1 / 73

Wireless Training

Wireless Training. Wireless Basics DHCP Basics Wireless Network Topology and the LAN Wireless Configuration Parameters Operating System Configuration. Panther Tiger Windows AP Behavior Troubleshooting Techniques Airespace ACS Training. The Frequency Spectrum.

clover
Download Presentation

Wireless Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Training • Wireless Basics • DHCP Basics • Wireless Network Topology and the LAN • Wireless Configuration Parameters • Operating System Configuration. • Panther • Tiger • Windows • AP Behavior • Troubleshooting Techniques • Airespace ACS Training

  2. The Frequency Spectrum 802.11 in Relation to the Spectrum Howstuffworks.com Walkie/Talkie Cell phones Pagers Cordless Phones Garage Door openers Radio controlled toys Access Points Blue Tooth Transmitters Microwave Ovens Cell phones Cordless Phones • 802.11 (ISM) • Unlicensed/Regulated Frequency Band • FCC Regulates • Frequency open to public use - no license required • Max Power Requirements

  3. Radio Frequency RF The Signal 802.11 Standard Howstuffworks.com FCC provides gives 90Mhz of spectrum for use 2.5GHz 2.41GHz 9 1 6 11 22 Mhz per Channel 11 Channels 2.5GHz 2.41GHz

  4. Interference Any RF Device Transmitting in 2.46GHz Frequency Range Can Interfere • Microwave Oven • Cordless Phone • Another Access Point • Bluetooth Telephones Signal / Noise. dB Signal High / Noise Higher Signal High / Noise Low AP Close To Unwanted Devices in the room Signal Low / Noise High AP is Far and Unwanted Transmitters Close Good Not so good -10dBm -108dBm

  5. The Standard 802.11 What The Heck Is 802.11 Anyway The following IEEE Standards and task groups exist within the IEEE 802.11 working group: * IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard (1999) * IEEE 802.11a - 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001) * IEEE 802.11b - Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999) * IEEE 802.11c - Bridge operation procedures; included in the IEEE 802.1D standard (2001) * IEEE 802.11d - International (country-to-country) roaming extensions (2001) * IEEE 802.11e - Enhancements: QoS, including packet bursting (2005) * IEEE 802.11F - Inter-Access Point Protocol (2003) Withdrawn 2005 * IEEE 802.11g - 54 Mbit/s, 2.4 GHz standard (backwards compatible with b) (2003) * IEEE 802.11h - Spectrum Managed 802.11a (5 GHz) for European compatibility (2004) * IEEE 802.11i - Enhanced security (2004) * IEEE 802.11j - Extensions for Japan (2004) * IEEE 802.11k - Radio resource measurement enhancements * IEEE 802.11l - (reserved, typologically unsound) * IEEE 802.11m - Maintenance of the standard; odds and ends. * IEEE 802.11n - Higher throughput improvements * IEEE 802.11o - (reserved, typologically unsound) * IEEE 802.11p - WAVE - Wireless Access for the Vehicular Environment (such as ambulances and passenger cars) * IEEE 802.11q - (reserved, typologically unsound, can be confused with 802.1Q VLAN trunking) * IEEE 802.11r - Fast roaming * IEEE 802.11s - ESS Mesh Networking * IEEE 802.11T - Wireless Performance Prediction (WPP) - test methods and metrics * IEEE 802.11u - Interworking with non-802 networks (e.g., cellular) * IEEE 802.11v - Wireless network management * IEEE 802.11w - Protected Management Frames * IEEE 802.11x - reserved * IEEE 802.11y - Contention Based Protocol

  6. Connection Speeds Vs Range Range and Connection Speeds are Directly Related Dynamic Shift Rate Maximum speeds are 54, 22,11,5.5, 2, 1 Divide the speeds roughly in Half for Actual Speeds 100Ft 22/12Mbps Trans/Actual 300Ft 2/1Mbps Trans/Actual 175Ft 11/6Mbps Trans/Actual 200Ft 5.5/ 2 Mbps Trans/Actual 50Ft 54/23Mbps Trans/Actual 375 FT > 1/.6Mbps Trans/Actual Facility Construction materials can chang the speeds dramatically even when close to the AP Glass - Best Penetration Plastic - Good Penetration Wood - Ok Penetration Concrete - Limited Penetration Metal- Worst Penetration

  7. Wired VS Wireless Connections Wireless is NOT a replacement for wired

  8. Slow Talkers Slow Talkers Effect all Users Connected to the Access Points and Neighboring APs Fast Talkers 54 Mbps Fast Talkers 54 Mbps APs Listen to each other Slow Talker 802.11b 11b Mbps Both Aps were running at 54 Mbps. Slow Talker Reduced Both APs to 22 to wait for slow talker

  9. Dynamic Load Balancing Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria, carts Labs)…

  10. Real - Time RF Management Dynamic Channel Assignment Dynamic Power Optimization RF channel “1” RF channel “6” RF channel “11”

  11. DHCP Basics • Overview • What is DHCP? • Why use it? • How does it work? What is DHCP? DHCP allows a host to learn its configuration parameters from a server. It automates IP configuration, making it much easier to connect to a network. It allows re-use of IP addresses. • Why use DHCP? • Visitor convenience • Speeds setup of new machines • Simplifies conference room connections • Allows roaming laptops • Centralizes IP management

  12. DHCP Basics • How does DHCP work?1. Server discovery • Client DHCPDISCOVER packet asking “Who can give me DHCP information?” Hello • 2. Servers make an offer • All servers on the subnet unicast a DHCPOFFER packet saying “I can supply you with DHCP information, if you like.” What Do You need • 3. Client requests • The client selects one of the responses, and broadcasts a DHCPREQUEST packet saying “I choose server XYZ. Server XYZ, here’s my MAC address, what’s my IP address?” Give Me An Address • The unchosen servers treat this as a rejection. • The request can specify a preferred IP address, if the client has a preference. • The request can ask for additional information. • 4. Server responds Here It is and for How long • The server responds with a DHCPACK packet saying “Here is your IP address. It’s good for 24 hours.” • The response can contain additional information, if the client asked for it. • The server records that the IP address is in use. • 5. Client releases You Can Have it Back • The client finishes it’s work, and send a DHCPRELEASE packet saying “I’m done with the IP address.” • The server records that the IP address is not in use.

  13. DHCP Basics • Clients refresh leases • When half the lease time has expired, a client broadcasts another DHCPREQUEST packet saying “I choose server XYZ. Server XYZ, I want IP address N. Can I have it?”. The server responds yes or no. • Servers can refuse • If a server can’t supply an unused IP address, or if the server can’t supply an IP address that matches the client’s MAC address, the server sends a DHCPNAK packet saying “you can’t have an IP address”. The client is then free to make another request. • Clients preserve addresses • A client can remember its last-used IP address in non-volatile memory. When it boots, it can request the address from the server. This improves the chances that a client will retain the same IP address over long periods of time.

  14. DHCP Basics Network Parameters IP Address Tracking Management Scope size Lease Times Exclusion Area Reservations • What DHCP can provide • IP address and lease time • subnet mask • default route • DNS, NIS, LPR, NTP, logging server(s) • WINS NBNS node type • More • Static vs. dynamic addresses • DHCP servers manage two kinds of IP addresses: • o Static IP addresses, which the server gives to clients • based on the client’s MAC address • o Dynamic IP addresses, which the server gives to • clients as requested. These come from a “pool” of • addresses in a subnet, set aside for this purpose

  15. DHCP Basics Client Address Leases

  16. DHCP Basics Typical Client Parameters Provided Typical DHCP Properties

  17. DHCP Basics Reservations Exclusion Areas

  18. Complete Site DHCP Service SBBC Dynamic Host Control Protocol (DHCP) Network Standard Elementary/Middle/High Primary Wired VLAN: 10.x.192.1 10.x.128.1 10.x.193.255 10.x.129.255 10.x.194.1 10.x.130.1 10.x.198.255 10.x.134.255 10.x.199.1 10.x.135.1 10.x.199.254 10.x.135.255 Static IP Addresses (510 Addresses) DHCP Wireless Clients (1020 Addresses) Reserved Network Equipment (255 Addresses) Elementary/Middle/High Primary Wireless (176) VLAN: 10.x.176.1 10.x.112.1 10.x.176.255 10.x.112.255 10.x.177.1 10.x.113.1 10.x.188.255 10.x.125.255 10.x.189.1 10.x.126.1 10.x.191.254 10.x.127.254 Static Printers and Servers (255Addresses) DHCP Wired Clients (3060 Addresses) Backup DHCP Server (764 Addresses) • Elementary Schools without VLANs) : • ETS will eventually establish Wireless VLANS in all Elementary Schools.

  19. Limited Site DHCP Service SBBC Dynamic Host Control Protocol (DHCP) Network Standard Elementary Primary Wired LAN: DHCP Lease 60 Days 510 DHCP Ip Addresses 10.x.192.1 10.x.128.1 10.x.196.255 10.x.132.255 10.x.197.1 10.x.133.1 10.x.198.255 10.x.134.255 10.x.199.1 10.x.135.1 10.x.199.254 10.x.135.255 Static IP Addresses (1530 Addresses) DHCP Wireless Clients (510 Addresses) Reserved Network Equipment (255 Addresses) Middle/High Primary Wireless (176) VLAN: DHCP Lease 60 Days 3060 Ip Addresses 10.x.176.1 10.x.112.1 10.x.176.255 10.x.112.255 10.x.177.1 10.x.113.1 10.x.188.255 10.x.125.255 10.x.189.1 10.x.126.1 10.x.191.254 10.x.127.254 Static Printers and Servers (255Addresses) DHCP Wired Clients (3060 Addresses) Backup DHCP Server (764 Addresses) • Middle/High Non-Standard DHCP Scope VLAN (192 Subnet) : • Micro scopes were created on Hard Wired Networks to support Wireless Media Center Project • ETS have authorized the continuation of these micro scopes at the Tech’s request • Various scopes created by Site Techs Prior to Refresh Initiative have remained at Sites Request

  20. Wireless Network Topology Physical Connection AP No Appletalk Over Wireless School LAN Application Server AP AP DHCP Server Airespace Switch R Wan • APs are connected to a rack anywhere in the facility. • APs are powered up using Power Over Ethernet. • AP Cart plug into any Data Quad and power up from any power source. ETS Airespace Control System

  21. Wireless Network Topology Virtual Connection AP Airespace Switch School LAN Application Server AP AP DHCP Server R Wan 1. Access Points Seek out and finds the Airespace switch using a special tunneling protocol called LWAP. 2. Using parameters from the switch, it boots up and operates in 30 seconds. 3. Every access point is the same throughout the LAN. • WLAN service delivery • RF management • Encryption/authentication • Wireless prevention/protection • Location tracking • Capacity Management • Centralized management • Dynamic Control Airespace Control System ETS

  22. Wireless Network Topology Wireless Client Perspective Airespace Switch 10.x.192/176.1 SBBC WEP School LAN Future BCPS 802.1x Guest Web auth DHCP Server Application Server • The switch can be programmed with many Network names. All access points transmits these network names. • Network Name (SSID) Closed Broadcast ( Cant See the Network Name under the “Available Wireless Networks” Window. • Authentication: • WEP authentication encrypts data going across the airwaves so intruders can not snoop and reconstruct the packets intelligibly. • WEP is either set to be shared or can run open mode. • Open (Airespace): If user gets SSID right but WEP wrong a connection will be displayed but access will not be provided. • Shared (Apple Basestation): User must have both correct to show a connection. • 128 Bit Vs 40 bit. • 128 Bit 13 Characters (ASCII) 26 Characters Hex • 40 Bit 5 Characters (ASCII) 10 Characters Hex • 802.1x: Uses a Key loaded in each client device and in a special server (RADIUS) located at the site. Wireless Switch checks the network name and sends client information to RADIUS server to compare the key for authentication then checks the client’s username and password for authenticity. • Web Authentication: Passwords are added to the switch. Users must load the appropriate network name, then open a browser to authenticate the password list on the switch.

  23. Wireless Network Topology Kiosk One or Two Cells of coverage in a small area such as the media center will provide bandwidth managed connectivity exactly where it is needed.

  24. Wireless Network Topology Overlay Overlapping Cells of coverage spread out throughout the building to connect entire buildings wirelessly. Services roaming clients. Generally 10 – to 15 devices per AP with low bandwidth needs.

  25. Wireless Network Topology One-To-One Overlapping Cells of coverage installed in close proximity and mounted throughout all rooms the facility and servicing users with medium to high bandwidth needs. When the airespace switch detects high loads on one access point it will transfer some clients to other AP to share the load.

  26. Wireless Network Topology Best Practices Ceiling Mount 1 Floater 2 Floaters 2 floaters can be used in areas where there is no infrastructure supported and heavy bandwidth requirements are needed. Ceiling Mount will share the work load with floater on cart. When floater is pulled out of the room ceiling mount still provides connectivity to teachers staff and students

  27. Wireless Configuration Device Configuration See the local LAN Administrator Instructions: http://Web/wireless

  28. Apple Wireless OS/10.3x • Configuration of Panther • Student Setup • Specific Setup • Step 1. System preferences • Step 2. Network Preferences • Step 3 Click on location dropdown • Step 4 Select new location • Step 5 Type in the name

  29. Apple Wireless OS/10.3x • Configuration of Panther • Student Setup • Specific Setup • Step 6. Select Airport Tab • Step 7. Select “by default • Join by” in dropdown box • Step 8. Enter “SBBC” in • Network name box and • the password in the password • Box • Step 9. Deselect “Allow this • Computer to create networks”

  30. Apple Wireless OS/10.3x • Configuration of Panther cont’d • Student Setup • Specific Setup • Step 10. Click on TCP/IP • Step 11. Enter the Ip • Parameters as per site • Requirements dictate • Step 12. Click on Proxies • Tab • Step 13. Use • Site specific proxy • Settings

  31. Apple Wireless OS/10.3x • Configuration of Panther Cont’d • Staff Setup • Automatic Setup • Step 1. System preferences • Step 2. Network Preferences • Step 3 Click on location dropdown • Step 4 Select new location • Step 5 Type in the name

  32. Apple Wireless OS/10.3x • Configuration of Panther Cont’d • Staff Setup • Automatic Setup • Step 6. Select Airport Tab • Step 7. Select “Automatic” • in dropdown box • Step 8 Deselect “Allow this • Computer to create networks”

  33. Apple Wireless OS/10.3x • Configuration of Panther Cont’d • Staff Setup • Automatic Setup Step 9: Click on the Airport Icon. Step 10: Toggle down and click on Other. The Closed network box appears. Step 11: Select the Wireless Security Drop down box and check WEP 40 / 128-bit ASCII If you have version O/S 10.2. x Select 128 ASCII bit encryption Step 12: Enter the Network Name in the Network Name Box and type in the Password in the Password Box. If you don’t know the network parameters contact your site tech and Service Desk for details

  34. Apple Wireless OS/10.3x • Configuration of Panther Cont’d • Staff Setup • Automatic Setup Step 13: Enter the Network Name in the Network Name Box and type in the Password in the Password Box. If you don’t know the network parameters contact your site tech and Service Desk for details Step 14: Click OK Step 15: Check the wireless Icon to be sure it appears bolded with at least three bars. 5 bars is the best signal. 1 bar indicates poor signal strength.

  35. Apple Wireless OS/10.3x • Configuration of Panther Cont’d • Staff Setup • Automatic Setup • Step 16. Click on TCP/IP • Step 17. Enter the Ip • Parameters as site • Requirements dictate • Step 18. Click on Proxies • Tab • Step 19. Enter • tssproxy.broward.k12.fl.us • Type 8888 • In the second box

  36. Apple Wireless Training • Configuration of Tiger • Summary: Configure wireless client devices based upon the user. • Student Cart Laptop setup • Configure devices for the wireless cart AP. It could be the SBBC network or a site specific AP. • Set a specific network name and password and set up one location setting. • DHCP is site specific. ETS is handling all DHCP transitions. • Staff • Configure devices with multiple locations • Where ever possible use automatic configuration. Uses the Plist file in preferences folder

  37. Apple Wireless Training • Configuration of Tiger Cont’d • Student Setup • Specific Setup • Step 1. System preferences • Step 2. Network Preferences • Step 3 Click on location dropdown • Step 4 Select new location • Step 5 Type in the name

  38. Apple Wireless Training • Configuration of Tiger Cont’d • Student Setup • Specific Setup • Step 6. Select Airport Tab • Step 7. Select “by default • Join by” in dropdown box • Step 8 Enter “SBBC” in • Network name box and • the password in the password • Box • Step 9 Select ‘Options’ • to set require admin password

  39. Apple Wireless Training • Configuration of Tiger Cont’d • Student Setup • Specific Setup • Step 10. Click on TCP/IP • Step 11. Enter the Ip • Parameters as per site • Requirements dictate • Step 12. Click on Proxies • Tab • Step 13. Use • Site specific proxy • Settings web broward.k12.fl.us

  40. Apple Wireless Training • Configuration of Tiger Cont’d • Staff Setup • Automatic Setup • Step 1. System preferences • Step 2. Network Preferences • Step 3 Click on location dropdown • Step 4 Select new location • Step 5 Type in the name

  41. Apple Wireless Training • Configuration of Tiger Cont’d • Staff Setup • Automatic Setup • Step 6. Select Airport Tab • Step 7. Select “Automatic” • in dropdown box • Step 8 Select ‘Options’ • To set admin password

  42. Apple Wireless Training • Configuration of Tiger Cont’d • Staff Setup • Automatic Setup Step 9: Click on the Airport Icon. Step 10: Toggle down and click on Other. The Closed network box appears. Step 11: Select the Wireless Security Drop down box and check WEP 40 / 128-bit ASCII

  43. Apple Wireless Training • Configuration of Tiger Cont’d • Staff Setup • Automatic Setup Step 12: Enter the Network Name in the Network Name Box and type in the Password in the Password Box. If you don’t know the network parameters contact your site tech and Service Desk for details Step 13: Click OK Step 14: Check the wireless Icon to be sure it appears bolded with at least three bars. 5 bars is the best signal. 1 bar indicates poor signal strength.

  44. Apple Wireless Training • Configuration of Tiger Cont’d • Staff Setup • Automatic Setup • Step 15. Click on TCP/IP • Step 16. Enter the Ip • Parameters as site • Requirements dictate • Step 17. Click on Proxies • Tab • Step 18. Enter • tssproxy.broward.k12.fl.us • Type 8888 • In the second box web broward.k12.fl.us

  45. Apple Directory Access Configure SMB Step 1. Open Directory Access in the utilities directory. Step 2. If your not logged on with Admin privileges click the “lock” in the bottom left corner of the Directory Access window and enter in the Admin user name and password of the local machine. Click OK

  46. Directory Access Configure SMB Step 3. Make sure SMB is Checked Step 4. Highlight SMB and click configure. Step 5. In the workgroup drop down box, select ETS. Step 6. In the wins server Box type, in 10.251.192.91 Step 7. Click on OK. Step 8. Click Apply and click the lock to prevent further changes Step 9. Close the Directory Access window.

  47. Directory Access Connect to the Network Step 10. Click on the Desktop or Finder Icon Step 11. Click on Go in the menu and select Connect to Server

  48. Directory Access Connect to the Network Step 12. Click on the Desktop or Finder Icon Step 13. Click on Go in the menu and select to Server. The “Connect to Server” Window Will Appear. Step 14. Click Browse, the Network Icon will appear. Step 15. Click on the Network Icon in the Network Window Step 16. Scroll through the domain Name list to find your resources.

  49. OSX 10.x IP Printing Configuration Summary: IP printing is the ability for a printer to use TCP/IP protocols (such as LPD/LPR, IPP, or Socket or Jet Direct) to make itself accessible to your computer. If the printer you want to use is not listed when you print, you can add it to your list of available printers. To add an printer using IP, you need to know its IP address or DNS name. See your network administrator for assistance. Step 1. Open System Preferences on the Doc or Blue Apple and click the Print & Fax Icon. Step 2. Click Printing tab, and then click the Set Up Printers button. Step 3. Click the Add Printer Icon in the printer list. Step 4. Choose IP Printing from the pop-up menu. Step 5. Select Internet Printing protocol from the Printer Type pop-up menu. Step 6. Type the IP address for the printer in the Printer Address field. If the printer IP address is not marked ask your Tech Specialist. Step 7. Type in a recognizable name into the Queue Name field.

  50. OS 10.x IP Printing Configuration Step 8. Choose the brand of printer appropriate for your printer from the Printer Model pop-up menu, then select your printer in the Model Name list. Step 9. Click Add. The printer appears in the Printer List as the default printer (in bold type). It also appears in the Printer pop-up menu when you print a document.

More Related