TM 585 Final Project Revision) DonaldsonR

20
Ronald Donaldson D03554630 TM585 Tahereh Daneshi DeVry University-Online Oct. 25 th – Dec 21 st December 12 th , 2010

Transcript of TM 585 Final Project Revision) DonaldsonR

Page 1: TM 585 Final Project Revision) DonaldsonR

Ronald DonaldsonD03554630TM585Tahereh DaneshiDeVry University-OnlineOct. 25th – Dec 21st

December 12th, 2010

Page 2: TM 585 Final Project Revision) DonaldsonR

Introduction(100-User Wireless LAN-Design & Implementation Analysis)

In this document, I will endeavor to provide a written analysis concerning the

design and implementation of a wireless LAN (WLAN) for a firm comprised of one

hundred employees. In illustration of the WLAN design, I will make reference to several

sources regarding any related content that I’ve found to be pertinent and of practical

benefit to this document’s purposes, not least of which is “Top-Down Network Design”,

by Priscilla Oppenheimer, an instructional text detailing a method of network design

that’s based upon what can be readily found evident throughout the overall networking

community to be the most logical and efficient sequence of steps necessary in the

creation of a network. Having stated this, it is of value for the reader to know that the

aforementioned sequence of steps, as examined in Oppenheimer’s work, will correspond

closely to the order of WLAN design and management issues that are addressed in this

document, and can be followed up by way of documentation found under the same title

and author at the end of this article.

The major design and management issues found unique to a WLAN involve those

pertaining specifically to the transmission and reception of radio frequency (RF) waves.

For example, there is the strategic placement of access points (AP), which are devices

designed to send and receive radio signals between nodes. This, in turn leads to a

consideration of any possibility of physical materials that may be found that could hinder

radio signals between APs, which will here be replaced by a ‘worst case’ factoring.

Page 3: TM 585 Final Project Revision) DonaldsonR

Protocols and standards dealing with wireless technology are also unique, as they

correlate directly to WLAN characteristics. In support of wireless communications,

physical wiring is also necessary, as the WLAN must at some point connect to a WAN.

Obviously, there are more wireless topics than are practical to mention in these few

opening lines. The point is, encompassed here within the following pages, presented with

thorough detail and explanation, are all of the elements necessary in order for the

sufficient insight and understanding of designing, implementing, and managing a WLAN

of the specified parameters. Lastly, as with any good LAN design, efforts have been

made to acknowledge the critical need for sustaining scalability and expandability.

Problem Statement(Network Design & Management Concentrations)

After careful and prolonged consideration of the prescribed ‘Terminal Course Ob-

jectives (TCOs)’, which serve to illustrate the primary elements and principal divisions of

concentration most suitably related to network design, I’ve had trouble only in choosing

which TCOs not to include within the subject matter of central focus. This due largely to

the overlapping and complementary nature of networking topics in general. At length, the

scope of this analysis has been refined within the context of TCO-B, concerning the ideal

formulation and configuration of a network that facilitates optimal performance, and

TCO-F, regarding the elements of a strategy found sufficient for fostering a maximum

state of security within a WLAN. Bear in mind, issues addressed here will necessarily in-

volve topics specific to other TCOs. Consequently, the integrated nature of their contents

requires they are at least made mention of, if only in connection to those of central focus,

otherwise, they will be given no priority.

Page 4: TM 585 Final Project Revision) DonaldsonR

The intention here, is to present the most plausible method and means by which

the specified WLAN may be configured, so as to be conducent to both performance and

security, as it could be argued, an optimal state of these combined network attributes

might afford management’s efforts with the space necessary from which to iron out and

overcome any adjunctive issues that may inevitably arise.

Analysis(Network Design Methodology, Variability, & Attribution)

As mentioned in the introduction, the concept flow of this document will follow

the top-down approach to network design. More specifically, as a form of structured de-

sign, the top-down approach is described by Oppenheimer, P., as “focusing on the re-

quirements, applications, and a logical structure before the selection of physical devices

and products to implement the design.” Accordingly, having identified the network as

wireless has filled a portion of the requirements already. The idea is simple, you can’t

know what would be best to use until you know exactly what it is your using it for, and so

the rationale behind this paper’s organization follows suit. Unfortunately, the greater part

of this WLAN presents the difficult challenge of omitting value from the majority of vari-

ables that are present, but thankfully, there’s a simple and effective means of dealing with

this, which will be discussed at greater length below. With this in mind, the general se-

quence of presentation and concept flow isn’t disrupted, and the underlying structural

current of thought throughout this document will proceeded naturally, top-down.

Page 5: TM 585 Final Project Revision) DonaldsonR

Serving as a supplemental concept to clearly interpreting the content and method-

ology behind the WLAN’s design, the sequence of decisions made throughout the top-

down approach utilized here coincides also with a more generalized life-cycle-develop-

ment process, characterized by the following four steps: of I.) Analyze the requirements,

II.) Develop the logical design, III.) Develop the physical design, and IV.) Test, optimize,

and document the design. (Oppenheimer, P.). While adhering to these structural aids,

(Top-Down Network Design and Life-Cycle-Development-Process) let us move now

within view of the first variables entering into the realm of consideration, as they are

found relating to the piecing together of a wireless local area network.

۞ Analyzing the Requirements ۞

The top-down method of design begins with an analysis of the business and tech-

nical goals that are associated with the network. Here there is ample breathing room as,

the only specifications that have been mentioned are the size of the network, (100 em-

ployees) and the fact that it utilizes wireless technology as a pivotal means of data trans-

mission. A note before moving on; I’ll not be attempting to speculate about the nature of

the firm’s operations, which my client desires to implement the WLAN for. However, it

may be beneficial to use examples to illustrate certain technical ideas. Having said that, in

addition to the established attributes of size and wireless capability, further dimensional-

ity to the network is provided by the chosen TCOs upon which we will focus, i.e., perfor -

mance and security. With no recourse to the intended use of the network, performance

and security will be applied in the most literal sense.

Page 6: TM 585 Final Project Revision) DonaldsonR

For example, in the interest of performance, every provision is made to ensure

the best possible performance of the WLAN within the specified parameters. This will

present certain challenges in regards to the second priority, security, which will also be

given precedence over anything not explicitly pertaining to either itself or performance.

In other words, ease of use and budget will be of secondary importance, and will only be

accommodated insomuch as they relate to either performance or security. So too will fol-

low, in the order of priority, all other issues. Already, we have run into several resultant if

not discrete contrasts between the central and decisive variables identified. In response to

the first major phase of the top-down design model, researching the client has been cut

short by the fact that we don’t know a great deal about what the network will be used for,

nor do we have details concerning the organization in general.

What we do know however is that despite the unnamed specifics, it can be as-

sumed that the business is either a remote and relatively isolated branch of a larger orga-

nization, or a relatively small company being comprised of only one hundred employees.

Also, we know that wireless communications are essential, so in the absence of precise

details to characterize the nature of those communications, our network must offer the

most scalable and proficient solution to the entire range of potential wireless applications

and environmental contexts. In my calculations regarding which applications and services

will be running over the WLAN, I can do little more than assume in each instance, that

the equivalent of a ‘worst case scenario’ is true. Provisions must be made for a state of

exemplary performance to exist under even the most demanding of circumstances, but

also with recourse to multiple applications of similar demand.

Page 7: TM 585 Final Project Revision) DonaldsonR

The above, may induce contrasting and thus difficult criteria, which will in turn

end up forcing the pressing trade-off decisions of performance between applications.

Though the model of reference here is the ‘worst case scenario’, for determining the pri-

ority of decisions which force trade-offs in performance between applications, I will en-

deavor to lean in the direction of what is most typical or commonly demanded, but only

where necessary will the priority of any one characteristic be held above another, as in the

anticipated instance of security vs. performance. In this case I must succumb to assigning

the TCOs themselves with priority, and will do so according to the order in which I chose

them (performance before security). Out of necessity, where a single solution that allows

for both optimal performance and security on the WLAN cannot be implemented, I will

resort to the aforementioned order. In either case, the primary objective for design and

implementation here is to be prepared for anything, and to provide ideal performance and

security in the face of it. At last, in addition to providing a design sufficient for optimal

performance and security, due considerations of future requirements must be taken into

account, which includes those topics pertaining to continued optimization through an ini-

tial state of scalability.

۞ Developing the Logical Design ۞

The primary difficulty in designing a WLAN for an organization without having

reference to the details and dimensions of the physical location’s characteristics, is that

there is little that can be done by the way of a site survey. To counter this shortcoming, it

must be assumed that there will be significant, if not drastic interference experienced by

an intervening wireless signal.

Page 8: TM 585 Final Project Revision) DonaldsonR

To that extent that, by accounting ahead of time for such obstacles, the degree to

which the impact from an actual instance of interference would be felt can be kept at a

minimal. By preparing the WLAN, in each scenario, for the worst, most of the impact

from indefinable variables will be absorbed before occurring, and if the worst doesn’t oc-

cur, than all the better for the network. To reiterate, this is the general angle of attack for

all unforeseeable variable relationships and interactions.

The first variable that needs to be addressed is network layer addressing, and

along those lines, the WLAN will utilize an internal DHCP server (D-Link DWS-4026),

as specified by Cisco.com, to be a viable fit. In order that the highest state of organiza-

tional, not to mention network, efficiency is adopted, a high level implementation of

structured addressing management will be necessary to avoid duplicate or dead address-

ing space. Addressing will be assigned on the basis of both public and private classifica-

tions, as a state promoting the highest degree of scalability, though public addressing only

in designated and controlled instances, whereas Network Address Translation is imple-

mented with the private addresses. (Oppenheimer, P.).

After having settled matters pertaining to addressing and naming, switching and

routing protocols are to be defined, on the basis of what the network’s anticipated opera-

tions will be characterized by. Here, WLAN characteristics are kept intentionally open-

ended; to account not only for a lack of specified network parameters, but also for the

highest degree of scalability, while maintaining optimal performance and security.

Network Layer Addressing & Naming

Network Layer Switching & Routing

Page 9: TM 585 Final Project Revision) DonaldsonR

Among variables factored into consideration here are network traffic characteris-

tics, bandwidth, memory, CPU usage, adaptability capacity, and general functionalities as

relate to performance and security. To begin, the WLAN will utilize a mesh topology as,

in the case of a relatively small network, (about 100-users) costs won’t be an issue, while

mesh networking offers the most reliable and scalable configuration, thus providing high

resiliency, which in turn factors into performance.

Because link-state routing protocols dictate sending and receiving of entire net-

work routing topology maps in addition to the pertinent sections of a routing table, link-

state routing is highly conducent to mesh networking. All attributes of the WLAN thus

far foster a very open and integrated functionality with all nodes connected, communicat-

ing with every other node through link-state routing, OSPF (Webopedia). adoption being

amongst the best known routing solutions of this kind, the way is paved for very fast and

very reliable routing and addressing, as well as any other matters dealing with perfor-

mance on a physical basis. Because each node bears the same connection potential in ev-

ery aspect, very little impact will be felt in the event of an emergency. (Dynamic Routing

Protocols). Also, the cost of OSPF is of no consequence here.

Due to the small size of this WLAN, as mentioned in “Top-Down Network de-

sign” it will be of benefit here to keep the entirety of all users within the WLANs own

subnet. This is said to be conducent to both security and management fluency due to the

heightened ease with which traffic filtering may be accomplished. (Oppenheimer, P.).

Network Security Planning

Page 10: TM 585 Final Project Revision) DonaldsonR

Utilizing the IEEE 802.11 standard, the WLAN is provided with the capacity to

use authentication at access points. By this measure, the degree of unauthorized network

traffic is controlled, and the risks to outside threat are minimized. (Oppenheimer, P.).

WPA2 is also advisable, being the latest and strongest encryption algorithm, supporting

Multiple in Multiple out (MIMO) technology, which is a means for ensuring the potential

of significantly stronger signal capacity, than non-MIMO technologies.

Bearing the trusted seal in all things ‘network’, Cisco certainly stands out ahead

of the pack as a strong consideration. Other Viable Options include Intel and D-Link.

While it is difficult to get a definite price on any kind of service agreement without call-

ing in for a quote, Cisco has stood the test of time not only defending its name against

competitors, but in customer satisfaction as well.

Implementation Suggestions(Physical Design Components and Configuration)

To conclude this document, ending comments will pertain to the general physical

implementation of the WLAN. Using a wireless mesh configuration that caters to one

hundred employees, the Cisco Aironet 1250 Series, though capable of accommodating as

many as 800 MAC addresses, would be more practical if place one per twenty five em-

ployees. This way, not only is there ample room for expansion, but also the existing traf-

fic requirements, whatever they may be, will be sufficiently accommodated and well

within range of 100% signal strength throughout. (Cisco.com).

WAN Providers

Page 11: TM 585 Final Project Revision) DonaldsonR

Having already mentioned the Cisco DHCP server model, DWS-4026, integrated

with the link-state OSPF routing protocol, there should be adequate functionality accom-

modations even for the most demanding traffic loads, as the combination of elements

here suggests a perfect interoperability. Adding to this general architecture the security

outlay discussed earlier and the way is paved for an optimally functioning wireless LAN,

well within means to perform ideally under harsh and/or uncertain conditions. A self con-

tained WLAN subnet acts as the most efficient means of firewall implementation without

sacrificing any notable degree of performance whatsoever. There you have it. Impervious

performance, impenetrable security, unmatched interoperability and potential for expand-

ability.

Page 12: TM 585 Final Project Revision) DonaldsonR

References

Cisco.com. Wireless LAN Controller Configuration. Retrieved Dec 13th 2010 from,

http://www.cisco.com/en/US/docs/wireless/controller/4.1/configuration/guide/c41wlan.html#wp1108097

Cisco Aironet 1250 Series. Cisco.com. Retrieved Dec 13th 2010 from,

http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6973/ps8382/product_data_sheet0900aecd806b7c6d.html

Clarity-Counseling.com Listing of Service Providers. Retrieved on Dec. 12th 2010 from,

http://www.clarity-consulting.com/wireless_solution_providers.htm#WLAN

D-Link.com. Network Hardware. Retrieved Dec 12th 2010 from,

http://www.dlink.com/category/productcategories/?cid=17

Dynamic Routing Protocols. CS.Virginia.EDU. PDF-File. Retrieved Dec 13th 2010 from,

http://www.cs.virginia.edu/~cs458/slides/module11-ospf.pdf

Hughs, A. (2010). Wireless Security Protocols. Ehow.com. Retrieved Dec 12, 2010, from

http://www.ehow.com/list_6691649_wlan-security-protocols.html

Oppenheimer, P. (2004). Top-Down Network Design. Indianapolis, IN: Cisco Press.

Mitchell, B. “Wireless Standards” About.com. Retrieved Dec. 12th 2010 from,

http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm

Webopedia. (2010). Wireless Mesh Networks. Retrieved Dec 12th, 2010 from,

http://www.webopedia.com/TERM/W/wireless_mesh_network_WMN.html

Webopedia. (2010). Open Shortest Path First. Retrieved Dec 12th, 2010 from,

http://www.webopedia.com/TERM/O/OSPF.html

http://www.webopedia.com/DidYouKnow/Computer_Science/2006/OSPF_Routin g.asp

Page 13: TM 585 Final Project Revision) DonaldsonR