Asee peer logo

Comparative Framing Analysis For Teaching Wireless Network Mobility

Download Paper |

Conference

2008 Annual Conference & Exposition

Location

Pittsburgh, Pennsylvania

Publication Date

June 22, 2008

Start Date

June 22, 2008

End Date

June 25, 2008

ISSN

2153-5965

Conference Session

Information Technologies Classroom Instruction

Tagged Division

Information Systems

Page Count

15

Page Numbers

13.307.1 - 13.307.15

DOI

10.18260/1-2--4366

Permanent URL

https://strategy.asee.org/4366

Download Count

439

Request a correction

Paper Authors

biography

Robert MacDonald Purdue University

visit author page

Robert MacDonald is a graduate student with the College of Technology at Purdue University. He completed his undergraduate degree in 2006, obtaining his BS in Network Engineering Technology from Purdue University as well. Robert is expecting to complete his MS in December of 2008. His interests lie in advanced internetwork design, wireless networking, and applied network security. His thesis research is focused on the implementation of secure routing protocols.

visit author page

biography

Raheel Malik Whirlpool Corp.

visit author page

Raheel A. Malik is a senior analyst with the Information Security and Audit Compliance team at Whirlpool Corporation in Benton Harbor, MI. His responsibilities include penetration testing their network, conducting internal IT audits for Sarbanes-Oxley compliance, investigating computer-related security incidents, and providing security consulting for on-going projects. Raheel holds a Masters of Science degree specializing in Information Security and a Bachelors of Science degree, with distinction, in Telecommunications and Networking from Purdue University, West Lafayette, IN.

visit author page

author page

Anthony Smith Purdue University

author page

James Goldman Purdue University

Download Paper |

Abstract
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract

Comparative Framing Analysis for Teaching Wireless Network Mobility Abstract As wireless networking in the enterprise has gained popularity within recent years, the demand for technical talent has increased in direct proportion to that demand. This has occurred partially due to the complexity of troubleshooting and security issues. Professional wireless networking certification programs have also become popular as a result of the financial incentives associated with this demand. Since the content taught in these professional certifications is an appropriate reflection of the challenges faced in the real world as reported by Fortune magazine, it is appropriate to align the content of undergraduate wireless networking courses with that of these professional certifications.

University professors have often taken the approach of teaching 802.11 wireless networks starting from the signal processing layer and immediately transitioning to the higher layers. This process bypasses the Media Access Control (MAC) layer in consequence. Understanding the MAC layer is of utmost importance for understanding wireless network security because it contains the management frames that control both authentication and encryption. Additionally, the potential impacts and effects of the distribution system implemented are glossed over.

In this paper, a new course module was created for undergraduates that builds on a laboratory framework developed previously. The previously developed framework focused on the 802.11 and 802.3 MAC layers and can be used to facilitate teaching troubleshooting and security concepts for wireless networking with the help of packet sniffers. These modules provided students with the hands-on experience of what is generally illustrated in only text for Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Virtual Private Networking (VPN) as well as troubleshooting skills. The new module is geared towards upper classmen and graduate students. This module focuses on the potential distribution systems for 802.11 WLANs, including a proprietary mesh protocol, wireless distribution system, and the classic wired network.

1. Introduction The introduction of wireless networking has allowed people the freedom to access networks, including the Internet, from almost any location. This fact has been reflected, in part, by a surge in laptop sales over the recent years. Vice president of Gartner’s worldwide computing platforms, Charles Smulders, states that “Consumers are flocking to notebooks because of lower prices, better performance, and an increased appreciation for wireless technologies.”5 The increased appreciation here stems from the transparently bridging technologies. According to an engineer at Qualcomm, “One of the fundamental design goals for 802.11 is to provide services that are consistent with the services of 802.3 networks. This makes the peculiarities of wireless communication irrelevant to higher layers of the protocol stack.”10 The most important differences, therefore, lie between the wireless and the wired networking bridge as all the higher layer protocols communicate transparently over them. The simplicity and mobility of wireless networks arises from the characteristics of its contention domain which requires little infrastructure while providing service up to 300 feet.16 The contention domain works much like a wired Ethernet hub.4 This is an inherent weakness of wireless networks that can be examined for

MacDonald, R., & Malik, R., & Smith, A., & Goldman, J. (2008, June), Comparative Framing Analysis For Teaching Wireless Network Mobility Paper presented at 2008 Annual Conference & Exposition, Pittsburgh, Pennsylvania. 10.18260/1-2--4366

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2008 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015