Professional Documents
Culture Documents
List of Experiments:
1. Eight experiments suggested on kits for GSM, CDMA and any possible experiments
covering the subjects.
3. Configuring Access Point with bridging mode (Point to Point and Point to Multi Point).
NOTE: At least 8 Experiments from the syllabus must be done in the semester.
Aim-1: Introduction to Wireless LAN.
Aim-2: How to Build a Computer-to-Computer, P2P Network (Ad-Hoc Wi-Fi Network)
Aim-3: How to Build Infrastructure Mode in Wireless Networking.
Aim-4: Configuring Access Point with Point to Point.
Aim-5: Configuring Access Point with Point to Multi Point.
Aim-1 : Introduction to Wireless LAN.
1. Wireless clients, which are any devices capable of communicating over a wireless LAN,
such as a notebook computer, printer or handheld.
2. Access points, that is, the centers of the wireless-to-wired LAN connectivity. These
points aggregate wireless radio signals and then connect the two LANs. The access point
is generally book-sized. It contains a radio transceiver, communications and encryption
software, and an Ethernet port for a cable connection to a hub or a switch on the wired
LAN.
Typical Range
100 ft. 100 ft. 125 ft. 225 ft. 90 ft.
Indoors*
Typical Range
400 ft. 450 ft. 450 ft. 825 ft. 1,000 ft.
Outdoors*
:
1. Identify the equipment you want to buy, such as wireless notebooks, access points,
wireless LAN adapters and wireless cards.
2. Determine the number of users who need to have access to the network.This will
help you determine the number of access points you'll need.
3. Plan for the connection to your wired LAN, probably in a central location and in an
open environment. Your goal is to maximize the access point's wireless range. The
quoted range is a maximum of 300 feet, but that's very dependant on the existing
environment--walls, water pipes, cables and so on all could decrease the range. The best
thing to do is complete a site survey first; if that's not possible, assume a maximum range
of 150 feet, as 300 could decrease throughput.
4. Configure your wireless devices to work with your network.
5. Test the installation before it goes live. Using link test software, you should test for the
percent of data sent correctly, the time it takes to receive a response from the destination
device, and the strength of the transmitted signal.
6. Establish a procedure to manage your wireless LAN.
Aim-2 : How to Build a Computer-to-Computer, P2P Network(Ad-Hoc Wi-Fi Network).
A Wi-Fi network in ad-hoc mode (also called computer-to-computer or peer mode) lets two or
more devices communicate with each other directly instead of through a central wireless router
or access point (which is what infrastructure mode is).
Setting up an ad-hoc network is useful if there isn't a wireless structure built, like if there aren't
any access points or routers within range. The devices don't need a central server for file shares,
printers, etc. Instead, they can access each other's resources directly through a simple point-to-
point wireless connection.
Requirements : The devices that are going to take part in the ad-hoc network have to have a
wireless network adapter installed. They also have to support a hosted network.
Testing : To see if your wireless adapter has hosted network support, look for it in Command
Prompt after running the netsh wlan show drivers command. You might need to open
Command Prompt as an administrator for that command to work.
These versions of Windows make it a little tougher to make an ad-hoc network when you
compare the procedure to earlier Windows operating systems. If you want to set up the ad-hoc
network manually without using any other software but what Windows has available, follow
along with these steps:
1. Open Command Prompt and enter this command, replacing the italicized works with
your own network name and password for the wireless network:
1. netsh wlan set hostednetwork mode=allow ssid=network namekey=password
2. Start the hosted network:
1. netsh wlan start hostednetwork
3. In Control Panel, navigate to \Network and Internet\Network Connections\ and go into
the Sharing tab of the network connection's Properties (right-click to find Properties) to
check the box that says Allow other network users to connect through this computer's
Internet connection.
4. Select the ad-hoc network connection from the drop down menu and OKout of any open
prompts.
After Windows 7, no OS from Windows allows to set up an adhoc network, even if proper
wireless drivers are installed. Windows 10 is not an exception!
But there are some tricks by which on can do adhoc network setting in Windows 10. Here is the
simplest and 100% working method.
Note that this trick works properly on Windows 8 and Windows 8.1 also.
Below is the step by step guide to set up an adhoc network in Windows 10 on a PC.
In the above command, "mehdi1234" will act as the password for your adhoc network.
You can keep another one!
3. Press enter!
4. The hosted network mode has been set to allow. Now, enter the following command
after the above.
5. Press enter.
Screenshot of Network Sharing Center after setting up adhoc network in Windows 10.
You can also stop the network by entering the following command in command prompt
or keep it forever.
5. In the Set Up an Ad Hoc Network dialog box, provide the following information:
o Add a network name for your wireless network.
o Indicate the security type as either WEP or No Authentication.
o If you chose WEP, provide the security key for the network and optionally select
the Hide Characters box.
o Select Save This Network to keep this network for longer than one session.
6. Click Next to continue.
The confirmation dialog is displayed, showing you the information that you need to provide to
other people who will want to connect to your ad hoc network.
7. Click Close.
After the connection is set up, it initially becomes active and remains so until you connect to
another network. If you did not choose to save the connection, it will be removed from your
wireless configuration at that time and you will need to repeat this process to reactivate an ad hoc
network connection.
Windows Vista
1. From the Windows Vista start menu, choose Connect To.
2. Click the link called Setup a connection or network.
3. From the Choose a connection option page, choose Set up a wireless ad-hoc (computer-
to-computer) network.
4. Click Next until you see the window for entering the network name, etc.
5. Fill in the spaces provided to choose the network details that the ad-hoc network should
have, like the authentication and password information.
6. Click Next and close out of any open windows once it says the network has been created.
Windows XP
macOS
1. Choose the Create Network... menu option from AirPort (usually accessible from the
main menu bar).
2. Select the Create a Computer-to-Computer Network option and follow the instructions
provided.
Aim-3 : How to Build Infrastructure Mode in Wireless Networking.
In computer networking, infrastructure mode is when a network joins devices together, either
through wired or wireless means, via an access point like a router. This centralization is what sets
infrastructure mode apart from the ad-hoc mode.
Setting up an infrastructure mode network requires at least one wireless access point (AP) and
that the AP and all the clients be configured to use the same network name (SSID).
The access point is cabled to the wired network to allow wireless clients access to resources like
the internet or printers. Additional APs can be joined to this network to increase the reach of the
infrastructure and support more wireless clients.
Home networks with wireless routers support infrastructure mode automatically since these types
of devices include a built-in AP.
Compared to ad-hoc wireless networks, infrastructure offers the advantage of scale, centralized
security management, and improved reach. Wireless devices can connect to resources on a wired
LAN, which is common business settings, and more access points can be added to improve
congestion and broaden the reach of the network.
The disadvantage of infrastructure wireless networks is simply the additional cost to purchase
AP hardware. Ad-hoc networks connect to devices in a peer-to-peer manner, so all that's needed
is the device themselves; no access points or routers are necessary for two or more devices to
reach each other.
Ad-hoc networks are usually seen in short-lived moments where some devices need to share files
but they're too far from a network to make it work. Or, maybe a small operating room in a
hospital can configure an ad-hoc network for some of those wireless devices to communicate
with each other, but they're all disconnected from that network at the end of the day and the files
are inaccessible that way.
However, if you just need a few devices to communicate with one another, an ad-hoc network is
fine. Don't add too many though, because one limitation of ad-hoc networks is that at some point
the hardware just isn't fit for all of that traffic demand, which is when infrastructure mode is
necessary.
Many Wi-Fi devices can only work in infrastructure mode. This includes wireless printers, the
Google Chromecast, and some Android devices. In those circumstances, infrastructure mode has
to be set up for those devices to function; they must connect through an access point.
Link quick setup wizard is enough for an average user to setup his router but for advanced
options it is better learn how to configure this device manually. This tutorial explains how to
configure every models of D-Link wireless router manually for advanced features. Here we learn
how to enable Internet access, WiFi and WiFi security. First step of this guide is to make sure
you can go online with modem by connecting computer to the Ethernet port of the modem. If it
is fine, disconnect the modem and connect computer to one of the LAN ports of D-Link Wireless
Router using an Ethernet cable. Now power on the device.
ii. Enter user name admin and leave password field blank. Click on login to access setup
page.
Using the drop-down menu, you can select the Internet connection type you are using.
Configuration details for each of the Internet connection types is listed below.
To setup your router with cable Internet, select the option Dynamic IP(DHCP).
If you are using cable Internet connection the most important step is to click on
the button Clone Your PC's MAC Address. To know the importance of this step,
click on the link below.
Why MAC Address Cloning is Required for Cable Internet Connection
If your cable ISP doesn't provide any details about Host Name, DNS Server etc
leave them blank or keep the default value. Do not forget to click on Save Settings
button.
Keep the Address mode "Dynamic" if your ISP does not provide you any IP
address details. Normally for DSL connection you do not need to clone computer
MAC address unless asked by your ISP. Click on Save Settings after entering
details.
Here you should enter the full IP address details provided by your ISP including
Subnet Mask, Default Gateway, DNS Servers etc.
o Connect the Internet port of D-Link router to the LAN Port of modem
o Switch on Modem
. Power Cycle:
I recommend you to perform a power cycle if you face any issues with going online. To
do power cycle follow the steps mentioned in the link below.
How to Power Cycle Router and Modem
1. Login
2. Click on Wireless Settings tab
802.11b Only
802.11g Only
802.11a Only
Mixed 802.11g and 802.11b
Mixed 802.11n and 802.11g
Mixed 802.11n,11g, 11b
Now D-Link Wireless Router will automatically pick the channel with least
interference.
Here you can write the name of your wireless network (SSID). SSID can be up to
32 characters and it is case sensitive.
20/40 MHz if you are using both 802.11n and non 802.11n devices. If you are not
using 802.11n devices you can select 20MHz.
5. Visibility of SSID:
If you do not want to show your SSID, you can check the option Invisible.
1. Enable Wireless:
In order to configure the access point, you can connect a laptop or PC to the wireless access
point's console port via a serial cable. Through the use of terminal software, you can view access
point configuration screens and change specific settings, such as radio channel and transmit
power. The problem is that this method of accessing the configuration screens is often character-
based and not user-friendly. Plus, a serial cable limits how far you can move from the wireless
access point when performing the configurations.
If your laptop or PC is equipped with a radio card, then you can access the configuration screens
through the use of a Web browser by typing the Internet Protocol (IP) address of the access point
as the URL for the Web page (for example, "http:/192.168.0.1" without the quotes). If the IP
address in the laptop or PC is set within an acceptable range of the access point (the IP address
would be 192.168.0.xxx, with the last three numbers something between 2 and 254), then the
browser will render the configuration screens in a much improved format.
Wireless access points include a wide variety of configuration settings, and the following
represents the more common items you can change with tips on how to configure them.
IP address. Every wireless access point -- indeed, every client and server as well -- must have a
unique IP address to enable proper operation on the network. The wireless access point will
come with a pre-assigned IP address, but you'll probably need to change it to match the address
plan of your customer's corporate network. In most cases, the use of static IP addresses in
wireless access points is best, mainly to make operational support easier. Some wireless access
points allow you to use dynamic host configuration protocol (DHCP) so that the wireless access
point automatically obtains an IP address from a DHCP server. This may be beneficial for some
home applications if the broadband service provider offers addresses via DHCP.
Radio channel. Set the radio channels in wireless access points within range of each other to
different channels. This will prevent them from interfering with each other. With 802.11b and
802.11g networks, use channels 1, 6 and 11 to ensure enough frequency separation to avoid
conflicts. 802.11a channels, however, don't overlap, so just be sure the adjacent 802.11a wireless
access points are set to different channels. Some wireless access points have a feature whereby
the access point automatically sets its channel based on others already in use, making installation
much easier (but keep in mind that this could cause dropped calls with voice applications).
Transmit power. In most cases, the transmit power should be set to the highest value (100
megawatts in the U.S.). This maximizes range, which reduces the number of wireless access
points and cost of the system for your customer. If you're trying to increase the capacity of your
customer's network by placing wireless access points closer together, set the power to a lower
value to decease overlap and potential interference. Lower power settings also limit the wireless
signals from propagating outside the physically controlled area of the facility, which improves
security.
Service set identifier (SSID). The SSID defines the name of a WLAN that users associate with.
By default, the SSID is set to a common value, such as tsunami for Cisco products. In order to
improve security, you should change the SSID to a nondefault value to minimize unauthorized
users from associating with the access point. For even better security, some wireless access
points let you disable SSID broadcasting. This keeps most client device operating systems (e.g.,
Windows Vista) from sniffing the SSID from access point beacons and automatically associating
with the access point. Someone could, however, obtain the SSID using other sniffing tools that
obtain the SSID from 802.11 frames when users first connect to the access point.
Data rate. Most wireless access points allow you to identify acceptable data rates. By default,
802.11b wireless access points operate at 1, 2, 5.5 and 11 Mbps data rates, and 802.11g access
points operate at data rates of 6 to 54 Mbps, depending on the quality of the link between the
client device and the access point. As the link quality deteriorates, the access point will
automatically throttle down to lower data rates in an attempt to maintain a connection. You can,
however, exclude specific data rates. For example, you may want your customer's
communications only at 11 Mbps or not at all. This could be necessary to support higher
bandwidth applications.
Beacon interval. The beacon interval is the amount of time between access point beacon
transmissions. The default value for this interval is generally 10 ms, that is, 10 beacons sent
every second. This is sufficient to support the mobility speed of users within an office
environment. You can increase the beacon interval and have lower overhead on the network, but
then roaming will likely suffer. It's best to leave this setting alone. In some cases, though, you
might want to experiment with setting the beacon interval to higher values to maximize 802.11
power management functions (if roaming doesn't suffer).
Fragmentation. Fragmentation can help reduce the amount of data needing retransmission when
collisions or radio frequency (RF) interference occur. This can improve performance in some
cases by enabling the clients and access points to retransmit smaller packets when errors are
found.
Encryption. Most wireless access points allow the enabling of wired equivalent privacy (WEP),
which encrypts the frame body (not headers) of each data frame. Use WEP as a minimum level
of protection. WEP is somewhat static and requires you to configure each access point and client
device with the same encryption key. When using 40-bit keys, you'll need to enter a key having
10 hexadecimal characters (0-9, a-f or A-F). 128-bit keys, which offer better security, are 26
hexadecimal characters long. For even better security, some wireless access points offer more
advanced forms of encryption, such as Wi-Fi protected access (WPA) and 802.11i, which ensure
that keys change automatically at a rate that hopefully thwarts a hacker from cracking the
security.
Authentication. As part of the 802.11 standard medium access control (MAC) functions,
wireless access points implement the default 802.11 open system authentication and sometimes
shared key authentication. Neither one of these forms of authentication provides very good
security. As a result, many wireless access points now include 802.1x mechanisms that
authenticate users with an external authentication server. Certainly consider activating these
more advanced authentication methods when configuring the access point. 802.11i and WPA
include 802.1x mechanisms.
Administrative interfaces. In order to improve security for your customer, be sure to disable the
console port of the access point to avoid the possibility of an unauthorized person reconfiguring
an access point and removing encryption and authentication functions. Also, be certain to change
the default administrative login user name and password to ensure hackers don't have easy access
to configuration settings.
Configuration : Its Configuration has two parts
– Configuring the Internet Part, where we tell the Router how to connect to the internet.
– Configuring the Wi-Fi Part, where we decide the name and password with which we connect to
the Router
• Internet Configuration shown here will guide to Configure the Router in PPPoE.
– This will enable you to browse internet directly, every time you connect to the router. No need
to login again and
again.
• Wi-Fi Configuration has also been given, in order to ease the process of you connecting to the
Router
– Few high end routers have two bands to work on – 2.4 GHz and 5 GHz
NOTE: When the WAP54G access point is set to wireless bridge mode, it will only
communicate with another Linksys Wireless-G Access Point (WAP54G).
To configure an access point as a wireless bridge, you need to perform three steps:
1. Checking the Wireless MAC Address of an Access Point
2. Setting-Up Wireless Bridge Mode on the WAP54G
3. Changing the LAN IP Address of the Wireless Bridge
Step 2:
Assign a static IP Address on the computer. For instructions, click here.
Step 3:
Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac® to access the access point’s web-based setup page,
click here.
Step 4:
When the access point’s web-based setup page opens, take note of the Wireless MAC
Address.
NOTE: The Wireless MAC Address you took note of will be entered on the WAP54G set as
wireless repeater.
Step 5:
After obtaining the wireless MAC Address of the access point, configure the other
WAP54G as a wireless bridge. For instructions, follow the steps below.
Setting-Up Wireless Bridge Mode on the WAP54G
Step 1:
Connect a computer to the access point you want to configure as a wireless bridge.
Step 2:
Assign a static IP Address on the computer. For instructions, click here.
Step 3:
Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac® to access the access point’s web-based setup page,
click here.
Step 4:
When the access point’s web-based setup page opens, click AP Mode.
NOTE: The access point’s web-based setup page may differ depending on the access
point’s version number.
Step 5:
Select Wireless Bridge and type the remote access point’s MAC Address that you took
note of earlier.
NOTE: Remove the colons (:) when typing the MAC Address on the Remote Access
Point’s LAN MAC Address field.
Step 6:
Click .
Aim-5 : Configuring Access Point with Point to Multi Point.
Definition: In Wi-Fi network, Bridge mode allows two or more wireless access points (APs) to
communicate with each for the purpose of joining multiple LANs.
Note:
For setting up such network as the above topology by Point to Multi-Point Bridge mode, you
need to configure the Access Point A to Point to Multi-Point Bridge mode and points to Access
Point B and Access Point C; you also need to configure both Access Point B and Access Point C
to "Point to Point Bridge mode" and point them to Access Point A.
Step 1 Connect your computer to the AP which will be configured to Point to Multi-Point Bridge
mode (Access Point A), and then log into the Web-based Interface by entering the IP
address 192.168.1.1 or 192.168.1.254 into the address bar of the Web Browser.
Note:
The LAN IP changes by model. Please find it on the bottom label of the product.
If you cannot log into the Web-based Interface, please click here and follow the instruction for a
try.
Step 2
Change the LAN IP address of the access point to avoid IP conflict. If necessary, please refer
to FAQ_173 or some detailed information.
After changing the IP address of your access point, you need to re-log into it by using the new IP
address. And please note that the IP addresses of the access points cannot be the same in your
network.
Step 3
1. Click on Wireless ->Basic Settings on the left menu, change the channel to a fixed one.
2. Go to Wireless -> Wireless Mode on the left, select Bridge (Point to Multi-Point).
4. Then you will see the MAC addresses of the Access Point B and C are displayed in the MAC
of AP boxes.
6. Go to Wireless-Security Settings to secure the wireless as WEP. Note that it only supports
WEP when the AP is configured as bridge mode. See more details here Supported Security
Types of TP-Link Access Points.
Step 4
For configuring Access Point B and Access Point C to Point to Point Bridge mode, please refer
to FAQ 176.
Additional information:
There is an option called With AP Mode in the setting page. If you enable it, the access point can
work in AP mode at the same time when it has been configured to Bridge mode. This means that
you can connect other wireless clients to this access point when it has been configured to Bridge
mode.
Otherwise you cannot connect any wireless client to this access point when it has been
configured to Bridge mode.