You are on page 1of 38

WIRELESS COMMUNICATION LAB

Paper Code: ETEC-463 L T/P C

Paper: Wireless Communication Lab 0 2 1

List of Experiments:

1. Eight experiments suggested on kits for GSM, CDMA and any possible experiments
covering the subjects.

2. Setting up wireless network with and without infrastructure support.

3. Configuring Access Point with bridging mode (Point to Point and Point to Multi Point).

4. Configuring Routing between wired and wireless Networks.

5. Configuring Security in wireless network with and without infrastructure support.

NOTE: At least 8 Experiments from the syllabus must be done in the semester.


Aim-1: Introduction to Wireless LAN.
Aim-2: How to Build a Computer-to-Computer, P2P Network (Ad-Hoc Wi-Fi Network)
Aim-3: How to Build Infrastructure Mode in Wireless Networking.
Aim-4: Configuring Access Point with Point to Point.
Aim-5: Configuring Access Point with Point to Multi Point.
Aim-1 : Introduction to Wireless LAN.

Wireless LAN equipment consists of two main components:

1. Wireless clients, which are any devices capable of communicating over a wireless LAN,
such as a notebook computer, printer or handheld.
2. Access points, that is, the centers of the wireless-to-wired LAN connectivity. These
points aggregate wireless radio signals and then connect the two LANs. The access point
is generally book-sized. It contains a radio transceiver, communications and encryption
software, and an Ethernet port for a cable connection to a hub or a switch on the wired
LAN.

Build a wireless LAN,

802.11 Wireless Standards


IEEE Standard 802.11a 802.11b 802.11g 802.11n 802.11ac

Year Adopted 1999 1999 2003 2009 2014

Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4/5 GHz 5 GHz

Max. Data Rate 54 Mbps 11 Mbps 54 Mbps 600 Mbps 1 Gbps

Typical Range
100 ft. 100 ft. 125 ft. 225 ft. 90 ft.
Indoors*

Typical Range
400 ft. 450 ft. 450 ft. 825 ft. 1,000 ft.
Outdoors*
:
1. Identify the equipment you want to buy, such as wireless notebooks, access points,
wireless LAN adapters and wireless cards.
2. Determine the number of users who need to have access to the network.This will
help you determine the number of access points you'll need.
3. Plan for the connection to your wired LAN, probably in a central location and in an
open environment. Your goal is to maximize the access point's wireless range. The
quoted range is a maximum of 300 feet, but that's very dependant on the existing
environment--walls, water pipes, cables and so on all could decrease the range. The best
thing to do is complete a site survey first; if that's not possible, assume a maximum range
of 150 feet, as 300 could decrease throughput.
4. Configure your wireless devices to work with your network.
5. Test the installation before it goes live. Using link test software, you should test for the
percent of data sent correctly, the time it takes to receive a response from the destination
device, and the strength of the transmitted signal.
6. Establish a procedure to manage your wireless LAN.
Aim-2 : How to Build a Computer-to-Computer, P2P Network(Ad-Hoc Wi-Fi Network).
A Wi-Fi network in ad-hoc mode (also called computer-to-computer or peer mode) lets two or
more devices communicate with each other directly instead of through a central wireless router
or access point (which is what infrastructure mode is).
Setting up an ad-hoc network is useful if there isn't a wireless structure built, like if there aren't
any access points or routers within range. The devices don't need a central server for file shares,
printers, etc. Instead, they can access each other's resources directly through a simple point-to-
point wireless connection.

How to Set Up an Ad-Hoc Network

Requirements : The devices that are going to take part in the ad-hoc network have to have a
wireless network adapter installed. They also have to support a hosted network.

Testing : To see if your wireless adapter has hosted network support, look for it in Command
Prompt after running the netsh wlan show drivers command. You might need to open
Command Prompt as an administrator for that command to work.

Windows 10 and Windows 8

These versions of Windows make it a little tougher to make an ad-hoc network when you
compare the procedure to earlier Windows operating systems. If you want to set up the ad-hoc
network manually without using any other software but what Windows has available, follow
along with these steps:

1. Open Command Prompt and enter this command, replacing the italicized works with
your own network name and password for the wireless network:
1. netsh wlan set hostednetwork mode=allow ssid=network namekey=password
2. Start the hosted network:
1. netsh wlan start hostednetwork
3. In Control Panel, navigate to \Network and Internet\Network Connections\ and go into
the Sharing tab of the network connection's Properties (right-click to find Properties) to
check the box that says Allow other network users to connect through this computer's
Internet connection.
4. Select the ad-hoc network connection from the drop down menu and OKout of any open
prompts.

About setting up adhoc on Windows

After Windows 7, no OS from Windows allows to set up an adhoc network, even if proper
wireless drivers are installed. Windows 10 is not an exception!

But there are some tricks by which on can do adhoc network setting in Windows 10. Here is the
simplest and 100% working method. 

Note that this trick works properly on Windows 8 and Windows 8.1 also.

Setting up an adhoc network in Windows 10

Below is the step by step guide to set up an adhoc network in Windows 10 on a PC.

1. Open Command Prompt as an administration. In order to open it as an administrator,


right click on it and click "Run as Administrator".

2. Enter the following command in it.

"netsh wlan set hostednetwork mode=allow ssid=adhocnetwork key= mehdi1234"

In the above command, "mehdi1234" will act as the password for your adhoc network.
You can keep another one!

3. Press enter! 
4. The hosted network mode has been set to allow. Now, enter the following command
after the above.

"netsh wlan start hosted network"

5. Press enter.

6. The hosted network has started! Close command prompt.


Screenshot of Network Sharing Center before setting up adhoc network in Windows 10.

Screenshot of Network Sharing Center after setting up adhoc network in Windows 10.

You can also stop the network by entering the following command in command prompt
or keep it forever.

"netsh wlan stop hosted network"


Windows 7

1. Access the Network and Sharing Center section of Control Panel. Do this by opening


Control Panel and then selecting that option. Or, if you're in Category view, first
choose Network and Internet.
2. Choose the link called Setup a new connection or network.
3. Select the option called Set Up a Wireless Ad Hoc (Computer-to-Computer) Network.
4. In that Set Up an Ad Hoc Network window, enter the network name, security type and
security key (password) that the network should have.
5. Put a check in the box next to Save this network so that it will be available later as well.
6. Hit Next and close out of any unnecessary windows.

In an ad hoc mode WLAN (wireless local-area network), wireless devices can communicate


directly with each other. If you have a Windows 7 computer (or a Windows Vista computer,
which is very similar), you will use a process similar to the following to create and activate your
ad hoc WLAN network.
1. Click Start and choose Control Panel.
This opens the Control Panel window.
2. Select View Network Status and Tasks.
This opens the Network and Sharing Center window.
3. From the Network and Sharing Center window, select Set Up a New Connection or
Network.
The Set Up a Connection or Network dialog box appears.
4. From the Set Up a Connection or Network dialog box, choose Set Up a Wireless Ad Hoc
(Computer-to-Computer) Network and click Next; click Next again.
The Set Up an Ad Hoc Network dialog box appears.

5. In the Set Up an Ad Hoc Network dialog box, provide the following information:
o Add a network name for your wireless network.
o Indicate the security type as either WEP or No Authentication.
o If you chose WEP, provide the security key for the network and optionally select
the Hide Characters box.
o Select Save This Network to keep this network for longer than one session.
6. Click Next to continue.
The confirmation dialog is displayed, showing you the information that you need to provide to
other people who will want to connect to your ad hoc network.
7. Click Close.
After the connection is set up, it initially becomes active and remains so until you connect to
another network. If you did not choose to save the connection, it will be removed from your
wireless configuration at that time and you will need to repeat this process to reactivate an ad hoc
network connection.

Windows Vista
1. From the Windows Vista start menu, choose Connect To.
2. Click the link called Setup a connection or network.
3. From the Choose a connection option page, choose Set up a wireless ad-hoc (computer-
to-computer) network.
4. Click Next until you see the window for entering the network name, etc.
5. Fill in the spaces provided to choose the network details that the ad-hoc network should
have, like the authentication and password information.
6. Click Next and close out of any open windows once it says the network has been created.

Windows XP

1. Open Control Panel from the Start menu.


2. Navigate to Network and Internet Connections.
3. Choose Network Connections.
4. Right-click the wireless network connection and click Properties.
5. Choose the Wireless Networks tab.
6. Under the Preferred networks section, click Add.
7. From the Association tab, enter the name that the ad-hoc network should be identified by.
8. Choose This is a Computer-to-computer (ad hoc) network but uncheck the box next
to This key is provided for me automatically.
9. Choose an option in Network Authentication. Open can be used if you don't want to set a
password.
10. Choose a data encryption method in that area of the options.
11. Enter the Wi-Fi password for the ad-hoc network in the Network keysection. Type it
again when asked.
12. Click OK out of any open windows to save the changes.

macOS

1. Choose the Create Network... menu option from AirPort (usually accessible from the
main menu bar).
2. Select the Create a Computer-to-Computer Network option and follow the instructions
provided.
Aim-3 : How to Build Infrastructure Mode in Wireless Networking.

In computer networking, infrastructure mode is when a network joins devices together, either
through wired or wireless means, via an access point like a router. This centralization is what sets
infrastructure mode apart from the ad-hoc mode.

Setting up an infrastructure mode network requires at least one wireless access point (AP) and
that the AP and all the clients be configured to use the same network name (SSID).

The access point is cabled to the wired network to allow wireless clients access to resources like
the internet or printers. Additional APs can be joined to this network to increase the reach of the
infrastructure and support more wireless clients.

Home networks with wireless routers support infrastructure mode automatically since these types
of devices include a built-in AP.

Infrastructure vs Ad-hoc Mode

Compared to ad-hoc wireless networks, infrastructure offers the advantage of scale, centralized
security management, and improved reach. Wireless devices can connect to resources on a wired
LAN, which is common business settings, and more access points can be added to improve
congestion and broaden the reach of the network.

The disadvantage of infrastructure wireless networks is simply the additional cost to purchase
AP hardware. Ad-hoc networks connect to devices in a peer-to-peer manner, so all that's needed
is the device themselves; no access points or routers are necessary for two or more devices to
reach each other.

In short, infrastructure mode is typical for long-lasting, more permanent implementations of a


network. Homes, schools, and businesses do not usually spring for P2P connections used in ad-
hoc mode because they're just far too decentralized to make sense in those situations.

Ad-hoc networks are usually seen in short-lived moments where some devices need to share files
but they're too far from a network to make it work. Or, maybe a small operating room in a
hospital can configure an ad-hoc network for some of those wireless devices to communicate
with each other, but they're all disconnected from that network at the end of the day and the files
are inaccessible that way.

However, if you just need a few devices to communicate with one another, an ad-hoc network is
fine. Don't add too many though, because one limitation of ad-hoc networks is that at some point
the hardware just isn't fit for all of that traffic demand, which is when infrastructure mode is
necessary.

Many Wi-Fi devices can only work in infrastructure mode. This includes wireless printers, the
Google Chromecast, and some Android devices. In those circumstances, infrastructure mode has
to be set up for those devices to function; they must connect through an access point.
Link quick setup wizard is enough for an average user to setup his router but for advanced
options it is better learn how to configure this device manually. This tutorial explains how to
configure every models of D-Link wireless router manually for advanced features. Here we learn
how to enable Internet access, WiFi and WiFi security. First step of this guide is to make sure
you can go online with modem by connecting computer to the Ethernet port of the modem. If it
is fine, disconnect the modem and connect computer to one of the LAN ports of D-Link Wireless
Router using an Ethernet cable. Now power on the device.

Configure Broadband Access On D-Link Router

1. Access Setup Page:

i. Type 192.168.0.1 on Browser address bar and press enter.

ii. Enter user name admin and leave password field blank. Click on login to access setup
page.

2. Click on Manual Internet Connection Setup 

3. Select Internet Connection type:

Using the drop-down menu, you can select the Internet connection type you are using.
Configuration details for each of the Internet connection types is listed below.

1. Configure D-Link Router for Cable Internet Connection:

To setup your router with cable Internet, select the option Dynamic IP(DHCP).

If you are using cable Internet connection the most important step is to click on
the button Clone Your PC's MAC Address. To know the importance of this step,
click on the link below.
Why MAC Address Cloning is Required for Cable Internet Connection

If your cable ISP doesn't provide any details about Host Name, DNS Server etc
leave them blank or keep the default value. Do not forget to click on Save Settings
button.

2. Configure D-Link Router with DSL Connection (PPPoE):

With DSL broadband, you should select the option PPPoE(Username/Password)


from the drop-down menu. Enter the User name and password provided by ISP.

Keep the Address mode "Dynamic" if your ISP does not provide you any IP
address details. Normally for DSL connection you do not need to clone computer
MAC address unless asked by your ISP. Click on Save Settings after entering
details.

3. Configure D-Link Router with PPTP Connection:


Steps to setup your router with PPTP connection is similar to PPPoE connection.

4. Configure D-Link with Static IP:

Here you should enter the full IP address details provided by your ISP including
Subnet Mask, Default Gateway, DNS Servers etc. 

After entering details click on Save Settings.


4. Connect Modem to D-Link Router:

o Connect the Internet port of D-Link router to the LAN Port of modem

o Connect Computer to LAN port of Modem 

o Switch on Modem

. Power Cycle:

I recommend you to perform a power cycle if you face any issues with going online. To
do power cycle follow the steps mentioned in the link below.
How to Power Cycle Router and Modem

Configure Wireless & Security


Right after configuring Internet access on D-Link router, you need to configure the wireless
settings if you want to use it. Latest D-Link wireless routers support both 2.4GHz and 5GHz
frequencies in order to extend its support to 802.11a, 802.11b, 802.11n and 802.11g wireless
standards. 802.11n supports both 2.4GHz and 5GHz where 802.11a supports 5GHz only.
802.11b and 802.11g work in 2.4GHz. Here we share the manual steps to configure wireless and
security on D-Link router. 

1. Login
2. Click on Wireless Settings tab

3. Click on Manual Wireless Connection Setup

4. 2.4GHz Devices(802.11n,11g and 11b): 

1. Click on Enable Wireless and Select 802.11 mode (2.4GHz). 

You can select one of the following 802.11 modes:

 802.11b Only
 802.11g Only
 802.11a Only
 Mixed 802.11g and 802.11b
 Mixed 802.11n and 802.11g
 Mixed 802.11n,11g, 11b

2. Check on Enable Auto Channel Scan: 

Now D-Link Wireless Router will automatically pick the channel with least
interference. 

3. Wireless Network Name:

Here you can write the name of your wireless network (SSID). SSID can be up to
32 characters and it is case sensitive.

4. Select Channel Width:

20/40 MHz if you are using both 802.11n and non 802.11n devices. If you are not
using 802.11n devices you can select 20MHz. 

5. Visibility of SSID: 

If you do not want to show your SSID, you can check the option Invisible.

5. 5GHz Devices (802.11n and 11a):

1. Enable Wireless:

Pdf file link here


Aim-4 : Configuring Access Point with Point to Point.

Configuring Access Point.

In order to configure the access point, you can connect a laptop or PC to the wireless access
point's console port via a serial cable. Through the use of terminal software, you can view access
point configuration screens and change specific settings, such as radio channel and transmit
power. The problem is that this method of accessing the configuration screens is often character-
based and not user-friendly. Plus, a serial cable limits how far you can move from the wireless
access point when performing the configurations.

 If your laptop or PC is equipped with a radio card, then you can access the configuration screens
through the use of a Web browser by typing the Internet Protocol (IP) address of the access point
as the URL for the Web page (for example, "http:/192.168.0.1" without the quotes). If the IP
address in the laptop or PC is set within an acceptable range of the access point (the IP address
would be 192.168.0.xxx, with the last three numbers something between 2 and 254), then the
browser will render the configuration screens in a much improved format.

Access point configuration options

Wireless access points include a wide variety of configuration settings, and the following
represents the more common items you can change with tips on how to configure them.

IP address. Every wireless access point -- indeed, every client and server as well -- must have a
unique IP address to enable proper operation on the network. The wireless access point will
come with a pre-assigned IP address, but you'll probably need to change it to match the address
plan of your customer's corporate network. In most cases, the use of static IP addresses in
wireless access points is best, mainly to make operational support easier. Some wireless access
points allow you to use dynamic host configuration protocol (DHCP) so that the wireless access
point automatically obtains an IP address from a DHCP server. This may be beneficial for some
home applications if the broadband service provider offers addresses via DHCP.
Radio channel. Set the radio channels in wireless access points within range of each other to
different channels. This will prevent them from interfering with each other. With 802.11b and
802.11g networks, use channels 1, 6 and 11 to ensure enough frequency separation to avoid
conflicts. 802.11a channels, however, don't overlap, so just be sure the adjacent 802.11a wireless
access points are set to different channels. Some wireless access points have a feature whereby
the access point automatically sets its channel based on others already in use, making installation
much easier (but keep in mind that this could cause dropped calls with voice applications).

Transmit power. In most cases, the transmit power should be set to the highest value (100
megawatts in the U.S.). This maximizes range, which reduces the number of wireless access
points and cost of the system for your customer. If you're trying to increase the capacity of your
customer's network by placing wireless access points closer together, set the power to a lower
value to decease overlap and potential interference. Lower power settings also limit the wireless
signals from propagating outside the physically controlled area of the facility, which improves
security.

Service set identifier (SSID). The SSID defines the name of a WLAN that users associate with.
By default, the SSID is set to a common value, such as tsunami for Cisco products. In order to
improve security, you should change the SSID to a nondefault value to minimize unauthorized
users from associating with the access point. For even better security, some wireless access
points let you disable SSID broadcasting. This keeps most client device operating systems (e.g.,
Windows Vista) from sniffing the SSID from access point beacons and automatically associating
with the access point. Someone could, however, obtain the SSID using other sniffing tools that
obtain the SSID from 802.11 frames when users first connect to the access point.

Data rate. Most wireless access points allow you to identify acceptable data rates. By default,
802.11b wireless access points operate at 1, 2, 5.5 and 11 Mbps data rates, and 802.11g access
points operate at data rates of 6 to 54 Mbps, depending on the quality of the link between the
client device and the access point. As the link quality deteriorates, the access point will
automatically throttle down to lower data rates in an attempt to maintain a connection. You can,
however, exclude specific data rates. For example, you may want your customer's
communications only at 11 Mbps or not at all. This could be necessary to support higher
bandwidth applications.

Beacon interval. The beacon interval is the amount of time between access point beacon
transmissions. The default value for this interval is generally 10 ms, that is, 10 beacons sent
every second. This is sufficient to support the mobility speed of users within an office
environment. You can increase the beacon interval and have lower overhead on the network, but
then roaming will likely suffer. It's best to leave this setting alone. In some cases, though, you
might want to experiment with setting the beacon interval to higher values to maximize 802.11
power management functions (if roaming doesn't suffer).

Request-to-send/clear-to-send (RTS/CTS). The RTS/CTS function alleviates collisions due to


hidden nodes, which occurs when multiple stations are within range of a common wireless
access point but out of range of each other. In most cases it's best to disable RTS/CTS.

Fragmentation. Fragmentation can help reduce the amount of data needing retransmission when
collisions or radio frequency (RF) interference occur. This can improve performance in some
cases by enabling the clients and access points to retransmit smaller packets when errors are
found.

Encryption. Most wireless access points allow the enabling of wired equivalent privacy (WEP),
which encrypts the frame body (not headers) of each data frame. Use WEP as a minimum level
of protection. WEP is somewhat static and requires you to configure each access point and client
device with the same encryption key. When using 40-bit keys, you'll need to enter a key having
10 hexadecimal characters (0-9, a-f or A-F). 128-bit keys, which offer better security, are 26
hexadecimal characters long. For even better security, some wireless access points offer more
advanced forms of encryption, such as Wi-Fi protected access (WPA) and 802.11i, which ensure
that keys change automatically at a rate that hopefully thwarts a hacker from cracking the
security.

Authentication. As part of the 802.11 standard medium access control (MAC) functions,
wireless access points implement the default 802.11 open system authentication and sometimes
shared key authentication. Neither one of these forms of authentication provides very good
security. As a result, many wireless access points now include 802.1x mechanisms that
authenticate users with an external authentication server. Certainly consider activating these
more advanced authentication methods when configuring the access point. 802.11i and WPA
include 802.1x mechanisms.

Administrative interfaces. In order to improve security for your customer, be sure to disable the
console port of the access point to avoid the possibility of an unauthorized person reconfiguring
an access point and removing encryption and authentication functions. Also, be certain to change
the default administrative login user name and password to ensure hackers don't have easy access
to configuration settings.
Configuration : Its Configuration has two parts

– Configuring the Internet Part, where we tell the Router how to connect to the internet.

– Configuring the Wi-Fi Part, where we decide the name and password with which we connect to
the Router

• Internet Configuration shown here will guide to Configure the Router in PPPoE.

– This will enable you to browse internet directly, every time you connect to the router. No need
to login again and

again.

• Wi-Fi Configuration has also been given, in order to ease the process of you connecting to the
Router

– SSID and Password Creation have been explained\

– Few high end routers have two bands to work on – 2.4 GHz and 5 GHz

– 2.4 GHz band provides higher range, but lesser speed.

– 5 GHz band provides lower range, but higher speed.

Step : 2 Logging into


Configuring Access Point with Point to Point.
Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client,
Wireless Repeater, and Wireless Bridge.  The Wireless Bridge mode will turn the access point
into a wireless bridge.  Wireless clients will not be able to connect to the access point in this
mode. 
NOTE:  When an access point is configured as a wireless bridge, it will link a wireless network
to a wired network allowing you to bridge two networks with different infrastructure.
 

NOTE:  When the WAP54G access point is set to wireless bridge mode, it will only
communicate with another Linksys Wireless-G Access Point (WAP54G).  
To configure an access point as a wireless bridge, you need to perform three steps:
1. Checking the Wireless MAC Address of an Access Point
2. Setting-Up Wireless Bridge Mode on the WAP54G
3. Changing the LAN IP Address of the Wireless Bridge 

Checking the Wireless MAC Address of an Access Point 


NOTE: The following steps will be performed on the main access point using a wired
computer. 
Step 1:
Connect a computer to the access point. 
 

 
Step 2:
Assign a static IP Address on the computer.  For instructions, click here.
Step 3:
Open the access point’s web-based setup page.  For instructions, click here.
NOTE:  If you are using Mac® to access the access point’s web-based setup page,
click here.
Step 4:
When the access point’s web-based setup page opens, take note of the Wireless MAC
Address. 
 

 
NOTE:  The Wireless MAC Address you took note of will be entered on the WAP54G set as
wireless repeater.
Step 5:
After obtaining the wireless MAC Address of the access point, configure the other
WAP54G as a wireless bridge.  For instructions, follow the steps below.
Setting-Up Wireless Bridge Mode on the WAP54G
Step 1:
Connect a computer to the access point you want to configure as a wireless bridge.  
 
Step 2:
Assign a static IP Address on the computer. For instructions, click here.
Step 3:
Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac® to access the access point’s web-based setup page,
click here.
Step 4:
When the access point’s web-based setup page opens, click AP Mode.
 
 
 
NOTE:  The access point’s web-based setup page may differ depending on the access
point’s version number.

Step 5:
Select Wireless Bridge and type the remote access point’s MAC Address that you took
note of earlier.
   
 
NOTE:  Remove the colons (:) when typing the MAC Address on the Remote Access
Point’s LAN MAC Address field.
Step 6:

Click  .
Aim-5 : Configuring Access Point with Point to Multi Point.
Definition: In Wi-Fi network, Bridge mode allows two or more wireless access points (APs) to
communicate with each for the purpose of joining multiple LANs.

Some wireless bridges support only a single point-to-point connection to another AP. Others


support point-to-multipoint connections to several other APs. This article is about to setup a
Point to Multi-Point Bridge.

Note:

For setting up such network as the above topology by Point to Multi-Point Bridge mode, you
need to configure the Access Point A to Point to Multi-Point Bridge mode and points to Access
Point B and Access Point C; you also need to configure both Access Point B and Access Point C
to "Point to Point Bridge mode" and point them to Access Point A.

Step 1 Connect your computer to the AP which will be configured to Point to Multi-Point Bridge
mode (Access Point A), and then log into the Web-based Interface by entering the IP
address 192.168.1.1 or 192.168.1.254 into the address bar of the Web Browser.

Note:

The LAN IP changes by model. Please find it on the bottom label of the product.

 
If you cannot log into the Web-based Interface, please click here and follow the instruction for a
try.

Step 2

Change the LAN IP address of the access point to avoid IP conflict. If necessary, please refer
to FAQ_173 or some detailed information.

After changing the IP address of your access point, you need to re-log into it by using the new IP
address. And please note that the IP addresses of the access points cannot be the same in your
network.

Step 3

Configure your Access Point A to Point to Multi-Point Bridge mode.

1. Click on Wireless ->Basic Settings on the left menu, change the channel to a fixed one.

2. Go to Wireless -> Wireless Mode on the left, select Bridge (Point to Multi-Point).
 

3. Press Survey or Search button and an AP list will be displayed. Locate the BSSID(MAC


address) of the access point B and access point C, remember the Channel-> Click Connect.

4. Then you will see the MAC addresses of the Access Point B and C are displayed in the MAC
of AP boxes.

5. Click on Save button to save the settings.

 
6. Go to Wireless-Security Settings to secure the wireless as WEP. Note that it only supports
WEP when the AP is configured as bridge mode. See more details here Supported Security
Types of TP-Link Access Points.

7. Go to System Tools-Reboot to reboot the device.

Step 4

Configure your Access Point B and Access Point C to Point to Point Bridge mode.

For configuring Access Point B and Access Point C to Point to Point Bridge mode, please refer
to FAQ 176.

Additional information:

There is an option called With AP Mode in the setting page. If you enable it, the access point can
work in AP mode at the same time when it has been configured to Bridge mode. This means that
you can connect other wireless clients to this access point when it has been configured to Bridge
mode.

 
Otherwise you cannot connect any wireless client to this access point when it has been
configured to Bridge mode.

You might also like