Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1.

Introduction

The primary requirements of the project, Implementation of wireless LAN, is to be able to access
Internet and also other software like word processor and spreadsheet. The enterprises that we
have selected is Himalayan Infrastructure Fund Limited(HIFL) that contains about 30
employees So, in order to design the wireless LAN (WLAN), first step will be conducting
wireless site and survey and gather all the requirements for deployment of WLAN. The survey is
conducted to identify the existence of radio interference causing problems to the signals. Also, it
will add advantage in minimizing the number of wireless Access Point and its optimal placement
thereby improving coverage.
After the completion of the survey, result obtained is used to determine the requirement of
hardware & software and its successful implementation. Appropriate site survey tool is used
while conducting survey. Significant amount of research is carried out while selecting hardware
which includes routers, switches and access points. Documentation is maintained properly
starting with the survey to the final implementation stage. Also, it is considered for future
enhancement if the enterprise requires for it.

2. Assumptions
2.1 Scope
 To connect employee of HIFL with telecommunication
 To enhance remote connectivity and digitalization.
 To take consideration of future requirements and manage it accordingly.
 To adopt latest technology and upgrade time to time

2.2 Limitations
 Wireless technology has security concern than that of wired technology.
 Connection is disrupted due to adverse weather condition and obstacles like
reflective, refractive and anti-RF walls.
 Wireless device consumes more power so that more power requirement is
needed.
 Possibility of obstacles in the future.

3. Site Survey and Recommended Solution


Since, information gathering is typically the initial step of a wireless LAN design and
implementation; we did carry out site survey of existing system. One of the most crucial
tasks before initiating the practical work of a project is to survey the site on which the
task need to be done. A site survey is the process of examining the location or spot in
order to obtain data or information. A site survey comprises of various techniques and
factors, depending on what type of plan needs to be executed on that location. Site survey
not only provides insight to the network consultant specialists, but also can save from lot
of trouble and potential dangers to the task. (Techopedia, n.d.)
With the process of site survey, it can provide solution for questions such as type of base
station to be used depending on the coverage area. Also, based on the collected
information, the profile of the system is finalized. Furthermore, the possible
interferences within the environment & other factors such as cost, maintenance and
government regulations can heavily influence the decision making on the selection of
outlines for the network. (Pareek, n.d.).
An interview is conducted on site with the clients to gather information regarding the
further requirement while deploying WLAN. The list of questions that was asked during
interview are listed below:
Figure 1: Questionnaire Form
The figure below shows the site Survey conducted with the help of Ekhau Heat Mapper.

Figure 2: Site Survey using Ekhau Heat Mapper


After surveying the existing network, we found the following issues:

 Damage in cable was found.


 All the systems were wired, so due to electrical problems HIFL employee were unable to
access internet as well as other required software.

Therefore, we planned in making all the computers of HIFL wireless by using wireless adapter.
For deployment of WLAN in HIFL, requirement that need to be fulfilled are found from site
survey as:

➢ Frequency bands to be used: 2.4 GHz

➢ Tools to be used in order to complete the survey: Ekahau Heat Mapper

Figure: WLAN Deployment

3.1 Ekahau Heat Mapper

This software is very important while doing survey as it facilitates in assisting in doing
different research. From site survey analysis, it was found that there were point of obstacles
and interference for installation of WLAN. Ekahu Heat Mapper was suitable in removing
constrains existed, and helped in mapping radio frequency interference at site as well as used
in analyzing of radio frequency ,coverage of WLAN and coverage capacity.

Ekahau Heat Mapper also helped in drawing Wi-Fi network map easily and has following key
features:
 Wi-fi-coverage is shown in map
 It locates all access points
 It detects security setting
 Designed for home and small office
 Free of charge, one-minute install
 Supports 802.11n, as well as a/b/g

4. Hardware and Software Requirement

While deployment of any network, proper consideration on hardware and software components
is very crucial. So, hardware and software required for implementation of WLAN on the selected
organization is described as follows:

4.1 Hardware Requirement

The hardware components we suggest in HIFL are as:

i. Wireless Antennas
ii. Wireless Adapter
iii. Wireless Router
iv. Rj45 with LAN Cable
4.1.1 Wireless Antennas

It picks up incoming radio signals and radiates outgoing Wi-Fi signals. Wireless mounted can be
mounted externally as in the case of router or may be internally embedded in some device
hardware itself. (Lifewire, n.d.)
Figure: Wireless Antenna

4.1.2 DOSNTO Adapter

It is an external device which is used to add wireless feature in the desktop eliminating the need
of hardware and cables. It receives signals from router so that internet connection is possible for
the device in the range of wirelss hotspots. Wireless USB connectors can be used to connect
computer without any need of additional tools thereby no any extra expenses.
Figure: DONSTO Adapter

4.1.3 TP-Link Archer C20 AC750 Wireless Dual Band Router

Wireless router can be used to send data from internet cable to device as well as it works as
access point, from which data can be shared through radio signals instead of cable. It can act as a
gateway between networks, can function is both wired and wireless LAN depending on the
manufacturer model. The router that we have chosen for HIFL is Archer C20 AC750 Wireless
Dual Band Router.
Figure: TP-Link Archer C20 AC750 Wireless Dual Band Router
4.1.4 RJ45 STP Ethernet Network Patch cable

We have chosen t5ft CAT 5E snagless shielded Ethernet Network Patch cable black. It is ideal
solution for our network requirement. Its installation is easy and is more durable and has low
loss. Also, it provides protection from EMI noise and electromagnetic interference.

4.2 Software requirement:

4.2.1 Client utility software:

It needs to be upgraded occasionally through which user can add new features or settings thereby
enhancing the performance. It contains device drivers which makes possible for hardware device
to communicate with OS. Each device has its own driver, so for setting up WLAN, we will be in
need of TP-Link router and WLAN device driver

4.2.2 Network Management System

This system comprises of list of hardware and software tools used to manage individual
components of network. It is used by IT professional for following purpose:

• Network device discovery: It helps in identification of devices present in the network.


• Network device monitoring: It helps in determining overall health of network and overall
performance

• Network performance analysis: It helps in tracking different performance indicate like


bandwidth utilization, packet loss, latency etc

• Intelligent Notifications: It provides configuration alerts through paging, emailing or texting to


network administrator

4.2.3 Operating System:

It is the most important program which runs on the computer and performs various tasks; it takes
input, sends output, keep track of files and directories, controls peripheral device. While setting
up WLAN device, we require OS such as Windows, Linux etc.

4.3 Considerations:

 Setup to be easier for installation


 Setup to be workable in overall organization
 Setup should be flexible for maintenance
 Provision of proper monitoring in setup
 Security system should ensure of preventing from any external intrusions
 Budget limit should be maintained while implementing overall setup
4.4 Justification

As, we have been assigned the task of deployment of wireless network (WLAN), we need to
consider various parameter such as security, budget etc. For the purpose of security, wireless
router with advance security features such as AES and WPA, WPA2SK and WAP is used for
protecting against unauthorized access, data encryption, Firewall and SSID hiding. In addition,
for lowering the cost of installation, recommendation of device able to perform multiple function
is done.

5. Security and maintenance


5.1 SSID Hiding: It is the name provided to the wireless network which stands Service Set
Identifier and is one of the easy way of providing security to the network.
Figure:SSID Hiding
5.2 MAC Filtering Media Access Control
The most effective way of securing the network is MAC Filtering Access control, where only
selected number of clients can access the network. In this process, Mac address of connecting
device is inserted into the router so that only those devices can access network

Figure: Mac Filtering


5.3 Firewall:
All the incoming and outgoing network traffic are controlled using advance set of security
rules is known as fire wall
• It provides defend mechanism to resources
• It helps in validating access.
•It involves in managing and controlling network traffic
• It involves in reporting and recording any event

5.1 Encryption:
Network encryption helps in blocking access of unauthorized person from stealing the
bandwidth that we are paying for. WPA2 provides better security to wireless network over
WEP and WPA.

Figure: Encryption

5.2 Changing default router password


There is a provision of default login option for router which increases the threat of accessing
from the outsiders. So, for this reason, password need to be changed.

Figure: Changing default Password


6. Monitoring and Maintenance
It is the process of observing network components by using specialized management
software tools where it detects and provides alert to the poor performance of the network
Types of monitoring:
6.1 Performance monitoring
It is used in evaluating, analyzing, reporting and tracking performance of computer
network. We have used performance monitor to identify current network issues as well
for future network expansion.

6.2 Fault Monitoring:


It measures the problem occurring in any parts of the network system like hardware and
software

6.3 Maintenance:
It involves troubleshooting networking problems and different configuration in hardware
and sofrware and providing security to the network.
Types of maintenance:
6.3.1 Preventive Maintenance: It is carried out before the fault or failure occurs in the
network system
6.3.2 Corrective Maintenance: It is carried out after the occurrence of fault or failure, so
it involves rectification of fault and replacing any network components which leas to the
failure.

7. Conclusion
Site survey for setting of Wireless LAN was carried out using appropriate toos like Ekhau
Heat Mapper. It was very crucial in identifying the points of obstacles causing
interference. This assignment helped me to understand the procedure to perform site
survey in a workplace environment. Also, based on the findings of the survey, it helped
me to set proper hardware and software requirements. Furthermore, Other findings that
was known during this study was how environment conditions such as reflection,
refraction, diffraction etc affects the signals.

REFERENCES:
1. AccessAgility (2017) WiFi Network Design Considerations [Online]. Available from:
https://www.accessagility.com/blog/wifi-network-design-considerations [Accessed:
16th August 2020].
2. Al Agha,K. Pujolle,G. and Ali Yahiya,T.(2016) Mobile and Wireless Networks
(Networks & Telecommunications Series: Advanced Network Set). New
York:Wiley.ISBN-13: 9781848217140.
3. ASUS Malaysia. (2020). Networking | ASUS Malaysia. [Online] Available from:
https://www.asus.com/my/Networking/ [Accessed: 4th September 2020].
4. Bartz,R. J.(2017) CWTS, CWS, and CWT Complete Study Guide: Exams PW0-071,
CWS2017, CWT-2017 .3rd Edition.New York:Wiley.ISBN-13: 978-1119385035.
5. CISA (2020) RADIO FREQUENCY INTERFERENCE BEST PRACTICES
GUIDEBOOK National Council of Statewide Interoperability Coordinators
6. Coleman, D.and Westcott, D.(2018) CWNA Certified Wireless Network
Administrator Study Guide: Exam CWNA-107. 5th Edition. Sybex. ISBN-13: 978-
1119425786.

You might also like