You are on page 1of 19

WHITE PAPER

Deploying
802.11
Wireless
LANs
Deploying 802.11 Wireless LANs

Executive Summary structure, which will help satisfy the


needs of your network users more easily.
This paper demonstrates how you can
successfully deploy Wi-Fi wireless
LANs (WLANs) within your company. Business Drivers
It illustrates the business drivers and
the tangible benefits that you can real- Increased Productivity
ize. In addition, this paper examines WLANs enable workers to be more
issues involved in deploying wireless productive with access to the Internet,
networks to help you make the right e-mail, and network files wherever
decisions when planning and purchas- they are in the business campus. This
ing a WLAN solution. Whether you are is especially useful when working
adding wireless extensions to your away from the primary office location.
existing LAN or installing a wireless Ten minutes idle-time between meet-
network from scratch, this white paper ings can be used to deal with
will help you overcome potential pitfalls important e-mails. Many job functions
and address the issues you may face. get huge productivity benefits from
CONTENTS
immediate access to critical informa-
Executive Summary.................................1 tion. For example, doctors can retrieve
Introduction............................................1 Introduction patient information from anywhere
within a hospital, or logistics managers
Business Drivers ......................................1 Not so long ago, wireless networking can query detailed inventory informa-
Deployment Considerations....................3 was a technology accessible only to spe- tion from any place in a warehouse.
cific vertical industries. Warehousing,
Why 3Com? .........................................12
retail, and healthcare were among the More Efficient Meeting
Deployment Examples ..........................14 first industries where wireless network- Data can be shared between users and
ing brought functional advantages and accessed on the corporate network
made economic sense. Today, technol- more easily from within conference
ogy has developed to the point where rooms, cafeterias or corridors. This
WLANs are now being deployed across saves time and helps decision-making
all industry sectors from small busi- in formal meetings, and delivers on-
nesses to large enterprises. The the-spot information to support
worldwide business 802.11x WLAN productive informal meetings any-
hardware unit shipments are in the mid- where in the building.
dle of a tremendous growth surging
from 2.6 million units shipped in 2000 New Services
to an estimated 41.7 million in 2006.1 WLAN connectivity enables companies
to deliver new services over their net-
It is not difficult to see why. WLAN works. For example, instant messaging
technology is one of the most effective can be used to communicate and make
IT tools there is to establish a competi- time-critical business decisions anytime
tive advantage for your company. anywhere. Existing network services
Adding WLAN elements to your cur- can also be used more productively, for
rent network will bring dramatic instance, IT administrators equipped
increases in workforce productivity. with laptops are able to provide desk-
There will be demonstrable cost savings top support to users from any place in
from more efficient use of resources and the company.
infrastructure. Not least of all, the
flexibility it will add to your IT infra-

1
Source 2002 In-Stat/MDR Group

DEPLOYING 802.11 WIRELESS LANS 1


Ease of New Installations ing number of employees will share
WLANs dramatically reduces the time resources even more efficiently using
and cost of adding PCs and laptops to the WLAN network.
an established network. For small and
medium companies a complete wire- For larger campus-based companies,
less network can be set up within multiple buildings up to 16.9 km (10
hours, with minimal disruption to the miles)2 apart can be connected via Wi-
business. Fi links using wireless building-to-
building bridges. These also allow a
Out-of-office Connectivity single link to replace T1/E1 links cost-
A laptop or PDA with WLAN capabil- ing thousands of dollars per month.
ity allows mobile employees to be
more productive by working from ROI from Increased Productivity
public “hot spots” at airports, hotels, A simple example shows there should
and coffee bars. be no doubt that a WLAN provides
significant productivity returns. Take
Temporary LAN. the case of office-based employees
Campus style networked communica- using WLAN-enabled laptops.
tion can be achieved with minimal
time and effort through WLAN con- Assume the typical knowledge worker
nectivity at off-site training sessions, salary is $60,000, equating to $90,000
trade shows, or for mission-critical after benefits and other costs to the
applications during disaster recovery. employer. An average worker puts in
2,000 hours over 50 weeks so the
Cost Savings hourly cost is $45 per hour. If a wire-
Tangible cost savings will come pri- less LAN provides an additional
For more information about marily from three areas. productivity of 15 minutes per week
for this worker, the total productivity
wireless technologies and
Reduced Installation Costs gain would be $562.50 per year.
3Com wireless solutions, visit
The cost of running cabling varies,
www.3Com.com/wireless but averages $150 per drop. Wireless LAN costs for this employee
Environments where it is difficult to are $150 composed of $100 for the client
pull wires may cost as much as $250 device (PC Card in a notebook) and $50
per drop—and even more in such share of an access point (assume a con-
hard-to-reach areas as cafeterias, lob- servative 8 users per access point, $400
bies, or within older buildings. For total cost for the whole AP).
businesses with established networks
Greater Flexibility
where the wiring is inadequate, or
businesses installing a new LAN from It is much easier to add new clients to
scratch, this alone is more than a network using WLAN connections.
enough to justify the incremental cost Network users can roam throughout
of equipping new desktop PCs with a the company, and are free to work
wireless adapter, or adding a wireless from various locations or sites without
workgroup bridge to connect to desk- burdening IT administration
tops. In this way, wireless can present resources. Equipment such as PCs and
a significantly lower installation cost. printers can be re-arranged within the
office without the need for a support
Return on Investment through More call. Additionally, customers and
Efficient Use of Resources other visitors will be able to access the
Small and medium businesses Internet or their own corporate net-
installing a WLAN can share works with minimal support.
resources such as printers and scan-
ners. They can also save on ongoing As long as certain key issues are
telecommunications costs by sharing a addressed when deploying WLAN
single broadband connection for technology, you can more easily sat-
Internet access. ROI increases as the isfy the needs of your network users
business expands because the grow- while also gaining cost and productiv-
ity benefits.
2
Local regulations outside of the United States may limit the authorized radiated power output of building-to-building
bridges. The maximum range expected outside of the United States is approximately 1.6 km (1 mile).

2 DEPLOYING 802.11 WIRELESS LANS


Deployment Considerations the Wi-Fi CERTIFIED logo that
ensures 802.11 compatibility and
There are more and more laptop com- multi-vendor interoperability.
puters with embedded Wi-Fi clients,
as well as an increasing number of The original 802.11 standard estab-
public hot spots. The result is that lished in June 1997 defined a 2.4 GHz
Wi-Fi enabled products will become system with a maximum data rate of
more prevalent, even within compa- 2 Mbps. This technology still exists in
nies that have no WLAN. So it is legacy wireless LANs, but should not
important to reap the rewards offered be considered for new deployment.
by WLANs, but at the same time Today there are two basic categories of
understand the issues associated with IEEE 802.11 WLAN standards. First are
well-managed deployment. those that specify the fundamental
protocols for the complete Wi-Fi sys-
Standards tem. These are called 802.11a, 802.11b,
Among the most fundamental steps to and 802.11g. Second, there are exten-
take when planning a wireless LAN is sions that address weaknesses or
to learn about the various IEEE 802.11 provide additional functionality to
standards, decide which ones are these standards. These are 802.11d, e,
appropriate for your application f, h, i, and j.
requirements, and plan your deploy-
ment accordingly. 802.11 systems are The following table shows the three fun-
generically called “Wi-Fi”. The Wi-Fi damental 802.11 standards at a glance:
Alliance is responsible for awarding

TA B L E 1 . T h re e F u n d a m e n t a l 8 0 2 . 1 1 S t a n d a rd s

Standard Radio Modulation Max. Link Max. Max. # Non- Other Issues
Band Coverage Data Rate overlapping
channels
More
established 802.11b 2.4 GHz DSSS 100m/328ft 11 Mbps 3 - 802.11b networks have the largest
standard installed base.
802.11a 5 GHz OFDM 50m/164ft 54 Mbps 12 (fewer in - Needs 802.11 extensions to be
some regions) used in some regions (e.g., EMEA)

Newer 802.11g 2.4 GHz OFDM 100m/328ft 54 Mbps 3 - Backward-compatible with 802.11b
standard - Fully ratified

802.11b should be considered if: 802.11a should be considered if:

- you do not intend to use high- - you need to run higher-bandwidth


bandwidth applications. applications such as voice or video.
- you need a wider coverage area. - you have small densely packed con-
- price is a primary consideration. An centrations of users. The greater
802.11b WLAN costs roughly a number of non-overlapping chan-
quarter as much as an 802.11a net- nels allows access points to be
work covering the same area at the placed closer together without
same data rate. interference.

The main disadvantage of 802.11b is The main disadvantages of 802.11a are


its lower maximum link rate. And that it is not compatible with the
since it occupies the 2.4 GHz band older 802.11b WLAN standard and
used by other technologies (e.g., costs roughly four times as much to
Bluetooth and cordless telephones), cover the same area.
this rate may be reduced further due
to interference issues.

DEPLOYING 802.11 WIRELESS LANS 3


802.11g should be considered if: 802.11i provides enhanced security. It
includes the use of 802.1X authentica-
- you need to run higher-bandwidth tion protocol, an improved key
applications and also need a wide distribution framework and stronger
coverage area. encryption via AES (Advanced
- you need backward compatibility Encryption Standard). The 802.11i
with 802.11b equipment. standard is due to be ratified by late
2003.
The main disadvantage of 802.11g is
that maximum data throughput is 802.11j addresses adding channel 4.9
reduced when 802.11g and 802.11b GHz to 5 GHz for 802.11a in Japan.
equipment shares the same network.
Finally since it uses the same 2.4 GHz Security
band as 802.11b it faces the same There is a widespread perception that
interference issues. wireless LANs are insecure, but that
concern is resolved if the appropriate
The following 802.11 extensions mechanisms are in place. It is true that
(except .11h and .11j) apply to all due to the nature of RF transmission
variants of Wi-Fi: and its inherent risks, WLANs require
additional security considerations.
802.11d addresses regulatory consider- However, your wireless LAN can be
ations in countries that do not yet just as secure as the rest of your LAN.
have rules in place for the operation As described in the previous section,
of 802.11 LANs. .11d ensures interop- 802.11i is an extension to the current
erability of WLANs in those WEP security standard that will bring
countries. greater security to Wi-Fi networks
through improved encryption, key
802.11e defines quality of service
distribution, authentication, and a
(QoS) levels for applications such as
range of other features most appropri-
voice and video. Although the stan-
ate to wireless networks. However,
dard is not yet ratified, this is
this will not be ratified until late
expected to happen in third or fourth
2003. In the meantime, there are some
quarter of 2003, and 802.11 access
very simple steps that can be taken to
points should be upgradeable via new
make WLANs more secure.
firmware in the future.
Turn on WEP
802.11f is the Inter Access Point
Protocol (IAPP). It improves the han- WEP (Wired Equivalent Privacy) is
dover mechanism in 802.11 between the standard 802.11b wireless security
access points and switched segments protocol. Designed to provide wired-
as users roam between them. 802.11f like protection by encrypting wireless
is not yet ratified (expected late in data as it is transmitted, WEP pro-
third quarter of 2003) but products vides a baseline level of security that
implementing IAPP have started to can be very effective when used in
ship. Before 802.11f is ratified you conjunction with other security
should ensure that your access points mechanisms. First, WEP should be
are Wi-Fi Certified to achieve interop- enabled, with the WEP key changed
erability. from the default. Ideally, WEP keys
should be generated dynamically
802.11h adds better control over trans- when a user logs on, making access to
mission power and radio channel wireless data a moving target for
selection to 802.11a. This standard is hackers. Session-based and user-based
primarily to address the requirements WEP keys offer the best protection
of European regulatory bodies. and add another layer of deterrence.
802.11h is expected to be ratified by
the end of 2003 and will increase the
availability of 802.11a products
within EMEA.

4 DEPLOYING 802.11 WIRELESS LANS


Use Secure Authentication (preferably WEP and TKIP encrypt frames on the
802.1X-based authentication) wireless link (layer 2) only, layer 3
802.1X is the new standard for Layer 2 VPNs such as IPSec can be used to
authentication. It defines a generic encrypt data end-to-end from the
framework for port-based authentica- remote access clients to security gate-
tion. Instead of checking a local MAC ways at the private network edge.
list, this feature allows wireless clients
to associate with the wireless access Minimize RF Leakage
point and authenticate with a RADIUS Steps should be taken in the configu-
server that has been set up on the ration of your WLAN to minimize the
wired network. The IEEE 802.1X stan- risk of potential eavesdroppers out-
dard is used for the client side company buildings from
authentication communications, and accessing your WLAN. The simplest
ensures that only authorized wireless method is to ensure that appropriate
clients are permitted to access the antennas are used and RF signals are
wireless LAN. The 802.1X standard is directed at the intended area of cover-
a framework based on the Extensible age. Signals should not be boosted
Authentication Protocol (EAP), which needlessly. Besides the inexpensive
can support multiple implementation option to scale down the output
methods, including EAP-MD5, EAP- power, the additional, and more
TLS (Transport Layer Security), PEAP expensive, step of shielding external
(Protected EAP), etc. walls prevents radio traffic leaking
outside the walls of your building,
Keep an Eye on Emerging Standards and again offers an excellent method
WEP is one security layer of many of helping secure your network.
and should not be relied on as the sole
security measure. Wi-Fi Protected Check for Unauthorized Access Points
Access (WPA) is a subset of the cur- Many Wi-Fi products are now easy to
rent 802.11i draft, taking certain install. In an enterprise network, there
pieces of the 802.11i draft that are is a possibility that rogue access points
ready to bring to market today, such may be connected to the network by
as its implementation of 802.1X and well-intentioned users unbeknownst to
TKIP. To improve data encryption, the IT organization. However, without
WPA utilizes Temporal Key Integrity correct configuration or management
Protocol (TKIP). TKIP enhances WEP these could pose a serious risk to secu-
to provide a per-packet re-keying rity. Regular physical inspections
mechanism, adds a Message Integrity should be made and, preferably, net-
Check (MIC) field to packet, and uses work management tools should be
802.1X. WEP has almost no user used to routinely scan for the presence
authentication mechanism. To of rogue access points.
strengthen user authentication, WPA
implements 802.1X and EAP. Together, Management
these implementations provide for Effective use of network management
stronger data encryption, key man- is essential in larger enterprise net-
agement and user authentication. works but is good practice in
businesses of all sizes. This is especially
Employ VPNs true for WLANs, which have the par-
A Virtual Private Network (VPN) is a ticular management needs described in
security enhancement option that pro- this section. With business drivers set
vides an excellent higher layer of to fuel tremendous growth in Wi-Fi, it
security and an alternative to 802.1X. is important that the right tools and
In this approach all wireless clients mechanisms are adopted from the start
are treated in the same way as remote to ensure a well-managed approach to
access VPN clients. The VPN provides deployment.
a secure, end-to-end tunnel over an
“un-trusted” network—which in this
case is the WLAN and in the case of
remote users is the Internet. Whereas

DEPLOYING 802.11 WIRELESS LANS 5


Traffic Analysis discover, manage, and upgrade access
Although monitoring and analysis of points across the network. If they are
network traffic is important in wired not already using another SNMP-
networks, a wireless LAN is a much based central management tool,
more fluid environment. Users are free organizations that require this func-
to move throughout the network and tionality should look to their WLAN
capacity demands shift. For example, vendor to provide it. Embedded Web
there may be company meetings or Server that works with any Web
training sessions where an exception- browser that supports HTML and Java
ally high number of users are accessing Script is an added plus for easy con-
the network from a single location. figuration and management. Support
Monitoring tools can be used to indi- for SNMPv3-compliant management is
cate which access points are being critical for secure management of
used the most (or least) and highlight access points.
the need for moves or additions.
A centralized approach also allows for
In the presence of interference, a per- increased levels of functionality and
formance drop may be reported by bandwidth management. IT depart-
users, or indeed observed through ments can organize the WLAN by
traffic analysis. In these cases, bench- domains, granting privileges and access
marking of throughput and the effects rights to different user groups as they
of adjusting optional configuration see fit. For larger networks, this func-
settings in MIB (e.g., CTS/RTS tion can be automated and centralized
described in the following section) such that when a wireless user is
provides a method of dealing with authenticated via 802.1X and RADIUS,
such problems. the enterprise access point automati-
cally assigns the user to the appropriate
Discovery and Configuration VLAN. Security breaches can be auto-
For larger wireless networks, adminis- matically detected with access points
trators need to have tools that allow flagging security breaches or configu-
them to discover various wireless ration errors to the management
devices within the network segment, console. Also, unauthorized access
configure parameters, run diagnostics, points can be tracked down and
monitor performance, view device removed or properly configured.
properties, and select a device for
individual configuration. It is recom- Eventually, the goal for larger enter-
mended that you protect each prises should be to incorporate
network infrastructure access point management of their wireless LANs
by setting up a username and pass- within their overall network manage-
word to control access to the ment system, such as HP OpenView.
configuration settings. To ease admin- Some vendors are already making this
istrative burden for larger networks, possible. Smaller businesses not want-
capabilities such as “save and load ing to employ centralized management
facility” are useful because they allow should consider deploying Wi-Fi
you to configure one device and prop- equipment web-based management
agate the same configuration to capabilities. This will give them the
similar devices on the network. ability to perform upgrades, reconfig-
uration, and simple performance
Migration to a Centralized Management monitoring over the network via a
Scheme standard web browser.
As the number of wireless users
begins to grow, and Wi-Fi is used for Performance
high-speed and mission-critical appli- There are several key reasons why
cations, it becomes increasingly 802.11 technology is now being
important for management of the embraced by such a wide user base:
WLAN to be centralized, providing
network administrators the ability to

6 DEPLOYING 802.11 WIRELESS LANS


1. Wireless performance has reached needed. 802.11b should then be used
levels similar to wired Ethernet. to provide blanket coverage for the
2. The silicon technology today allows entire facility.
to implement more sophisticated
Access points that provide configurable
algorithm schemes for equalizers to
dual modes (for example, 802.11a and
be embedded in the wireless chipset.
802.11b) of operation are ultimately the
3. Large production volumes help drive best solution, because you can mix and
down the cost of underlying silicon. match radio bands to meet different
coverage and bandwidth needs within
However, it is important to consider the
the same area. Such configurations are
factors affecting performance and how
now readily available.
this can be appropriately handled to
suit your needs. IP Address Management
To ease integration into the existing
Choose the Appropriate Wi-Fi Type
network environment, the access
The choice of 802.11 variant is a fun-
point may act as a DHCP server to the
damental decision. The advantages
clients that are wirelessly associated
and disadvantages of 11b, 11a, and
with it. Alternatively, the DHCP
11g are outlined in the earlier section
server of the access point should have
“Standards,” but there are some addi-
the ability to defer to any other DHCP
tional considerations affecting
servers that exist on the network, so
performance.
that it can only become active if the
As with conventional Ethernet tech- access point does not detect another
nologies, quoted “data rates” of 11 DHCP server.
Mbps (11b) and 54 Mbps (11a and
Properly Set Channels
11g) are theoretical maximum signal-
ing rates and exclude protocol You must ensure that the channel
overheads. Estimates of realistic maxi- selected is compatible with the chan-
mum data throughput are: nel ranges supported by the wireless
clients that will be associating with
- 5 Mbps to 6 Mbps for 11b the access point. To ease administra-
- 27 Mbps to 30 Mbps for 11a and 11g tive burden, look for an access point
that can automatically scan the spec-
It should be noted that this is the total trum of all available regulatory
shared throughput available to a sin- channels, and select the one with least
gle user communicating through a interference. The best channel avail-
single access point operating using a able is the channel where no other
particular frequency channel. This wireless devices are causing interfer-
throughput subsequently decreases as ence on the radio frequency (RF).
more users connect to the access Clever architectures to suit the range
point. Each Wi-Fi variant defines a and density requirements can be con-
multiple number of non-overlapping structed using the non-overlapping
radio channels. If there is another channels of 802.11a and 802.11b. For
access point within range using a dif- instance, “cellular architectures” can
ferent non-overlapping channel, it be deployed by mixing the three non-
provides additional throughput capac- overlapping channels (channels 1, 6,
ity for these users. and 11) of the 802.11b standard, while
minimizing the risk of inter-access
802.11a provides twelve non-overlap- point interference.
ping radio channels. However, the
802.11b and 802.11g standards define Provide Adequate Coverage
three non-overlapping channels. A The maximum data rate is only avail-
good implementation today is to use able within a limited distance from an
802.11a access points in areas occu- access point. Typically this is
pied by densely packed users such as 100ft/30m for 802.11b and 802.11g
“hot desk” areas or meeting rooms and 30ft/10m for 802.11a. If a client
where a higher throughput may be moves farther away, data speed is

DEPLOYING 802.11 WIRELESS LANS 7


reduced. For example, an 802.11b Configure Optional Settings
client’s performance will diminish CTS/RTS is an optional 802.11 protocol
from 5.5 Mbps to 2 Mbps and finally setting that can help improve perfor-
to 1 Mbps as a user moves away from mance in cases when clients are
an access point. It is therefore impor- hidden from each other (e.g., due to
tant that access points are not placed physical obstacles). In these cases,
too far apart. excessive collisions and re-transmis-
sions can waste bandwidth and
Attenuation due to obstacles such as reduce throughput. CTS/RTS resolves
interior walls can reduce coverage, as this by introducing a hand-shaking
well. This is more of a problem for mechanism between client and access
802.11a, which is inherently less able point. The CTS/RTS uses a threshold
to penetrate such obstacles. For larger that can be adjusted until throughput
sites, or for buildings with solid inte- is maximized.
rior walls, an RF site survey is a
valuable tool in coverage planning. Fragmentation is another optional
802.11 protocol setting that helps
Site Survey improve performance in cases where
This type of tool is invaluable in interference is reducing throughput
deciding the best place to position a by causing bit errors and re-transmis-
new access point. The tool provides sions. Frames are broken into smaller
statistics on the transmission perfor- fragments before transmission to
mance of the access point in each reduce the chances of errors. Again,
proposed location, making it easy to this can be implemented within indi-
compare and choose the best location. vidual client devices by adjusting the
threshold to provide the best
Minimize RF Interference Effects throughput.
This is another issue that primarily
affects 802.11b and 802.11g. These 802.11a Turbo Mode is another feature
standards use the 2.4 GHz band that is of some current products. If both the
also used by other technologies such as access point and client support turbo
Bluetooth and cordless phones. mode, which is vendor specific, it
Although Bluetooth and Wi-Fi are boosts maximum data rate to 108 Mbps.
complementary technologies, and they
both operate in the 2.4 GHz band, each Quality of Service
has different technical and usage char- QoS is defined as the control of four
acteristics. Bluetooth uses a quick network categories: bandwidth,
Frequency Hopping (1600 hops per latency, jitter, and traffic loss.
second) and Spread Spectrum (FHSS) Bandwidth is defined as the total net-
technology. Most implementations sup- work capacity. Networks must
port a range of up to 10 meters (30 feet) provide sufficient bandwidth for each
at a data throughput of 0.721 Mbps. application’s throughput require-
802.11b is a Direct Sequence Spread ments. Latency is the total time it
Spectrum (DSSS) technology, and offers takes for a frame to travel from a
speeds of 1, 2, 5.5, and 11 Mpbs, cov- sender to a receiver. Latency is crucial
ering a range of about 100 meters for receivers with QoS requirements.
indoors. As Wi-Fi and Bluetooth activ- Packets arriving too early require
ity grows in public areas and buffering or worse may be dropped.
enterprises, interference issues may Packets arriving too late are not useful
need to be alleviated. Possible solu- and must be discarded. Jitter is the
tions to the problem include separating variation in the latency among a
the two devices by more than 3.5 group of packets between two nodes.
meters. Then as Bluetooth units hop Jitter requires a receiver to perform
over the full ISM band, they will over- complex buffering operations, so that
lap with the 802.11b signal for about packets are presented to higher levels
25 percent of the hop frequencies with a uniform latency. Traffic loss
while the 75 percent that do not over- refers to the packets that never arrive
lap will not be a problem. at the receiver.

8 DEPLOYING 802.11 WIRELESS LANS


The introduction of wireless channels Location-Dependent Configuration
to the overall networking fabric intro- A mobile employee using their Wi-Fi
duces variability to these main QoS enabled laptop will need the capabil-
performance parameters. In addition, ity to connect to a number of different
roaming and other capabilities create network types and configurations.
problems that do not exist in wired Different sites within the company
networks. Therefore, individual com- will usually be consistent, but when
panies and IEEE 802.11 TGe are connecting at home or from public
striving to endow wireless LANs with wireless hotspots there could be the
mechanisms for effectively managing need to reconfigure various client set-
QoS parameters as well as wireless tings. This can be difficult and
characteristics. inconvenient for users, and as a result
it is worth considering some form of
There are several factors that make profile management solution.
QoS a requirement in 802.11. One is
the wireless transmission of home Inter-Access Point Roaming
entertainment via a Wi-Fi WLAN. As a user roams within the wireless
Another is the trend in the corporate LAN there needs to be a system of
environment to converge voice and seamless movement among access
data on a single wired communications points. Until recently, this was
infrastructure. If this were extended to achieved by proprietary mechanisms
the WLAN environment, company net- from particular vendors. However,
works could carry wireless voice industry progress is evident based on
communications—creating possibilities recommended implementation of IEEE
for a range of new applications and Std.802.11f/D2.2, December 2001
delivering significant cost savings. draft on Inter-Access Point Protocol
(IAPP). The goal of IAPP is to facilitate
As described earlier, a new extension seamless roaming in between access
(802.11e) will define quality of service points from different vendors as long
(QoS) levels for applications such as as the access points are part of a
voice and video. However this will Distribution System (DS) implement-
not be ratified until third or fourth ing IAPP. IAPP handles the
quarter of 2003. Therefore it is essen- registration of APs within a network
tial that current products from and exchange of information when a
reputable vendors should be firmware user is roaming among coverage areas
upgradeable to provide this function- supported by different vendor’s access
ality in the future. points. It will help with fast hand-off
from AP to AP. The 802.11f standard
While there are some proprietary QoS
specifying IAPP is soon to be ratified
schemes on the market today, it is
and products are now shipping com-
important to remember that an effec-
patible with it.
tive solution needs end-to-end
implementation. Proprietary chipsets Roaming and Security
may not be compatible with main- If a user is using 802.1X for authenti-
stream Wi-Fi products when a cation and dynamic key management
standardized solution is available. then IAPP roaming is required in
order for the user to roam from one
Mobility
AP to the other without the need to
Roaming is a critical component of the
re-authenticate. An alternative for
mobility equation. Wireless clients
sites that are not 802.1X enabled is to
must be able to roam among all access
maintain a consistent username and
points within the same subnet on the
password database locally within each
user’s LAN segment, as well as across
access point to which a client could
subnets, without discernable inter-
potentially roam. This would enable
ruption of data communications and
the client to roam without having to
security controls.
re-enter credentials.

DEPLOYING 802.11 WIRELESS LANS 9


Extended Roaming These provide 360 degrees cell cover-
While Layer 2 roaming refers to the age around the axis of the antenna
users’ capability to roam from one AP and will be suitable for most deploy-
to another without crossing router ments. It should be noted that office
boundaries (i.e., within the same IP spaces contain obstacles to radio
sub-net), layer 3 roaming refers to the transmissions, in particular metal
users’ ability to roam across router objects such as partition frames and
boundaries as they move about the wall studs. These can reflect RF sig-
enterprise campus. One of the imple- nals and cause a phenomenon known
mentations for Layer 3 roaming can be as multipath distortion. To help over-
achieved through the renewal of its come this, access points that use a
Dynamic Host Configuration Protocol diversity antenna system (two identi-
(DHCP) lease for its IP address. This cal antennas a small distance apart)
can be undertaken either manually or should be used wherever possible
automatically. A manual DHCP imple- since they will provide enhanced cov-
mentation does require user erage to the same geographic area.
intervention, where the users perform
a manual “release/renew” using the There may be instances where the
Windows WINIPCFG utility. antenna supplied with the access
point is not suitable. For example the
For enterprise environments where best position for the antenna might be
native DHCP services are not avail- on a ceiling or a wall where position-
able, the embedded DHCP server ing an access point would be difficult.
within a local host can take the role of In these cases an add-on ceiling or
automatically assigning a valid IP wall-mounted aerial can usually be
address as the client roams across used connected to the access point by
router boundaries. In the future, this an appropriate cable.
implementation would become easier
as IPv6 becomes widely deployed, and Also, there are cases when an omni-
as all devices needed in the implemen- directional antenna might be
tation support IPv6. inappropriate. Where there are
restrictions in locating access point or
RF Issues within an awkwardly shaped office
Before a WLAN is deployed, a wire- space it might unnecessarily radiate
less site survey will show the level of signals outside exterior walls present-
interference from other 2.4Ghz ing a possible security risk. Also in
devices such as cordless phones and 802.11b and .11g networks, a too-
other WLANs. It will also identify the wide coverage might interfere with
required location of each access point adjacent cells on the same channel. In
and the antennas necessary to provide these cases a “sector-panel” (or
adequate cell coverage and bandwidth “patch”) aerial can be used to direc-
capacity and to avoid co-channel tionally focus cell coverage. These
interference between access points. antennas are usually housed in flat
For a larger enterprise, a wireless site boxes and mounted flush onto walls.
survey from a professional wireless They will produce hemispherical cov-
LAN consultant will usually provide erage, spreading away from the mount
the most satisfactory solution. point at a width of between 30 and
However for a smaller company this 180 degrees (depending on the partic-
may not be necessary, especially when ular antenna).
only one or two access points are
needed. In any case it is helpful to Antennas do not boost signal power
understand the basic RF (radio fre- but concentrate the power in a certain
quency) issues when planning a direction, which gives more focused
WLAN deployment. coverage pattern by trading-off the
width (or angle) of the cell. A yagi
Antennas antenna provides a more directional
Access points are usually supplied beam for long corridors and tunnels,
with omnidirectional dipole antennas. and a parabolic aerial can be used for

10 DEPLOYING 802.11 WIRELESS LANS


long-distance, highly directional con- there are some general guidelines that
nections between buildings. will help with planning:

Building-to-Building Bridges 1. In an open plan office such as those


A building-to-building bridge can be with cubicles, there should be little
used to link buildings with 802.11b. attenuation of the radio signal. An
Such bridges will usually require an 802.11b or 802.11g access point
aerial placed outdoors on an external with an omnidirectional antenna
wall or roof. The choice of aerial will provide a cell with radius of
depends upon the nature of the con- around 328ft/100m (100ft/30m of
nections required. For example, a this at maximum data rate). An
campus requiring wireless connection 802.11a access point will cover an
between several buildings in close area with an approximate radius of
proximity may use an omnidirectional 164ft/50m (30ft/10m at the maxi-
or sector-panel antenna; but a longer mum data rate).
point-to-point connection between 2. 2.4 GHz (802.11b and 11g) WLAN
two buildings may need a more direc- signals will generally penetrate
tional yagi or parabolic antenna. internal walls although there may
be some signal attenuation, espe-
In order to avoid signal degradation cially if the walls are made from
over long distance wireless links,
cinderblock. It is worth noting that
there should be an obstacle-free zone
internal walls often have part-metal
wider than the point-to-point line of
construction and this can increase
sight. The Fresnel (pronounced “fre-
signal attenuation, too.
nel”) zone is an elliptical area
immediately surrounding the visual 3. 5 GHz (802.11a) signals do not pen-
path into which the RF signal will etrate interior walls well and this
spread. The Fresnel zone can be calcu- should be taken into account when
lated from the length of the signal planning.
path and the frequency of the signal, 4. In a multi-floor building, there may
and it must be taken into account be some signal leakage between
when designing a wireless link. floors. For example, an access point
mounted midway between the floor
Country-specific regulations will also and ceiling on the second floor may
restrict the length and type of build- radiate signals through to adjacent
ing-to-building links, so they should floors depending on the gain and
be consulted before designing wire- coverage of the antenna. This can
less inter-building links. be especially relevant for the floor
above a ceiling-mounted antenna.
Coverage Planning
5. Penetration through brick or stone
An essential goal in WLAN deploy-
walls by Wi-Fi of either band is
ment is to ensure all areas are
possible but unreliable. So any plan
adequately covered. The coverage of
should not be based on the assump-
each wireless cell depends on the
tion of signals penetrating walls.
location of the access point and the
antenna used. Office spaces often have 6. Metal walls or floors will not be pen-
internal walls and obstacles and are etrated by Wi-Fi signals and need to
rarely circular. A careful plan is neces- be planned around. This also applies
sary to maximize coverage and to elevator shafts that will present an
performance with the fewest possible obstacle to WLAN signals.
access points and least susceptibility
to co-channel interference.

Due to variability in the composition


and thickness of building materials the
only guaranteed way of determining
the cell coverage area of an access point
is by on-site measurement. However,

DEPLOYING 802.11 WIRELESS LANS 11


Why 3Com? XJACK® connector
The XJACK connector on 3Com client
So far this paper has outlined the devices provides a simple but highly
business benefits driving the need for effective method of securing data on
wireless networking, and has exam- laptops by turning off the radio when
ined the issues you will need to it is not required
consider during deployment. This sec-
tion highlights just some of 3Com’s Management
wireless solution features that will 3Com offers a number of different
help successfully address these issues. options to manage WLAN devices.

Security SNMP Support


As described earlier, the key to effec- WLAN products can be integrated
tive WLAN security is to utilize a into an enterprise-class network man-
combination of appropriate security agement system such as HP Openview.
mechanisms. 3Com today delivers
industry-leading wired and wireless 3Com Network Supervisor
security options, so that you can This is a powerful yet easy-to-use PC-
deploy the solution most appropriate based management tool that offers
to the level of security required for many of the benefits of centralized
your network. management identified in an earlier
section. It is included in the price of
Standards-based Encryption the product.
3Com products support 40-bit (some-
times called 64-bit) and 128-bit WEP. Web-based Management
By turning on WEP and managing Individual devices can be securely
keys effectively, a base line level of monitored, configured and upgraded
security can be achieved that discour- using a standard web-browser.
ages casual wireless eavesdroppers.
Save and Load Cloning
Dynamic Security Link 3Com access points can be added to an
3Com provides an enhanced method existing network with maximum ease
of encryption and key management by cloning configuration settings
that addresses the main weakness from another access point.
within WEP, namely a manual static
key. Instead a unique 128-bit key is Performance
dynamically assigned to each user, Autonomous Load Balancing
and this is changed for every new ses- This feature is unique to 3Com’s client
sion. Additionally, a local username devices and helps maximize traffic
and password database maintained capacity of the wireless network with-
inside of each access point enables a out user intervention. 3Com’s WLAN
more secure user-based authentication clients are smart enough to automati-
mechanism. cally associate with the access point
providing the highest available
Secure Authentication Options throughput, not just the closest one.
802.1X port-based authentication is This is especially effective at improv-
supported for different EAP types, ing performance for high-bandwidth
including EAP-MD5, EAP-TLS, EAP- users located in more densely packed
TTLS, and PEAP. 3Com supports areas of the network served by multi-
802.1X for non-XP clients including ple access points.
Windows NT and Windows2000 sys-
tems. Clear Channel Select
3Com’s access points can be set to scan
MAC address authentication is also the available radio channels and auto-
supported, either locally within the matically use the least loaded one.
access point or via a RADIUS authen- Performance-reducing co-channel
tication server. interference is minimized. This simpli-

12 DEPLOYING 802.11 WIRELESS LANS


fies placement planning and channel Inter-Access Point Protocol (IAPP)
selection of access points, especially 802.11f describes the handover
for 802.11b technology which inher- process for mobile users using IAPP
ently only has three non-overlapping that allows them to roam between dif-
channels. ferent vendors’ access points.
Although this standard will not be
Dual-band Radio Products ratified until later in 2003, 3Com’s
The ideal solution of maximum geo- new access points have begun to ship
graphical coverage with highest supporting IAPP. On earlier models,
performance at minimum cost could be the Auto Network Connect function
achieved through blanket deployment allowed users to roam between 3Com
of 802.11b with pockets of 802.11a or access points; future firmware
802.11g. Even if the higher perfor- upgrades will allow IAPP support on
mance is not needed today, it should be these products.
the network-planner’s goal to allow for
smooth future migration. 3Com’s access
points now ship with dual-slot modular
802.11a/ 802.11b support (802.11g
available from June 2003).

802.11a Turbo Mode


For maximum throughput, 3Com’s
802.11a access points and client
devices support “turbo mode,” which
boosts performance from 54 Mbps to
108 Mbps.

Mobility
Client Profile Management
3Com’s client devices can be config-
ured with profiles specifying
appropriate configuration settings for
multiple locations. As the user moves
between head office, branch office,
home or public hotspots, the client
device will automatically detect the
location and activate the correct pro-
file. The device will also launch a
VPN session if determined by the par-
ticular profile.

DEPLOYING 802.11 WIRELESS LANS 13


Deployment Examples provide 802.11b connectivity giving
all employees access to the Internet
This section shows two scenarios of and the corporate network and e-mail
how WLANs have been effectively system. An 802.11a module was
deployed. added to the Access Point 8200 to
serve the hot desk area with higher
Figure 1 shows a WLAN deployment
throughput for downloading of large
in a large multi-sited company manu-
presentations, product details, and e-
facturing volume IT products.
mails from the corporate network.
One of the regional sales offices is a
At the head office campus, some
newly acquired site and has 10 office-
legacy 1 Mbps 802.11 had been used
based staff and a “hot desk” area for
in the distribution warehouse to help
regional sales executives normally on
with basic stock control. This was
the road. A WLAN was newly
upgraded to 802.11b using the 3Com
installed from scratch to serve all
Access Point 8200 providing higher
client devices including desktops. It
bandwidth and greater coverage. This
was the ideal place to begin the corpo-
has facilitated the use of an up-to-date
rate 802.11 rollout. One 3Com Access
inventory management system with
Point 8200 was installed to initially

FIGURE 1. WLAN Deployment in a Large Multi-sited Company

00
AP82
Head Office Campus 00
3Com .11b card
8 02
AP82 1 x
3Com .11b card
02
1x8 elds
and-h
TM

less h
Wire s
d la ptop
ters N an
quar irele
ss LA
Head
ge
bps W ing Brid
e 11M
Offic C o m -B u ild
3 g- to
BX rver Buil d in 00
3Com tack 3 N IUS se AP82
ss Supe
rS /RAD 3Com .11b card
Wire
le LAN 02
® 11 a
/b/g 00 1x8
3Com PC Card
s AP82 se
3Com .11b card
ss LA
N ehou
War
K
XJAC 1x8
02 irele ge
bps W ing Brid tion
11M
tribu
TM

ild
3Com g- to-Bu Dis
u il d in
k 3
® B
rStac
Supe
3Com 4400
it c h
Sw nter
TM

3
SuperStack
3C17203

r pri
)
gacy w) Lase
d (le e
Wire less (n
wire ents bps e
and c li 11 M Phon
top 3Com ss LAN NBX
3

3Com
SuperStack

desk
3C17203

le
Wire roup
3Com tack 3 Work
g
rS
Supe ll Bridg
e
a
Firew
TM

00
AP85
3Com .11a card
00 02 Room
AP85 1x8 ence
3Com .11a card
02 Co nfer
1 x 8 .11b card
1x8
02 Main
1
T1/E
Link
om
in g Ro
Train
fing/
r Brie s)
ome ll
Cust lded wa AP82
00
(shie 3Com .11a card
02
802.11b coverage 1 x 8 .11b card
02
1x8
802.11b & 802.11a coverage with s
tops rd
Desk CI ca
less P
wire with s
tops rd
Desk CI ca
less P
wire
Volume IT product manufacturer
Head Office Campus and New Regional area
desk
Sales Office Hot

3
SuperStack
3C17203

ice
s Off
na l Sale
) Regio
(New

14 DEPLOYING 802.11 WIRELESS LANS


connectivity for warehouse personnel 3Com Wireless LAN Workgroup Bridge
using hand-held devices, and senior wirelessly links to the office headquar-
managers using laptops. A 3Com 11 ters’ 3Com Access Point 8200 and
Mbps Building-to-Building Bridge provides additional wireless connectiv-
provides the warehouse with a high- ity for up to four Ethernet enabled
speed connection into the corporate devices including an NBX phone, desk-
network. A smooth future transition top PC and laptop without an available
to 802.11a or 802.11g in the ware- PCI or PC card slot, and network
house is made possible by the Access printer. There are plans for deployment
Point 8200’s modular capability. of several new network services. For
example wireless instant messaging will
The main office headquarters already bring real-time sharing of information
had an established wired network. communication and decision-making
However, the use of the 3Com across all company sites.
Wireless LAN Access Point 8200, that
can be upgraded to dual-mode with Figure 2 shows a WLAN deployment in
11a/11b/11g radios, throughout the a small private finance company. There
campus provides benefits of increased are thirty employees at a single loca-
productivity and greater flexibility tion, with several remote employees
described earlier in this white paper, telecommuting from home offices most
especially for the high proportion of of the time. The WLAN was a new net-
mobile employees. The 3Com 11a/b/g work installation, and it was more
wireless LAN PC Cards with XJACK economical to provide connectivity to
antennae provide maximum flexibility office desktop PCs and laptops using a
with support for all three IEEE 802.11 wireless connection. A single 3Com
standards – 11a, 11b and 11g – and OfficeConnect® 11g Wireless Access
enhanced security including 128-bit Point provides up to 100 meters (328
AES and WEP encryption and WPA feet) of coverage for up to 128 users, at
support to help keep data private. the maximum data rate of 54 Mbps.
This card helps provide a complete Among the first products in the indus-
enterprise wireless offering when try to ship fully compliant with the
combined with the 8200, 8500, or newly ratified IEEE 802.11g standard,
8700 access points. In the main con- the 3Com solution offers reliable wire-
ference room, a 3Com Wireless LAN less networking at speeds up to 54
Access Point 8500 provides localized Mbps. The 3Com OfficeConnect
802.11a connectivity. Fast access to Wireless 11g Access Point supports
up-to-date sales information, reports 802.11b as well as 802.11g notebooks,
and inventory information means PCs, and other wireless client devices.
senior management meetings are more Advanced 256-bit WPA (Wi-Fi
informed and decision-making is more Protected Access) encryption provides
collaborative. A new training room for maximum security to the wireless LAN,
sales executives served by high-band- while 40/64- and 128-bit WEP
width 802.11a means sessions can be (Wireless Encryption Protocol) shared-
more interactive and new information key encryption helps protect data, and
such as product specifications and retains privacy of wireless transmis-
sales presentations can be delivered to sions with legacy wireless clients that
them on the spot. This room also do not support WPA. The ability to
serves as a new customer briefing cen- deliver support for VPN tunnel initia-
ter. It has screened walls and is tion and termination,
connected to the rest of the network industry-standard Stateful Packet
via 3Com SuperStack® 3 Firewall. The Inspection (SPI) firewall, NAT protec-
3Com Wireless LAN Access Point tion, built-in LAN ports, and
8500 provides dual band Wi-Fi cover- broadband access is delivered through
age for maximum compatibility with the OfficeConnect Cable/DSL Secure
customers’ laptops. Gateway, located at the small-office net-
work perimeter.

DEPLOYING 802.11 WIRELESS LANS 15


FIGURE 2. WLAN Deployment in a Small Private Finance Company

Main Office
TM

TM

1Mbps
om 1
h 3C
C wit pter
top P a
Desk ss PCI Ad
TM

®
le nect nnect
Wire eCon int iceCo
m
® Offic
c c e ss Po h Off rds
3Co less A p s wit C a
Wire Lap to 1g P
C
11g less 1
Wire

nect
eCon Gateway
Offic re
3Com SL Secu
le/D
h Cab
C wit bps
top P ect 11 M pter
Desk n da
ff ic eCon N USB A
O A
less L
Wire rovid
ed
dem
ISP p and mo
db
broa

net
Inter
802.11b/g coverage

VPN Tunnel
nect ay
atew
eCon / DSL G
ed Offic ble
rovid dem 3Com ss 11g Ca
ISP p and mo le
db Wire
Private Finance Company broa

Single Site Office with


telecommuter access TM

nect
eCon
Offic
to p with C Card
Lap 1g P
less 1
Wire
ily’s
Fam PC
e
Hom
r
mute
com
Tele

For telecommuters, mixed wired and 802.11g-equipped PCs and laptops,


wireless environments, and simultane- combined with an integrated 10/100
ous users on a single cable or DSL four-port switch and backward com-
Internet connection, a small office and patible with 802.11b wireless LAN
home office wireless LAN provided by equipment make it an ideal solution for
the 3Com OfficeConnect Wireless 11g telecommuter wireless broadband
Cable/DSL Gateway provides a broad- Internet sharing. VPN pass-through
band connection (via the ISP supplied permits secure connections to remote
modem) to the main office from a lap- offices, including Stateful Packet
top or a desktop PC anywhere in the Inspection firewall, hacker pattern
small office and home office. A high- detection, and URL filtering.
speed routing engine, 54 Mbps
wireless connection for users with

For more information about


wireless technologies and
3Com wireless solutions, visit
www.3Com.com/wireless

16 DEPLOYING 802.11 WIRELESS LANS


3Com Corporation, Corporate Headquarters, 5500 Great America Parkway, P.O. Box 58145, Santa Clara, CA 95052-8145
To learn more about 3Com solutions, visit www.3com.com. 3Com Corporation is publicly traded on Nasdaq under the
symbol COMS.
The information contained in this document represents the current view of 3Com Corporation on the issues discussed as
of the date of publication. Because 3Com must respond to changing market conditions, this paper should not be interpret-
ed to be a commitment on the part of 3Com, and 3Com cannot guarantee the accuracy of any information presented after
the date of publication. This document is for informational purposes only; 3Com makes no warranties, express or implied,
in this document.
Copyright © 2003 3Com Corporation. All rights reserved. 3Com, the 3Com logo, OfficeConnect, SuperStack, and XJACK
are registered trademarks of 3Com Corporation. Possible made practical is a trademark of 3Com Corporation. All other
company and product names may be trademarks of their respective companies. While every effort is made to ensure the
information given is accurate, 3Com does not accept liability for any errors or mistakes which may arise. Specifications
and other information in this document may be subject to change without notice.
503126-001 07/03

You might also like