You are on page 1of 8

Shiratsuchi, Kenth F.

ECET515LA

ECE51 Engr. Warren Bejasa

Laboratory Exercise 5 Building a Small Wired and Wireless Network using ISR

Introduction

A Wireless Access Point (WAP) is a networking device that connects wireless devices to a wired

network. Installing WAPs instead of using wires and cables to link every computer or device in the

network is a more convenient, secure, and cost-effective option. There are numerous advantages

and benefits to setting up a wireless network for you and your small business.

A broadband wireless router is intended for use in the home or small office. For the purposes of this

publication, this term can be interchanged with access point (AP). Without the use of network cables,

a wireless network links computers. Radio communications are used by computers to send data

between them. You can talk with other wireless computers directly or connect to an existing network

using a wireless access point (AP). You choose the operation mode for the type of wireless network

you want when you set up your wireless adapter. You can connect your Intel® PRO/Wireless

adapter to other wireless devices that follow the IEEE 802.11 standard for wireless networking.

Depending on the number of users on the network, wireless LANs can work with or without an access

point. Infrastructure mode makes use of access points (APs) to allow wireless computers to send and

receive data. Wireless computers provide data to the access point (AP), which receives it and

rebroadcasts it to other computers. In addition, the access point can connect to a wired network or

the Internet. Multiple access points can be used in conjunction to give coverage across a large area.

Peer-to-peer mode, also known as Ad Hoc mode, allows wireless computers to communicate

information directly to other wireless computers without the use of access points.
Discussion

This is how you Build a Small Wired and Wireless Network using ISR:

1. Converting an existing wired network to a wireless network

Adding a WAP to your current wired network is a good way to accommodate devices that can only

connect over wireless. It's like building a separate network just for wireless devices while remaining

connected to your existing wired network. As indicated in the image below, adding a WAP to an

existing network is similar to linking two networks together to establish a single network for both

wired and wireless devices.

2. Using a Wireless Distribution System to connect many access points (WDS)

WDS allows you to link together various access points. WDS enables connected access points to

communicate with one another over a wireless link. This functionality allows roaming clients to enjoy
a consistent experience. This simplifies the management of many wireless networks while also

reducing the number of cables required to link them. The WAP can be used as a single point-to-

point mode access point, a multipoint bridge, or a repeater. A WAP in repeater mode can establish

a connection between two or more distant access points. It'll just serve as a wifi extender.

In the example diagram above, a WDS connection is configured between the WAP121 and the

WAP321 Access Points.

Guidelines in configuring WDS:

1. WDS works only with specific pairs of Cisco WAP devices. The pairs are as listed below.
 WAP121 with WAP321

 WAP131 with WAP351

 WAP150 with WAP361

 WAP551 with WAP561

 Multiple WAP371

 Multiple WAP571

 Multiple WAP571E

2. You can have only one WDS link between any pair of these devices. That is, a remote Media Access

Control (MAC) address may appear only once on the WDS page for a particular WAP.

3. The devices should have the same settings for radio, IEEE 802.11 mode, Channel Bandwidth, and

Channel.

4. Channel selection should be specified and not set to Auto.

To learn how to configure WDS on your WAP, click any of the links below depending on the device you

are using:

 WAP121, WAP321, WAP371, WAP551, and WAP561

 WAP131, WAP351, WAP150, and WAP361

 WAP571 and WAP571E

3. Wireless Access Point Clustering Configuration

When numerous WAPs are connected in the same network, this is known as clustering. This technology is

enhanced intelligence that enables them to collaborate dynamically while also simplifying wireless

networking. You'll be able to manage and configure a clustered wireless network as a single entity, rather
than having to manually configure and alter the settings in each access point. In a wireless network, up to

ten WAPs can be clustered.

Configuring a wireless LAN

There are three basic components that must be configured for a wireless LAN to operate properly:

1. The network name or service set identifier (SSID) - Each wireless network uses a unique network

name to identify the network. This name is called the service set identifier (SSID). When you set

up your wireless adapter, you specify the SSID.

2. If you are connecting to an existing network, you must use the SSID for that network.

3. If you are setting up your own network make up your own SSID and use it on each computer.

The SSID can be up to 32 characters long using a combination of letters and numbers.

4. Profiles - When you set up your computer to access a wireless network, Intel® PROSet creates a

profile for the wireless settings that you specify. To connect to an existing network, you can

make a temporary connection, or create a profile for that network. After you create profiles,

your computer automatically connects when you change locations.

Cisco* Compatible Extensions - Enabling Cisco Compatible Extensions provides interoperability with

features of a Cisco wireless LAN infrastructure such as CKIP and LEAP.

 Security - The 802.11 wireless networks use encryption to help protect your data. If you are

connecting to an existing network, use the encryption key provided by the administrator of the

wireless network. When setting up a wireless LAN, you can strongly increase the level of data

protection and access control using one of these methods:

 Wi-Fi Protected Access2 (WPA2) - is currently the highest level of security offered in Wi-Fi

networks. Home and small-office users can implement a simplified version that requires a
preshared key, commonly called WPA2-Personal or WPA2-PSK. WPA2 implements 802.1x and

key-exchange to strengthen data encryption using the Advanced Encryption Standard (AES).

 Wi-Fi Protected Access (WPA) - is a security enhancement that strongly increases the level of

data protection and access control to a Wireless LAN. Home and small-office users can

implement a simplified version by creating a preshared key, commonly called WPA-Personal or

WPA-PSK. WPA enforces 802.1x authentication and key-exchange to strengthen data encryption

using Temporal Key Integrity Protocol (TKIP).

Reflection

The most important stage in setting up a wireless network is to do a site study. The amount of

troubleshooting for connection testing will be substantially reduced with a site survey. The following tools

are required to conduct a site survey:

A wireless access point (AP) or a laptop computer configured as a transmitter. It should be placed near

and at the same height as your wireless LAN's chosen position. As the mobile receiver, you'll need a laptop

loaded with your site survey. To plot the strength of your signals, you'll need an area or building map.

Launch the site survey software on the mobile receiver once you have all of the necessary tools.

To evaluate the signal strength, carry the mobile receiver around the planned wireless LAN region. Check

the signal strength of each AP point you wish to use. If you're having trouble with a location, check sure

it's not on a metal-containing wall, like an air conditioning duct. Metal flooring has the potential to reduce

range in multi-story buildings. The signal levels at each point must overlap for smooth coverage within

your LAN. There is software available that allows changing signal levels to be easily passed from one AP

to the next.

When the signal strength inside the building is strong, verify the signal strength outside the building. Carry

the mobile receiver as far as you can without losing substantial signal strength down the street or around
the building. Be knowledgeable of the types of networks utilized by the businesses in your area to boost

wireless security. This knowledge will assist you in choosing the optimal channels and locations for your

Aps.

In locations with multiple physical barriers, an access point (AP) can transmit a signal up to 60 feet, or up

to 500 feet in broad open spaces. The following factors have an impact on range:

The range of radio transmissions can be shortened by building materials such as steel and drywall.

The physical arrangement of the place can interfere with signals and cause them to be dropped.

Signal transmissions can be hampered by electronic noise from cell phones, microwave ovens, and other

devices operating on the same frequency.

Signal distance is affected by data rate. The shorter the distance traveled by signals, the faster they are

sent.

When surveying the site for your WLAN, keep these criteria in mind to ensure that users have

uninterrupted mobile access. If your space contains dividing walls, using numerous APs can help

mitigate the effects of these elements.

Even if you enable the security settings described in the 802.11b standard, as well as the security

settings of your gear, your network remains susceptible. Here are some steps you can take to

increase security and make it more difficult for outsiders to gain access to your network:

Change your WLAN's default network name. The default settings of any manufacturer are public

knowledge.

Encryption should be enabled. TKIP encryption is more secure than WEP encryption.
As often as feasible, change your encryption keys. Change the Wi-Fi Protected Access (WPA)

preshared key (PSK) mode key (or passphrase).

Allow each access point (AP) to generate a list of permitted MAC addresses for your WLAN by

enabling MAC address filtering.

Use virtual private network encryption if you have a tiny network.

You can establish a gateway between your APs and network clients if you have a large network.

To address the security concerns of the initial 802.11 implementations, Intel® wireless adapters and

Intel® PROSet Software v7.1.4 and subsequent versions support the newest security protocols,

including WPA and WPA2. For your Intel® wireless adapter, download the most recent Intel®

Software and Drivers.

References

 https://www.intel.com/content/www/us/en/support/articles/000006856/wireless/legacy-intel-

wireless-products.html

 https://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=5

 https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-series-

wireless-access-points/smb5531-add-a-wireless-network-to-an-existing-wired-network-using-

a.html

 https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-series-

wireless-access-points/smb5530-set-up-a-wireless-network-using-a-wireless-access-point-

wap.html

You might also like