Planning WLAN Operational Support

Operational support generally contributes
to nearly fifty percent of the total lifecycle costs of a wireless LAN. As a
result, be sure to fully plan related operational support. Support elements
for wireless LANs are similar to those for typical wired networks; however,
wireless support must take into account the uniqueness of radio wave propagation.

Configuration Management Basics

Configuration management consists of controlling changes made to the WLAN after
installation. Changes made to an existing WLAN may involve installing or moving
access points, altering access point configurations (e.g., RF channel),
or updating firmware. In larger projects, especially those that have some sort
of government control, configuration management may also be necessary to keep
from expanding endlessly.

Network managers need to review any changes
that may impact the performance or security of the WLAN. The review ensures
that relevant impacts are taken into account that involves additional costs
and use of resources necessary to support the request. In some cases, changes
may merely involve supporting a larger number of users, who may or may not require
modifications made to the network. Other instances could include a need for
wider RF
and additional access points.

Important Underlying Processes

A company should utilize a change request
form as an input into the configuration management process. The purpose of this
form is to summarize the requested change in a manner that makes it fairly simple
to determine the level of review needed to accept or reject the proposed change.
For instance, the addition of a new application would likely require the review
by security and engineering functions to determine whether mechanisms are in
place to safeguard the application and provide adequate levels of performance.

A key aspect of configuration management includes
the development and management of a baseline architectural design and support
plan. When someone proposes or requests the deployment of a wireless LAN or
a change that prompts the modification to an existing wireless LAN, then the
company should utilize this baseline as the basis for validating and verifying
the design and assessing the impacts. This process includes determining the
impact of the proposed change on the overall wireless LAN and peripheral systems.

The implementation of an effective configuration
management process also includes the establishment and use of a configuration
management database, which includes a listing of all installed components, configuration
settings, and applicable diagrams that document the current state of the wireless
LAN. This database should include a listing of all hardware and software (including
configurations) that are part of the wireless LAN. As the company accepts changes
to the wireless LAN configuration, they would then update the database to reflect
the new state of the system. This avoids having the only knowledge of the wireless
LAN composition from leaving the company as network management staff move on
to jobs elsewhere.

Configuration Change Considerations

Anyone, including users, should be able to
request a modification to the wireless LAN. The following offers some examples
of typical configuration management items that may require attention:

  • RF channel. The maintenance staff could request adjusting the RF
    channel on a specific access point, possibly because they have evidence that
    the access point is interfering with another one. Before authorizing this
    change, be sure to think about effects of the new channel setting on all access
    points. In order to maximize the capacity and performance of the wireless
    LAN, access points within range of each other should be set to non-interfering
  • Transmit power. In some cases, a request may come about because of
    the need to either increase or decrease the range of a particular access point.
    For example, an access point may need to be set to a lower value to enable
    the installation of additional access points for the purpose of reducing cell
    size and the number of users associated with each access point. The overall
    effect of this could be to increase the throughput available for each user.
    When making this type of change, ensure that it will result in adequate coverage
    in all user areas. If making a change that increases transmit power, be certain
    that inter-access point interference is kept to a minimum.
  • Applications. A user or manager may request a new application, such
    as video conferencing, that will traverse the WLAN. As a result, carefully
    size up the network to ensure that there will be enough capacity to support
    the application along with existing ones. Other cases may include setting
    up public wireless
    Internet access to an existing wireless LAN that currently only services company
    applications. In this case, some engineering will likely be necessary to keep
    public and company traffic separate and secure.
  • RF coverage. If users complain that holes exist in the coverage throughout
    some parts of the facility, then an alteration is necessary to improve coverage.
    This will likely entail the repositioning or installation of access points,
    but try making configuration changes (e.g., transmit power) before spending
    money on new hardware.
  • Firmware. A company will need to periodically update the firmware
    of the access points and possibly radio card in user devices in order to take
    advantage of performance, security, and interoperability enhancements that
    the vendor offers. Before actually updating the firmware in operational access
    points, though, perform enough testing with the new firmware on access points
    in a lab environment to ensure that the firmware will support all applications
    in use on the wireless LAN.
  • Security improvements. A company may discover that their existing
    wireless LAN doesn’t have security mechanisms that fully protect company assets.
    In this case, the additional of access controllers or enhancements
    to access points may be necessary. Of course these types of changes should
    only be made after defining security requirements and analyzing potential

Stay tuned! In part II of this tutorial, we’ll take a closer look at network
management as we continue through various aspects of planning operational support
for wireless LANs.

Jim Geier provides independent consulting
to companies developing and deploying wireless network solutions.
He is the author of the book, Wireless
and offers training
focusing on wireless LANs.

News Around the Web