1.1 Preamble
Network topology can be defined in many ways since there are many different types of network that depending on the certain amount of user, ability, and purpose. For example, in Multimedia University (MMU) all networks inside our campus are connected through Local Area Network (LAN) to access MMLS for example. While when connected to outside through internet, we call it Wide Area Network (WAN). We are connected to the world via various network topologies, such as Point-to-point, Bus, Star, Ring, Mesh, Tree, Hybrid, and last but not least Daisy chain. Our interest regarding this Final Year Project is Wireless Mesh Network build based on Mesh Topology.
1.2 Motivation
This project is motivated by the application that can be utilized using a wireless mesh network and their advantages. Various technology companies show their interest in wireless mesh network by manufacturing several of the product based on this technology. Even though this technology still in early stage, increasing interest of the industry in this topic triggering more interest to researcher around the world to know more about this topic. Below are the main principle why wireless mesh network is one of the network topology that been focusing on:
• Higher capacity at low cost compared to other. The capacity of a wireless network can be improved by using a repeater if adding extra node are not worth. But to ensure we have a good coverage, we must know the distance between nodes also any inferences between the nodes.
• Easy network deployment since wireless mesh network have a capability for self-configuring to ensure the data transmitted reach at the destination. This is very useful when unexpected thing happen that make the node down for unknown reason.
...
... middle of paper ...
...g to the needs.
• Iw – External tools that need to be downloaded that able to configure and show information about wireless networking.
• Iwconfig – Been used to set the parameters of the network interface which are specific to the wireless operations.
• Ipconfig - Use to display current TCP/IP network configuration value including details of the network.
1.7.3 Hardware
4 identical laptops being used in this setup which have the following specification
Processor:
HDD Capacity:
RAM:
USB:
We also use 4 identical wireless USB adapter since we have a problem to create a wireless mesh network using an internal wireless card.
Standards: IEE 802.11n/g/b
Interfaces: USB 2.0
Frequency Range: 2.4~2.4835 GHz
Transfer Rate: Up to 150Mbps
Security: WEP, WPA/WPA2, WPA-PSK/ WPA2-PSK encryptions
Operating Temp: 0°C ~ 40°C
Operating Humidity: 10% ~ 90% RH
Figure 1: TL-WN727N
Wireless networks – While the term wireless network may technically be used to refer to any type of network that is wireless, the term is most commonly used to refer to a telecommunications network whose interconnection between nodes is implemented without the use of wires, such as a computer network. Wireless telecommunication networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or “layer” network.
“Network topology is the arrangement of the various network elements such as node, link, of computer network. Basically, it is topological structure of a network which ether be physically or logically.”
This can give you the IP address, MAC address and vendor on machines. Then one runs the Nmap -A xxx.xxx.xxx.xxx* command with the same address range to obtain the operating systems on those same range of machines and what application version it is. This also gives the open ports and what services are running on them. Now the IP, MAC address, vendor, port information, services, Operating system and the version are known. After all this information is known, one can utilize a mapping tool such as Solar winds that can give an actual picture representation of the network to visualize things. Next is enumeration to discover more specifics such as user accounts, group settings and application settings. Depending on the OS, version and if NET Bios is enabled, one could use null sessions to find lists of machines, shares, users, groups, and users/host ids. Using the Windows command line, type:
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
The main reason for this project is to provide wireless Internet con-nection that can be access in the vehicles all Spearman Enterprise em-ployees. The purpose of having ready to go internet service in all em-ployees vehicles is
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
The Wireless Markup Language (WML) is used to create pages that can be delivered using WAP. WML is a language that allows the text portions of Web pages to be presented on cellular telephones and personal digital assistants (PDAs) via wireless access. WML is part of the Wireless Application Protocol (WAP) that is being proposed by several vendors to standards bodies. The Wireless Application Protocol works on top of standard data link protocols, such as Global System for Mobile communication, code-division multiple access, and Time Division Multiple Access, and provides a complete set of network communication programs comparable to and supportive of the Internet set of
The rapid progress of embedded MEMS (micro-sensing technologies) and wireless communication has made wireless sensor networks possible. Such an environment may have many wireless nodes which are inexpensive; each node is capable of collecting, storing and processing environmental data, and communicating with neighboring nodes. These sensors are connected with wires in the past but tod...
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
4. In Edit Extra Device, select the device you want to add to the connection, and then click OK.
... middle of paper ... ... TCP/IP operates at levels 3 and 4 of the OSI model.
Wireless technology has come from the basics of cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with technology forever revitalizing. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing wireless Internet at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly via a router.
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.