Chapter 14 - Site Survey Fundamentals
Name the necessary calculations for an outdoor bridging survey under 5 miles. (Choose all that apply.) A.Link budget B.Free space path loss C.Fresnel zone D.Fade margin adjustment E.Height of the antenna beamwidth
A, B, C, D.Outdoor bridging site surveys require many calculations that are not necessary during an indoor survey. Calculations for a link budget, FSPL, Fresnel zone clearance, and fade margin are all necessary for any bridge link.
Which of the following tools might be used in an outdoor site survey of an area designed to provide outdoor coverage? (Choose all that apply.) A. Spectrum analyzer B. Outdoor blueprints or topography map C. Mesh routers D. GPS E. Oscilloscope
A, B, C, D.Outdoor site surveys are usually wireless bridge surveys; however, outdoor access points and mesh routers can also be deployed. Outdoor site surveys are conducted using either outdoor access points or mesh routers, which are the devices typically used to provide access for client stations in an outdoor environment. These outdoor Wi-Fi surveys will use most of the same tools as an indoor site survey but may also use a global positioning system (GPS) device to record latitude and longitude coordinates.
Which of the following statements best describe security considerations during a wireless site survey? (Choose all that apply.) A. Questions will be asked to define the customer's security expectations. B. Wireless security recommendations will be made after the survey. C. Recommendations about wireless security policies may also be made. D. During the survey, both mutual authentication and encryption should be implemented.
A, B, C.Although security in itself is not part of the WLAN site survey, network man-agement should be interviewed about security expectations. The surveying company will make comprehensive wireless security recommendations. An addendum to the security recommendations might be corporate wireless policy recommendations. Authentication and encryption solutions are not usually implemented during the physical survey
The Jackson County Regional Hospital has hired you for a wireless site survey. Prior to conducting the site survey, you should consult with employees from which departments? (Choose all that apply.) A. Network management B. Biomedical department C. Hospital security D. Custodial department E. Marketing department
A, B, C.You should consult with network management during most of the site survey and deployment process, to ensure proper integration of the WLAN. You should consult with the biomedical department about possible RF interference issues. You should contact hospital security in order to obtain proper security passes and, possibly, an escort.
What additional documentation is usually provided along with the final site survey deliverable? (Choose all that apply.) A. Bill of materials B. Implementation diagrams C. Network topology map D. Project schedule and costs E. Access point user manuals
A, B, D.Based on information collected during the site survey, a final design diagram will be presented to the customer. Along with the implementation diagrams will be a detailed bill of materials (BOM) that itemizes every hardware and software component necessary for the final installation of the wireless network. A detailed deployment schedule should be drafted that outlines all timelines, equipment costs, and labor costs.
ACME Hospital uses a connection-oriented telemetry monitoring system in the cardiac care unit. Management wants the application available over a WLAN. Uptime is very important because of the critical nature of the monitoring system. What should the site survey and design engineer be looking for that might cause a loss of communication over the WLAN? (Choose all that apply.) A. Medical equipment interference B. Safety glass containing metal mesh wire C. Patients D. Bedpans E. Elevator shafts
A, B, E.Any type of RF interference could cause a denial of service to the WLAN. A spectrum analysis survey should be performed to determine if any of the hospital's medical equipment would cause interference in the 2.4 GHz ISM band or the 5 GHz U-NII bands. Dead zones or loss of coverage can also disrupt WLAN communications. Many hospitals use metal mesh safety glass in many areas. The metal mesh will cause scattering and potentially create lost coverage on the opposite side of the glass. Elevator shafts are made of metal and often are dead zones if not properly covered with an RF signal.
Which of the following tools can be used in an indoor site survey? (Choose all that apply.) A.Measuring wheel B.GPS C.Ladder D.Battery pack E.Microwave oven
A, C, D.A measuring wheel can be used to measure the distance from the wiring closet to the proposed access point location. A ladder or forklift might be needed when temporarily mounting an access point. Battery packs are used to power the access point. GPS devices are used outdoors and do not work properly indoors. Microwave ovens are sources of interference.
Which documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.) A. Blueprints B. Network topography map C. Network topology map D. Coverage map E. Frequency map
A, C.Blueprints will be needed for the site survey interview to discuss coverage and capacity needs. A network topology map will be useful to assist in the design of integrating the wireless network into the current wired infrastructure
Which of these measurements are taken during a passive manual site survey? (Choose all that apply.) A. SNR B. dBi C. dBm signal strength D. dBd
A, C.During a passive manual survey, the radio card is collecting RF measurements, including received signal strength (dBm), noise level (dBm), and signal-to-noise ratio (dB). The SNR is a measurement of the difference in decibels (dB) between the received signal and the background noise. Received signal strength is an absolute measured in dBm. Antenna manufacturers predetermine gain using either dBi or dBd values.
Which access point settings should be recorded during an AP-on-a-stick site survey? (Choose all that apply.) A. Power settings B. Encryption settings C. Authentication settings D. Channel settings E. IP addresses
A, D.Wherever an access point is placed during a site survey, the power and channel settings should be noted. Recording security settings and IP addresses is not necessary.
The Harkins Corporation has hired you to make recommendations about a future wireless deployment that will require more than 300 access points to meet all coverage requirements. What is the most cost-efficient and practical recommendation in regard to providing electrical power to the access points? A. Recommend that the customer replace older edge switches with new switches that have inline PoE. B. Recommend that the customer replace the core switch with a new core switch that has inline PoE. C. Recommend that the customer use single-port power injectors. D. Recommend that the customer hire an electrician to install new electrical outlets.
A.The cheapest and most efficient solution would be to replace the older edge switches with newer switches that have inline power that can provide PoE to the access points. A core switch will not be used to provide PoE because of cabling distance limitations. Deploying single-port injectors is not practical, and hiring an electrician would be extremely expensive.
Name potential sources of interference that might be found during a 2.4 GHz site survey. (Choose all that apply.) A. Toaster ovens B. Nearby 802.11 FHSS access points C. Plasma cutters D. Bluetooth headsets E. 2.4 GHz video cameras
B, C, D, E.Spectrum analysis for an 802.11b/g/n site survey should scan the 2.4 GHz ISM band. Bluetooth radios, plasma cutters, 2.4 GHz video cameras, and legacy 802.11 FHSS access points are all potential interfering devices.
Name potential sources of interference in the 5 GHz U-NII bands. (Choose all that apply.) A. Microwave ovens B. Cordless phones C. FM radios D. Radar E. Unlicensed LTE transmissions
B, D, E.Cordless phones that operate in the same space as the 5 GHz U-NII bands may cause interference. Unlicensed LTE transmissions may also be a potential source of interference in the 5 GHz bands. Radar is also a potential source of interference at 5 GHz. Micro-wave ovens transmit in the 2.4 GHz ISM band. FM radios use narrowband transmissions in a lower-frequency licensed band.
Name a unique consideration when deploying a wireless network in a hotel or other hospitality business. (Choose the best answer.) A. Equipment theft B. Aesthetics C. Segmentation D. Roaming E. User management
B.Although all the options are issues that may need to be addressed when deploying a WLAN in a hospitality environment, aesthetics is usually a top priority. The majority of customer service businesses prefer that all wireless hardware remain completely out of sight. Note that most enclosure units are lockable and help prevent theft of expensive Wi-Fi hardware. However, theft prevention is not unique to the hospitality business.
Which type of site survey uses modeling algorithms and attenuation values to create visual models of RF coverage? A. Associated B. Passive C. Predictive D. Assisted E. Active
C.Predictive coverage analysis is accomplished using software that creates visual models of RF coverage and capacity, bypassing the need for actually capturing RF measurements. Projected coverage zones are created using modeling algorithms and attenuation values.
The ACME Corporation has hired you to design a wireless network that will have data clients, VoWiFi phones that do not support 802.11r, and access for guest users. The company wants the strongest security solution possible for the data clients and phones. Which design best fits the customer's requirements? A. Create one wireless VLAN. Segment the data clients, VoWiFi phones, and guest users from the wired network. Use 802.1X/EAP authentication and CCMP/AES encryption for a wireless security solution. B. Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three distinct VLANs. Use 802.1X/EAP authentication and TKIP encryption for security in the data VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN will have no security, other than possibly a captive portal. C. Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three distinct VLANs. Use 802.1X/EAP authentication with CCMP/AES encryption for security in the data VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN traffic will require a captive web portal and a guest firewall policy for security. D. Create two separate VLANs. The data and voice clients will share one VLAN, while the guest users will reside in another. Use 802.1X/EAP authentication and CCMP/AES encryption for security in the data/voice VLAN. The guest VLAN will have no security, other than possibly a captive portal.
C.Segmentation, authentication, authorization, and encryption should all be considered during the site survey interview. Segmenting three types of users into separate VLANs with separate security solutions is the best recommendation. The data users using 802.1X/EAP and CCMP/AES will have the strongest solution available. Because the phones do not have Voice-Enterprise or 802.11r capabilities, WPA-2 Personal is the chosen security method. WPA-2 Personal provides the voice users with CCMP/AES encryption as well but avoids using an 802.1X/EAP solution that will cause latency problems. At a minimum, the guest user VLAN requires a captive web portal and a strong guest firewall policy.
Which type of WLAN site survey is the most important survey that should always be performed regardless of the vertical deployment? A. AP-on-a-stick survey B. Hybrid survey C. Predictive model survey D. Validation survey
D.All site survey professionals will agree upon the importance of a validation survey. Coverage verification, capacity performance, and roaming testing are key components of a proper validation survey. Depending on the purpose of the wireless network, different tools can be used to assist with the validation site survey.
After conducting a simple site survey in the office building where your company is located on the fifth floor, you have discovered that other businesses are also operating access points on nearby floors on channels 2 and 8. What is the best recommendation you will make to management about deploying a new WLAN for your company? A. Install a 2.4 GHz access point on channel 6 and use the highest available transmit power setting to overpower the WLANs of the other businesses. B. Speak with the other businesses. Suggest that they use channels 1 and 6 at lower power settings. Install a 2.4 GHz access point using channel 9. C. Speak with the other businesses. Suggest that they use channels 1 and 11 at lower power settings. Install a 2.4 GHz access point using channel 6. D. Recommend installing a 5 GHz access point. E. Install a wireless intrusion prevention system (WIPS). Classify the other businesses' access points as interfering and implement deauthentication countermeasures.
D.Although option C is a possible solution, the best recommendation is to deploy hard-ware that operates at 5 GHz. Interference from the neighboring businesses' 2.4 GHz net-works will never be an issue.
Which type of coverage analysis requires a radio card to be associated to an access point? A. Associated B. Passive C. Predictive D. Assisted E. Active
E.During an active manual survey, the radio card is associated to the access point and has upper layer connectivity, allowing for low-level frame transmissions while RF measurements are also taken. The main purpose of the active site survey is to look at the percentage of layer 2 retransmissions.
During the interview process, which topics will be discussed so that the WLAN will integrate properly into the existing wired architecture? A. PoE B. Segmentation C. User management D. AP management E. All of the above
E.Multiple questions are related to infrastructure integration. How will the access points be powered? How will the WLAN and/or users of the WLAN be segmented from the wired network? How will the WLAN remote access points be managed? Considerations such as role-based access control (RBAC), bandwidth throttling, and load balancing should also be discussed.