Professional Documents
Culture Documents
Wireless Communication Manual
Wireless Communication Manual
ENGINEERING
LAB MANUAL OF
WIRELESS COMMUNICATION LAB
ETEC 463
Vision of theDepartment:
To create the most conducive learning environment for quality education in computer science and
engineering and prepare the students for a globalised technological society and orient them towards
serving the society.
Mission of theDepartment:
• To impart high quality education and training to the students to make them world-class
Engineer with a foresight to the challenges and problems.
• To offer innovative solutions to benefits the nation and world at large.
Department GOALS:
• To build a team of academicians, to attain excellence, to offer programmes in computer science &
engineering at UG level.
• To motivate faculty members for higher education.
• To improve existing labs and develop new labs.
• To inculcate moral values in students.
Program Educational Objective:
PEO1: To train students to have successful careers in computer engineering field or to be able to
successfully pursue advanced degrees.
PEO3: Train students to communicate effectively, work collaboratively and exhibit high levels of
professionalism and ethical responsibility.
PEO4: To motivate graduates to engage in life-long learning and professional development to adapt
to rapidly changing work environment.
1.1 Objective
The objective of the wireless communications lab course is to introduce CSE students to the field
of wireless cellular network planning. It would give them hands-on experience through a set of
experiments using Scilab and NS3 software. It would also give them an understanding of practical
wireless communication systems such as GSM, CDMA, WDCMA, Wifi and Basics of 4G
Technologies. The lab consists of Eleven experiments and each experiment consists of simulations
using Scilab or network simulator:
C463.1 Calculate various parameters for cellular wireless systems using Scilab.
C463.3 Analyze and apply mathematical models of different wireless networks concepts using
NS3 or Scilab.
463.4 Create and Configure Wifi networks, Plot using 2D/3D graphs generation and reception of
signals in Wireless Cellular networks.
463.5 Compare and analyze data transmission using different modulation techniques and BER
performance of different channels in wireless communication networks.
463.6 Do R and D in Latest Trends in Wireless Communication, document it and publish research
papers in reputed conference or journals
Hardware
Requirements:
Software
Requirements: Scilab 6.1.0 and above, Linux(Fedora/Ubuntu), NS3 3.24 and above
(Beyond Curricula)
1. Configuring Access Point with bridging mode (Point to Point and Point to Multi Point).
The front page of the lab record prepared by the students should have a cover page as displayed below.
WIRELESS COMMUNICATIONS
ETEC 463
Font should be (Size 20”, italics bold, Times New Roman)
Roll No.:
Semester:
Total Marks: 40
Output is free of errors and output is Output contains few logical errors and/or
Output and obtained. Demonstrates excellent no output is obtained. Demonstrates partial
2 2
Validation understanding of the concepts relevant understanding of the concepts relevant to
to the experiment. the experiment.
Timely
4 Submission of 2 On time submission Late submission
Lab Record
Each experiment will be evaluated out of 10 marks. At the end of the semester average of 8 best
performed practical will be considered as marks out of 40.
It is taken by the concerned faculty of the batch and by an external examiner. In this exam student
needs to perform the experiment allotted at the time of the examination, a sheet will be given to
the student in which some details asked by the examiner needs to be written and at the last viva
will be taken by the external examiner.
Total Marks: 60
2. Viva Voice: 15
3. Experiment performance: 15
4. File submitted: 10
NOTE:
1. Create a simple topology of two nodes (Node1, Node2) separated by a point-to-point link.
2. Setup a UdpClient on one Node1 and a UdpServer on Node2. Let it be of a fixed data rate Rate1.
3. Start the client application, and measure end to end throughput whilst varying the latency of the
link.
4. Now add another client application to Node1 and a server instance to Node2. What do you need
to configure to ensure that there is no conflict?
5. Repeat step 3 with the extra client and server application instances. Show screenshots of pcap
traces which indicate that delivery is made to the appropriate server instance.
TCP variants
1. Create a simple dumbbell topology, two client Node1 and Node2 on the left side of the dumbbell
and server nodes Node3 and Node4 on the right side of the dumbbell. Let Node5 and Node6
form the bridge of the dumbbell. Use point to point links.
2. Install a TCP socket instance on Node1 that will connect to Node3.
3. Install a UDP socket instance on Node2 that will connect to Node4.
4. Start the TCP application at time 1s.
5. Start the UDP application at time 20s at rate Rate1 such that it clogs half the dumbbell bridge's
link capacity.
6. Increase the UDP application's rate at time 30s to rate Rate2 such that it clogs the whole of the
dumbbell bridge's capacity.
7. Use the ns-3 tracing mechanism to record changes in congestion window size of the TCP instance
over time. Use gnuplot/matplotlib to visualise plots of cwnd vs time.
8. Mark points of fast recovery and slow start in the graphs.
9. Perform the above experiment for TCP variants Tahoe, Reno and New Reno, all of which are
available with ns-3.
1. Create a simple dumbbell topology, two client Node1 and Node2 on the left side of the dumbbell
and server nodes Node3 and Node4 on the right side of the dumbbell. Let Node5 and Node6
form the bridge of the dumbbell. Use point to point links.
2. Add drop tail queues of size QueueSize5 and QueueSize6 to Node5 and Node6, respectively.
3. Install a TCP socket instance on Node1 that will connect to Node3.
4. Install a TCP socket instance on Node2 that will connect to Node3.
5. Install a TCP socket instance on Node2 that will connect to Node4.
6. Start Node1--Node3 flow at time 1s, then measure it's throughput. How long does it take to fill
link's entire capacity?
7. Start Node2--Node3 and Node2--Node4 flows at time 15s, measure their throughput.
8. Measure packet loss and cwnd size, and plot graphs throughput/time, cwnd/time and packet
loss/time for each of the flows.
9. Plot graph throughput/cwnd and packet loss/cwnd for the first flow. Is there an optimal value for
cwnd?
10. Vary QueueSize5 and QueueSize6.
Routing (Optimised Link State Routing)
1. Create a wireless mobile ad-hoc network with three nodes Node1, Node2 and Node3. Install the
OLSR routing protocol on these nodes.
2. Place them such that Node1 and Node3 are just out of reach of each other.
3. Create a UDP client on Node1 and the corresponding server on Node3.
4. Schedule Node1 to begin sending packets to Node3 at time 1s.
5. Verify whether Node1 is able to send packets to Node3.
6. Make Node2 move between Node1 and Node3 such that Node2 is visible to both A and C. This
should happen at time 20s. Ensure that Node2 stays in that position for another 15s.
7. Verify whether Node1 is able to send packets to Node3.
8. At time 35s, move Node2 out of the region between Node1 and Node3 such that it is out of each
other's transmission ranges again.
9. Verify whether Node1 is able to send packets to Node3.
10. To verify whether data transmissions occur in the above scenarios, use either the tracing
mechanism or a RecvCallback() for Node3's socket.
11. Plot the number of bytes received versus time at Node3.
12. Show the pcap traces at Node 2's Wifi interface, and indicate the correlation between Node2's
packet reception timeline and Node2's mobility.
Wifi RTS/CTS
1. Setup a 5x5 wireless adhoc network with a grid. You may use examples/wireless/wifi-simple-
adhoc-grid.cc as a base.
2. Install the OLSR routing protocol.
3. Setup three UDP traffic flows, one along each diagonal and one along the middle (at high rates
of transmission).
4. Setup the ns-3 flow monitor for each of these flows.
5. Now schedule each of the flows at times 1s, 1.5s, and 2s.
6. Now using the flow monitor, observe the throughput of each of the UDP flows. Furthermore,
use the tracing mechanism to monitor the number of packet collisions/drops at intermediary
nodes. Around which nodes are most of the collisions/drops happening?
7. Now repeat the experiment with RTS/CTS enabled on the wifi devices.
8. Show the difference in throughput and packet drops if any.
Wifi Channels
1. Setup a 2-nodes wireless adhoc network. Place the nodes at a fixed distance in a 3d scenario.
2. Install all the relevant network stacks, up to and including UDP.
3. Setup a CBR transmission between the nodes, one acting as a server and one as a client. Take
the iperf[1] behaviour as an example.
4. Setup counters and outputs for packets sent and received.
5. Schedule the simulation to run for enough time to obtain statistically relevant results (suggestion:
analyze some test results and reduce the simulation time accordingly).
6. Repeat the simulation varying the distance between the nodes from a minimum of 1meter to the
point where the nodes can't transmit/receive anymore.
7. Repeat the above varying the channel models and the transmission/receive parameters like node's
position above the ground, transmission power, etc.
8. Show the differences between the various channel models, and comment them. Identify the
channel model that is more appropriate for each case (indoor, outdoor, LoS, NLoS, etc.).
8. Experiment No 1
AIM: Write a program in Scilab to Calculate Frequency Reuse
Distance ,Co-Channel Interference reduction factor, Cellular System
Capacity, S/I Ratio for a given variables.
Introduction
Frequency Reuse Distance (D)
• Reusing an identical frequency channel after a certain distance , then the Distance is
called Frequency Reuse Distance.
• The cochannel interference can become a major problem in cellular communication.
• It is desirable to find the minimum frequency reuse distance D in order to reduce this
cochannel interference.
• D=R * sqrt( 3*N)
The frequency reuse ratio, q is also referred asthe cochannel reuse ratio.
• In a cellular system, the whole geographical service area is divided into a number of clusters
having finite number of cells and the number of Cluster in a cluster cell is called Cluster Size.
• Each cell in the cluster contains J = (N/K) number of channels only
• Therefore, N i.e total number of frequency channels = J x K; where J ≤ N
• The Number of Channels in a cells is called the Cell Capacity.
• Let M be the number of clusters in the system, then overall system capacity, C is given as
• C = M x N → C = M x J x K (N = J x K)
• When K is reduced, J is proportionally increased since N = J x K is constant.
• Useful signal at the cell boundary is the weakest, given by Pr (R). Interference signal from
the co-channel cell is given to be Pr (D′) .
• D’ is normally approximated by the base station separation between the two cells D, unless
when accuracy is needed. Hence
For the forward link, a very general case,
where Diis the distance of the ith interfering cell from the mobile, i0 is the total number of co-
channel cells exist.
n, is the path loss coefficient, n=4 and i0=6
• Start.
• Accept Value of number of Cells Per Cluster i.e. N from User.
• Create a function that draws a hexagon.
• Draw a Cluster with N hexagon in each Cluster.
• Write appropriate frequencies in each Cluster.
• Stop.
• Stop.
8.2 Output:
Output
9.Experiment No.2
AIM: Write a Program in Scilab to calculate maximum traffic intensity
and maximum no. of users accomodated in Erlang B and Erlang C
system for given no of channels.
Introduction
Trunking and Grade of Service (GOS)
Trunking:
Trunking is a technique used in data communications transmission systems to provide many users with
access to a network by sharing multiple lines or frequencies. As the name implies, the system is like a
tree with one trunk and many branches. Trunking is commonly used in very-high-frequency (VHF)
radio and telecommunication systems.
Trunking can also be defined as a network that handles multiple signals simultaneously. The data
transmitted through trunking can be audio, video, controlling signals or images.
Erlang C Formula
• The likelihood of a call not having immediate access to a channel is determined by Erlang C
formula:
9.1STEPS
• Start
• Set up all the necessary Connections.
• Accept Value of Blocking Probability using ErlangB i.e. From User.
• Accept Value of Call Duration using ErlangB i.e. From User.
• Accept Value of Number Of Channels using ErlangB i.e. From User.
• Calculate the Traffic Intensity per User using ErlangB.
• Calculate the Maximum Traffic Intensity for the input Blocking Probability using ErlangB.
• Repeat the Above Procedure For ErlangC.
• Stop.
9.3 Output
Phase Shift Keying PSKPSK is the digital modulation technique in which the phase of the carrier
signal is changed by varying the sine and cosine inputs at a particular time. PSK technique is widely
used for wireless LANs, bio-metric, contactless operations, along with RFID and Bluetooth
communications.
PSK is of two types, depending upon the phases the signal gets shifted. They are –
1. Binary Phase Shift Keying(BPSK)
2. Quadrature Phase Shift Keying(QPSK)
Binary Phase Shift Keying BPSK
This is also called as 2-phase PSK or Phase Reversal Keying. In this technique, the sine wave carrier
takes two phase reversals such as 0° and 180°.
BPSK is basically a Double Side Band Suppressed Carrier DSBSCDSBSC modulation scheme, for
message being the digital information.
BPSK Modulator
The block diagram of Binary Phase Shift Keying consists of the balance modulator which has the
carrier sine wave as one input and the binary sequence as the other input. Following is the
diagrammatic representation.
The modulation of BPSK is done using a balance modulator, which multiplies the two signals
applied at the input. For a zero binary input, the phase will be 0° and for a high input, the phase
reversal is of 180°.
Following is the diagrammatic representation of BPSK Modulated output wave along with its given
input.
The output sine wave of the modulator will be the direct input carrier or the
inverted 180°phaseshifted180°phaseshifted input carrier, which is a function of the data signal.
BPSK Demodulator
The block diagram of BPSK demodulator consists of a mixer with local oscillator circuit, a bandpass
filter, a two-input detector circuit. The diagram is as follows.
By recovering the band-limited message signal, with the help of the mixer circuit and the band pass
filter, the first stage of demodulation gets completed. The base band signal which is band limited is
obtained and this signal is used to regenerate the binary message bit stream.
In the next stage of demodulation, the bit clock rate is needed at the detector circuit to produce the
original binary message signal. If the bit rate is a sub-multiple of the carrier frequency, then the bit
clock regeneration is simplified. To make the circuit easily understandable, a decision-making
circuit may also be inserted at the 2nd stage of detection.
Multipath environment
Assumptions
1. The channel is flat fading – In simple terms, it means that the multipath channel has only one tap.
So, the convolution operation reduces to a simple multiplication.
2. The channel is randomly varying in time – meaning each transmitted symbol gets multiplied by a
randomly varying complex number ɦ . Since ɦ is modeling a Rayleigh channel, the real and imaginary
parts are Gaussian distributed having mean 0 and variance 1/2.
Calculation of H
H= Hreal + i*Himaginary where
Hreal = sigma * rand (1,n)
Himaginary =sigma* rand(1,n)
Here sigma = 1/sqrt(2)
10.1 Steps
Steps in Scilab ( for Only AWGN Channel)
• Generation of random BPSK modulated symbols +1′s and -1′s
• Passing them through Additive White Gaussian Noise channel
• Demodulation of the received symbol based on the location in the constellation
Department of Computer Science and Engineering, MAIT 33
Wireless Communication ETEC 463
10.3 Output
Q.2 What is the difference between probability of error and bit error rate?
Hadamard-Walsh Code
In code division multiple access (CDMA) communication, the Hadamard code is referred to
as Walsh Code, and is used to define individual communication channels. It is usual in
the CDMA literature to refer to codewords as “codes”. Each user will use a different codeword, or
“code”, to modulate their signal.
Walsh Code is a group of spreading codes having good autocorrelation properties and poor cross
correlation properties. Walsh codes are the backbone of CDMA systems and are used to develop the
individual channels in CDMA.
The four orthogonal sequences in this Walsh code set are taken from the rows of the matrixH4 ; that
is,
W0 = [ 0 0 0 0 ] W1 = [ 0 1 0 1 ] W2 = [ 0 0 1 1 ]
W3 = [ 0 1 1 0 ]
Walsh Codes
• Orthogonal codes
• Length – power of 2 (1,2,4,8,…)
Department of Computer Science and Engineering, MAIT 36
Wireless Communication ETEC 463
11.1Steps to be Performed
• Start
• Install all the relevant network stacks, up to and including UDP.
• Initialize the Basic Walsh Code Matrix.
• Calculate the Complement of the matrix by using the function for calculation of Matrix
Calculation.
• Accept the value of the data Stream value by the user function .
• Now Calculate the Spread of XOR of user info and the Walsh Code by using the Function.
• And Use the above Function again to Calculate the Spread by XOR of Spread and Walsh
Code.
• Now Accept the Value for the input of Walsh Code Matrix from the User.
• By Varying the number of times the loop run by taking the input of Data Streams, Spread the
data.
• Now Calculate the Spread and Despread of Walsh Code Using the Function.
• Stop.
11.3 Output
It is not difficult to see that the output xk will be periodic. However, the dependence of the length of
the period (which we would like to be as large as possible) on the constants hj, j=1,2,…n is not
obvious. We can see that the "state" (xk-1 …. xk-n) can assume at most 2 n values.
Block Diagram
12.1 Steps:
• Start
• Set up the Network.
• Install all the relevant network stacks, up to and including UDP.
• Accept the input value of the number of Flip flop from the user.
• By taking the length of the array , generate the Pn Sequence using the Function.
• Accept the Value of the Data Stream By the user using the Function
• Now Calculate the Spread by Multiplication of User info and the PN Sequence generated by
the function.
• Now Calculate the Despread by reapeating the above procedure.
• Now Calculate the Final Spread by using the function and the values.
• Stop.
12.3 Outputs:
Output1:
When network cards are enabled in the devices, we add different parameters in the channels (i.e., real
world path used to send data) which are data-rate, packet size, etc. Now we use Application to generate
traffic and send the packets using these applications.
Ns3 gives us special features which can be used for real life integrations. Some of these features are:
more accurate graph compare to other graph making tools and also it is less complex than other
tools.
13.1 STEPS:
1.Setup a 2-nodes wireless adhoc network. Place the nodes at a fixed distance in a 3d scenario.
2.Install all the relevant network stacks, up to and including UDP.
3.Setup a CBR transmission between the nodes, one acting as a server and one as a client. Take the
iperf[1] behaviour as an example.
4.Setup counters and outputs for packets sent and received.
5.Schedule the simulation to run for enough time to obtain statistically relevant results (suggestion:
analyze some test results and reduce the simulation time accordingly).
6.Repeat the simulation varying the distance between the nodes from a minimum of 1meter to the
point where the nodes can't transmit/receive anymore.
7.Repeat the above varying the channel models and the transmission/receive parameters like node's
position above the ground, transmission power, etc.
8.Show the differences between the various channel models, and comment them. Identify the
channel model that is more appropriate for each case (indoor, outdoor, LoS, NLoS, etc.).
13.3 Output
14.Experiment No. 7
AIM: Write a Program in NS 3 to create WiFi-Simple Infrastructure
Network
Introduction:
This Program configures two nodes on an 802.11b physical layer, with 802.11b NICs in infrastructure
mode, and by default, the station sends one packet of 1000 (application) bytes to the access point.
The physical layer is configured to receive at a fixed RSS (regardless of the distance and transmit
power); therefore, changing position of the nodes has no effect.
There are a number of command-line options available to control the default behavior. The list of
available command-line options can be listed with the following command:
./waf --run "wifi-simple-infra --help" For instance, for this configuration, the physical layer will stop
successfully receiving packets when rss drops below -97 dBm. To see this effect, try running:
./waf --run "wifi-simple-infra --rss=-97 --numPackets=20"
./waf --run "wifi-simple-infra --rss=-98 --numPackets=20"/ ./waf --run "wifi-simple-infra --rss=-99 -
-numPackets=20"
All ns-3 attributes (not just the ones exposed in the below script) can be changed at command line;
see the documentation.
This script can also be helpful to put the Wifi layer into verbose logging mode; this command will
turn on all wifi logging:
./waf --run "wifi-simple-infra --verbose=1"
When you are done, you will notice two pcap trace files in your directory. If you have tcpdump
installed, you can try this:
tcpdump -r wifi-simple-infra-0-0.pcap -nn–tt
14.1 Steps:
• Setup a 2-nodes wireless Infrastructure network. Place the nodes at a fixed distance in a 3d
scenario.
• Install all the relevant network stacks, up to and including UDP.
• Setup a CBR transmission between the nodes, one acting as a server and one as a client. Take
the iperf behaviour as an example.
• Setup counters and outputs for packets sent and received.
• Schedule the simulation to run for enough time to obtain statistically relevant results
(suggestion: analyze some test results and reduce the simulation time accordingly).
• Repeat the simulation varying the distance between the nodes from a minimum of 1meter to
the point where the nodes can't transmit/receive anymore.
• Repeat the above varying the channel models and the transmission/receive parameters like
node's position above the ground, transmission power, etc.
• Show the differences between the various channel models, and comment them. Identify the
channel model that is more appropriate for each case (indoor, outdoor, LoS, NLoS, etc.).
#include "ns3/core-module.h"
#include "ns3/network-module.h"
#include "ns3/mobility-module.h"
#include "ns3/config-store-module.h"
#include "ns3/wifi-module.h"
#include "ns3/internet-module.h"
#include <iostream>
#include <fstream>
#include <vector>
#include <string>
CommandLine cmd;
NodeContainer c;
c.Create (2);
// The below set of helpers will help us to put together the wifi NICs we want
WifiHelper wifi;
if (verbose)
{
wifi.EnableLogComponents (); // Turn on all Wifi logging
}
wifi.SetStandard (WIFI_PHY_STANDARD_80211b);
YansWifiChannelHelper wifiChannel;
wifiChannel.SetPropagationDelay ("ns3::ConstantSpeedPropagationDelayModel");
wifiChannel.AddPropagationLoss ("ns3::FixedRssLossModel","Rss",DoubleValue (rss));
wifiPhy.SetChannel (wifiChannel.Create ());
WifiMacHelper wifiMac;
wifi.SetRemoteStationManager ("ns3::ConstantRateWifiManager", "DataMode",StringValue
(phyMode), "ControlMode",StringValue (phyMode));
InternetStackHelper internet;
internet.Install (c);
Ipv4AddressHelper ipv4;
NS_LOG_INFO ("Assign IP Addresses.");
ipv4.SetBase ("10.1.1.0", "255.255.255.0");
Ipv4InterfaceContainer i = ipv4.Assign (devices);
Q.2 Make a program to create a infrastructure mode Wifi network with different topology?
14.3Output:
ani@ani-VirtualBox:~/ns-allinone-3.26/ns-3.26$ ./waf --run "wifisimpleinfra"
Q.No.1. What are the advantages of using Infrastructure type Wifi Networks?
15.1 Steps
• Create a wireless mobile ad-hoc network with three nodes Node0, Node1 and Node2. Install
the OLSR routing protocol on these nodes.
• Place them such that Node0 and Node2 are just out of reach of each other.
• Create a UDP client on Node0 and the corresponding server on Node2.
• Make Node1 move between Node0 and Node2 such that Node1 is visible to both 0 and 2.
This should happen at time 20s. Ensure that Node1 stays in that position for another 15s.
• At time 35s, move Node1 out of the region between Node0 and Node2such that it is out of
each other's transmission ranges again.
• Show the pcap traces at Node 1's Wifi interface, and indicate the correlationbetween Node2's
packet reception timeline and Node1's mobility.
Q.1 Make a Program in NS3 to solve hidden and exposed terminal problem in Adhoc networks?
15.3 Output
Q.No.1. What are the advantages of using Adhoc type Wifi Networks?
WCDMA Parameters
Channel B.W 5 MHz
No. of slots/frame 15
Downlink SF 4 to 512
Spreading Operation
• Spreading means increasing the signal bandwidth
• Strictly speaking, spreading includes two operations:
(1) Channelisation (increases signal bandwidth)
- using orthogonal codes
(2) Scrambling (does not affect the signal bandwidth)
- using pseudo noise codes
16.1 Steps
16.3Output (Console):
Output (Graph)
Q.no4What are the physical, transport and logical channels in WCDMA? Explain function of
each.
17.1Steps:
• Setup a 2-nodes wireless Infrastructure network. Place the nodes at a fixed distance in a 3d
scenario.
• Install all the relevant network stacks, up to and including UDP.
• Calculate the Shannon Capacity.
• Calculate the Capacity of MIMO link with input value NR and NT.
• Generate a single random value between 0 and 1 from the standard normal distribution and
plot the graph of Capacity vs SNR.
• Stop.
17.2 Output:
Question 1: In MIMO, which factor has the greatest influence on data rates?
Question 2: MIMO technology makes advantage of a natural radio wave phenomenon called?
Question4: What is an additional open-loop MIMO technique considered by the WiMAX vendors.
1. Adhoc mode:
a. Ad-hoc mode is also known as “peer-to-peer” mode. Ad-hoc networks don’t require a
centralized access point. Instead, devices on the wireless network connect directly to
each other. If you set up the two laptops in ad-hoc wireless mode, they’d connect
directly to each other without the need for a centralized access point.
2. Infrastructure mode:
a. Installing the router
i. Acquire a router
ii. Connect router to modem
iii. Connect computer via Ethernet cable
b. Configure the router
i. Install router software
ii. Open router’s configuration page
iii. Enter your internet connection information
iv. Set your wireless settings
v. Apply your settings
vi. Place your router
c. Connecting to the router
i. Connect a device to network
ii. Enter the Password
iii. Test your Connection
Q.No3What is a VLAN?
3. These settings are enough to establish wireless connection, additionally you need to add IP
address for the wireless interface for IP routing, optionally add security and other settings
4.
5. 17.2 Output:
Q.NoIn WLAN, what messages are exchanged between AP and STA and what are the functions of
both?
7. These routes show, that IP packets with destination to 10.0.0.0/24 would be sent through the
interface
8. Public, whereas IP packets with destination to 192.168.0.0/24 would be sent through the
interface Local.
9. However, you need to specify where the router should forward packets, which have
destination other than
10. networks connected directly to the router. This is done by adding the
11. default route
12. (destination 0.0.0.0,
13. netmask 0.0.0.0). In this case it is the ISP's gateway 10.0.0.1, which can be reached through
the interface
14. Public:
a. [admin@MikroTik] ip route> add gateway=10.0.0.1
b. [admin@MikroTik] ip route> print
c. Flags: X − disabled, I − invalid, D − dynamic, J − rejected,
d. C − connect, S − static, R − rip, O − ospf, B − bgp
e. # DST−ADDRESS G GATEWAY DISTANCE INTERFACE
f. 0 S 0.0.0.0/0 r 10.0.0.1 1 Public
g. 1 DC 192.168.0.0/24 r 0.0.0.0 0 Local
15. Here, the default route is listed under #0. As we see, the gateway 10.0.0.1 can be reached
through the interface 'Public'. If the gateway was specified incorrectly, the value for the
argument 'interface' would be unknown. Note, that we cannot add two routes to the same
destination, i.e., destination−address/netmask!
It applies to the default routes as well. Instead, we can enter multiple gateways for one
destination.
Q.No1 In WLAN, what messages are exchanged between AP and STA and what are the functions
of both?
19.1 Steps:
For Infrastructure Support:
1. Use an Ethernet cable to connect a computer to any one of the four LAN ports of the router
or connect wirelessly.
2. Log in to your router by browsing to
http://192.168.1.1 or http://192.168.0.1
3. Enter the username (admin) and password.
4. Select Wireless from the Setup menu in the left-hand navigation bar.
5. Under Wireless Network, enter your desired network name in the Name (SSID) box.
6. Under Security Options, select WPA2-PSK [AES].
7. Under Security Options (WPA2-PSK), enter your desired network password into the
Passphrase box.
For Adhoc:
1. Physical Security
2. Key Management
a. Trust model
b. Cryptosystems
c. Key Creation
d. Key Storage
e. Key Distribution
Q.No 3 In configuring a router, what command must be used if you want to delete the
configuration data that is stored in the NVRAM?