitative Factors
Risks
Cost-Justification Analysis
Return on Investment
Payback Period
Net Present Value
Internal Rate of Return
Summary
3. Preparation and Planning
Solutions Lifecycle
Preparation
Breadth and Scope of Deployment
Deployment Scope
Infrastructure Readiness
Connectivity
Power
Console Access
Environmental Considerations
Regulatory Restrictions or Requirements
Deployment Funding Strategies
Centrally Funded Deployment
Group-Funded Deployment
Client-Funded Deployment
Subscription-Funded Deployment
Planning
Project Stakeholders
Project Sponsor
Project Board
Program Team
Program Manager
Project Tracks
Users
User Classes
Standard User Class
Mobile User Class
Roaming User Class
Hot-Desk User Class
Guest User Class
Primary Users
Secondary Users
Other Users
Impact on Application Portfolio
The Main Application Base You Want to Use on the WLAN
Application Characteristics
The Portability of the Application Portfolio and Usage Pattern to a WLAN Environment
Scalable Architecture
Architecture’s Ability to Grow Easily to Support Additional Users and Groups
Single Points of Failure
Common Architecture That Replicates Easily Across All Sites
Security Strategy
Treating the Wireless Network as Trusted or Untrusted
Considering Wireless Security Policies
Dealing with Rogue Access Points
Define High-Level Program Plan
Estimate Resource Requirements
Estimate Budgetary Requirements
Produce Project/Program Plans
Follow Your Internal Project Lifecycle
Summary
4. Supplementary and Complementary Services
Voice
WLAN Voice Devices
WLAN Voice Implementation Challenges
Bandwidth and Latency
Quality of Service
Roaming Clients
Physical Device Attributes
Video
Types of Video Traffic
Distribution Mechanism
Timing of the Distribution
Quality of the Video Stream
WLAN Video Implementation Challenges
Quality of Service
Broadcast Transmission Medium
Managing User Expectations
Guest Networking
Business Rationale for Enabling Guest Networking
Business Agility
Security
Legal Liability Protection
Components of Guest Networking
Guest Networking Implementation Considerations
Guest Portal
Legal Disclaimers and Acceptable Use Policies
Ease of Use
Support
Logging and Auditing
WLAN Location Services
Business Rationale for WLAN Location Services
Healthcare
Manufacturing
Entertainment and Leisure
Logistics
Transport and Shipping
Components of WLAN Location Services
WLAN Location Services Implementation Considerations
Summary
Additional Resources
5. Guidelines for A Successful Architecture and Design
Architectural Considerations
WLAN Expectations
Key Components for an Effective WLAN Architecture
Determining the Goal of the WLAN
Defining the Scope of Your WLAN
Developing Your Timeframe to Deploy
Considering IT Security Requirements
Identifying the Types of Users and Devices You Want to Support
Establishing an Operational Support Structure and Process
Design Considerations
Client-to-AP Ratio
Roaming
Authentication
Performance
ESS Boundaries
Environmental Considerations
Physical Attributes of the Surroundings
RF Environment
Local Governmental Regulations
Summary
6. Wireless LAN Deployment Considerations
In-House Deployment Versus Outsourced Deployment
Internal Staff
Outsourced Resources
Architectural Milestones
Solutions Architecture
Security Posture
Deployment Dependencies
Change Management Process
Put the Supporting Infrastructure in Place
Provision AAA Capabilities
Define Security Standards and Policies
Security Standards
Security Policies
Security Procedures
Put the Support Plan in Place
Put the Communication Plan in Place
Address Regulatory Issues
Management
Managing the Infrastructure
Managing the Clients
Support
Deploying the WLAN
Pre-Deployment Tasks
Managing the Deployment
Site Data Collection and Validation
Local Infrastructure Upgrade or Modification
Firmware and Configuration Updates
Client Distribution
Shipping and Handling
Site Survey
Cabling
Access Point Installation
WLAN Controller Configuration
WLAN Controller Installation
Access Point Configuration
Testing
Client Installation
Production Launch
Deployment Checklist
Architecture
Deployment Methodology and Project Planning
Clients
Infrastructure
Deployment
Summary
7. Security and Wireless LANs
Wireless Security in Your Enterprise
Thinking Securely
Different Security Models
No Authentication, Encryption, or Hashing
Native Encryption Only
Native Authentication Only
User-Based Authentication
Machine-Based Authentication
Native Encryption and Authentication But No Hashing
Authentication and Encryption Using Overlay Security Solutions
No WLAN
WLAN Security Threats
Interception
Rogue APs
Denial of Service Attack
Wireless Security Mitigation Techniques
Encryption
WEP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Advanced Encryption Standard (AES)
Hashing
TKIP (Temporal Key Integrity Protocol)
Message Integrity Check
Authentication
802.1x
Wi-Fi Protected Access
802.11i
EAP Types
Building a Secure WLAN
Trusted Versus Untrusted Wireless Networks
Trusted WLANs
Untrusted WLANs
Define a Clear Security Posture
Define Your Authentication Mechanism
Select Your Encryption/Data Integrity Type
Establish a Password Policy
Define a Clear WLAN Security Policy
Secure Your APs
SSID
Implement a Secure Management Policy for APs
Prevent Layer 2 MAC Address Spoofing
Reduce Transmit Power to Only That Required for Coverage
Consider Directional Antennas
Physically Secure APs
Use AAA
AAA and EAP
AAA Scalability and Availability
Physically Secure the Office Space
Communicate with Your Users
Secure Wireless at Home
Ban Home Wireless on Corporate Remote-Access Equipment
Provide Corporate Support for Home Access Points
Provide Home Wireless Recommended Practices
Determine How to Support and Secure Mobile Devices
Determine How to Support and Secure Clients
Manage Clients and Client Attributes
Anti-Virus
Soft AP
Disable Ad-Hoc Mode Networking
Detect Rogue APs
Client-Based Reporting
Radio-Based Detection
Network-Based Detection
Respond to Detected Rogue APs
Remove
Reclassify
Remediate
Consider Using Intrusion Detection Systems
Summary
8. Management Strategies for Wireless LANs
Solutions Lifecycle
Management Strategies
In-House WLAN Management
Outsource WLAN Management
FCAPS
Fault Management
Configuration Management
Accounting Management
Performance Management
Security Management
Where FCAPS Fails
Comparing Centralized and Distributed Management
WLAN Management
RF Management
Host Management
Client Management
Challenges Unique to WLAN Management
Dynamic Nature of the Transport Medium
Mobility of Endpoints
Intermittent Connectivity of Mobile Endpoints
Diverse Nature of Wireless Endpoints
Security Settings Management
Third-Party Wireless Software
Centralized Self-Service Model
Standardization
Manual Process
WLAN Reporting and Alerting
Standard/Systematic Reports
Trending
Alerts
Management Tools
Vendor-Specific WLAN Management Tools
Third-Party WLAN Management Tools
Common Network Management Platforms
Common Network Management Protocols
SNMP
Syslog
NetFlow
RADIUS Accounting
IP Traffic and Analysis Features in Network Equipment
Internally Developed Tools
Summary
9. Enterprise Case Study
Business Model
Defining the Business Case
The Strategic Value
Technology Considerations
Architecture Principles
Topology
802.11 Wireless Networking Standards
Client-to-AP Ratio
Signal Strength
Roaming
Radio Cell Architecture
Global Naming Standards
Cisco Aironet Access Points
Cisco Secure Access Control Server (ACS)
Network Management
Client Management
Service and Support
Cisco Support Team
Cost of Support
Enhanced Services
Wireless Voice Services
Wireless Guest Networking
Security
Deployment and Implementation
Site Survey
Cabling
Access Point Configuration
Testing
Distribution of Wireless Network Cards and Instructions
Ongoing Project Management and Process
Business Benefits of the Solution
What the Future Holds
Modular Architecture: Centralized and Autonomous APs
Enhanced Security
Location-Based Services
Outdoor Wireless
Summary
Endnotes
10. Healthcare Case Study
Business Model
Defining the Business Case
The Strategic Value
Technology Considerations
Architectural Principles
WLAN Design
Guest Networking
RF and Interference
Disaster Recovery
Network Management
Security
Project Management and Process
Deployment and Implementation
Site Survey
What the Future Holds
Tracking and Telemetry
Radio Frequency Identification (RFID)
Summary
11. Manufacturing Case Study
Business Model
Technology Considerations
Security
Coverage
Throughput
Deployment
What the Future Holds
Guest Access
Voice over IP
Rogue Access Point Detection
Summary
12. Education Case Study
Business Model
Architectural Principles
Topology
802.11 Wireless Networking Standards
Access Point Settings
Signal Strength, Antennas, and Outdoor Coverage
Radio Cell Architecture
Global Naming Standards
Wireless Equipment
Network Management
Service and Support
Tier 1: Information Services
Tier 2: Element IT and Learning and Environment Department
Tier 3: Network and Communication Services
Client Management
Security and Rogue AP Detection
Deployment and Implementation
Deployment Phases
Site Survey
Cabling
Access Point Configuration
Testing
Ongoing Project Management and Process
Challenges
Lessons Learned and Recommendations
Sort Out Support Up Front
Build a Solid and Well-Tested Architecture
Understand Your Users
Establish a Web Portal
Integrate the Solution into Existing Business Processes
Measuring the Benefits
What the Future Holds
Summary
A. Wireless LAN Standards Reference
B. Wireless LAN Security References
Cisco Resources
Cisco SAFE
General Wireless Security Information
Cisco-Specific EAP Protocols
WEP
WPA
WPA2
802.1x
EAP Types
Vulnerabilities
C. Example Project Plan for an Enterprise-Class WLAN Deployment
Company Background
The Project Plan
Business Issues
Discovery
Architecture
Design
Testing
Logistics
Pilot
Communications
Support
Deployment
Post Project Activities
Summary
Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Acknowledgments
Next
Next Chapter
Command Syntax Conventions
Icons Used in This Book
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset