You are on page 1of 8

Computer Networks Lab

INSTRUCTOR: JAWAD SHAUKAT


LAB 12
Wireless Networks
Wireless Devices
Wireless Networks
Wireless networks are computer networks that are not connected by cables of any kind. The use
of a wireless network enables enterprises to avoid the costly process of introducing cables into
buildings or as a connection between different equipment locations. The basis of wireless
systems are radio waves, an implementation that takes place at the physical level of network
structure.
Wireless LAN Components
User Devices
Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. The use of
wireless LANs to network stationary PCs is beneficial because of limited needs for wiring. Laptops and
PDAs, however, are commonly equipped with wireless LAN connectivity because of their portable
nature. User devices might consist of specialized hardware as well. For example, bar code scanners and
patient monitoring devices often have wireless LAN connectivity.
Radio NICs
A major part of a wireless LAN includes a radio NIC that operates within the computer device and
provides wireless connectivity. A wireless LAN radio NIC, sometimes referred to as a radio card, often
implements the 802.11 standard. The cards generally implement one particular physical layer, such as
802.11a or 802.11b/g. As a result, the radio card must utilize a version of the standard that is
compatible with the wireless LAN. Wireless LAN radio cards that implement multiple versions of the
standard and provide better interoperability are becoming more common.
Wireless LAN Components
Access Points
An access point contains a radio card that communicates with individual user devices on the
wireless LAN, as well as a wired NIC that interfaces to a distribution system, such as Ethernet.
System software within the access point bridges together the wireless LAN and distribution sides
of the access point. The system software differentiates access points by providing varying
degrees of management, installation, and security functions. Figure 5-1 shows an example of
access-point hardware.
WEP
Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (
Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with
a level of security and privacy comparable to what is usually expected of a wired LAN. A wired
local area network (LAN) is generally protected by physical security mechanisms (controlled
access to a building, for example) that are effective for a controlled physical environment, but
may be ineffective for WLANs because radio waves are not necessarily bound by the walls
containing the network. WEP seeks to establish similar protection to that offered by the wired
network's physical security measures by encrypting data transmitted over the WLAN. Data 
encryption protects the vulnerable wireless link between clients and access points; once this
measure has been taken, other typical LAN security mechanisms such as password protection,
end-to-end encryption, virtual private networks (VPNs), and authentication can be put in place
to ensure privacy.
Establishing Wireless Network in CPT
1. Add a Router, one PC and One Switch on interface (One Side)
2. Add 1 PC, 1 Smartphone, 1 Printer, 1 Laptop & 1 Tablet. (Second Side)
3. Connect one PC with Switch and that switch with Router.
4. Assign IP to that one PC and Router’s Interface. (One Side)
5. On the Other Side add a device Access Point from Wireless Networks Devices (AP-PT)
6. Assign IP to PC , Laptop , Tablet and Printer of same network Number.
7. Add NIC of Wireless in Laptop and PC if not present.
8. Connect Access Point with Switch.
9. And Configure Access Point (by setting Security Setting WEP and setting a name and Password).
10. Connect wireless devices with Access Point and Send Message to verify Connection.
Task
Add 2 Routers to establish two different Networks

These both networks must have Wireless devices. Configure and send message to verify
Connection.

You might also like