Beruflich Dokumente
Kultur Dokumente
NETWORK MANAGEMENT
ABSTRACT
and receive data over air interface minimizing the need for wired connection.
internet and on line services points to shared data and resources with a
wireless fidelity (Wi-fi) ,network users can have access to the internet , share
network that incorporates a local area network to share internet facilities and other
network resources.
1
TABLE OF CONTENTS
Abstract……………………………………………………… i
Table of contents……………………………………………. ii
List of figures………………………………………………… iv
Glossary of terms....………………………………………….. v
CHAPTER ONE
1.1 Introduction………………………………………………1
CHAPTER TWO
2
2.4.4 5GHZ (IEEE 802.11h)………………………………………....10
2.6.2 Bluetooth………………………………………………………..14
CHAPTER THREE
3
3.5 Wireless fidelity (Wi-fi) configuration……………………….28
CHAPTER FOUR
4
4.3.3 Step 3-network preparation………………………………....46.
CHAPTER FIVE
5.0 Conclusions………………………………………………52
5.1 Recommendation…………………………………………52
5.3 References...........................................................................54
5.4 Appendix.............................................................................56
5
LIST OF TABLES
6
LIST OF FIGURES
7
GLOSSARY OF TERMS
8
PPTP Point to point Tunneling protocol
9
CHAPTER ONE
1.1 INTRODUCTION
Wireless communication is one of the fastest growing technologies. The demand for
found in college campuses, office buildings, and public areas. At home, a wireless
LAN can connect roaming devices to the internet.Wireless computing and mobility
tremendously enhanced and improved the way business is conducted since the new
from almost any where and anytime. Enterprise mobile application are driven by the
need for universal data access combined with the increased worker productivity
higher demand for wireless media services, such as video, voices, data and the
network) mode, which enable devices to connect directly with each other. This
10
connectivity mode can prove useful in consumer electronics and gaming
computers can network to each other and connect to the Internet, mobile computer
can connect to the Internet from any Wi-Fi hotspot, and digital cameras can transfer
images wirelessly.
Despite the similarity between the terms “Wi-Fi” (wireless fidelity) and “Hi-Fi”
contradicts the popular conclusion that “Wi-Fi” stands for “Wireless Fidelity”[2].
“Wi-Fi” for the “Wi-Fi” Alliance to use to describe WLAN products that are
based on the IEEE 802.11 standards. Wireless Fidelity (Wi-Fi) has often been
used in an informal way, even by the Wi-Fi Alliance itself. The popularity of
ease of integration with other networks and network components. The majority of
the computers sold to consumers today come pre-equipped with all necessary
wireless LAN technology. Wi-Fi was coined by a brand consulting firm called
11
Interbrand Corporation that had hired by the Alliance to determine a name that was
a little catchier than IEEE 802.11b Direct sequence. Interbrand invented Wi-Fi as a
simply a play on words with Hi-Fi, as well as creating the yin-yang style Wi-Fi logo
[2].
The Wi-Fi Alliance themselves invoked the term “Wireless fidelity” with the
marketing of a tagline “The standard for wireless fidelity” ,but later removed
the tag from their marketing .The Wi-Fi Alliance now seems to discourage the
propagation of the notion that Wi-Fi stands for wireless fidelity but it has been
referred to as such by the Wi-Fi Alliance in white papers currently held in their
equipment ,the association created the Wi-Fi (wireless fidelity) logo to indicate that
communicate with each other by sending radio signals to transfer video content and
data. There are various wireless technologies standard such as the IEEE 802.11a,
802.11b, 802.11g, 802.11n that are used by a wireless bridge or gaming adapter ,
12
and are capable of providing wireless link between broadband Internet service and
the Internet video link. This project aims at developing and implementing a Wi-Fi
radius of 120m, for Internet access. Chapter 2 reviews the Nigerian communication
Electronics Engineering (IEEE) standards with a look at the various standards for
chapter three, a detailed look at the set-up of a wireless fidelity (Wi-Fi) network is
Chapter four reviews the installation and set-up of a broadband connection and the
configuration of Wi-Fi broadband network with coverage area. The final chapter
deals with conclusion and recommendation for further studies/ improvement on our
project.
13
CHAPTER TWO
communication and Intemet access for homes and business. Two groups of these
technologies deserve particular attention. First is the circular network that extends
communication far beyond just telephone service .Then there is the wireless fidelity
(2.5 and 5GHz) and are compatible with and may be connected to a wired Ethernet
Commission (FCC) was established by the commission Act of 1934 is charged with
satellite and cable. The FCC’s jurisdiction covers not only the 50 states and the
14
District of Columbia, but also all U.S possession such as Puerto Rico, Guam, and
The FCC make the laws within which Wireless LAN devices must operate. The
FCC mandate where on the radio frequency spectrum wire LANs can operate and at
what power, using which transmission technologies, and how and where various
ENGINEERING STANDARDS.
The institute of electrical and electronics engineering (IEEE) is the key standards
creates its standards within the laws created by the FCC (Federal Communication
such as public key cryptography (IEEE 1363), Firmware (IEEE 1394), Ethernet
This was the first, original standardized WLAN (Wireless Local Area Network) at 1
and 2 mbps.It is within the 2.4GHz radio frequency and was ratified in 1997 even
15
though we didn’t see many products pop up until around 1999 when IEEE 802.11b
was introduced .All the committees listed below are amendment to the original
IEEE 802.11 standard except for IEEE 802.11f and IEEE 802.11j which are both
COMMITTEES PURPOSE
802.1D standards
IEEE 802.11b)
16
IEEE 802.11i Enhanced security
(WAVE)
This technology features faster speeds than the IEEE 802.11b network. Data
transfer rates of 54mbps are possible. At a higher frequency than other IEEE
includes less range and worse transmission through walls and floors. Portable
device consumes more powers than results in shorter battery life. In addition, these
products are less available for home networks. The IEEE 802.11a standard delivers
17
2.4.2 2.4GHZ (IEEE 802.11b)
With this, technology data transfer rate of 11mbps are possible. The range is longer
than IEE 802.11a. IEEE 802.11b functions at a lower frequency and, therefore less
draining on Laptop/PDA power and the range is greater. The IEEE 802.11b
standard has been widely adopted by other vendors and customers who found that
its 11mbps data rate worked pretty well for most applications. The disadvantages of
IEEE 802.11b are interference. Many common items such as portable phones,
microwave ovens and baby monitor use the same 2.4GHZ band.
This version is an extension of IEEE 802.11b with similar benefit and a limitation
except that is much faster (54mbps) IEEE 802.11g is replacing IEEE 802.11b as the
new standard for home wireless network. Fortunately, IEEE 802.11g devices can
connect directly with IEEE 802.11b but will function at their original slower speed
of 11mbps. As with 1EEE 802.11b, there is less power consumption and there is a
longer range when compared to IEEE 802.11a since IEEE 802.11b/g operates in the
same 2.4 GHZ unlicensed band, migrating to IEEE 802.11g is an affordable choice
for organizations with existing IEEE 802.11b wireless infrastructures. IEEE 802.11
18
b uses a modulation technique called Direct Sequence Spread Spectrum (DSSS) that
modulation used by both 1EEE802.11a and IEEE 802.11g clients using OFDM
enjoy better performance at the same range as IEEE 802.11b clients do.
In this version, there are two new features of the 5GHZ radio that are part of the
operating range for any radar signals that are allowed to operate in portions of
the 5GHZ band as well as IEEE 802.11a before transmitting .If DFS discovers
any radar signal, it will either abandon the occupied channel or mark it as
TPC: Although it is being used by the mobile phone industry for a long time,
this technology has some handy new uses .It can set a client machine’s adapter and
the access points transmit power to cover various size range-a feature that is useful
for many reasons. One, setting the access points transmit power to 5MW reduces
19
cell range, which works well if one has a compact area with high density usage.
Further advantages include the fact that TPC enables the client and the access
points to communicate, this means that the client can fine-tune its transmit power
dynamically, so it uses just enough energy to preserve its connection to the access
point, conserve it’s battery power, plus reduce interference on the neighboring
20
DSSS DSSS/OFDM OFDM
Channel
penetrations
but most of today’s access points use four. These are sometimes referred to as
antennas, and if these are four, two would be used for transmitting simultaneously
with the other two receiving simultaneously. This setup would allow for much
higher data rates than IEEE 802.11b/g. In fact, providers claim that it will provide a
21
2.6 COMPETING TECHNOLOGIES
There are several technologies that compete with the IEEE 802.11 family of
inventions that drive enterprise spending. Other wireless LAN technologies and
-Home RF
-Bluetooth
-Infrared
-Open Air
2.6.1 HOME RF
Home RF Operates in the 2.4GHz band and uses frequency hopping technology.
Home RF devices hop at about 50 hops per second about 5 to 20 times faster than
most IEEE 802.11 complaint FHSS devices .The new version of Home RF, Home
RF 2.0 uses the new “wide band” frequency hopping rules approved by the FCC
and this is the first to do so .This is to say that the IEEE has not adopted the
Wide-band frequency hopping rules into the IEEE 802.11 series of standard [5]
22
2.6.2 BLUETOOTH
ISM band. The hop rate of Bluetooth devices is about 1600 hops per second (About
625µ s dwell time), so it has considerably more overhead than IEEE 802.11-
compliant frequency hopping systems. The high hop rate also gives the technology
greater resistance to spurious narrow band noise. Bluetooth systems are not
designed for high throughput, but rather for simple use, low power, and short range.
disrupt other 2.4GHz networks. The high hop rate of Bluetooth over the entire
usable 2.4GHz band makes the Bluetooth signal appear to all other systems as all
band noise, or all band interference .Bluetooth also affects FHSS systems. All band
interference, as the name implies disrupts the signal appear to all other systems as
Bluetooth also affect FHSS Systems. All-band interference, as the name implies
disrupts the signal over its entire range of usable frequencies rendering the
23
LAN interfering with Bluetooth) does not impact the Bluetooth devices as
severely as Bluetooth impacts the IEE 802.11 compliant wireless LAN area that
IrDA is not a standard like Bluetooth, home RF, and the IEEE802.11 series of
points- to –points user model that is adaptable to a wide range of computer devices .
Infrared data transmission is known for its use in calculators, printers, some
INFRARED
achieve a maximum data rate of 4mbps at close range, but as light-based technology
24
important advantage of IR networks is that they do not interfere with spread RF
network is that they not interfere with spread spectrum RF networks. For this reason
The open air standard was a standard created by wireless LAN interoperability
forum (now defunct) for which many wireless LAN systems were created to comply
as an alternative to IEEE 802.11. Open Air specified two speeds- 800kbps and
1.6mbps Open Air and IEEE 802.11 system are not compatible, and will not
Interoperate since there are currently several product lines still available that
comply with the open Air standard .It is important that the wireless LAN
administrator know that Open Air exists. However, Open Air is quickly losing
support among vendors and no new products are being made that comply with this
standard. Open Air was the first attempt in interoperability and standardization
among wireless LANs. Open Air focused on FHSS devices operating at only two
speeds. [5].
25
information from one point to another without relying on any physical connection.
Radio waves are often referred as radio carrier because they simply performs the
The data being transmitted is superimposed on the radio carrier so that it can be
(modulated) unto the radio carrier, the radio signal occurs more than a single
frequency ,since the frequency or orbit rate of the modulating information adds to
the carrier.
Multiple radio carriers can exist in the same space at the time without
interfering with each other, if the radio waves are transmitted or different radio
frequencies .To extract data, a radio receiver tunes in One radio frequency while
called an access point, connects to a wired network from a fixed location using
standard cabling. At a minimum, the access point receives, buffers, and transmits
data between the wireless LAN and the wired network infrastructure. A single
26
access point can support a small group of users and can function with a range of less
than one hundred to several hundred feet. The access point (or the antenna attached
to the access point) is usually mounted high but may be mounted essentially any
End users access wireless LAN through wireless LAN adapters, which are
provides an interface between the client network operating system (NOS) and the
air waves via an antenna .The nature of the wireless connection are transparent to
27
CHAPTER THREE
For windows Xp users, windows Xp service pack 2 is not required for wireless
networking but it does make things much easier. Service pack 2 also helps protect
The first step is to make sure that one has the equipment needed for the network .
As one is looking for products in stores or on the Internet, you might notice that you
networks. [7]
28
SHOPPING LIST
─Wireless router
A router connects to the server that host the Internet and network resources .This is
the base station where all computers , wireless and cabled are connected through the
29
3.1.2 WIRELESS NETWORK ADAPTER
have a newer computer; one may already have wireless capability in-built. If this is
the case, then there is no need for wireless network adapter. If there is a need to
recommended .The laptop has no wireless adapter, the PC card base network adapter
can be purchased and installed. Make sure that there is one adapter for every
ACT
A blinking light indicates
transmission of data
USB- PORT
Used to connect DWA-
120 to your computer
Note: To make setup easy, choose a network adapter made by the same
manufacturer. As that of the wireless router. For example, if you find a good price
on the D-link Router, choose a D-link network adapter to go with it .To make
shopping even easier, buy a bundle, such as those available from the D-link,
Netgear, linksys, and Microsoft. If you have a desktop computer, make sure that
30
you have an available USB port to plug the wireless network adapter into. If one
does not have any USB ports buy a hub to have additional ports. [7]
Connect the wireless router to your modem. Your modem should stay connected
directly to the Internet. Later, after you have hooked everything up, your computer
will wirelessly connect to your router and the router will send communication
Power supply
– 15VAC
Network
Connection –
RJ45 – port1
ADSL port
Note: The instructions below apply to a link sys wireless router. The ports on the
router may be labelled differently, and the images may look different on your
router. Check the documentation that came with your equipment for additional
31
assistance.
If you currently have your computer connected directly to your modem; unplug
the network cable from the back of your computer, and plug it into the port labelled
If you do not currently have a computer connected to the Internet: plug one end
of a network cable (included with your router) into your modem and plug the other
end of the network cable into the Internet, WAN, WLAN port on your wireless
router.
cable connected to the Internet, WAN, WLAN port from your current router, and
plug this end of the network cable into the Internet WAN or WLAN port on your
wireless router .Then, unplug any other network cables, and plug them into any
available ports in your wireless router .you no longer need your original router,
Next; plug in and turn on the cable or DSL modem. Wait a few minutes to give it
time to connect to the Internet, and then plug in and turn on the wireless router.
After a minute, the Internet, WAN, or WLAN light on the wireless router should
light up, indicating that it has successfully connected to the modem. [7]
Using the network cable that came with the wireless router, should temporarily
connect any computer to one of the open network ports on the wireless router (any
32
port that is not labelled Internet, WAN, or WLAN) If you need to turn the computer
Next, open Internet Explorer and type in the address to configure the router.
You might be prompted for a password; the address and password used will vary
depending on what type of router you have, so refer to the instructions included
with the router. As a quick reference, this table shows the default address,
Internet explorer will show the router’s configuration page .Most of the default
1 Your wireless network name, known as the SSID, this name identifies
the network .You should choose something unique that of your neighbors will
be using.
33
2 Wireless encryption (WEP) or Wi-Fi protected Access (WPA), which
help protect your wireless network. For most routers, you will provide a pass
phrase that the router uses to generate several keys. Make sure the pass phrase
like any other password, it should not be a word that you can password, it
should not be a word that you can find in the dictionary and it should be a
remembered easily, because you will need it if you ever have to change your
router’s settings .The exact step you follow to configure this settings will vary
depending on the type of router you have. After each configuration setting, be
sure to click save settings, apply or Ok to save your changes .Now you can
If the computer does not have wireless network support in-built, plug the
Network adapter into the USB port, and place the antenna on top of the computer
(In case of a desktop computer), or insert the network adapter into an empty PC
Card slot (in the case of a Laptop). Windows XP will automatically detect the new
adapter, and may prompt you to insert the CD that comes with the adapter.
The on-screen instructions will guide you through the configuration process.
Note: The steps below only apply while using Windows XP service Pack 2.
34
If you are running windows XP and you do not have service Pack 2 yet, plug
the computer into the wireless router, download and install windows XP service
pack 2. Windows XP should show an icon with a notification that says it has found
a wireless network.
1) Right-click the wireless network icon in the lower right Corner of the screen,
and then click view available wireless network. If you run into any problems,
consult the documentation that came with your network adapter. Do not be
2) The Wireless network connection window should appear and the wireless
network should be seen and listed with the network name chosen. If the
network fails to appear, click refresh network list in the upper left corner.
Click the network and then click connect in the lower right corner.
3) Windows XP prompts one to enter a key. Types the encryption key that you
wrote down earlier in both the network key and confirm network key boxes,
4) Windows XP will show its progress as it connects to the network. After you are
35
2. Enter user name password as before (as in ADSL router without Wi-Fi
a) Click the Internet one will find a page, configure PVCs, enter user name and
Password as earlier (as in ADSL router without Wi-Fi capability) and click save
button.
b) To configure wireless setting click wireless Tab and you will get window as:
* Select authentication type by clicking combo box and enter key in required
format.
You can filter /allow Mac address by activating wireless Mac address filter as
desired by clicking activation tab. You have to enter the Mac address of the Wi-Fi
Click save button .One user is allowed to access the Wi-Fi service from this access
If you enter Wi-Fi card MAC addresses of other laptops /computers (Maximum 8
c) To configure LAN (Local Area Network) settings like DNS, DHCP, click LAN
always use security feature of Wi-Fi router given above and repeated below again
36
1) SSID: - The SSID is a unique name to identify the ADSL router in wireless
LAN. Wireless clients associating to the ADSL Router must have the same SSID.
Broadcast SSID; select ‘NO’ to hide the SSID such that a station can not obtain the
SSID through passive scanning .Select ‘Yes’ to make the SSID visible so a station
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the
with the access point without any data encryption .Select 64-bit WEP keys or 128-
Key#1-key#4: The WEP keys are used to encrypt data .Both the ADSL Router
and the wireless clients must use the same WEP key for data transmission .If you
choose 64-bit WEP, then enter any 5 character each key (1-4). If you choose 128-bit
WEP, then enter 13 characters for each key (1-4).The values must be set-up exactly
the same as the access point as they are in the wireless client station.
One can allow or deny a list of MAC address associated with the wireless
Status: Use the drop down list box to enable or disable MAC address filtering.
Action: Select ‘Deny Association’ to block access to the router. MAC addresses
not listed will be allowed to access the router. Select ‘Allow Association’ to permit
access to router, MAC address not listed will be denied access to the router.
37
NOTE: One should always use Wi-Fi facility with activating the security features.
[8]
If one purchases a router to share high speed Internet connection with other
computers, one must have an Ethernet – based cable or DSL modem with an
It is best to use the same computer that is connected to the modem for
configuring the DI-624 multimode wireless router. The DI-624 acts as a DHCP
server and will assign all the necessary IP address information on the network.
NETWORK
A) First, connect the power adapter to the receptor at the back panel of the DI-624
router and then plug the other end of the power adapter to a wall outlet or power
B) Insert on end of an Ethernet cable to WAN port on the back panel of the DI-624
router and the other end to the Ethernet port located on the cable or DSL modem.
C) Insert an Ethernet cable to LAN port 1 on the back panel of the DI-624 and an
configure the DI-624 router. The LED light for LAN port 1 will illuminate to
38
Note: The WAN port and LAN port on the DI-624 are Auto-MDI/MDIS.
Meaning you can use a straight through or crossover-cable to the WAN port and
LAN.
D) Computers equipped with 802.11b/g wireless adapters will be able connect to the
router .The DWA-G650 Air plus xtreme G wireless card bus adapter and the
DWL-G520 air plus xtreme G wireless PCI adapter will be able to connect out of
the Box with the router using their default wireless settings. [9]
- Using additional Ethernet (CAT5 UTP) cables connect the Ethernet LAN ports
39
Open the browser and type “http:1119-168.0.1” into the URL address box. Then
press the enter or return key The log on pop-up screen will appear .Type “admin”
for the user name and leave the password field back .Once you have logged in, the
home screen will appear .Set up your new password .Choose your time zone from
Select your Internet connection. You will be prompted to select the type of
Internet connection for the router .If you selected Dynamic IP address, the screen
will appear: (Used mainly for cable Internet service).Click the “clone MAC
Address” buttons to automatically copy the MAC address of the network adapter
in the computer. One can also manually type in the MAC address [MAC address-
each network adapter has discrete Media Access Control {MAC} address].
If your ISP requires a static IP address, and this option is selected, then the pin
will appear for you to enter the IP address information originally provided to you by
your ISP.One will need to complete all the required field if your ISP uses PPPOE
(Point To Point Protocol Over Ethernet), and then the options are selected (used
Enter the username and password provided to you by your ISP, then click ‘next’.
networks are
SSID = default.
Channel = 6
40
One can change these settings to match an existing wireless network, and then
click next. If you wish to use encryption for the IEEE 802.11b/g network, the DI-
624 is capable of two levels of wireless encryption-64 bit and 128 bit. By default,
the encryption is disabled. One can change the encryption settings for more secured
The setting is complete! Click ‘restart’ and then click ‘close’. [9]
Wireless LANs can be simple or complex. At its most basic, two PCs equipped with
wireless adapter cards can set up an independent network whenever they are within
pre-configuration. In this case each client would only have access to the resources
41
Installing an access point can extend the range of an ad hoc network, effectively
doubling the range at which the devices can communicate. Since the access point is
connected to the wired network each client would have access to server resources as
well as to other clients. Each access point can accommodate many clients; the
specific number depends on the number and nature of the transmissions involved.
Many real-world applications exist where a single access point services from 15-50
Access points have a finite range, on the order of 500 feet indoor and 1000 feet
probably be necessary to install more than one access point. Access point
coverage area with overlapping coverage cells so that clients might range
42
throughout the area without ever losing network contact. The ability of clients to
move seamlessly among a cluster of access points is called roaming. Access points
hand the client off from one to another in a way that is invisible to the client,
To solve particular problems of topology, the network designer might choose to use
Extension Points to augment the network of access points. Extension Points look
and function like access points, but they are not tethered to the wired network as are
APs. EPs function just as their name implies: they extend the range of the network
humans in a bucket brigade pass pails of water hand-to-hand from a water source to
a fire. [6]
43
Fig 3.7 Use of an extension point
One last item of wireless LAN equipment to consider is the directional antenna.
Let’s suppose you had a wireless LAN in your building A and wanted to extend it to
a leased building B, one mile away. One solution might be to install a directional
antenna on each building, each antenna targeting the other. The antenna on A is
connected to your wired network via an access point. The antenna on B is similarly
44
Fig 3.8 the use of directional antennas
Summary
Flexibility and mobility make wireless LANs both effective extensions and
functionality of wired LANs, without the physical constraints of the wire itself.
networks offering distributed data connectivity and roaming. Besides offering end-
networks, allowing LANs to move with the knowledge workers that use them. [6]
For the most part, if one has set the router to provide IP addresses within your
connect to the router when the device is turned on and will send a Dynamic Host
45
you have configured your gaming PC before, your computer should get its IP
select an access point and enter the WEB password, but otherwise, it should just
divided into two portions: a network address and a host address .The network
address are shared by all the nodes on that network. The host address is unique to
that node.
would be enough for a world of just over 6 billion people. Although not all IP
CLASS DESCRIPTION
46
C IP address between 192.0.0.0 and 223.255.255.255 –
47
CHAPTER FOUR
Why is broadband better than dial up? There is an easy answer to this
question. It is fast and always on. There is no need to dial up or reconnect down
streams speeds are as high as 2mbps or more. However, there are many broadband
technologies such as satellite available where cable and DSL are not found. In the
course of this project, concern has been in the emerging wireless technologies
extending the reach of the internet and other data communication beyond the
home/business. Below are two sections involved in the installation and setup of
broadband connections.
using a network set-up called a ‘Peer-to-Peer’ network, you need to have the
following components which connect the computers together. Care has to be taken
not to purchase equipment which “integrates” these devices into one single unit.
- Router
48
4.1.1 THE HUB OR SWITCH
The device which sits between the computers is called either a switch or hub
(both do the same job of controlling the network traffic). Each computer is able to
send and receive data over the network cabling. The hub sends this data to all of the
computers on the network and a switch would direct it only to the correct computer.
A switch can do two jobs at the same time, sending and receiving data which is a
speed bonus. However, if the computer tries to access the Internet, which is one
huge network (some times referred to as a WAN – wide area network), we would
have computers exposed to the whole world, and the network would simply not
work with this type of set up. We need a device which keeps our small intranet
The “router” does the job of dealing with specific Internet requests made by the
computers on our home/office network. It translates the Internet request from each
computer on our network into a special format for the Internet servers. It acts like a
sort of bridge, directing only Internet traffic from our network to the
Internet and back again (routing), keeping internal network traffic separate from the
Internet traffic.
49
D. C. LAN PORTS – B. WAN PROT-
Antennas These are the for This is for the
Used to Ethernet cables to connection of an
wirelessly Ethernet enabled Ethernet cable to the
connect to computers. cable or DSL
802.11g
or
802.11b
With the network traffic controlled and directed from our network towards the
Internet, what is needed now is a device which can “communicate” with the ISP
(Internet Service Provider) servers over the telephone lines. The network data is in
the correct format but we need to send this information down the telephone line at
as high a speed as is possible. The device which does this is the modem. This is
where ADSL comes into play (Asymmetric Digital Subscriber Line). These
modems are able to convert our network data into high frequency signals which are
placed onto the telephone lines. Special filters allows these high frequencies to be
kept separate from the voice signals and therefore the modem is always connected
to the ISP servers, and there is no need to always dial-up the ISP when one want to
50
Fig 4.1 Wireless Modem
This set-up is based upon an integrated – ADSL modem; router, 4-port switch
and may also include a firewall and wireless access point as well. This type of
makes the wiring and set-up requirements that much simpler. The set-up was first
built around a 5-port hub and when we finally had ADSL broadband activated, we
fitted the DG824M from Netgear. The set up was simple to do only the wiring
proved to be the biggest hurdle as we wanted the DG824M to be sited next to the
phone socket.
51
SECTION 2: INSTALLING THE BROADBAND ACCESS
come as integrated products. Netgear’s is a good product to be used, but there are
There are three steps to be considered when installing the broadband access:
-Network preparation.
would probably make sense to keep any distortion to the ADSL signal to a
minimum that will improve the final connection speed. That decision proved to be
with good signal strength. Belkin micro-filters for the other phones in the house
although the DG824M comes supplied with one filter in the package. The first
problem is the power socket needed to power the DG824M CAT5 cable network
which was now installed and a twin figure 8 cables for the 15VA supply down
52
4.3.2 Step 2 – Connecting Router to the Network
Connecting the router to the network requires laying CAT5 Ethernet cable from the
router to the hub or switch (if you have an existing network), or one cable for each
computer intended to be connected directly to the router (make sure the router has
sufficient ports for the number of computers – max 4 using this model on the
DG824M).
Now that all of the wiring is done there are some basic things that need to be
done before switching on the new router. The network may be configured with
static IP addresses (as suggested in the Network Project) and connection to the
Internet was done through a dial-up modem. These must be changed before
switching on the router. Most routers require that the computers collect to the
53
network information from them using what is called “DHCP”-Dynamic Host
Control Protocol. This means that the router will take control of the allocation of IP
address for the computers on the network (it can remember which computers are on
the network as determined during switch-on) and any request for Internet access
will need to be redirected to the ADSL modem. The procedures below show how to
proceed:-
- Use step 4 onwards to configure the network properties for each computer. [12]
With the computers switched on make the following changes to the network
1) Removing the dial-up account: - First select control panel and navigate to
Internet properties, select connection and remove dialer. There should be no dial
2) Removing the modem- Depending upon what type of router used, make sure
that its driver is uninstalled .Navigate to the device manager by right clicking on the
computer. Select the hardware that will load to the device manager .If the modem
driver has been successfully removed; it will not be listed on the device driver list.
54
3) Changing the network properties-Navigate to network and Internet options,
using the control panel. Select the network connection options to find the network
connection properties. Right click on the icon which shows the network connection
for the computer. This will lead to the set-up screen to allow one to make the
network changing needed for the router to work correctly. Screw down until to find
the following Internet protocol (TCP/IP), highlight it and select properties .Now one
can select from the general tab and set to obtain IP address automatically and obtain
DNS server address automatically .Once the above has been done- Select Advance
option, you will then see a dialogue box that will help check if the DHCP is
disabled. The router will need this option to enable it function dynamically. Allocate
4) Changing the Internet properties - All that is left now is to change the way the
browser and e-mail client such as outlook access the Internet. First, right click on
the browser icon on the desktop- on the dial up box, select connection and make
sure that the dialer has been removed. Select the LAN settings. This will be to
connection options for the browser. Tick the box automatically detects settings.
From the tool’s menu, select E-mail account, and then next. Highlight the e-mail
account and the change –and then on the dialogue box select more settings and
select the tab called connection and click the box connect using my Local Area
55
4.4 GOING BROADBAND
made: - power supply, CAT5 cabling, computers to the hub, router to the hub. Read
the manufactures instructions that came with the router/ADSL modem. They all
seem to follow a similar procedure if one uses your browser to LOG ON to the
router to start the set-up process. Connect the ADSL modem/router to the ADSL
2. The unit will begin its start-up process – detecting the ADSL signal, etc. When
completed – you should have LED’s showing a steady green (check the instruction
sheet). A fast flashing LED on a port indicates a fault with the network cable
3. Turn all computers (do not forget any additional hubs used in your Network). The
4. Log onto the router using the manufactures instructions and follow the on Screen
help menu. It really is a very simple process. Use the details provided by your ISP
5. If the computers do not register correctly with the router – switch off the Router
and wait for a minute and switch it back on again with the computers already
switched on. This time the router will start looking for the computers and should
detect them.
56
NOTE: Make sure the computers are switched off before switching on the router
and make sure also that the router is connected to the ADSL line feed. [12]
Below is the cost of setting up a wireless fidelity ( WI- FI) network of about
120m coverage area.
Table 4.5 Cost of materials used
3 UPS(Uninterruptible power 3
supply) ANSU
Total 38,500
57
CHAPTER FIVE
5.0 CONCLUSION
The Wireless Fidelity (Wi-Fi) network designed and implemented is for the
“Hotspot”. It has a server, two wireless desktop computers and provision for cabled
network which gives the networked computers access to the server and its
resources. The main trust of the Hot Spot is that wireless computers example;
Laptop with wireless network facilities can equally share resources with the server
and other network computers. The Hot Spot has a range of 120 meters outdoors and
close to 60 meters indoors (within the lab). Internet services when provided will
properties. The design project has successfully provided a Wi-Fi Hot Spot for the
5.1 RECOMENDATION
1) Our implementation used the IEEE 802.11g Wi-Fi network router which limits
the coverage to within 120meters outdoors. This can be improved with the use of
2) For better coverage and less interference 5 GHZ air interference can be
adopted instead of 2.4GHZ which is becoming crowded. Note that both frequencies
58
3) It is recommended that for the department to fully benefit from the
possible.
4) Other Wi-Fi Hot Spots can be activated to form a Wi-Fi mesh network with
just one VSAT installation and several computers networked to share resources,
wirelessly and by cable network. This can form a wireless cloud covering the whole
Uli campus of the University. The possibilities are limitless, as long as one is
imaginative and can adapt to technological changes which occur every second in the
59
REFERENCES
31-08-2007.
7) http://www.googles.com
60
11) “Wireless home networking for Dummies” PDF. Using a wireless network.
Part IV.
61
62