1.1 Preamble
Network topology can be defined in many ways since there are many different types of network that depending on the certain amount of user, ability, and purpose. For example, in Multimedia University (MMU) all networks inside our campus are connected through Local Area Network (LAN) to access MMLS for example. While when connected to outside through internet, we call it Wide Area Network (WAN). We are connected to the world via various network topologies, such as Point-to-point, Bus, Star, Ring, Mesh, Tree, Hybrid, and last but not least Daisy chain. Our interest regarding this Final Year Project is Wireless Mesh Network build based on Mesh Topology.
1.2 Motivation
This project is motivated by the application that can be utilized using a wireless mesh network and their advantages. Various technology companies show their interest in wireless mesh network by manufacturing several of the product based on this technology. Even though this technology still in early stage, increasing interest of the industry in this topic triggering more interest to researcher around the world to know more about this topic. Below are the main principle why wireless mesh network is one of the network topology that been focusing on:
• Higher capacity at low cost compared to other. The capacity of a wireless network can be improved by using a repeater if adding extra node are not worth. But to ensure we have a good coverage, we must know the distance between nodes also any inferences between the nodes.
• Easy network deployment since wireless mesh network have a capability for self-configuring to ensure the data transmitted reach at the destination. This is very useful when unexpected thing happen that make the node down for unknown reason.
...
... middle of paper ...
...g to the needs.
• Iw – External tools that need to be downloaded that able to configure and show information about wireless networking.
• Iwconfig – Been used to set the parameters of the network interface which are specific to the wireless operations.
• Ipconfig - Use to display current TCP/IP network configuration value including details of the network.
1.7.3 Hardware
4 identical laptops being used in this setup which have the following specification
Processor:
HDD Capacity:
RAM:
USB:
We also use 4 identical wireless USB adapter since we have a problem to create a wireless mesh network using an internal wireless card.
Standards: IEE 802.11n/g/b
Interfaces: USB 2.0
Frequency Range: 2.4~2.4835 GHz
Transfer Rate: Up to 150Mbps
Security: WEP, WPA/WPA2, WPA-PSK/ WPA2-PSK encryptions
Operating Temp: 0°C ~ 40°C
Operating Humidity: 10% ~ 90% RH
Figure 1: TL-WN727N
Project Name: Wireless Network Connection and Access for all offsite employees, mobile devices and buildings.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
In this modernize world, internet and network are very vital and important not only for individuals but also for companies, organization, institution, etc. Because of this, it is very important to make use of as many network devices available. We need to study more or at least to have a glimpse of information about the networking devices before we choose or start using it. There are many networking device out there that able for us to study but the chosen device for this report are hub, switch, router and repeater.
Manufacturers and network managers use the IEEE 802.11 specifications as a standard for implementing WLANs. The first version of the standard came out in 1997 and was further improved two years later. Since then, the IEEE introduced numerous amendments to improve the initial standard. These include enhanced security with WPA2 (802.11i), protected management frames (802.11w), and higher throughput improvements (802.11n). The IEEE continues to introduce additional functionality as with the recent 802.11ac and 802.11ad amendments, which aim to achieve very high throughput with less than 6 gigahertz and 60 gigahertz respectively. These new developments happen rather quickly, an average of two new amendments per year, but it takes some time for these to be integrated into most commercial devices and networks.
in order to generate the LAN protocol and wireless LAN interface. The access points that are used for the
A Mesh topology is a style of connecting computers in a network in a fashion where every link has a redundant path. A mesh topology is also known as a self healing network in that if a segment of the network fails for what ever reason then the data can still be transmitted across another linked path. This would include possibly hoping across a few extra network segments to reach the destination but it would be able to do it. This redundancy of course comes with a price for the extra pathing that would be incurred to ensure that every node will be able to see every other node.
Mesh networks are reliable, stable, and redundant. If a node can no longer operate, all the others are not affected as they can still communicate either directly or through one or more intermediate nodes. Mesh networks can be very expensive due to the large amount of cable and connections required.
For mini project of this subject, I choose to analyze performance management of different Wi-Fi based on context Wi-Fi service provided in my house area which is SriPuteri WifiNet. To analyze the performance management, I have to identify the problem statement, scope and method to use. In Local Area Network (LAN), although multiple device such as PC, laptop, mobile phone and many more can connected to Wi-Fi but as the increasing of device used, the network can become slower because of data traffic congestion. To overcome the problem, it is essential to have a good Network Management plans.
A wireless sensor network is a set of wireless sensor nodes that organizes a network by itself without the need to have a decentralized communication infrastructure. Numerous functions are performed by the sensor nodes, such as collection of the information, after which the processing of the information is done and finally the storage of the information takes place along with the wireless communication. It consists of large number of sensor nodes and a limited number of sink nodes. Data which is collected by the sensor nodes is then transmitted in the sensor field. The information sent by the sensor nodes are made accessible to the users and also processed to the sink nodes [1].
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
There are many reasons why wireless networks are used. One reason is for a temporary backup to an
A typical network is shown in the figure above. WAN are commonly use the MESH connectivity network. The characteristic of the transmission facility lead to an emphasis on efficiency of communication technique in the design of WANs. Controlling the volume of traffic and avoiding excessive delay is important. Since the topology of WANs are likely to be more complex than those of LANs, routing algorithm also receive more emphasis. Many WANs also implement sophisticated monitoring procedure to account for which user consume the network resource. This i...
Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). Instead LAN, PAN also can be built using either wired or wireless technology. In this assignment, i will focus on Wireless Personal Area Network (WPAN) which is implemented IEEE 802.15 standard based on the smart home environment that would enable an elderly to stay in their home, instead of a health care center so that they can live independently. Therefore, this is the opportunity for us to explore, design and layout network infrastructure by using our background knowledge in data communication and computer networks.
William A. Arbaugh, YC Justin Wan, Naren Aar Shankar, 03-30-01 Your 802.11 wireless networks has no clothes University of Maryland Department of CSIS
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.