Professional Documents
Culture Documents
net/publication/269295509
CITATIONS
READS
0
47,497
1 author:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Opeyemi Musodiq Raji on 09 December 2014.
BY
SUMITTED TO
IN
COMMUNICATION TECHNOLOGY
SUPERVISED BY:
December, 2014.
I
CERTIFICATION
This is to certify that this project has been read and approved by the
……………………………………
Project Supervisor
…………………………………….
……………………………………
I give thanks to Almighty God for his mercy, provision, protection and guidance
in all my undertakings.
for dedicating his time to discuss useful information right from the beginning
to the end of achieving this project done. My profound gratitude also goes to my
This project report, design and implementation of wireless local area network
is written to serve as a reference book for wireless LAN in the future whenever
professional body have done a lot of work to make wireless network had
V
LIST OF TABLE AND FIGURE
VI
Table of Contents
Tittle page .................................................................................................................................................... I
Certification .....................................................................................................................................II
Dedication ....................................................................................................................................III
Acknowledge ............................................................................................................................................ IV
Abstract............................................................................................................................................................V
1.0Background...................................................................................................................................................1-3
1.1Statement of problem........................................................................................................................... 3
1.2Motivation.......................................................................................................................................... 3-4
1.5Significant of study.......................................................................................................................................4-5
1.6Terminologies................................................................................................................................................5-8
2.0Overview............................................................................................................................................................9
2.17IN PROCESS...................................................................................................................................... 22
3.1.0Technology.............................................................................................................................................26-33
4.0.1Hardware........................................................................................................................... 35
4.1.3Anti-Virus.....................................................................................................................................................40
4.1.4Anti-Spyware............................................................................................................................... 40-41
5.3Conclusion......................................................................................................................................................44
REFFERENCE......................................................................................................................................................................45
IX
CHAPTER ONE
1.0 BACKGROUND:
their uses have significantly grown. Cellular phones are nowadays part
the user’s location. With these numerous uses of wireless network, this
1
hardware initially cost so much
2
that it was only used as an alternative to cabled LAN in places where
specific solutions and proprietary protocols, but at the end of the 1990s
802.11 (in products using the Wi-Fi brand name). An alternative ATM-
succeeded in the market, and with the release of the faster 54 Mbit/s
unlikely that it will ever succeed. In 2009 802.11n was added to 802.11.
2.4 GHz and 5 GHz bands at a maximum data transfer rate of 600 Mbit/s.
Most new routers are able to utilize both wireless bands, known
and microwave ovens. The 5 GHz band is also wider than the 2.4 GHz
share the space. Not all channels are available in all regions.
within a
local coverage area and still be connected to the network. Most modern
WLANs are based on IEEE 802.11 standards, marketed under the Wi-
Fi brand name. Wireless LANs have become popular in the home due to
access to their customers; often for free. New York City, for instance, has
begun a pilot program to provide city workers in all five boroughs of the
Airport, Lagos has free wireless internet access for passenger travelling.
1.2 MOTIVATION
There is existing LAN connection but there are some features its lacking
of.
network (WLAN) for School of Science and Technology NOUN, for file
and printer sharing over the network. To achieve this, there are steps to
take, which are: installation of wireless router, setup the router and
wireless router.
with his /her laptop, can still print file within the coverage area.
The important of this project are many but few will be mentioned.
the school huge among of money, cost of maintenance and occupy more
space. But, by the time this project will be implement a printer machine
can be share
over a dedicated wireless local area network for department of school
1.6 TERMINOLOGIES
1.6.0 ROUTER:
1.6.2 PROTOCOL:
1.6.3 DUALBAND:
signals from other matching radio (point to point) or radios (multi drop)
message to one or multiple devices that need to receive it, rather than
1.6.6 HUB
input of any port appears at the output of every port except the original
incoming.
6
1.6.7 NETWORK BRIDGE:
the OSI model bridging acts in the first two layers, below the network
waves, and vice versa. It is usually used with a radio transmitter or radio
terminals, and the antenna radiates the energy from the current
receiving.
City and its operations center in Piscataway, New Jersey. It was formed
in
7
1963 from the amalgamation of the American Institute of Electrical
members in chapters around the world. The standard upheld for the
design of the project was constituted by the professional body called the
IEEE standard.
8
CHAPTER TWO
LITERATURE REVIEW
2.0 OVERVIEW
router (IEEE 802.11) specification has undergo. IEEE was the institutional
body that given standards set and protocols. Wireless Local Area
Mbit/s
meters
The 802.11a standard uses the same data link layer protocol and frame
Achievable throughputs in the mid-20 Mbps. Since the 2.4 GHz band is
heavily used to the point of being crowded, using the relatively un-used
absorbed more readily by walls and other solid objects in their path due
operating in the
2.4 GHz band. Devices operating in the 2.4 GHz range include:
telephones.
Streaming Multimedia
11
2.4 IEEE 802.11g STANDARDS and SPECIFICATION.
12
Op. Frequency: 2.4 GHz
Mbit/s
works in the 2.4 GHz band (like 802.11b), but uses the same OFDM
codes, or about
ratification, due to the desire for higher data rates, and reductions in
802.11b participant will reduce the data rate of the overall 802.11g
(max.):?? Mbit/s
meters
use too both frequencies of 2.4 GHz and 5 GHz. Enterprises, however,
ahead to implement
to handle AES. The two are not compatible, they are completely
comply.
In 2007, task group TGmb was authorized to "roll up" many of the
many of the clauses. Upon publication on March 29, 2012, the new
the 5 GHz band, more spatial streams (up to eight versus four),
"Wave 2" devices with support for 160 MHz channels, four spatial
15
2.9 IEEE 802.11ad STANDARD and SPECIFICATION.
are being brought to market under the WiGig brand name. The
802.11ad is 7Gbit/s.
available for use at a given time and position. The physical layer
lower in the UHF and VHF bands than in the 2.4 and 5 GHz bands,
stream is 26.7 Mbit/s for 6 and 7MHz channels and 35.6Mbit/s for
will add new mechanisms for a faster initial link setup time.
(specifically China).
throughput of 802.11ac.
2.16 IEEE 802.11T STANDARD and SPECIFICATION.
The original goal of the IEEE 802.11 Task Group T (TGT) was to
Within the IEEE 802.11 Working Group, the following IEEE Standards
Mbit/s, 2.4 GHz RF and infrared (IR) standard (1997); all the others
2001)
(1999)
(2001)
IEEE 802.11e: Enhancements: QoS, including packet bursting (2005)
with b) (2003)
compatibility (2004)
2011)
(June 2012)
(expected
see WiGig
5.35/5.47
802.11n 2007 2.4 GHz or 540 Mbps 100 Mbps ~50 meters
ved
CHAPTER THREE
- Throughput requirements
resources.
Obtain floor plans for NOUN SST 6TH Floor included in the
project.
Determine how many Access Points it will take to provide
environmental challenges.
compatibility.
challenges:
- End-user requirements.
3.1.0 TECHNOLOGY
distributed APs and centrally coordinated APs– have benefits that are
Platform;
Network
characterized as follows:
- AP activity is coordinated by a wireless centralized controller.
- Supports PoE.
FIGURE 2: A Centrally Controlled Wireless Network, Planning a Wireless
Network
and effectively.
It is worth noting that when APs are first deployed, they must be
device by device, and hence if there will be more than just a few APs
- There are one or more large wireless coverage areas that require
coverage areas;
interface.
staff.
WLANs also pose management challenges very different from those of wired networks.
These challenges increase geometrically as WLANs grow in size, scope and complexity.
Emerging field tools are also complementing IT toolkits in filling the need to
effectively manage the wireless environments. These tools provide the ability to
detect rogue APs, determine security levels, determine where there are potential
interference sources for wireless, such as cordless phones, and analyze wireless data.
There are many different ways to set up a wireless network. A certain density of APs
consistent fashion; some aspects of wireless are unique. Wireless is a shared medium
and, as such, requires careful planning for dynamic usage profiles and capacity
variations.
Antennae allow for more efficient coverage for specific areas, and can help achieve
desired coverage, capacity and bandwidth objectives. A higher-gain antenna focuses the
radio’s RF energy into a smaller area to achieve higher signal levels and a better SNR
(Signal to Noise Ratio). This typically yields higher data rates over the area covered by
the antenna. For example, a library with floor-to-ceiling solid wood or metal
bookshelves, and
21
wireless network access of PDAs or laptops is required within this area, deployment of
4.0.1 Hardware
and
4.1.0 Software
35
throughput that a client can achieve. It is also directly related to the
effectively be without a link. The duration of the lost link will determine
if and how applications will be impacted. Note that last roaming was
such as voice and video are highly sensitive. Ensure that fast roaming is
delays do not occur. As such, even though the applications and the
Hence, start with the premise that the average application is not
applications and the network is only one of the challenges that must
be tackled when
defining WLAN architecture. Defining a wireless architecture to
support voice and video also introduces specific problems that must
it is unlikely that they will be roaming between APs, which sounds like
technology, five years is a very long time, and it may very well be that
over the WLAN. One such example, which could be used by students
the latest product patches are pushed to all clients. This will help to
devices and
laptops. A comprehensive, centralized dashboard to monitor, maintain,
for just patch management software. The feature and functionality set
controlled system that can enforce usage with and is compatible with
your hardware firewalls. All laptops with a wireless NIC must have a
will be critical for students taking their laptops home and then
built into Vista may provide sufficient baseline security for student
WLAN connections.
Anti-Virus protects and minimizes threats, and is essential for all laptops
not, definitions may not be updated and laptops would eventually get a
updates. Some small districts may have this in place on guest or even
existing legacy laptops accessing their WLANs. This practice should stop
immediately.
Protecting against this will dramatically reduce the level one technical
support requirements and support time and costs. Fewer users asking
to have their system cleaned means more time for more important
projects or additional training. Pop-ups can be frustrating and will
well.
who happens to come across a lost or stolen laptop, and includes all
VPN and more. Using EFS, systems will make it challenging, if not
impossible, even for a highly skilled user to crack and gain access
lost, no one could access the data on it. Imagine if a principal’s laptop
were stolen while travelling and all of the private data therein were
exposed to a thief.
CHAPTER FIVE
CONCLUSION.
5.1 RECOMMENDATION.
making.
single laptop make and model for every eligible staff across the
district, or, multiple standard laptops and PDAs for association one-
to-one initiatives.
Some of the constraints encountered during this project design include the
following:
Financial Constraints: The design was achieved but not without
some financial involvements. One had to pay for the computer time
and buy network device (wireless router). Also the typing and
5.3 Conclusion.
cost effective design for school districts of all sizes implementing wireless
networks.
REFFERENCE
45