design and the implimentation of wireless local area networking.
-
Upload
adebowale-lateef-muritala-lamlass -
Category
Documents
-
view
66 -
download
0
description
Transcript of design and the implimentation of wireless local area networking.
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 1/51
THE DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL
AREA NETWORK IN THE DEPARTMENT OF ELECTRICAL
ELECTRONICS AND COMPUTER ENGINEERING IGBESA,
OGUN STATE
BY
MICHAEL EDAFEAJIROKE NCEF/09/024
LATEEF MURITALA A. NCEF/09/013
AIYEGORO OMOLADE NCEF/09/014
IBIROGBA AKINLOLU P. NCEF/09/008
SUBMITTED
TO
THE DEPARTMENT OF COMPUTER
ENGINEERING IN PARTIAL FULFILMENT FOR THE
AWARD
NATIONAL DIPLOMA IN COMPUTER ENGINEERING
NOVEMBER 2011
1
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 2/51
CERTIFICATION
This is to certify that this project work was carried out by
EDAFEAJIROKE MICHAEL NCEF/09/024
LATEEF MURITALA A. NCEF/09/013
AIYEGORO OMALADE NCEF/09/014
IBIROGBA AKINLOLU P NCEF/09/008
And submitted to the department of computer Engineering Gateway (ICT)
polytechnic Igbesa Ogun state.
ADEKUSIBE KEHINDE Date
Project Supervisor
OMOFUAMA O. Date
Project Supervisor
OLULEYE G.F Date
Project Supervisor
ADEKUSIBE KEHINDE Date
H.O.D Computer Engineering
2
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 3/51
DEDICATION
This report is specially dedicated to Almighty God, for his
blessings, mercies, protection, for the completion of this National
diploma program.
At human level, we are indebted to every individual who at
various stages had helped in the completion of this work, thank
you and we love you all.
.
3
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 4/51
ACKNOWLEDGEMENT
We appreciate the lord Almighty, for his protection throughout the program,
giving hope when hope seems to be lost, for his vision for us and favour hehas always shown from the day we were born, Thank you God.
We sincerely acknowledge our able supervisors Engr. Gabriel Adekusibe, Engr.
Omofuama, Engr. G. f. Oluleye for their guidance, encouragement, patient with
excellent supervision throughout the research work.
We also acknowledgement the cisco department headed by Mr. Olusanya
Olabanji john, and Mr. Oloyede Emmanuel for their entire support given to us
during the project.
our greatest thanks goes our parents Mr. & Mrs. Aiyegoro, Mr. & Mrs. Lateef
Aderemi, Mr. & Mrs. Edafeajiroke, Mr. & Mrs. Ibirogba and every other uncle,
brothers and sisters that have contributed to the success of the program, we
love you all and God bless.
We use this time to appreciate the entire department, the HODs, and staffs,
God bless every one of you. Thanks,
4
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 5/51
TABLE OF CONTENT
CERTIFICATION............................................................................................................2
DEDICATION................................................................................................................3
ABSTRACT...................................................................................................................8
CHAPTER ONE.............................................................................................................9
1.0 GENERAL OVERVIEW ....................................................................................... 9
1.1 STATEMENT OF THE PROBLEM ....................................................................... 9
1.2 RESEARCH QUESTION .................................................................................. 10
1.3 SPECIFIC OBJECTIVES ................................................................................... 10
1.4 THE SCOPE OF THE STUDY ........................................................................... 10
1.5 SIGNIFICANT OF THE STUDY ......................................................................... 11
1.6 CONTRIBUTION TO KNOWLEDGE .................................................................. 11
1.7 GLOSSARY OF NETWORK TERMS .................................................................. 11
2.0 Network ...................................................................................................... 20
2.3 Network Design Steps ................................................................................. 22
2.4 Computer Architecture................................................................................ 22
2.5 Network Operation and Management .......................................................... 23
2.6 Wireless intrusion prevention system ........................................................... 24
2.6.1 Purpose ..................................................................................................... 24
2.6.2 Intrusion Detection .................................................................................... 24
2.6.3 Intrusion Prevention .................................................................................. 24
2.7 Network Implementation .............................................................................. 25
2.7.1 Hosted Implementation ............................................................................. 26
2.7.2 Notable implementations .......................................................................... 26
2.0 THE DESIGN AND IMPLEMENTATION OF WLAN ............................................... 28
5
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 6/51
3.1 DESIGN TOPOLOGY ...................................................................................... 28
LOGICAL TOPOLOGY .......................................................................................... 28
PHYSICAL ADDRESSS ....................................................................................... 29
STAR TOPOLOGY ............................................................................................... 29
THE BUS TOPOLOGY .......................................................................................... 29
DEPARTMENTAL NETWORK DESIGN MEDIA ......................................................... 30
3.2 NETWORK COMPONENTS .............................................................................. 31
3.3 NETWORK INTERFACE CARD ......................................................................... 32
3.4 DATA -LINK SWITCH ..................................................................................... 32
3.5 8DBI NANO STATION .................................................................................... 32
3.6 CABLE AND CONNECTORS ............................................................................ 33
STRAIGHT THROUGH CABLE ............................................................................ 33
CROSS OVER CABLE ................................................................................ 34
CONNECTORS .................................................................................................... 35
3.7 ACCESS POINT .............................................................................................. 36
3.8 WIRELESS LAN PCMCIA CARD ....................................................................... 36
3.9 SERVER ................................................................................................ 36
3.10 CLIENTS OR WORKSTATION ........................................................................ 37
3.11 NETWORK OPERATING SYSTEM (NOS) ........................................................ 37
4.0 INTRODUCTION .................................................................................... 38
4.1 DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL) ................................... 38
4.2 DYNAMIC DHCP ............................................................................................ 39
4.3 CONFIGURING DHCP AND MODE OF WORKING ............................................. 39
4.4 TESTING NETWORK FUNCTIONALITY ............................................................. 39
4.5 TOOLS USED ................................................................................................ 41
4.6 SECURITY ..................................................................................................... 41
6
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 7/51
4.7 LIMITING ACCESS TO A WIRELESS LAN ........................................................ 42
4.7.1 MAC ADDRESS FILTERING ........................................................................ 42
4.7.2 AUTHENTICATION ON A WIRELESS LAN ..................................................... 42
4.8 SECURING THE ACCESS POINTS (AP) ............................................................ 43
4.9 FIREWALL ..................................................................................................... 43
CHAPTER FIVE...........................................................................................................44
5.0 CONCLUSION .............................................................................................. 44
5.1 RECOMMENDATION .................................................................................... 45
REFERENCE .................................................................................47
APPENDIX..................................................................................................................48
7
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 8/51
ABSTRACT
Wireless technology has proved to be the initiator of the emerging cable free
technology.
The wireless technology, among other technology is far- reaching and
spreading in the global technology market. This technology incorporate state-
of-the-act equipment’s and involves efficient implement and installation.
In view of this, a fraction of project studies, in computer engineering
department, Gateway Polytechnic Igbesa decided to implement this
technology (wireless technology) in the department of Electrical/Electronic and
Computer Engineering Department of Gateway Polytechnic Igbesa.
8
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 9/51
CHAPTER ONE
1.0 GENERAL OVERVIEW
In recent time the need for a flexible data communication system(wireless
LAN), in recent time, the need for a flexible data communication) that can be
implemented as an extension or as an alternative for a wired LAN can never
be overemphasized.
Wireless local area network uses radio frequency (RF) technology, wireless
LAN transmits and receive data over the air waves minimizing the need for
wire connection, thereby combining data connection with user mobility.
Wireless networks, like many other technology came of age under theguidance of united states military, the military need a simple, easily
implemented and more secured method of exchanging data and information
in a combat environment .in real sense, wireless network does not mean that
the network is completely free of cabling, most wireless networks actually
consist of wireless component communication with a network that actually
uses cable as a method of connectivity among component in the wired
network
This network we enable student and lecturer’s to have access to online
research, enabling them to meet up with technology demand, creating acontrol base server, e-learning and most important information are being
control from a base server thereby making the department one of those to be
reckoned with in the nearest feature.
As a result of rapid improvement in wireless technology hardware and also
due to increase in the quality by vendors, the cost of wireless technology
reduced drastically thereby making it affordable for the department to
integrate wireless segment into their already existing wire network, and in
connecting buildings to one another without laying copper or fiber cabling
1.1 STATEMENT OF THE PROBLEM
Due to the fact that local area network, called wired network, are prone to
various set back which distort network connection, hence the deployments of
a wireless local area network ,local area network do suffer from network
interruption such as attenuation which is the loss of signals strength, as
9
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 10/51
distance increases, signals distortion called capacitances, the LAN network is
prone to crosstalk ,which is leakage of signals from adjacent wires,
electromagnetic interference, and insecurity of the LAN, were cable signals are
tapped.
Wireless was also need seen there was high necessity for a central basedserver for monitoring files and application.
1.2 RESEARCH QUESTION
In the cause of this project, some thins was put in consideration to make the
project a successful one, these things were, the type of topology that would be
deployed weather star, bus, ring (physical topology), the type of wireless
equipment to be used in the project and the configuration of this equipment
The network protocol that will be running in the switch and how to deploy a
security system for all files and connection to the server, how to configure a
system, bringing all the requirement to have a server by other system in each
offices
1.3 SPECIFIC OBJECTIVES
The project is designed to assess the performance of local area network which
connect existing peer to peer network to server based network for centralizedadministration for security, and proper monitoring of files are improved ,the
various type of network such as WAN (Wired area network ) metropolitan area
network (MAN) , wireless area network (WAN), local area network (LAN),
storage area network (SAN), etc. will be properly emphasized, while the type
we are deploying will be totally elucidated. With the design and
implementation of WLAN there would be mobility or roaming of clients from
one point to another within a specified range provide by an access point there
will also be room for relocation of the network and scalability not left out, the
way this will be deployed is properly explained. This WLAN would perform better and signal to a far distance if a higher garget
i.e. access point are used or more access point are used to boost signals.
1.4 THE SCOPE OF THE STUDY
10
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 11/51
The scope of study in this implemented work will cover the department as a
whole and the environs and also provide room for scalability, the wireless
signals can be seen in all parts of the institution.
1.5 SIGNIFICANT OF THE STUDY
Local area network (LAN) is a computer network that is designed for a limited
geographical area such as building or a campus, they can be privately owned,
it connect computer together for the sole purpose of sharing resources
available in a computer.
Dew to the fact that LAN are faced with so much contortion which are lost
of signal, crosstalk, electromagnetic interference, rigorous running of cable,
hence the deployment of wireless network which transmit signals in form of
radio frequency, easy to access, mobility, scalability, and also the wireless
network can be relocated unlike the LAN.
1.6 CONTRIBUTION TO KNOWLEDGE
With the design and implementation of WLAN it provide internet services for
the department, thereby creating room for e-learning, has an ICT based
institution to improve the practical skills of students, enabling researches for
all learners, and above all providing a base for expansion of the network.
1.7 GLOSSARY OF NETWORK TERMSINFRA-RED; The sight spectrum just shorter than red invisible to human eyes
it used for line of sight data transmission in wireless network.
INTERNET; The global network now used for everything from e-mail to
electronic commerce to research.
INTER OPERABILITY; The capacity of two products to operate together, ideally
according to open standard such as the TCP/IP protocol.
IP (INTERNET PROTOCOL) The part of the TCP/IP protocol responsible forproviding addressing and routing services to packet.
IP ADDRESS ; A sequence of number associated with a network adapter mac
address, it is a 32 bit long and is divide into four byte strings that have value
ranging from 0 to 255e e.g 192.168.1.0
11
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 12/51
IPX (INTERNETWORK PACKET EXCHANGE) ; The part of the novel networks
IPX/SPX protocol responsible for addressing and routing
ISDN (INTERNET SERVICES DIGITAL NETWORK ) ; A switch digital phone
services that in its basic rate interfaces (BRI) can carry up to 128 kilobits per
second of data, in its primary rate interface (PRI) it can be as act as 1.5megabits per second.
ISP (INTERNET SERVICES PROVIDER); A computer that provides connection to
internet
JUMPER; A very small pieces of plastic with a conductive metal strip inside it
LAN (LOCAL AREA NETWORK); a group of computer in a local area tied
together without any router between them all computer are connected to the
same set of hub or switch in a LAN.
LINUX; A tree ware Unix like operating system deployed by Linux Torvalds and
a host of internet programmers.
MAC ADDRESS (media access control address) ; a 6 byte (48 bit) address
unique to each and every network card represented in hexadecimal notation
MAN (MENTROPOLITAN AREA NTWORK) A group of lan in a relatively small
geographical area joined by digital phone lines by other technologies such as
microwaves radio.
MAU (MULTISTATION ACESS UNIT); IBM name for token ring concentrator
MEMORY; The chip that provides a places for the computer to store is an OS it
is need to do computation
MODEM; short for modulation, demodulation, a device used to convert digital
signal into analog tones that can be transmitted over the telephone network
MULTITASKING; IN OPERATIN SYSTEM, the ability to divide the computer time
among two or more running programs simultaneously.
NETBEUI (NETWORK EXTENDED USER INTERFACE) An extension of NETBIOS
that include the capability to frame packet among extended features NETBEUI
is a common implementation of NetBIOS
12
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 13/51
NETBIOS; Network basic i/p system, a small non –routable protocol developed
by IBM for small pc network
NETWARE; Novel’s network operating system, powerful extremely scalable
NETWORK; Any conglomeration of parts working together in a predictableorder group of computer connected by a common topology that enable data to
be transmitted.
NETWORK ADAPTER; An adapter card installation on a computer that allow it
to communicate on network.
NIC (NETWORK INTERFACE CARD); This is also called network adapter an add
in card that plays into a computer and enable it to communicate on a network
NIC are usually AMT Ethernet, token ring or FDDI.
NOS (NETWORK OPERATING CENTER); IT A software that allows a computer to
perform certain network centric take such as authentication , user handling
security and providing connection to network recourse.
OCTET; The official name for byte.
OPEN STANDARD; Hard disk and software standards that are not proprietary to
any given manufacturer TCP/IP and Ethernet are both open standard.
OPERATING SYSTEM; The software in a computer that enable the user to
communicate with the hardware and get task done.
OPTICAL FIBER; A media used by fiber optics network, most network use either
coaxial cable or UTP.
OSI MODEL (OPEN SYSTEM INTERNET CONNECT MODEL); A reference model
that details seven layers of functionality for networks.
PACKET; also called datagram, information placed inside a “wrapper” called
the header, packet contains header (which handle addressing) error correction
checksums and the data sent across the network
PACKET HEADER; see header
PACKET SWITCHING ; A technology in which binary data is divided into small
packages that handle error correction and address information in order to
transmit data across a physical medium such as cable .
13
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 14/51
PC CARD; An electronic device that slides into a slot on the side of a laptop
they are usually network adapter or modems
PEER TO PEER NETWORK; A network built without a central server
PLUG AND PLUG; Adapter card hardware for which I/p addresses as and IRQare set through software rather than through jumper of some sort.
POP (post office protocol): The TCP/IP protocol standard for email transmission
between sever and client pop3 is the current version.
PORTING; The protocol of recompiling c language source code into version that
can run on different computers.
PPP (point to point protocol): a port of TCP/IP protocol suite used to connect
computers across switched telephone lines.
PROTOCOL; An agreed on standard, a protocol used to addressed and ensure
the delivery of packets across network.
PROTOCOL TRANSLATOR; a device that translate between two
NETWORK PROTOCOL; Typically, protocol translators translate NetWare IPX to
TCP/IP so that user on an IP X network can access the internet on IP resources
PROXY SEVER; A sever that hide’s internal network IP addresses from the
internet by making request for internal clients.
QOS; quality of service
REDUNDANCY OR FAULT TOLERANCE; See fault tolerance or redundancy
REPEATER; A device that enable to network to communicate reasonable well .
ROUTER; A device or softer that enable packet towards thrie destinations .
SCALABILITY; the measure of System capacity to grow.
SCRIPTING LANGUAGE ; A limited programming language built into many
operating systems.
SERVER ; a computer on a network that share a specific resource with other
computer.
o SMTP (SIMPLE MAIL TRNSMISSION PROTOCOL) the TCP/Ip standard for
Internet mail.
14
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 15/51
Concentrator : Also called a hub or MAU, helps ensure the robustness of the
network by making sure that the network canot be disconnected because of a
single cable falure
CSU/DSU (channel service unit/ data service unit) : A device that changes local
network packet into packet that can be transmitted over a WAN.
CRACKER : someone who make unauthorized access into other computer
system usually maliciously is not the same as HACKER.
DHCP(dynamic host configuration protocol) :A piece of the TCP/IP protocol
suite that handle the Automatic assignment of IP address to client
DIGITAL : A data transmission type based on the data that been binary coded.
DISK : A device that store digital 1s and 0s on magnetic media such as hard
drive or floppy drive.
DLC (data link control) : a protocol, that Microsoft uses to connect to network
printers.
CLIENT OR HOST : A computer that uses the result share by sever computer.
COAXIAL CABLE : A two conductor cable with a solid center conductor and it is
similar to cable used for TV
BANDWITH : the measurement of the amount of data a particular medium can
carry.
BIT Information represented has 1s and 0s to connect network.
FRAME RELAY ;A method of refraining (or packetizing)already packetized data
to allow it to be transmitted over the phone company’s frame relay
network.frame relay means a type of packet.
FTP (file transfer protocol): the piece of the TCP/IP protocol suite that enable
user to copy files between computers.
GATEWAY: A system that essentially bridge two system it purposes is forcommunication.
GATEWAY protocol : Member of the TCP/IP protocol suite that routes uses to
determine the best route for data packerts.
GUI(graphical user interface) a shell on a computer’s operating system that
graphically represented data.15
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 16/51
HACKER: a much misused term a hacker does not break into computer system
(a cracker does that), instead ,a hacker is a skilled programmer and problem
solver.
Header : The parts of a packet that carries information about the source and
destination of the packet, the checksum and otherabout the packet.
Hard drive : a removable magnetic media drive that stores data on a
computer.
Html : hypertext maark up language , a way of formatting plain text in a
browser window , it uses tags or inline formatting commands to define how
things look.
i/o or throughput : a loose measure of the speed at which a particular pieces of
hardware can move data.
Imap: Internet mail acess protocol or instant messaging access point , a new
piece of TCP/IP protocol suite that handles the transmission of mail between
server and client.
Dns domain name server , the pieces of the TCP/IP protocol suite that resolve
ip address to name address.
NAT network address translation , it conver private IP address to internet
routable address.
PAT port address translation it convert multiple to single global address .
Domains a group of xcomputer whose login acess the network is authenticated
through NT server 2000 server.
Email Electronic nmails , a way of sending text and files across a network with
postal mail like notification.
Encryption key , a server of letters and numbers used to make plain text
message into cipher texts an encryption key’s security depends on how long it
is .
Error correction the process of ensuring that data transferred across wire is
done so correctly
Ethernet a local area network (LAN) topology based on a method called carrier
sense multiple access collision detection ,Ethernet comes in many variety , the
16
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 17/51
specification is available in IEEE 802.3, other version of Ethernet include 802.2
SNMP e.t.c.
Fault or tolerance redundancy : the capability of a computer system to shrong
off failure of a device and continue operating normally.
FDDI : fiber distance data interface , a method of transmitting data across a
network using laser or pulses of light sent over a glass fiber cable rather than
sending electricity over a copper wire.
Firewall : A computer that control access to an internet
10 base 2; Ethernet networking running on coaxial cable, also called thinnet or
cheaper net it support network segment up to 185 meters in length.
10 base 5; also called yellow-card Ethernet, is similar to 10 base 2 but uses a
thicker cable.
10 BASE T; Ethernet in a star topology, uses un unshielded twisted pair wiring
with 8 connectors terminated according to specification standard called TIAA
568B.
ADAPTER CARD; is an electronic assembly that connect to a computer through
a standard interface called a card slot.
ADMINISTRATION; An impossible task involves figuring out how to keep a
network running without problem all the time.
ARPA Advanced Research Project Agency, the government group responsible
for starting the internet .
ASCII America standard code for information interchange, away that
computers format 1s & 0s into the alphabet, numerals and other character
that humans can understand.
ATM Asynchronous Transfer Mode : a new topology for transmitting data
across a network .it’s complex but has many advantages compare to older
topologies such as Ethernet and token ring.
BRIDGE : a device that links different networks together so that they form a
single logical network.
BROWSER : a program that provides a way to view and read the documents
available on the world wide web e.g internet explorer, Mozilla, Firefox uses
browser.
17
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 18/51
SNMP Simple Network management Protocol :the TCP/IP protocol suite that
deals with the transmission of network information for system administration
for system administration and management.
SUBNET : A way of dividing TCP/IP network into smaller pieces for
management or security purposes , subnet are bridge by router.
SUBNET MASK : the portion of an IP Address that defines the network as
opposed to identifying a particular e.g a computer with an IP address of
192.168.1.5 might have a subnet mask of 255.255.255.0
TI : a digital phone line that can carry data at a speed up to 1.544 mega bit
per seconds.
TCP/IP Transmission Control Protocol /Internet Protocol:
Latch all terms to describe the multi faceted protocol suite on which theinternet runs.
UDP User Data Protocol : port of TCP/IP protocol suite that handles unreliable
delivery of packet.
TUNNELING PROTOCOL : the protocol that ensure that data passing over a
company’s virtual private network is secured.
TOPOLOGY : is an arrangement of network .
THINNET : see 10 base 2 Ethernet.
WORLD WIDE WEB (WWW) the resource that can be accessed on the internet
using HTTP, often published in HTML.
WINDOWS NT; Microsoft’s enterprise operating system.
WINDOWS 98; Microsoft’s client operating system
WAN; Wide Area Network composed of two more LANS connected by phone
(generally digital phone lines)..
Virtual Local Area Network (VLAN); A network that appear to be a small LAN to
its users but which is actually a logical construct.
VIRTUAL PRIVATE NETWORK(VPN); a network establish over a carrier digital
phones lines (such as AT & T or sprint unit) and dedicated solely to connecting
several specific clients sites.
18
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 19/51
19
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 20/51
CHAPTER TWO
2.0 Network
A system used to link two or more computers. Network users are able to sharefiles, printers, and other resources; send electronic messages; and runprograms on other computers.
2.1 Network Has Three Layers Of Components:
1] Application software
2] Network software
3] Network hardware
Application software consists of computer programs that interface withnetwork users and permit the sharing of information, such as files, graphics,and video, and resources, such as printers and disks. One type of applicationsoftware is called client-server. Client computers send requests for informationor requests to use resources to other computers, called servers that controldata and applications. Another type of application software is called peer-to-peer. In a peer-to-peer network, computers send messages and requestsdirectly to one another without a server intermediary.
Network software consists of computer programs that establish protocols, or
rules, for computers to talk to one another. These protocols are carried out bysending and receiving formatted instructions of data called packets. Protocolsmake logical connections between network applications, direct the movementof packets through the physical network, and minimize the possibility of collisions between packets sent at the same time.
Network hardware is made up of the physical components that connectcomputers. Two important components are the transmission media that carrythe computer's signals, typically on wires or fiber-optic cables, and thenetwork adapter, which accesses the physical media that link computers,receives packets from network software, and transmits instructions and
requests to other computers. Transmitted information is in the form of binarydigits, or bits (1s and 0s), which the computer's electronic circuitry canprocess.
A network has two types of connections: physical connections that letcomputers directly transmit and receive signals and logical, or virtual,connections that allow computer applications, such as e-mail programs andthe browsers used to explore the World Wide Web, to exchange information.
20
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 21/51
Physical connections are defined by the medium used to carry the signal, thegeometric arrangement of the computers (topology), and the method used toshare information. Logical connections are created by network protocols andallow data sharing between applications on different types of computers, suchas an Apple Macintosh or a personal computer (PC) running the Microsoft
Corporation Windows operating system, in a network. Some logicalconnections use client-server application software and are primarily for fileand printer sharing. The Transmission Control Protocol/Internet Protocol(TCP/IP) suite, originally developed by the United States Department of Defense, is the set of logical connections used by the Internet, the worldwideconsortium of computer networks. TCP/IP, based on peer-to-peer applicationsoftware, creates a connection between any two computers.
Medium used to transmit information limits the speed of the network, theeffective distance between computers, and the network topology. Copperwires and coaxial cable provide transmission speeds of a few thousand bits persecond for long distances and about 100 million bits per second for shortdistances. (A million bits is equal to one megabit, and one megabit per secondis abbreviated Mbps.) Optical fibers carry 100 million to 40 billion bits of information per second over long distances. (A billion bits is equal to onegigabit, and a billion bits per second is abbreviated Gbps.)
Wireless networks, often used to connect mobile, or laptop, computers, sendinformation using infrared or radio-frequency transmitters. Infrared wireless
local area networks (LANs) work only within a room, while wireless LANs basedon radio-frequency transmissions can penetrate most walls. Wireless LANsusing Wi-Fi technology have capacities of around 54 Mbps and operate atdistances up to a few hundred meters. Wireless communications for wide areanetworks (WANs) use cellular radio telephone networks, satellitetransmissions, or dedicated equipment to provide regional or global coverage.Although transmission speeds continue to improve, today’s wide area cellularnetworks run at speeds ranging from 14 to 230 kilobits per second. (A kilobit isequal to 1,000 bits, and one kilobit per second is abbreviated Kbps.) Somenetworks use a home’s existing telephone and power lines to connect multiplemachines. HomePNA networks, which use phone lines, can transmit data as
fast as 128 Mbps, and similar speeds are available on Power Line or Home Plugnetworks.
Common topologies used to arrange computers in a network are point-to-point, bus, star, ring, and mesh. Point-to-point topology is the simplest,consisting of two connected computers. The bus topology is composed of asingle link connected to many computers. All computers on this commonconnection receive all signals transmitted by any attached computer. The star
21
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 22/51
topology connects many computers to a common hub computer. This hub canbe passive, repeating any input to all computers similar to the bus topology, orit can be active, selectively switching inputs to specific destination computers. The ring topology uses multiple links to form a circle of computers. Each linkcarries information in one direction. Information moves around the ring in
sequence from its source to its destination. On a mesh network, topology canactually change on the fly. No central device oversees a mesh network, and noset route is used to pass data back and forth between computers. Instead,each computer includes everything it needs to serve as a relay point forsending information to any other computer on the network. Thus, if any onecomputer is damaged or temporarily unavailable, information is dynamicallyrerouted to other computers—a process known as self-healing.
2.3 Network Design Steps
Here are the typical steps employed during the design process for a new
wireless LAN network:
Define a user role for each different class of userChoose the encryption and authentication methods for each class of userChoose the number and type of SSIDs requiredDetermine a baseline average for user performanceDetermine the number of APs requiredDetermine if a dedicated master is optimalChoose if redundancy will be usedDetermine the type and number of controllers neededChoose the appropriate AP connection and bootstrap model
Determine special guest network requirementsDetermine voice network specifications
2.4 Computer Architecture.
LANs commonly use bus, star, or ring topologies. WAN, which connect distantequipment across the country or internationally, often use special leasedtelephone lines as point-to-point links.
When computers share physical connections to transmit information packets,a set of Media Access Control (MAC) protocols are used to allow information toflow smoothly through the network. An efficient MAC protocol ensures that thetransmission medium is not idle if computers have information to transmit. Italso prevents collisions due to simultaneous transmission that would wastemedia capacity. MAC protocols also allow different computers fair access tothe medium.
22
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 23/51
One type of MAC is Ethernet, which is used by bus or star network topologies.An Ethernet-linked computer first checks if the shared medium is in use. If not,the computer transmits. Since two computers can both sense an idle mediumand send packets at the same time, transmitting computers continue tomonitor the shared connection and stop transmitting information if a collision
occurs. When used on local area networks, Ethernet typically transmitsinformation at a rate of either 10 or 100 Mbps, but newer wide-areatechnologies are capable of speeds as high as 10 gigabits per second (Gbps).
Computers also can use Token Ring MAC protocols, which pass a specialmessage called a token through the network. This token gives the computerpermission to send a packet of information through the network. If a computerreceives the token, it sends a packet, or, if it has no packet to send, it passesthe token to the next computer. Since there is only one token in the network,only one computer can transmit information at a time? Token Ring networksare now quite rare. Most LANs now use Ethernet technology. International
Business Machines Corporation (IBM), the company that invented Token Ringin the early 1980s, no longer promotes the technology.
In the mid-1990s a new protocol called Asynchronous Transfer Mode (ATM)was introduced. This protocol encodes data in fixed-sized packets called cellsrather than variable-sized packets used on an Ethernet network. It wasdesigned as a way of merging old, circuit-switched telephone networks withmore modern packet-switched computer networks in order to deliver data,voice, and video over the same channel. This can now be done with otherprotocols as well. Capable of speeds of nearly 10 Gbps, ATM is often used inwide area networks, but never really caught on with LANs.
2.5 Network Operation and Management
Network management and system administration are critical for a complexsystem of interconnected computers and resources to remain operating. Anetwork manager is the person or team of people responsible for configuringthe network so that it runs efficiently. For example, the network managermight need to connect computers that communicate frequently to reduceinterference with other computers. The system administrator is the person orteam of people responsible for configuring the computer and its software touse the network. For example, the system administrator may install network
software and configure a server's file system so client computers can accessshared files.
Networks are subject to hacking, or illegal access, so shared files andresources must be protected. A network intruder could eavesdrop on packetsbeing sent across a network or send fictitious messages. For sensitiveinformation, data encryption (scrambling data using mathematical equations)renders captured packets unreadable to an intruder. Most servers also use
23
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 24/51
authentication schemes to ensure that a request to read or write files or to useresources is from a legitimate client and not from an intruder. See ComputerSecurity.
2.6 Wireless intrusion prevention system
In computing, a wireless intrusion prevention system (WIPS) is a network
device that monitors the radio spectrum for the presence of unauthorized
access points (intrusion detection), and can automatically take
countermeasures (intrusion prevention).
2.6.1 Purpose
The primary purpose of a WIPS is to prevent unauthorized network access tolocal area networks and other information assets by wireless devices. These
systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wirelessinfrastructure has integrated WIPS capabilities.
Large organizations with many employees are particularly vulnerable tosecurity breaches[1] caused by rogue access points. If an employee (trustedentity) in a location brings in an easily available wireless router, the entirenetwork can be exposed to anyone within range of the signals.
In July 2009, the PCI Security Standards Council published wireless guidelines
for PCI DSS recommending the use of WIPS to automate wireless scanning forlarge organizations.
2.6.2 Intrusion Detection
A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wirelessattack tools. The system monitors the radio spectrum used by wireless LANs,and immediately alerts a systems administrator whenever a rogue accesspoint is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.
Rogue devices can spoof MAC address of an authorized network device astheir own. New research uses fingerprinting approach to weed out deviceswith spoofed MAC addresses. The idea is to compare the unique signaturesexhibited by the signals emitted by each wireless device against the knownsignatures of pre-authorized, known wireless devices.[3]
2.6.3 Intrusion Prevention24
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 25/51
In addition to intrusion detection, a WIPS also includes features that preventagainst the threat automatically . For automatic prevention, it is required thatthe WIPS is able to accurately detect and automatically classify a threat.
The following types of threats can be prevented by a good WIPS:
• Rogue AP – WIPS should understand the difference between Rogue APand External (neighbor’s) AP
• Mis-configured AP• Client Mis-association• Unauthorized association• Man in the Middle Attack• Ad-hoc Networks• Mac-Spoofing• Honey pot / Evil Twin Attack• Denial of Service (DoS) Attack
•
Wips Configurations Consist Of Three Components:
• Sensors — These devices contain antennas and radios that scan thewireless spectrum for packets and are installed throughout areas to beprotected
• Server — The WIPS server centrally analyzes packets captured bysensors
• Console — The console provides the primary user interface into thesystem for administration and reporting
A simple intrusion detection system can be a single computer, connected to awireless signal processing device, and antennas placed throughout the facility.For huge organizations, a Multi Network Controller provides central control of multiple WIPS servers, while for SOHO or SMB customers; all the functionalityof WIPS is available in single box.
In a WIPS implementation, users first define the operating wireless policies inthe WIPS. The WIPS sensors then analyze the traffic in the air and send thisinformation to WIPS server. The WIPS server correlates the informationvalidates it against the defined policies and classifies if it is a threat. The
administrator of the WIPS is then notified of the threat, or, if a policy has beenset accordingly, the WIPS takes automatic protection measures.
WIPS is configured as either a network implementation or a hostedimplementation.
2.7 Network Implementation
25
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 26/51
In a network WIPS implementation, Server, Sensors and the Console are allplaced inside a private network and are not accessible from the internet.
Sensors communicate with the Server over a private network using a privateport. Since the Server resides on the private network, users can access the
Console only from within the private network.
A network implementation is suitable for organizations where all locations arewithin the private network.
2.7.1 Hosted Implementation
In a hosted WIPS implementation, Sensors are installed inside a privatenetwork. However, the Server is hosted in secure data center and is accessibleon the internet. Users can access the WIPS Console from anywhere on theinternet. A hosted WIPS implementation is as secure as a network
implementation because the data flow is encrypted between Sensors andServer, as well as between Server and Console. A hosted WIPS implementationrequires very little configuration because the Sensors are programmed toautomatically look for the Server on the internet over a secure SSL connection.
For a large organization with locations that are not a part of a private network,a hosted WIPS implementation simplifies deployment significantly becauseSensors connect to the Server over the internet without requiring any specialconfiguration. Additionally, the Console can be accessed securely fromanywhere on the internet.
Hosted WIPS implementations are often offered in an on-demand,subscription-based Software as a Service model. Hosted implementations areparticularly cost-effective for organizations looking to fulfill only the minimumscanning requirements of PCI DSS.
2.7.2 Notable implementations
• icrew Security - Air Minder [1] Air Minder is a SAAS-based solution for11.1 wireless scanning requirements. Wireless (and wired) analyzer datafrom a variety of sources is directed to the web service for analysis,correlation and PCI reporting. No hardware required!
• Air Defense [2] is a vendor agnostic WIPS, compliance, networkassurance and wireless infrastructure management solutions.
• Airtight [3] is a vendor of both the network implementation and thehosted implementation of the WIPS solution.
• Nexus Hornet [4] is a vendor of the original Cole Innovations WIDS-Xsystem marketed under the name Nexus Hornet.
26
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 27/51
27
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 28/51
CHAPTER THREE
2.0 THE DESIGN AND IMPLEMENTATION OF WLAN
Before the implementation of the project, there was an existing peer-peerEthernet network (i.e. IEEE 802.3 Ethernet LAN) in the department; however
these two networks were independently separated (i.e. not linked).
But our aims and objectives were to bring about the linking up of this network
together as one networked for the department.
In other to implement spaciousity which is the ability for user to move within a
certain area depending on connectivity coverage, and still maintain network
connectivity coverage, there were installation of two Nano-stations at the
department, one of the Nano-station installed is configured as a bridge, to
extend signals from cisco department to computer and elect/elect department,
from this point a crossover cable is use to connect the first Nano-station and
the switch in the server room then the switch then share network every host in
the department, the second Nano-station is configured as an Access point,
which serves as the wireless device for the local area network in the
department.
3.1 DESIGN TOPOLOGY
Design Topology is an important part in any project implementation and itplays a vital role since it entails the logical design that will determine the
workability of the project. This involves the consideration of the network
devices that will be used and also involves the upgrading of two networks.
LOGICAL TOPOLOGY
A logical topology map group host by how they use the network, no, matter
where they are physically located, host names, address , group informationand application can be recorded on the logical topology maps.
Logical topology is basically on how IP address are being assigned to the
workstation or p. c , this IP address contains two parts with the first network
portion determining the network portion, and the second host portion, the
network portion determine the network and the subnet in the which a host is
28
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 29/51
connected to in a network, while the host portion determines the useable host
address that are assigned to the pc’s
PHYSICAL ADDRESSS
Physical topology is created to record were each host is located and it isconnected to the network, the physical topology maps also show were the
wiring is installed and location of networking device that connect the host.
Physical topology shows the cable connection and how hubs, switch, bridge,
routers etc. are connected in the network. Physical topology is sub divided into
STAR, BUS, RING, EXTENDED STAR, MESH, etc.
STAR TOPOLOGY
It consists of multiple workstations connected to the hub (that is why this
topology is called the hub topology).in the most common scenario each
computer has a network adapter with an Rj-45 connector running a twisted
pair cable to a port in the hub. The hub usually passes along the signals, so
each computer gain access to the other computer on the network. This is
excellent topology for a pair to pair network, it also easy to add machine to
the network because it a simple matter of running a new cable to the hub. and
if the hub’s port are used up, you can connect a second hub to the first one,
another advantage is that if one machine goes for the count, the network
access to the other is not affected on down side, star topology tends to need a
lot of cable because you have to connect every node directly to the hub.
THE BUS TOPOLOGY
In this project bus topology is employed because in bus topology each node is
attach to a single main cable called a bus or a back bone for a large network,
the back bone often extend through out an entire building an it is hidden
behind the walls. For such lengthy cables, repeater are often needed to boost
signals along various point of connection to the backbones are made via drop
cables that are ran from network card to the wall plates or some other junction
bus. For small network the back bone usually consist of connect series of
coaxial cable. The big advantage of bus topology is it‘s relatively easy to set
up and it layout often mirrors a physical layout of an office or a building .the29
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 30/51
major drawn back with bus topologies, is that the break in the back bone
brings down the entire network.
DEPARTMENTAL NETWORK DESIGN MEDIA
In the department of electrical and electronics cum computer engineering of Gateway polytechnic Igbesa ,two transmission media will be adopted, the
transmission media will cut across the wired Ethernet local Area Network .
In the wired LAN , the transmission medium is through the 10 Base T
category 5 unshielded twisted pair cable ,in which if maximum data rate is 10
megabits per second (mbps) with a maximum segment length of 100meters
(or 330 feet using carrier sense multiple access collision detection(CSMA/CD)
signaling techniques.
While for the wireless LAN, the transmission medium is the radio air waves(also known as radio frequency) in which the medium is the air waves without
any physical medium and it will have a data rate speed of 11mbps.
30
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 31/51
Engr. Oladunjoye
Engr. Theophilus
Engr. Onadeko
Engr. Osas
Engr. Adekusibe
Engr. Dar e
Engr. Oluleye
Engr. Ayodeji
Secr etary of HOD
Elect/ Elect
S e c r e t a r y o f H O D
C o m p
u t e r E n g r .
Data Link
Switch W i r e l e s s C o v e r a g e
N a n o S t a t i o n
N a n o S t a t i o n
TrunkCross over patch ca e
Ethernet Switch 24Port
3.2 NETWORK COMPONENTS
The network components for this project will be stated according to the
particular network it falls under or belongs to. The following are component
used, Network Interface Card (NIC), 4 port of switch, cable, connectors, 8DBI
Nano station, Access point, PCMCIA card.
31
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 32/51
3.3 NETWORK INTERFACE CARD
The network interface card (NIC) is a hardware device that interfaces each
computer system (either client or server) with the network. It is known as the
network adapter and is also a layer two device in the OSI layer. In the course
of this project some systems in the department will be installed with this card
to enable them join the network.
3.4 DATA -LINK SWITCH
A switch is a multiport repeater that receives incoming signals; it supports
both half-duplex or full-duplex mode. When a port is in half-duplex mode, at
any convenient time, it can either send or receive data, but not both. The
switch contains 24 ports which will receive signal from the Nano station in
front of the department.
3.5 8DBI NANO STATION
The 8DBI Nano station is a hardware device that receives and also transfer
signals. In view of this project two 8DBI Nano station is used one served asaccess point which transmits wireless signals from the Cisco department and
the other serves as a station which send signal to the switch as to provide
access for the cable network.
32
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 33/51
3.6 CABLE AND CONNECTORS
The cable employed in this project as the transmission medium is the 10
Base T unshielded twisted pair category, 5 cable of the high bandwidth, it
supports a reasonable length of transmission.
In networking, there are two basic types of cable, which are the straight
through cable and the cross over cables, they can be differentiated by theircolour code specification. Straight through cable colour code specification is
more or less elementary when compared with the crossover counterpart. The
colour code arrangement is given below;
STRAIGHT THROUGH CABLE
UTP
cable
End 1 End 2
1 White-Orange White-Orange2 Orange Orange
3 White- Green White- Green
4 White-Blue White- Green
5 Blue Blue33
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 34/51
6 Green Green
7 White- Brown White- Brown
8 Brown Brown
CROSS OVER CABLE
UTP
cable
End 1 End 2
1 White-Orange White- Green
2 Orange Blue
3 White- Green White- Orange
4 Green Green
5 White- Blue White- Blue
6 Blue Orange
7 White- Brown White- Brown
8 Brown Brown
The straight through cable is done by arranging the colour with
specification given above without interchanging any of the colours when
connecting the RJ45 so that both ends of the colour code remains the
same and it goes into the RJ45 connector in accordance to the pins in the
connector. The straight through cable is also used in connecting accesspoint to the switch and the switch to the system. The crossover cable is
prepared by interchanging the other end of the cable colour arrangement
according to the specification given above. It is used to connect system to
system, switch to switch, and hub to hub.
Here is the procedure for attaching cat-5 cable to an RJ45 connector;
34
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 35/51
Cut the end of the cable to the desired length; make sure that you make a
square cut not a diagonal cut. Insert the cable into the stripper portion of
the crimping tool.
Arrange the wires so that they lay flat and lineup.
Slide the wires into the pin holes on the connector, double check to make
sure all the wires slipped into the correct pin holes.
Insert the plug and wire into the crimping portion of the tool and then
squeeze the handles to crimp the plug, squeeze it tight.
Remove the plug from the tool and double check the connection.
CONNECTORS
There are various types of connectors; they are BNC or RJ series such as
RJ11/ RJ12 and RJ45. The RJ45 is most important to us because this is the
type of connector that is used to connect the patch cables, this cables is
also used to link devices like AP, NIC and systems together.
35
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 36/51
3.7 ACCESS POINT
This is also called AP, wireless access point or base station is a hardware
device that acts as an 802.11 shared communication hub for an inter-
connecting 802.11 stations with each other and a wired LAN. The two 8DBInanostation, one serves as the access point which is configured to gain access
from the Cisco network. An access point can be defined as a device that allows
wireless devices to connect to a wired network using Wi-Fi, Bluetooth or
related standards.
3.8 WIRELESS LAN PCMCIA CARD
This card interfaces the Laptops with the wireless network. It has an in
built antenna and it operates at the CSMACA protocol. In the course of this
project, we will implement the use of WL24P wireless LAN PCMCIA card,
this card has IEEE 802.11 LAN technology embedded to enable notebook,
PC to provide the wireless connection with other wireless LAN without any
physical wiring. The WL 24P wireless LAN PCMCIA card is a fast
implementation solution for mobile users to work perfectly in anyenvironment without the hassle of wiring.
3.9 SERVER
A server is a computer program that provides services to other
computer programs and their users in the same or other computers. A
36
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 37/51
server can also be defined as a program that awaits and fulfills requests
from client programs in the same or other computers.
In the course of this project, our server operating system is the Microsoft
windows 2000 server also at this level the server will serve as a DHCP
(Dynamic Host Configuration Protocol) server i.e. it will assign IP (InternetProtocol) address to host (DHCP clients) automatically. It will also serve as
a DNS (Domain Name System) server i.e. it can resolve names of host to
IP address. However, for a standard server in the department we
recommend a Compaq server pentium 370Ghz with the following
configuring Pentium IV 3.066HZ 512MB RAM, DUAL Processor and
146GBSCSI.
3.10CLIENTS OR WORKSTATION
This is a personal computer for workstation that depends on the server
resources such as printing, files applications. A client must be
authenticated by the server before it can allow to log into the network
domain, the client must have a network interface card (NIC) installed to
interface it with the network operating system (NOS) and configuration of
the high IP address, the individual workstation will be able to join the
network with ease.
3.11NETWORK OPERATING SYSTEM (NOS)
These are operating system designed and built for networking of
computer workstations with a high level of security. Examples of NOS
used for the implementation of this project are window 2000 professional,
window XP professional and window 2000 server
37
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 38/51
CHAPTER FOUR
4.0 INTRODUCTION
After the work has been implemented that is nano station was mounted,
switch was configured, cables were ran and other necessary things were done,
DHCP that was configured in the switch was enabled, this will help or aid the
issuing of IP address, subnet mask, default gateway automatically to the hosts
thereby limiting error prone task due to technical configuration. It should be
noted that the project covers both wired and wireless network.
4.1 DHCP (DYNAMIC HOST CONFIGURATION
PROTOCOL)
For a computer to send and receive information on the network there are
three part of the IP configuration which must be configured and they are;
• IP address- identifies the computer on the network.
• Subnet mask- used to identify the network on which the computer is
connected.
• Default gateway- identifies the device that the computer uses to access
the internet or another network.
Therefore after this host or workstations have been properly designed and
implemented there must be a protocol which will assign these IP configuration
to the hosts, this protocol will refer to as Dynamic host configuration protocol
(DHCP).
DHCP can be static or dynamic configured static DHCP. In this scenario the
network administrator manually configure the network information for the host
i.e. assuming IP configuration manually. Static address are useful for printers,
servers and other networking devices that need to be accessible to clients on
the network, there is control of network resources but it is time consuming to
enter the information on each host, when entering this IP address statically
there can be error and also there is always administration intervention and
cannot be suitable for complex topology.
38
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 39/51
4.2 DYNAMIC DHCP
For the sake of this project, Dynamic DHCP is configured in the switch since it
is easier to have IP address assigned automatically. That protocol which
provides a mechanism for the automatic assignment of addressing information
such as IP address, subnet mask, default gateway and other configuration
information is Dynamic DHCP. This type is used in a large network
environment, it reduces burden on network support staff and virtually
eliminates entry errors. Another benefits of DHCP is that an address is not
permanently assigned to a host but is only leased for a period of time if the
host is powered down or taken off the network, the address is returned to the
pool for reuse. This is especially helpful with mobile users that come and go on
a network.
4.3 CONFIGURING DHCP AND MODE OF WORKING
The DHCP server is configured with a range or pool of IP address that can be
assigned to DHCP clients. A client that needs an IP address will send a DHCP
discover message which is a broadcast with a destination IP address of
255.255.255.255 (32 ones) and a destination MAC address of FF-FF-FF-FF-FF-
FF- (48 ones). All hosts on the network will receive this broadcast DHCP Frame,but only a DHCP server will reply. The server will respond with a DHCP offer,
suggesting an IP address for the client. The host then sends a DHCP request to
that server asking to use the suggested IP address. The server responds with a
DHCP acknowledgement for most home and small business networks.
4.4 TESTING NETWORK FUNCTIONALITY
After the design and implementation of WLAN, there was a need to testnetwork functionality, individual LAN lines were tested by using the LAN tester.
This LAN tester allows us to test each line for continuity. Also individual
workstation was tested for proper functionality by pinging (Packet internet
golfer) these workstations together and this was done using the start and run
setup on the computer system.
39
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 40/51
With the completion of the installation signals as searched from the client
station for wireless connection and there was connectivity with a very strong
signal strength and link quality. An IP address was assigned to the access
point by default due to the DHCP in the access point device. The wireless
client station was able to navigate the network and the signal strength and
link quality were checked at intervals as the client laptop moved away from
the access point location. To test the wireless network, network was browsed
in the laboratory from the wireless client laptops and was able to see the
entire domain and files were transferred from system, the first system to the
laptop.
COMPUTER NAME DOMAIN
NAME
IP ADDRESS
1 Server Test domain Dynamic IP
address
2 Engr. Adekusibe Test domain Dynamic IP
address
3 Secretary Elect/Elect Test domain Dynamic IP
address
4 Secretary Comp Eng Test domain Dynamic IP
address
5 Engr. Onadeko Test domain Dynamic IP
address
6 Engr. Ayodeji Test domain Dynamic IP
address
7 Engr. Oladunjoye Test domain Dynamic IP
address
8 Engr. Dare Test domain Dynamic IP
address
9 Engr. Oluleye Test domain Dynamic IP
address
10 Engr. Theophilus Test domain Dynamic IP
address
40
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 41/51
After the entire Ethernet network has been installed and all the system is now
actively connected in the domain network, we implemented the wireless local
area network as extension of the wired LAN which will support roaming (i.e.
flexibility) within the department.
The first nano station configured as bridge was mounted and a cable from it
was ran to the access point, the transmission of signals were aid by a straight
through cable, that means two nano station was mounted, one provide signals
for LAN and the other has
4.5 TOOLS USED
These are network tools used for assigning and implementing wired LAN
and wireless local area network, they are given below;
• Crimping tool
• LAN Tester
• Network and computer tools
• Clips
• Hammer
• Software
• Screwdriver
4.6 SECURITY
The implementation of a basic security system on the network in the
department is essential due to the fact that the network is an academic
network and due to its sensitivity. To ensure a proper organization and
delegation of control in the network, some security measures were put inplace.
Administrator’s account was created in the domain which has the highest level
of control over the network. Other users accounts were created which will be
monitored by the administrators i.e. logs into the domain with an
administrator account. The Administrator and users account properties are
shown below;41
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 42/51
Account Name Password
1 Administration account xxxxxxxxx
(b) Administrator
2 Users account
(b) Lecturer xxxxxxxxx
(c) Student xxxxxxxxx
The wireless LAN used in the implementation of this project uses a security
protocol known as Wi-Fi Protected Access (WPA), this was embedded in the
access point device.
4.7 LIMITING ACCESS TO A WIRELESS LAN
Ways to limit access to your wireless network is to control exactly which
devices can gain access to your network. This can be accomplished through
filtering of the MAC (media access control) address.
4.7.1 MAC ADDRESS FILTERING
The MAC address is a unique value associated with a network adapter. MAC
address are also known as HARDWARE ADDRESS or PHYSICAL ADDRESS .they
uniquely identify an adapter on a LAN and are represented in 12 digit
hexadecimal e.g MM:MM:MM:SS:SS:SS. or MM.MM.MM.SS.SS.SS. This access to
WLAN can be limited by filtering MAC address , if MAC filtering is enabled only
devices whose MAC address have been pre-recorded will be allowed to
connected.
4.7.2 AUTHENTICATION ON A WIRELESS LAN
This is another way to control who can connect, it only permit entry to a
network base on a set of credentials. It is used to verify that the device
attempting to connect to the network is trusted. There are three types of
wireless authentication method these are; OPEN AUTHENTICATION, PRE-
SHAREDE KEYS (PSK), EXTENSIBLE AUTHENTICATION PROTOCOL.42
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 43/51
Authentication and MAC filtering may stop an attacker from connecting to a
wireless network but it will not prevent them from being able to intercept
transmitted data, Hence the deployment of Wi-Fi protected access (WPA)
which uses encryption keys from 64 bit up to 256 bits, WPA unlike WEP,
generate new dynamic keys each time a client establish a connection with the
AP, WPA is more secured than WEP because it is cumbersome to crack.
Therefore the two advanced security protocol are WEP and WPA, But WPA was
used for the project.
4.8 SECURING THE ACCESS POINTS (AP)
There is every necessity that this AP must be secured some of the more basic
security measure includes:
• Change default value for the SSID user name and password.
• Disable broadcast SSID and configuring MAC address, as well filtering
protocol.
Some of the more advanced security measures include configuring encryption
using WEP or WPA configuring authentication and configuration of traffic
filtering.
4.9 FIREWALL
In addition to protecting individual computer and server attached to the
network, it is important to control traffic travelling to and from the network. A
firewall is one of the most effective security tools that can be software
program or dedicated network appliances for protecting internal network users
from external threats; it resides between two or more networks and control
the traffic between them as well as help prevent unauthorized access.
43
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 44/51
CHAPTER FIVE
5.0 CONCLUSION
History has been made in the department of Electrical and Electronics and
Computer Engineering Gateway Polytechnic Igbesa. It is now made known to
everybody that it is possible to implement a wireless local area network in a
time like this where digital library is of upmost desire of the department.
Wireless technology is no doubt the best option in any networking
environment when it has to do with the department, because when the
department is separated the wireless equipment can be taken to desire
position neglecting the use of cables during installation, and also the
avoidance of digging the ground in order to lay cables. This cable freetechnology has a lot of advantages as will be stated later in this chapter.
The implementation of this project created a lot of possible answers to the fact
that people can actually connect to the network in the department without any
need for cabling, in addition, the facility is of immense benefit because it will
not only aid the coming up digital library but also as an open door to everyone
in the department and for the extension of the network ‘’poly Igbesa’’ Some
advantages offered by this project are:
There is always room for mobility in which the client can move from one placeto another and still maintain network connectivity.
It brings about flexibility of network in which the network can be moved from a
particular location to another especially when there is relocation of the present
office where we have the wireless client station.
There is also a very large room for scalability of the network, this means that
the network can be expanded with more PCMCIA card in the department and
lectures will join at ease.
The rate at which the wireless network transmits data is faster than that of the
Ethernet LAN because it transmits more than 100mbps while that of the wired
installed transmit at 100mbps.
It has Wi-Fi Protected Access (WPA) which is a security protocol to prevent
unauthorized Access. Lecturers, non-academic staffs will be able to access and
44
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 45/51
print files, documents, even use floppies on CD-ROM drives from other
desktops on the network right in their offices.
In the Implementation and Installation of this project, we have used some of
the best products, in the market putting into consideration the position and
geographical location of the department. The device was carefully installed forthe smooth utilization by staffs in the department. The project stands as
precedence to future plans in extending the coverage area of the network
from the present 50m to 80m indoor installation or 150m to 300m for outdoor
Installation to a specified range depending on the financial capability of the
Engineering and Technology and the institution as a whole.
The bill of quantity for installation of this project was a personal increment of
the entire student involved in this project work due to individual contribution
we were able to purchase network devices and some of the computer and
networking tools used in carrying out the successful completion of this work.
As at the time of filing the report the total sum of money spent was #129,635,
leaving other yet to be spent, this is properly elucidated in the appendix.
5.1 RECOMMENDATION
It should be noted that the department, are only having extinction of the
signal from CISCO department, the network services for the department
depends majorly on the CISCO department.
To have a separate network a router is highly recommended, on antenna maskand an external antenna of 80-100dBi is also recommended to extend the
range and coverage area and to bring about very effective wireless and cable
transmission. Since digital library is needed now in the department, when this
equipment are gotten then the existing network will just be connected to the
external antenna.
There should be proper maintenance of this network equipment as to ensure
effective functioning durability of the service to the department.
Internet is no doubt the best means of information resources that has everhappened on the face of this earth, when the department comes up with this
digital library then the existing network will serve as a back-bone to ensure
that all networked computers are connected immediately there is an internet
facility. The renege of this technology will enhance a rapid rate of information
and communication technology, of leaning and VOIP (voice over internet
protocol).
45
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 46/51
46
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 47/51
REFERENCE
Math Haden, Teach yourself networking in 24hours published by Macmillancomputer publishing, (201 w 103rd streets, Indianapolis in 46290).
http://www.tecom.com
http://www.google.com
http://www.cisco.com
http://www.ieee802.org/11/
http://www.mcp.com
http://www.ask.com
Olusanya Olabanji John, Networking for Home and small business(CCNA
Discovery 4.0).
Akinyemi .S. Olalekan, Essentials of wireless Networking and Wireless
Network Fundamental(2008,Edition).
IEEE standard 802.11(1990), IEEE standard for local and metropolitan Area
Network overview and Architecture (IBSN 1.55937.0824).
IEEE standard 802.11(1990), part 11: Wireless LAN media Access Control
(MAC) and physical layer specification (2.4GHz).
Osloorne M.C.S.E, windows 2000 Accelerated study guide with I.S.B.N 0.07
21500.4 published by MC Graw Nill (2001, Edit)
47
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 48/51
APPENDIX
BILL OF MATERIARS USED
S/N
Materials used QTY Prices (N)
1 UTP Cable Cat-5e 1roll 9,200
2 Wall Plate 17 3,480
3 Crimping tools 1 1,300
4 Trucking 1
bundle
1,700
5 RJ 45 connectors 100 pcs 1,000
6 Punch- down tools 1 850
7 Nails 5 packs 150
8 D-Link Switch 1(16por
t)
8,500
9 Cable binder1 pack
750
10 Tonado nail 3 200
11 RJ-45 and Trunk 50&1bi
g
2,000
12 Switch rack 1 1,800
13 Nano station 1 1 14,000
48
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 49/51
14 Nano station 2 1 14,000
15 Initial photocopy and tags All 1,000
16 Higher education and record books 1 130
17 Envelopes 3 100
18 Transportation All 3,600
19 MISCELLANEOUS BILLS All 67,875
TOTAL 131,635
49
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 50/51
50
5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com
http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 51/51
51