LAB 12 Wireless Networks Wireless Devices Wireless Networks Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. Wireless LAN Components User Devices Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. The use of wireless LANs to network stationary PCs is beneficial because of limited needs for wiring. Laptops and PDAs, however, are commonly equipped with wireless LAN connectivity because of their portable nature. User devices might consist of specialized hardware as well. For example, bar code scanners and patient monitoring devices often have wireless LAN connectivity. Radio NICs A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity. A wireless LAN radio NIC, sometimes referred to as a radio card, often implements the 802.11 standard. The cards generally implement one particular physical layer, such as 802.11a or 802.11b/g. As a result, the radio card must utilize a version of the standard that is compatible with the wireless LAN. Wireless LAN radio cards that implement multiple versions of the standard and provide better interoperability are becoming more common. Wireless LAN Components Access Points An access point contains a radio card that communicates with individual user devices on the wireless LAN, as well as a wired NIC that interfaces to a distribution system, such as Ethernet. System software within the access point bridges together the wireless LAN and distribution sides of the access point. The system software differentiates access points by providing varying degrees of management, installation, and security functions. Figure 5-1 shows an example of access-point hardware. WEP Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity ( Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. A wired local area network (LAN) is generally protected by physical security mechanisms (controlled access to a building, for example) that are effective for a controlled physical environment, but may be ineffective for WLANs because radio waves are not necessarily bound by the walls containing the network. WEP seeks to establish similar protection to that offered by the wired network's physical security measures by encrypting data transmitted over the WLAN. Data encryption protects the vulnerable wireless link between clients and access points; once this measure has been taken, other typical LAN security mechanisms such as password protection, end-to-end encryption, virtual private networks (VPNs), and authentication can be put in place to ensure privacy. Establishing Wireless Network in CPT 1. Add a Router, one PC and One Switch on interface (One Side) 2. Add 1 PC, 1 Smartphone, 1 Printer, 1 Laptop & 1 Tablet. (Second Side) 3. Connect one PC with Switch and that switch with Router. 4. Assign IP to that one PC and Router’s Interface. (One Side) 5. On the Other Side add a device Access Point from Wireless Networks Devices (AP-PT) 6. Assign IP to PC , Laptop , Tablet and Printer of same network Number. 7. Add NIC of Wireless in Laptop and PC if not present. 8. Connect Access Point with Switch. 9. And Configure Access Point (by setting Security Setting WEP and setting a name and Password). 10. Connect wireless devices with Access Point and Send Message to verify Connection. Task Add 2 Routers to establish two different Networks
These both networks must have Wireless devices. Configure and send message to verify Connection.