design and the implimentation of wireless local area networking.

51
 THE DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL AREA NETWORK IN THE DEPARTMENT OF ELECTRICAL ELECTRONICS AND COMPUTER ENGINEERING IGBESA, OGUN STATE BY MICHAEL EDAFEAJIROKE NCEF/09 /024 LATEEF MURITALA A. NCEF/09/013 AIYEGORO OMOLADE NCEF/09/014 IBIROGBA AKINLOLU P. NCEF/09/008 SUBMITTED TO THE DEPARTMENT OF COMPUTER ENGINEERING IN PARTIAL FULFILMENT FOR THE AWARD NATIONAL DIPLOMA IN COMPUTER ENGINEERING NOVEMBER 2011 1

description

project gateway polytechnic igbesa ogun state dept of computer engineering 2010/2011

Transcript of design and the implimentation of wireless local area networking.

Page 1: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 1/51

 

THE DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL

AREA NETWORK IN THE DEPARTMENT OF ELECTRICAL

ELECTRONICS AND COMPUTER ENGINEERING IGBESA,

OGUN STATE

BY 

MICHAEL EDAFEAJIROKE NCEF/09/024

LATEEF MURITALA A. NCEF/09/013

AIYEGORO OMOLADE NCEF/09/014

IBIROGBA AKINLOLU P. NCEF/09/008

SUBMITTED

TO

THE DEPARTMENT OF COMPUTER

ENGINEERING IN PARTIAL FULFILMENT FOR THE

AWARD

NATIONAL DIPLOMA IN COMPUTER ENGINEERING

NOVEMBER 2011

1

Page 2: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 2/51

 

CERTIFICATION

  This is to certify that this project work was carried out by

EDAFEAJIROKE MICHAEL NCEF/09/024

LATEEF MURITALA A. NCEF/09/013

AIYEGORO OMALADE NCEF/09/014

IBIROGBA AKINLOLU P NCEF/09/008

And submitted to the department of computer Engineering Gateway (ICT)

 polytechnic Igbesa Ogun state.

ADEKUSIBE KEHINDE Date

Project Supervisor

OMOFUAMA O. Date

Project Supervisor

OLULEYE G.F Date

Project Supervisor

 

ADEKUSIBE KEHINDE Date

H.O.D Computer Engineering

 

2

Page 3: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 3/51

 

DEDICATION

 This report is specially dedicated to Almighty God, for his

blessings, mercies, protection, for the completion of this National

diploma program.

At human level, we are indebted to every individual who at

various stages had helped in the completion of this work, thank

you and we love you all.

 

.

3

Page 4: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 4/51

 

ACKNOWLEDGEMENT

We appreciate the lord Almighty, for his protection throughout the program,

giving hope when hope seems to be lost, for his vision for us and favour hehas always shown from the day we were born, Thank you God.

We sincerely acknowledge our able supervisors Engr. Gabriel Adekusibe, Engr.

Omofuama, Engr. G. f. Oluleye for their guidance, encouragement, patient with

excellent supervision throughout the research work.

We also acknowledgement the cisco department headed by Mr. Olusanya

Olabanji john, and Mr. Oloyede Emmanuel for their entire support given to us

during the project.

our greatest thanks goes our parents Mr. & Mrs. Aiyegoro, Mr. & Mrs. Lateef 

Aderemi, Mr. & Mrs. Edafeajiroke, Mr. & Mrs. Ibirogba and every other uncle,

brothers and sisters that have contributed to the success of the program, we

love you all and God bless.

We use this time to appreciate the entire department, the HODs, and staffs,

God bless every one of you. Thanks,

 

4

Page 5: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 5/51

 

TABLE OF CONTENT

CERTIFICATION............................................................................................................2

DEDICATION................................................................................................................3

ABSTRACT...................................................................................................................8

CHAPTER ONE.............................................................................................................9

1.0 GENERAL OVERVIEW ....................................................................................... 9

1.1 STATEMENT OF THE PROBLEM ....................................................................... 9

1.2 RESEARCH QUESTION .................................................................................. 10

1.3 SPECIFIC OBJECTIVES ................................................................................... 10

1.4 THE SCOPE OF THE STUDY ........................................................................... 10

1.5 SIGNIFICANT OF THE STUDY ......................................................................... 11

1.6 CONTRIBUTION TO KNOWLEDGE .................................................................. 11

1.7 GLOSSARY OF NETWORK TERMS .................................................................. 11

2.0 Network ...................................................................................................... 20

2.3 Network Design Steps ................................................................................. 22

2.4 Computer Architecture................................................................................ 22

2.5 Network Operation and Management .......................................................... 23

2.6 Wireless intrusion prevention system ........................................................... 24

2.6.1 Purpose ..................................................................................................... 24

2.6.2 Intrusion Detection .................................................................................... 24

2.6.3 Intrusion Prevention .................................................................................. 24

2.7 Network Implementation .............................................................................. 25

2.7.1 Hosted Implementation ............................................................................. 26

2.7.2 Notable implementations .......................................................................... 26

2.0 THE DESIGN AND IMPLEMENTATION OF WLAN ............................................... 28

5

Page 6: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 6/51

 

3.1 DESIGN TOPOLOGY ...................................................................................... 28

LOGICAL TOPOLOGY .......................................................................................... 28

PHYSICAL ADDRESSS ....................................................................................... 29

STAR TOPOLOGY ............................................................................................... 29

 THE BUS TOPOLOGY .......................................................................................... 29

DEPARTMENTAL NETWORK DESIGN MEDIA ......................................................... 30

3.2 NETWORK COMPONENTS .............................................................................. 31

3.3 NETWORK INTERFACE CARD ......................................................................... 32

3.4 DATA -LINK SWITCH ..................................................................................... 32

3.5 8DBI NANO STATION .................................................................................... 32

3.6 CABLE AND CONNECTORS ............................................................................ 33

STRAIGHT THROUGH CABLE ............................................................................ 33

CROSS OVER CABLE ................................................................................ 34

CONNECTORS .................................................................................................... 35

3.7 ACCESS POINT .............................................................................................. 36

3.8 WIRELESS LAN PCMCIA CARD ....................................................................... 36

3.9 SERVER ................................................................................................ 36

3.10 CLIENTS OR WORKSTATION ........................................................................ 37

3.11 NETWORK OPERATING SYSTEM (NOS) ........................................................ 37

4.0 INTRODUCTION .................................................................................... 38

4.1 DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL) ................................... 38

4.2 DYNAMIC DHCP ............................................................................................ 39

4.3 CONFIGURING DHCP AND MODE OF WORKING ............................................. 39

4.4 TESTING NETWORK FUNCTIONALITY ............................................................. 39

4.5 TOOLS USED ................................................................................................ 41

4.6 SECURITY ..................................................................................................... 41

6

Page 7: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 7/51

 

4.7 LIMITING ACCESS TO A WIRELESS LAN ........................................................ 42

4.7.1 MAC ADDRESS FILTERING ........................................................................ 42

4.7.2 AUTHENTICATION ON A WIRELESS LAN ..................................................... 42

4.8 SECURING THE ACCESS POINTS (AP) ............................................................ 43

4.9 FIREWALL ..................................................................................................... 43

CHAPTER FIVE...........................................................................................................44

5.0 CONCLUSION .............................................................................................. 44

5.1 RECOMMENDATION .................................................................................... 45

REFERENCE .................................................................................47

APPENDIX..................................................................................................................48

 

7

Page 8: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 8/51

 

ABSTRACT

Wireless technology has proved to be the initiator of the emerging cable free

technology.

 The wireless technology, among other technology is far- reaching and

spreading in the global technology market. This technology incorporate state-

of-the-act equipment’s and involves efficient implement and installation.

In view of this, a fraction of project studies, in computer engineering

department, Gateway Polytechnic Igbesa decided to implement this

technology (wireless technology) in the department of Electrical/Electronic and

Computer Engineering Department of Gateway Polytechnic Igbesa.

8

Page 9: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 9/51

 

CHAPTER ONE

1.0 GENERAL OVERVIEW

In recent time the need for a flexible data communication system(wireless

LAN), in recent time, the need for a flexible data communication) that can be

implemented as an extension or as an alternative for a wired LAN can never

be overemphasized.

Wireless local area network uses radio frequency (RF) technology, wireless

LAN transmits and receive data over the air waves minimizing the need for

wire connection, thereby combining data connection with user mobility.

Wireless networks, like many other technology came of age under theguidance of united states military, the military need a simple, easily

implemented and more secured method of exchanging data and information

in a combat environment .in real sense, wireless network does not mean that

the network is completely free of cabling, most wireless networks actually

consist of wireless component communication with a network that actually

uses cable as a method of connectivity among component in the wired

network

 This network we enable student and lecturer’s to have access to online

research, enabling them to meet up with technology demand, creating acontrol base server, e-learning and most important information are being

control from a base server thereby making the department one of those to be

reckoned with in the nearest feature.

As a result of rapid improvement in wireless technology hardware and also

due to increase in the quality by vendors, the cost of wireless technology

reduced drastically thereby making it affordable for the department to

integrate wireless segment into their already existing wire network, and in

connecting buildings to one another without laying copper or fiber cabling

1.1 STATEMENT OF THE PROBLEM

Due to the fact that local area network, called wired network, are prone to

various set back which distort network connection, hence the deployments of 

a wireless local area network ,local area network do suffer from network

interruption such as attenuation which is the loss of signals strength, as

9

Page 10: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 10/51

 

distance increases, signals distortion called capacitances, the LAN network is

prone to crosstalk ,which is leakage of signals from adjacent wires,

electromagnetic interference, and insecurity of the LAN, were cable signals are

tapped.

Wireless was also need seen there was high necessity for a central basedserver for monitoring files and application.

 

1.2 RESEARCH QUESTION

In the cause of this project, some thins was put in consideration to make the

project a successful one, these things were, the type of topology that would be

deployed weather star, bus, ring (physical topology), the type of wireless

equipment to be used in the project and the configuration of this equipment

 The network protocol that will be running in the switch and how to deploy a

security system for all files and connection to the server, how to configure a

system, bringing all the requirement to have a server by other system in each

offices

1.3 SPECIFIC OBJECTIVES

 The project is designed to assess the performance of local area network which

connect existing peer to peer network to server based network for centralizedadministration for security, and proper monitoring of files are improved ,the

various type of network such as WAN (Wired area network ) metropolitan area

network (MAN) , wireless area network (WAN), local area network (LAN),

storage area network (SAN), etc. will be properly emphasized, while the type

we are deploying will be totally elucidated. With the design and

implementation of WLAN there would be mobility or roaming of clients from

one point to another within a specified range provide by an access point there

will also be room for relocation of the network and scalability not left out, the

way this will be deployed is properly explained. This WLAN would perform better and signal to a far distance if a higher garget

i.e. access point are used or more access point are used to boost signals.

1.4 THE SCOPE OF THE STUDY 

10

Page 11: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 11/51

 

 The scope of study in this implemented work will cover the department as a

whole and the environs and also provide room for scalability, the wireless

signals can be seen in all parts of the institution.

1.5 SIGNIFICANT OF THE STUDY 

Local area network (LAN) is a computer network that is designed for a limited

geographical area such as building or a campus, they can be privately owned,

it connect computer together for the sole purpose of sharing resources

available in a computer.

Dew to the fact that LAN are faced with so much contortion which are lost

of signal, crosstalk, electromagnetic interference, rigorous running of cable,

hence the deployment of wireless network which transmit signals in form of 

radio frequency, easy to access, mobility, scalability, and also the wireless

network can be relocated unlike the LAN.

1.6 CONTRIBUTION TO KNOWLEDGE

With the design and implementation of WLAN it provide internet services for

the department, thereby creating room for e-learning, has an ICT based

institution to improve the practical skills of students, enabling researches for

all learners, and above all providing a base for expansion of the network.

1.7 GLOSSARY OF NETWORK TERMSINFRA-RED; The sight spectrum just shorter than red invisible to human eyes

it used for line of sight data transmission in wireless network.

INTERNET; The global network now used for everything from e-mail to

electronic commerce to research.

INTER OPERABILITY; The capacity of two products to operate together, ideally

according to open standard such as the TCP/IP protocol.

IP (INTERNET PROTOCOL) The part of the TCP/IP protocol responsible forproviding addressing and routing services to packet.

IP ADDRESS ; A sequence of number associated with a network adapter mac

address, it is a 32 bit long and is divide into four byte strings that have value

ranging from 0 to 255e e.g 192.168.1.0

11

Page 12: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 12/51

 

IPX (INTERNETWORK PACKET EXCHANGE) ; The part of the novel networks

IPX/SPX protocol responsible for addressing and routing

ISDN (INTERNET SERVICES DIGITAL NETWORK ) ; A switch digital phone

services that in its basic rate interfaces (BRI) can carry up to 128 kilobits per

second of data, in its primary rate interface (PRI) it can be as act as 1.5megabits per second.

ISP (INTERNET SERVICES PROVIDER); A computer that provides connection to

internet

 JUMPER; A very small pieces of plastic with a conductive metal strip inside it

LAN (LOCAL AREA NETWORK); a group of computer in a local area tied

together without any router between them all computer are connected to the

same set of hub or switch in a LAN.

LINUX; A tree ware Unix like operating system deployed by Linux Torvalds and

a host of internet programmers.

MAC ADDRESS (media access control address) ; a 6 byte (48 bit) address

unique to each and every network card represented in hexadecimal notation

MAN (MENTROPOLITAN AREA NTWORK) A group of lan in a relatively small

geographical area joined by digital phone lines by other technologies such as

microwaves radio.

MAU (MULTISTATION ACESS UNIT); IBM name for token ring concentrator

MEMORY; The chip that provides a places for the computer to store is an OS it

is need to do computation

MODEM; short for modulation, demodulation, a device used to convert digital

signal into analog tones that can be transmitted over the telephone network

MULTITASKING; IN OPERATIN SYSTEM, the ability to divide the computer time

among two or more running programs simultaneously.

NETBEUI (NETWORK EXTENDED USER INTERFACE) An extension of NETBIOS

that include the capability to frame packet among extended features NETBEUI

is a common implementation of NetBIOS

12

Page 13: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 13/51

 

NETBIOS; Network basic i/p system, a small non –routable protocol developed

by IBM for small pc network

NETWARE; Novel’s network operating system, powerful extremely scalable

NETWORK; Any conglomeration of parts working together in a predictableorder group of computer connected by a common topology that enable data to

be transmitted.

NETWORK ADAPTER; An adapter card installation on a computer that allow it

to communicate on network.

NIC (NETWORK INTERFACE CARD); This is also called network adapter an add

in card that plays into a computer and enable it to communicate on a network

NIC are usually AMT Ethernet, token ring or FDDI.

NOS (NETWORK OPERATING CENTER); IT A software that allows a computer to

perform certain network centric take such as authentication , user handling

security and providing connection to network recourse.

OCTET; The official name for byte.

OPEN STANDARD; Hard disk and software standards that are not proprietary to

any given manufacturer TCP/IP and Ethernet are both open standard.

OPERATING SYSTEM; The software in a computer that enable the user to

communicate with the hardware and get task done.

OPTICAL FIBER; A media used by fiber optics network, most network use either

coaxial cable or UTP.

OSI MODEL (OPEN SYSTEM INTERNET CONNECT MODEL); A reference model

that details seven layers of functionality for networks.

PACKET; also called datagram, information placed inside a “wrapper” called

the header, packet contains header (which handle addressing) error correction

checksums and the data sent across the network

PACKET HEADER; see header

PACKET SWITCHING ; A technology in which binary data is divided into small

packages that handle error correction and address information in order to

transmit data across a physical medium such as cable .

13

Page 14: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 14/51

 

PC CARD; An electronic device that slides into a slot on the side of a laptop

they are usually network adapter or modems

PEER TO PEER NETWORK; A network built without a central server

PLUG AND PLUG; Adapter card hardware for which I/p addresses as and IRQare set through software rather than through jumper of some sort.

POP (post office protocol): The TCP/IP protocol standard for email transmission

between sever and client pop3 is the current version.

PORTING; The protocol of recompiling c language source code into version that

can run on different computers.

PPP (point to point protocol): a port of TCP/IP protocol suite used to connect

computers across switched telephone lines.

PROTOCOL; An agreed on standard, a protocol used to addressed and ensure

the delivery of packets across network.

PROTOCOL TRANSLATOR; a device that translate between two

NETWORK PROTOCOL; Typically, protocol translators translate NetWare IPX to

 TCP/IP so that user on an IP X network can access the internet on IP resources

PROXY SEVER; A sever that hide’s internal network IP addresses from the

internet by making request for internal clients.

QOS; quality of service

REDUNDANCY OR FAULT TOLERANCE; See fault tolerance or redundancy

REPEATER; A device that enable to network to communicate reasonable well .

ROUTER; A device or softer that enable packet towards thrie destinations .

SCALABILITY; the measure of System capacity to grow.

SCRIPTING LANGUAGE ; A limited programming language built into many

operating systems.

SERVER ; a computer on a network that share a specific resource with other

computer.

o SMTP (SIMPLE MAIL TRNSMISSION PROTOCOL) the TCP/Ip standard for

Internet mail.

14

Page 15: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 15/51

 

Concentrator : Also called a hub or MAU, helps ensure the robustness of the

network by making sure that the network canot be disconnected because of a

single cable falure

CSU/DSU (channel service unit/ data service unit) : A device that changes local

network packet into packet that can be transmitted over a WAN.

CRACKER : someone who make unauthorized access into other computer

system usually maliciously is not the same as HACKER.

DHCP(dynamic host configuration protocol) :A piece of the TCP/IP protocol

suite that handle the Automatic assignment of IP address to client

DIGITAL : A data transmission type based on the data that been binary coded.

DISK : A device that store digital 1s and 0s on magnetic media such as hard

drive or floppy drive.

DLC (data link control) : a protocol, that Microsoft uses to connect to network

printers.

CLIENT OR HOST : A computer that uses the result share by sever computer.

COAXIAL CABLE : A two conductor cable with a solid center conductor and it is

similar to cable used for TV

BANDWITH : the measurement of the amount of data a particular medium can

carry.

BIT Information represented has 1s and 0s to connect network.

FRAME RELAY ;A method of refraining (or packetizing)already packetized data

to allow it to be transmitted over the phone company’s frame relay

network.frame relay means a type of packet.

FTP (file transfer protocol): the piece of the TCP/IP protocol suite that enable

user to copy files between computers.

GATEWAY: A system that essentially bridge two system it purposes is forcommunication.

GATEWAY protocol : Member of the TCP/IP protocol suite that routes uses to

determine the best route for data packerts.

GUI(graphical user interface) a shell on a computer’s operating system that

graphically represented data.15

Page 16: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 16/51

 

HACKER: a much misused term a hacker does not break into computer system

(a cracker does that), instead ,a hacker is a skilled programmer and problem

solver.

Header : The parts of a packet that carries information about the source and

destination of the packet, the checksum and otherabout the packet.

Hard drive : a removable magnetic media drive that stores data on a

computer.

Html : hypertext maark up language , a way of formatting plain text in a

browser window , it uses tags or inline formatting commands to define how

things look.

i/o or throughput : a loose measure of the speed at which a particular pieces of 

hardware can move data.

Imap: Internet mail acess protocol or instant messaging access point , a new

piece of TCP/IP protocol suite that handles the transmission of mail between

server and client.

Dns domain name server , the pieces of the TCP/IP protocol suite that resolve

ip address to name address.

NAT network address translation , it conver private IP address to internet

routable address.

PAT port address translation it convert multiple to single global address .

Domains a group of xcomputer whose login acess the network is authenticated

through NT server 2000 server.

Email Electronic nmails , a way of sending text and files across a network with

postal mail like notification.

Encryption key , a server of letters and numbers used to make plain text

message into cipher texts an encryption key’s security depends on how long it

is .

Error correction the process of ensuring that data transferred across wire is

done so correctly

Ethernet a local area network (LAN) topology based on a method called carrier

sense multiple access collision detection ,Ethernet comes in many variety , the

16

Page 17: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 17/51

 

specification is available in IEEE 802.3, other version of Ethernet include 802.2

SNMP e.t.c.

Fault or tolerance redundancy : the capability of a computer system to shrong

off failure of a device and continue operating normally.

FDDI : fiber distance data interface , a method of transmitting data across a

network using laser or pulses of light sent over a glass fiber cable rather than

sending electricity over a copper wire.

Firewall : A computer that control access to an internet

10 base 2; Ethernet networking running on coaxial cable, also called thinnet or

cheaper net it support network segment up to 185 meters in length.

10 base 5; also called yellow-card Ethernet, is similar to 10 base 2 but uses a

thicker cable.

10 BASE T; Ethernet in a star topology, uses un unshielded twisted pair wiring

with 8 connectors terminated according to specification standard called TIAA

568B.

ADAPTER CARD; is an electronic assembly that connect to a computer through

a standard interface called a card slot.

ADMINISTRATION; An impossible task involves figuring out how to keep a

network running without problem all the time.

ARPA Advanced Research Project Agency, the government group responsible

for starting the internet .

ASCII America standard code for information interchange, away that

computers format 1s & 0s into the alphabet, numerals and other character

that humans can understand.

ATM Asynchronous Transfer Mode : a new topology for transmitting data

across a network .it’s complex but has many advantages compare to older

topologies such as Ethernet and token ring.

BRIDGE : a device that links different networks together so that they form a

single logical network.

BROWSER : a program that provides a way to view and read the documents

available on the world wide web e.g internet explorer, Mozilla, Firefox uses

browser.

17

Page 18: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 18/51

 

SNMP Simple Network management Protocol :the TCP/IP protocol suite that

deals with the transmission of network information for system administration

for system administration and management.

SUBNET : A way of dividing TCP/IP network into smaller pieces for

management or security purposes , subnet are bridge by router.

SUBNET MASK : the portion of an IP Address that defines the network as

opposed to identifying a particular e.g a computer with an IP address of 

192.168.1.5 might have a subnet mask of 255.255.255.0

 TI : a digital phone line that can carry data at a speed up to 1.544 mega bit

per seconds.

 TCP/IP Transmission Control Protocol /Internet Protocol:

Latch all terms to describe the multi faceted protocol suite on which theinternet runs.

UDP User Data Protocol : port of TCP/IP protocol suite that handles unreliable

delivery of packet.

 TUNNELING PROTOCOL : the protocol that ensure that data passing over a

company’s virtual private network is secured.

 TOPOLOGY : is an arrangement of network .

 THINNET : see 10 base 2 Ethernet.

WORLD WIDE WEB (WWW) the resource that can be accessed on the internet

using HTTP, often published in HTML.

WINDOWS NT; Microsoft’s enterprise operating system.

WINDOWS 98; Microsoft’s client operating system

WAN; Wide Area Network composed of two more LANS connected by phone

(generally digital phone lines)..

Virtual Local Area Network (VLAN); A network that appear to be a small LAN to

its users but which is actually a logical construct.

VIRTUAL PRIVATE NETWORK(VPN); a network establish over a carrier digital

phones lines (such as AT & T or sprint unit) and dedicated solely to connecting

several specific clients sites.

18

Page 19: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 19/51

 

19

Page 20: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 20/51

 

CHAPTER TWO

2.0 Network 

A system used to link two or more computers. Network users are able to sharefiles, printers, and other resources; send electronic messages; and runprograms on other computers.

2.1 Network Has Three Layers Of Components:

1] Application software

2] Network software

3] Network hardware

Application software consists of computer programs that interface withnetwork users and permit the sharing of information, such as files, graphics,and video, and resources, such as printers and disks. One type of applicationsoftware is called client-server. Client computers send requests for informationor requests to use resources to other computers, called servers that controldata and applications. Another type of application software is called peer-to-peer. In a peer-to-peer network, computers send messages and requestsdirectly to one another without a server intermediary.

Network software consists of computer programs that establish protocols, or

rules, for computers to talk to one another. These protocols are carried out bysending and receiving formatted instructions of data called packets. Protocolsmake logical connections between network applications, direct the movementof packets through the physical network, and minimize the possibility of collisions between packets sent at the same time.

Network hardware is made up of the physical components that connectcomputers. Two important components are the transmission media that carrythe computer's signals, typically on wires or fiber-optic cables, and thenetwork adapter, which accesses the physical media that link computers,receives packets from network software, and transmits instructions and

requests to other computers. Transmitted information is in the form of binarydigits, or bits (1s and 0s), which the computer's electronic circuitry canprocess.

A network has two types of connections: physical connections that letcomputers directly transmit and receive signals and logical, or virtual,connections that allow computer applications, such as e-mail programs andthe browsers used to explore the World Wide Web, to exchange information.

20

Page 21: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 21/51

 

Physical connections are defined by the medium used to carry the signal, thegeometric arrangement of the computers (topology), and the method used toshare information. Logical connections are created by network protocols andallow data sharing between applications on different types of computers, suchas an Apple Macintosh or a personal computer (PC) running the Microsoft

Corporation Windows operating system, in a network. Some logicalconnections use client-server application software and are primarily for fileand printer sharing. The Transmission Control Protocol/Internet Protocol(TCP/IP) suite, originally developed by the United States Department of Defense, is the set of logical connections used by the Internet, the worldwideconsortium of computer networks. TCP/IP, based on peer-to-peer applicationsoftware, creates a connection between any two computers.

Medium used to transmit information limits the speed of the network, theeffective distance between computers, and the network topology. Copperwires and coaxial cable provide transmission speeds of a few thousand bits persecond for long distances and about 100 million bits per second for shortdistances. (A million bits is equal to one megabit, and one megabit per secondis abbreviated Mbps.) Optical fibers carry 100 million to 40 billion bits of information per second over long distances. (A billion bits is equal to onegigabit, and a billion bits per second is abbreviated Gbps.)

Wireless networks, often used to connect mobile, or laptop, computers, sendinformation using infrared or radio-frequency transmitters. Infrared wireless

local area networks (LANs) work only within a room, while wireless LANs basedon radio-frequency transmissions can penetrate most walls. Wireless LANsusing Wi-Fi technology have capacities of around 54 Mbps and operate atdistances up to a few hundred meters. Wireless communications for wide areanetworks (WANs) use cellular radio telephone networks, satellitetransmissions, or dedicated equipment to provide regional or global coverage.Although transmission speeds continue to improve, today’s wide area cellularnetworks run at speeds ranging from 14 to 230 kilobits per second. (A kilobit isequal to 1,000 bits, and one kilobit per second is abbreviated Kbps.) Somenetworks use a home’s existing telephone and power lines to connect multiplemachines. HomePNA networks, which use phone lines, can transmit data as

fast as 128 Mbps, and similar speeds are available on Power Line or Home Plugnetworks.

Common topologies used to arrange computers in a network are point-to-point, bus, star, ring, and mesh. Point-to-point topology is the simplest,consisting of two connected computers. The bus topology is composed of asingle link connected to many computers. All computers on this commonconnection receive all signals transmitted by any attached computer. The star

21

Page 22: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 22/51

 

topology connects many computers to a common hub computer. This hub canbe passive, repeating any input to all computers similar to the bus topology, orit can be active, selectively switching inputs to specific destination computers. The ring topology uses multiple links to form a circle of computers. Each linkcarries information in one direction. Information moves around the ring in

sequence from its source to its destination. On a mesh network, topology canactually change on the fly. No central device oversees a mesh network, and noset route is used to pass data back and forth between computers. Instead,each computer includes everything it needs to serve as a relay point forsending information to any other computer on the network. Thus, if any onecomputer is damaged or temporarily unavailable, information is dynamicallyrerouted to other computers—a process known as self-healing.

2.3 Network Design Steps

Here are the typical steps employed during the design process for a new

wireless LAN network:

Define a user role for each different class of userChoose the encryption and authentication methods for each class of userChoose the number and type of SSIDs requiredDetermine a baseline average for user performanceDetermine the number of APs requiredDetermine if a dedicated master is optimalChoose if redundancy will be usedDetermine the type and number of controllers neededChoose the appropriate AP connection and bootstrap model

Determine special guest network requirementsDetermine voice network specifications

2.4 Computer Architecture.

LANs commonly use bus, star, or ring topologies. WAN, which connect distantequipment across the country or internationally, often use special leasedtelephone lines as point-to-point links.

When computers share physical connections to transmit information packets,a set of Media Access Control (MAC) protocols are used to allow information toflow smoothly through the network. An efficient MAC protocol ensures that thetransmission medium is not idle if computers have information to transmit. Italso prevents collisions due to simultaneous transmission that would wastemedia capacity. MAC protocols also allow different computers fair access tothe medium.

22

Page 23: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 23/51

 

One type of MAC is Ethernet, which is used by bus or star network topologies.An Ethernet-linked computer first checks if the shared medium is in use. If not,the computer transmits. Since two computers can both sense an idle mediumand send packets at the same time, transmitting computers continue tomonitor the shared connection and stop transmitting information if a collision

occurs. When used on local area networks, Ethernet typically transmitsinformation at a rate of either 10 or 100 Mbps, but newer wide-areatechnologies are capable of speeds as high as 10 gigabits per second (Gbps).

Computers also can use Token Ring MAC protocols, which pass a specialmessage called a token through the network. This token gives the computerpermission to send a packet of information through the network. If a computerreceives the token, it sends a packet, or, if it has no packet to send, it passesthe token to the next computer. Since there is only one token in the network,only one computer can transmit information at a time? Token Ring networksare now quite rare. Most LANs now use Ethernet technology. International

Business Machines Corporation (IBM), the company that invented Token Ringin the early 1980s, no longer promotes the technology.

In the mid-1990s a new protocol called Asynchronous Transfer Mode (ATM)was introduced. This protocol encodes data in fixed-sized packets called cellsrather than variable-sized packets used on an Ethernet network. It wasdesigned as a way of merging old, circuit-switched telephone networks withmore modern packet-switched computer networks in order to deliver data,voice, and video over the same channel. This can now be done with otherprotocols as well. Capable of speeds of nearly 10 Gbps, ATM is often used inwide area networks, but never really caught on with LANs.

2.5 Network Operation and Management

Network management and system administration are critical for a complexsystem of interconnected computers and resources to remain operating. Anetwork manager is the person or team of people responsible for configuringthe network so that it runs efficiently. For example, the network managermight need to connect computers that communicate frequently to reduceinterference with other computers. The system administrator is the person orteam of people responsible for configuring the computer and its software touse the network. For example, the system administrator may install network

software and configure a server's file system so client computers can accessshared files.

Networks are subject to hacking, or illegal access, so shared files andresources must be protected. A network intruder could eavesdrop on packetsbeing sent across a network or send fictitious messages. For sensitiveinformation, data encryption (scrambling data using mathematical equations)renders captured packets unreadable to an intruder. Most servers also use

23

Page 24: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 24/51

 

authentication schemes to ensure that a request to read or write files or to useresources is from a legitimate client and not from an intruder. See ComputerSecurity.

2.6 Wireless intrusion prevention system

In computing, a wireless intrusion prevention system (WIPS) is a network 

device that monitors the radio spectrum for the presence of unauthorized

access points  (intrusion detection), and can automatically take

countermeasures (intrusion prevention).

2.6.1 Purpose

 The primary purpose of a WIPS is to prevent unauthorized network access tolocal area networks and other information assets by wireless devices. These

systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wirelessinfrastructure has integrated WIPS capabilities.

Large organizations with many employees are particularly vulnerable tosecurity breaches[1] caused by rogue access points. If an employee (trustedentity) in a location brings in an easily available wireless router, the entirenetwork can be exposed to anyone within range of the signals.

In July 2009, the PCI Security Standards Council published wireless guidelines

for PCI DSS recommending the use of WIPS to automate wireless scanning forlarge organizations.

2.6.2 Intrusion Detection

A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wirelessattack tools. The system monitors the radio spectrum used by wireless LANs,and immediately alerts a systems administrator whenever a rogue accesspoint is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Rogue devices can spoof  MAC address of an authorized network device astheir own. New research uses fingerprinting approach to weed out deviceswith spoofed MAC addresses. The idea is to compare the unique signaturesexhibited by the signals emitted by each wireless device against the knownsignatures of pre-authorized, known wireless devices.[3]

2.6.3 Intrusion Prevention24

Page 25: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 25/51

 

In addition to intrusion detection, a WIPS also includes features that preventagainst the threat automatically . For automatic prevention, it is required thatthe WIPS is able to accurately detect and automatically classify a threat.

 The following types of threats can be prevented by a good WIPS:

• Rogue AP – WIPS should understand the difference between Rogue APand External (neighbor’s) AP

• Mis-configured AP• Client Mis-association• Unauthorized association• Man in the Middle Attack• Ad-hoc Networks• Mac-Spoofing• Honey pot / Evil Twin Attack• Denial of Service (DoS) Attack

Wips Configurations Consist Of Three Components:

• Sensors — These devices contain antennas and radios that scan thewireless spectrum for packets and are installed throughout areas to beprotected

• Server — The WIPS server centrally analyzes packets captured bysensors

• Console — The console provides the primary user interface into thesystem for administration and reporting

A simple intrusion detection system can be a single computer, connected to awireless signal processing device, and antennas placed throughout the facility.For huge organizations, a Multi Network Controller provides central control of multiple WIPS servers, while for SOHO or SMB customers; all the functionalityof WIPS is available in single box.

In a WIPS implementation, users first define the operating wireless policies inthe WIPS. The WIPS sensors then analyze the traffic in the air and send thisinformation to WIPS server. The WIPS server correlates the informationvalidates it against the defined policies and classifies if it is a threat. The

administrator of the WIPS is then notified of the threat, or, if a policy has beenset accordingly, the WIPS takes automatic protection measures.

WIPS is configured as either a network implementation or a hostedimplementation.

2.7 Network Implementation

25

Page 26: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 26/51

 

In a network WIPS implementation, Server, Sensors and the Console are allplaced inside a private network and are not accessible from the internet.

Sensors communicate with the Server over a private network using a privateport. Since the Server resides on the private network, users can access the

Console only from within the private network.

A network implementation is suitable for organizations where all locations arewithin the private network.

2.7.1 Hosted Implementation

In a hosted WIPS implementation, Sensors are installed inside a privatenetwork. However, the Server is hosted in secure data center and is accessibleon the internet. Users can access the WIPS Console from anywhere on theinternet. A hosted WIPS implementation is as secure as a network

implementation because the data flow is encrypted between Sensors andServer, as well as between Server and Console. A hosted WIPS implementationrequires very little configuration because the Sensors are programmed toautomatically look for the Server on the internet over a secure SSL connection.

For a large organization with locations that are not a part of a private network,a hosted WIPS implementation simplifies deployment significantly becauseSensors connect to the Server over the internet without requiring any specialconfiguration. Additionally, the Console can be accessed securely fromanywhere on the internet.

Hosted WIPS implementations are often offered in an on-demand,subscription-based Software as a Service model. Hosted implementations areparticularly cost-effective for organizations looking to fulfill only the minimumscanning requirements of PCI DSS.

2.7.2 Notable implementations

• icrew Security - Air Minder [1] Air Minder is a SAAS-based solution for11.1 wireless scanning requirements. Wireless (and wired) analyzer datafrom a variety of sources is directed to the web service for analysis,correlation and PCI reporting. No hardware required!

• Air Defense [2] is a vendor agnostic WIPS, compliance, networkassurance and wireless infrastructure management solutions.

• Airtight [3] is a vendor of both the network implementation and thehosted implementation of the WIPS solution.

• Nexus Hornet [4] is a vendor of the original Cole Innovations WIDS-Xsystem marketed under the name Nexus Hornet.

26

Page 27: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 27/51

 

27

Page 28: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 28/51

 

CHAPTER THREE

2.0 THE DESIGN AND IMPLEMENTATION OF WLAN

Before the implementation of the project, there was an existing peer-peerEthernet network (i.e. IEEE 802.3 Ethernet LAN) in the department; however

these two networks were independently separated (i.e. not linked).

But our aims and objectives were to bring about the linking up of this network

together as one networked for the department.

In other to implement spaciousity which is the ability for user to move within a

certain area depending on connectivity coverage, and still maintain network

connectivity coverage, there were installation of two Nano-stations at the

department, one of the Nano-station installed is configured as a bridge, to

extend signals from cisco department to computer and elect/elect department,

from this point a crossover cable is use to connect the first Nano-station and

the switch in the server room then the switch then share network every host in

the department, the second Nano-station is configured as an Access point,

which serves as the wireless device for the local area network in the

department.

3.1 DESIGN TOPOLOGY 

Design Topology is an important part in any project implementation and itplays a vital role since it entails the logical design that will determine the

workability of the project. This involves the consideration of the network

devices that will be used and also involves the upgrading of two networks.

LOGICAL TOPOLOGY 

A logical topology map group host by how they use the network, no, matter

where they are physically located, host names, address , group informationand application can be recorded on the logical topology maps.

Logical topology is basically on how IP address are being assigned to the

workstation or p. c , this IP address contains two parts with the first network

portion determining the network portion, and the second host portion, the

network portion determine the network and the subnet in the which a host is

28

Page 29: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 29/51

 

connected to in a network, while the host portion determines the useable host

address that are assigned to the pc’s

PHYSICAL ADDRESSS

Physical topology is created to record were each host is located and it isconnected to the network, the physical topology maps also show were the

wiring is installed and location of networking device that connect the host.

Physical topology shows the cable connection and how hubs, switch, bridge,

routers etc. are connected in the network. Physical topology is sub divided into

STAR, BUS, RING, EXTENDED STAR, MESH, etc.

STAR TOPOLOGY 

It consists of multiple workstations connected to the hub (that is why this

topology is called the hub topology).in the most common scenario each

computer has a network adapter with an Rj-45 connector running a twisted

pair cable to a port in the hub. The hub usually passes along the signals, so

each computer gain access to the other computer on the network. This is

excellent topology for a pair to pair network, it also easy to add machine to

the network because it a simple matter of running a new cable to the hub. and

if the hub’s port are used up, you can connect a second hub to the first one,

another advantage is that if one machine goes for the count, the network

access to the other is not affected on down side, star topology tends to need a

lot of cable because you have to connect every node directly to the hub.

THE BUS TOPOLOGY 

In this project bus topology is employed because in bus topology each node is

attach to a single main cable called a bus or a back bone for a large network,

the back bone often extend through out an entire building an it is hidden

behind the walls. For such lengthy cables, repeater are often needed to boost

signals along various point of connection to the backbones are made via drop

cables that are ran from network card to the wall plates or some other junction

bus. For small network the back bone usually consist of connect series of 

coaxial cable. The big advantage of bus topology is it‘s relatively easy to set

up and it layout often mirrors a physical layout of an office or a building .the29

Page 30: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 30/51

 

major drawn back with bus topologies, is that the break in the back bone

brings down the entire network.

DEPARTMENTAL NETWORK DESIGN MEDIA

In the department of electrical and electronics cum computer engineering of Gateway polytechnic Igbesa ,two transmission media will be adopted, the

transmission media will cut across the wired Ethernet local Area Network .

In the wired LAN , the transmission medium is through the 10 Base T

category 5 unshielded twisted pair cable ,in which if maximum data rate is 10

megabits per second (mbps) with a maximum segment length of 100meters

(or 330 feet using carrier sense multiple access collision detection(CSMA/CD)

signaling techniques.

While for the wireless LAN, the transmission medium is the radio air waves(also known as radio frequency) in which the medium is the air waves without

any physical medium and it will have a data rate speed of 11mbps.

30

Page 31: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 31/51

 

Engr. Oladunjoye

Engr. Theophilus

Engr. Onadeko

Engr. Osas

Engr. Adekusibe

Engr. Dar e

Engr. Oluleye

Engr. Ayodeji

Secr etary of HOD

Elect/ Elect

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        S                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             c                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             r                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        t                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              a                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             r                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      y                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    o                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     f                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            H                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        O                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        D

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             o                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            m                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                p                                                                                                                                                                                                                     

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     u                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       t                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             r                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            E                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  g                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     r                                                                                                                                                      .

Data Link

Switch                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             W                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            i                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 r                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        l                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             s                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             s                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    C                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             o                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  v                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 e                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             r                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 a                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              g                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     e            

                                                                                                                                                                                                                                               N                                                                                                                                                                                       a                                                                                                                                                                                           n                                                                                                                                                                                       o                                                                                                                                                                                                                                                       S                                                                                                                                                                                                                                          t                                                                                                                                                                                       a                                                                                                                                                                                                                                          t                                                                                                                                                                                                                                                         i                                                                                                                                                                                       o                                                                                                                                                                                           n

   N  a  n  o   S   t  a   t   i  o  n

 TrunkCross over patch ca e

Ethernet Switch 24Port

 

3.2 NETWORK COMPONENTS

 The network components for this project will be stated according to the

particular network it falls under or belongs to. The following are component

used, Network Interface Card (NIC), 4 port of switch, cable, connectors, 8DBI

Nano station, Access point, PCMCIA card.

31

Page 32: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 32/51

 

3.3 NETWORK INTERFACE CARD

  The network interface card (NIC) is a hardware device that interfaces each

computer system (either client or server) with the network. It is known as the

network adapter and is also a layer two device in the OSI layer. In the course

of this project some systems in the department will be installed with this card

to enable them join the network.

3.4 DATA -LINK SWITCH

 A switch is a multiport repeater that receives incoming signals; it supports

both half-duplex or full-duplex mode. When a port is in half-duplex mode, at

any convenient time, it can either send or receive data, but not both. The

switch contains 24 ports which will receive signal from the Nano station in

front of the department.

3.5 8DBI NANO STATION

   The 8DBI Nano station is a hardware device that receives and also transfer

signals. In view of this project two 8DBI Nano station is used one served asaccess point which transmits wireless signals from the Cisco department and

the other serves as a station which send signal to the switch as to provide

access for the cable network.

32

Page 33: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 33/51

 

3.6 CABLE AND CONNECTORS

   The cable employed in this project as the transmission medium is the 10

Base T unshielded twisted pair category, 5 cable of the high bandwidth, it

supports a reasonable length of transmission.

In networking, there are two basic types of cable, which are the straight

through cable and the cross over cables, they can be differentiated by theircolour code specification. Straight through cable colour code specification is

more or less elementary when compared with the crossover counterpart. The

colour code arrangement is given below;

STRAIGHT THROUGH CABLE

UTP

cable

End 1 End 2

1 White-Orange White-Orange2 Orange Orange

3 White- Green White- Green

4 White-Blue White- Green

5 Blue Blue33

Page 34: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 34/51

 

6 Green Green

7 White- Brown White- Brown

8 Brown Brown

CROSS OVER CABLE

UTP

cable

End 1 End 2

1 White-Orange White- Green

2 Orange Blue

3 White- Green White- Orange

4 Green Green

5 White- Blue White- Blue

6 Blue Orange

7 White- Brown White- Brown

8 Brown Brown

 The straight through cable is done by arranging the colour with

specification given above without interchanging any of the colours when

connecting the RJ45 so that both ends of the colour code remains the

same and it goes into the RJ45 connector in accordance to the pins in the

connector. The straight through cable is also used in connecting accesspoint to the switch and the switch to the system. The crossover cable is

prepared by interchanging the other end of the cable colour arrangement

according to the specification given above. It is used to connect system to

system, switch to switch, and hub to hub.

Here is the procedure for attaching cat-5 cable to an RJ45 connector;

34

Page 35: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 35/51

 

Cut the end of the cable to the desired length; make sure that you make a

square cut not a diagonal cut. Insert the cable into the stripper portion of 

the crimping tool.

Arrange the wires so that they lay flat and lineup.

Slide the wires into the pin holes on the connector, double check to make

sure all the wires slipped into the correct pin holes.

Insert the plug and wire into the crimping portion of the tool and then

squeeze the handles to crimp the plug, squeeze it tight.

Remove the plug from the tool and double check the connection.

CONNECTORS

There are various types of connectors; they are BNC or RJ series such as

RJ11/ RJ12 and RJ45. The RJ45 is most important to us because this is the

type of connector that is used to connect the patch cables, this cables is

also used to link devices like AP, NIC and systems together.

35

Page 36: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 36/51

 

3.7 ACCESS POINT

 This is also called AP, wireless access point or base station is a hardware

device that acts as an 802.11 shared communication hub for an inter-

connecting 802.11 stations with each other and a wired LAN. The two 8DBInanostation, one serves as the access point which is configured to gain access

from the Cisco network. An access point can be defined as a device that allows

wireless devices to connect to a wired network using Wi-Fi, Bluetooth or

related standards.

3.8 WIRELESS LAN PCMCIA CARD

   This card interfaces the Laptops with the wireless network. It has an in

built antenna and it operates at the CSMACA protocol. In the course of this

project, we will implement the use of WL24P wireless LAN PCMCIA card,

this card has IEEE 802.11 LAN technology embedded to enable notebook,

PC to provide the wireless connection with other wireless LAN without any

physical wiring. The WL 24P wireless LAN PCMCIA card is a fast

implementation solution for mobile users to work perfectly in anyenvironment without the hassle of wiring.

  3.9 SERVER

  A server is a computer program that provides services to other

computer programs and their users in the same or other computers. A

36

Page 37: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 37/51

 

server can also be defined as a program that awaits and fulfills requests

from client programs in the same or other computers.

In the course of this project, our server operating system is the Microsoft

windows 2000 server also at this level the server will serve as a DHCP

(Dynamic Host Configuration Protocol) server i.e. it will assign IP (InternetProtocol) address to host (DHCP clients) automatically. It will also serve as

a DNS (Domain Name System) server i.e. it can resolve names of host to

IP address. However, for a standard server in the department we

recommend a Compaq server pentium 370Ghz with the following

configuring Pentium IV 3.066HZ 512MB RAM, DUAL Processor and

146GBSCSI.

3.10CLIENTS OR WORKSTATION

  This is a personal computer for workstation that depends on the server

resources such as printing, files applications. A client must be

authenticated by the server before it can allow to log into the network

domain, the client must have a network interface card (NIC) installed to

interface it with the network operating system (NOS) and configuration of 

the high IP address, the individual workstation will be able to join the

network with ease.

3.11NETWORK OPERATING SYSTEM (NOS)

These are operating system designed and built for networking of 

computer workstations with a high level of security. Examples of NOS

used for the implementation of this project are window 2000 professional,

window XP professional and window 2000 server

37

Page 38: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 38/51

 

  CHAPTER FOUR

4.0 INTRODUCTION

After the work has been implemented that is nano station was mounted,

switch was configured, cables were ran and other necessary things were done,

DHCP that was configured in the switch was enabled, this will help or aid the

issuing of IP address, subnet mask, default gateway automatically to the hosts

thereby limiting error prone task due to technical configuration. It should be

noted that the project covers both wired and wireless network.

4.1 DHCP (DYNAMIC HOST CONFIGURATION

PROTOCOL)

For a computer to send and receive information on the network there are

three part of the IP configuration which must be configured and they are;

• IP address- identifies the computer on the network.

• Subnet mask- used to identify the network on which the computer is

connected.

• Default gateway- identifies the device that the computer uses to access

the internet or another network.

 Therefore after this host or workstations have been properly designed and

implemented there must be a protocol which will assign these IP configuration

to the hosts, this protocol will refer to as Dynamic host configuration protocol

(DHCP).

DHCP can be static or dynamic configured static DHCP. In this scenario the

network administrator manually configure the network information for the host

i.e. assuming IP configuration manually. Static address are useful for printers,

servers and other networking devices that need to be accessible to clients on

the network, there is control of network resources but it is time consuming to

enter the information on each host, when entering this IP address statically

there can be error and also there is always administration intervention and

cannot be suitable for complex topology.

38

Page 39: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 39/51

 

4.2 DYNAMIC DHCP

For the sake of this project, Dynamic DHCP is configured in the switch since it

is easier to have IP address assigned automatically. That protocol which

provides a mechanism for the automatic assignment of addressing information

such as IP address, subnet mask, default gateway and other configuration

information is Dynamic DHCP. This type is used in a large network

environment, it reduces burden on network support staff and virtually

eliminates entry errors. Another benefits of DHCP is that an address is not

permanently assigned to a host but is only leased for a period of time if the

host is powered down or taken off the network, the address is returned to the

pool for reuse. This is especially helpful with mobile users that come and go on

a network.

4.3 CONFIGURING DHCP AND MODE OF WORKING

  The DHCP server is configured with a range or pool of IP address that can be

assigned to DHCP clients. A client that needs an IP address will send a DHCP

discover message which is a broadcast with a destination IP address of 

255.255.255.255 (32 ones) and a destination MAC address of FF-FF-FF-FF-FF-

FF- (48 ones). All hosts on the network will receive this broadcast DHCP Frame,but only a DHCP server will reply. The server will respond with a DHCP offer,

suggesting an IP address for the client. The host then sends a DHCP request to

that server asking to use the suggested IP address. The server responds with a

DHCP acknowledgement for most home and small business networks.

4.4 TESTING NETWORK FUNCTIONALITY 

 After the design and implementation of WLAN, there was a need to testnetwork functionality, individual LAN lines were tested by using the LAN tester.

 This LAN tester allows us to test each line for continuity. Also individual

workstation was tested for proper functionality by pinging (Packet internet

golfer) these workstations together and this was done using the start and run

setup on the computer system.

39

Page 40: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 40/51

 

With the completion of the installation signals as searched from the client

station for wireless connection and there was connectivity with a very strong

signal strength and link quality. An IP address was assigned to the access

point by default due to the DHCP in the access point device. The wireless

client station was able to navigate the network and the signal strength and

link quality were checked at intervals as the client laptop moved away from

the access point location. To test the wireless network, network was browsed

in the laboratory from the wireless client laptops and was able to see the

entire domain and files were transferred from system, the first system to the

laptop.

COMPUTER NAME DOMAIN

NAME

IP ADDRESS

1 Server Test domain Dynamic IP

address

2 Engr. Adekusibe Test domain Dynamic IP

address

3 Secretary Elect/Elect Test domain Dynamic IP

address

4 Secretary Comp Eng Test domain Dynamic IP

address

5 Engr. Onadeko Test domain Dynamic IP

address

6 Engr. Ayodeji Test domain Dynamic IP

address

7 Engr. Oladunjoye Test domain Dynamic IP

address

8 Engr. Dare Test domain Dynamic IP

address

9 Engr. Oluleye Test domain Dynamic IP

address

10 Engr. Theophilus Test domain Dynamic IP

address

40

Page 41: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 41/51

 

After the entire Ethernet network has been installed and all the system is now

actively connected in the domain network, we implemented the wireless local

area network as extension of the wired LAN which will support roaming (i.e.

flexibility) within the department.

 The first nano station configured as bridge was mounted and a cable from it

was ran to the access point, the transmission of signals were aid by a straight

through cable, that means two nano station was mounted, one provide signals

for LAN and the other has

4.5 TOOLS USED

These are network tools used for assigning and implementing wired LAN

and wireless local area network, they are given below;

• Crimping tool

• LAN Tester

• Network and computer tools

• Clips

• Hammer

• Software

• Screwdriver

4.6 SECURITY 

  The implementation of a basic security system on the network in the

department is essential due to the fact that the network is an academic

network and due to its sensitivity. To ensure a proper organization and

delegation of control in the network, some security measures were put inplace.

Administrator’s account was created in the domain which has the highest level

of control over the network. Other users accounts were created which will be

monitored by the administrators i.e. logs into the domain with an

administrator account. The Administrator and users account properties are

shown below;41

Page 42: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 42/51

 

Account Name Password

1 Administration account xxxxxxxxx

(b) Administrator

2 Users account

(b) Lecturer xxxxxxxxx

(c) Student xxxxxxxxx

 The wireless LAN used in the implementation of this project uses a security

protocol known as Wi-Fi Protected Access (WPA), this was embedded in the

access point device.

4.7 LIMITING ACCESS TO A WIRELESS LAN

Ways to limit access to your wireless network is to control exactly which

devices can gain access to your network. This can be accomplished through

filtering of the MAC (media access control) address.

4.7.1 MAC ADDRESS FILTERING

 The MAC address is a unique value associated with a network adapter. MAC

address are also known as HARDWARE ADDRESS or PHYSICAL ADDRESS .they

uniquely identify an adapter on a LAN and are represented in 12 digit

hexadecimal e.g MM:MM:MM:SS:SS:SS. or MM.MM.MM.SS.SS.SS. This access to

WLAN can be limited by filtering MAC address , if MAC filtering is enabled only

devices whose MAC address have been pre-recorded will be allowed to

connected.

 

4.7.2 AUTHENTICATION ON A WIRELESS LAN

 This is another way to control who can connect, it only permit entry to a

network base on a set of credentials. It is used to verify that the device

attempting to connect to the network is trusted. There are three types of 

wireless authentication method these are; OPEN AUTHENTICATION, PRE-

SHAREDE KEYS (PSK), EXTENSIBLE AUTHENTICATION PROTOCOL.42

Page 43: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 43/51

 

Authentication and MAC filtering may stop an attacker from connecting to a

wireless network but it will not prevent them from being able to intercept

transmitted data, Hence the deployment of Wi-Fi protected access (WPA)

which uses encryption keys from 64 bit up to 256 bits, WPA unlike WEP,

generate new dynamic keys each time a client establish a connection with the

AP, WPA is more secured than WEP because it is cumbersome to crack.

 Therefore the two advanced security protocol are WEP and WPA, But WPA was

used for the project.

4.8 SECURING THE ACCESS POINTS (AP)

 There is every necessity that this AP must be secured some of the more basic

security measure includes:

• Change default value for the SSID user name and password.

• Disable broadcast SSID and configuring MAC address, as well filtering

protocol.

Some of the more advanced security measures include configuring encryption

using WEP or WPA configuring authentication and configuration of traffic

filtering.

 

4.9 FIREWALL

In addition to protecting individual computer and server attached to the

network, it is important to control traffic travelling to and from the network. A

firewall is one of the most effective security tools that can be software

program or dedicated network appliances for protecting internal network users

from external threats; it resides between two or more networks and control

the traffic between them as well as help prevent unauthorized access.

43

Page 44: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 44/51

 

CHAPTER FIVE

5.0 CONCLUSION

History has been made in the department of Electrical and Electronics and

Computer Engineering Gateway Polytechnic Igbesa. It is now made known to

everybody that it is possible to implement a wireless local area network in a

time like this where digital library is of upmost desire of the department.

Wireless technology is no doubt the best option in any networking

environment when it has to do with the department, because when the

department is separated the wireless equipment can be taken to desire

position neglecting the use of cables during installation, and also the

avoidance of digging the ground in order to lay cables. This cable freetechnology has a lot of advantages as will be stated later in this chapter.

 The implementation of this project created a lot of possible answers to the fact

that people can actually connect to the network in the department without any

need for cabling, in addition, the facility is of immense benefit because it will

not only aid the coming up digital library but also as an open door to everyone

in the department and for the extension of the network ‘’poly Igbesa’’ Some

advantages offered by this project are:

 There is always room for mobility in which the client can move from one placeto another and still maintain network connectivity.

It brings about flexibility of network in which the network can be moved from a

particular location to another especially when there is relocation of the present

office where we have the wireless client station.

 There is also a very large room for scalability of the network, this means that

the network can be expanded with more PCMCIA card in the department and

lectures will join at ease.

 The rate at which the wireless network transmits data is faster than that of the

Ethernet LAN because it transmits more than 100mbps while that of the wired

installed transmit at 100mbps.

It has Wi-Fi Protected Access (WPA) which is a security protocol to prevent

unauthorized Access. Lecturers, non-academic staffs will be able to access and

44

Page 45: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 45/51

 

print files, documents, even use floppies on CD-ROM drives from other

desktops on the network right in their offices.

In the Implementation and Installation of this project, we have used some of 

the best products, in the market putting into consideration the position and

geographical location of the department. The device was carefully installed forthe smooth utilization by staffs in the department. The project stands as

precedence to future plans in extending the coverage area of the network

from the present 50m to 80m indoor installation or 150m to 300m for outdoor

Installation to a specified range depending on the financial capability of the

Engineering and Technology and the institution as a whole.

 The bill of quantity for installation of this project was a personal increment of 

the entire student involved in this project work due to individual contribution

we were able to purchase network devices and some of the computer and

networking tools used in carrying out the successful completion of this work.

As at the time of filing the report the total sum of money spent was #129,635,

leaving other yet to be spent, this is properly elucidated in the appendix.

5.1 RECOMMENDATION

It should be noted that the department, are only having extinction of the

signal from CISCO department, the network services for the department

depends majorly on the CISCO department.

 To have a separate network a router is highly recommended, on antenna maskand an external antenna of 80-100dBi is also recommended to extend the

range and coverage area and to bring about very effective wireless and cable

transmission. Since digital library is needed now in the department, when this

equipment are gotten then the existing network will just be connected to the

external antenna.

 There should be proper maintenance of this network equipment as to ensure

effective functioning durability of the service to the department.

Internet is no doubt the best means of information resources that has everhappened on the face of this earth, when the department comes up with this

digital library then the existing network will serve as a back-bone to ensure

that all networked computers are connected immediately there is an internet

facility. The renege of this technology will enhance a rapid rate of information

and communication technology, of leaning and VOIP (voice over internet

protocol).

45

Page 46: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 46/51

 

 

46

Page 47: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 47/51

 

REFERENCE

Math Haden, Teach yourself networking in 24hours published by Macmillancomputer publishing, (201 w 103rd streets, Indianapolis in 46290).

http://www.tecom.com

http://www.google.com

http://www.cisco.com

http://www.ieee802.org/11/

http://www.mcp.com

http://www.ask.com

Olusanya Olabanji John, Networking for Home and small business(CCNA

Discovery 4.0).

Akinyemi .S. Olalekan, Essentials of wireless Networking and Wireless

Network Fundamental(2008,Edition).

IEEE standard 802.11(1990), IEEE standard for local and metropolitan Area

Network overview and Architecture (IBSN 1.55937.0824).

IEEE standard 802.11(1990), part 11: Wireless LAN media Access Control

(MAC) and physical layer specification (2.4GHz).

Osloorne M.C.S.E, windows 2000 Accelerated study guide with I.S.B.N 0.07

21500.4 published by MC Graw Nill (2001, Edit)

47

Page 48: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 48/51

 

APPENDIX

BILL OF MATERIARS USED

S/N

Materials used QTY Prices (N)

1 UTP Cable Cat-5e 1roll 9,200

2 Wall Plate 17 3,480

3 Crimping tools 1 1,300

4 Trucking 1

bundle

1,700

5 RJ 45 connectors 100 pcs 1,000

6 Punch- down tools 1 850

7 Nails 5 packs 150

8 D-Link Switch 1(16por

t)

8,500

9 Cable binder1 pack

750

10 Tonado nail 3 200

11 RJ-45 and Trunk 50&1bi

g

2,000

12 Switch rack 1 1,800

13 Nano station 1 1 14,000

48

Page 49: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 49/51

 

14 Nano station 2 1 14,000

15 Initial photocopy and tags All 1,000

16 Higher education and record books 1 130

17 Envelopes 3 100

18 Transportation All 3,600

19 MISCELLANEOUS BILLS All 67,875

TOTAL 131,635

 

49

Page 50: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 50/51

 

50

Page 51: design and the implimentation of wireless local area networking.

5/16/2018 design and the implimentation of wireless local area networking. - slidepdf.com

http://slidepdf.com/reader/full/design-and-the-implimentation-of-wireless-local-area-networking 51/51

 

51