Professional Documents
Culture Documents
AppLabs.com
App_Whitepaper_Wireless_Testing_Approach_1v00 Page © 2007 AppLabs
==== Original MSDU ====
DA: FF FF FF FF FF FF
SA: 00 40 96 28 8D DC
Payload: 08 06 00 01 08 00 06 04 00 01 00 40 96 28 8D
DC A1 2C EE 03 00 00 00 00 00 00 A1 2C EE 14 21 BD D8
23 21 BD A8 AC 52 E1 01 00 00 00 28 AC 0F 82
Compatibility Testing
The 802.11 wireless world is governed by standards.
However the different wireless components do not always
interoperate well. Within a single WLAN infrastructure
there may be many combinations of client adapters and Although it may seem that these systems and mechanisms
wireless access points. Even if the model numbers of the should work together and that each one is being used
components are the same, there may be different software successfully and securely already, there are so many
versions deployed within the devices. Compatibility testing possible permutations that it is entirely possible that many
is required to prove that the chosen devices do actually WLAN implementations are effectively uniquely constructed
work together as expected. and security testing is required to verify their end-to-end
integrity.
Security Testing
Wireless networks are becoming more popular in the
Quality of Service Testing
corporate environment. As such, corporate network One of the ways that wireless networking has evolved
administrators rightfully insist on making the network as surrounds the use of multimedia applications (voice,
secure as possible. A secure wireless strategy includes video, etc) over the wireless medium. Such applications
encryption, authentication, and key management. require guaranteed access to the network in order that
Encryption ranges from static WEP to rotating keys the audio/video stream is of an acceptable quality. The
generated by the access point. The wireless network mechanism employed to ensure the quality of multimedia
can authenticate the wireless user or client using a variety communications over the network is called “Quality of
of authentication protocols and backend systems. Key Service” (QoS) and is implemented on a wireless network
management refers to the mechanism being employed to
using the Wi-Fi Multimedia (WMM) functionality. WMM
rotate the keys. Some of the most common systems and
is based on a subset of the IEEE 802.11e WLAN QoS
mechanism that are deployed are:
draft standard. The implementation of WMM is judged
Microsoft Internet Authentication Service (IAS) by generating known traffic types on the network and
validating correct behavior in terms of priority values in the
Cisco Access Control Server (ACS) packets and traffic flow through the network.
Key Management:
End-to-End Testing
Cisco Centralized Key Management (CCKM)
A comprehensive WLAN test strategy will include full end-
WPA to-end business process testing within the test WLAN
WPA2 environment allowing business risk mitigation before WLAN
deployment occurs on site. Due to the many configurations
802.1x Extensible Authentication Protocol (EAP) of all
that may need to be tested, this is essentially application
kinds
regression testing. Regression testing is the form of testing
EAP-TLS (certificate-based authentication) most amenable to test automation. Consideration needs
to be given to the feasibility of test automation and the
EAP-GTC (password or token-based
potential cost and quality benefits that may be obtained
authentication)
through test automation.
PEAP
EAP-FAST
LEAP
AppLabs.com
App_Whitepaper_Wireless_Testing_Approach_1v00 Page © 2007 AppLabs
Performance Testing Summary
A common measure of wireless performance is throughput.
Modern enterprise IT infrastructures are already highly
Regardless of the 802.11 band (a/b/g), wireless client
complex entities. Adding WLAN capabilities only adds to
adapter vendors are concerned with throughput as a
the complexity, which increases the risk of implementation
performance metric and point of comparison. In the
defects, leading to operational failure. Testing is essential
wireless world, range is simulated by adding attenuation to
to uncover the defects prior to going live. If the defects
the antenna on the wireless access point.
are not identified and fixed before the WLAN becomes
Wireless throughput is a function of multiple factors, most operational it may never meet its service level agreements.
notably: A successful WLAN implementation requires a test strategy
that recognizes both the technology and business issues
Distance between the client adapter and the access
that need to be addressed before the full business benefits
point (often simulated in the test environment by can be realized.
introducing attenuation to the wireless signal)
AppLabs.com
App_Whitepaper_Wireless_Testing_Approach_1v00 Page © 2007 AppLabs