Wireless LAN technology Essay

Network Design Management


Wireless LAN engineering is fast going an of import constituent of computing machine webs and is germinating through changeless use. Through the usage of the IEEE 802.11 radio LAN criterion, radio engineering has emerged as a solution for supplying mobility every bit good as indispensable web services where wired installings proved impractical. The execution of radio webs is a batch different to the usual wired web. In comparing to Ethernet, a radio LAN has a big figure of apparatus parametric quantities that affect both the public presentation and interoperability of the web. Wireless engineerings today make our nomadic society possible. Your iPod library syncs up with a laptop computing machine, drivers navigate their autos with the usage of sat-nav, shoppers browse on-line shops, concern travelers collaborate 24/7 with colleges around the Earth. Regardless of the circumstance, people today have a really high degree of mobility thanks to the assortment of radio services. They are as follows.

WPAN: & lt ; 10 m, these include hands-free nomadic phones

Wireless local area network: & lt ; 100 m, these include laptop to broadband entree,

WMAN: & lt ; xx Kms, these include site-to-site connexions

WWAN: nomadic phones phones

What is a Wireless LAN?

A radio LAN or WLAN is a wireless local country web that links two or more computing machines or devices utilizing a engineering known as spread-spectrum or OFDM in order to obtain communicating between calculating devices in a limited country. Orthogonal Frequency division multiplexing is a technique that distributes informations over a big figure of bearers which are spaced apart at certain frequences. This spacing provides the “ perpendicularity ” in this technique which prevents the detectors from seeing frequences other than their ain. A Wireless LAN does non trust nor depend on wired Ethernet connexions. A Wireless local area network can be an extension to a current wired web or an alternate to it. In the Cisco Sona Framework Wireless services are normally based at the Interactive Services bed. This bed includes both application networking services and substructure services. This bed enables efficient allotment of resources to applications and concern procedures delivered through the networked substructure.

This bed includes the undermentioned services:

— Voice and coaction services

— Mobility services

— Wireless services

— Security and individuality services

— Storage services

— Compute services

— Application networking services ( content networking services )

— Network substructure virtualization

— Adaptive web direction services

— Quality of service ( QoS )

— High handiness

— IP multicast

There are three basic criterions that compose a radio web and they are used within places and concerns today. They are as follows:

802.11a: This provides operation velocities of up to 54Mbps, it is faster than 802.11b and can back up more coincident connexions. It operates in a more regulated frequence so it is less prone to signal intervention from other devices and is said to be better at keeping connexions. It has the shortest scope of the three criterions by and large about 60 to 100 pess, broadcasts in the 5GHz frequence, and is less able to perforate physical barriers, such as walls, edifices etc.

802.11b: This standard supports information velocities of up to 11Mbps. It ‘s better than 802.11a at perforating physical barriers, but does n’t back up as many coincident connexions. It has better scope than 802.11a making up to 300 pess. It besides uses hardware that tends to be less expensive. It ‘s more susceptible to interference, because it operates on the same frequence 2.4GHz as many nomadic phones and other contraptions. Therefore, it ‘s non considered a good engineering for applications that require perfectly dependable connexions, such as unrecorded picture cyclosis.

802.11g: It ‘s faster than 802.11b, it supports information transportation rates up to 54Mbps. It has a somewhat shorter scope than 802.11b, but still better than 802.11a. Most independent reappraisals study about 65 to 120 pess in real-world state of affairss. It is backward-compatible with 802.11b merchandises, but will run merely at 802.11b velocities when runing with them. It uses the 2.4GHz frequence, so it has the same jobs with intervention as 802.11b.

Benefits of a Wireless LAN

So what are the benefits of taking to implement a radio LAN? Well with the outgrowth and growing of wireless local country webs, LANs are been driven by the demand to take down the costs frequently faced when taking web substructures and to back up nomadic networking applications supplying efficiency and truth. One of the chief benefits of taking a radio over a wired web is mobility. Mobility allows users to physically travel whilst utilizing a device such as a laptop or a personal digital assistant. Most companies require their workers to be mobile so they can be out on the route therefore pass oning back to their workplace via an ad-hoc connexion. Mobile applications depend on real-time entree to informations which is normally stored in centralised databases. If your company requires nomadic users to be informed instantly of any alterations made to informations or if information that is put onto the system must be received by the worker instantly, so there is definite demand for wireless networking.

Another benefit to wireless networking is evidently the Reduced Installation Time. Cabling big webs can be a hard and timely procedure that can be avoided wholly if you choose to put in a radio web. There would be no demand for heavy optical fiber installings between edifices or delving up trenches to put the fiber. Alternatively many states missing a web substructure can turn to wireless networking as a method of supplying connectivity among computing machines without the disbursal and clip associated with put ining physical media.

Installation in Difficult-to-wire Areas. The execution of radio webs offers many cost salvaging benefits when executing installings in hard to wire countries. If rivers, expresswaies or big edifices that you want to link are noteworthy obstructions, a wireless solution may be much more economical than put ining physical cabling to link.

Scalability. Wireless LAN systems can integrate a figure of topologies to run into the demands of specific applications and installings. Configurations are easy changed and scope from peer-to-peer webs suited for a little figure of users to full substructure webs of 1000s of users that allows rolling over a wide country.

Challenges whilst planing a radio web

However whilst there are many benefits of put ining a radio web, design applied scientists must besides be cognizant of some possible challenges they can be faced with whilst planing a radio web. Such possible challenges include:

Multipath extension

Path loss

Radio signal intervention

System operability

Network security

Multipath extension

Wireless wireless or optical signals take multiple physical waies between sender and receiving system as they bounce off of assorted physical obstructors. As hold occurs, the signal at the receiving system becomes more deformed and communicating becomes undetectable even when the sender and receiving system are within close scope.

So what can a web interior decorator do to battle this job? Well aside from uncluttering desks and chairs from your edifice or physically traveling a edifice, diverseness seems to be the best solution to battle the hazards of multipath. Diversity is the usage of two aerials for each wireless in order to increase the odds of having a better signal on either of the aerial. The combined signal that one aerial receives may be closer to the original than what ‘s found at the other aerial. The receiving system uses signal-filtering and decision-making package to take the best signal for demodulation.

Path loss between the sender and receiving system is a major consideration when planing a radio web. Expected degrees of way loss, based on the scope between the sender and receiving system, supply utile and valuable information when determining demands for transmit power degrees, receiver sensitive and signal-to-noise ratio. Actual way loss depends on the transmit frequence and it grows quickly as the distance additions between the sender and receiving system. With indoor applications, the way loss increases approx. 20dB every 100feet.

Whilst there is no obvious solution to extinguish path loss there are some expressions that have been put in topographic point to foretell possible way loss when planing a radio web. One illustration is based on a nervous web preparation algorithm. The thought is to give consequences via the Neural Network, giving to it elaborate information about the profile of the built-up environment. This information is obtained, utilizing a practical grid covering the country under probe and making by this an approximative strategy of the terrain of the country. The information founded from these algorithms is really valuable to wireless web interior decorators as it offers the capableness of finding optimal base locations, in order to obtain suited informations rates, to gauge their coverage and measure the quality of the radio web without the demand for expensive and clip consuming measurings.

Radio signal intervention. The procedure of conveying and having wireless and optical maser signals through the air makes wireless systems vulnerable to atmospheric noise and transmittals from other systems. Wireless webs can besides interfere with other nearby radio webs. The intervention can be inward or outward. An illustration of intervention could be let ‘s state a consultancy house based in Dublin has Stationss confronting the liffey on one side and Stationss confronting a figure of edifices on the other side. The Stationss along the liffey were sing a greater trade of hold than the Stationss nearer the edifices. The execution squad found through wireless extension trials, that a garda caput quarters on the opposite side of the river were sporadically conveying wireless signals. The interfering signals were strong plenty for the LAN Stationss to misinterpret them as information traffic, coercing the Stationss to wait. Regardless of what type of intervention it is, it all has the same consequences. It affects protocols by making hits, retransmissions and rate back-offs. It hurts the web by making reduced throughput and decreased capacity while presenting latency and jitter.

So what can a web interior decorator implement to cut down intervention in their Local area network? Well foremost of all, the interior decorator should execute an initial full wireless frequence study. This should be done one time before deployment or as portion of a post-deployment coverage expanse. The end is to detect any preexistent jobs, enable be aftering about known beginnings of intervention, and set up an RF baseline. Companies can besides execute periodic update RF studies to detect any new devices added into the spectrum and compare any divergences from the RF baseline.

System interoperability. To guarantee everything works together and tantrums in with the new or bing web in topographic point, it is best to implement wireless cards and entree points from the same seller, if possible. You can successfully implement multi-vendor radio LANs, but radio LAN characteristics are reduced to the lowest common denominator and may non do usage of valuable vendor-specific sweetenings of their radio LAN merchandises.

Network security is no uncertainty the biggest and toughest challenge a web interior decorator is faced with. There are a twosome of grounds why radio webs are presently less secure than wired webs. First there is the fact of their physical nature. They are wireless, airing a signal out over an country. Any computing machine within this country with the right equipment can be considered to be ‘connected ‘ to the web. Having no wires makes it easier for unwanted interlopers to entree the web. This besides makes hacking and package whiffing a batch easier. Anyone in scope can have all traffic sent over the radio web.

Second, current security methods for the most widely available radio engineering, 802.11b, are either easy to get the better of or hard to implement.

The two most common methods of procuring 802.11b webs are

WEP ( Wired Equivalent Privacy or Wireless Encryption Protocol )

WEP 64 spot or 128 spot protects wireless traffic by utilizing a key to code informations, shared between all computing machines that need entree. WEP works by set uping a shared key between the clients and the radio router/access point, so utilizing it to code and de-crypt informations go throughing between them. WEP is enabled on the radio router/access point and on each client accessing it. A base on balls phrase must be identically entered on each system. However WEP is instead easy to check and its wireless nature makes it easy for interlopers to capture adequate of your encrypted traffic to give the snap package something to work with.

MAC Address filtrating

MAC filtering is a security entree control methodological analysis whereby the 48-bit reference assigned to each web card is used to find entree to the web. MAC references are unambiguously assigned to each card, so utilizing MAC filtrating on a web licenses and denies web entree to specific devices through the usage of black books and whitelists. While the limitation of web entree through the usage of lists is straightforward, an single individual is non identified by a MAC reference, instead a device merely, so an authorised individual will necessitate to hold a whitelist entry for each device that he or she would utilize to entree the web. MAC reference filtrating consists of 2 manners known as association and connexion. Enabling association manner allows the client device to pass on merely with other wireless devices on the web. It does non let entree to any device outside of the web, or the Internet. Enabling connexion manner allows the client device with full communicating privileges.

Wireless LAN Architecture

The architecture of a web is fundamentally the protocols and constituents necessary to fulfill application demands. One popular criterion for exemplifying the architecture is the seven-layer Open System Interconnect or merely the OSI Reference Model as most people remember it. It is a set of criterions developed by the International Standards Organization ( ISO ) . OSI specifies a complete set of web maps, grouped into beds which reside within each web constituent. The OSI Reference Model is besides a ready to hand theoretical account for stand foring the assorted criterions and interoperability of a radio web.

The 7 Layers are as follows:

Application Layer

This bed is closer to the user than other beds. In this bed the user interface protocols like FTP, Telnet, SMTP are at work. This bed takes informations from the system interface and gives it to the receiving system system interface on the other side. The Application bed interface is Winsock and NetBios. The application bed protocols frequently include the session and presentation bed maps.

The Presentation Layer

This bed ‘s intent is to interpret the different sentence structure of systems to the existent sentence structure of the user system. When the communication system establishes a connexion at the presentation bed, they so exchange messages incorporating information about the sentence structures they have in common, and together they choose the sentence structure they will utilize during the session. The transmitter ‘s system sends the information in its ain sentence structure and the presentation bed of the transmitter system translates it to the communicating sentence structure that are chosen before and the receiving system system presentation bed receive the informations and interpret it to its ain system sentence structure and gives it to upper bed ( application ) . Another map of this bed is Compression & A ; Decompression, Encryption & A ; Decryption.

The Session Layer

The session bed allows users on different machines to set up Sessionss between them. One of the services of the session bed is to pull off duologue control. Sessions allow traffic to travel in both waies at the same clip, or in merely one way at a clip. If traffic can merely travel one manner at a clip, the session bed can assist maintain path of whose bend it is. Another session service is synchronism. See the jobs that might happen when seeking to make a two-hour file transportation between two machines on a web with a 1 hr average clip between clangs. After each transportation was aborted, the whole transportation would hold to get down over once more, and would likely neglect once more with the following web clang. To extinguish this job, the session bed provides a manner to infix checkpoints into the information watercourse, so that after a clang, merely the informations after the last checkpoint has to be repeated. The session bed provides 22 services. There are no separate session bed protocols as there are at the lower bed. Session bed maps are alternatively integrated into other protocols that besides included presentation and application bed maps.

The Transport Layer

The conveyance bed protocols provide services that compliment those provided by web bed. The difference between the protocols provided at the conveyance bed within a peculiar protocol suite like TCP/IP, IPX/SPX is that some are connexion oriented and some are connectionless. A connection-oriented protocol is one in which the two pass oning system exchange message to set up a connexion before they transmit any application informations. This ensures that the systems are both active and ready to interchange message. TCP for illustration, is a connection-oriented protocol when you use a web browser to link to an cyberspace waiter, the browser and the waiter foremost execute what is known as tripartite handshaking to set up the connexion. Merely so dose the browser transmit the reference of the coveted web page to the waiter. When the information transmittal is completed, the systems execute a similar handshaking to interrupt down connexion. Connection-Oriented Protocols besides provide extra services such as package recognition, informations cleavage, flux control, and end-to-end mistake sensing and rectification.

The Network Layer

The web bed protocol is responsible for end-to-end communications, whereas data-link bed protocols function merely on the local LAN. The chief map of the web bed is Routing. Routing is the procedure of directing a datagram from its beginning, through an inter-network, and to its ultimate finish utilizing the most efficient way possible. The web bed determines how messages are routed within the web. It provides transport entities independency from routing and relay considerations, including the instance where sub-networks nodes are used. All relay maps are operated within or below this bed. Another map of the web bed is to add a heading that contains the beginning and finish IP reference. Fragmentation besides occurs at this degree. For illustration, Token Ring frames can be every bit big as 4500 bytes, but Ethernet frames are limited to 1500 bytes. When a big datagram that originated on a Token Ring web is routed to an Ethernet web, the web bed protocols must divide it into pieces no larger than 1500 bytes each.

The Physical Layer

The physical bed, at the underside of the OSI theoretical account, is as the name implies the bed that defines the nature of the web ‘s hardware elements, such as what medium the web uses, how the web is installed, and the nature of the signals used to convey binary informations over the web. The physical bed besides defines what sort of web interface arranger must be installed in each computing machine and what sort of hubs to utilize. Physical bed options include assorted types of Cu or fiber ocular overseas telegram, every bit good as many different wireless solutions. In the instance of a LAN, the physical bed specifications are straight related to the data-link bed protocol used by the web. When you select a data-link bed protocol, you must utilize one of the physical bed specifications supported by that protocol. For illustration, Ethernet is a data-link bed protocol that supports several different physical bed options. You can utilize one of two types of coaxal overseas telegram with Ethernet, any one of several types of distorted brace overseas telegram, or fiber ocular overseas telegram. The specifications for each of these options include a great trade of detailed information about the physical bed demands, such as the exact type of overseas telegram and connections to utilize, how long the overseas telegrams can be, how many hubs you can hold, and many other factors. These specific conditions are required for the protocol to work decently. A overseas telegram section that is excessively long, for illustration, can forestall an Ethernet system from observing package hits. When the system ca n’t observe mistakes, it ca n’t rectify them, and informations is lost. While some facets of the physical bed are defined in the data-link bed protocol criterion, others are defined in separate specifications. One of the most normally used physical bed specifications is the “ Commercial Building Telecommunications Cabling Standard, ” published jointly by the American National Standards Institute ( ANSI ) , the Electronicss Industry Association ( EIA ) , and the other communications component found at the physical bed is the peculiar type of signalling that is used to convey informations over the web medium. For copper-based overseas telegrams, these signals are electrical charges. For fiber ocular overseas telegrams, the signals are pulsations of visible radiation. Other types of web media can utilize wireless frequences, infrared pulsations, and other types of signals. In add-on to the physical nature of the signals, the physical bed dictates the signalling strategy that the computing machines use. The signalling strategy is the form of electrical charges or light pulsations used to encode the binary informations generated by the upper beds. Ethernet systems use a signalling strategy called Manchester encryption, and Token Ring systems use a strategy called Differential Manchester.

The OSI Reference Model Protocols

Application Layer


Presentation Layer


Session Layer


Transport Layer


Network Layer


Data Link Layer


Physical Layer

CSMA/CD and Token Passing

The combined beds of web architecture specify the functionality of a radio web, but wireless webs straight implement merely the lower beds of the theoretical account. A radio NIC, implements the informations link bed and physical bed maps. Other elements of the web such as radio middleware, nevertheless, offer maps that the session bed implements. In some instances, the add-on of a radio web might impact merely the lower beds, but attending to higher beds is necessary to guarantee that applications operate efficaciously in the presence of radio web damages.
Wireless Network Infrastructure

The substructure of a radio web connects radio users and end systems. The substructure normally consists of base Stationss, entree accountants, application connectivity package, and a distribution system. These constituents enhance radio communications and fulfil of import maps necessary for certain applications.

Base Stationss

A Base station is a wireless communications station installed at a fixed location and used to pass on. For illustration a radio telephone system such as a cellular or cell site, a bipartisan wireless system or a trunked wireless. Base Stationss can be controlled locally or remote controlled. Base Stations support many different constellations. Point-to-multipoint functionality enables a base station to pass on with more than one radio computing machine device or base station. An entree point within a radio LAN implements this signifier of communications. The entree point represents a individual point which many computing machine devices connect to and pass on with each other and systems within the wireless substructure.

Entree Accountants

Access accountants apply to a broad scope of applications. In a public radio LAN, an entree accountant regulates entree to the Internet by authenticating and authorising users based on a subscription program. Similarly, a corporation can implement an entree accountant to assist a hacker sitting in the company ‘s parking batch from acquiring entry to sensitive informations and applications. The usage of an entree accountant reduces the demand for smart entree points, which are comparatively expensive and include many non-802.11 characteristics. By and large, sellers refer to these smarter entree points as being enterprise-grade constituents. Advocates of entree accountants, nevertheless, argue that 802.11 entree points should concentrate on RF excellence and low cost. Access accountants employ the undermentioned characteristics, Authentication, Encryption, Subnet roaming, and Bandwidth direction.

Application Connectivity Software

A batch of applications such as Web surfing and e-mail, perform good over wireless LANs. All it takes is a browser and e-mail package on the client device. Users may lose a wireless connexion from time-to-time, but the protocols in usage for these comparatively simple applications are reasonably resilient under most conditions. For the applications which do n’t hold a user interface it is necessary to you need application connectivity package to enable communications between the client device and the application package or databases located on a centralized waiter. Some of these package applications include terminal emulation, direct database connectivity, and radio middleware.

Terminal emulation

Terminal emulation package runs on an end-user device and lets the client operate as a traditional terminus, pass oning straight with application package running on a host-based system. The terminus has a user interface to accept input by the applications package. For illustration, VT220 terminal emulation communicates with applications running on a UNIX host, 5250 terminal emulation works with AS/400-based systems, and 3270 terminal emulation interfaces with IBM mainframes.

Direct database connectivity

Direct database connectivity encompasses application package running on a client that interfaces over TCP/IP straight with a database on a waiter. The package on the end-user device provides all the application functionality. This enables flexibleness when developing applications because the coder has complete control over what maps are implemented and is non constrained by the bequest applications on the host. Direct database connexions are frequently the best attack if you need a batch of flexibleness in composing the application package.

However both terminal emulation and direct database connectivity over TCP/IP can turn out inefficient when deployed across a radio LAN, so in order to increase public presentation it may be of import whilst planing a radio LAN to include some characteristics known as Wireless Middleware.

Wireless Middleware

Wireless middleware is package that separates or shields applications from the underlying radio web, doing it easier to develop new radio applications. Wireless middleware normally consists of client and waiter package. The client part lies on the nomadic computing machine and accepts messages from applications on the nomadic computing machine. It reformats these messages and forwards them across the radio web utilizing application-layer protocols. The messages so reach the middleware waiter, which lies on the finish LAN. The middleware server maps as a gateway to other waiters and hosts on the LAN, moving as a placeholder waiter for the nomadic computing machine.

Benefits of Wireless Middleware

Minimizes the sum of informations sent over the wireless connexion.

Reduces the figure of back-and-forth messages required to finish a dealing.

Queues messages when a connexion is non available.

Provides an API.

Distribution System

A radio web as the name would propose is by and large free of wires. However, the distribution system of a radio web necessarily includes wiring at some phase. The entree points, entree accountants, and waiters must be connected together. Normally the common Ethernet comprises the distribution system. Some overseas telegrams which are frequently used when puting up a Wireless LAN include

Ethernet normally consists of twisted-pair wiring, coaxal overseas telegram, and optical fibre for complecting web devices, such as entree points and other distribution equipment.

Cat 5 consists of four unshielded twisted braces of 24-gauge wires that support Ethernet signals over 100 metres about 300 pess of telegraphing. Ethernet repeaters increase this scope if necessary, which is one method of making a radio web base station that ‘s beyond 100 m from a communications cupboard.

The followers are types of twisted-pair options for Ethernet common to wireless LAN distribution systems:


A 10Base-T system connects utilizing RJ-45 connections. A star topology is common with 12 or more computing machines connected straight to a hub or concentrator.

10Base-T system operates at 10 Mbps and uses baseband transmittal methods.

10Base -T has maximal lengths of 100 metres.


100BASE-T is based on the older Ethernet criterion.

Supports informations transportation rates up to 100 Mbps.

Because it is 10 times faster than Ethernet, it is frequently referred to as Fast Ethernet.

Planing and Keeping the Wireless LAN ‘s Lifecycle

So now that I have discussed all the engineerings and substructures needed to successfully put in a radio LAN, I will now step through the operations of the design stage of a radio LAN. Like with all designs it is necessary to pull up a design program. The design program best suited to planing a radio LAN would be the execution of a design wheel known as the PPDIOO Methodology. The PPDIOO lifecycle stages are considered separate stages yet they are all closely related. Each measure represents the phase of the lifecycle of the LAN. PPDIOO stands for Prepare, Plan, Design, Implement, Operate and Optimize.


During the Prepare phase the interior decorator must get down with the concern demands that their company or client demands. At this stage the interior decorator would run into with the company to invent a scheme that meets the demands of the company. Key determination shapers i.e. the company manager or IT director place the initial demands. Budget and timeframes may besides be taking into consideration at this phase. The design must include a description of each web component, the location of entree points, criterions and the merchandises necessary for run intoing specific demands. The design must be approved by the company before installing can get down. This stage is portion of the Service scheme.


During the Plan phase the interior decorator must place the web demands. These demands are based on the ends of the web, where the web will be installed and what type of ( if any ) substructure already exists. Upon review a undertaking program can be drawn up to assist pull off undertakings, duties, mileposts and resources needed to put in or construct upon the bing web. The undertaking program must bind in with the budget costs and timeframes discussed in the prepare stage. This stage is portion of the Service scheme.


During the Design stage all affairs discussed in the prepare and program stage must be tied together into a design specification. The design must be highly elaborate. The specification must back up handiness, security, dependability, scalability and public presentation. After the design is drawn up the web is now ready to be installed. This stage is portion of the Service design. This stage is portion of the Service design.


During the Implementation stage a pilot web fashioning of a simulator is put in topographic point in order to prove the web to see how powerful it is. This stage is portion of the Service passage.


Operation is the concluding trial of the design ‘s apprioateness. This stage involves keeping web wellness and to suss out any possible mistakes in the web. All this provides initial informations for the web lifecycle ‘s optimize stage. This stage is portion of the Service operation.


This stage is based on proactive web direction. It is necessary to observe possible mistakes in the web before they arise and cause break to the company. Reactive mistake sensing and troubleshooting are necessary when proactive direction can non foretell possible failures. This stage is portion of the Service design. ( See diagram below ) .

Measuring Technologies

A radio web interior decorator must measure and take the right engineering that bests suits their demands set out by the company manager at the Plan stage. The engineering he or she chooses will function the footing for choosing chipsets, merchandise providers and system interfaces that are portion of the radio LAN solution. In this instance the interior decorator might take some of the undermentioned appraisal parametric quantities to specify what each of the engineerings is capable of supplying

Transmit Frequency

Transmit Power


Datas Ratess




Electric Current

Merchandise Handiness


Operational Support of a Wireless LAN

All facets of operational functionality must be outlined and addressed by the web interior decorator. Such operations include.

Training – All staff utilizing the engineerings or applications must be trained.

System disposal – Between the user and the system.

Help desk – A cardinal point of contact for users who might necessitate aid with the web and its resources.

Maintainence – Troubleshooting and fixs to the web.

Configuration control – Lack of proper control over alterations to the web can ensue in applications and systems that are non interoperable.

Configuration Control Board – Who is in charge of what country.


Lecture Notes:

Michael O’Donnell ‘s talk notes on Network Design Management


Wireless LANs – Implementing High Performance IEEE 802.11 Networks

Web sites:

hypertext transfer protocol: //www.wi-fiplanet.com/

hypertext transfer protocol: //www.ciscopress.com/articles/article.asp? p=344242

hypertext transfer protocol: //en.wikipedia.org

hypertext transfer protocol: //www.networkcomputing.com/netdesign/wireless5.html

hypertext transfer protocol: //www.ciscozine.com/2009/01/29/the-ppdioo-network-lifecycle/