Professional Documents
Culture Documents
SHIRATSUCHI LabExer5
SHIRATSUCHI LabExer5
ECET515LA
Laboratory Exercise 5 Building a Small Wired and Wireless Network using ISR
Introduction
A Wireless Access Point (WAP) is a networking device that connects wireless devices to a wired
network. Installing WAPs instead of using wires and cables to link every computer or device in the
network is a more convenient, secure, and cost-effective option. There are numerous advantages
and benefits to setting up a wireless network for you and your small business.
A broadband wireless router is intended for use in the home or small office. For the purposes of this
publication, this term can be interchanged with access point (AP). Without the use of network cables,
a wireless network links computers. Radio communications are used by computers to send data
between them. You can talk with other wireless computers directly or connect to an existing network
using a wireless access point (AP). You choose the operation mode for the type of wireless network
you want when you set up your wireless adapter. You can connect your Intel® PRO/Wireless
adapter to other wireless devices that follow the IEEE 802.11 standard for wireless networking.
Depending on the number of users on the network, wireless LANs can work with or without an access
point. Infrastructure mode makes use of access points (APs) to allow wireless computers to send and
receive data. Wireless computers provide data to the access point (AP), which receives it and
rebroadcasts it to other computers. In addition, the access point can connect to a wired network or
the Internet. Multiple access points can be used in conjunction to give coverage across a large area.
Peer-to-peer mode, also known as Ad Hoc mode, allows wireless computers to communicate
information directly to other wireless computers without the use of access points.
Discussion
This is how you Build a Small Wired and Wireless Network using ISR:
Adding a WAP to your current wired network is a good way to accommodate devices that can only
connect over wireless. It's like building a separate network just for wireless devices while remaining
connected to your existing wired network. As indicated in the image below, adding a WAP to an
existing network is similar to linking two networks together to establish a single network for both
WDS allows you to link together various access points. WDS enables connected access points to
communicate with one another over a wireless link. This functionality allows roaming clients to enjoy
a consistent experience. This simplifies the management of many wireless networks while also
reducing the number of cables required to link them. The WAP can be used as a single point-to-
point mode access point, a multipoint bridge, or a repeater. A WAP in repeater mode can establish
a connection between two or more distant access points. It'll just serve as a wifi extender.
In the example diagram above, a WDS connection is configured between the WAP121 and the
1. WDS works only with specific pairs of Cisco WAP devices. The pairs are as listed below.
WAP121 with WAP321
Multiple WAP371
Multiple WAP571
Multiple WAP571E
2. You can have only one WDS link between any pair of these devices. That is, a remote Media Access
Control (MAC) address may appear only once on the WDS page for a particular WAP.
3. The devices should have the same settings for radio, IEEE 802.11 mode, Channel Bandwidth, and
Channel.
To learn how to configure WDS on your WAP, click any of the links below depending on the device you
are using:
When numerous WAPs are connected in the same network, this is known as clustering. This technology is
enhanced intelligence that enables them to collaborate dynamically while also simplifying wireless
networking. You'll be able to manage and configure a clustered wireless network as a single entity, rather
than having to manually configure and alter the settings in each access point. In a wireless network, up to
There are three basic components that must be configured for a wireless LAN to operate properly:
1. The network name or service set identifier (SSID) - Each wireless network uses a unique network
name to identify the network. This name is called the service set identifier (SSID). When you set
2. If you are connecting to an existing network, you must use the SSID for that network.
3. If you are setting up your own network make up your own SSID and use it on each computer.
The SSID can be up to 32 characters long using a combination of letters and numbers.
4. Profiles - When you set up your computer to access a wireless network, Intel® PROSet creates a
profile for the wireless settings that you specify. To connect to an existing network, you can
make a temporary connection, or create a profile for that network. After you create profiles,
Cisco* Compatible Extensions - Enabling Cisco Compatible Extensions provides interoperability with
Security - The 802.11 wireless networks use encryption to help protect your data. If you are
connecting to an existing network, use the encryption key provided by the administrator of the
wireless network. When setting up a wireless LAN, you can strongly increase the level of data
Wi-Fi Protected Access2 (WPA2) - is currently the highest level of security offered in Wi-Fi
networks. Home and small-office users can implement a simplified version that requires a
preshared key, commonly called WPA2-Personal or WPA2-PSK. WPA2 implements 802.1x and
key-exchange to strengthen data encryption using the Advanced Encryption Standard (AES).
Wi-Fi Protected Access (WPA) - is a security enhancement that strongly increases the level of
data protection and access control to a Wireless LAN. Home and small-office users can
WPA-PSK. WPA enforces 802.1x authentication and key-exchange to strengthen data encryption
Reflection
The most important stage in setting up a wireless network is to do a site study. The amount of
troubleshooting for connection testing will be substantially reduced with a site survey. The following tools
A wireless access point (AP) or a laptop computer configured as a transmitter. It should be placed near
and at the same height as your wireless LAN's chosen position. As the mobile receiver, you'll need a laptop
loaded with your site survey. To plot the strength of your signals, you'll need an area or building map.
Launch the site survey software on the mobile receiver once you have all of the necessary tools.
To evaluate the signal strength, carry the mobile receiver around the planned wireless LAN region. Check
the signal strength of each AP point you wish to use. If you're having trouble with a location, check sure
it's not on a metal-containing wall, like an air conditioning duct. Metal flooring has the potential to reduce
range in multi-story buildings. The signal levels at each point must overlap for smooth coverage within
your LAN. There is software available that allows changing signal levels to be easily passed from one AP
to the next.
When the signal strength inside the building is strong, verify the signal strength outside the building. Carry
the mobile receiver as far as you can without losing substantial signal strength down the street or around
the building. Be knowledgeable of the types of networks utilized by the businesses in your area to boost
wireless security. This knowledge will assist you in choosing the optimal channels and locations for your
Aps.
In locations with multiple physical barriers, an access point (AP) can transmit a signal up to 60 feet, or up
to 500 feet in broad open spaces. The following factors have an impact on range:
The range of radio transmissions can be shortened by building materials such as steel and drywall.
The physical arrangement of the place can interfere with signals and cause them to be dropped.
Signal transmissions can be hampered by electronic noise from cell phones, microwave ovens, and other
Signal distance is affected by data rate. The shorter the distance traveled by signals, the faster they are
sent.
When surveying the site for your WLAN, keep these criteria in mind to ensure that users have
uninterrupted mobile access. If your space contains dividing walls, using numerous APs can help
Even if you enable the security settings described in the 802.11b standard, as well as the security
settings of your gear, your network remains susceptible. Here are some steps you can take to
increase security and make it more difficult for outsiders to gain access to your network:
Change your WLAN's default network name. The default settings of any manufacturer are public
knowledge.
Encryption should be enabled. TKIP encryption is more secure than WEP encryption.
As often as feasible, change your encryption keys. Change the Wi-Fi Protected Access (WPA)
Allow each access point (AP) to generate a list of permitted MAC addresses for your WLAN by
You can establish a gateway between your APs and network clients if you have a large network.
To address the security concerns of the initial 802.11 implementations, Intel® wireless adapters and
Intel® PROSet Software v7.1.4 and subsequent versions support the newest security protocols,
including WPA and WPA2. For your Intel® wireless adapter, download the most recent Intel®
References
https://www.intel.com/content/www/us/en/support/articles/000006856/wireless/legacy-intel-
wireless-products.html
https://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=5
https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-series-
wireless-access-points/smb5531-add-a-wireless-network-to-an-existing-wired-network-using-
a.html
https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-series-
wireless-access-points/smb5530-set-up-a-wireless-network-using-a-wireless-access-point-
wap.html