Old Acn File

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

[TYPE THE COMPANY NAME]

[Type the document title]


[Type the document subtitle]
DELL
[Pick the date]

By
-: INDEX :-
Sr. No Experiment Page No. Remarks
Familiarization with Networking
1. Components and devices:- LAN
Adapters, Switches, Routers ets.
Familiarization with Transmission
2. media and Tools:- Co-axial cable, UTP
Cable, Crimping Tool, Connectors etc.
3. Preparing Straight and Cross Cables.
Study of various LAN Topologies and
4. their creation using Network devices,
Cables and Computers.
5. Configuration of TCP/IP Protocols in
Windows and Linux.
6. Implementation of File and Printer
sharing.
7. Designing and Implementing Class A,
B, C Network.
8. Subnet Planning and its
Implementation.
9. Installation of ftp server and client.
To develop programs for simulating
10. routing algorithms for Adhoc networks.
To install any one open source packet
11. capture software like packet tracer etc.
12. To configure Wireless Local Loop.
13. To configure WLAN.
14. To configure Adhoc Networks.
To install and configure wireless access
15. points.

2
Experiment:- 01
Aim:- Familiarization with Networking Components and devices:- LAN
Adapters, Switches, Routers etc.

Materials Required:- LAN Adapters, Switches and Routers.


 LAN Adapters:-
 Also called a “Network interface card” an Ethernet adapter is a
card that plugs into a slot on the motherboard and enables a
computer to access an Ethernet network (LAN).
 In the past, desktop computers always used cards. Today,
Ethernet is built into the chipsets on the motherboards of
desktop and laptop computers.

 Switches:-
 Switches are networking devices operating at layer 2 or a data
link layer of the OSI model.
 They connect device in a network and use packet switching to
send, receive or forward data packets or data frames over the
network.
 A switch has many ports, to which computers are plugged in.

3
 Routers:-
 A router is the first line of security from intrusion into a
network.
 Enabling the highest level of security on the router turns on
things like the firewall, and is the best way to keep your
computer system and information safe from attack.

4
Experiment:- 02
Aim:- Familiarization with Transmission media and Tools: Co-axial
cable, UTP Cable, Crimping Tool, Connectors etc.
Material Required:- Co-axial cable, UTP Cable, Crimping tools and
connectors.
 Co-axial Cable:-
1. Coaxial cable or coax is a type of electrical cable consisting of
an inner conductor surrounded by a concentric conducting
shield, with the two separated by a dielectric ; many coaxial
cable also have a protective outer sheath or jacket.
2. The term coaxial refers to the inner conductor and the outer
shield sharing a geometric axis. It is used in such applications
as telephone ,trunk lines, broadband internet networking cables,
high-speed computer data busses and cable television.

 UTP Cable:-
1. UTP stands for unshielded twisted pair cable. It is a type of
wiring in which two conductors of a single circuit are twisted
together for the purpose improving electromagnetic
compatibility.
2. Compared to a single conductor or an untwisted balanced pair,
a twisted pair reduces electromagnetic radiation from the pair
and crosstalk electromagnetic radiation from the pair and
crosstalk between neighbouring pairs and improves rejection of
external electromagnetic interference.

5
 Crimping Tool:-
1. A crimping tool is a device that is used to make cold weld
joints between wires and a connector through deforming one or
both of then to hold the other.
2. A special connector is used to join metals together .The weld
joint properties are strong as the parent materials when the tool
works and offer some result, which is known as crimp.

 Connectors:-
1. A device that eliminates a section of cabling or implements a
state of access for network devices, including PC’s, hubs, and
switches.
2. Connectors can be famous for their physical presentation and
mating features, including jacks and attachment or attachments
and ports.
3. Connectors are used to connect the guided transmission media
to devices like the hub, server, workstations etc.

6
Experiment:- 03
Aim:- Preparing Straight and Cross Cables.
Materials Required:- Straight Cables and Cross Cables.
 Straight Cable:-
1. Straight cable is used to connect different type of devices.
2. This type of cable will be used most of the time and can be
used to:-
 Connect a computer to a switch/hub’s normal port.
 Connect a computer to a cable/DSL modem’s LAN port.
 Connect a router’s WAN port to a cable/DSL modem’s
LAN port.

 Cross Cables:-
1. It is usually used to connect same type of devices.
2. A crossover cable can be used to:-
 Connect two computers directly.
 Connect a router’s LAN port to a switch/hub’s normal
port.
 Connect 2 switches/hubs by using normal port in both
switches/hubs.

7
Experiment:- 04
Aim:- Study of various LAN Topologies and their creation using
Network devices, Cables and Computers.
Materials Required:- Network devices, cables and Computers.
LAN Topologies:-
 The arrangement of a network that comprises nodes and connecting
lines via sender and receiver is referred to as network topology.
 The various network topologies are:-

1. Bus Topology:-
 Bus topology are multipoint electrical circuits that can be
implemented using coaxial cable, UTP or STP.
 Data transmission is bi-directional, with the attached
devices transmitting in both directions. While generally
operating at a raw data rate of 10 Mbps, actual throughput
is much less.

 This is employed frequently in the LAN’s with distributed


control. In this all nodes, share the common bus.
Messages placed on the bus are transmitted to all the
nodes.

8
2. Ring:-
 The ring architecture is a distributed architecture, with
minimal connectivity and a topology of two links
connected to every node and forms unbroken circular
configurations.
 Transmitted messages travel from node to node around
the ring. Each node must be able to recognize its own
address in order to accept messages.

 Ring networks with centralized controls are known as


loops.
 When ring network with distributed controls are used,
some form of controls strategies must be used to avoid
conflicting demands for the shared channel.
 The popular control strategies are token passing,
circulating slot, register insertion techniques.

9
3. Star Topology:-
 The distinguishing feature of star topology is that all nodes
are joined at a single point.
 This single point is called the central node, hub or switch to
which all other devices are attached directly, generally via
UTP or STP.
 This topology is frequently used for networks in which
control of the network is located in the central node.

 This method is optimal when the bulk of communication is


between the central and outlying nodes. If traffic is high
between outlying nodes, an undue switching burden is
placed over the central node.

10
4. Mesh Topology:-
 In a mesh network topology, each of the network node,
computer and other devices, are interconnected with one
another.
 Every node not only sends its own signals but also relays
data from other nodes.
 In fact a true mesh topology is the one where every node
is connected to every other node in the network.
 This type of topology is very expensive as there are many
redundant connections, thus it is not mostly used in
computer networks.
 It is commonly used in wireless networks. Flooding or
routing technique is used in mesh topology. 

11
5. Tree Topology:-
 Tree Topology integrates the characteristics of Star and
Bus Topology.
 Earlier we saw how in Physical Star network Topology,
computers (nodes) are connected by each other through
central hub. And we also saw in Bus Topology, work
station devices are connected by the common cable called
Bus.
 After understanding these two network configurations, we
can understand tree topology better.
 In Tree Topology, the numbers of Star networks are
connected using Bus.
 This main cable seems like a main stem of a tree, and
other star networks as the branches.
 It is also called Expanded Star Topology.
 Ethernet protocol is commonly used in this type of
topology.
 The diagram below will make it clear:-

12
6. Hybrid Topology:-
 Before starting about Hybrid topology, we saw that a
network topology is a connection of various links and
nodes, communicating with each other for transfer of
data.
 We also saw various advantages and disadvantages of
Star, Bus, Ring, Mesh and Tree topologies. 
 Hybrid, as the name suggests, is mixture of two different
things. Similarly in this type of topology we integrate two
or more different topologies to form a resultant topology
which has good points (as well as weaknesses) of all the
constituent basic topologies rather than having
characteristics of one specific topology. This combination
of topologies is done according to the requirements of the
organization. 
 For example, if there exists a ring topology in one office
department while a bus topology in another department,
connecting these two will result in Hybrid topology.
Remember connecting two similar topologies cannot be
termed as Hybrid topology. Star-Ring and Star-Bus
networks are most common examples of hybrid network.

13
Experiment:- 05
Aim:- Configuration of TCP/IP Protocols in Windows and Linux.
Materials Required:- System with Windows and Linux Operating
System.
 Configuration of TCP/IP protocol in Windows:-

The following instructions are based on the Configuring TCP/IP function


of Windows XP.

1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up
Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the
list, do the following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection
Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network
administrator to determine the correct settings for this tab. If your PC
does not automatically obtain IP and DNS addresses, do the
following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
14
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click
the Advanced tab, select WINS Address, and do the following:
a. Click Add.
b. Enter the primary WINS server (for example, 199.5.83.205).
c. Enter the secondary WINS server (for example, 199.5.83.206).
d. The remaining settings should remain as the defaults.
8. Click OK on the Local Area Connection Properties window. It is not
necessary to restart your PC.

Configuration of TCP/IP in Linux OS:

No additional hardware, firmware, or software is required to install DB2®


pureScale® Feature on a TCP/IP network. The only requirement is to have
a network that is accessible by all the hosts. The hosts must be able to
access each other, and all hosts must be on the same subnet.
It is a best practice that your TCP/IP network is 10 Gb or higher. However,
if your workload has only modest network usage requirements, to avoid
the DB2 product from blocking a network slower than 10 Gb, enable the
registry variable DB2_SD_ALLOW_SLOW_NETWORK.

You set up your TCP/IP network as you normally would, set up all hosts
on the same subnet, and test the host name resolution and connectivity.

For a geographically dispersed DB2 pureScale cluster (GDPC), if multiple


adapter ports are assigned to each member or CF, ensure those network
interfaces are bonded so that only the bonded interface is specified as the
NETNAME column in the db2instance -list output. All NETNAME listed
in the output should be in the same IP subnet.. This single IP subnet is
mandatory to setup GPFS described in Getting the cluster installed and
running in a GDPC environment

 Setting up the netmon.cf file on a TCP/IP network


In a DB2 pureScale environment running on a TCP/IP protocol over
Ethernet (TCP/IP) network, if you are using a private network, one or
more pingable IP addresses must be manually set up in the
15
configuration file netmon.cf. The netmon.cf file is required by
Reliable Scalable Cluster Technology (RSCT) to monitor the
network and ensure that the interfaces are pingable or not. For a
private network, this file must be set up manually. (On a public
network, the DB2 installer updates this file automatically.)

Experiment-6
16
Aim: Implementation of File and Printer Sharing.
Materials Required: Pc, Printer

Sharing Printer :

Server PC Settings:
1. Install the printer driver
2. Click Start => Devices and Printers => Printers and Faxes.
3. Right-click Brother XXXXXX (your model name) and then
click Printer properties.
4. Open the Sharing tab and check Share this printer.
5. Click OK.

Client PC Settings:
1. Click Start => Control Panel => Network and Internet.
2. Click Network and Sharing center.
3. Click Change advanced sharing settings.
4. Check Turn on network discovery and Turn on file and printer
sharing, click Save changes
5. Click Start => Devices and Printers.
6. Click Add a printer.
7. Click Add a network wireless or Bluetooth printer.
8. Choose a printer and click Next.
9. Click Next.
10. Choose Share this printer so that others on your network can
find and use it and click Next.
11. Click Finish..

Sharing file over a network:

Right-click or press a file, select Give access to > Specific people.

17
Select a file, select the Share tab at the top of File Explorer, and then
in the Share with section select Specific people.

If you select multiple files at once, you can share them all in the
same way. It works for folders, too—share a folder, and all files in it
will be shared.

18
Experiment-7
Aim: Designing and Implementing A,B,C Network.
Materials Required: System connecting with variety of networks.

Class A Network:
A class A network number uses the first eight bits of the IP address
as its "network part." The remaining 24 bits comprise the host part of
the IP address . The values assigned to the first byte of class A
network numbers fall within the range 0-127. Consider the IP address
75.4.10.4. The value 75 in the first byte indicates that the host is on a
class A network. The remaining bytes, 4.10.4, establish the host
address. The InterNIC assigns only the first byte of a class A
number. Use of the remaining three bytes is left to the discretion of
the owner of the network number. Only 127 class A networks can
exist. Each one of these numbers can accommodate up to 16,777,214
hosts.

Class B Network:
A class B network number uses 16 bits for the network number and
16 bits for host numbers. The first byte of a class B network number
is in the range 128-191. In the number 129.144.50.56, the first two
bytes, 129.144, are assigned by the InterNIC, and comprise the
network address. The last two bytes, 50.56, make up the host
address, and are assigned at the discretion of the owner of the
network number. Class B is typically assigned to organizations with
many hosts on their networks.

Class C Network:
Class C network numbers use 24 bits for the network number and 8
bits for host numbers. Class C network numbers are appropriate for
networks with few hosts--the maximum being 254. A class C
network number occupies the first three bytes of an IP address. Only
the fourth byte is assigned at the discretion of the network owners.
The first byte of a class C network number covers the range 192-223.
The second and third each cover the range 1- 255. A typical class C

19
address might be 192.5.2.5. The first three bytes, 192.5.2, form the
network number. 

Experiment-8

Aim: Subnet planning and its implementation.


20
Materials Required: PC connected with a network.

Subnetting is a process of dividing a single large network in multiple


smaller networks. A single large network is just like a town without any
sector and street address. In such a town, a postman may take 3 to 4 days
in finding a single address. While if town is divided in sectors and streets,
he can easily find any address in less than one hour.
Computer networks also follow the same concept. In computer
networking, Subnetting is used to divide a large IP network in smaller IP
networks known as subnets.

A default class A, B and C network provides 16777214, 65534, 254 hosts


respectively. Having so many hosts in a single network always creates
several issues such as broadcast, collision, congestion, etc.

Let’s take a simple example. In a company there are four departments;


sales, production, development and management. In each department there
are 50 users. Company used a private class C IP network. Without any
Subnetting, all computers will work in a single large network.

Computers use broadcast messages to access and provide information in


network. A broadcast message is an announcement message in computer
network which is received by all hosts in network.

Earlier in this tutorial we discussed an example of electric announcement.


You can relate that example with this example. In that example we learned
how dividing a town in sectors can reduce announcement area.

21
In this example since all computers belong to same network, they will
receive all broadcast messages regardless the broadcast messages which
they are receiving are relevant to them or not.

Just like town is divided in sectors, this network can also be divided in
subnets. Once network is divided in subnets, computers will receive only
the broadcasts which belong to them.

Since company has four departments, it can divide its network in four
subnets. Following figure shows same network after Subnetting.

22
Experiment-9
Aim: Installation of ftp server and clients.
Materials Required: Pc connected with a network.

FTP functions on a client-server model. The server hosts the files to be


shared and the client provides the interface to access, download, or upload
files to the file server. The computers transferring the files can be within
the same network where the FTP server is configured, as well as outside
the network (over the internet). FTP uses two ports, one for connection and
one for sending data.

FTP can run in two modes: active and passive. And, it uses two channels
between the client and server: the command channel and the data channel.
The command channel is for sending the commands and responses, and the
data channel is for sending the actual data. As for active and passive
modes, in active mode, the client launches the command channel, and the
server establishes the data channel. In passive mode, both the command
and data channels are established by the client.

Most organizations prefer passive mode. In this mode, the client initiates
both channels; therefore, the organization has little or no alterations to
make on the client firewall. The connection is from the client to the server,
and the data will be return traffic to the client. Overall, organizations can
allow their users (clients) to connect to FTP servers without compromising
network security.

Setting up FTP in passive mode

23
Primarily, the command channel is opened by the client to the FTP
server on port 21. The client also opens two random, unprivileged ports on
the client (typically a port greater than 1023). We’ll call the first port P and
the second port P+1. The FTP client initiates the connection to the server
by sending a PASV command. The client connects to the server from port
P to server port 21 with the PASV command. The server then opens
another unprivileged port Q (any port greater than 1023) and sends the port
information back as a reply to the PASV command. Now the client
initiates the connection from port P+1 to port Q on the server to start the
data transfer.

Steps:

1. The client contacts the server using the PASV command on port 21.
2. The server replies using port 2000. Here, port 2000 is the port the
server will be listening to for the data connection.
3. The client initiates the connection from port 1025 to 2000 (on the
server).
4. The server sends back the ACK (acknowledgement).

24
Experiment-10

Aim: To develop programs for simulating routing algorithms for Adhoc


networks.

Materials Required: System connected to a network

A wireless ad hoc network is a decentralized type of wireless network. The


network is ad hoc because it does not rely on a pre existing infrastructure,
such as routers in wired networks or access points in managed wireless
networks.

When using the wizard method, the first task to perform requires the
selection of „Set up a new connection or network‟ option from the main
window; this is shown in Figure

1. Go to Start Menu
25
2. Click on Search -enter the word “ad-hoc”
3. Click “Set up an ad-hoc (computer-to-computer) network”
4. This brings up the window: Set up a Wireless ad-hoc network;        
Click Next
5. Create a name for the ad-hoc network (ex. Type Ella). This must     be
the same on Both computers.
6. Set security type to “No authentication (Open)”
7. Leave Security Key blank
8. Click box “Save this network”
9. Click Next. The prompt will say Setting up the Type Ella network”
10. The next screen should say “The Type Ella network is ready to use

Dynamic Destination-Sequenced Distance-Vector Routing Protocol


(DSDV)
In this algorithm each node exchanges its neighbor table periodically
with its
neighbours. Changes at one node in the network propagate slowly
through the
network. Each node maintains a table which stores next hope, cost
metric towards
Dynamic Destination-Sequenced Distance-Vector Routing Protocol
(DSDV)
In this algorithm each node exchanges its neighbor table periodically
with its
neighbours. Changes at one node in the network propagate slowly
through the
network. Each node maintains a table which stores next hope, cost
metric towards
Dynamic Destination-Sequenced Distance-Vector Routing Protocol
(DSDV)
In this algorithm each node exchanges its neighbor table periodically
with its
neighbours. Changes at one node in the network propagate slowly
through the
network. Each node maintains a table which stores next hope, cost
metric towards

26
Dynamic Destination-Sequenced Distance-Vector Routing Protocol
(DSDV)
In this algorithm each node exchanges its neighbor table periodically
with its
neighbours. Changes at one node in the network propagate slowly
through the
network. Each node maintains a table which stores next hope, cost
metric toward

Experiment-11

Aim: To install any open source packet capture software like packet tracer
etc.

Materials Required: PC connected with a network.

Once the downloading is finished, open the folder that contains the
downloaded file.

Double click the setup or installer file of Packet Tracer. Depending on


UAC (User Access Control) setting, Windows may prompt to confirm the
installation. If it prompts, click the Yes button to confirm the installation.
After confirmation, the installation process starts in a graphical wizard.

The first screen of the installation wizard presents the license agreement.
Select the "I accept the agreement" option and click the "Next" button.

27
The next screen provides an option to customize the installation directory.
By default, Packet Tracer is installed in the "Program File" folder of the
Windows partition. If you want to install Packet Tracer in another folder,
click the Browse button and select the folder in which you want to install
Packet Tracer.

Make your choice and click the Next button to continue the installation.

28
Keep default selections and click the Next button.

29
Experiment-12

Aim: To configure Wireless Local Loop.

Materials Required: PC Connected with a network.

 The local loop is the dedicated link between the subscriber terminal and
the switch. In cities and towns, the local loop uses twisted pair as the
transmission medium because the distance between the switch and the
subscriber terminal generally will be less than 5 km. Because the
subscriber density is high in cities and towns, the cost of installing a switch
for subscribers within a radius of 5 km is justified. In remote and rural
areas, the subscriber density will be less, the number of calls made by the
subscribers will not be very high, and the areas are separated by long
distances from the nearby towns. As a result, laying a cable from one town
to another is not cost effective. Installing a switch to cater to a small
number of subscribers is also prohibitively costly.

30
Wireless local loops can be in two configurations.  A radio base station
will be connected to the switch. The base station is generally located in a
town at the same premises as the switch. A number of remote stations
communicate with the base station through radio. Each remote station can
be installed in an area, and it can support anywhere between 1 and 32
telephones. The distance between the base station and each remote
generally can be up to 30 km. A base station can provide telephone
facilities to subscribers in a radius of 30 km. This configuration is used
extensively for providing telephone facilities in rural and remote areas.

 Wireless local loop configuration 1.

 In one configuration, the subscriber telephone is connected to the switch


using radio as the medium. In the other configuration, wireless
connectivity is provided between the subscriber terminal and the
distribution point, and the connectivity between the switch and the
distribution point is through a wired medium.

31
Experiment-13

Aim: To configure WLAN.

Materials Required: Router, Switches and other networking equipment.

32
1 Acquire a wireless router. There are a variety of factors that will
determine which router is best for you. These include distance,
interference, transfer speed, and security.

2 Connect the router to your modem. Once you've purchased your router,


you will need to connect it to your modem. The router will have a port in
the back labeled WAN/WLAN/Internet. Connect this port to the modem
using a standard Ethernet cable.
 Make sure that the router is properly powered and turned on.
3 Connect a computer via Ethernet cable. This step is not always
necessary, but can be very useful if you want to set up the wireless router
before connecting any wireless devices to it. Connecting a computer
through a physical cable will allow you to tinker with the wireless settings
without losing your connection to the router.
 For optimum efficiency while setting up the router, plug it in next to
your computer while you adjust the settings. After you are finished
configuring the router, you can move it to where it will normally
stay.

Experiment-14
33
Aim: To configure Adhoc Networks.

Materials Required: PC connected with a network.

With Ad-Hoc networking, the multiple computers are connected directly


to each other through the same wireless cards used to connect to the more
standard wireless router or access point. In this article we'll review the
process of setting up an Ad-Hoc network on Windows 7.

Configuring Ad hoc network in window 7

1. Open the Start Menu.


2. Click Control Panel.
3. Click Network and Internet.
4. Click Network and Sharing Center.
5. Under Change your networking settings, click Set up a new connection
or network.
6. Select Set up a wireless ad hoc (computer-to-computer) network.
7. Click on Next twice.

34
8. Enter the Network name such as "UplinkNetwork".
9. Select the Security WAP (or WEP).
10. Enter the Security Key or password.
11. Check Save this network check box.
12. Click Turn on Internet connection sharing.

Experiment-15

Aim: To install and configure wireless access points.

Materials Required: System connected with a network.

Step-1:  If there is no router or switch installed yet, do so:


1. Find a good spot for the device.
If it is a wireless router, place it in a location that would be appropriate,
keeping the potential location of the access point in mind. This guarantees
effective distribution of coverage and minimized interference levels.

If it is a switch or a wired router, then deploy it in a location where it


would not interfere with any activities and the surrounding interior
solutions.
 

35
2. Connect the router to a power outlet and switch it on. PoE-compatible
devices will not require a power outlet—just an Ethernet cable. Also, some
devices turn on automatically as soon as they are connected to a power
source.
Step-2: Deploy the Access Point.
1. Find a good spot for the device.
 
If the local area network has other wireless devices, such as a router, place
the access point in a location where its wireless signal would have
minimum or no interference with other wireless devices within the LAN
and where it would provide effective coverage with respect to the
premises.

If the purpose of the access point is to introduce wireless connectivity to a


wired LAN, then place it in a location where the wireless signal would
cover the greatest possible area with the least number of obstacles and the
least amount of interference.
 
2. If the device is powered by an AC/DC adapter, connect it to the access
point and plug it into an electrical socket. If it is a PoE connection, proceed
to the next step.

36
Step 3. Connect the Cables. There are several cables that the user will need
to connect.
 

1. Use an Ethernet cable to connect the access point to the router. The
cable should be inserted into a LAN port on the router and into the
main Ethernet port on the access point. This introduces the access
point to the router’s created local area network.
2. Use an Ethernet cable to connect the router to the computer. The
cable should be inserted into a LAN port on the router and into the
Ethernet port on the computer (typically there is only one). This puts
the computer onto the network and allows direct access point and
LAN management.
3. If it is necessary to provide access to the Internet over the local area
network, use an Ethernet cable to connect the router to the modem.
Insert the cable into the main Ethernet port on the router and into the
Ethernet port on the modem (typically there is only one).

Step 4. Configure. Modern technologies have practically done away with


the inconvenience of manual LAN setup, let alone Internet access setup.
Once everything is properly connected and the devices have acknowledged
37
each other’s presence on the network, the user is ready to go.

If any basic setup is necessary either for the access point or for the network
in general, the computer or the user manual should provide instructions on
what specific steps to take.

Users can also change optional and advanced router settings by connecting
to the router via the computer using the IP address 192.168.0.1 or
192.168.1.1 (or the address noted in the manual).
Step-5:The setup is complete! User can now enjoy expanded wireless
coverage and improved wireless signal with the newly deployed access
point!

38

You might also like