WLAN Design
WLAN Design
PREPARED BY ID NO.
DECLARATION
We are here declaring this is our internship final report and project program at AKU ICT
data center and is a record of our original work and being submitted to faculty of
Electrical and Computer Engineering. We have done this internship report and project for
three months in Aksum university ICT center. The completion of this internship report
and project advice is done by advisor Mr. Teame and with the help or guidance of our
coordinator Mr. Abraha G. made strong effort for the project fulfillment by asking the
problem faces during the activity.
Student’s name 1: Signature:
_________
i
ACKNOWLEDGEMENT
First of all, we would like to express our gratitude to Almighty GOD for giving us the
opportunity to complete our internship program and enabling to complete this internship
report within scheduled time. Next to our advisor Mr. Teame T. for providing us his
instruction, and support throughout our internship program and we would like to forward
special thanks and gratitude to Mr.Abraha G. and Mr. Araya who supported us both for
the technical and theoretical aspect for our internship program. Finally, we are also
grateful for all well-wishers, who helped us directly and indirectly.
ii
EXECUTIVE SUMMARY
This report introduces several new concepts and terms that will be used through the
internship program and practical application of Electrical & computer Engineering. And
this Internship program is mainly concerned in computer Engineering to create
productive, skilled and knowledgeable generation. This report is an outcome of the
practice we conducted during our internship period at ICT center of Aksum University.
This brings to us a great opportunity to realize our theoretical knowledge by practical
works, which we gained for the last four years of study in Axum University.
This report is organized in to two the first part describes the report which includes
describing briefly the back ground of ICT center (including its history, objective, vision,
mission), describing the overall internship experience we had gained during the practical
periods( including how we get in to the company, the section of the company we have
been working in, the procedure we used while performing our task ) and describing the
benefits we gained from our internship program in terms of improving our practical
skills, interpersonal communication skills, team playing skills, leadership skills,
upgrading our theoretical knowledge and work ethics.
The second part project on design and implementation of WLAN in AKU main campus
student’s dormitories involves implementing various procedures and techniques to
improve signal strength and quality for better coverage. We used the procedure statement
problem and justification, objective, Literature view, significant project, methodology,
System model, result and conclusion, recommendation we could improve coverage but
still there is blockage, hence somebody can improve by another method.
iii
LIST OF ACRONYMS
AKU Aksum University
ARP Address Resolution Protocol
DHCP Dynamic Host Configuration Protocol
DMZ Demilitarized Zone
DNS Domain Name System
ECE Electrical and Computer Engineering
FTP File Transfer Protocol
HTTP Hyper Text Transfer Protocol
ICT Information and Communication Technology
ICTD Information and Communication Technology
Development
IEEE International Electronics and Electrical Engineering
IP Internet Protocol
L2 Layer 2
L3 Layer 3
LAN Local Area Network
MAC Media Access Control
NAT Network Address Translation
PC Personal Computer
PoE Power over Ethernet
QoS Quality of Service
RJ-45 Registered Jack 45
UTP Unshielded Twisted Pair
VLAN Virtual Local Area Network
VTP Virtual Trucking Protocol
iv
WAN Wide Area Network
Wi-Fi Wireless Fidelity
WLAN Wireless local area network
LIST OF FIGURES
FIGURE 1. 1. OVERALL ORGANIZATIONAL STRUCTURE OF ICT.......................................................................3
v
Table of Contents
DECLARATION..................................................................................................................................i
ACKNOWLEDGEMENT.....................................................................................................................ii
EXECUTIVE SUMMARY...................................................................................................................iii
LIST OF ACRONYMS........................................................................................................................iv
LIST OF FIGURES..............................................................................................................................v
CHAPTER ONE.................................................................................................................................1
1. Introduction................................................................................................................................1
1.1. Background Information OF Aksum University ICT Center..................................................1
1.2 mission of Aksum University ICT center................................................................................1
1.3 Vision of Aksum University ICT center..................................................................................1
1.4 Main Products of Aksum University ICT center.....................................................................1
1.5 Aim of Aksum University ICT center......................................................................................2
1.6 Objective of Aksum University ICT center.............................................................................2
1.6.1 General Objective..........................................................................................................2
1.6.2 Specific Objective..........................................................................................................2
1.8 Roles and responsibilities of the ICT development Director.................................................3
1.9 Roles and responsibilities of Business Applications Development and Administration........3
1.10 Roles and responsibilities of ICT Infrastructure and Services..............................................3
1.11 Roles and responsibilities of Teaching and Learning Technologies.....................................4
vi
1.12 Roles and responsibilities of technical support and maintenance......................................4
1.13 Roles and responsibilities of Training and Consultancy......................................................4
CHAPTER TWO................................................................................................................................5
2. THE OVERALL INTERNSHIP EXPERIENCE......................................................................................5
2.1 How We Get into the Company............................................................................................5
2.2 Procedures and Methods......................................................................................................5
2.3 We have been working in this Main Campus........................................................................6
2.4 Network Infrastructure.........................................................................................................6
2.5 Network Criteria...................................................................................................................7
2.5.1 Performance...................................................................................................................7
2.5.2 Reliability......................................................................................................................7
2.5.3 Security..........................................................................................................................7
2.6. Types of Network Connection..............................................................................................7
2.6.1 Point to Point.................................................................................................................7
2.6.2 Multi-Point.....................................................................................................................7
2.7 Categories of Network..........................................................................................................8
2.7.1 Local Area Network.......................................................................................................8
2.7.2 Wide Area Network.......................................................................................................9
2.7.3 Metropolitan Area Networks..........................................................................................9
2.8 Network Device..................................................................................................................10
2.9 Twisted Pair Cable..............................................................................................................11
2.9.1 UTP (unshielded twisted pair).....................................................................................11
2.10 The Challenges in the Network Infrastructure and Service Department..........................14
2.11 The Solution for the Challenges........................................................................................14
CHAPTER THREE............................................................................................................................15
3. DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL AREA NETWORK FOR AKU MAIN
CAMPUS STUDENT DORMITORY...................................................................................................15
3.1. Background of the Study....................................................................................................15
3.2. Statement of Problem........................................................................................................15
3.3. Objective of the Project.....................................................................................................16
3.3.1. General Objective.......................................................................................................16
3.3.2. Specific Objective.......................................................................................................16
vii
3.4. Scope and Limitation of The Project..................................................................................16
3.4.1. Scope of The Project.......................................................................................................16
3.4.2. Limitations of the project.........................................................................................16
3.5. Significance of the project.................................................................................................17
3.6. Literature Review...............................................................................................................17
3.7.1 IEEE 802.11a STANDARD and SPECIFICATION....................................................17
3.7.2 IEEE 802.11b STANDARD and SPECIFICATION....................................................18
3.7.3 IEEE 802.11g STANDARDS and SPECIFICATION.................................................18
3.7.4 802.11n STANDARD and SPECIFICATION.............................................................18
3.7. Methodology.....................................................................................................................19
3.9 Requirement of Equipment..............................................................................................21
3.9.1. Core Layer..................................................................................................................24
3.9.2. Distribution Layer.......................................................................................................24
3.9.3. Access Layer...............................................................................................................25
3.9.4. Wireless Access Point (AP)........................................................................................25
3.10 Results..............................................................................................................................25
CHAPTER FOUR.............................................................................................................................32
4. BENEFITS GAINED FROM INTERNSHIP PROGRAM....................................................................32
4.1 Benefits that we are get from the internship program.......................................................32
4.1.1. Practical Skills............................................................................................................32
4.1.2. Theoretical Knowledge...............................................................................................32
4.1.3. Team-playing Skills......................................................................................................33
4.1.4. Leadership Skills..........................................................................................................33
4.1.5. Work Ethics Related Issues.........................................................................................33
4.1.6. Entrepreneurship Skills...............................................................................................33
CHAPTER FIVE...............................................................................................................................34
5. CONCLUSION AND RECOMMENDATION...................................................................................34
5.1. Internship Conclusion During the whole period of internship...........................................34
5.2 Project Conclusion..............................................................................................................34
5.3 Internship Recommendations.............................................................................................34
References....................................................................................................................................36
viii
ix
CHAPTER ONE
1. Introduction
Aksum University ICT center was established by ministry of education in 1999 E.C.
AKU ICT center was established during the establishment of the university and
developed from time to time with development of the university.
Aksum University ICT center is located about 2.5 kilometers from the town of Aksum to
the south west. It is located in the main campus of Aksum University about 200 meters
from the main gate of the University. When we enter to the main campus it founds at the
right side near the asphalt road. The data center of this ICT center is placed at the ground
of the digital library at western side of the building.
The mission of the Aksum University ICT center is to provide sustainable ICT service
and facilitate changes through the effective use of ICT in the university and produces
skilled and competent man power through the provision of quality education, conducting
result oriented research and of offering problem solving community service.
The vision of AKU- ICT unit to provide a customer cantered AKU-ICT and business
development service that:
It is expected that this policy will help re-engineer its processes with a view of efficient
and effective delivery of library and information services. Specific objectives of the
policy include:
1
To define the scope of what is ICT in Aksum university.
To serve as a guideline to AKU staff and public on what is good or not good ICT
practices in terms of usage of information systems facilities.
To serve as a guideline for staff on ICT practices and procedures to serve as a
guideline for modernizing AKU services.
2
1.7 Organizational Governance Structure of Aksum University ICT center
3
Plan, implement and manage the Internet connectivity
Creating acceptable use policy for the network and Internet
Secure the network from Internal and external threats
4
CHAPTER TWO
We have been studying of electrical and computer engineering since 2009 E.C before this
three month internship at Aksum University and in this time, we have seen many
changes, Transformation Plan and great growth in the University. The university industry
linkage program is planned to create a good interaction between universities and
industries, and also create students that have the capability of facing and solving practical
problems. Because of these reasons, Aksum University has given a great deal of attention
to this program in helping students, starting from searching companies that are willing to
be part of this program up to giving essential documents and schedules. We first choice
internship placement and this is given to our department office of ECE and they check
and sent acceptance. So, we get into the company by giving internship place request letter
of our university to company head office. Then they observe the request letter and they
had given their acceptance letter. When we come back to their company to begin the
internship program, we should bring the acceptance letter of the company. Then we
started our internship program in a given time in the main data center and ICT
development.
5
And then we had distributed another new cable and had crimped it
After that we had inserted into nodes and punched it gently
6
devices, it is a resource that enables us to gather, analyze, organize, and disseminate
information that is essential to our profitability.
7
temporally. If several devices can use the link simultaneously, it is a spatially shared
connection.
2.7 Categories of Network
The category into which a network falls is determined by its size. According to this
there are three types called local area network, wide area network and metropolitan area
network.
2.7.1 Local Area Network
Local area networks, generally called LANs, are privately-owned networks within a
single building or campus of up to a few kilometers in size. They are widely used to
connect personal computers and workstations in company offices and factories to share
resources (e.g., printers) and exchange information. LANs are distinguished from other
kinds of networks by three characteristics:
1. Size,
2. Transmission technology, and
3. Topology.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use certain
kinds of designs that would not otherwise be possible. It also simplifies network
management.
8
2.7.2 Wide Area Network
A wide area network provides long-distance transmission of data, image, audio, and
video information over large geographic areas that may comprise a country, a continent,
or even the whole world.
9
2.8 Network Device
Switch: - is a multiport device that broadcasts frames received on one port to all
other ports. All ports are in the same collision domain. Switches are generally
identified as Layer-2 devices and layer 1 device, as switches process information
stored in the Data-Link header of a frame (such as MAC addresses in Ethernet).
Figure 2. 4 Switch
Figure 2. 5 Router
Hub: - Hubs are Layer-1 devices that physically connect network devices
together
for communication
Figure 2. 6 Hub
10
2.9 Twisted Pair Cable
Twisted pair cable consists of color-coded pairs of insulated copper wires, each with
diameter of 0.4 to 0.8 mm (approximately the diameters of a straight pin). Every two
wires are twisted around each other to form pairs, and all the pairs are encased in a plastic
sheath. The number of pairs in a cable varies, depending on the cable type. So, all twisted
pair cable falls into one of two categories. These are: -
STP (shielded twisted pair)
UTP (unshielded twisted pair)
2.9.1 UTP (unshielded twisted pair)
Cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its
name implies, UTP does not contain additional shielding for the twisted pairs. As a result,
UTP is both less expensive and less resistant to noise than STP.
There are two types of UTP internet cable namely; straight through and cross over.
Straight through: -used to connect different devices (switch to pc, switch to router). We
can use RJ-45 and cable cat 6.
Not all RJ-45 connectors are created equally. One reason why CAT-6 cable is much
harder to work with than CAT-5 cable is that CAT-6 is quite a bit thicker. So, it's hard to
get RJ-45 connectors intended for CAT-5 cable to attach properly to CAT-6 cable. When
you're shopping for RJ-45 connectors, make sure the ones you buy are suitable for CAT-
6.
11
Figure 2. 8 RJ45 connector
12
Green
Brown with a white stripe
Brown
Cross over: - is used to connect the same device (i.e., switch to switch, pc to pc).
The color Can be arranged as: -
WG G WO B WB O WBR BR
Servers
Servers are devices with a set of programs providing services requested by clients.
Different servers do different jobs, from serving email and video to protecting internal
networks and hosting Web sites.
13
2.10 The Challenges in the Network Infrastructure and Service Department
The challenge we had been facing while performing the tasks during our training in the
company we came across with a lot of joy and upgrading practical skill and widening our
future work career. But there are many problems that challenged us during my study.
Some of the key problems that challenged me are going on listed as follow:
In the first time it was difficult to introduce ourselves with department and freely to ask.
The company doesn’t have documents which are properly handled
The skill full persons are almost always busy at work
There is no enough time to discuss with them.
The company is not well-organized in order to provide building knowledge for
the internship students.
14
CHAPTER THREE
15
3.3. Objective of the Project
3.3.1. General Objective
To Design and Implement Wireless Local Area Network in Aksum University
main campus students’ dormitories using Cisco packet tracer.
3.3.2. Specific Objective
To ensure device compatibility
To ensure coverage optimization
To ensure scalability
3.4. Scope and Limitation of The Project
16
students’ interest in learning process, increase students’ productivity as they can access to
portal web sites and proceed with assignments without the constraint of place and time,
submit assignments on time by online and decrease expenditure of cost students for data
access.
3.6. Literature Review
Wireless LAN has undergone so far but it can be interchange for what improvement
wireless router (IEEE 802.11) specification has undergone. IEEE was the institutional
body that given standards set and protocols. Wireless Local Area Network (WLAN), also
known as IEEE 802.11, is a set of standards that enable over-the-air communication in
medium range distances (approximately 30-150 m).
3.7.1 IEEE 802.11a STANDARD and SPECIFICATION
The 802.11a standard uses the same data link layer protocol and frame format as the
original standard, but uses OFDM as modulation skin. It operates in the 5 GHz band with
a maximum data rate of 54 Mbps. Achievable throughputs in the mid-20 Mbps. Since the
2.4 GHz band is heavily used to the point of being crowded, using the relatively un-used
5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency
also brings a disadvantage: the effective overall range of 802.11a is less than that of
802.11b/g. In theory, 802.11a signals are absorbed more readily by walls and other solid
objects in their path due to their smaller wavelength and, as a result, cannot penetrate as
far as those of 802.11b. In practice, 802.11b typically has a higher range at low speeds
(802.11b will reduce speed to 5 Mbps or even 1 Mbps at low signal strengths). However,
at higher speeds, 802.11a often has the same or greater range due to less interference [1].
17
2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless
telephones [2] [3].
18
figure 3. 1 Flow chart
Data collection method
Data collections are the most important part of our project to find the main requirement
of the WLAN designing and implementation. To gather the information; we need primary
data source from the data source.
Observation
The project is carried out by students to understand system process we collect
information by physical observation the main network system then we identified the
problem.
The Interview
The main data source for this project was Aksum University ICT center office. So, we
collected crucial information from the team members of the ICT center who work on the
infrastructure of the network system through questioning.
19
Online resources: from the internet we researched and reviewed different videos
and books related helpful information.
Literature review: by referring many text books related to, different thesis,
projects from different websites.
Requirement of Equipment
To design our project, we use hardware and software requirements.
Hardware requirements
20
student’s dormitory and the unshielded twisted pair cable from the access switch
to the floors access point.
21
Figure 3.2 overall design of Auk network system
22
3.9.1. Core Layer
In a typical hierarchical model, the individual building blocks are interconnected by using
a core layer. The core serves as the backbone for the network, a minimal configuration in
the core reduces configuration complexity limiting the possibility for operational error.
Core needs to be fast and extremely resilient/withstand or recover.
3.9.2. Distribution Layer
The distribution layer aggregates nodes from the access layer, protecting the core from
high-density peering. Additionally, the distribution layer creates a fault boundary
providing a logical isolation point in the event of a failure originating in the access layer.
Typically deployed as a pair of L3 switches, the distribution layer uses L3 switching for
its connectivity to the core of the network and services for its connectivity to the access
layer. Load balancing, Quality of Service (QoS), and ease of provisioning are key
consideration for the distribution layer.
3.9.3. Access Layer
The access layer is the first point of entry into the network for edge devices, end stations,
and access points. The switches in the access layer are connected to two separates
distribution layer switches for redundancy.
Generally, this layer performs switching activities, like MAC address, ARP request,
VLAN, Etc.
3.10 Results
As we have tried to state above the project consists of different services and protocols
that should to be configured in each layer and integrated to have a functional Wireless
Local Area Network. The simulation result of our project is shown in Figure 16 below.
23
Figure 3.3 simulation result of Wireless Local Area Network
Network Design Methodology
Technologies we use to design the network are:
1. DHCP Configuration
2. Network Connectivity
1. DHCP Configuration: is a network protocol that automatically assigns IP
addresses and other network configuration settings to devices a network. DHCP
configuration typically involves setting up a DHCP server and configuration it
with the necessary parameters such as IP address ranges, subnet mask, default
gateway, DNS servers and any other specific options required for the network.
24
figure 3. 2 DHCP assignment of IP Address for laptop2
25
Access point configuration
The configuration of the access point is very easy. The first step in the configuration of
an access point is inserting the access point name to know which access point is to be
used. The name entered in the SSID field is used to identify the network, as shown in the
figure 18 below.
26
Figure 3.6 Configuration IP address of a laptop2 computer connect to the access
point
2. Network Connectivity
When we connect the network, it must meet the link provided to connect the required
device in order to communicate one another.
3. Verification and Testing of Configurations
Ping command
27
The ping command is the basic command used to check for connectivity between
devices. It can be done on switches, routers or computers. In routers and switches
the command is applied in the privilege mode while on pcs and smart phones it
takes place in the command prompt interface. The main requirement of a network
is for data to travel at the shortest available time as shown in figure 20 below. We
discussed the results that get from the packet tracer software. First, we open the
command prompt on the smart phone that we want send the message or simply at
place of the sender smart phone, then pinging the IP address that we want to
receive the message. If the connection or configuration is correct, reply from
192.168.2.3: bytes=32 time=305ms TTL=127, Reply from 192.168.2.3: bytes=32
time=27ms TTL=127, Reply from 192.168.2.3: bytes=32 time=58ms TTL=127,
Reply from 192.168.2.3: bytes=32 time=73ms TTL=127 will be displayed as we
can see in figure 20 below. If the connection is not correct the reply time out will
be displayed. The message is simply travel from the smart laptop2 which has an IP
address of 192.168.4.2 to smartphone7 which has an IP address of 192.168.2.3 as
displayed in figure 20 below.
28
Figure 3.7 ping command
29
CHAPTER FOUR
4. BENEFITS GAINED FROM INTERNSHIP PROGRAM
4.1 Benefits that we are get from the internship program
The internship time period has given us various benefits. In addition to the practical skills
acquired from the program, a theoretical knowledge would be caught on. Besides, we
could manage to improve our qualities in terms of interpersonal communication. During
the period of internship, a team spirit had been developed on matters that needed
teamwork. In this internship program, we have gained essential leadership qualities.
Better yet, the crucial thing got from the internship is the work ethics. There are many
benefits that get from the internship program. Those are:
The most significant part of the theoretical aspect of the internship is its value in
enhancing the learned concepts. In fact, we had, for example, some ideas about computer
networks from the course Data communication and now we have grabbed some concepts
in computer networking after the internship. Consequently, our internship experience
seems to have obvious significance in upgrading our theoretical knowledge.
30
4.1.3. Team-playing Skills
Great national and international projects never come true as one-man work. And nothing
different from this was what we came across a tour work. All works were being done in
teams. Our internship experience helped us improve our team-playing qualities as all the
tasks given had required teamwork. As a result, we had got this benefit as back bone our
task.
31
CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1. Internship Conclusion During the whole period of internship
We’ve observed so many professional activities. This internship time period was very
good for us, because we had to cover many different fields. During this internship period
we develop practical experience to complement the theoretical content of our study for
campus Cisco three-layer hierarchical model tasks and detailed configuration of each
layer. We were also to be able to know networking Medias like fiber optic and their way
of transmitting data and in general what a communication is.
And also, during internship program we were able to know network device configuration
such as router, switch. We have got many practical work knowledge and benefits from
main data center of the AKU Company. Some of the benefits are the following
The company’s Work flow
Developing our theoretical knowledge through practical skills
Networking design by using CISCO packet tracer
Function of different network device.
5.2 Project Conclusion
In this project, a Wireless Local Area Network (LAN) that uses wireless topology has
been simulated using Cisco packet tracer 8.2.1 and with the aid of a router and switch
configurations, data packets routed from one device to another. It is also noteworthy that,
the configuration and specifications are for the initial prototype and can further be
developed and additional functionality can be added to increase support and coverage.
5.3 Internship Recommendations
During our internship time period we were able to see the main data center of the AKU
campus such as networking installation, design and maintenance. The Data Center is the
hub of the University’s computing resources, which are shared by the academic, research,
and administrative communities. These facilities provide a secure, enterprise-wide,
reliable, and redundant infrastructure for the delivery of mission-critical University
systems. As per earns observation some suggestion for the improvement of the situations
are given below:
During internship period as we were observed that there was no full-time
hospitality for the student.
32
In Aksum University ICT center there is no time division for works at data
center, so students cannot develop either theoretical or practical skill.
As we were observed from our work site, the data center has no efficient device
for practical activity.
The data center should be protected in building grounding and lightning
protection System.
33
References
[1] Todd Lammle, CCNA Wireless Study Guide, Wiley Publishing. Inc 2010. CISCO
Press June 2009
[2] Brandon James Carroll, CCNA Wireless Official Exam Certification Guide
[3]. Tim Reardon, Planning, Designing and operating local area networks, DISAM
Journal, Summer, 1997.
[4]. Garima Jain, Nasreen Noorani, Nisha Kiran, Sourabh Sharma, Designing &
simulation of topology network using Packet Tracer, International Research Journal of
Engineering and Technology (IRJET), 2(2), 2015.
[5]. Schneider; Designing and operating local area networks (1998)
34