0% found this document useful (0 votes)
31 views90 pages

Capstone Final 1

Uploaded by

kaimontinola625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views90 pages

Capstone Final 1

Uploaded by

kaimontinola625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 90

CHAPTER I

THE PROBLEM AND ITS BACKGROUND

This chapter presents the introduction,


review of related literature and studies,
conceptual framework, statement of the
problem, significance of the study, scope and
delimitation, and definition of terms.

Introduction

A computer laboratory is very important


in every private or government schools where
students can be taught how to use computers or
how to do coding, access information from the
internet, complete work, assignments, enhance
classroom teaching with Internet-based real-
time online researchable study environment for
students and teachers. Computer laboratory
must be designed intelligently to serve the
purpose they were intended to be used, to
provide highly collaborative and support
hands-on activities, computer-rich and
interactive learning environment.

In this context, Julia Ortiz Luis


National High School (JOLNHS) in Sagaba, Sto.
Domingo, Nueva Ecija recognizes the importance
of providing their students with the latest
technology. To achieve this, they are looking
to connect the Principal's Office and senior

1
high computer laboratory using a LAN and
wireless bridge. This will allow for easier
communication between the principal's office
and the computer laboratory, for facilitating
administrative tasks and improving the overall
efficiency of the school.

In this study, network designers chose


Julia Ortiz Luis National High School (JOLNHS)
as their subject for the project because the
school is facing a problem on their computer
laboratories. Students can’t use it since it
hasn’t been networked because of lack of
equipment and knowledge about setting up a
computer laboratory. Using Local Area Network
(LAN) and wireless bridge the network
designers connected the computer laboratory to
the Principal’s Office. It enables students of
JOLNHS to use the computer laboratory for
educational purposes such as working with
software programs, completing assignments,
creating word documents, sharing files etc.

Review of Related Literature

Local Area Network (LAN) and their application


in the Libraries

According to Pradeepa Wijuntunga, The


Central Library University of Colombo, Colombo
3, Sri Lanka. This paper initially gives a

2
basic introduction of Local Area Networks
(LANs). The author does not provide a detailed
discussion of this section since it is not the
scope of the paper and also because a detailed
description could have taken a highly
technical nature. Secondly, the paper deals
with the application of LANs in libraries with
some examples from the applications in
developed countries. Finally, the barriers
which we, the developing countries, encounter
in the application of LANs in our libraries
are outlined. Although Local Area Networks
have been in existence for some time, their
use is fairly recent in the field of
libraries. The initiative steps were taken by
the American and British libraries. By taking
their applications as examples, we can make an
attempt to adopt this interesting technology
in our libraries too. The following sections
will describe how LANs can be used in a
library environment. LANs can be utilized in
the library for educational purposes too.
Aston University has made plans for two types
of services. (Brindley, 1987). They were going
to provide an on-line database advisory with
trained staff for users engaged in a remote
database search and secondly, they were having
plans to run tutorial classes in on-line

3
searching simultaneously in different
locations. In this manner their users will
have a better understanding of the electronic
media with which they have to interact in the
library. Staff time and money will be saved by
providing training for a larger group of
students simultaneously. Computer conferencing
which uses several remote computers attached
to a network to conduct a conference without
the actual gathering of participants to a
single venue, is another application of LANs
which could provide a sophisticated service
for the future library users. The LAN
installation in the Department of Information,
University of Strathclyde has been employed to
carry out an experiment on computer
conferencing and the author asserts that,
despite the ergonomic and technical problems,
computer conferencing and electronic journal
production have considerable potential and
appeal (Baird, 1987).

Connecting Local Area Network (LAN) using


Router:
A Local Area Network (LAN) is a computer
network that interconnects computers within
a limited area such as residence, school,
laboratory, university campus or office
building. It has its network equipment and

4
interconnects locally managed. For example,
here I have taken two IP from different
network. First IP is 192.168.1.100 from
192.168.1.0 network and another IP
192.168.2.100 from 192.168.2.0 network. Now
these I cannot ping each other using hub or
switch because they belong to two different
networks.
Connecting Local Area Network (LAN) using
Router:

Based on Air University Department of


Electrical and Computer Engineering A Local
Area Network (LAN) is a computer network that
interconnects computers within a limited area
such as a residence, school, laboratory,
university, campus or office building and has
its network equipment and interconnects
locally managed. For example, here I have
taken two IP from different network. First IP
is 192.168.1.100 from 192.168.1.0 network and
another IP 192.168.2.100 from 192.168.2.0
network. Now these IP cannot ping each other
using hub or switch because they belong to two
different networks.

5
Research on Application of Wireless Bridge
Technology in the Smart Grid January 2022

In book: Research Anthology on Smart Grid


and Microgrid Development (pp.1398-1408) The
construction of smart grid, in the meet of
communication network core layer must have the
strong bearing capacity and the strong network
frame, also requires the access layer have the
wide variety and flexible edge access ability.
In this article, in accordance with the
technical features of the smart grid
communication network, combined with the
Global Energy Interconnection to the
requirement of all kinds of communication. The
wireless bridge system based on the IEEE
802.11 series protocol as flexible edge access
is applied to the smart grid communications,
to forward the power wireless bridge structure
design and the bridge monitoring management
platform design and safety protection design.
The use of a wireless bridge will increase the
transmission quality of signal, distance and
the safety of the transmission. In this
article, the wireless bridge in the
application of the smart grid electric power
communication network has a role in promoting,
has a guiding significance to the construction
of the smart grid communication.

6
Implementation of Local Area Network (LAN) &
Build a Secure LAN System for BAEC Head
Quarter

As per (Osman Goni and Md. Abu Shameem


2021) Network security is the process of
taking physical and software preventative
measures to protect the underlying networking
infrastructure from unauthorized access,
misuse, malfunction, modification,
destruction, or improper disclosure, thereby
creating a secure platform for computers,
users, and programs to perform their permitted
critical functions within a secure
environment. A Local Area Network (LAN) is a
computer network within a small geographical
area such as a home, school, computer
laboratory, office building or group of
buildings. A LAN is composed of inter-
connected workstations and personal computers
which are each capable of accessing and
sharing data and devices, such as printers,
scanners and data storage devices, anywhere on
the LAN. LANs are characterized by higher
communication and data transfer rates and the
lack of any need for leased communication
lines. A data network is an interconnected
system of computers, peripherals and software
over which data files and messages are sent

7
and received. LAN is only one type of computer
network. LAN define is Data Com System
allowing a number of independent devices to
communicate directly with each other, within a
moderately sized geographic area over a
physical communications channel of moderate
data rates. Fiber-optic communication is a
method of transmitting information from one
place to another by sending pulses of infrared
light through an optical fiber. The light is a
form of carrier wave that is modulated to
carry information. Fiber is preferred over
electrical cabling when high bandwidth, long
distance, or immunity to electromagnetic
interference is required. This type of
communication can transmit voice, video, and
telemetry through local area networks or
across long distances. Optical fiber is used
by many telecommunications companies to
transmit telephone signals, Internet
communication, and cable television signals.
Researchers at Bell Labs have reached a record
bandwidth distance product of over 100 petabit
× kilometers per second using fiber optic
communication. Communication between remote
parties can be achieved through a process
called Networking, involving the connection of
computers, media and networking devices. When

8
we talk about networks, we need to keep in
mind three concepts, distributed processing,
network criteria and network structure. The
purpose of this Network is to design a Local
Area Network (LAN) for a BAEC (Bangladesh
Atomic Energy Commission) Head Quarter and
implement security measures to protect network
resources and system services. To do so, we
will deal with the physical and logical design
of a LAN. The goal of this Network is to
examine of the Local Area Network set up for a
BAEC HQ and build a secure LAN system.
Implementation of Local Area Network (LAN) &
Build a Secure LAN System for BAEC Head
Quarter DOI:

Wireless LAN for IOT 5G Applications in a


congested indoor environment: Improved primary
signal sensing at millimeter-wave v-band [40-
75 GHZ]

H. E. Adardour, S. Kameche, S. Kameche,


THE INTERNATIONAL ARCHIVES OF THE
PHOTOGRAMMETRY, REMOTE SENSING AND SPATIAL
INFORMATION SCIENCES (DEC 2022) Presently, the
IEEE 802.11ad wireless network standard
supports the communication capability within
the V band of millimeter-Waves (or mm-Waves)
[40 – 75 GHz] for Internet of Things (or IoT)

9
technology. This paper presents an algorithm
to improve the Primary Signal 5G (or PS5G)
sensing at 60 GHz in WLANIoT-5G (or Wireless
Local Area Network for IoT-5G). To achieve
that, we aim at investigating and assessing
the sensing performances of the PS5G from the
Access Point of WLANIoT-5G (or APWLANIoT-5G)
by the Secondary User IoT-5G (or SUIoT-5G) in
a congested environment using a simple energy
detector (or SED) algorithm and a simple
recursive estimator (or SRE). In addition, the
SUIoT-5G is regarded as a mobile user in
WLANIoT-5G by employing the Gauss-Markov
Random Mobility Model (or GMRMM). Through
various scenario simulations, the performances
and the robustness of the proposed algorithm
are proved.

Power Self-Sustained Wireless Bridge


Deformation Monitoring System Based on Solar
Photovoltaic

Yao Wang, Mustafa Omer Furkan, Ivan


Bartoli and Fei Lu (2022) Bridges are critical
elements of contemporary civil infrastructure.
The operational and environmental factors can
cause inevitable impacts on the serviceability
and safety of a bridge. This paper has
developed a wireless bridge deformation

10
measurement system to monitor the bridge
health condition in real-time, which achieves
wireless connectivity for communication.
Meanwhile, a self-sustained power supply is
designed based on a solar photovoltaic (PV)
system, removing the conventional power cables
or the frequent battery replacement operation,
which reduces the installation and maintenance
cost and enables a long-term 24 hours ×7 days
uninterrupted operation. The detailed power
supply design procedure is provided, including
the selection of the solar panel and battery,
as well as the design of the dc-dc converter
for the constant-current (CC) and constant-
voltage (CV) charging of a lithium battery.
Experiments validate the effectiveness of the
developed wireless bridge deformation
monitoring system and the designed power
supply. It is shown that without using the PV
system, the bridge deformation monitoring
system can last for 24 days, which helps the
system to survive extreme weather conditions.
With the help of the PV system, the battery is
always maintained at a fully charged
condition, validating the self-sustainability
of the designed power supply.

Sub-1 GHz Network-Based Wireless Bridge-


Monitoring System: Feature and Verification

11
According to Li Hui (University of
Lousiana at Lafayette)`Traditional bridge
monitoring systems often require wired
connections between sensors, a data
acquisition system, and data center. The use
of extension wires, conduits, and other costly
accessories can dramatically increase the
total cost of bridge monitoring. With the
development of wireless technologies and the
notable cost benefits, many researchers have
been integrating wireless networks into bridge
monitoring system. In this study, a wireless
bridge monitoring system has been developed
based on the Sub-1 GHz network. The main
functional components of this system include
sensors, wireless nodes, and gateway and data
center. Wireless nodes can convert analog
signals obtained from the sensors to digital
signals, then transmit the collected data to
the gateway using the Sub-1 GHz network. The
gateway receives and sorts data from different
wireless nodes and then forwards these data to
the data center wirelessly. All collected data
are processed in the data center using the
data processing software developed in this
study. In order to validate the performance of
the wireless system developed in this study, a
steel girder bridge was monitored in the field

12
during the concrete deck construction. The
field results were also compared with the
theoretical values obtained from finite
element models to ensure the accuracy and
reliability of the wireless system. The
results indicate that the wireless bridge
monitoring system developed in this study is
effective and affordable. The Sub-1 GHz
network can be a better solution for bridges
with complicated site conditions because of
the extended data transmission distance.
Although the power consumption can be
controlled by using low-power consumption
components, including the power control in
software design can also dramatically reduce
the system’s power consumption.

Wireless Repeater and Wireless Bridge

According to Kant (2019), Wireless


Repeater and Wireless Bridge, both are used to
extend wireless network, but there is
difference in functionality point of view.
Wireless Repeaters are used in areas where you
want to increase the range of your network.
Like usually in wireless networks, range of
Wi-fi signals used to degrade after some
distance. So, we can use wireless repeaters
along APs to increase the range of Wi-fi

13
signals to reach far clients also wireless
bridge, is used where we want to bridge two
different networks (two diff APs). Leggs
(2019) stated that, A LAN to LAN is called a
Bridge Network. "A network bridge joins two
otherwise separate computer networks to enable
communication between them and allow them to
work as a single network. Bridges are used
with local area networks to extend their reach
to cover larger physical areas than the LAN
can otherwise reach. In the same research that
conducted by Walker (2004), what you are
describing is a "wireless bridge". A wireless
bridge device connects to your Wi-Fi network,
and then allows wired devices to connect to
the bridge. Since the wireless bridge device
is acting as a client, it should not have its
own SSID. Some wireless routers have a
"wireless bridge" mode so that you don't need
a separate type of device.

According to Jupriyanto (2020), A


wireless bridge connects two wired networks
together over Wi-Fi. The wireless bridge acts
as a client, logging in to the primary router
and getting an Internet connection, which it
passes on to the devices connected to its LAN
Jacks. Smith (2020), A network bridge is
nothing but a contrivance that divides the

14
network into segments. Each segment represents
a unique collision domain, so the number of
clashes on the network is reduced. Each clash
domain has its own unique bandwidth. Thus, a
bridge can improve the overall performance of
the data link layer or the OSI open system
interconnection model. From multiple network
segments, a network bridge creates a single
aggregate network. There exists both wired and
wireless bridging. If one or more segments of
a bridged network are wireless, then the
contrivance is known as a wireless bridge.
McCullough 2019 said that a bridge allows
separate networks to connect, like Wi-Fi to
Ethernet or Wi-Fi to Bluetooth, etc. Wireless
Bridging: Essential for Business Wi-Fi
Networks Homekit offers tado, which looks like
a Bluetooth manual valve for a radiator. I
think I would stick with something approved
for Homekit how does tado work with Apple
Homekit? I think they use Bluetooth Low Energy
because that way there isn't a need for wired
power for Wi-Fi at the valve (just 2 AA
batteries). Thus, the need for their Wi-Fi to
Bluetooth Bridge.

15
Design of Wireless Computer Network
Infrastructure in Implementation of
Kemendikbud Distributed Information Systems in
Singingi Kuantan Islamic University

According to MH Siregar - Jurnal Mantik,


(2020) - ejournal.iocscience.org The
development of an integrated computer network
is very important for the purpose of this
research is to be able to build and monitor
the performance and computer network of the
Kuantan Singingi Islamic University (UNIKS)
specifically for the lecturer LAN network
which is connected to the SISTER RISTEKDIKTI
local server on the UNIKS campus which has
been built on the Cisco Packet Tracer
simulator. and airLink simulation, this
computer network design will use Wireless
Media as an Access Point in each unique
building so that each lecturer can access
Sister without having to go to the admin
sister psd who is in bakasi. The beginning of
this research by means of storing the
situation for access to the special computer
network for sisters is very limited, the use
of computer networks has not been maximized
because the computer network infrastructure of
Sister UNIKS is only found in the BAKASI-UNIKS
building and can be accessed in that building.

16
In carrying out the process of analyzing and
designing Sister's computer network
infrastructure using the Network Development
Life Cycle (NDLC) Method. Lecturers and
several stakeholders at the Kuantan Singingi
Islamic University psd Sister in developing
Computer Network Infrastructure are very
supportive of integrating all existing
buildings in the UNIKS environment for the
purposes of Lecturer Certification carried out
at the Ministry of Education and Culture
SISTER.

Local Area Networks (LAN)

In book: Fundamentals of Computer


Networks (pp.37-49) Matthew N. O. Sadiku and
Cajetan M. Akujuobi stated a local area
network (LAN) connects personal computers,
workstations, printers, servers, and other
devices. There are different topologies (bus,
ring, star, tree, etc.), transmission medium,
and medium access control (MAC) that are
included in the architectures of a LAN. This
chapter covers LANs and the different types of
LANs. The advantages and disadvantages of the
different topologies of LAN are covered. All
of the operational access methodologies
including the controlled access devices are

17
also discussed. Keywords Local Area Network
(LAN) IEEE 802 standards Carrier Sense
Multiple Access with Collision Avoidance
(CSMA/CA) Medium access control (MAC)

Wireless Bridges: How They Work and How to Set


Them Up. Digital Trends.

Hess, S. (2019). To address these


limitations, it is important to carefully plan
and configure the wireless bridge
installation. This may involve optimizing the
wireless signal strength and frequency,
selecting appropriate wireless security
protocols, and choosing the most appropriate
wireless bridge hardware (Hess, 2019). In
summary, wireless bridges offer a convenient
and cost-effective solution for connecting
separate wired networks or extending the range
of an existing network. However, they also
have limitations and require careful planning
and configuration to ensure optimal
performance and security. Yadav, M., Sharma,
N., Kumar, N., & Shukla, A. (2020). Wireless
Bridge: A Comprehensive Study. International
Journal of Engineering Research and
Technology, 9(9), 782-787. One of the
advantages of wireless bridges is that they do
not require any additional wiring or

18
infrastructure, making them a cost-effective
solution for network expansion. They also
provide greater flexibility and mobility
compared to wired networks, as devices can be
connected to the bridge wirelessly (Yadav et
al., 2020).

Ying Li, Qilong Han, and Qing Wu,


"Wireless Bridge-Based Communication Network
for Intelligent Transportation Systems," IEEE
Transactions on Intelligent Transportation
Systems, vol. 18, no. 8, pp. 2019-2032, Aug.
2017.

How to Set Up a Wireless Bridge. Lifewire.


Retrieved from

According to (Chua J, 2019) Wireless


bridges have become increasingly popular in
recent years due to their flexibility and ease
of installation. They can be set up quickly
and easily without the need for specialized
knowledge or expertise, making them a cost-
effective solution for extending the range of
wired networks (Chua, 2019). Sathyanarayanan,
R., Selvam, P. R., Kumar, N. N., &
Gopalakrishnan, R. (2018). Wireless Bridge
Security Issues and Solutions. International
Journal of Pure and Applied Mathematics,

19
119(18), 2325-2332. However, there are some
potential drawbacks to using a wireless
bridge. One of the main concerns is security,
as wireless signals can be intercepted or
hacked. Proper security measures should be
implemented to protect the networks and data
being transmitted (Sathyanarayanan et al.,
2018).

Peer-to-peer energy systems for connected


communities: A review of recent advances and
emerging challenges

As stated by Wayes Tushar, Chau Yuen,


Tapan K Saha, Thomas Morstyn, Archie C
Chapman, M Jan E Alam, Sarmad Hanif, H Vincent
Poor (2021)

After a century of relative stability in


the electricity industry, extensive deployment
of distributed energy resources and recent
advances in computation and communication
technologies have changed the nature of how we
consume, trade, and apply energy. The power
system is facing a transition from its
traditional hierarchical structure to a more
decentralized model by introducing new energy
distribution models such as peer-to-peer (P2P)
sharing for connected communities. The proven

20
effectiveness of P2P sharing in benefiting
both prosumers and the grid has been
demonstrated in many studies and pilot
projects.

However, there is still no extensive


implementation of such sharing models in
today’s electricity markets. This paper aims
to shed some light on this gap through a
comprehensive overview of recent advances in
the P2P energy system and an insightful
discussion of the challenges that need to be
addressed in order to establish P2P sharing as
a viable energy management option in today’s
electricity market. To this end, in this
article, we provide some background on
different aspects of P2P sharing. Then, we
discuss advances in P2P sharing through a
systematic domain-based classification. We
also review different pilot projects on P2P
sharing across the globe. Finally, we identify
and discuss a number of challenges that need
to be addressed for scaling up P2P sharing in
electricity markets followed by concluding
remarks at the end of the paper.

21
Deep Reinforcement Learning-Based Channel
Allocation for Wireless LANs With Graph
Convolutional Networks

As said by Kota Nakashima, Shotaro


Kamiya, Kazuki Ohtsu, Koji Yamamoto, Takayuki
Nishio, Masahiro Morikura Jan 2020 for densely
deployed wireless local area networks (WLANs),
this paper proposes a deep reinforcement
learning-based channel allocation scheme that
enables the efficient use of experience. The
central idea is that an objective function is
modeled relative to communication quality as a
parametric function of a pair of observed
topologies and channels. This is because
communication quality in WLANs is
significantly influenced by the carrier
sensing relationship between access points.
The features of the proposed scheme can be
summarized by two points. First, we adopt
graph convolutional layers in the model to
extract the features of the channel vectors
with topology information, which is the
adjacency matrix of the graph dependent on the
carrier sensing relationships. Second, we
filter experiences to reduce the duplication
of data for learning, which can often
adversely influence the generalization
performance. Because fixed experiences tend to

22
be repeatedly observed in WLAN channel
allocation problems, the duplication of
experiences must be avoided. The simulation
results demonstrate that the proposed method
enables the allocation of channels in densely
deployed WLANs such that the system throughput
increases. Moreover, improved channel
allocation, compared to other existing
methods, is achieved in terms of the system
throughput. Furthermore, compared to the
immediate reward maximization method, the
proposed method successfully achieves greater
reward channel allocation or realizes the
optimal channel allocation while reducing the
number of changes.

Internet-of-Things Device Set Configuration


for Connection to Wireless Local Area Network
(WLAN)

Based on Yaroslav Krainyk, Andrii


Razzhyvin, Olena Bndarenko and Irina Simkova
(May 2019) In this paper, new model of
interaction in IoT-infrastructure for the set
of devices is investigated. Integration into
wireless network based on WiFi-technology,
software identification, data exchange, and
software upgrade problems have been considered
for the end-user product that consists of

23
group of devices. The established solution
utilizes assignment of the server and client
role to devices in the set. The server deploys
temporary network so the user device can
access it and enter necessary information
about network to connect to. Communication
mechanisms within customer's network for
device set have been also considered. Using
proposed models, customer can control device
set, send and receive data (particular case
for audio data is considered), update firmware
and resources of devices directly from his/her
own device via specially designed software. We
have used set of ESP8266 boards and NodeMCU
firmware to implement and test the developed
model. The developed prototype system is able
to receive configuration of the user network,
receive audio data from client device and play
audio. This proof-of-concept system can be
further extended for the new functionality.

Wireless Local Area Network (WLAN)

As mentioned by Martin Sauter (January


2021) In the mid‐1990s, the first Wireless
Local Area Network (WLAN) devices appeared on
the market, but they did not get much consumer
attention. This changed rapidly 10 years later
when the hardware became affordable, and WLAN

24
quickly became the standard technology for
connecting computers, smartphones, and tablets
to the Internet. This chapter looks at this
system, which was standardized by the
Institute of Electrical and Electronics
Engineers in the 802.11 specification. It
describes the fundamentals of the technology,
which have changed little since the beginning.
The chapter describes the evolutionary steps
that were taken over time to increase
transmission speeds. One of the main
applications of a WLAN network is access to a
local network and the Internet. For this
purpose, the infrastructure basic service set
mode is much more suitable than the previously
described ad hoc mode. Another WLAN mode is
wireless bridging, sometimes also referred to
as a wireless distribution system.

Implementation and Evaluation of WLAN 802.11ac


for Residential Networks in NS-3

(Andy Bubune Amewuda, Ferdinand Apietu


Katsriku, Jamal-Deen Abdulai ) Wi-Fi has been
an amazingly successful technology. Its
success may be attributed to the fact that,
despite the significant advances made in
technology over the last decade, it has
remained backward compatible. 802.11ac is the

25
latest version of the wireless LAN (WLAN)
standard that is currently being adopted, and
it promises to deliver very high throughput
(VHT), operating at the 5 GHz band. In this
paper, we report on an implementation of
802.11ac wireless LAN for residential scenario
based on the 802.11ax task group scenario
document. We evaluate the 802.11ac protocol
performance under different operating
conditions. Key features such as modulation
coding set (MCS), frame aggregation, and
multiple-input multiple-output (MIMO) were
investigated. We also evaluate the average
throughput, delay, jitter, optimum range for
good put, and effect of station (STA) density
per access point (AP) in a network. ns-3, an
open source network simulator with features
supporting 802.11ac, was used to perform the
simulation. Results obtained indicate that
very high data rates are achievable. The
highest data rate, the best mean delay, and
mean jitter are possible under combined
features of 802.11ac (MIMO and A-MPDU).
14CITATIONS14 total citations on Dimensions.

26
Wireless LAN Performance Enhancement Using
Double Deep Q-Networks

Asaf, Bilal Khan, Ga-Young Kim Apr 2022


due to the exponential growth in the use of
Wi-Fi networks, it is necessary to study its
usage pattern in dense environments for which
the legacy IEEE 802.11 MAC (Medium Access
Control) protocol was not specially designed.
Although 802.11ax aims to improve Wi-Fi
performance in dense scenarios due to
modifications in the physical layer (PHY),
however, MAC layer operations remain
unchanged, and are not capable enough to
provide stable performance in dense scenarios.
Potential applications of Deep Learning (DL)
to Media Access Control (MAC) layer of WLAN
has now been recognized due to their unique
features. Deep Reinforcement Learning (DRL) is
a technique focused on behavioral sensitivity
and control philosophy. In this paper, we have
proposed an algorithm for setting optimal
contention window (CW) under different network
conditions called DRL-based Contention Window
Optimization (DCWO). The proposed algorithm
operates in three steps. In the initial step,
Wi-Fi is being controlled by the 802.11
standards. In the second step, the agent makes
the decisions concerning the value of CW after

27
the TRAIN procedure for the proposed
algorithm. The final phase begins after the
training, defined by a time duration specified
by the user. Now, the agent is fully trained,
and no updates will be no longer received. Now
the CW is updated via the OPTIMIZE process of
DCWO. We have selected total network
throughput, instantaneous network throughput,
fairness index, and cumulative reward, and
compared our proposed scheme DCWO with the
Centralized Contention window Optimization
with DRL (CCOD). Simulation results show that
DCWO with Double Deep Q-Networks (DDQN)
performs better than CCOD with (i) Deep
Deterministic Policy Gradient (DDPG) and (ii)
Deep Q-Network (DQN). More specifically, DCWO
with DDQN gives on average 28% and 23% higher
network throughput than CCOD in static and
dynamic scenarios. Whereas in terms of
instantaneous network throughput DCWO gives
around 10% better results than the CCOD. DCWO
achieves almost near to optimal fairness in
static scenarios and better than DQN and DDPG
with CCOD in dynamic scenarios. Similarly,
while the cumulative reward achieved by DCWO
is almost the same with CCOD with DDPG, the
uptrend of DCWO is still encouraging.

28
Pre-computer Lab Monitoring System

According to Prof.M.K.Vairalkar (April


2022) Monitor students activities during
practical time is difficult also teacher has
to visit each student machine to check is
practical work. Due to computer lab monitoring
system teacher can easily judge that if there
is anything illegal or out of the range
activities of student’s privilege are running
on the student’s desktop. This system is
useful in various organizations, government,
building, school and colleges. Monitoring
server is typically connected to a monitor
port on the switch. If multiple Switches are
used in an installation, the monitoring Server
may need a connection to all of them. That
connection can either be a physical cable, or
if your network switches support it, a LAN
specifically configured for monitoring
traffic. LAN monitoring project aims to
develop various network utilities which are
required to effectively monitor a LAN network.
Project aims to develop an integrated software
solution that allows a network administrator
to remotely monitor his LAN network.

29
Comparative performance evaluation of computer
network cables for Local Area Network (LAN)

Sunday Abbayomi Ojumu,Anthony Alaomaka,


Peter Oritsetimeyin Tim, George Egega June
2022. This paper on Comparative Performance
Evaluation of Computer Network Cables for
Local Area Network (LAN) interrogates
improvements in wireless technology and many
computer networks in the 21st century that
continue to utilize wires as a physical media
of devices to transfer data. Information can
be transmitted in two different media: wired
medium and the wireless medium. There are
various network cable kinds, each with a
distinct function. Data transfer speed is
influenced by bandwidth. The more data that is
transported, the higher the bandwidth. This
paper focuses on the analysis of three network
cables called the primary network cables.
These are the coaxial cable, the unshielded
twisted pair cable and the optical fiber
cable. The arrangement of these cables with
other network components, that is, network
topology is very essential in setting up a
computer network. The arrangement can be
physical and logical. The physical arrangement
has to do with the connection format as well
as the physical design. The logical topology

30
is the set of rules governing the flow of
information among the connected workstation.
The speed at which data are transmitted is
dependent on the type of cable used. This
analysis measures the performance speed of
these cables by considering their file sizes
as well as their download time. The file size
was measured in bytes and the time measured in
seconds. Different speeds were obtained for
coaxial cable, unshielded twisted pair cable
and the optical fibre cable. This was achieved
by connecting each of the cables to the
internet via a network switch and then to a
computer system. The timing for download
sessions was taken for file sizes of different
volume and quality of each of the cable size.
The plaintext, unshielded twisted pair cable
was faster than that of optical fiber cable
and much faster than that of coaxial cable.
Also, for heavy files, such as stationary
pictures and videos, optical fiber cable is
much faster than unshielded pair cable and
coaxial cable. From these, it is therefore
seen that optical fiber cable is most
preferable for a Local Area Network compared
to the other two cables.

31
Related Studies

Enterprise Resource Plan Using Wireless Bridge


for Local Area Network in Caragsacan
Elementary School

This study focuses in the design and


implementation of the Local Area Network (LAN)
using Wireless Bridge in Caragsacan Elementary
School. A star topology will be used to
connect the wireless access point, which is
usually both router for the local network and
bridge to the Internet. Star networks are
highly suitable for connecting both wired and
wireless nodes together.

Enterprise Resource Plan using WLAN and


Wireless Bridge Connection between Novo
Cabanatuan and Novo Guimba

In line with Renante P. Galang, Veralph


L. Arquero and Vincent John E. Tejada in 2018.
The network designers decided to create a
network design that will help the Novo
Cabanatuan and Novo Guimba. The Novo Company
does not have a wireless bridge connection
that is why, the other branches cannot easily
transfer data and transactions. The devices
that will be used for the network design are
bridge antennas, high-end servers for offices,
2 Power over Ethernet (POE), 2 routers, 4

32
workstation computers, 2 printers, RJ45,
Unshielded Twisted Pair (UTP) cables. All the
data, transaction and information in the
branch will go from the workstations through
the bridge antenna and the bridge antenna will
pass the data to the other bridge antenna of
the other office of Novo Cabanatuan and Novo
Guimba. The network designers' goal is to
create a network design that will connect the
Novo Cabanatuan and Novo Guimba. To help the
clients to easily have a transaction to the
office near them are some of the goals of this
capstone project.

Enterprise Resource Plan for Barangay Atate to


Palayan City Health Office using Wireless
Bridge Connection

Following Christian A. Ambrocio, Mark


Florence B. Binavice, Jeramie P. Calda and
Jersey B.Sabado November 2018. This capstone
project entitled "enterprise Resource Plan for
Barangay Atate to Palayan City Health Office
using Wireless Bridge Connection", is designed
to connect Palayan City Health Office and the
barangay health center of Brgy. Atate. This
will help the health officials of Palayan City
who struggle to obtain necessary information
regarding the health status of the residents
in the different barangays.

33
Enterprise Resource Plan using Wireless bridge
connection at the Rizal Municipal Hall and
Barangay General Luna

In agreement with Renzo B. Aguilar,


Alexander Julian R. Estabillo, Marie Rose E.
Tacdol, and Mark Joseph M. Yambao December
2022 The network designers had chosen this
study because they want to change the way how
the network of the establishments is set up
with the use of Wireless Bridge Connection for
network connectivity instead of a face-to-face
transaction of papers from the municipal hall.
The main purpose of this study is to develop a
proposed ("Using Wireless bridge connection at
the Rizal municipal hall and Barangay General
Luna") for our barangay and municipal hall to
connect electronically to each other.

Enterprise Resource Plan for connecting Brgy.


Bibiclat and Brgy. San Pablo to the Municipal
Hall of Aliaga using LAN and Bridge

Pursuant to Jerald G. Angeles, Earl


Lindsay P. Bondoc and Judy Ann C. Felix Nov
2018. The capstone project entitled,
"Enterprise Resource Plan for connecting Brgy.
Bibiclat and Brgy. San Pablo to the Municipal
Hall of Aliaga using LAN and Bridge" was
proposed by the proponents to the Municipal

34
administrators of Aliaga in Nueva Ecija
because they have determined that there is a
need for the enterprise to build a network
design to maximize the use of their computer
units. This project which is designing a Local
Area Network and Bridge Network in the
Municipal Hall will have emerged as one of the
most effective means of communication among
the personnel of the Municipal Hall in Aliaga,
Nueva Ecija and the residents of the most
farfetched barangays. This project will
install a server for local file sharing
between computers in the different offices.
The proponents used the Network development
Life Cycle (NDIC) as the guide in creating
this capstone project. They followed the six
phases of NDIC and came up with a reliable
network design. The network design 1s consists
of 3 computers units, 1 server, 3 printers, 3
routers, 4 bridge antennas and 50m UTP cable,
1 box of RJ45.

35
Conceptual Framework

Input Process Output Outcome


Problem Network Quick data Connecting
Identification: Development transmission Network
Router Life Cycle Work with Infrastructure
Wireless Bridge Planning software of Julia Ortiz
Switch Analysis programs Luis National
Design Complete High School of
Modem
assignments, Sto. Domingo
Simulation using Local
Implementatio Creating a
word Area Network
n and Wireless
Monitoring documents,
Bridge
Maintenance Sharing files

Feedback

Figure 1. Conceptual Framework-Diagram

Figure 1 presents, the flow of the


development of the network design using the
Input-Process-Output.

We input some problem identification such


as router, modem, wireless bridge, and switch.
We use the NDLC / Network Development Life
Cycle that includes planning, analysis,
design, simulation, implementation,
monitoring, and maintenance. In our process
the output will be the Principal’s Office and
Senior High Computer Laboratory in Julia Ortiz

36
Luis Natonal High School (JOLNHS) of Sagaba,
Sto. Domingo is connected using Local Area
Network and Wireless Bridge and the outcome
will be quick data transmission, work with
software programs, complete assignments,
creating word documents and share files.

Statement of the Problem

The main goal of this is to design and


implement a device and this study aimed to
answer the following:

1. How may the network infrastructure be


designed and developed using the following
NDLC phases:

1.1 analysis;
1.2 design;
1.3 simulation prototyping;
1.4 implementation;
1.5 monitoring; and
1.6 management?

2. What are the assessments of the end-users


acceptability of the proposed network plan?

37
Scope and Delimitations

This capstone project was conducted in


the Senior High School Computer Laboratory and
Principal’s Office located at Julia Ortiz Luis
National High School (JOLNHS) Sagaba, Sto.
Domingo, Nueva Ecija. The focus of the study
is to create a network design that will
connect these buildings using Local Area
Network (LAN) and how they can link computers
together and provide shared access to
printers, files, and other services.

This capstone will not cover any other


rooms or offices at Julia Ortiz Luis National
High School (JOLNHS).

Figure 2. Julia Ortiz Luis National High


School (JOLNHS)

38
Figure 2 shows, the School of Julia Ortiz
Luis National High School (JOLNHS) in Sagaba,
Sto. Domingo, Nueva Ecija.

Figure 3. Senior High School Computer


Laboratory

Figure 3 shows, the image of the Senior


High Computer Laboratory of Julia Ortiz Luis
National High School (JOLNHS) located at the
second floor of the Senior High Building.

Figure 4. Principal’s Office

39
Figure 4 shows, the image of the
Principal’s Office of Julia Ortiz Luis
National High School (JOLNHS) in Sagaba, Sto.
Domingo, Nueva Ecija.

Significance of the Study

This study will benefit the following


individuals:

ICT Teachers. This study will help them to


use the computer laboratory to teach their
students in an easier and more effective way
where both teachers and students will be able
to do and execute every laboratory exercise.
They will also be able to monitor each
computer device and troubleshoot each computer
much more easily.

Students. This will help the students and


enable them to use their computer laboratory
for their computer class that provides open
access to local internet service and acquire
digital skills to continue learning under the
most difficult circumstances in terms of
internet connectivity.

Principal. This will benefit the principal


through making informed decisions about
curriculum, staffing, and resource allocation
that can improve student learning outcomes.

40
Principal’s Secretary. This will benefit the
principal’s secretary to save time and
increase productivity.

To the future Network Designer. This will


help them to get some ideas and strategies on
what to do on their future projects, and gain
knowledge in connecting a network using LAN
and wireless bridges. It may also serve as a
guide and they may also use the network design
if needed.

Definition of terms

In order to come up with a common


understanding, the following terms were
defined:

RJ-45. It is used to connect devices in a


network and is still a popular form of network
connection.

Switch. It allows each connected device to


talk to the others and is used in a wired
network to connect to other devices using
Ethernet cables.

Wireless connection. It is a term used to


define telecommunication and data transmission
without wires.

Wireless bridge. Converts any wired network-


enabled device with available Ethernet port to

41
the latest wireless technology, such as
printers, wired computers, TVs, Blu-ray Disc™
players, game consoles, and even network-
attached storage wireless.

Modem. A device that connects to the data


connection provided by your Internet Service
Provider (ISP). Other network devices such as
a router are connected behind the modem.

Router. A router is a device that routes or


splits your Internet connection among multiple
devices. A router is an “intelligent” device.
It can divide your connection differently
depending on how it is configured. Routers
commonly have multiple ports to allow separate
device connections.

Network-design. Involves evaluating,


understanding, and scoping the network to be
implemented. The whole network design is
usually represented as a network diagram that
serves as the blueprint for implementing the
network physically.

CHAPTER II

42
METHODOLOGY

This chapter discusses the different


methods and techniques in the development of
network design.

Research Design

This capstone project was created using


the results of a survey carried out by the
network designers. They utilized specialized
software to visually represent and strategize
potential network designs for the intended
school. The equipment employed in this project
encompasses computers, cross-over cables,
switch devices, routers, wireless bridge
devices, and PoE adapters. Additionally, the
designers employed the Packet Tracer
application to ensure proper network
functionality. The creation process adhered to
the stages outlined in the Network Development
Life Cycle (NDLC).

43
Project Locale

Figure 5. Julia Ortiz Luis National High


School (JOLNHS)

This study will be carried out in Julia


Ortiz National High School (JOLNHS), a
secondary public school located at Sto.
Domingo, Nueva Ecija. The network designers
chose this school for implementation of a
network design because this school needed to
expand the internet connection and reach it to
their computer laboratory.

44
Figure 6. Senior High Computer Laboratory

This is the school computer laboratory


where students perform laboratory activities
and other tasks. When there was a pandemic,
the computer laboratory was stocked and no
longer used so it was necessary to have it
repaired so that the students of this school
could use it properly again.

Figure 7. Principal’s Office

45
This figure is the Principal’s Office,
which will serve as the computer laboratory
internet connection. The researchers will
connect the principal’s office and computer
laboratory using a wireless bridge. The
Principal’s Office is located at the opposite
building of the computer laboratory.

Research Respondents

The respondents in this study were


carefully selected to provide insights into
the implementation and effectiveness of a
wireless bridge network connection between the
Principal's Office and the school computer
laboratory. A purposive sampling method was
utilized to ensure representation from key
stakeholders who play a role in the decision-
making, deployment, and maintenance of the
network connection.

The study involved a total of 10


participants, categorized as follows:

School Principal: The principal of the school,


is responsible for approving and overseeing
the implementation of technology
infrastructure.

IT Coordinator: The individual is responsible


for managing the school's IT resources,

46
including network configurations and
connectivity.

Network Administrator: The network specialist


in charge of setting up and maintaining the
wireless bridge network components.

Computer Laboratory Instructor: The educator


who utilizes the computer laboratory for
instructional purposes and requires reliable
network access.

Technical Support staff: Personnel responsible


for addressing any technical issues related to
network connectivity or equipment malfunction.

ICT Students: The experiences and perspectives


of ICT students in relation to the wireless
bridge network connection established between
the principal's office and the school computer
laboratory. And to know their valuable
insights into their usage of the network,
challenges faced, and benefits derived from
the connectivity.

The participants were selected based on


their direct involvement in the planning,
execution, or utilization of the wireless
bridge network connection between the
principal's office and the computer
laboratory.

47
Data Collection

Data collection encompassed semi-


structured interviews and network performance
assessments. Semi-structured interviews
enabled participants to share their viewpoints
on the network's impact, challenges, and
benefits. Network performance assessments
involved monitoring factors such as signal
strength, latency, and data transfer rates to
gauge the reliability and efficiency of the
wireless bridge connection.

Semi-structured interviews were conducted


individually with participants, either in
person or through virtual meetings. Network
performance assessments were carried out over
a predetermined period, during which data was
gathered using specialized network monitoring
tools.

Research Instruments

Description. The network designers used


three instruments in this capstone project.
The first instrument was used to describe the
existing network and the research locale. The
second one was for the IT staff.

Planning

48
Maintenance Analysis
Figure 8. Network Development Life Cycle

Network Development Life Cycle (NDLC)is a


systematic approach to designing,
implementing, and maintaining computer
networks. It typically consists of several
phases which is planning, analysis, design,
implementation, monitoring and maintenance.
The NDLC ensures a structured and systematic
approach to network development, facilitating
the creation, scalable, and secure networks
that align with organizational goals.

Planning Phase

In this phase the network designers


brainstormed, detailed planning is done
including network topology, hardware, and
software and security requirements.

49
Figure 9: Interview with the Principal of
Julia Ortiz Luis National High School (JOLNHS)

In this figure, the network designers


talked to the principal of Julia Ortiz Luis
National High School to get permission to
conduct a capstone in their beloved school and
plan what network design that will be
implemented.

Analysis Phase

The network designers examined the


network infrastructure and the identifications
of issues or shortcomings gathered data and
analysed it to inform the design phase.

Design Phase

Network designers create a detailed


design based on the requirements and
objectives defined in the planning phase. This
phase includes decisions on network protocols,
IP addressing, and security measures.

50
Figure 10. Physical Network Design

It illustrates the physical layout of the


senior high computer laboratory of Julia Ortiz
Luis National High School (JOLNHS) in Sagaba,
Sto. Domingo Nueva Ecija. This shows the
placement of each device in a network.

Figure 11. Logical Layout Design

The figure shows the logical layout of


the network design whereas it shows how the
devices will be connected and form a network.

Simulation Phase

51
This is an essential phase where network
designers create a virtual or test
environments to model and validate the network
design. This helps to identify potential
issues and ensures that the network will
perform as expected.

Implementation Phase

During this phase, the network design is


put into action. Hardware and software
components are installed and configured.
Connectivity and functionality are tested.

Monitoring and Maintenance

In this phase the network designers will


instruct the IT teacher to decide whether the
network design implementation has errors or
mistakes. The attentive personnel will be the
one who will be in charge of network design
and load new modifications and developments.

Is an ongoing phase where the network


enters its operational phase, in which it is
continually monitored for performance and
security.

Data Gatherings Procedures

To best serve their target respondents,


the network designers invested a lot of time,

52
energy, and teamwork in creating their
questionnaire. A combination of appropriate
questions adapted from previous studies and
original questions developed by the network
designers were used to produce the survey.
After giving the participants a chance to
answer, the network designers collected the
survey forms the following working day.
According to the frequency of items checked by
the participants, the data collected from this
research instrument were added up and computed
for interpretation.

Data Analysis

The response mode of tallying the common


answers from the item statements in the survey
about the effectiveness of the network design
that the network designers implemented in
Julia Ortiz Luis National High School
principal’s office and senior high computer
laboratory using a wireless bridge:

SCALE VERBAL VERBAL


INTERPRETATION DESCRIPTION
4 3.41-4.00 Strongly Agree
3 2.41-3.40 Agree
2 1.41-2.40 Disagree
1 1.00-1.40 Strongly

53
Disagree

Table 1. Likert Scale

This table can be used to assess the


overall output of the survey.

CHAPTER III

RESULTS AND DISCUSSION

This chapter presents the network


development cycle and what the network
designers have done in each phase.

Network Development Lifecycle

The Network Development Lifecycle (NDLC)


is a structured and systematic approach to the
planning, analysis, design, simulation,
implementation, monitoring, and maintenance of
a computer network infrastructure. It
encompasses all the stages and activities
involved in creating, deploying, and managing
a network to ensure it meets the
organization’s objectives and functions
effectively and securely. The NDLC typically
consists of phases such as planning, analysis,
design, implementation, simulation,

54
monitoring, and ongoing maintenance, each with
its own set of tasks and goals. This lifecycle
framework helps organizations build and manage
their networks efficiently and adapt to
changing requirements over time.

1. Planning

Figure 12. Gantt chart

The planning phase presents the Gantt chart


used in this study. It was necessary for the
network designers to follow the activities in
the Gantt chart to successfully complete the
network plan.

55
1.2 Analysis

In this phase, the network designers


conducted interviews and observations in the
project locale and proceeded to analyze the
problem. In Julia Ortiz Luis National High
School, the main problem of the ICT laboratory
is that they do not have a network in their
laboratory room. Because of this, they have
difficulty monitoring important files, and
doing their laboratory task.

1.3 Design Phase

The network designers created the physical


and logical layout of the network based on the
requirements and objectives defined in the
planning phase. This phase includes decisions
on network protocols, IP addressing, and
security measures.

56
Physical Layout

The figure displays the physical layout


of the Julia Ortiz Luis National High School.
The network designers create a physical layout
to demonstrate how the network operates using
the platform Visio.

57
Logical Layout

The figure displays the logical


layout of the Julia Ortiz Luis National High
School. The network designers create a logical
layout to demonstrate how the network operates
using the platform Cisco packet tracer.

58
List of Specification

Table 2. Desktop Computer Specifications

DEVICE SPECIFICATION
Desktop Computer -Dell 3000 i3847-
5847BK Desktop
Computer
3.2 GHz Intel Core
i5-4460 CPU
8GB 1600MHz DDR3 RAM
1TB 7200 rpm Hard
Drive
Integrated Intel HD
Graphics
SuperMulti DVD Burner
802.11b/g/n Wi-Fi
Bluetooth 4.0
Integrated 5.1 Audio
8-in-1 Reader
2 x USB 3.0, 6 x USB
2.0 Ports
Windows 7 Pro (64 -
bit)

Table 2 shows the desktop computers that


they will be using in computer laboratory
located at the second floor of the Senior High
School Building in Julia Ortiz Luis National
High School (JOLNHS).

59
Table 3. Switch Specifications

DEVICE SPECIFICATION
Switch D-Link 16-Port Gigabit
Unmanaged Desktop
Switch
1000Base-T Interface 16
Auto MDI/MDIX
32 Gbps switching
capacity
23.81 Mpps Max Packet
Forwarding Rate
280 x 125 x 44m
Dimension
Weight 1.023 kg
0-40C storage
temperature
0%-95% RH storage
humidity
10.07W Maximum Power
Consumption
Power Input 100-240V AC
Packet Buffer Size
512Kbytes
fan less.

Table 3 presents the switch device that


will be used in the computer laboratory to
connect computers and enable them to talk to
each other and exchange data packets.

60
Table 4. Unshielded Twisted Pair (UTP Cable)
Specification

DEVICE SPECIFICATION
UTP Cable Cat5e with
bandwidth of
100MHz
Speed 1000Mbps
1GBASE-T 1Gigabit
Ethernet
Copper wire with 4
twisted pairs

Table 4 shows the UTP cable that serves


as the medium of network devices to connect
and transfer audio signals and electronic
data.

61
Table 5. RJ45 Specifications

DEVICE SPECIFICATION
RJ45 Connector Type- RJ45
Cable type- Ethernet
Compatible devices-
personal computer
Color- UTP-Cat 6-
Transparent Brand -
cable creation

Table 5 presents the 8 pin RJ-45 that is


used in Ethernet-based network that is placed
at the ends of the UTP cables to be able to
connect on network devices.

Table 6. Router Specification

62
DEVICE SPECIFICATION
Router TP-Link Archer AX10
comes equipped with
latest wireless
technology, Wi-Fi 6, for
faster speeds, greater
capacity and reduced
network congestion.2.6
Next-Gen 1.5 Gbps Speeds-
Archer AX10 dual-band
router reaches fast
speeds up to 1.5
Gbps( 1201 Mbps on 5 GHz
band and 300 Mbps on 2.4
GHz band)1 connect more
devices than ever before
–Wi-Fi 6 technology
simultaneously
communicates more data to
more devices using OFDMA
and MU-MIMO while
reducing lag. 3.5 Triple-
Core Processing-The 1.5
GHz tri-core processor
ensures communications
between your router and
all connected devices are
smooth and buffer-free.
More reliable Coverage-
Achieve the strongest,
most reliable Wi-Fi
coverage with Archer AX10
as it focuses signal
strength to your devices
using Beamforming
technology and 4
antennas.

Table 6 illustrates the router device


that serves as the gateway that passes
information between two or more packet-

63
switched computer networks. It is placed at
the senior high computer laboratory in Julia
Ortiz Luis National High School (JOLNHS).

Table 7. Power over Ethernet Specifications

DEVICE SPECIFICATION
Power Over Ethernet POE Power Over
Ethernet

Output overcurrent
Protect (single
circuit):500Ma
Overvoltage Protect:
Input Voltage gt;240V
AC Under voltage
Recovery Point: Input
Voltage lt; 100V AC
Temperature Protect:
gt; 100C

Table 7 shows the PoE device or Power


over Ethernet that allows you to use a single
cable to deliver both power and data. It will
be placed at the Principal’s Office and Senior
High Computer Laboratory Building in Julia
Ortiz Luis National High School (JOLNHS).

Table 8. Wireless Bridge Specification

DEVICE SPECIFICATION
Wireless Bridge Dimensions 358 x 271.95
x 272.5 mm (14.09 x

64
10.71 x 10.73")
Weight Without Mount:
800 g (1.76 lb)
Weight With Mount: 980
g (2.16 lb)
Power Supply 24V, 0.3A
Gigabit PoE Adapter
(Included)
Max. Power Consumption
7W
Power Method Passive
PoE (Pairs 4, 5+; 7, 8
Return)
Supported Voltage Range
24V ± 10%
Gain 23 dBi
Networking Interface
(1) 10/100/1000
Ethernet Port
Processor Specs MIPS
74Kc
Memory 64 MB DDR2
LEDs Power, Ethernet
Channel Sizes PtP Mode
PtMP Mode
10/20/30/40/50/60/80
MHz 10/20/30/40 MHz
Enclosure
Characteristics
Reflector (SGCC 0.6T) /
Plastic: PC

Table 8 illustrates the wireless bridge


that connects and provide internet access for
two or more access points in a single
direction across a large distance. This will
be placed at the Principal's Office and Senior
High Shool Building in Julia Ortiz Luis
National High School (JOLNHS) at Sagaba, Sto.
Domingo Nueva Ecija.

65
Table 9. Total Expenses of Used Equipment

DEVICE/ QUANTITY UNIT UNIT TOTAL


COST COST
MATERIALS

Acer 50 set 11,963 598,150


Desktop
Computer
D-Link 4 pcs 3,130 12,520
Switch
UTP Cable 1 box 184 2,450
Rj45 100 pcs 10 1,000
TP-Link 2 pcs 2,470 4,940
Router
FCC 2 pcs 3,740 7,480
Wireless
Bridge
Power 2 pcs 530 1,060
Over
Ethernet
Injector
GRAND TOTAL: 627,600

Table 9 presents the list of costs of


each device use to network the office of the
Principal and the senior high computer
laboratory with 50 units of desktop computers
(598,150),4 switches (12,520), and 1 box of

66
UTP cable (2,450), 100 pieces of RJ45 (1,000),
two routers (4,940), two wireless bridge
(7,480), and two PoEs (1,060) with the total
amount of 627,600.

1.4 Simulation

In this phase, the network designers use a


packet tracer to connect all the needed
devices and tested if they functioned
according to their specifications. Detailed
technical aspects of the wireless bridge
implementation are discussed. This includes
the selection of appropriate hardware,
configuring the wireless bridge devices, and
optimizing the network for performance and
security. The network designers determined
possible problems with the network connections
and formulated possible solutions.

67
1.5 Implementation

In this phase the capstone project is


already implemented at Julia Ortiz Luis
National High School (JOLNHS), Sagaba, Sto.
Domingo, Nueva Ecija. During this stage the
network and all the devices needed for
wireless bridge connection are already tested.
The network designers configured the wireless
channels and setting up secure encryption
protocols. The network designers conducted on-
site surveys to ensure optimal signal strength
and alignment of the bridge devices, and
carefully tested the connection between the
Principal’s Office and the school computer
laboratory.

68
Set up and Configuration

Wireless Bridge Set-Up


In this sample of Bridge Configuration,
we use Cisco Packet Tracer to test and show
the function of wireless bridge connection.

Step 1. Change the IP to static 192.168.1.111

Step 2. Ping the antenna to confirm the

connectivity. The default IP is 192.168.1.20

69
Step 3. Access the antenna through browser.

Step 4. Select the county and language, check


the box then click to continue.

70
Step 5. After selecting the country and
language, create a username and password then

click save.

Step 6. After creating username and password,


start configuring the antenna, go to the
system and change the device name to Point A.

71
Step 7. After changing the device name, go to
the network and change the IP address.

Step 8. After changing the IP address, go to


the wireless connection then on the access
point, on the PTP mode, change the channel
width, change the Center Frequency in 5800,
max the output number and lastly change the
WPA2 Pre-shared key after that scroll down and
go to advance.

72
Step 9. In advance setting off the EIRP Limit,
save changes in order to save all the
configuration.

73
Step 10. After saving the changes, reload or
go to new window to check if the new IP
antenna is accessible.

Step 11. On Point B repeat what you do in the


point A but only on the PTP mode then do the
site survey, in SSID click select, this will
find the SSID of point A and the mac address

74
Step 12: In point B only On the PTP mode, max the
power out and change the Wpa2 Pre-shared key then
click the select in the SSID to find point A

Step 13: After clicking Select in SSID, wait


for the point A to show up to select or scan
it to find.

75
Step 14: After Selecting the Point A SSID scroll
down to find the advance, Off EMP limit the after
that click the Save changes

Step 15: After save the changes you can reload or


go to new window to check if the new IP antenna
accessible.

1.6 Monitoring and Maintenance

In this phase, the network designers will


instruct the IT teacher to decide whether the
network design implementation has errors or
mistakes. The attentive personnel will be the
ones who will be in charge of network design

76
and load of new modifications and
developments.

2. The assessments of the end-users


accessibility of the proposed network plan?
(Refer to SOP #2)

ITEMS WM VERBAL
INTERPRETA
TION
The proposed network design 3.8 Strongly
meets my functional Agree
requirements.
I find the network design easy 3.7 Strongly
to use and understand. Agree
The network design provides 3.8 Strongly
satisfactory performance in Agree
terms of speed and
responsiveness.
The proposed network design 3.7 Strongly
can easily accommodate growth Agree
in terms of users and data.
I believe the network design 3.7 Strongly
will be reliable and available Agree
when needed.
I am confident that the 3.7 Strongly
network design prioritizes Agree
security of my data and
information.
The network design respects my 3.7 Strongly
privacy and data protection Agree
concerns.
The proposed network design is 3.7 Strongly
compatible with my existing Agree
devices and systems.
The network can seamlessly 3.8 Strongly
communicate with other systems Agree
or networks I use.
I trust that adequate user 3.7 Strongly
support will be available if Agree
issues arise with the network.
The provided training and 3.6 Strongly

77
documentation are helpful in Agree
understanding how to use the
network.
I feel encouraged to provide 3.5 Strongly
feedback about my experience Agree
using the network.
The network design allows me 3.3 Strongly
to customize certain aspects Agree
to suit my preferences.
I believe the network design 3.9 Strongly
offers good value for the cost Agree
it incurs.
I perceive that user input was 3.8 Strongly
considered during the design Agree
process of the network.

Average Weighted Mean 3.69 Strongly


Agree

Table 10. Evaluation for the assessment of the


end-user

The table above shows the evaluation for


the assessment of the end-user has an overall
grand mean of 3.69, which indicates “strongly
agree” in the survey. This implied that the
network plan meets the demands and
expectations of its users.

CHAPTER IV

CONCLUSION AND DISCUSSION

78
This chapter presents the summary,
conclusion and recommendation of the capstone
project.

Summary

The network designers had chosen this


study to help the students of the Julia Ortiz
Luis National High School (JOLNHS) specially
the ICT students to be able the use their
computer laboratory by installing Wireless
Bridge at the office of the principal for
network connection.

This study focused on establishing a


seamless and reliable network connection
between the computer laboratory and the
Principal’s Office within an educational
institution. The objective is to enhance
communication and data transfer efficiency
while maintaining security and ease of
management.

The research explores the use of the


wireless bridge technology as the solution to
connect these two essential areas. Wireless
bridges allow the extension of a network over
a long distance without the need for physical
cables, making them cost-effective and
convenient choice.

79
Conclusion

In conclusion, the implementation of a


wireless bridge network between the computer
laboratory and the principal's office in Julia
Ortiz Luis National High School (JOLNHS) is a
practical and effective solution. It enhances
connectivity, security, and efficiency within
the educational institution, ultimately
contributing to a more productive and
collaborative environment.

The wireless bridge technology not only


eliminates the physical constraints of wired
connections but also provides a secure and
reliable means of data transfer. By extending
the network seamlessly across these two vital
areas, the school can harness several
advantages.

To begin with, improved communication


between the computer laboratory and the
principal's office facilitates quicker
decision-making and enhances administrative
efficiency. This, in turn, has a positive
ripple effect throughout the school, ensuring
that important information flows smoothly and
is readily accessible to those who need it

80
most which is the ICT students of Julia Ortiz
Luis National High School (JOLNHS).

As well, the wireless bridge network not


only improves administrative tasks but also
opens up opportunities for collaborative
educational endeavours. Teachers, students,
and administrators can share resources and
information effortlessly, promoting a dynamic
and innovative learning environment.

In essence, this research demonstrates


that the implementation of a wireless bridge
network between the computer laboratory and
the Principal's Office is not only a technical
upgrade but a strategic investment in the
school's future. It aligns with the evolving
educational landscape, where efficient
communication and data sharing are leading. As
technology continues to play a crucial role in
education, institutions that embrace such
innovations are better positioned to thrive in
an increasingly interconnected world.

Recommendations

81
1. The monitoring and maintenance of the
network should be handled by an IT
network designer for it to run smoothly.

2. The future network designers who will be


conducting the same study may use this
capstone project for reference.

3. The school may consider creating and


implementing the proposed network plan
for the different laboratories in Julia
Ortiz Luis National High School.

82
APPENDICES

References

1.Pradeepa Wijuntunga, The central Library


University of Colombo Local Area Ntwork (LAN)
and their application in the libraries.
2.In Book Research Anthology on Smart Grid and
Microgrid Development (pp.1398-1408) Research
on Application of Wireless Bridge Technology
in the Smart Grid (January 2020)
3.Osman Goni and Md. Abu Sheeman (2021)
Implementation of Local Area Network (LAN) and
build a Secure LAN System for BAEC Head
Quarter
4.H.E.Adour, S. Kemeche, The International
Arhives of the Photogrammery, Remote Sensing
and Spatial Information Science (2022)
Wireless LAN for IOT 5G Application in a
congested indoor environment: Improved primary
signal sensing at milimeter-wave v-band 40-75
GHZ]
5.Yao Wang, Mustafa Omer Furkan, Ivan Bartoli
and Fei Lu (2022) Power Self-Sustained
Wireless Bridge Deformation Monitoring System
Based on Solar Photovoltaic
6.Kant (2019) Wireless Repeater and Wireless
Bridge
7.MH Siregar, Jurnal Mantik (2020) Design of
Wireless Computer Network Infrastructure in
Information of Kemendikbud Distributed
Information System in Singingi Kuantan Islamic
University -ejournal.ioscience.org

83
8.In book: Fundamentals of Computer Networks
(pp.37-49) Matthew N. O. Sadiku and Cajetan M.
Akujuobi – Local Area Network (LAN)
9.Hess, S.(2019) Wireless Bridges: How They
Work and How to Set Them Up Digital Trends
10.How to Set Up a Wireless Bridge. Lifewire.
Retrieved – Chua J, (2019)

11.Wayes Tushar, Chau Yuen, Tapan K Saha,


Thomas Morstyn, Archie C Chapman, M Jan E
Alam, Sarmad Hanif, H Vincent Poor (2021)-
Peer-to-peer energy systems for connected
communities: A review of recent advances and
emerging challenges

12.Kota Nakashima, Shotaro Kamiya, Kazuki


Ohtsu, Koji Yamamoto, Takayuki Nishio,
Masahiro Morikura (Jan 2020) - Deep
Reinforcement Learning-Based Channel
Allocation for Wireless LANs With Graph
Convolutional Networks

13.Yaroslav Krainyk, Andrii Razzhyvin, Olena


Bndarenko and Irina Simkova (May 2019) -
Internet-of-Things Device Set Configuration
for Connection to Wireless Local Area Network
(WLAN)

14.(Andy Bubune Amewuda, Ferdinand Apietu


Katsriku, Jamal-Deen Abdulai - Implementation
and Evaluation of WLAN 802.11ac for
Residential Networks in NS-3

15.Asaf, Bilal Khan, Ga-Young Kim (Apr 2022) -


Wireless LAN Performance Enhancement Using
Double Deep Q-Networks

84
16.Sunday Abbayomi Ojumu,Anthony Alaomaka,
Peter Oritsetimeyin Tim, George Egega (June
2022).-Comparative performance evaluation of
computer network cables for Local Area Network
(LAN)

17. Enterprise Resource Plan Using Wireless


Bridge for Local Area Network in Caragsacan
Elementary School
18.Enterprise Resource Plan using WLAN and
Wireless Bridge Connection between Novo
Cabanatuan and Novo Guimba - Renante P.
Galang, Veralph L. Arquero and Vincent John E.
Tejada in 2018.
19.Enterprise Resource Plan for Barangay Atate
to Palayan City Health Office using Wireless
Bridge Connection - Christian A. Ambrocio,
Mark Florence B. Binavice, Jeramie P. Calda
and Jersey B.Sabado (November 2018)
20.Enterprise Resource Plan using Wireless
bridge connection at the Rizal Municipal Hall
and Barangay General Luna - Renzo B. Aguilar,
Alexander Julian R. Estabillo, Marie Rose E.
Tacdol, and Mark Joseph M. Yambao (December
2022)
21.Enterprise Resource Plan for connecting
Brgy. Bibiclat and Brgy. San Pablo to the
Municipal Hall of Aliaga using LAN and Bridge
- Jerald G. Angeles, Earl Lindsay P. Bondoc
and Judy Ann C. Felix (Nov 2018)
22.https://ieeexplore.ieee.org/abstract/
docume?
fbclid=IwAR2jUs2WnuIx3xDsdynu9xYoCejy6Ku0cCDZD
IBFMxu3G29Mr78kTan84rs_aem_Ab4L8dLsD-

85
ZpYZx3xLPTBwfle2TgWrvY3FcZr9dxitKzL7sPQEqnFFex
fo_wWP6dfwY
23.https://connectedpapers.com/?
fbclid=IwAR2WETnGiO4PmX55TmeK4vWCnQ80zWlfteD44
oFgN2V14QRfXMSN07sC3bU_aem_Ab5dODI4Tmq1kqkj09I
4pWsQkT1abzzn8FvoyPVN6HIHYsubiPgAVotjQSF6FnQif
jo
24.https://www.studocu.com/row/document/air-
university/computer-networks/computer-
networks-lab-4-lan-cabling-and-connection-to-
router/25440274?
fbclid=IwAR0fNIiKzd6ndtxm5TsKVGSwo3uaUQcWk9C3U
S3hqstxtOMfiyWM25nxLgU_aem_Ab6t92MbM9ZWrR-
EOz1zzMpahUBtgoTg9YKowGzk2hXpI9yomIVIHvU1hYvZw
B9cLU8
25.http://web.simmons.edu/~chen/nit/
NIT'92/349-wij.htm?
fbclid=IwAR13M3a_3eY0GUonmFOYY5O1GUBcJw5tEIqFO
R4dhfLxvJWBuLEw8vF5BSs_aem_Ab6i3fMZUqAeTGOsuDB
W88qXDbkwD5tzUvtT_0aJL1t-wX-xH3yQBdZ_

86
Appendix A
Table 1. Assessing the level of acceptability
of the proposed Network Plan by end-user

Item Strongl Agre Disagre Strongl


Statements y Agree e e y
(4) (3) (2) Disagre
e
(1)
The proposed
network
design meets
my functional
requirements.
I find the
network
design easy
to use and
understand.
The network
design
provides
satisfactory
performance
in terms of
speed and
responsivenes
s.
The proposed
network
design can
easily
accommodate
growth in
terms of
users and
data.
I believe the

87
network
design will
be reliable
and available
when needed.
I am
confident
that the
network
design
prioritizes
security of
my data and
information.
The network
design
respects my
privacy and
data
protection
concerns.
The proposed
network
design is
compatible
with my
existing
devices and
systems.
The network
can
seamlessly
communicate
with other
systems or
networks I
use.
I trust that
adequate user
support will
be available
if issues

88
arise with
the network.
The provided
training and
documentation
are helpful
in
understanding
how to use
the network.
I feel
encouraged to
provide
feedback
about my
experience
using the
network.
The network
design allows
me to
customize
certain
aspects to
suit my
preferences.
I believe the
network
design offers
good value
for the cost
it incurs.
I perceive
that user
input was
considered
during the
design
process of
the network.

89
Republic of the Philippines
NUEVA ECIJA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Cabanatuan City, Nueva Ecija, Philippines
ISO 9001:2015 CERTIFIED

COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

Appendix B
Aug 14, 2023

Rosalie B. Sison
Instructor
College of Information and Communications Technology
This University

Dear Ma’am:

Greetings of Peace!

The IT Capstone Project and Research is a culminating project as part of the requirements
for the degree, Bachelor of Science in Information Technology. The undersigned are fourth-
year BSIT students enrolled in the IT-CAP02: Capstone Project and Research 1 during the 1 st
Semester of Academic Year 2023-2024.

In line with this, may the undersigned ask for your approval to become their Capstone and
Research Project adviser for the study entitled Connecting Network Infrastructure of
Julia Ortiz Luis National High School of Sto. Domingo, Nueva Ecija using Local Area
Network and Wireless Bridge. Your expertise in the field and guidance will truly contribute
to the success of this academic endeavor.

The undersigned are looking forward for your kind approval and acceptance. Thank you.

Sincerely,

Regine F. Colorado

John Carlo C. Garcia

Judy-Ann E. Gaspar

Rina Jane D. Herrera

Student-Researchers

Noted:

ROSALIE B. SISON
Capstone Project and Research Instructor/NST Program Chairperson/ Adviser

90

You might also like