0% found this document useful (0 votes)
29 views44 pages

WLAN Design

Design and implemantation of WLAN for Aksum university

Uploaded by

yemane guash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views44 pages

WLAN Design

Design and implemantation of WLAN for Aksum university

Uploaded by

yemane guash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

AKSUM UNIVERSITY

AKSUM INSTITUTE OF TECHNOLOGY

FACULITY OF ELECTRICAL AND COMPUTER ENGINEERING

DEPARTMENT OF COMPUTER ENGINEERING

INTERNSHIP REPORT AND PROJECT ON AKSUM UNIVERSITY


ICT CENTER

PROJEC TITLE: DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL


AREA NETWORK FOR AKSUM UNIVERSITY MAIN CAMPUS STUDENTS’
DORMITORY

PREPARED BY ID NO.

1. Abrehaley Zebrabruk ------------------------------ AKU 09


2. Ablel Ftwi ----------------------------------------- AKU 0900193
3. Yemane Guash --------------------------------------AKU 1001730
4. Hiwet Belay-------------------------------------------AKU 0903001

Adviser's Name: Mr. Teame T (M.Sc.)


CO Adviser:
14/06/2016 E.C
AKSUM, ETHIOPIA

DECLARATION
We are here declaring this is our internship final report and project program at AKU ICT
data center and is a record of our original work and being submitted to faculty of
Electrical and Computer Engineering. We have done this internship report and project for
three months in Aksum university ICT center. The completion of this internship report
and project advice is done by advisor Mr. Teame and with the help or guidance of our
coordinator Mr. Abraha G. made strong effort for the project fulfillment by asking the
problem faces during the activity.
Student’s name 1: Signature:
_________

Student’s name 2: Signature:


__________

Student’s name 3: Signature:


_________

Student’s name 4: Signature:


_________

Mentor’s name: Signature:


_____________

i
ACKNOWLEDGEMENT
First of all, we would like to express our gratitude to Almighty GOD for giving us the
opportunity to complete our internship program and enabling to complete this internship
report within scheduled time. Next to our advisor Mr. Teame T. for providing us his
instruction, and support throughout our internship program and we would like to forward
special thanks and gratitude to Mr.Abraha G. and Mr. Araya who supported us both for
the technical and theoretical aspect for our internship program. Finally, we are also
grateful for all well-wishers, who helped us directly and indirectly.

ii
EXECUTIVE SUMMARY

This report introduces several new concepts and terms that will be used through the
internship program and practical application of Electrical & computer Engineering. And
this Internship program is mainly concerned in computer Engineering to create
productive, skilled and knowledgeable generation. This report is an outcome of the
practice we conducted during our internship period at ICT center of Aksum University.
This brings to us a great opportunity to realize our theoretical knowledge by practical
works, which we gained for the last four years of study in Axum University.
This report is organized in to two the first part describes the report which includes
describing briefly the back ground of ICT center (including its history, objective, vision,
mission), describing the overall internship experience we had gained during the practical
periods( including how we get in to the company, the section of the company we have
been working in, the procedure we used while performing our task ) and describing the
benefits we gained from our internship program in terms of improving our practical
skills, interpersonal communication skills, team playing skills, leadership skills,
upgrading our theoretical knowledge and work ethics.

The second part project on design and implementation of WLAN in AKU main campus
student’s dormitories involves implementing various procedures and techniques to
improve signal strength and quality for better coverage. We used the procedure statement
problem and justification, objective, Literature view, significant project, methodology,
System model, result and conclusion, recommendation we could improve coverage but
still there is blockage, hence somebody can improve by another method.

iii
LIST OF ACRONYMS
AKU Aksum University
ARP Address Resolution Protocol
DHCP Dynamic Host Configuration Protocol
DMZ Demilitarized Zone
DNS Domain Name System
ECE Electrical and Computer Engineering
FTP File Transfer Protocol
HTTP Hyper Text Transfer Protocol
ICT Information and Communication Technology
ICTD Information and Communication Technology
Development
IEEE International Electronics and Electrical Engineering
IP Internet Protocol
L2 Layer 2
L3 Layer 3
LAN Local Area Network
MAC Media Access Control
NAT Network Address Translation
PC Personal Computer
PoE Power over Ethernet
QoS Quality of Service
RJ-45 Registered Jack 45
UTP Unshielded Twisted Pair
VLAN Virtual Local Area Network
VTP Virtual Trucking Protocol

iv
WAN Wide Area Network
Wi-Fi Wireless Fidelity
WLAN Wireless local area network

LIST OF FIGURES
FIGURE 1. 1. OVERALL ORGANIZATIONAL STRUCTURE OF ICT.......................................................................3

FIGURE 2. 1 LOCAL AREA NETWORK.............................................................................................................8


FIGURE 2. 2 WIDE AREA NETWORKS...............................................................................................................9
FIGURE 2. 3 METROPOLITAN AREA NETWORKS..............................................................................................9
FIGURE 2. 4 SWITCH.....................................................................................................................................10
FIGURE 2. 5 ROUTER....................................................................................................................................10
FIGURE 2. 6 HUB..........................................................................................................................................10
FIGURE 2. 7 UTP CABLE..............................................................................................................................11
FIGURE 2. 8 RJ45 CONNECTOR.....................................................................................................................12
FIGURE 2. 9 TWISTED PAIR CABLE................................................................................................................12
FIGURE 2. 10 STRAIGHT THROUGH...............................................................................................................13
FIGURE 2. 11 CROSS OVER...........................................................................................................................13

FIGURE 3. 1 FLOW CHART.............................................................................................................................19


FIGURE 3. 3 DHCP ASSIGNMENT OF IP ADDRESS FOR LAPTOP2................................................................................26

v
Table of Contents
DECLARATION..................................................................................................................................i
ACKNOWLEDGEMENT.....................................................................................................................ii
EXECUTIVE SUMMARY...................................................................................................................iii
LIST OF ACRONYMS........................................................................................................................iv
LIST OF FIGURES..............................................................................................................................v
CHAPTER ONE.................................................................................................................................1
1. Introduction................................................................................................................................1
1.1. Background Information OF Aksum University ICT Center..................................................1
1.2 mission of Aksum University ICT center................................................................................1
1.3 Vision of Aksum University ICT center..................................................................................1
1.4 Main Products of Aksum University ICT center.....................................................................1
1.5 Aim of Aksum University ICT center......................................................................................2
1.6 Objective of Aksum University ICT center.............................................................................2
1.6.1 General Objective..........................................................................................................2
1.6.2 Specific Objective..........................................................................................................2
1.8 Roles and responsibilities of the ICT development Director.................................................3
1.9 Roles and responsibilities of Business Applications Development and Administration........3
1.10 Roles and responsibilities of ICT Infrastructure and Services..............................................3
1.11 Roles and responsibilities of Teaching and Learning Technologies.....................................4

vi
1.12 Roles and responsibilities of technical support and maintenance......................................4
1.13 Roles and responsibilities of Training and Consultancy......................................................4
CHAPTER TWO................................................................................................................................5
2. THE OVERALL INTERNSHIP EXPERIENCE......................................................................................5
2.1 How We Get into the Company............................................................................................5
2.2 Procedures and Methods......................................................................................................5
2.3 We have been working in this Main Campus........................................................................6
2.4 Network Infrastructure.........................................................................................................6
2.5 Network Criteria...................................................................................................................7
2.5.1 Performance...................................................................................................................7
2.5.2 Reliability......................................................................................................................7
2.5.3 Security..........................................................................................................................7
2.6. Types of Network Connection..............................................................................................7
2.6.1 Point to Point.................................................................................................................7
2.6.2 Multi-Point.....................................................................................................................7
2.7 Categories of Network..........................................................................................................8
2.7.1 Local Area Network.......................................................................................................8
2.7.2 Wide Area Network.......................................................................................................9
2.7.3 Metropolitan Area Networks..........................................................................................9
2.8 Network Device..................................................................................................................10
2.9 Twisted Pair Cable..............................................................................................................11
2.9.1 UTP (unshielded twisted pair).....................................................................................11
2.10 The Challenges in the Network Infrastructure and Service Department..........................14
2.11 The Solution for the Challenges........................................................................................14
CHAPTER THREE............................................................................................................................15
3. DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL AREA NETWORK FOR AKU MAIN
CAMPUS STUDENT DORMITORY...................................................................................................15
3.1. Background of the Study....................................................................................................15
3.2. Statement of Problem........................................................................................................15
3.3. Objective of the Project.....................................................................................................16
3.3.1. General Objective.......................................................................................................16
3.3.2. Specific Objective.......................................................................................................16

vii
3.4. Scope and Limitation of The Project..................................................................................16
3.4.1. Scope of The Project.......................................................................................................16
3.4.2. Limitations of the project.........................................................................................16
3.5. Significance of the project.................................................................................................17
3.6. Literature Review...............................................................................................................17
3.7.1 IEEE 802.11a STANDARD and SPECIFICATION....................................................17
3.7.2 IEEE 802.11b STANDARD and SPECIFICATION....................................................18
3.7.3 IEEE 802.11g STANDARDS and SPECIFICATION.................................................18
3.7.4 802.11n STANDARD and SPECIFICATION.............................................................18
3.7. Methodology.....................................................................................................................19
3.9 Requirement of Equipment..............................................................................................21
3.9.1. Core Layer..................................................................................................................24
3.9.2. Distribution Layer.......................................................................................................24
3.9.3. Access Layer...............................................................................................................25
3.9.4. Wireless Access Point (AP)........................................................................................25
3.10 Results..............................................................................................................................25
CHAPTER FOUR.............................................................................................................................32
4. BENEFITS GAINED FROM INTERNSHIP PROGRAM....................................................................32
4.1 Benefits that we are get from the internship program.......................................................32
4.1.1. Practical Skills............................................................................................................32
4.1.2. Theoretical Knowledge...............................................................................................32
4.1.3. Team-playing Skills......................................................................................................33
4.1.4. Leadership Skills..........................................................................................................33
4.1.5. Work Ethics Related Issues.........................................................................................33
4.1.6. Entrepreneurship Skills...............................................................................................33
CHAPTER FIVE...............................................................................................................................34
5. CONCLUSION AND RECOMMENDATION...................................................................................34
5.1. Internship Conclusion During the whole period of internship...........................................34
5.2 Project Conclusion..............................................................................................................34
5.3 Internship Recommendations.............................................................................................34
References....................................................................................................................................36

viii
ix
CHAPTER ONE

1. Introduction

1.1. Background Information OF Aksum University ICT Center

Aksum University ICT center was established by ministry of education in 1999 E.C.
AKU ICT center was established during the establishment of the university and
developed from time to time with development of the university.

Aksum University ICT center is located about 2.5 kilometers from the town of Aksum to
the south west. It is located in the main campus of Aksum University about 200 meters
from the main gate of the University. When we enter to the main campus it founds at the
right side near the asphalt road. The data center of this ICT center is placed at the ground
of the digital library at western side of the building.

1.2 mission of Aksum University ICT center

The mission of the Aksum University ICT center is to provide sustainable ICT service
and facilitate changes through the effective use of ICT in the university and produces
skilled and competent man power through the provision of quality education, conducting
result oriented research and of offering problem solving community service.

1.3 Vision of Aksum University ICT center

The vision of AKU- ICT unit to provide a customer cantered AKU-ICT and business
development service that:

 Exploits technology to its full potential


 Leads and manages information resources in the university
 Provides leaderships in the area of ICT to ensure the effective use of academic

1.4 Main Products of Aksum University ICT center

It is expected that this policy will help re-engineer its processes with a view of efficient
and effective delivery of library and information services. Specific objectives of the
policy include:

1
 To define the scope of what is ICT in Aksum university.
 To serve as a guideline to AKU staff and public on what is good or not good ICT
practices in terms of usage of information systems facilities.
 To serve as a guideline for staff on ICT practices and procedures to serve as a
guideline for modernizing AKU services.

1.5 Aim of Aksum University ICT center


 Integrating ICT to the various academic and administrative functions of the
University developing quality learning strategy, system and procedure.
 providing the optimum set of learning technologies
 providing a reliable, secure and available administrative computing system
Preparing quality control mechanisms for software purchases
1.6 Objective of Aksum University ICT center
 Under the perspectives of ‘Customer, Finance, Internal Business Process, and
Learning Improve customers/stake holder satisfaction; Improve students
competency and innovativeness;
 Improve student’s ability to create a new technology that helps the wide society
 Improve instructional resources and facilities;
 Improve physical infrastructure;
1.6.1 General Objective
The objective built in order to achieve the vision and mission. Those are the following
 Perform proper management of the available ICT resource, including internet
bandwidth.
 To lead, manage and develop ICT in the university.
 To provide excellent customer centered services that are responsive to changing
needs of the user.

1.6.2 Specific Objective


 Better development activities undertaking in the company by using methods of
information and communication technology.
 To build capacity of using modern technology throughout in the regional and
national level.

2
1.7 Organizational Governance Structure of Aksum University ICT center

Figure 1. 1. overall organizational structure of ICT


1.8 Roles and responsibilities of the ICT development Director
 Accountable to the university president
 Provide leadership and management to the ICTD
 ensure that ICT provides, operates and maintains the ICT infrastructure systems
and solutions to meet the needs of the administrative, educational, and research
programs of the University
 Be an ICT evangelist in the University and its many departments
1.9 Roles and responsibilities of Business Applications Development and
Administration
 Automate and facilitate the student-instructor communications.
 Automate and facilitate the full life-cycle activities of students and staff
(from enrollment to graduation/resignation/retirement).
 Developing and customizing applications.
1.10 Roles and responsibilities of ICT Infrastructure and Services
 Create and manage the IP layer connectivity

3
 Plan, implement and manage the Internet connectivity
 Creating acceptable use policy for the network and Internet
 Secure the network from Internal and external threats

1.11 Roles and responsibilities of Teaching and Learning Technologies


 Work with the academic departments for course material preparation and
uploading
 Plan, implement and manage E-learning infrastructure
 Plan, implement and manage Digital Library infrastructure

1.12 Roles and responsibilities of technical support and maintenance


 Perform preventive maintenance regularly
 Keep an inventory of maintained and replaced items
 Prepare depreciation, discarding and replacement plan for equipment

1.13 Roles and responsibilities of Training and Consultancy


 Arrange trainings for the ICT team
 Plan Inter-ICT Team knowledge and exchange sharing
 Arrange training for campus users and staff about newly implemented and
developed applications
 Create basic awareness on Internet, security, productivity tools, emerging
technologies and new projects in ICT for the campus users and staff
 Arrange and implement Student Internship programs
1.14 Services that customer get from the ICT center
 Network Infrastructure design and implementation
 Website design and development
 System analysis, Design and Implementation
 Training and Consultancy on various areas
 Identity card design and printing

4
CHAPTER TWO

2. THE OVERALL INTERNSHIP EXPERIENCE

2.1 How We Get into the Company

We have been studying of electrical and computer engineering since 2009 E.C before this
three month internship at Aksum University and in this time, we have seen many
changes, Transformation Plan and great growth in the University. The university industry
linkage program is planned to create a good interaction between universities and
industries, and also create students that have the capability of facing and solving practical
problems. Because of these reasons, Aksum University has given a great deal of attention
to this program in helping students, starting from searching companies that are willing to
be part of this program up to giving essential documents and schedules. We first choice
internship placement and this is given to our department office of ECE and they check
and sent acceptance. So, we get into the company by giving internship place request letter
of our university to company head office. Then they observe the request letter and they
had given their acceptance letter. When we come back to their company to begin the
internship program, we should bring the acceptance letter of the company. Then we
started our internship program in a given time in the main data center and ICT
development.

2.2 Procedures and Methods

 Firstly, we tried to introduce ourselves with network infrastructure and service


department employees. After studying the company, we decided what to do, and
we were informed by the Company in which project to work and in which system
we should focus and for whom to ask and AKU-ICT gives us a place where the
training is carried out. Mainly we were working in maintaining Ethernet cables.
The procedures and methods are as follows:
 First, we had removed all non-working cables from the switches as well as
from the pcs

5
 And then we had distributed another new cable and had crimped it
 After that we had inserted into nodes and punched it gently

2.3 We have been working in this Main Campus


During the whole internship we observe the data center, AKU network topology, and
look network cable maintenance, design network infrastructure, switch and router
configuration, VLAN trucking protocol.
AKU network topology: -AKU used star topology and this topology have three layers,
namely core layer, distribution layer, and access layer.
As it is depicted on the following figure logical topology, the overall network fits the
collapsed hierarchical model.
On the top of the network structure there is a firewall, for the purpose of routing and
network security. We never used an internal router because the firewall is made to
perform both Operations for the purpose of cost minimization. The firewall is connected
to the internet via fiber link. In the DMZ we have the mail and web servers which can be
accessed from the internet. For this reason, they are connected directly to the firewall
through public switch. Where as in server farm servers such as DNS, File and
Application servers are grouped under a separate VLAN to be accessed only from the
LAN. These servers are connected to the collapsed core router.
In the core layer, two collapsed core routers are connected through a fiber cable but not
forming a redundant path. This path is not helpful to sustain activities in case if failures
happen to the network. The access switches of different number of ports are directly
connected with end devices like pc.
2.4 Network Infrastructure
Network infrastructure refers to the hardware and software resources of an entire network
that enable network connectivity, communication, operations and management of a
network system Network infrastructure provides the communication path and services
between users, processes, applications, services and external networks/the Internet.
On the most fundamental level a computer network is an interconnected collection of
devices through a link that are capable of send, receive, store, retrieve and share
information. Now a day a computer network is more than connection of interconnected

6
devices, it is a resource that enables us to gather, analyze, organize, and disseminate
information that is essential to our profitability.

2.5 Network Criteria


A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
2.5.1 Performance
Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry and a response. The
performance of a network depends on a number of factors, including the number of users,
the type of transmission medium, the capabilities of the connected hardware, and the
efficiency of the software.
2.5.2 Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of
failure, the time it takes a link to recover from a failure, and the network's robustness in a
catastrophe.
2.5.3 Security
Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery
from breaches and data losses.
2.6. Types of Network Connection
To communicate computers, one another they should connected through a link, a link is a
communications pathway that transfers data from one device to another. There are two
ways of connections namely, point to point and multipoint.
2.6.1 Point to Point
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-
to-point connections use an actual length of wire or cable to connect the two ends.
2.6.2 Multi-Point
A multipoint connection is one in which more than two specific devices share a single
link. In a multipoint environment, the capacity of the channel is shared, either spatially or

7
temporally. If several devices can use the link simultaneously, it is a spatially shared
connection.
2.7 Categories of Network
The category into which a network falls is determined by its size. According to this
there are three types called local area network, wide area network and metropolitan area
network.
2.7.1 Local Area Network
Local area networks, generally called LANs, are privately-owned networks within a
single building or campus of up to a few kilometers in size. They are widely used to
connect personal computers and workstations in company offices and factories to share
resources (e.g., printers) and exchange information. LANs are distinguished from other
kinds of networks by three characteristics:
1. Size,
2. Transmission technology, and
3. Topology.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use certain
kinds of designs that would not otherwise be possible. It also simplifies network
management.

Figure 2. 1 Local area network

8
2.7.2 Wide Area Network
A wide area network provides long-distance transmission of data, image, audio, and
video information over large geographic areas that may comprise a country, a continent,
or even the whole world.

Figure 2. 2 wide area networks

2.7.3 Metropolitan Area Networks


A metropolitan area network is a network with a size between a LAN and a WAN. It
normally covers the area inside a town or a city. It is designed for customers who need a
high-speed connectivity, normally to the Internet, and have endpoints spread over a city
or part of city.

Figure 2. 3 Metropolitan area networks

9
2.8 Network Device
 Switch: - is a multiport device that broadcasts frames received on one port to all
other ports. All ports are in the same collision domain. Switches are generally
identified as Layer-2 devices and layer 1 device, as switches process information
stored in the Data-Link header of a frame (such as MAC addresses in Ethernet).

Figure 2. 4 Switch

 Router: - routers are identified as Layer-3 devices, as routers process logical


addressing information in the Network header of a packet (such as IP addresses).

Figure 2. 5 Router

 Hub: - Hubs are Layer-1 devices that physically connect network devices
together
for communication

Figure 2. 6 Hub

10
2.9 Twisted Pair Cable
Twisted pair cable consists of color-coded pairs of insulated copper wires, each with
diameter of 0.4 to 0.8 mm (approximately the diameters of a straight pin). Every two
wires are twisted around each other to form pairs, and all the pairs are encased in a plastic
sheath. The number of pairs in a cable varies, depending on the cable type. So, all twisted
pair cable falls into one of two categories. These are: -
 STP (shielded twisted pair)
 UTP (unshielded twisted pair)
2.9.1 UTP (unshielded twisted pair)
Cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its
name implies, UTP does not contain additional shielding for the twisted pairs. As a result,
UTP is both less expensive and less resistant to noise than STP.

Figure 2. 7 UTP cable

There are two types of UTP internet cable namely; straight through and cross over.
Straight through: -used to connect different devices (switch to pc, switch to router). We
can use RJ-45 and cable cat 6.

Not all RJ-45 connectors are created equally. One reason why CAT-6 cable is much
harder to work with than CAT-5 cable is that CAT-6 is quite a bit thicker. So, it's hard to
get RJ-45 connectors intended for CAT-5 cable to attach properly to CAT-6 cable. When
you're shopping for RJ-45 connectors, make sure the ones you buy are suitable for CAT-
6.

11
Figure 2. 8 RJ45 connector

To make UTP internet cable we follow the following step


 Remove the twisted pair cable’s cover like this

Figure 2. 9 twisted pair cable

 Straightened the wires.


 Once you've straightened the wires, your next task is to arrange them in the order
they'll be placed into the RJ-45 connector. Working from left to right, the order
of the wires is:
 Orange with a white stripe
 Orange
 Green with a white stripe
 Blue
 Blue with a white stripe

12
 Green
 Brown with a white stripe
 Brown

Figure 2. 10 Straight through

Cross over: - is used to connect the same device (i.e., switch to switch, pc to pc).
The color Can be arranged as: -

 WG G WO B WB O WBR BR

Figure 2. 11 Cross over

Servers
Servers are devices with a set of programs providing services requested by clients.
Different servers do different jobs, from serving email and video to protecting internal
networks and hosting Web sites.

13
2.10 The Challenges in the Network Infrastructure and Service Department
The challenge we had been facing while performing the tasks during our training in the
company we came across with a lot of joy and upgrading practical skill and widening our
future work career. But there are many problems that challenged us during my study.
Some of the key problems that challenged me are going on listed as follow:
In the first time it was difficult to introduce ourselves with department and freely to ask.
 The company doesn’t have documents which are properly handled
 The skill full persons are almost always busy at work
 There is no enough time to discuss with them.
 The company is not well-organized in order to provide building knowledge for
the internship students.

2.11 The Solution for the Challenges


The following are what we did as a solution to the problems we faced in internship. In
the period of our internship program the above listed problems are difficult to Minimize
& reduce their challenges. But as time goes things are become easy & simple. We
conclude that the only thing to solve our problem is to communicate with the staff
members, supervisors as well as concerned bodies. We began to exchange some ideas
regarding to our task. The problem related unclear were solved by reading from the
internet, understanding each other’s as well as asking if necessary. In short, the solutions
to overcome the challenges we took the following measurements:
 We decided to ask freely for the workers of our company. The confusion we
had at the beginning was finally solved with the help of our supervisor,
company professionals and also classmates who works with us in other
company.
 We decided to ask for the Network Infrastructure and Service department
chief even if he is busy at work by arranges the time to make contact.
 Even if there are no any documents related the company, by reading books,
searching the internet closely related to our company task we try to solve it
 Finally, we were doing our best to overcome all our challenge either internet,
referring books or asking for others

14
CHAPTER THREE

3. DESIGN AND IMPLEMENTATION OF WIRELESS LOCAL


AREA NETWORK FOR AKU MAIN CAMPUS STUDENT
DORMITORY
3.1. Background of the Study
The aim of our project is to design and implement a wireless local area network system,
in Aksum university main campus student’s dormitory. Wireless local-area network
(WLAN) is a group of collocated computers or other devices that a wireless form a
network based on radio transmissions rather than wired connections. Wi-Fi users spend
about 80 percent of their daily activities interacting with wireless devices in various tasks.
Wireless local area networks have unique advantages in many places. it is more flexible
and mobile, have good scalability, it Requires less time, cost effectiveness, no longer
require a lot of wires and cables, which will reduce the workload of network cabling, and
it is easier to set up a WLAN than the wired ones. So, designing Wireless Local Area
Network is important to educational institutions. Students are increasingly expecting
anywhere, anytime access to online resource.
In order to design and build a wireless LAN network system, many factors must be taken
into consideration, such as the topology and placement of hosts within the network, the
selection of hardware and software technologies, and the careful configuration of each
component.

3.2. Statement of Problem


In Aksum University main campus there is no any internet access at student’s dormitory.
Students are going far from their dormitory blocks in order to get the accesses. But the
access also limited in some places for all students of the campus those places are not
comfortable for use day and night and there is no electric power for charging of laptops
and cellphones. Moreover, the increasing number of wireless devices used by students
such as laptops, smartphones and tablets, demands a more efficient and reliable wireless
network. So, we proposed that to solve this problem by designing and implement of
wireless LAN at Students dormitories.

15
3.3. Objective of the Project
3.3.1. General Objective
To Design and Implement Wireless Local Area Network in Aksum University
main campus students’ dormitories using Cisco packet tracer.
3.3.2. Specific Objective
 To ensure device compatibility
 To ensure coverage optimization
 To ensure scalability
3.4. Scope and Limitation of The Project

3.4.1. Scope of The Project


The scope of this project is to create a dormitory wireless local area network that is
reliable and high-performance wireless connectivity that meets the current and future
needs of students and proctors. Therefore, it is limited to the dormitories of students of
main campus only.

3.4.2. Limitations of the project


 The architecture we used is autonomous but it had to be Lightweight type.
 Lack of settings of some additional parameters such as, Security concerns,
Network congestion,
 No Quality of Service (QoS) settings: These parameters prioritize certain types
of traffic over others to ensure optimal performance for critical applications such
as voice or video streaming.

3.5. Significance of the project


There are many advantages in wireless transmission when compared to wire. This
includes the easy network installation with less time because "Wireless networks save
money on cabling costs and are easier than wired networks to install, operate, and
maintain ". So, if this project is applied it has a number of advantages to the AKU main
campus students. Students access online resources, Improve the quality of delivery of
education as students and teachers are able to access teaching material instantaneously,
enhance the interaction between students and teachers(i.e. E-Learning expands), cultivate

16
students’ interest in learning process, increase students’ productivity as they can access to
portal web sites and proceed with assignments without the constraint of place and time,
submit assignments on time by online and decrease expenditure of cost students for data
access.
3.6. Literature Review
Wireless LAN has undergone so far but it can be interchange for what improvement
wireless router (IEEE 802.11) specification has undergone. IEEE was the institutional
body that given standards set and protocols. Wireless Local Area Network (WLAN), also
known as IEEE 802.11, is a set of standards that enable over-the-air communication in
medium range distances (approximately 30-150 m).
3.7.1 IEEE 802.11a STANDARD and SPECIFICATION
The 802.11a standard uses the same data link layer protocol and frame format as the
original standard, but uses OFDM as modulation skin. It operates in the 5 GHz band with
a maximum data rate of 54 Mbps. Achievable throughputs in the mid-20 Mbps. Since the
2.4 GHz band is heavily used to the point of being crowded, using the relatively un-used
5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency
also brings a disadvantage: the effective overall range of 802.11a is less than that of
802.11b/g. In theory, 802.11a signals are absorbed more readily by walls and other solid
objects in their path due to their smaller wavelength and, as a result, cannot penetrate as
far as those of 802.11b. In practice, 802.11b typically has a higher range at low speeds
(802.11b will reduce speed to 5 Mbps or even 1 Mbps at low signal strengths). However,
at higher speeds, 802.11a often has the same or greater range due to less interference [1].

3.7.2 IEEE 802.11b STANDARD and SPECIFICATION


802.11b has a maximum raw data rate of 11 Mbps and uses the same media access
method defined in the original standard. 802.11b products appeared on the market in
early 2000, since 802.11b is a direct extension of the modulation technique defined in the
original standard. The dramatic increase in throughput of 802.11b (compared to the
original standard) along with simultaneous substantial price reductions led to the rapid
acceptance of 802.11b as the definitive wireless LAN technology. 802.11b devices suffer
interference from other products operating in the 2.4 GHz band. Devices operating in the

17
2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless
telephones [2] [3].

3.7.3 IEEE 802.11g STANDARDS and SPECIFICATION


In June 2003, a third modulation standard was ratified: 802.11g. This works in the 2.4
GHz band (like 802.11b), but uses the same OFDM based transmission scheme as
802.11a. It operates at a maximum physical layer bit rate of 54 Mbps exclusive of
forward error correction codes, or about 22 Mbps average throughputs. 802.11g hardware
is fully backwards compatible with 802.11b. They then proposed 802.11g standard was
rapidly adopted by consumers starting in January 2003, well before ratification, due to
the desire for higher data rates, and reductions in manufacturing costs. By summer 2003,
most dual-band 802.11a/b products became dual-band/tri-mode, supporting 802.11a and
802.11b/g in a single mobile adapter card or access point. Details of making b and g work
well together occupied much of the lingering technical process; in an 802.11g network,
however, activity of an 802.11b participant will reduce the data rate of the overall
802.11g network. Like 802.11b, 802.11g devices suffer interference from other products
operating in the2.4 GHz band [4].

3.7.4 802.11n STANDARD and SPECIFICATION


802.11n is a recent amendment which improves upon the previous 802.11 standards, such
as 802.11b and 802.11g, with, among other newer features, a significant increase in data
rate from 54 Mbps to 600 Mbps or adding multiple-input multiple- output (MIMO). The
standard use too both frequencies of 2.4 GHz and 5 GHz. Enterprises, however, have
already begun migrating to 802.11n networks based on the Wi-Fi Alliance's certification
of products conforming to a 2007 draft of the 802.11n proposal. The 802.11n standard
was ratified by the IEEE organization on September 11, 2009 [5].
3.7. Methodology
To design and implement the project we have gone through different methods.

18
figure 3. 1 Flow chart
Data collection method
Data collections are the most important part of our project to find the main requirement
of the WLAN designing and implementation. To gather the information; we need primary
data source from the data source.
 Observation
The project is carried out by students to understand system process we collect
information by physical observation the main network system then we identified the
problem.
 The Interview
The main data source for this project was Aksum University ICT center office. So, we
collected crucial information from the team members of the ICT center who work on the
infrastructure of the network system through questioning.

19
 Online resources: from the internet we researched and reviewed different videos
and books related helpful information.
 Literature review: by referring many text books related to, different thesis,
projects from different websites.

Requirement of Equipment
To design our project, we use hardware and software requirements.

Hardware requirements

 Laptop computer (hp core i5, 8th generation,64 bit)


 Flash disk (rise Up 32 GB)
 Cell phones
Software requirements
 Cisco packet tracer version 8.2.1
 Windows 10(64 bit)
 Microsoft office 2021
 Wonder share Edrawmax
Components of the project design
There are wide variety of tools that available for network design, configuration
and installation our project.
 Router: router is a three-layer device that routes packets based on their logical
addresses (host-to-host addressing). A router normally connects LANs and
WANs in the Internet and has a routing table that is used for making decisions
about the route. We used routers for the core layer
 Layer 2 Switch: is a computer networking device that connects devices on a
computer network based on MAC address by using packet switching to receive,
process, and forward data to the destination device.
 Layer 3 switch: A layer 3 switch, is a switch which can perform a layer 2 and
routing tasks.
 Cable: In order to install our project, we used deferent cables such as straight
through and crossover unshielded twisted pair cables, from the core to the

20
student’s dormitory and the unshielded twisted pair cable from the access switch
to the floors access point.

 Wireless Access Point (AP)


An access point is a wireless service device used for networks to expand wireless
coverage .in our project we used autonomous access points in order to expand the
network. Wireless access point service plays a significant role in this design and
is very important for educational institutions. The universities must have a
wireless network available. This is because it is an important part of
communication in education. Students use of wireless services such as the
Internet for their laptops, tablets, and Smartphone’s, in a bid to support effective
learning and better communication. Also, wireless service has many advantages
in a university setting. One of this is the low-cost effectiveness, and another is the
very broad coverage area of service it offers.
 Cisco packet Tracer: is a cross-platform visual simulation tool designed by
Cisco Systems that allow users to create network topologies and imitate modern
computer networks. In order to design our project, we used cisco packet tracer
version 8.2.1. The software allows users to simulate the configuration of Cisco
routers and switches using a simulated command line interface Packet Tracer
makes use of a drag and drop user interface, allowing users to add and remove
simulated network devices as they see fit packet Tracer all.
Network topology:
To design and implement of our project we used star topology. In a star topology each
station is connected to a central node. AKU network system consisting of three layers the
core layer, distribution layer, and access layer.

21
Figure 3.2 overall design of Auk network system

22
3.9.1. Core Layer
In a typical hierarchical model, the individual building blocks are interconnected by using
a core layer. The core serves as the backbone for the network, a minimal configuration in
the core reduces configuration complexity limiting the possibility for operational error.
Core needs to be fast and extremely resilient/withstand or recover.
3.9.2. Distribution Layer
The distribution layer aggregates nodes from the access layer, protecting the core from
high-density peering. Additionally, the distribution layer creates a fault boundary
providing a logical isolation point in the event of a failure originating in the access layer.
Typically deployed as a pair of L3 switches, the distribution layer uses L3 switching for
its connectivity to the core of the network and services for its connectivity to the access
layer. Load balancing, Quality of Service (QoS), and ease of provisioning are key
consideration for the distribution layer.
3.9.3. Access Layer
The access layer is the first point of entry into the network for edge devices, end stations,
and access points. The switches in the access layer are connected to two separates
distribution layer switches for redundancy.
Generally, this layer performs switching activities, like MAC address, ARP request,
VLAN, Etc.

3.10 Results
As we have tried to state above the project consists of different services and protocols
that should to be configured in each layer and integrated to have a functional Wireless
Local Area Network. The simulation result of our project is shown in Figure 16 below.

23
Figure 3.3 simulation result of Wireless Local Area Network
Network Design Methodology
 Technologies we use to design the network are:
1. DHCP Configuration
2. Network Connectivity
1. DHCP Configuration: is a network protocol that automatically assigns IP
addresses and other network configuration settings to devices a network. DHCP
configuration typically involves setting up a DHCP server and configuration it
with the necessary parameters such as IP address ranges, subnet mask, default
gateway, DNS servers and any other specific options required for the network.

24
figure 3. 2 DHCP assignment of IP Address for laptop2

FIGURE 3. 1 FLOW CHART.............................................................................................................................19


FIGURE 3. 2 DHCP ASSIGNMENT OF IP ADDRESS FOR LAPTOP2................................................................................27

Figure 3.4 DHCP assignment of IP Address for laptop2

25
Access point configuration
The configuration of the access point is very easy. The first step in the configuration of
an access point is inserting the access point name to know which access point is to be
used. The name entered in the SSID field is used to identify the network, as shown in the
figure 18 below.

Figure 3.5 configuration of access point


After that, each access point must be encryption enabled. The key prevents an
unauthorized user from connecting to the network. They will use their laptops or any
smart devices to connect to the access point by changing their configuration settings. For
example, to connect a laptop computer to the access point, the SSID of the laptop must be
changed to the same SSID of the access point. Then put IP address for each computer on
the same network, or to the same network used to connect the access point to it. The
router IP is 192.168.40.1, while computer IP address is 192.168.1.2 The image below
shows the configuration IP address of laptop2 computer.

26
Figure 3.6 Configuration IP address of a laptop2 computer connect to the access
point
2. Network Connectivity
When we connect the network, it must meet the link provided to connect the required
device in order to communicate one another.
3. Verification and Testing of Configurations
Ping command

27
The ping command is the basic command used to check for connectivity between
devices. It can be done on switches, routers or computers. In routers and switches
the command is applied in the privilege mode while on pcs and smart phones it
takes place in the command prompt interface. The main requirement of a network
is for data to travel at the shortest available time as shown in figure 20 below. We
discussed the results that get from the packet tracer software. First, we open the
command prompt on the smart phone that we want send the message or simply at
place of the sender smart phone, then pinging the IP address that we want to
receive the message. If the connection or configuration is correct, reply from
192.168.2.3: bytes=32 time=305ms TTL=127, Reply from 192.168.2.3: bytes=32
time=27ms TTL=127, Reply from 192.168.2.3: bytes=32 time=58ms TTL=127,
Reply from 192.168.2.3: bytes=32 time=73ms TTL=127 will be displayed as we
can see in figure 20 below. If the connection is not correct the reply time out will
be displayed. The message is simply travel from the smart laptop2 which has an IP
address of 192.168.4.2 to smartphone7 which has an IP address of 192.168.2.3 as
displayed in figure 20 below.

28
Figure 3.7 ping command

29
CHAPTER FOUR
4. BENEFITS GAINED FROM INTERNSHIP PROGRAM
4.1 Benefits that we are get from the internship program
The internship time period has given us various benefits. In addition to the practical skills
acquired from the program, a theoretical knowledge would be caught on. Besides, we
could manage to improve our qualities in terms of interpersonal communication. During
the period of internship, a team spirit had been developed on matters that needed
teamwork. In this internship program, we have gained essential leadership qualities.
Better yet, the crucial thing got from the internship is the work ethics. There are many
benefits that get from the internship program. Those are:

4.1.1. Practical Skills


Before the internship, our practical knowledge was limited. Despite their educational
preparation of a student, school assignments and projects were to be done by only short
period deadlines. And this methodology had limited considerably the scope which we
might learn from the tasks. As the evaluations in school are one-or-two-exams-based,
emphasis was due merely to class lectures and few exercises. Unlike the projects in
school, the projects found throughout the internship period were based on real-life
problems. In this Project, network and system design had been learned.

4.1.2. Theoretical Knowledge


The internship program was primarily supposed to make students aware of real working
environments. We had the chance of upgrading our theoretical knowledge as having a
time to read books with plenty of time without bothering about exams or tests. The
internship program had acquainted us with some Crucial theories needed for each task.
For instance, we had to understand the different types of VTP modes, switch and router
configuration.

The most significant part of the theoretical aspect of the internship is its value in
enhancing the learned concepts. In fact, we had, for example, some ideas about computer
networks from the course Data communication and now we have grabbed some concepts
in computer networking after the internship. Consequently, our internship experience
seems to have obvious significance in upgrading our theoretical knowledge.

30
4.1.3. Team-playing Skills
Great national and international projects never come true as one-man work. And nothing
different from this was what we came across a tour work. All works were being done in
teams. Our internship experience helped us improve our team-playing qualities as all the
tasks given had required teamwork. As a result, we had got this benefit as back bone our
task.

4.1.4. Leadership Skills


The internship had been supposed to be an important occasion to practice the assets of
leadership. In a nutshell, the internship had offered us to grasp leadership virtues such as
self-confidence, accountability and fair assignation of tasks.

4.1.5. Work Ethics Related Issues


The measure of the performance of any employee of any profession mainly depends on
his/her compliance to the work ethics. Work ethics were the most significant lesson we
got from the internship. In the internship period, we experienced the essences of both
universal and job-specific ethical standards. Despite the fact that the working atmosphere
in AKU encumbered us to get involved in works which require total obligation, we
obliged ourselves to self-discipline. We strived to arrive at the workplace punctually. In
addition, we were punctual in meeting the deadline of a given task.

4.1.6. Entrepreneurship Skills


There are many problems around as, but the thing is that we are not able to see them and
set up solutions accordingly beside of our technician, economical, and environmental
enforcement. In a nutshell, an entrepreneur is a risk-taking person who can see solutions
from surrounding cloud of problems or a glut of resources. Indeed, we learnt a lot on
improving our critical thinking and problem-solving skills. The change from school to
workplace itself was another learning opportunity, conditioning us to adapt to work
environment. Consequently, this internship had helped us become a more motivated life-
long learner.

31
CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1. Internship Conclusion During the whole period of internship
We’ve observed so many professional activities. This internship time period was very
good for us, because we had to cover many different fields. During this internship period
we develop practical experience to complement the theoretical content of our study for
campus Cisco three-layer hierarchical model tasks and detailed configuration of each
layer. We were also to be able to know networking Medias like fiber optic and their way
of transmitting data and in general what a communication is.
And also, during internship program we were able to know network device configuration
such as router, switch. We have got many practical work knowledge and benefits from
main data center of the AKU Company. Some of the benefits are the following
The company’s Work flow
 Developing our theoretical knowledge through practical skills
 Networking design by using CISCO packet tracer
 Function of different network device.
5.2 Project Conclusion
In this project, a Wireless Local Area Network (LAN) that uses wireless topology has
been simulated using Cisco packet tracer 8.2.1 and with the aid of a router and switch
configurations, data packets routed from one device to another. It is also noteworthy that,
the configuration and specifications are for the initial prototype and can further be
developed and additional functionality can be added to increase support and coverage.
5.3 Internship Recommendations
During our internship time period we were able to see the main data center of the AKU
campus such as networking installation, design and maintenance. The Data Center is the
hub of the University’s computing resources, which are shared by the academic, research,
and administrative communities. These facilities provide a secure, enterprise-wide,
reliable, and redundant infrastructure for the delivery of mission-critical University
systems. As per earns observation some suggestion for the improvement of the situations
are given below:
 During internship period as we were observed that there was no full-time
hospitality for the student.

32
 In Aksum University ICT center there is no time division for works at data
center, so students cannot develop either theoretical or practical skill.
 As we were observed from our work site, the data center has no efficient device
for practical activity.
 The data center should be protected in building grounding and lightning
protection System.

33
References
[1] Todd Lammle, CCNA Wireless Study Guide, Wiley Publishing. Inc 2010. CISCO
Press June 2009
[2] Brandon James Carroll, CCNA Wireless Official Exam Certification Guide
[3]. Tim Reardon, Planning, Designing and operating local area networks, DISAM
Journal, Summer, 1997.
[4]. Garima Jain, Nasreen Noorani, Nisha Kiran, Sourabh Sharma, Designing &
simulation of topology network using Packet Tracer, International Research Journal of
Engineering and Technology (IRJET), 2(2), 2015.
[5]. Schneider; Designing and operating local area networks (1998)

34

You might also like