Sie sind auf Seite 1von 51

THE DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL AREA NETWORK IN THE DEPARTMENT OF ELECTRICAL ELECTRONICS AND COMPUTER ENGINEERING

IGBESA, OGUN STATE BY MICHAEL EDAFEAJIROKE LATEEF MURITALA A. AIYEGORO OMOLADE IBIROGBA AKINLOLU P. SUBMITTED TO THE DEPARTMENT OF COMPUTER ENGINEERING IN PARTIAL FULFILMENT FOR THE AWARD NATIONAL DIPLOMA IN COMPUTER ENGINEERING NOVEMBER 2011
1

NCEF/09/024 NCEF/09/013 NCEF/09/014 NCEF/09/008

CERTIFICATION This is to certify that this project work was carried out by EDAFEAJIROKE MICHAEL LATEEF MURITALA A. AIYEGORO OMALADE IBIROGBA AKINLOLU P NCEF/09/024 NCEF/09/013 NCEF/09/014 NCEF/09/008

And submitted to the department of computer Engineering Gateway (ICT) polytechnic Igbesa Ogun state.

ADEKUSIBE KEHINDE Project Supervisor

Date

OMOFUAMA O. Project Supervisor

Date

OLULEYE G.F Project Supervisor

Date

ADEKUSIBE KEHINDE H.O.D Computer Engineering

Date

DEDICATION This report is specially dedicated to Almighty God, for his blessings, mercies, protection, for the completion of this National diploma program. At human level, we are indebted to every individual who at various stages had helped in the completion of this work, thank you and we love you all.

ACKNOWLEDGEMENT We appreciate the lord Almighty, for his protection throughout the program, giving hope when hope seems to be lost, for his vision for us and favour he has always shown from the day we were born, Thank you God. We sincerely acknowledge our able supervisors Engr. Gabriel Adekusibe, Engr. Omofuama, Engr. G. f. Oluleye for their guidance, encouragement, patient with excellent supervision throughout the research work. We also acknowledgement the cisco department headed by Mr. Olusanya Olabanji john, and Mr. Oloyede Emmanuel for their entire support given to us during the project. our greatest thanks goes our parents Mr. & Mrs. Aiyegoro, Mr. & Mrs. Lateef Aderemi, Mr. & Mrs. Edafeajiroke, Mr. & Mrs. Ibirogba and every other uncle, brothers and sisters that have contributed to the success of the program, we love you all and God bless. We use this time to appreciate the entire department, the HODs, and staffs, God bless every one of you. Thanks,

TABLE OF CONTENT
CERTIFICATION............................................................................................................2 DEDICATION................................................................................................................3 ABSTRACT...................................................................................................................8 CHAPTER ONE.............................................................................................................9 1.0 GENERAL OVERVIEW.......................................................................................9 1.1 STATEMENT OF THE PROBLEM.......................................................................9 1.2 RESEARCH QUESTION..................................................................................10 1.3 SPECIFIC OBJECTIVES...................................................................................10 1.4 THE SCOPE OF THE STUDY...........................................................................10 1.5 SIGNIFICANT OF THE STUDY.........................................................................11 1.6 CONTRIBUTION TO KNOWLEDGE..................................................................11 1.7 GLOSSARY OF NETWORK TERMS..................................................................11 2.0 Network ......................................................................................................20 2.3 Network Design Steps .................................................................................22 2.4 Computer Architecture................................................................................22 2.5 Network Operation and Management ..........................................................23 2.6 Wireless intrusion prevention system...........................................................24 2.6.1 Purpose.....................................................................................................24 2.6.2 Intrusion Detection....................................................................................24 2.6.3 Intrusion Prevention..................................................................................24 2.7 Network Implementation..............................................................................25 2.7.1 Hosted Implementation.............................................................................26 2.7.2 Notable implementations..........................................................................26 2.0 THE DESIGN AND IMPLEMENTATION OF WLAN...............................................28
5

3.1 DESIGN TOPOLOGY......................................................................................28 LOGICAL TOPOLOGY..........................................................................................28 PHYSICAL ADDRESSS .......................................................................................29 STAR TOPOLOGY ...............................................................................................29 THE BUS TOPOLOGY..........................................................................................29 DEPARTMENTAL NETWORK DESIGN MEDIA.........................................................30 3.2 NETWORK COMPONENTS..............................................................................31 3.3 NETWORK INTERFACE CARD.........................................................................32 3.4 DATA -LINK SWITCH.....................................................................................32 3.5 8DBI NANO STATION....................................................................................32 3.6 CABLE AND CONNECTORS............................................................................33 STRAIGHT THROUGH CABLE............................................................................33 CROSS OVER CABLE................................................................................34 CONNECTORS.................................................................................................... 35 3.7 ACCESS POINT..............................................................................................36 3.8 WIRELESS LAN PCMCIA CARD.......................................................................36 3.9 SERVER................................................................................................36 3.10 CLIENTS OR WORKSTATION........................................................................37 3.11 NETWORK OPERATING SYSTEM (NOS)........................................................37 4.0 INTRODUCTION ....................................................................................38

4.1 DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)...................................38 4.2 DYNAMIC DHCP............................................................................................39 4.3 CONFIGURING DHCP AND MODE OF WORKING.............................................39 4.4 TESTING NETWORK FUNCTIONALITY.............................................................39 4.5 TOOLS USED................................................................................................41 4.6 SECURITY..................................................................................................... 41
6

4.7 LIMITING ACCESS TO A WIRELESS LAN........................................................42 4.7.1 MAC ADDRESS FILTERING ........................................................................42 4.7.2 AUTHENTICATION ON A WIRELESS LAN.....................................................42 4.8 SECURING THE ACCESS POINTS (AP)............................................................43 4.9 FIREWALL.....................................................................................................43 CHAPTER FIVE...........................................................................................................44 5.0 CONCLUSION..............................................................................................44 5.1 RECOMMENDATION....................................................................................45 REFERENCE .................................................................................47 APPENDIX..................................................................................................................48

ABSTRACT
Wireless technology has proved to be the initiator of the emerging cable free technology. The wireless technology, among other technology is far- reaching and spreading in the global technology market. This technology incorporate stateof-the-act equipments and involves efficient implement and installation. In view of this, a fraction of project studies, in computer engineering department, Gateway Polytechnic Igbesa decided to implement this technology (wireless technology) in the department of Electrical/Electronic and Computer Engineering Department of Gateway Polytechnic Igbesa.

CHAPTER ONE 1.0 GENERAL OVERVIEW


In recent time the need for a flexible data communication system(wireless LAN), in recent time, the need for a flexible data communication) that can be implemented as an extension or as an alternative for a wired LAN can never be overemphasized. Wireless local area network uses radio frequency (RF) technology, wireless LAN transmits and receive data over the air waves minimizing the need for wire connection, thereby combining data connection with user mobility. Wireless networks, like many other technology came of age under the guidance of united states military, the military need a simple, easily implemented and more secured method of exchanging data and information in a combat environment .in real sense, wireless network does not mean that the network is completely free of cabling, most wireless networks actually consist of wireless component communication with a network that actually uses cable as a method of connectivity among component in the wired network This network we enable student and lecturers to have access to online research, enabling them to meet up with technology demand, creating a control base server, e-learning and most important information are being control from a base server thereby making the department one of those to be reckoned with in the nearest feature. As a result of rapid improvement in wireless technology hardware and also due to increase in the quality by vendors, the cost of wireless technology reduced drastically thereby making it affordable for the department to integrate wireless segment into their already existing wire network, and in connecting buildings to one another without laying copper or fiber cabling

1.1 STATEMENT OF THE PROBLEM


Due to the fact that local area network, called wired network, are prone to various set back which distort network connection, hence the deployments of a wireless local area network ,local area network do suffer from network interruption such as attenuation which is the loss of signals strength, as
9

distance increases, signals distortion called capacitances, the LAN network is prone to crosstalk ,which is leakage of signals from adjacent wires, electromagnetic interference, and insecurity of the LAN, were cable signals are tapped. Wireless was also need seen there was high necessity for a central based server for monitoring files and application.

1.2 RESEARCH QUESTION


In the cause of this project, some thins was put in consideration to make the project a successful one, these things were, the type of topology that would be deployed weather star, bus, ring (physical topology), the type of wireless equipment to be used in the project and the configuration of this equipment The network protocol that will be running in the switch and how to deploy a security system for all files and connection to the server, how to configure a system, bringing all the requirement to have a server by other system in each offices

1.3 SPECIFIC OBJECTIVES


The project is designed to assess the performance of local area network which connect existing peer to peer network to server based network for centralized administration for security, and proper monitoring of files are improved ,the various type of network such as WAN (Wired area network ) metropolitan area network (MAN) , wireless area network (WAN), local area network (LAN), storage area network (SAN), etc. will be properly emphasized, while the type we are deploying will be totally elucidated. With the design and implementation of WLAN there would be mobility or roaming of clients from one point to another within a specified range provide by an access point there will also be room for relocation of the network and scalability not left out, the way this will be deployed is properly explained. This WLAN would perform better and signal to a far distance if a higher garget i.e. access point are used or more access point are used to boost signals.

1.4 THE SCOPE OF THE STUDY

10

The scope of study in this implemented work will cover the department as a whole and the environs and also provide room for scalability, the wireless signals can be seen in all parts of the institution.

1.5 SIGNIFICANT OF THE STUDY


Local area network (LAN) is a computer network that is designed for a limited geographical area such as building or a campus, they can be privately owned, it connect computer together for the sole purpose of sharing resources available in a computer. Dew to the fact that LAN are faced with so much contortion which are lost of signal, crosstalk, electromagnetic interference, rigorous running of cable, hence the deployment of wireless network which transmit signals in form of radio frequency, easy to access, mobility, scalability, and also the wireless network can be relocated unlike the LAN.

1.6 CONTRIBUTION TO KNOWLEDGE


With the design and implementation of WLAN it provide internet services for the department, thereby creating room for e-learning, has an ICT based institution to improve the practical skills of students, enabling researches for all learners, and above all providing a base for expansion of the network.

1.7 GLOSSARY OF NETWORK TERMS


INFRA-RED; The sight spectrum just shorter than red invisible to human eyes it used for line of sight data transmission in wireless network. INTERNET; The global network now used for everything from e-mail to electronic commerce to research. INTER OPERABILITY; The capacity of two products to operate together, ideally according to open standard such as the TCP/IP protocol. IP (INTERNET PROTOCOL) The part of the TCP/IP protocol responsible for providing addressing and routing services to packet. IP ADDRESS ; A sequence of number associated with a network adapter mac address, it is a 32 bit long and is divide into four byte strings that have value ranging from 0 to 255e e.g 192.168.1.0

11

IPX (INTERNETWORK PACKET EXCHANGE) ; The part of the novel networks IPX/SPX protocol responsible for addressing and routing ISDN (INTERNET SERVICES DIGITAL NETWORK ) ; A switch digital phone services that in its basic rate interfaces (BRI) can carry up to 128 kilobits per second of data, in its primary rate interface (PRI) it can be as act as 1.5 megabits per second. ISP (INTERNET SERVICES PROVIDER); A computer that provides connection to internet JUMPER; A very small pieces of plastic with a conductive metal strip inside it LAN (LOCAL AREA NETWORK); a group of computer in a local area tied together without any router between them all computer are connected to the same set of hub or switch in a LAN. LINUX; A tree ware Unix like operating system deployed by Linux Torvalds and a host of internet programmers. MAC ADDRESS (media access control address) ; a 6 byte (48 bit) address unique to each and every network card represented in hexadecimal notation MAN (MENTROPOLITAN AREA NTWORK) A group of lan in a relatively small geographical area joined by digital phone lines by other technologies such as microwaves radio. MAU (MULTISTATION ACESS UNIT); IBM name for token ring concentrator MEMORY; The chip that provides a places for the computer to store is an OS it is need to do computation MODEM; short for modulation, demodulation, a device used to convert digital signal into analog tones that can be transmitted over the telephone network MULTITASKING; IN OPERATIN SYSTEM, the ability to divide the computer time among two or more running programs simultaneously. NETBEUI (NETWORK EXTENDED USER INTERFACE) An extension of NETBIOS that include the capability to frame packet among extended features NETBEUI is a common implementation of NetBIOS

12

NETBIOS; Network basic i/p system, a small non routable protocol developed by IBM for small pc network NETWARE; Novels network operating system, powerful extremely scalable NETWORK; Any conglomeration of parts working together in a predictable order group of computer connected by a common topology that enable data to be transmitted. NETWORK ADAPTER; An adapter card installation on a computer that allow it to communicate on network. NIC (NETWORK INTERFACE CARD); This is also called network adapter an add in card that plays into a computer and enable it to communicate on a network NIC are usually AMT Ethernet, token ring or FDDI. NOS (NETWORK OPERATING CENTER); IT A software that allows a computer to perform certain network centric take such as authentication , user handling security and providing connection to network recourse. OCTET; The official name for byte. OPEN STANDARD; Hard disk and software standards that are not proprietary to any given manufacturer TCP/IP and Ethernet are both open standard. OPERATING SYSTEM; The software in a computer that enable the user to communicate with the hardware and get task done. OPTICAL FIBER; A media used by fiber optics network, most network use either coaxial cable or UTP. OSI MODEL (OPEN SYSTEM INTERNET CONNECT MODEL); A reference model that details seven layers of functionality for networks. PACKET; also called datagram, information placed inside a wrapper called the header, packet contains header (which handle addressing) error correction checksums and the data sent across the network PACKET HEADER; see header PACKET SWITCHING ; A technology in which binary data is divided into small packages that handle error correction and address information in order to transmit data across a physical medium such as cable .
13

PC CARD; An electronic device that slides into a slot on the side of a laptop they are usually network adapter or modems PEER TO PEER NETWORK; A network built without a central server PLUG AND PLUG; Adapter card hardware for which I/p addresses as and IRQ are set through software rather than through jumper of some sort. POP (post office protocol): The TCP/IP protocol standard for email transmission between sever and client pop3 is the current version. PORTING; The protocol of recompiling c language source code into version that can run on different computers. PPP (point to point protocol): a port of TCP/IP protocol suite used to connect computers across switched telephone lines. PROTOCOL; An agreed on standard, a protocol used to addressed and ensure the delivery of packets across network. PROTOCOL TRANSLATOR; a device that translate between two NETWORK PROTOCOL; Typically, protocol translators translate NetWare IPX to TCP/IP so that user on an IP X network can access the internet on IP resources PROXY SEVER; A sever that hides internal network IP addresses from the internet by making request for internal clients. QOS; quality of service REDUNDANCY OR FAULT TOLERANCE; See fault tolerance or redundancy REPEATER; A device that enable to network to communicate reasonable well . ROUTER; A device or softer that enable packet towards thrie destinations . SCALABILITY; the measure of System capacity to grow. SCRIPTING LANGUAGE ; A limited programming language built into many operating systems. SERVER ; a computer on a network that share a specific resource with other computer. o SMTP (SIMPLE MAIL TRNSMISSION PROTOCOL) the TCP/Ip standard for Internet mail.
14

Concentrator : Also called a hub or MAU, helps ensure the robustness of the network by making sure that the network canot be disconnected because of a single cable falure CSU/DSU (channel service unit/ data service unit) : A device that changes local network packet into packet that can be transmitted over a WAN. CRACKER : someone who make unauthorized access into other computer system usually maliciously is not the same as HACKER. DHCP(dynamic host configuration protocol) :A piece of the TCP/IP protocol suite that handle the Automatic assignment of IP address to client DIGITAL : A data transmission type based on the data that been binary coded. DISK : A device that store digital 1s and 0s on magnetic media such as hard drive or floppy drive. DLC (data link control) : a protocol, that Microsoft uses to connect to network printers. CLIENT OR HOST : A computer that uses the result share by sever computer. COAXIAL CABLE : A two conductor cable with a solid center conductor and it is similar to cable used for TV BANDWITH : the measurement of the amount of data a particular medium can carry. BIT Information represented has 1s and 0s to connect network. FRAME RELAY ;A method of refraining (or packetizing)already packetized data to allow it to be transmitted over the phone companys frame relay network.frame relay means a type of packet. FTP (file transfer protocol): the piece of the TCP/IP protocol suite that enable user to copy files between computers. GATEWAY: A system that essentially bridge two system it purposes is for communication. GATEWAY protocol : Member of the TCP/IP protocol suite that routes uses to determine the best route for data packerts. GUI(graphical user interface) a shell on a computers operating system that graphically represented data.
15

HACKER: a much misused term a hacker does not break into computer system (a cracker does that), instead ,a hacker is a skilled programmer and problem solver. Header : The parts of a packet that carries information about the source and destination of the packet, the checksum and otherabout the packet. Hard drive : a removable magnetic media drive that stores data on a computer. Html : hypertext maark up language , a way of formatting plain text in a browser window , it uses tags or inline formatting commands to define how things look. i/o or throughput : a loose measure of the speed at which a particular pieces of hardware can move data. Imap: Internet mail acess protocol or instant messaging access point , a new piece of TCP/IP protocol suite that handles the transmission of mail between server and client. Dns domain name server , the pieces of the TCP/IP protocol suite that resolve ip address to name address. NAT network address translation , it conver private IP address to internet routable address. PAT port address translation it convert multiple to single global address . Domains a group of xcomputer whose login acess the network is authenticated through NT server 2000 server. Email Electronic nmails , a way of sending text and files across a network with postal mail like notification. Encryption key , a server of letters and numbers used to make plain text message into cipher texts an encryption keys security depends on how long it is . Error correction the process of ensuring that data transferred across wire is done so correctly Ethernet a local area network (LAN) topology based on a method called carrier sense multiple access collision detection ,Ethernet comes in many variety , the
16

specification is available in IEEE 802.3, other version of Ethernet include 802.2 SNMP e.t.c. Fault or tolerance redundancy : the capability of a computer system to shrong off failure of a device and continue operating normally. FDDI : fiber distance data interface , a method of transmitting data across a network using laser or pulses of light sent over a glass fiber cable rather than sending electricity over a copper wire. Firewall : A computer that control access to an internet 10 base 2; Ethernet networking running on coaxial cable, also called thinnet or cheaper net it support network segment up to 185 meters in length. 10 base 5; also called yellow-card Ethernet, is similar to 10 base 2 but uses a thicker cable. 10 BASE T; Ethernet in a star topology, uses un unshielded twisted pair wiring with 8 connectors terminated according to specification standard called TIAA 568B. ADAPTER CARD; is an electronic assembly that connect to a computer through a standard interface called a card slot. ADMINISTRATION; An impossible task involves figuring out how to keep a network running without problem all the time. ARPA Advanced Research Project Agency, the government group responsible for starting the internet . ASCII America standard code for information interchange, away that computers format 1s & 0s into the alphabet, numerals and other character that humans can understand. ATM Asynchronous Transfer Mode : a new topology for transmitting data across a network .its complex but has many advantages compare to older topologies such as Ethernet and token ring. BRIDGE : a device that links different networks together so that they form a single logical network. BROWSER : a program that provides a way to view and read the documents available on the world wide web e.g internet explorer, Mozilla, Firefox uses browser.
17

SNMP Simple Network management Protocol :the TCP/IP protocol suite that deals with the transmission of network information for system administration for system administration and management. SUBNET : A way of dividing TCP/IP network into smaller pieces for management or security purposes , subnet are bridge by router. SUBNET MASK : the portion of an IP Address that defines the network as opposed to identifying a particular e.g a computer with an IP address of 192.168.1.5 might have a subnet mask of 255.255.255.0 TI : a digital phone line that can carry data at a speed up to 1.544 mega bit per seconds. TCP/IP Transmission Control Protocol /Internet Protocol: Latch all terms to describe the multi faceted protocol suite on which the internet runs. UDP User Data Protocol : port of TCP/IP protocol suite that handles unreliable delivery of packet. TUNNELING PROTOCOL : the protocol that ensure that data passing over a companys virtual private network is secured. TOPOLOGY : is an arrangement of network . THINNET : see 10 base 2 Ethernet. WORLD WIDE WEB (WWW) the resource that can be accessed on the internet using HTTP, often published in HTML. WINDOWS NT; Microsofts enterprise operating system. WINDOWS 98; Microsofts client operating system WAN; Wide Area Network composed of two more LANS connected by phone (generally digital phone lines).. Virtual Local Area Network (VLAN); A network that appear to be a small LAN to its users but which is actually a logical construct. VIRTUAL PRIVATE NETWORK(VPN); a network establish over a carrier digital phones lines (such as AT & T or sprint unit) and dedicated solely to connecting several specific clients sites.
18

19

CHAPTER TWO 2.0 Network


A system used to link two or more computers. Network users are able to share files, printers, and other resources; send electronic messages; and run programs on other computers.

2.1 Network Has Three Layers Of Components:


1] Application software 2] Network software 3] Network hardware Application software consists of computer programs that interface with network users and permit the sharing of information, such as files, graphics, and video, and resources, such as printers and disks. One type of application software is called client-server. Client computers send requests for information or requests to use resources to other computers, called servers that control data and applications. Another type of application software is called peer-topeer. In a peer-to-peer network, computers send messages and requests directly to one another without a server intermediary. Network software consists of computer programs that establish protocols, or rules, for computers to talk to one another. These protocols are carried out by sending and receiving formatted instructions of data called packets. Protocols make logical connections between network applications, direct the movement of packets through the physical network, and minimize the possibility of collisions between packets sent at the same time. Network hardware is made up of the physical components that connect computers. Two important components are the transmission media that carry the computer's signals, typically on wires or fiber-optic cables, and the network adapter, which accesses the physical media that link computers, receives packets from network software, and transmits instructions and requests to other computers. Transmitted information is in the form of binary digits, or bits (1s and 0s), which the computer's electronic circuitry can process. A network has two types of connections: physical connections that let computers directly transmit and receive signals and logical, or virtual, connections that allow computer applications, such as e-mail programs and the browsers used to explore the World Wide Web, to exchange information.
20

Physical connections are defined by the medium used to carry the signal, the geometric arrangement of the computers (topology), and the method used to share information. Logical connections are created by network protocols and allow data sharing between applications on different types of computers, such as an Apple Macintosh or a personal computer (PC) running the Microsoft Corporation Windows operating system, in a network. Some logical connections use client-server application software and are primarily for file and printer sharing. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite, originally developed by the United States Department of Defense, is the set of logical connections used by the Internet, the worldwide consortium of computer networks. TCP/IP, based on peer-to-peer application software, creates a connection between any two computers.

Medium used to transmit information limits the speed of the network, the effective distance between computers, and the network topology. Copper wires and coaxial cable provide transmission speeds of a few thousand bits per second for long distances and about 100 million bits per second for short distances. (A million bits is equal to one megabit, and one megabit per second is abbreviated Mbps.) Optical fibers carry 100 million to 40 billion bits of information per second over long distances. (A billion bits is equal to one gigabit, and a billion bits per second is abbreviated Gbps.) Wireless networks, often used to connect mobile, or laptop, computers, send information using infrared or radio-frequency transmitters. Infrared wireless local area networks (LANs) work only within a room, while wireless LANs based on radio-frequency transmissions can penetrate most walls. Wireless LANs using Wi-Fi technology have capacities of around 54 Mbps and operate at distances up to a few hundred meters. Wireless communications for wide area networks (WANs) use cellular radio telephone networks, satellite transmissions, or dedicated equipment to provide regional or global coverage. Although transmission speeds continue to improve, todays wide area cellular networks run at speeds ranging from 14 to 230 kilobits per second. (A kilobit is equal to 1,000 bits, and one kilobit per second is abbreviated Kbps.) Some networks use a homes existing telephone and power lines to connect multiple machines. HomePNA networks, which use phone lines, can transmit data as fast as 128 Mbps, and similar speeds are available on Power Line or Home Plug networks. Common topologies used to arrange computers in a network are point-topoint, bus, star, ring, and mesh. Point-to-point topology is the simplest, consisting of two connected computers. The bus topology is composed of a single link connected to many computers. All computers on this common connection receive all signals transmitted by any attached computer. The star
21

topology connects many computers to a common hub computer. This hub can be passive, repeating any input to all computers similar to the bus topology, or it can be active, selectively switching inputs to specific destination computers. The ring topology uses multiple links to form a circle of computers. Each link carries information in one direction. Information moves around the ring in sequence from its source to its destination. On a mesh network, topology can actually change on the fly. No central device oversees a mesh network, and no set route is used to pass data back and forth between computers. Instead, each computer includes everything it needs to serve as a relay point for sending information to any other computer on the network. Thus, if any one computer is damaged or temporarily unavailable, information is dynamically rerouted to other computersa process known as self-healing.

2.3 Network Design Steps


Here are the typical steps employed during the design process for a new wireless LAN network: Define a user role for each different class of user Choose the encryption and authentication methods for each class of user Choose the number and type of SSIDs required Determine a baseline average for user performance Determine the number of APs required Determine if a dedicated master is optimal Choose if redundancy will be used Determine the type and number of controllers needed Choose the appropriate AP connection and bootstrap model Determine special guest network requirements Determine voice network specifications

2.4 Computer Architecture.


LANs commonly use bus, star, or ring topologies. WAN, which connect distant equipment across the country or internationally, often use special leased telephone lines as point-to-point links. When computers share physical connections to transmit information packets, a set of Media Access Control (MAC) protocols are used to allow information to flow smoothly through the network. An efficient MAC protocol ensures that the transmission medium is not idle if computers have information to transmit. It also prevents collisions due to simultaneous transmission that would waste media capacity. MAC protocols also allow different computers fair access to the medium.
22

One type of MAC is Ethernet, which is used by bus or star network topologies. An Ethernet-linked computer first checks if the shared medium is in use. If not, the computer transmits. Since two computers can both sense an idle medium and send packets at the same time, transmitting computers continue to monitor the shared connection and stop transmitting information if a collision occurs. When used on local area networks, Ethernet typically transmits information at a rate of either 10 or 100 Mbps, but newer wide-area technologies are capable of speeds as high as 10 gigabits per second (Gbps). Computers also can use Token Ring MAC protocols, which pass a special message called a token through the network. This token gives the computer permission to send a packet of information through the network. If a computer receives the token, it sends a packet, or, if it has no packet to send, it passes the token to the next computer. Since there is only one token in the network, only one computer can transmit information at a time? Token Ring networks are now quite rare. Most LANs now use Ethernet technology. International Business Machines Corporation (IBM), the company that invented Token Ring in the early 1980s, no longer promotes the technology. In the mid-1990s a new protocol called Asynchronous Transfer Mode (ATM) was introduced. This protocol encodes data in fixed-sized packets called cells rather than variable-sized packets used on an Ethernet network. It was designed as a way of merging old, circuit-switched telephone networks with more modern packet-switched computer networks in order to deliver data, voice, and video over the same channel. This can now be done with other protocols as well. Capable of speeds of nearly 10 Gbps, ATM is often used in wide area networks, but never really caught on with LANs.

2.5 Network Operation and Management


Network management and system administration are critical for a complex system of interconnected computers and resources to remain operating. A network manager is the person or team of people responsible for configuring the network so that it runs efficiently. For example, the network manager might need to connect computers that communicate frequently to reduce interference with other computers. The system administrator is the person or team of people responsible for configuring the computer and its software to use the network. For example, the system administrator may install network software and configure a server's file system so client computers can access shared files. Networks are subject to hacking, or illegal access, so shared files and resources must be protected. A network intruder could eavesdrop on packets being sent across a network or send fictitious messages. For sensitive information, data encryption (scrambling data using mathematical equations) renders captured packets unreadable to an intruder. Most servers also use
23

authentication schemes to ensure that a request to read or write files or to use resources is from a legitimate client and not from an intruder. See Computer Security.

2.6 Wireless intrusion prevention system


In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention).

2.6.1

Purpose

The primary purpose of a WIPS is to prevent unauthorized network access to local area networks and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce nowireless policies within an organization. Some advanced wireless infrastructure has integrated WIPS capabilities. Large organizations with many employees are particularly vulnerable to security breaches[1] caused by rogue access points. If an employee (trusted entity) in a location brings in an easily available wireless router, the entire network can be exposed to anyone within range of the signals. In July 2009, the PCI Security Standards Council published wireless guidelines for PCI DSS recommending the use of WIPS to automate wireless scanning for large organizations.

2.6.2

Intrusion Detection

A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices. Rogue devices can spoof MAC address of an authorized network device as their own. New research uses fingerprinting approach to weed out devices with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against the known signatures of pre-authorized, known wireless devices.[3]

2.6.3

Intrusion Prevention
24

In addition to intrusion detection, a WIPS also includes features that prevent against the threat automatically. For automatic prevention, it is required that the WIPS is able to accurately detect and automatically classify a threat. The following types of threats can be prevented by a good WIPS:

Rogue AP WIPS should understand the difference between Rogue AP and External (neighbors) AP Mis-configured AP Client Mis-association Unauthorized association Man in the Middle Attack Ad-hoc Networks Mac-Spoofing Honey pot / Evil Twin Attack Denial of Service (DoS) Attack

Wips Configurations Consist Of Three Components:

Sensors These devices contain antennas and radios that scan the wireless spectrum for packets and are installed throughout areas to be protected Server The WIPS server centrally analyzes packets captured by sensors Console The console provides the primary user interface into the system for administration and reporting

A simple intrusion detection system can be a single computer, connected to a wireless signal processing device, and antennas placed throughout the facility. For huge organizations, a Multi Network Controller provides central control of multiple WIPS servers, while for SOHO or SMB customers; all the functionality of WIPS is available in single box. In a WIPS implementation, users first define the operating wireless policies in the WIPS. The WIPS sensors then analyze the traffic in the air and send this information to WIPS server. The WIPS server correlates the information validates it against the defined policies and classifies if it is a threat. The administrator of the WIPS is then notified of the threat, or, if a policy has been set accordingly, the WIPS takes automatic protection measures. WIPS is configured as either a network implementation or a hosted implementation.

2.7 Network Implementation


25

In a network WIPS implementation, Server, Sensors and the Console are all placed inside a private network and are not accessible from the internet. Sensors communicate with the Server over a private network using a private port. Since the Server resides on the private network, users can access the Console only from within the private network. A network implementation is suitable for organizations where all locations are within the private network.

2.7.1

Hosted Implementation

In a hosted WIPS implementation, Sensors are installed inside a private network. However, the Server is hosted in secure data center and is accessible on the internet. Users can access the WIPS Console from anywhere on the internet. A hosted WIPS implementation is as secure as a network implementation because the data flow is encrypted between Sensors and Server, as well as between Server and Console. A hosted WIPS implementation requires very little configuration because the Sensors are programmed to automatically look for the Server on the internet over a secure SSL connection. For a large organization with locations that are not a part of a private network, a hosted WIPS implementation simplifies deployment significantly because Sensors connect to the Server over the internet without requiring any special configuration. Additionally, the Console can be accessed securely from anywhere on the internet. Hosted WIPS implementations are often offered in an on-demand, subscription-based Software as a Service model. Hosted implementations are particularly cost-effective for organizations looking to fulfill only the minimum scanning requirements of PCI DSS.

2.7.2

Notable implementations

icrew Security - Air Minder [1] Air Minder is a SAAS-based solution for 11.1 wireless scanning requirements. Wireless (and wired) analyzer data from a variety of sources is directed to the web service for analysis, correlation and PCI reporting. No hardware required! Air Defense [2] is a vendor agnostic WIPS, compliance, network assurance and wireless infrastructure management solutions. Airtight [3] is a vendor of both the network implementation and the hosted implementation of the WIPS solution. Nexus Hornet [4] is a vendor of the original Cole Innovations WIDS-X system marketed under the name Nexus Hornet.
26

27

CHAPTER THREE 2.0 THE DESIGN AND IMPLEMENTATION OF WLAN


Before the implementation of the project, there was an existing peer-peer Ethernet network (i.e. IEEE 802.3 Ethernet LAN) in the department; however these two networks were independently separated (i.e. not linked). But our aims and objectives were to bring about the linking up of this network together as one networked for the department. In other to implement spaciousity which is the ability for user to move within a certain area depending on connectivity coverage, and still maintain network connectivity coverage, there were installation of two Nano-stations at the department, one of the Nano-station installed is configured as a bridge, to extend signals from cisco department to computer and elect/elect department, from this point a crossover cable is use to connect the first Nano-station and the switch in the server room then the switch then share network every host in the department, the second Nano-station is configured as an Access point, which serves as the wireless device for the local area network in the department.

3.1 DESIGN TOPOLOGY


Design Topology is an important part in any project implementation and it plays a vital role since it entails the logical design that will determine the workability of the project. This involves the consideration of the network devices that will be used and also involves the upgrading of two networks.

LOGICAL TOPOLOGY
A logical topology map group host by how they use the network, no, matter where they are physically located, host names, address , group information and application can be recorded on the logical topology maps. Logical topology is basically on how IP address are being assigned to the workstation or p. c , this IP address contains two parts with the first network portion determining the network portion, and the second host portion, the network portion determine the network and the subnet in the which a host is
28

connected to in a network, while the host portion determines the useable host address that are assigned to the pcs

PHYSICAL ADDRESSS
Physical topology is created to record were each host is located and it is connected to the network, the physical topology maps also show were the wiring is installed and location of networking device that connect the host. Physical topology shows the cable connection and how hubs, switch, bridge, routers etc. are connected in the network. Physical topology is sub divided into STAR, BUS, RING, EXTENDED STAR, MESH, etc.

STAR TOPOLOGY
It consists of multiple workstations connected to the hub (that is why this topology is called the hub topology).in the most common scenario each computer has a network adapter with an Rj-45 connector running a twisted pair cable to a port in the hub. The hub usually passes along the signals, so each computer gain access to the other computer on the network. This is excellent topology for a pair to pair network, it also easy to add machine to the network because it a simple matter of running a new cable to the hub. and if the hubs port are used up, you can connect a second hub to the first one, another advantage is that if one machine goes for the count, the network access to the other is not affected on down side, star topology tends to need a lot of cable because you have to connect every node directly to the hub.

THE BUS TOPOLOGY


In this project bus topology is employed because in bus topology each node is attach to a single main cable called a bus or a back bone for a large network, the back bone often extend through out an entire building an it is hidden behind the walls. For such lengthy cables, repeater are often needed to boost signals along various point of connection to the backbones are made via drop cables that are ran from network card to the wall plates or some other junction bus. For small network the back bone usually consist of connect series of coaxial cable. The big advantage of bus topology is its relatively easy to set up and it layout often mirrors a physical layout of an office or a building .the
29

major drawn back with bus topologies, is that the break in the back bone brings down the entire network.

DEPARTMENTAL NETWORK DESIGN MEDIA


In the department of electrical and electronics cum computer engineering of Gateway polytechnic Igbesa ,two transmission media will be adopted, the transmission media will cut across the wired Ethernet local Area Network . In the wired LAN , the transmission medium is through the 10 Base T category 5 unshielded twisted pair cable ,in which if maximum data rate is 10 megabits per second (mbps) with a maximum segment length of 100meters (or 330 feet using carrier sense multiple access collision detection(CSMA/CD) signaling techniques. While for the wireless LAN, the transmission medium is the radio air waves (also known as radio frequency) in which the medium is the air waves without any physical medium and it will have a data rate speed of 11mbps.

30

k Trun

Cross over patch cable

Comp uter Engr.

Secretary of HOD

D Lin ata k S itch w


E therne Sw ch24Port t it

E A ngr. dekus ibe

Secretary of HOD

Eng r. Osas

Elect/ Elect

Engr. Onadeko

Engr. Ayodeji

Engr. The ophilus

En gr. Oluleye

Engr. Oladunjoye

En gr. Dar e

3.2 NETWORK COMPONENTS


The network components for this project will be stated according to the particular network it falls under or belongs to. The following are component used, Network Interface Card (NIC), 4 port of switch, cable, connectors, 8DBI Nano station, Access point, PCMCIA card.
31

W le sCv ra e ire s oe g

t S o n a N i

N S o n a i t

3.3 NETWORK INTERFACE CARD


The network interface card (NIC) is a hardware device that interfaces each computer system (either client or server) with the network. It is known as the network adapter and is also a layer two device in the OSI layer. In the course of this project some systems in the department will be installed with this card to enable them join the network.

3.4 DATA -LINK SWITCH


A switch is a multiport repeater that receives incoming signals; it supports both half-duplex or full-duplex mode. When a port is in half-duplex mode, at any convenient time, it can either send or receive data, but not both. The switch contains 24 ports which will receive signal from the Nano station in front of the department.

3.5 8DBI NANO STATION


The 8DBI Nano station is a hardware device that receives and also transfer signals. In view of this project two 8DBI Nano station is used one served as access point which transmits wireless signals from the Cisco department and the other serves as a station which send signal to the switch as to provide access for the cable network.

32

3.6 CABLE AND CONNECTORS


The cable employed in this project as the transmission medium is the 10 Base T unshielded twisted pair category, 5 cable of the high bandwidth, it supports a reasonable length of transmission. In networking, there are two basic types of cable, which are the straight through cable and the cross over cables, they can be differentiated by their colour code specification. Straight through cable colour code specification is more or less elementary when compared with the crossover counterpart. The colour code arrangement is given below;

STRAIGHT THROUGH CABLE

UTP cable 1 2 3 4 5 White-Orange Orange White- Green White-Blue Blue

End 1 White-Orange Orange White- Green White- Green Blue


33

End 2

6 7 8

Green White- Brown Brown

Green White- Brown Brown

CROSS OVER CABLE UTP cable 1 2 3 4 5 6 7 8 White-Orange Orange White- Green Green White- Blue Blue White- Brown Brown End 1 White- Green Blue White- Orange Green White- Blue Orange White- Brown Brown End 2

The straight through cable is done by arranging the colour with specification given above without interchanging any of the colours when connecting the RJ45 so that both ends of the colour code remains the same and it goes into the RJ45 connector in accordance to the pins in the connector. The straight through cable is also used in connecting access point to the switch and the switch to the system. The crossover cable is prepared by interchanging the other end of the cable colour arrangement according to the specification given above. It is used to connect system to system, switch to switch, and hub to hub. Here is the procedure for attaching cat-5 cable to an RJ45 connector;
34

Cut the end of the cable to the desired length; make sure that you make a square cut not a diagonal cut. Insert the cable into the stripper portion of the crimping tool. Arrange the wires so that they lay flat and lineup. Slide the wires into the pin holes on the connector, double check to make sure all the wires slipped into the correct pin holes. Insert the plug and wire into the crimping portion of the tool and then squeeze the handles to crimp the plug, squeeze it tight. Remove the plug from the tool and double check the connection.

CONNECTORS
There are various types of connectors; they are BNC or RJ series such as RJ11/ RJ12 and RJ45. The RJ45 is most important to us because this is the type of connector that is used to connect the patch cables, this cables is also used to link devices like AP, NIC and systems together.

35

3.7 ACCESS POINT


This is also called AP, wireless access point or base station is a hardware device that acts as an 802.11 shared communication hub for an interconnecting 802.11 stations with each other and a wired LAN. The two 8DBI nanostation, one serves as the access point which is configured to gain access from the Cisco network. An access point can be defined as a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards.

3.8 WIRELESS LAN PCMCIA CARD


This card interfaces the Laptops with the wireless network. It has an in built antenna and it operates at the CSMACA protocol. In the course of this project, we will implement the use of WL24P wireless LAN PCMCIA card, this card has IEEE 802.11 LAN technology embedded to enable notebook, PC to provide the wireless connection with other wireless LAN without any physical wiring. The WL 24P wireless LAN PCMCIA card is a fast implementation solution for mobile users to work perfectly in any environment without the hassle of wiring.

3.9 SERVER
A server is a computer program that provides services to other computer programs and their users in the same or other computers. A
36

server can also be defined as a program that awaits and fulfills requests from client programs in the same or other computers. In the course of this project, our server operating system is the Microsoft windows 2000 server also at this level the server will serve as a DHCP (Dynamic Host Configuration Protocol) server i.e. it will assign IP (Internet Protocol) address to host (DHCP clients) automatically. It will also serve as a DNS (Domain Name System) server i.e. it can resolve names of host to IP address. However, for a standard server in the department we recommend a Compaq server pentium 370Ghz with the following configuring Pentium IV 3.066HZ 512MB RAM, DUAL Processor and 146GBSCSI.

3.10 CLIENTS OR WORKSTATION


This is a personal computer for workstation that depends on the server resources such as printing, files applications. A client must be authenticated by the server before it can allow to log into the network domain, the client must have a network interface card (NIC) installed to interface it with the network operating system (NOS) and configuration of the high IP address, the individual workstation will be able to join the network with ease.

3.11 NETWORK OPERATING SYSTEM (NOS)


These are operating system designed and built for networking of computer workstations with a high level of security. Examples of NOS used for the implementation of this project are window 2000 professional, window XP professional and window 2000 server

37

CHAPTER FOUR

4.0

INTRODUCTION

After the work has been implemented that is nano station was mounted, switch was configured, cables were ran and other necessary things were done, DHCP that was configured in the switch was enabled, this will help or aid the issuing of IP address, subnet mask, default gateway automatically to the hosts thereby limiting error prone task due to technical configuration. It should be noted that the project covers both wired and wireless network.

4.1 DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)


For a computer to send and receive information on the network there are three part of the IP configuration which must be configured and they are; IP address- identifies the computer on the network. Subnet mask- used to identify the network on which the computer is connected. Default gateway- identifies the device that the computer uses to access the internet or another network.

Therefore after this host or workstations have been properly designed and implemented there must be a protocol which will assign these IP configuration to the hosts, this protocol will refer to as Dynamic host configuration protocol (DHCP). DHCP can be static or dynamic configured static DHCP. In this scenario the network administrator manually configure the network information for the host i.e. assuming IP configuration manually. Static address are useful for printers, servers and other networking devices that need to be accessible to clients on the network, there is control of network resources but it is time consuming to enter the information on each host, when entering this IP address statically there can be error and also there is always administration intervention and cannot be suitable for complex topology.

38

4.2 DYNAMIC DHCP


For the sake of this project, Dynamic DHCP is configured in the switch since it is easier to have IP address assigned automatically. That protocol which provides a mechanism for the automatic assignment of addressing information such as IP address, subnet mask, default gateway and other configuration information is Dynamic DHCP. This type is used in a large network environment, it reduces burden on network support staff and virtually eliminates entry errors. Another benefits of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time if the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially helpful with mobile users that come and go on a network.

4.3 CONFIGURING DHCP AND MODE OF WORKING


The DHCP server is configured with a range or pool of IP address that can be assigned to DHCP clients. A client that needs an IP address will send a DHCP discover message which is a broadcast with a destination IP address of 255.255.255.255 (32 ones) and a destination MAC address of FF-FF-FF-FF-FFFF- (48 ones). All hosts on the network will receive this broadcast DHCP Frame, but only a DHCP server will reply. The server will respond with a DHCP offer, suggesting an IP address for the client. The host then sends a DHCP request to that server asking to use the suggested IP address. The server responds with a DHCP acknowledgement for most home and small business networks.

4.4 TESTING NETWORK FUNCTIONALITY


After the design and implementation of WLAN, there was a need to test network functionality, individual LAN lines were tested by using the LAN tester. This LAN tester allows us to test each line for continuity. Also individual workstation was tested for proper functionality by pinging (Packet internet golfer) these workstations together and this was done using the start and run setup on the computer system.
39

With the completion of the installation signals as searched from the client station for wireless connection and there was connectivity with a very strong signal strength and link quality. An IP address was assigned to the access point by default due to the DHCP in the access point device. The wireless client station was able to navigate the network and the signal strength and link quality were checked at intervals as the client laptop moved away from the access point location. To test the wireless network, network was browsed in the laboratory from the wireless client laptops and was able to see the entire domain and files were transferred from system, the first system to the laptop.

COMPUTER NAME 1 2 3 4 5 6 7 8 9 10 Server Engr. Adekusibe Secretary Elect/Elect Secretary Comp Eng Engr. Onadeko Engr. Ayodeji Engr. Oladunjoye Engr. Dare Engr. Oluleye Engr. Theophilus

DOMAIN NAME Test domain Test domain Test domain Test domain Test domain Test domain Test domain Test domain Test domain Test domain

IP ADDRESS Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address Dynamic address IP IP IP IP IP IP IP IP IP IP

40

After the entire Ethernet network has been installed and all the system is now actively connected in the domain network, we implemented the wireless local area network as extension of the wired LAN which will support roaming (i.e. flexibility) within the department. The first nano station configured as bridge was mounted and a cable from it was ran to the access point, the transmission of signals were aid by a straight through cable, that means two nano station was mounted, one provide signals for LAN and the other has

4.5 TOOLS USED


These are network tools used for assigning and implementing wired LAN and wireless local area network, they are given below; Crimping tool LAN Tester Network and computer tools Clips Hammer Software Screwdriver

4.6 SECURITY
The implementation of a basic security system on the network in the department is essential due to the fact that the network is an academic network and due to its sensitivity. To ensure a proper organization and delegation of control in the network, some security measures were put in place. Administrators account was created in the domain which has the highest level of control over the network. Other users accounts were created which will be monitored by the administrators i.e. logs into the domain with an administrator account. The Administrator and users account properties are shown below;
41

Account Name 1 (b) 2 (b) (c) Administration account Administrator Users account Lecturer Student

Password xxxxxxxxx

xxxxxxxxx xxxxxxxxx

The wireless LAN used in the implementation of this project uses a security protocol known as Wi-Fi Protected Access (WPA), this was embedded in the access point device.

4.7

LIMITING ACCESS TO A WIRELESS LAN

Ways to limit access to your wireless network is to control exactly which devices can gain access to your network. This can be accomplished through filtering of the MAC (media access control) address.

4.7.1

MAC ADDRESS FILTERING

The MAC address is a unique value associated with a network adapter. MAC address are also known as HARDWARE ADDRESS or PHYSICAL ADDRESS .they uniquely identify an adapter on a LAN and are represented in 12 digit hexadecimal e.g MM:MM:MM:SS:SS:SS. or MM.MM.MM.SS.SS.SS. This access to WLAN can be limited by filtering MAC address , if MAC filtering is enabled only devices whose MAC address have been pre-recorded will be allowed to connected.

4.7.2

AUTHENTICATION ON A WIRELESS LAN

This is another way to control who can connect, it only permit entry to a network base on a set of credentials. It is used to verify that the device attempting to connect to the network is trusted. There are three types of wireless authentication method these are; OPEN AUTHENTICATION, PRESHAREDE KEYS (PSK), EXTENSIBLE AUTHENTICATION PROTOCOL.
42

Authentication and MAC filtering may stop an attacker from connecting to a wireless network but it will not prevent them from being able to intercept transmitted data, Hence the deployment of Wi-Fi protected access (WPA) which uses encryption keys from 64 bit up to 256 bits, WPA unlike WEP, generate new dynamic keys each time a client establish a connection with the AP, WPA is more secured than WEP because it is cumbersome to crack. Therefore the two advanced security protocol are WEP and WPA, But WPA was used for the project.

4.8 SECURING THE ACCESS POINTS (AP)


There is every necessity that this AP must be secured some of the more basic security measure includes: Change default value for the SSID user name and password. Disable broadcast SSID and configuring MAC address, as well filtering protocol.

Some of the more advanced security measures include configuring encryption using WEP or WPA configuring authentication and configuration of traffic filtering.

4.9 FIREWALL
In addition to protecting individual computer and server attached to the network, it is important to control traffic travelling to and from the network. A firewall is one of the most effective security tools that can be software program or dedicated network appliances for protecting internal network users from external threats; it resides between two or more networks and control the traffic between them as well as help prevent unauthorized access.

43

CHAPTER FIVE 5.0 CONCLUSION

History has been made in the department of Electrical and Electronics and Computer Engineering Gateway Polytechnic Igbesa. It is now made known to everybody that it is possible to implement a wireless local area network in a time like this where digital library is of upmost desire of the department. Wireless technology is no doubt the best option in any networking environment when it has to do with the department, because when the department is separated the wireless equipment can be taken to desire position neglecting the use of cables during installation, and also the avoidance of digging the ground in order to lay cables. This cable free technology has a lot of advantages as will be stated later in this chapter. The implementation of this project created a lot of possible answers to the fact that people can actually connect to the network in the department without any need for cabling, in addition, the facility is of immense benefit because it will not only aid the coming up digital library but also as an open door to everyone in the department and for the extension of the network poly Igbesa Some advantages offered by this project are: There is always room for mobility in which the client can move from one place to another and still maintain network connectivity. It brings about flexibility of network in which the network can be moved from a particular location to another especially when there is relocation of the present office where we have the wireless client station. There is also a very large room for scalability of the network, this means that the network can be expanded with more PCMCIA card in the department and lectures will join at ease. The rate at which the wireless network transmits data is faster than that of the Ethernet LAN because it transmits more than 100mbps while that of the wired installed transmit at 100mbps. It has Wi-Fi Protected Access (WPA) which is a security protocol to prevent unauthorized Access. Lecturers, non-academic staffs will be able to access and
44

print files, documents, even use floppies on CD-ROM drives from other desktops on the network right in their offices. In the Implementation and Installation of this project, we have used some of the best products, in the market putting into consideration the position and geographical location of the department. The device was carefully installed for the smooth utilization by staffs in the department. The project stands as precedence to future plans in extending the coverage area of the network from the present 50m to 80m indoor installation or 150m to 300m for outdoor Installation to a specified range depending on the financial capability of the Engineering and Technology and the institution as a whole. The bill of quantity for installation of this project was a personal increment of the entire student involved in this project work due to individual contribution we were able to purchase network devices and some of the computer and networking tools used in carrying out the successful completion of this work. As at the time of filing the report the total sum of money spent was #129,635, leaving other yet to be spent, this is properly elucidated in the appendix.

5.1

RECOMMENDATION

It should be noted that the department, are only having extinction of the signal from CISCO department, the network services for the department depends majorly on the CISCO department. To have a separate network a router is highly recommended, on antenna mask and an external antenna of 80-100dBi is also recommended to extend the range and coverage area and to bring about very effective wireless and cable transmission. Since digital library is needed now in the department, when this equipment are gotten then the existing network will just be connected to the external antenna. There should be proper maintenance of this network equipment as to ensure effective functioning durability of the service to the department. Internet is no doubt the best means of information resources that has ever happened on the face of this earth, when the department comes up with this digital library then the existing network will serve as a back-bone to ensure that all networked computers are connected immediately there is an internet facility. The renege of this technology will enhance a rapid rate of information and communication technology, of leaning and VOIP (voice over internet protocol).
45

46

REFERENCE
Math Haden, Teach yourself networking in 24hours published by Macmillan computer publishing, (201 w 103rd streets, Indianapolis in 46290). http://www.tecom.com http://www.google.com http://www.cisco.com http://www.ieee802.org/11/ http://www.mcp.com http://www.ask.com Olusanya Olabanji John, Networking for Home and small business(CCNA Discovery 4.0). Akinyemi .S. Olalekan, Essentials of wireless Networking and Wireless Network Fundamental(2008,Edition). IEEE standard 802.11(1990), IEEE standard for local and metropolitan Area Network overview and Architecture (IBSN 1.55937.0824). IEEE standard 802.11(1990), part 11: Wireless LAN media Access Control (MAC) and physical layer specification (2.4GHz). Osloorne M.C.S.E, windows 2000 Accelerated study guide with I.S.B.N 0.07 21500.4 published by MC Graw Nill (2001, Edit)

47

APPENDIX
BILL OF MATERIARS USED S/ N 1 2 3 4 5 6 7 Materials used UTP Cable Cat-5e Wall Plate Crimping tools Trucking RJ 45 connectors Punch- down tools Nails QTY 1roll 17 1 1 bundle Prices (N) 9,200 3,480 1,300 1,700

100 pcs 1,000 1 850

5 packs 150

D-Link Switch

1(16por 8,500 t) 750 1 pack

Cable binder

10

Tonado nail

200

11

RJ-45 and Trunk

50&1bi g 1

2,000

12

Switch rack

1,800

13

Nano station 1
48

14,000

14 15 16 17 18

Nano station 2 Initial photocopy and tags Higher education and record books Envelopes Transportation

1 All 1 3 All

14,000 1,000 130 100 3,600

19

MISCELLANEOUS BILLS

All

67,875

TOTAL

131,635

49

50

51

Das könnte Ihnen auch gefallen