0% found this document useful (0 votes)
55 views52 pages

WC File

The document discusses setting up an ad-hoc WiFi network between computers without an existing wireless infrastructure. It provides the requirements, testing instructions, and step-by-step directions for creating an ad-hoc network in Windows 10 and Windows 8 using Command Prompt commands.

Uploaded by

adorn.sahil22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views52 pages

WC File

The document discusses setting up an ad-hoc WiFi network between computers without an existing wireless infrastructure. It provides the requirements, testing instructions, and step-by-step directions for creating an ad-hoc network in Windows 10 and Windows 8 using Command Prompt commands.

Uploaded by

adorn.sahil22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Guru Tegh Bahadur Institute of Technology

Course Code- ETEC-463

Wireless Communication

BACHELOR OF TECHNOLOGY
(CSE)

Fourth Year (Semester: 7th)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Submitted to: Submitted by:

Ms. Manpreet Kaur Name: Manmeet Kaur

Roll No. 03276802720

Class: CSE-3
INDEX
Date of Date of Teacher’s
SNo. Name of Experiment Experiment Submission Remarks Signature

1. Introduction to Wireless LAN, Simulator and


Digital Communication Trainer System.

2. Build a Computer-to-Computer, P2P Network


(Ad-Hoc Wi-Fi Network).

3. How to Build Infrastructure Mode in Wireless


Networking.

4. Configuring Access Point with Point to


Point.

Configuring Access Point with Point to


5. Multi-Point.

6. Introduction to Cisco Packet Tracer.

To configure IP address in following


topology:
7. Mesh Topology, Star Topology,
Ring Topology, Bus Topology

To configure IP address between two


8. networks by using a Router and two PCs.

To configure IP address between three


9. networks by using 2Routers, 2Switches and
number of PCs.

To configure access points.


10.
Study of BPSK Modulation and Demodulation
11. Process.
Study of Pulse Width Modulation and
12. Demodulation.
EXPERIMENT-1

AIM:
Introduction to Wireless LAN, Simulator and Digital Communication Trainer System.

THEORY:
Wireless LAN equipment consists of two main components:
1. Wireless clients, which are any device capable of communicating over a wireless LAN, such
as a notebook computer, printer or handheld.

2. Access point, that is, the centers of the wireless-to-wired LAN connectivity.
These points aggregate wireless radio signals and then connect the two LANs. The access
point is generally book-sized. It contains a radio transceiver, communications and encryption
software, and an Ethernet port for a cable connection to a hub or a switch on the wired LAN.

Build a wireless LAN,

802.11a 802.11b 802.11g

Upto 54
Speed Upto 54Mbps Upto 11Mbps
Mbps

Frequency 5GHz 2.4GHz 2.4GHz

Indoor Ranging 25-75 feet 100-200 feet 100-200 feet

Compatible
Incompatible with 801.11b and
Compatibility Compatible with 802.11g with
802.11g
802.11b

802.11 Wireless Standards

IEEE Standard 802.11a 802.11b 802.11g 802.11n 802.11ac

Year Adopted 1999 1999 2003 2009 2014

Frequency 5GHz 2.4GHz 2.4GHz 2.4/5GHz 5GHz

2
Max. Data Rate 54Mbps 11Mbps 54Mbps 600Mbps 1Gbps

Typical Range
100 ft. 100 ft. 125 ft. 225 ft. 90 ft.
Indoors*

Typical Range
400 ft. 450 ft. 450 ft. 825 ft. 1,000ft.
Outdoors*

The diagram shows a simple wireless network setup

3
The diagram shows a typical business wireless LAN.

PROCEDURE:
1. Identify the equipment you want to buy, such as wireless notebooks, access points,
wireless LAN adapters and wireless cards.

2. Determine the number of users who need to have access to the network. This will help
you determine the number of access points you’ll need.

3. Plan for the connection to your wired LAN, probably in a central location and in an
open environment. Your goal is to maximize the access point’s wireless range. The
quoted range is a maximum of 300 feet, but that’s very dependent on the existing
environment walls, water pipes, cables and so on all could decrease the range. The best
thing to do is complete a site survey first, if that’s not possible, assume a maximum range
of 150 feet, as 300 could decrease throughput.

4. Configure your wireless devices to work with your network.

5. Test the installation before it goes live. Using link test software, you should test for the
percent of data sent correctly, the time it takes to receive a response from the destination
device, and the strength of the transmitted signal.

6. Establish a procedure to manage your Wireless LAN.

4
TECHNICAL SPECIFICATIONS
Data Source
 Data Rate: 30Kbps
 Word Length: 8bits
 Data format: NRZ (Non return to Zero)
 Clock frequency: 30KHz

PN Sequence Generator
 Data rate: 240Kbps
 Word length: 15bit
 Data formal: NRZ (Non-Return to Zero)
 Clock frequency: 240KHz

Audio Signal Generator:


 Data rate: 3.4Khz (variable amplitude & frequency)
 Carrier Generators: 1.44MHz (Sinusoidal)

DSSS Generator:
 By EX-ORPN Co. & D. Modulators & Demodulators PWM BPSK Interconnections:
2mm socket
 Mains Power Supply: 230V(10%).50 Hz

5
 Power Consumption: 4VA (approximately)
 Test Points: 40nos Dimensions(mm):W420xD255xH100 Weight 1Kg.(approximately)
 Operating Conditions: 0-40c, 85%RH

Features:
 Sell contained and easy to use.
 Functional blocks indicated on board mimic.
 Direct Sequence Spread Spectrum (DSSS) generator and decoder Analog Modulators.
 Binary Phase Shift Keying (BPSK) Modulator.
 Pulse Width Modulator Analog Demodulators.
 Binary Phase Shift Keying (BPSK) Demodulator Pulse Width Demodulator.
 2 Year Warranty.

Included Accessories:
 2 min Patch cord: 12 nos.
 Mains cord: 1no.
 Learning material: 1 no. user manual

Scope of Learning:
1. To study theory of CDMA DSSS Modulation & Demodulation I to generate CDMA-DSSS
Signal.
2. To demodulate CDMA-DSSS signals using BPSK.
3. To study pseudo random bit sequence generation.

Features:
 Self-contained and easy to use.
 Functional blocks indicated on board mimic.
 Direct Spread Spectrum (DSSS) generator and decoder.
 Analog Modulator.
 Binary Phase Shift Keying (BPSK) Modulator.
 Pulse Width Modulator.
 Analog Demodulators.
 Binary Phase Shift Keying (BPSK) Demodulator.
 Pulse Width Demodulator.
 2 Year Warranty. .

6
EXPERIMENT-2

AIM:
Build a Computer-to-Computer, P2P Network (Ad-Hoc Wi-Fi Network).

THEORY:
A Wi-Fi network in ad-hoc mode (also called computer-to-computer or peer mode) lets two or
more devices communicate with each other directly instead of through a central wireless
router or access point (which is what infrastructure mode is).
Setting up an ad-hoc network is useful if there isn't a wireless structure built, like if there
aren't any access points or routers within range. The devices don't need a central server for file
shares, printers, etc. Instead, they can access each other's resources directly through a simple
point-to-point wireless connection.

HOW TO SET UP AN AD-HOC NETWORK:


REQUIREMENTS:
The devices that are going to take part in the ad-hoc network have to have a wireless network
adapter installed. They also have to support a hosted network.
TESTING:
To see if your wireless adapter has hosted network support, look for it in Command Prompt
after running the netsh wlan show drivers command. You might need to open Command
Prompt as an administrator for that command to work.

7
WINDOWS 10 AND WINDOWS 8:
These versions of Windows make it a little tougher to make an ad-hoc network when you
compare the procedure to earlier Windows operating systems. If you want to set up the ad-hoc
network manually without using any other software but what Windows has available, follow
along with these steps:
1. Open Command Prompt and enter this command, replacing the italicized works with
your own network name and password for the wireless network:
1. Netsh wlan set hosted network mode=allow ssid=network name key=password
2. Start the hosted network:
1. Netsh wlan start hosted network
3. In Control Panel, navigate to \Network and Internet\Network Connections\ and go into
the Sharing tab of the network connection's Properties (right-click to find Properties)
to check the box that says Allow other network users to connect through this
computer's Internet connection.
4. Select the ad-hoc network connection from the drop-down menu and OK out of any
open prompts.
About setting up ad hoc on Windows

After Windows 7, no OS from Windows allows to set up an ad hoc network, even if proper wireless
drivers are installed. Windows 10 is not an exception!
But there are some tricks by which one can do ad hoc network setting in Windows 10. Here is the
simple stand 100% working method.

Note that this trick works properly on Windows 8 and Windows 8.1

also. Setting up an ad hoc network in Windows 10


Below is the step by step guide to set up an ad hoc network in Windows 10 on a PC:
1. Open Command Prompt as an administration. In order to open it as an administrator, right
click on it and click “Run as Administrator”.
2. Enter the following command in it:
"netsh wlan set hostednetwork mode=allow ssid=adhocnetwork key=mehdi1234"
In the above command, "mehdi1234" will act as the password for your ad hoc network.
You can keep another one.
3. Press enter!

8
4. The hosted network mode has been set to allow. Now, enter the following command after
the above. "netsh wlan start hosted network"

5. Press enter.

6. The hosted network has started! Close command prompt.

Screenshot of Network Sharing Center before setting up ad hoc network in Windows 10.

9
Screenshot of Network Sharing Center after setting up ad hoc network in Windows 10. You can also
stop the network by entering the following command in command prompt or keep it forever.

"netsh wlan stop hosted network"

WINDOWS 7:
1) Access the Network and Sharing Center section of Control Panel. Do this by opening
Control Panel and then selecting that option. Or, if you’re in Category view, first choose
Network and Internet.
2) Choose the link called Setup a new connection or network.
3) Select the option called Set up a Wireless Ad Hoc (Computer-to-Computer) Network.
4) In that Set Up an Ad Hoc Network window, enter the network name, security type and
security key (password) that the network should have.
5) Put a check in the box next to Save this network so that it will be available later as well.
6) Hit Next and close out of any unnecessary windows.
In an ad hoc mode WLAN (wireless local-area network), wireless devices can communicate
directly with each other. If you have a Windows 7 computer (or a Windows Vista computer,
which is very similar), you will use a process similar to the following to create and activate your
ad hoc WLAN network.
1. Click Start and choose Control Panel. This opens the Control Panel window.
2. Select View Network Status and Tasks. This opens the Network and Sharing Center window.
3. From the Network and Sharing Center window, select Setup a New Connection or Network.
The Set up a Connection or Network dialog box appears.
4. From the Setup a Connection or Network dialog box, choose Setup a Wireless Ad Hoc
(Computer-to-Computer)
Network and click Next; click Next again. The Setup an Ad Hoc Network dialog box appears.

10
5. In the Set Up an Ad Hoc Network dialog box, provide the following information:
 Add a network name for your wireless network.
 Indicate the security type as either WEP or No Authentication.
 If you chose WEP, provide the security key for the network and optionally select the
Hide Characters box.
 Select Save This Network to keep this network for longer than one session.
6. Click Next to continue.
The confirmation dialog is displayed, showing you the information that you need to provide
to other people who will want to connect to your ad hoc network.
1. Click Close.
After the connection is set up, it initially becomes active and remains so until you connect to
another network. If you did not choose to save the connection, it will be removed from your
wireless configuration at that time and you will need to repeat this process to reactivate an ad
hoc network connection.

WINDOWS VISTA:
1. From the Windows Vista start menu, choose Connect To.
2. Click the link called Setup a connection or network.
3. From the Choose a connection option page, choose Setup a wireless ad-hoc (computer-to-
computer) network.
4. Click Next until you see the window for entering the network name, etc.

11
5. Fill in the spaces provided to choose the network details that the ad-hoc network should
have, like the authentication and password information.
6.Click Next and close out of any open windows once it says the network has been created.

WINDOWS XP:
1. Open Control Panel from the Start menu.
2. Navigate to Network and Internet Connections.
3. Choose Network Connections.
4. Right-click the wireless network connection and click Properties.
5. Choose the Wireless Networks tab.
6. Under the Preferred networks section, click Add.
7. From the Association tab, enter the name that the ad-hoc network should be identified by.
8. Choose This is a Computer-to-computer (ad hoc) network but uncheck the box next to
This key is provided formed automatically.
9. Choose an option in Network Authentication. Open can be used if you don’t want to set a
password.
10. Choose a data encryption method in that area of the options.
11. Enter the Wi-Fi password for the ad-hoc network in the Network key section. Type it
again when asked.
12. Click OK out of any open windows to save the changes.

MAC OS:
1. Choose the Create Network...menu option from AirPort (usually accessible from the main
menu bar).
2. Select the Create a Computer-to-Computer Network option and follow the instructions
provided.

12
EXPERIMENT-3

AIM:
How to Build Infrastructure Mode in Wireless Networking.

THEORY:
In computer networking, infrastructure mode is when a network join devices together, either
through wired or wireless means, via an access point like a router. This centralization is what
sets infrastructure mode apart from the ad-hoc mode.
Setting up an infrastructure mode network requires at least one wireless Access Point (AP)
and that the AP and all the clients be configured to use the same network name (SSID).
The access point is cabled to the wired network to allow wireless clients access to resources
like the internet or printers.

INFRASTRUCTURE V/S AD-HOC MODE:


 Compared to ad-hoc wireless networks, infrastructure offers the advantage of scale,
centralized security management, and improved reach. Wireless devices can connect to
resources on a wired LAN, which are common business settings.
 The disadvantage of infrastructure wireless networks is simply the additional cost to
purchase AP hardware. Ad-hoc networks connect to devices in a peer-to-peer manner, so
all that's needed is the device themselves.
 Infrastructure mode is typical for long-lasting, more permanent implementations of a
network. Homes, schools, and businesses do not usually spring for P2P connections used
in ad-hoc mode because they're just far too decentralized to make sense in those
situations.
 Ad-hoc networks are usually seen in short-lived moments where some devices need to
share files but they're too far from a network to make it work. Or, may be a small
operating room in a hospital can configure an ad- hoc network for some of those wireless
devices to communicate with each other.
 However, if you just need a few devices to communicate with one another, an ad-hoc
network is fine. Don't add too many though, because one limitation of ad-hoc networks is
that at some point the hardware just isn't fit for all of that traffic demand, which is when
infrastructure mode is necessary.

Link quick setup wizard is enough for an average user to setup his router but for advanced
options it is better learn how to configure this device manually. This tutorial explains how to
configure wireless router manually for advanced features.

CONFIGURE BROADBAND ACCESS ROUTER:


1. Access Setup Page:
a. Type 192.168.0.1/192.168.1.1 on Browser address bar and presenter.
b. Enter user name and password provided or at the back of the router. Click
on login to access setup page.

13
2. Click on NET/Manage or something like it depending on your router.

3. Select Internet Connection type:

14
Configuration details for each of the Internet connection types is listed below:
1. Configure D-Link Router for Cable Internet Connection:

To setup your router with cable Internet, select the option Dynamic IP (DHCP).
If you are using cable Internet connection the most important step is to click on the button
Clone Your PC's MAC Address.

2. Configure D-Link with Static IP:


Here you should enter the full IP address details provided by your ISP including Subnet Mask,
Default Gateway, DNS Servers etc.

After entering details click on Save Settings.

15
Configure Wireless & Security:
Right after configuring Internet access on router, you need to configure the wireless settings
if you want to use it. Latest wireless routers support both 2.4GHz and 5GHz frequencies in
order to extend its support to 802.11a, 802.11b, 802.11n and 802.11g wireless standards.
802.11n supports both 2.4GHz and 5GHz. Here are the manual steps to configure wireless
and security on router.
1. Login
2. Click on Wireless Settings (WLAN) tab.

3. WLAN is 2.4 GHz Devices (802.11n, 11g and 11b):

a. Click on Enable Wireless and Select 802.11


mode (2.4GHz). You can select one of the
following 802.11modes:
 802.11b Only
 802.11g Only
 802.11a Only
 Mixed 802.11g and 802.11b
 Mixed 802.11n and 802.11g
 Mixed 802.11n, 11g, 11b

b. Check on Enable Auto Channel Scan:

c. Now Wireless Router will automatically pick the channel with least interference.

d. Wireless Network Name:


Here you can write the name of your wireless network (SSID). SSID can be up to 32
characters and it is case sensitive.

e. Select Channel Width:


20/40MHz if you are using both 802.11n and non 802.11n devices. If you are not using
802.11n devices you can select 20MHz.

f. Visibility of SSID:
If you do not want to show your SSID, you can check the option Invisible.

16
4. 5GHz Devices (802.11n and 11a):
a. Follow same steps as that of 2.4GHz.

17
EXPERIMENT-4

AIM:
Configuring Access Point with Point to Point.

THEORY:
Configuring Access Point:
In order to configure the access point, you can connect a laptop or PC to the wireless
access point's console port via a serial cable. Through the use of terminal software, you
can view access point configuration screens and change specific settings, such as radio
channel and transmit power.
If your laptop or PC is equipped with a radio card, then you can access the configuration
screens through the use of a Web browser by typing the Internet Protocol (IP) address of
the access point as the URL for the Web page (for example, "http:/192.168.0.1" or
"http:/192.168.1.1”).

Access point configuration options:

Wireless access points include a wide variety of configuration settings, and the following
represents the more common items you can change with tips on how to configure them.

 IP address: Every wireless access point--indeed, every client and server as well—
must have a unique IP address to enable proper operation on the network. The
wireless access point will come with a pre-assigned IP address, but you'll probably
need to change it to match the address plan of your customer's corporate network.

 Radio channel: Set the radio channels in wireless access points within range of each
other to different channels. This will prevent them from interfering with each other.
With 802.11b and 802.11g networks, use channels 1, 6 and 11 to ensure enough
frequency separation to avoid conflicts. 802.11a channels, however, don't overlap, so
just be sure the adjacent 802.11a wireless access points are set to different channels.

 Transmit power: In most cases, the transmit power should be set to the highest
value. This maximizes range, which reduces the number of wireless access points and
cost of the system for your customer. If you're trying to increase the capacity of your
customer's network by placing wireless access points closer together, set the power to
a lower value to decease overlap and potential interference.

 Service set identifier (SSID): The SSID defines the name of a WLAN that users
associate with. By default, the SSID is set to a common value, such as tsunami for
Ciscoproducts.

18
 Data rate:
Most wireless access points allow you to identify acceptable data rates. By default,
802.11b wireless access points operate at 1,2,5.5 and 11 Mbps data rates, and
802.11g access points operate at data rates of 6 to 54 Mbps, depending on the quality
of the link between the client device and the access point.

 Beacon interval: The beacon interval is the amount of time between access point
beacon transmissions. The default value for this interval is generally 10ms, that is, 10
beacons sent every second. This is sufficient to support the mobility speed of users
within an office environment.

 Request-to-send/clear-to-send (RTS/CTS): The RTS/CTS function alleviates


collisions due to hidden nodes, which occurs when multiple stations are within range
of a common wireless access point but out of range of each other. In most cases it's
best to disable RTS/CTS.

 Fragmentation: Fragmentation can help reduce the amount of data needing


retransmission when collisions or radio frequency (RF) interference occurs. This can
improve performance in some cases by enabling the clients and access points to
retransmit smaller packets when errors are found.

 Encryption: Most wireless access points allow the enabling of wired equivalent
privacy (WEP), which encrypts the frame body (not headers) of each data frame. Use
WEP as a minimum level of protection. WEP is somewhat static and requires you to
configure each access point and client device with the same encryption key.

 Authentication: As part of the 802.11 standard medium access control (MAC)


functions, wireless access points implement the default 802.11 open system
authentication and sometimes shared key authentication. Neither one of these forms
of authentication provides very good security.

 Administrative interfaces: In order to improve security for your customer, be sure


to disable the console port of the access point to avoid the possibility of an
unauthorized person reconfiguring an access point and removing encryption and
authentication functions.

Configuration:
Its Configuration has two parts:
 Configuring the Internet Part, where we tell the Router how to connect to the internet.
 Configuring the Wi-Fi Part, where we decide the name and password with which we
connect to the Router.
Wi-Fi Configuration has also been given, in order to ease the process of you connecting to
The Router SSID and Password Creation have been explained, Few high end routers have
two bands to work on –2.4GHz and 5GHz
 2GHz band provides higher range, but lesser speed.
 5GHz band provides lower range, but higher speed.

19
Step:1 Logging into:

Router Brand Common Default IP Addresses

Asus 192.168.1.1,192.168.2.1

Benatone 192.168.1.1

Belkin 192.168.1.1,192.168.2.1

Cisco 192.168.1.1,192.168.0.30,192.168.0.50

Dell 192.168.1.1

D-Link 192.168.1.1,192.168.0.1

Gigabyte 192.168.1.254

Google 192.168.86.1,192.168.0.1

GX 192.168.1.1

Huawei 192.168.1.1,192.168.0.1,192.168.3.1,192.168.8.1

Microsoft 192.168.2.1

Netgear 192.168.0.1,192.168.0.227

NetComm 192.168.1.1,192.168.10.50,192.168.20.1

Siemens 192.168.1.1,192.168.0.1,192.168.1.254,192.168.2.1,192.168.254.254

Sitecom 192.168.0.1,192.168.1.254,192.168.123.254

Tenda 192.168.1.1,192.168.0.1

TP-Link 192.168.1.1,192.168.0.1,192.168.0.254

ZTE 192.168.1.1,192.168.0.1,192.168.100.100,192.168.1.254,192.168.2.1,
192.168.2.254

20
Enter your User name and Password:

Configuring Access Point with Point to Point:


 GX Wireless-G Access Points can be configured as an Access Point, Access
Point Client, Wireless Repeater, and Wireless Bridge. The Wireless Bridge mode
will turn the access point into a wireless bridge. Wireless clients will not be able
to connect to the access point in this mode.

 NOTE: When an access point is configured as a wireless bridge, it will link a


wireless network to a wired network allowing you to bridge two networks with
different infrastructure.

21
To configure an access point as a wireless bridge, you need to perform three
steps:
1. Checking the Wireless MAC Address of an Access Point
2. Setting-Up Wireless Bridge Mode on the WAP54G
3. Changing the LAN IP Address of the Wireless Bridge

Checking the Wireless MAC Address of an Access Point:


NOTE: The following steps will be performed on the main access point using a wired computer.
 Step1: Connect a computer to the access point.
 Step2: Assign a static IP Address on the computer.
 Step3: Open the access point’s web-based set up page.
 Step 4: When the access point’s web-based setup page opens, take note of the
Wireless MAC Address. NOTE: If you are using Mac® to access the access
point’s web-based setup page. When the access point’s web based setup page
opens, take note of the Wireless MAC Address.

22
Setting-Up Wireless Bridge Mode on the WAP54G:
 Step1: Connect a computer to the access point you want to configure as a wireless bridge.

 Step2: Assign a static IP Address on the computer.


 Step3: Open the access point’s web-based setup page.
NOTE: If you are using Mac® to access the access point’s web-based setup page.
 Step4: Then the access point’s web-based setup page opens, click AP Mode.
NOTE: The access point’s web-based setup page may differ depending on the access
point’s version number.

23
 Step5: Select Wireless Bridge and type the remote access point’s MAC Address that
you took note of earlier. NOTE: Remove the colons (:) when typing the MAC
Address on the Remote Access Point’s LAN MAC Address field.

 Step 6: Click OK

24
EXPERIMENT-5

AIM:
Configuring Access Point with Point to Multi-Point.

THEORY:
Definition: In Wi-Fi network, Bridge mode allows two or more wireless access points (APs)
to communicate with each for the purpose of joining multiple LANs.
Some wireless bridges support only a single point-to-point connection to another AP. Others
support point-to-multipoint connections to several other APs. This article is about to setup a
Point to Multi-Point Bridge.

For setting up such network as the above topology by Point to Multi-Point Bridge mode, you
need to configure the Access Point A to Point to Multi-Point Bridge mode and points to
Access Point B and Access Point C; you also need to configure both Access Point B and
Access Point C to "Point to Point Bridge mode" and point them to Access Point A.

Step1:
Connect your computer to the AP which will be configured to Point to Multi-Point Bridge
mode (Access Point A, and then login to the Web-based Interface by entering the IP address
192.168.1.1 or 192.168.1.254 into the address bar of the Web Browser.

Step2:
Change the LAN IP address of the access point to avoid IP conflict.
After changing the IP address of your access point, you need to re-log into it by using the new
IP address. And please note that the IP addresses of the access points cannot be the same in
your network.

25
Step3:
Configure your Access Point A to Point to Multi-Point Bridge mode.
1. Click on Wireless->Basic Settings on the left menu, change the channel to a fixed
one.

2. Go to Wireless->Wireless Mode on the left, select Bridge (Point to Multi-Point).

3. Press Survey or Search button and an AP list will be displayed. Locate the BSSID
(MAC address) of the access point B and access point C, remember the Channel->
Click Connect.

26
4. Then you will see the MAC addresses of the Access Point B and C are displayed in
the MAC of AP boxes.

5. Click on Save button to save the settings.

6. Go to Wireless-Security Settings to secure the wireless as WEP. Note that it only


supports WEP when the AP is configured as bridge mode. See more details here
Supported Security Types of TP-Link Access Points.

7. Go to System Tools-Reboot to reboot the device.

Step4:
Configure your Access Point B and Access Point C to Point to Point Bridge mode.
Additional information:
There is an option called With AP Mode in the setting page. If you enable it, the access point
can work in AP mode at the same time when it has been configured to Bridge mode. This
means that you can connect other wireless clients to this access point when it has been
configured to Bridge mode.
Otherwise you cannot connect any wireless client to this access point when it has been
configured to Bridge mode.

27
EXPERIMENT-6

AIM:
Introduction to Cisco Packet Tracer.

THEORY:
Cisco developed the Packet Tracer software to help Networking Academy students gain
practical networking technology skills in a rapidly changing environment. Packet Tracer is a
powerful network simulation program which allows students to experiment with network
behavior and ask 'what if' questions. It supplements physical equipment in the classroom by
allowing students to create a network with an almost unlimited number of devices,
encouraging practice, discovery and troubleshooting. Started in 1997, Cisco Networking
Academy is an IT& Networking skills and career building program for learning institutions
and individuals worldwide.

Packet Tracer complements the Networking Academy curricula, allowing instructors to easily
teach and demonstrate complex technical concepts and networking systems design. Instructors
can customize individual or multiuser activities, providing hands-on lessons for students that
offer value and relevance in their classrooms. Students can build, configure, and troubleshoot
networks using virtual equipment and simulated connections, alone or in collaboration with
other students. Packet Tracer offers an effective, interactive environment for learning
networking concepts and protocols. Most importantly, Packet Tracer helps students and
instructors create their own virtual “network Worlds for exploration, experimentation, and
explanation of networking concepts and technologies.

28
Packet Tracer Modes: Cisco Packet Tracer provides two operating modes to visualize the
behavior of a network—real-time mode and simulation mode. In real-time mode the network
behaves as real devices do, with immediate real-time response for all network activities. The
real-time mode gives students a viable alternative to real equipment and allows them to
gainconfigurationpracticebeforeworkingwithrealequipment.Insimulationmodetheusercanseean
d control time intervals, the inner workings of data transfer, and the propagation of data.
Workspace:

 Logical–Logical workspace shows the logical network topology of the network the user has
built. It represents the placing, connecting and clustering virtual network devices.

 Physical–Physical workspace shows the graphical physical dimension of the logical


network. It depicts the scale and placement in how network devices such as routers,
switches and hosts would look in a real environment. It also provides geographical
representation of networks, including multiple buildings, cities and wiring closets.

Key Features:
 Unlimited devices
 E-learning
 Customize single/multi user activities
 Interactive Environment
 Visualizing Networks
 Real-time mode and Simulation mode
 Self-paced
 Supports majority of networking protocols
 International language support
 Cross platform compatibility

29
EXPERIMENT-7

AIM:
To configure IP address in following topology:
a) Mesh Topology
b) Star Topology
c) Ring Topology
d) Bus Topology

THEORY:
Procedure:
a) Mesh Topology:

1. Pick Generic PC-PT and drag on the workspace. An icon with PC0 tag will appear.
2. Pick Generic PC-PT and drag on the workspace. An icon with PC1 tag will appear.
3. Pick Generic PC-PT and drag on the workspace. An icon with PC2 tag will appear.
4. Pick Generic PC-PT and drag on the workspace. An icon with PC3 tag will appear.
5. Pick Generic Switch-PT and drag on the workspace. An icon with Switch0 tag will appear.
6. Pick Generic Switch-PT and drag on the workspace. An icon with Switch1 tag will appear.
7. Pick Generic Switch-PT and drag on the workspace. An icon with Switch2 tag will appear.
8. Pick Generic Switch-PT and drag on the workspace. An icon with Switch3 tag will appear.

30
9. Use Copper Cross-Wire Cabling to connect all the Switches together with fast Ethernet
0/1,0/2,0/3 and 0/4 respectively.
10. Use Copper Straight-Through Wire Cabling to connect all the Switches with the PCs
with fast Ethernet0 to Switch0, Ethernet1 to Switch1, Ethernet2 to Switch2 and Ethernet
3 to Switch3 respectively
11. Double click PC0 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.1 and subnet mask to 255.255.0.0.

12. Double click PC1 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.2 and subnet mask to 255.255.0.0.
13. Add simple PDU (Protocol Data Unit), i.e., Packet and drop it at PC0 and PC1.

31
14. Click on Simulation button in right toolbar and click on Auto Capture/ Play button.

b) Star Topology:

1. Pick Generic PC-PT and drag on the workspace. An icon with PC0 tag will appear.
2. Pick Generic PC-PT and drag on the workspace. An icon with PC1 tag will appear.
3. Pick Generic Switch-PT and drag on the workspace. An icon with Switch0 tag will
appear.
4. Use Copper Straight-Through Wire Cabling to connect both PC with fast Ethernet0 to
Switch0.
5. Double click PC0 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.1 and subnet mask to 255.255.0.0.
6. Double click PC1 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.2 and subnet mask to 255.255.0.0.

32
7. Add simple PDU (Protocol Data Unit), i.e., Packet and drop it at PC0 and PC1.
8. Click on Simulation button in right toolbar and click on Auto Capture/ Play button.

9. When Capture/Forward button is clicked, another PDU will be forwarded to other PC


while the transmission of receiving PDU will pause.

33
c) Ring Topology:

1. Pick Generic PC-PT and drag on the workspace. An icon with PC0 tag will appear.
2. Pick Generic PC-PT and drag on the workspace. An icon with PC1 tag will appear.
3. Pick Generic PC-PT and drag on the workspace. An icon with PC2 tag will appear.
4. Pick Generic PC-PT and drag on the workspace. An icon with PC3 tag will appear.
5. Pick 2950-24 Switch and drag on the workspace. An icon with Switch0 tag will appear.
6. Pick 2950-24 Switch and drag on the workspace. An icon with Switch1 tag will appear.
7. Pick 2950-24 Switch and drag on the workspace. An icon with Switch2 tag will appear.
8. Pick 2950-24 Switch and drag on the workspace. An icon with Switch3 tag will appear.
9. Use Copper Cross-Wire Cabling to connect all the Switches together with fast Ethernet
34
0/1,0/2,0/3 and 0/4 respectively.
10. Use Copper Straight-Through Wire Cabling to connect all the Switches with the PCs
with fast Ethernet0 to Switch0, Ethernet1 to Switch1, Ethernet2 to Switch2 and
Ethernet3 to Switch3 respectively.

11. Double click PC0 and click on desktop configuration. Choose IP


configuration and change IP to 12. 172.16.1.1 and subnet mask to
255.255.0.0.
12. Double click PC1 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.2 and subnet mask to 255.255.0.0.
13. Double click PC2 and click on desktop configuration. Choose IP
configuration and change IP to 12. 172.16.1.3 and subnet mask to
255.255.0.0.
14. Double click PC3 and click on desktop configuration. Choose IP
configuration and change IP to 14.172.16.1.4 and subnet mask to
255.255.0.0.

35
15. Add simple PDU (Protocol Data Unit), i.e., Packet and drop it at PC0 and PC2.
16. Click on Simulation button in right toolbar and click on Auto Capture/ Play button.

d) Bus Topology:

1. Pick Generic PC-PT and drag on the workspace. An icon with PC0 tag will appear.
2. Pick Generic PC-PT and drag on the workspace. An icon with PC1 tag will appear.
3. Pick Generic PC-PT and drag on the workspace. An icon with PC2 tag will appear.
4. Pick Generic PC-PT and drag on the workspace. An icon with PC3 tag will appear.
5. Pick Generic Switch and drag on the workspace. An icon with Switch0 tag will appear.
6. Pick Generic Switch and drag on the workspace. An icon with Switch1 tag will appear.

36
7. Pick Generic Switch and drag on the workspace. An icon with Switch2 tag will appear.
8. Pick Generic Switch and drag on the workspace. An icon with Switch3 tag will appear.
9. Use Copper Cross-Wire Cabling to connect all the Switches together with fast
Ethernet0/1,0/2,0/3 and 0/4 respectively.
10. Use Copper Straight-Through Wire Cabling to connect all the Switches with the PCs
with fast Ethernet0 to Switch0, Ethernet1 to Switch1, Ethernet 2 to Switch2 and
Ethernet3 to Switch3 respectively.

11. Double click PC0 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.1 and subnet mask to 255.255.0.0.
12. Double click PC1 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.2 and subnet mask to 255.255.0.0.
13. Double click PC2 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.3 and subnet mask to 255.255.0.0.
14. Double click PC3 and click on desktop configuration. Choose IP configuration and
change IP to 172.16.1.4 and subnet mask to 255.255.0.0.

37
15. Add simple PDU (Protocol Data Unit), i.e., Packet and drop it at PC0 and PC3.
16. Click on Simulation button in right toolbar and click on Auto Capture/ Play button.

38
EXPERIMENT-8

AIM:
To configure IP address between two networks by using a Router and two PCs.

EQUIPMENT:
Cisco Packet Tracer software

THEORY:
The network layer is responsible for the delivery of individual packets from the source to the
destination host. The packet transmitted by the sending computer may pass through several
LANs or WANs before reaching the destination computer. For this level of communication,
we need a global addressing scheme; which we call IP Address.
A Router is a three-layer device which routes packets based on their logical addresses. A
router normally connects LANs and WANs in the internet and has a routing table used for
making decisions about the route.

Procedure:
The following steps can be used to configure the IP address in three networks by Using PCs
and Router:-
Step1: Select Number of pc from Generic and Devices.
Step2: Make Connections between pc through Copper Cross-over wire.
Step3: Configure each PC with Unique IP Address of same class.
Step 4: Configure each PC with Gateway Address of same class.
Step 5: Configure the Router with each Ethernet option by entering the same IP Address of
each PC.
Step 6: Then tick the ON option on the Port Status.
Step7: Add simple PDU from Source PC to Destination PC.
Step 8: Click on the Simulation Mode Button which is on the right Bottom, and then simulate
the Topology by clicking the Auto Capture/Play Button.

39
Fig: Sharing of a packet between two PCs using a router

40
EXPERIMENT-9

AIM:
To configure IP address between three networks by using 2Routers, 2Switches and number of
PCs.

EQUIPMENT:
Cisco Packet Tracer software

THEORY:
The network layer is responsible for the delivery of individual packets from the source to the
destination host. The packet transmitted by the sending computer may pass through several
LANs or WANs before reaching the destination computer. For this level of communication,
we need a global addressing scheme; which we call IP Address.
A Router is a three-layer device which routes packets based on their logical addresses. A
router normally connects LANs and WANs in the internet and has a routing table used for
making decisions about the route.

Procedure:
The following steps can be used to configure the IP address in three networks by Using PCs
and Router:
Step1: Select Number of PCs from Generic and Devices.
Step2: Make Connections between PCs and Switches through straight copper wire.
Step3: Connect Switches and routers through straight copper wire, selecting 0/0 port of routers.
Step4: Connect both Routers using copper cross wire and selecting 0/1 ports.
Step 5: Configure each PC with Unique IP Address using same class for the PCs in same
network.
Step6: Configure each PC with Gateway Address of same class for same network.
Step7: Configure the Routers at 0/0 ports by entering the same IP Address (Default Gateway of
networks) of each PC and tick the ON option on the Port Status.
Step 8: Configure the routers at 1/0 ports by entering unique IP Address of same class other
than class used for PCs and tick the ON option on the Port Status.
Step9: Add simple PDU from Source PC to Destination PC.
Step10: Click on the Simulation Mode Button which is on the right Bottom, and then simulate
the Topology by clicking the Auto Capture/Play Button.

41
Fig:-Sharing of a packet between two networks using 2 routers

42
EXPERIMENT-10

AIM:
To configure access points.

EQUIPMENT:
Cisco Packet Tracer software

THEORY:
The network layer is responsible for the delivery of individual packets from the source to
the destination host. The packet transmitted by the sending computer may pass through
several LANs or WANs before reaching the destination computer. For this level of
communication, we need a global addressing scheme; which we call IP Address.

In computer networking, a wireless access point (WAP) is a networking hardware device


that allows a Wi-Fi device to connect to a wired network. The access point usually
connects to a router (via a wired network) as a standalone device, but it can also be an
integral component of the router itself. An access point is differentiated from a hotspot,
which is the physical location where Wi-Fi access to a WLAN is available.

A Router is a three-layer device which routes packets based on their logical addresses. A
router normally connects LANs and WANs in the internet and has a routing table used
for making decisions about the route.

Procedure:
The following steps can be used to configure the access points:

Step1: Select number of Laptops from Generic and Devices.

Step2: Select two Access Points and a router from the Devices.

Step 3: Make Connections between the access points and a router through copper cross-wire.

Step4: Connect Port 0 of both the access points to the router by selecting 0/0 and 1/0 ports of
router respectively.

43
Step5: Configure router with unique IP address using same class for different ports with the access
points.

Step6: Select each Laptop and replace the PT-Laptop-NM-1CFE with WPC300N in the physical
view.

Step 7: Configure each Laptop with Unique IP Address using same class.

Step8: Configure each Laptop with Gateway Address of same class for same network to connect
with the access points.

Step9: Add simple PDU from Source Laptop to Destination Laptop.

Step10: Click on the Simulation Mode Button which is on the right Bottom, and then simulate
the Topology by clicking the Auto Capture/Play Button.

44
Fig:-Sharing of a packet between two networks using access points and a router

45
EXPERIMENT-11

AIM:
Study of BPSK Modulation and Demodulation Process.

EQUIPMENT:
1. ST8335/CY1802E Trainer Board with power supply cord
2. Oscilloscope with connecting probe
3. Connecting cords

THEORY:
CONNECTING DIAGRAM:

46
WAVEFORM:

PROCEDURE:
1) Before making connections, make sure that power supply is switched off.
2) Refer to the above figure 2.1 while making connections.
3) Connect the output of binary data generator to the input of unipolar to bipolar converter.
4) Connect the output of this converter to the modulating signal input of BPSK modulator.
5) Connect sinusoidal carrier from the carrier generator section to the carrier input of BPSK
modulator
6) Turn data switches of binary data generator to '1' or '0' as per your choice of 8 bit Binary
data pattern. This binary data generator will then repeat the sequence continuously.
7) Now switch 'On' the power supply and observe me output of Binary Data Generator on the
CRO screen. If data is not appearing then press load pushbutton to reset it. Adjust the time
base so as to see the complete repetitive binary data. Every bit in this sequence repeat sit
self after 8 consecutive bits.
8) Observe the output of BPSK modulator on CRO. This is BPSK modulated Waveform.
9) Now connect the output of BPSK modulator to the input of BPSK Demodulator. Connect
the output of low-pass filter of BPSK Demodulator to the comparator input.

47
10) Now observe the output of comparator on CRO. Adjust the bias of comparator and phase
of Carrier Recovery circuit of demodulator until you see a complete replica of the input
binary data. This is our demodulated signal. It may so happen sometime that the recovered
output is an inverted replica of input signal. If such an output comes then readjust the
phase of recovered carrier to obtain the correct waveform.

RESULTING WAVEFORM:

RESULT:
Thus, the BPSK Modulation and Demodulation was studied.

48
EXPERIMENT-12

AIM:
Study of Pulse Width Modulation and Demodulation.

EQUIPMENT:
1. PWM Trainer-01
2. Power Chord-01
3. Patch Chords-04
4. CRO-01

THEORY:
PROCEDURE:
1) Connect power chord to PM Trainer and switch ON the Trainer.
2) Message signal with various frequencies (500Hz, 1 KHz, 2 KHz) with variable
amplitude are available in message signal section.
3) Connect CRO between any one test terminal from P1 to P3 and GND Point to view
the message signal with variable amplitude on CRO.
4) A Triangular wave carrier signal at various frequencies (64KHz, 32KHz,16KHz,
8KHz) are available in carrier signal section.
5) Now Connect any one message signal and carrier signal as an input to Pulse Width
Modulator (P9 and P10) using patch chord.
6) The Pulse width modulation is done and the modulated signal can be tested using
CRO with test point P12.
7) Patch the modulated signal in P12 with P15 in the demodulator section as a low pass
filter input.
8) The filtered output is available at test Point P13 connect it with P14 test point
9) The final demodulated output is available at test point P18 and varies the pot meter
to get amplified output.
10) Note down all the waveforms.

49
BLOCK DIAGRAM:
PWM Modulation

PWM Demodulation

Front Panel Diagram

50
WAVEFORM:

RESULT:
Thus, the Pulse Width Modulation and Demodulation was studied.

51

You might also like