Está en la página 1de 36

Task 01 Wireless Network Introduction Wireless Network infrastructure is best suited for this type of scenario, because those

e networks make people to access the system more easily and more flexibility on work place. In this section the report is going to investigate on what is the best suited wireless network System, for the organization. To achieve that objective first this study going to do a research on main equipments that needs to be installed and what are the special features within them, and what are those equipments main abilities that perform. Discussion on best suited wireless network type for the organization Normally, if there are two devices with wireless connectivity, such as wireless enabled PDAs, Laptops or desktop computers; those can communicate with in adhoc wireless network. Commonly any device enabled with wireless network adaptors within the range of each other can communicate with each other over such adhoc network. By extending that this organization has number of departments and also there is a need for centralized information accessing , so for that reason, this organization needs a more traditional network, where there is multiple clients connects to a central point which acts as a gateway to the rest of the world. In here this network needs wireless routers, wireless access points to implement such infrastructure mode network. Wireless access point can be use to join the wireless devices to another networks also, which means if this organization wants, there can be large LAN, and with in it, can implement department based LANs for each and every department. Also by using wireless antennas, the signal strength can be also enhanced and extend the networks effective area. All of the wireless-enabled clients would then connect to the wireless router. Typically the wireless router will act as the DNS server and Internet gateway for the clients attached to it and it can also be configured to provide IP addresses automatically using DHCP.

Summery on Network devices needs to implement the wireless Network Wireless Network Adaptor

This is a slim, credit card sized PCMCIA device. There are also wireless network cards which are PCI cards for desktop computers and if wanted there are adaptor cards that allow desktop computers to use PCMCIA cards. The other desired things is these network adaptors has the facility of USB, which is plug and play connectivity, and this makes USB port to provide wireless connectivity. Features of Wireless Network Adaptors A wireless network adapter allows a computing device to join a wireless LAN. Wireless network adapters contain a built-in radio transmitter and receiver. Wireless network adapters also exist in several different form factors. Traditional PCI wireless adapters are add-in cards designed for installation inside a desktop computer having a PCI bus. USB wireless adapters connect to the external USB port of a computer. Some notebook computers are now manufactured with built-in wireless networking. Small chips inside the computer provide the equivalent functions of a network adapter. These computers obviously do not require separate installation of a separate wireless network adapter. Cost for Implementation, it costs around LKR 7,500 8,000. Cost for Maintenance, for maintenance has to hire a network administrator to assign IPs and all for the network as well as Network administrator has to configure the router also, to get the optimized output.

Wireless Router

This also acts as same as wired router to connect networked devices to other networks or to the Internet. Common features of a wireless router include DNS (Domain Name System) facility, DHCP, Firewall facility (Hardware) and data encryption facility. Features of Wireless Router These also contain a network switch to allow some computers to be connected with Ethernet cables. Wireless routers allow cable modem and DSL Internet connections to be shared. Many wireless router products include a built-in firewall that protects the home network from intruders. Wireless routers are small box-like devices generally less than 12 inches (0.3 m) in length, with LED lights on the front and with connection ports on the sides or back. Some wireless routers have the feature of external antennas that protrude from the top of the device; others contain built-in antennas. Wireless router products differ in the network protocols they support (802.11g, 802.11a, 802.11b or a combination), in the number of wired device connections they support, in the security options they support, and in many other smaller ways. Cost for Implementation, it costs around LKR 12,000. Cost for Maintenance, for maintenance has to hire a network administrator to assign IPs and all for the network as well as Network administrator has to configure the router also, to get the optimized output.

Figure 1 : Wireless Router

Wireless Access Point

This is like a hub for wireless networks; it does not implement a different IP address range or provide the other features of a wireless router. It simply relays network traffic to the wireless devices such as wireless network adaptors within its range. Features of Wireless access point A wireless access point (sometimes called an "AP" or "WAP") serves to join or "bridge" wireless clients to a wired Ethernet network. Access points centralize all WiFi clients on a local network in so-called "infrastructure" mode. An access point in turn may connect to another access point, or to a wired Ethernet router. Wireless access points are commonly used in large office buildings to create one wireless local area network (WLAN) that spans a large area. Each access point typically supports up to 255 client computers. By connecting access points to each other, local networks having thousands of access points can be created. Client computers may move or "roam" between each of these access points as needed. Wireless access points can be used to extend an existing home network based on a wired broadband router. The access point connects to the broadband router, allowing wireless clients to join the home network without needing to rewire or re-configure the Ethernet connections.

Cost of implementation, is LKR 10,000 12,000

Wireless Antenna

In some cases a wireless antenna may be required to either extend the broadcast range of the wireless router or access point or to increase the range from which a wireless network adaptor can receive a signal. Features of Wireless Antenna Increases the distance over which a WLAN signal can spread, overcoming obstacles and enhancing overall network signal quality. Several different forms of wireless antennas are available. These products are sometimes called "range expanders" or "signal boosters." A wireless range extender works as a relay or network repeater, picking up and reflecting WiFi signals from a network's base router or access point. The network performance of devices connected through a range extender will generally be lower than if they were connected directly to the primary base station. A wireless range extender connects wirelessly to a WiFi router or access point. However, due to the nature of this technology, most wireless range extenders work only with a limited set of other equipment. Check the manufacturer's specifications carefully for compatibility information. Cost of implementation, is LKR 22,000

Wireless CCTV Camera

The other thing according to this educational institute case is the security of the premises, to do that task the wireless network can include some CCTV cameras for monitoring purpose within the school premises. This cameras had no wired connectivity, and can act as a Pc with a specific IP assigned to it. Features of Wireless CCTV Camera resolution of the captured video images (for example, 320x240 pixel, 640x480 pixel, and other image sizes) Motion sensors and the ability to send email alerts when new activity is detected and captured ability to timestamp images built-in microphones and/or jacks for external microphones, for audio support types of WiFi security supported, such as WEP or WAP

Cost of implementation, is LKR 10,000 each

Conclusion and Recommendations According to above given information, this future education college needs a wireless network, which has the same structure such as traditional wired centralized networks. In other words, there must be a central processing server and all the departments and staff room as well as students waiting areas should be connected to that central server. Also the Internet facility should be available throughout the college, but that Internet service must be distributed through the central Internet server. Also to the students intranet, there also be file server to store all the students and courses learning resources as well as the information that needs for the academic staff people. So by considering all those requirements, the best suited network system for this college is Wi-Fi (Wireless Fidelity) enabled environment. The conceptual map of this network will give in next section of this report and below is given the cost for this implementation and Maintenance. Budget for Network system implementation of this College Implementation Cost for Proposed Network Infrastructure Equipment Description Amount Cost 7

Needs File Server Internet Server Streaming Server (CCTV) CCTV Wireless Camera Wireless Router Wireless Access Point Wireless Antenna Wireless Network Adaptor Cards Other Overheads Total Cost for Implementation 1 1 1 5 1 6 1 60

(LKR) 100,000 100,000 80,000 60,000 12,000 60,000 25,000 480,000 45,000 962,00 0

Maintenance Cost for Proposed Network System Cost Cost Description (LKR) For Network Administrator 45,000 For Technical Staff Members * 5 60,000 For maintenance activities 15,000 120,00 0

Total Maintenance Cost

Task 02 Signal Strength Introduction In this section of this report, the discussion is on factors affecting to the signal strength of the wireless network. And then discussing on how to minimize those signal weakening and suggest how to implement the network system, by supporting with a Network diagram. Finally this section formulates the instructions to utilize the network signal strength within the premises. Factors effecting to the Wireless networks signal strength Wireless signal strength concerned with the intensity of the radio frequency that a wireless receiver is able to pick up. A weak wireless signal can cause connectivity and performance problems with wireless devices. For example, 8

weak signals can cause cell phones to cut in and out during conversations, or laptop computers to lose wireless Internet connections. Several factors influence the strength of wireless signals; unfortunately, many of these factors are out of a user's control. Interference

All wireless networks, such wireless local area networks, or WLANs, rely on broadcasting stations that transmit signals. These stations, which include large antenna towers as well as small wireless Internet routers, transmit signals at specific radio frequencies. Unfortunately for users of wireless devices, several other machines can output signals at the same frequencies as wireless broadcasting stations, making it difficult for wireless signals to flow smoothly. When such disruptions occur, the effect is known as interference. Examples of interference-causing machines include microwave ovens, baby monitors and garage door openers. Obstructions

Wireless signals transmit fastest through open spaces. So if there are large or numerous obstructions such as walls, partitions between wireless transmitters and wireless receivers, signal strength suffers. For WLANs, common obstructions that come between wireless routers and wireless devices, weakening signal strength, include walls, floors, furniture and appliances. In all instances, metal obstructions tend to have the biggest impact on wireless signal strength. In this college scenario, the main obstruction is the Walls that use to partition the departments.

Location

Even when there are few obstructions between a wireless transmitter and receiver, the overall distance between them affects wireless signal strength. Wireless signals cannot travel indefinitely, as they eventually disperse and become absorbed by the surrounding environment. With a WLAN, a wireless router positioned at one end of a building will not be able to integrate with a device at the other end. Anyone who has been in a remote area and

disconnected from the Wi-Fi connectivity may understand this type of situation. Hardware

In some other situations where poor wireless signal strength is the result of inadequate or dysfunctional hardware. As an instance, if a laptop computer has an outdated or damaged wireless network adapter card; it may struggle to receive a signal from a wireless router. Alternatively, if a wireless router has a damaged or poorly designed or positioned antenna, it may not be able to provide as strong a signal.

Discussion

on

implementing

Wireless

network

within

optimized

resource usage To make optimized wireless network structure, there should be number of counter measurements have to be making. This section elaborates what are things to be follow to increase the signal strength within the school premises. 10

First thing is to position all the wireless router, modems or access points in a central location in the building. As an example, the access point of engineering a Science department must be placed in a central location of that department area. Below illustration explains that;

If your wireless router, modem router, or access point is against an outside wall in specific location, the signal will be weak on the other side of that specific location. If router is on the first floor and PC or laptops are on the second floor, place the router high on a shelf in the room where it is located. Don't worry if can't move your wireless router, because there are many other ways to improve the connection. The other most important counter measure is to move the router off the floor and away from walls and metal objects; those metal objects can be file cabinets, rolling doors and windows. Metal objects, walls, and floors will interfere with your router's wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be.

Also the other important aspect o this college scenario is signal wastage to outside of the premises. This cant be controlled using standard routers, because standard routers have antennas which distribute signal ominidirectional, 11

meaning that they broadcast in all directions around the router. If the router is near an outside wall, half of the wireless signals will be sent outside from college, and much of your router's power will be wasted. Most routers don't allow increasing the power output, but can make better use of the power. Routers antenna is removable, so upgrade to a high-gain antenna that focuses the wireless signals in only one direction. Then aim the signal in the direction need it most.

Use External USB wireless network adaptors for the PCs of the college that helps in utilizing the power and network signal wastage. Because wireless network signals must be sent both to and from computers. Sometimes the router can broadcast strongly enough to reach computer, but computer can't send signals back to router. To improve this, replace PC card-based wireless network adapter with a USB wireless network adapter that uses an external antenna. These add an external, high-gain antenna to computers in school and can significantly extend wireless range. And the other techniques that have to use in implementing this network system is to add wireless repeaters as needed, because Wireless repeaters extend wireless network range without requiring to add any wiring. Just place the wireless repeater halfway between wireless router, modem router, or access point and computers, and that can get an instant boost to wireless signal strength. One last thing that has to keep in mind when purchasing for this network system equipments is to pick equipments from single vendor. Although a Linksys router will work with a D-Link network adapter, often get better performance if pick a router and network adapter from the same vendor. Some vendors offer a 12

performance boost of up to twice the performance when choose their hardware. Linksys has the SpeedBooster technology for its wireless-G devices, and D-Link has the 108G enhancement for its wireless-G devices. Proposed Network Plan for the future education college By including all the strengthen techniques and tips discussed above, this is the final network structure that have to implement within the college premises.

13

Now move on to more detailed view of the network 1. Each Department Structure

2. Staff Room Area

14

3. Computer Lab of Students

4. Central Server Room

Task 03 Network Access Mechanisms 15

Introduction This section of this report is going to discuss critical yon how the network access should be maintained throughout the network, because that is an essential factor for an organization like this. Because there must be a mechanism to reach whatever they need by the authority. Mechanisms for accessing the wireless Network When discussing on the mechanisms, first of all to access to the wireless network every person must configure their workstation or laptop with the Wi-Fi configuration according to the schools standards. Then as for the primary purpose of having Internet service throughout the college Wireless network, the user has to have type the authorization code that given by the network administrator. By having access in to the internet server, any user can have the Internet Service. That means access to the proxy server of the wireless network, to get the Internet service; every user will give same authorization code. There is no uniqueness. But that cannot be implemented to access to the file server, because that is the place where, college puts educational resources and as well as students sensitive data such as examination papers, Privacy information. So here the administrator cam not provide same authentication for all. So administrator must divide all the users in to separate user types. For this scenario, there can be user types such as Student Lecturer Program Coordinator Manager Accountant

So those groups have different but common for the group, User Names and Passwords. Then administrator can distribute them to correct user groups Authentications. And also according to the college scenario, there is a need to create their own personal logins. To provide Email facility and also personal logins will helps to the 16

students and lecturers to check and keep pn record on their performance. To implement that other than those authentications, Network must implement personal level logins, that each user has unique Username and Password. The problem of having open access to all the people means, outsiders also can connect to the wireless network, as they needs and also, these wireless signals cannot be bound between the building, if the person is near to this building, that person also acquire these signals. So if there is open access those outside people also can access to the system easily, and can consume services as they needs. And also that is not good for the Information security in the college, because of that reason all the network services provided to the authenticated users using Passwords or by using authentication codes. The problem considering on specific area for the lecturers that cannot access to the student is the case that, because this is partially an E Learning facility is there, all the students educational progress information are also saved in same file server, that students access for their downloading resources. So if there is common area for all then, students will change their course works after they submit. Also exam papers cannot be making hide, because all of them has same authority, level. And also that would be highly considering matter on information privacy on student details, because any one can access to others personal information means there is no privacy protection in that network, so that makes users less confident on using the network as a secured area. So those issues can be avoided when there is separate area for lecturers that cannot be access by the students. So to protect from those all problems, access mechanism to the network has been proposed as below; Access Level 01 - Common Authentication Code to access the wireless network Facilities Provided 1. Access to the Internet service 2. Access to discussion board of the intranet which includes all the new events of the college 3. Access to the intranet and use interactive applications 4. Access to use applications 17

Access Level 02 Authentication for different user levels with common User name Passwords for each level User Group Administrator Facilities Create User Logins Change Networks User name and Password Access to every area of the Network Fully Controllability Access to Reports Access to progress Reports Access to financial Information Access to learning Resources Upload facility on E Books E Library Facility access Learning resources uploading facility Sample examination uploading facility Access to the Results Learning resource download section Sample examination section access Discussion board facility

Manager

Lecturer

Student

18

Access Level 03 Individual User Name and Password Other than above mentioned facilities these authentication levels provide some more services and facilities; For Lecturers 1. Online marking the register of their classes 2. Upload marks of their students on their subjects 3. Access to email facility 4. Upload lecture materials of their lessons to the learning facility 5. Access to online chatting facility through the intranet For Students 1. Access to the email Facility 2. Access to online discussion forum within the intranet 3. Access to online chatting facility through the intranet 4. Access to their personal logins and download past papers and examination results 5. Access to the online examinations 6. Access to the Assignment upload section and learning materials download section Above mentioned access mechanism can be implemented within the proposed wireless network system and that makes secure network access to the users of the System. And as well as that makes the system more structured. Next section of this discussion, provide you the brief User guide on how to access to the wireless Network.

19

User Guide to Configure / Connect Wireless Network


Before you can connect to a Wireless network, your notebook or desktop must have a wireless network adapter. Most notebooks will require a PCMCIA wireless network adapter to be inserted and installed in the PCMCIA slot. Other notebooks will have the wireless adapter built-in to the notebook itself. You can add Wireless PCI card similar to the one shown in the below image in case of Desktops: PCI Wireless Network Adapter: Make sure your wireless mini-PCI/PCMCIA Wireless Ethernet card is properly installed and recognized: 1. 2. Right click My Computer icon and select Properties. Click Hardware tab, click Device Manager button.

3. 4.

Click on the "+" next to Network adapters. Your Wireless Ethernet card should be listed beneath Network adapters. (e.g. 802.11b wireless PCI card) If there is a "!," or "x" next to the name of the card, or if your Ethernet card is not listed, Windows is having trouble recognizing it. Click Cancel to close the System Properties window.

5.

20

6.

Reinstall the drivers using the CD that came with the card. If it is preinstalled one from HP check for drivers at the following link: http://welcome.hp.com/country/us/en/support.html

Connecting to the Network:

Notebooks with built-in wireless adapters usually have a wireless on/off button located on the front or side of the notebook.

1. After enabling the Wireless Network card, the Windows XP Wireless Z Configuration

icon will appear in your computers system tray (see Figure below). Double-click the icon.

2.

The screen that appears will show any available wireless network. Select the

network you want. If you have already enabled WEP encryption on your network, skip ahead to step 3. If you have NOT enabled WEP encryption on your network, the screen in Figure below will appear. Check the box next to Allow me to connect to the selected wireless network, even though it is not secure. Then click the Connect button and continue to step 4.

21

3. The screen in similar to the below Figure will appear. Enter the WEP key of your wireless network in the Network key field, and re-enter it in the Confirm network key field. Then, click the Connect button. Enter the keyword wireless in the Windows XP search engine.

4. The screen in similar in the below Figure will appear if your connection is active.

22

Wireless Network Access Configuration/ Connection Manually If your Wireless network card does not prompt the available connections or if it does not connect, configure your Network Settings: From the Start menu, choose Control Panel. Click Network and Internet Connections. In the Pick a Control Panel list click Network Connections.

23

The Wireless Network should be listed under LAN or High-Speed

Internet as shown in the above image. If it is listed under Network Bridge as shown in the below image, right click Wireless Network connection and select Remove from Bridge option:

4.

Click the General tab and Select TCP/IP and click Properties button.

24

Select Obtain an IP address automatically and Obtain DNS server Click Ok.

address automatically.

Change the default connection or settings specific to the network to which it connects: 25

1. 2. 3. 4. 5.

In Microsoft Windows XP click Start then Control Panel then Network and Internet Connections. Double-click Network Connections. Right-click the Wireless Network Connection icon and select Properties. Click the Wireless Networks tab. On the Wireless Networks tab, each network available within range is listed under Available networks. Click the network that you are connecting to and click Configure. Figure: Wireless Network tab and Available networks

Screen Shot before Windows XP Service Pack 2 update:

Screen Shot after Service Pack 2 update:

6.

If there are no networks listed under Available networks then you are out of range of the wireless router/access point or the Router is not detected properly.

7.

On the Association tab the Network Name (SSID) and wireless encryption (WEP) settings can be configured. Wireless networks have varying degrees of security. Some wireless networks do not require encryption and 26

the settings on this tab will be automatically setup for you. If this describes your network, click OK and continue. If the wireless network that you are connecting to uses standard encrypted communication, check the Data encryption (WEP enabled) option, and then uncheck the option for The key is provided for me automatically. Complete the wireless encryption configuration by typing the Network key into the Network key: and Confirm network key: text boxes. Then select the correct number in the Key index (advanced) box. See your network administrator or your wireless router software for the required network key and key index. Click OK to return to the Wireless Network Connection Properties. If you do not want to connect to non-preferred Networks, click Advanced tab and make sure to uncheck Automatically Connect to Non-Preferred Networks. You will find a third tab Connection after applying Windows XP Service Pack 2 in Wireless Network properties. This determines if you want to connect to this Network automatically:

27

If the settings you have configured are correct, the network name will be listed in the preferred networks list. Click OK and close your Control Panel. Your notebook should now be connected to the wireless network or you may have to restart your notebook for some changes to take effect.

Task 04 LAN (Local Area Network) 28

Introduction In this section of this report, the primary aim is to get the understandability of the Local area network design structures. In this section each and every common topologies are getting in to consideration and then evaluating them by discussing on advantages and disadvantages of them. Finally by concerning all those evaluation formulating the recommendations for which type has to be implemented in this future education college situation. Description on Topologies Network topology is the layout pattern of interconnections of the various equipments of a network. Network topologies may be physical or logical. Physical topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. In general physical topology relates to a core network whereas logical topology relates to basic network. Topology can be considered as a virtual shape or structure of a network. BUS Network topology

In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the MAC address or IP address on the network that is the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted.

29

Advantages of BUS topology

1. The bus topology consists of only one wire, it is rather inexpensive to


implement when compared to other topologies. Disadvantages of BUS topology

1. The high cost of managing the network. 2. Since only one cable is utilized, it can be the single point of failure. If the
network cable breaks, the entire network will be down.

Star Network Topology

In local area networks with a star topology, each network host is connected to a central hub. In contrast to the bus topology, the star topology connects each node to the hub with a point-to-point connection. All traffic that traverses the network passes through the central hub. The hub acts as a signal booster or repeater. Advantages of Star Topology 1. The star topology is considered the easiest topology to design and implement. 2. Star topology is the simplicity of adding additional nodes. Disadvantages of Star Topology 1. Star topology is that the hub represents a single point of failure.

30

Ring Network Topology

A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring. Advantages of Ring Topology 1. Ability to send signal in both directions, so if there is cable failure, network can operates still in reverse direction Disadvantages of Ring Topology 1. High Cost have to be incurred 2. Managing the Network is not easy, because of complex subnet Mask structure

31

Extended star Topology A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based. If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies. Advantages of Extended Star Topology 1. It can make simpler the complexity of large network structures, because if organization wants a separate Networks for different departments, and also they needs one single main Network by interconnecting them all together, then the best option is to use this topology. 2. Easier for maintenance Disadvantages of Extended Star Topology 1. Implementation Cost is really high 2. Needs an expert to handle the Central Hub of the Network

32

Discussion on Network Media After considering on the network structures available for this type of scenario, now the discussion is moving on to what is the best suited network medium for the network, as we may concern this is a wireless network, so definitely we have to use radio frequency signals as the network medium. There are advantages of choosing that because it does not needs physical space for deployment, and easier to interconnect with the Network for new devices, because there is no need for implementing new wires or new places, new users can get connected with in the wireless network range, of they are authorized. Major disadvantages are because of obstructions and other interfering signals, these signals can be weaken and quality of the network service can be decreased. And also another problem is high probability of security breaches, because this network is distribute through the air, so there is no way to limit them inside the building and premises sometimes.

Conclusion and Recommendations In this task the best LAN Configuration for the future education college has been concerned. According to all above discussions, the best LAN Configuration for this type of situation is extended Star Configuration , because this organization needs separate network structures for each and every department, as well as they need to integrate all those departments as a one single network also. So to implement that, organization can implement small star structures within the departments and then can connect all those star networks to a single Hub, and 33

make the main Star. That makes easier for implement all the accessing mechanisms that had discussed earlier in this report. And for the network media that going to use is defiantly , radio frequency signals, because this is wireless network infrastructure, so we cannot use Copper wire cables or Fiber optic as the network media. Task 05 Wireless Network Security Introduction Security Issues related to Wireless networks in according to Email Accessing Security Issues related to Wireless networks in according to

Transmitting student Information Security Issues related to Wireless networks in according to use to store privacy data Data Protection Acts in regarding with Wireless Network Security Issues Conclusions and Recommendations

34

Task 06 Conclusion and Review This section is done to give the summarized details of this network

recommendations report. According to the first need for this research, firstly a research had been carried out to understand what the available network systems are and equipments that have to be use to develop this wireless network infrastructure for the future education college. According to that in first section of this report provided a budget for the Network implementation at the end. In the next section, main consideration is on how to optimize the network system to make the highest productivity. Soon there report has discussed various types of problems in relating to signal strength, and at the end it provided recommendations o how to minimize those damages to the signals. After that concerns on the network access mechanisms and at the need of that chapter, report gives recommended way of implementing access mechanism for this network structure. The next section dedicated to what are the possible network topologies and what is the best medium to use as the network media of this proposed network, so the recommendations had been given at the end of that chapter also. Finally report has discussed on security issues in related with the wireless networks and how can minimize those threats by using different techniques. As a review of this report, as the author I had gain mush higher and deep knowledge on Wireless Networks and the problems arise with it. And then I founded the way to minimize them to gain the highest productivity and the efficiency.

35

For improvement, I can suggest there must be some higher security related counter measures have to be implemented within the college, as well as this network structure has to b expanded with in the internet to gain access to the network at home through Private Virtual Private Network. And also have to implement some extended encryption methodology within the network to increase the data security.

36

También podría gustarte