Escolar Documentos
Profissional Documentos
Cultura Documentos
A Project Plan
Presented to the Faculty of
Information Technology Program of
Pasig Catholic College
In Partial Fulfillment
of the Requirements for the
Degree of Bachelor of Science Information Technology
By:
Michael S. Rublico
Ramon Carlo M. Mauban
Jenny dela Torre
PANEL OF EXAMINERS
Acknowledgement
First of all, to their Family for giving them the moral support by
project.
To their friends: to Ms. Elwissa Castillo and Mr. Jereco Yap by giving
this project study, to the ITC head Mrs. Wilma de Pano to Mr. June
Asuncion for helping and guiding them in the entire school semester
Above all, to the Almighty Father by for giving them wisdom and
complete guidance all throughout the study, and for blessing them
MSR
RCM
JDT
PCC Academic Wireless Community 4
Dedication
The researchers would like to dedicate the success of their thesis study
to Mr. and Mrs. Rublico, Mr. and Mrs. Bedaña, Mr. and Mrs. Mauban and to
Mr. and Mrs. Dela Torre, and to rest of their family member.
They would like to dedicate this also to their friends, classmates and
love one.
And above all to the Father Above who bless them with knowledge and
MSR
RMC
JDT
TITLES PAGES
Dedication ………………………………………………………….………………… v
Appendices …………………………………………………………………………….. ix
CHAPTER 1: Introduction
Preface ………………………………………………………..……………………… 1
Rationale ………………………….……………………………………….…………… 1
Deliverables ………………………………………………………………. 33
Constraints …………………………………………………………... 37
Hardware ……………………………………………………………………….. 40
Software ……………………………………………………………………….. 50
Installation ……………………………………………..………………… 57
Maintenance …………………………………………………..………… 58
Overview ………………………………………………………………………. 61
Recommendation …………………………………………….……… 62
Letters
Survey Form
Bibliography
Curriculum Vitae
TITLES PAGES
CHAPTER 1
INTRODUCTION
Purpose
Preface:
The adoption of wireless networking has grown very rapidly in the last
beyond the obvious lack of having to bend over your desk to plug in your
laptop. Many business and universities here in the Philippines are using
Rationale:
from not having to run network cable to every possible location that could
during his rounds through the WLAN instead of copying the lesson on the
white board. PCC community, down to every department, indoor and outdoor
public access areas are all suitable locations for WLANs. Free access to the
100m distance limitation for copper cabling. Because WLANs use radio
Many schools are merging WLANs into their traditional wired network
budget of every student. By using WLANs, the need of paper for multiple
and server computer were in they shared some important files like installer
and updates of some application, still they don’t prioritized the uploading of
documents from the faculty. For the main objectives of the said department
program and other services which the students needed in their curriculum.
And they believed that giving discussion to the students is part of the
teachers. The table below shows the problem statement matrix that shows
This thesis study was looking forward on how to alleviate the concerns
in order that the purpose of the abovementioned ideas will be realized fully.
1. Create an access point inside the school vicinity wherein all students
that have Wi-Fi devices can interact in the network anywhere in the
school premises.
class.
• CCNA modules for IM,IT and 4th year High School Students
of classes.
all computers are connected to one other and some printers are shared in
the office. Most of the laboratories and offices are already hook-up in the
network. Figure 1 show the current network at the 4th floor of Msgr. Gabriel
Building. The said network are maintained by the ITC technical support and
Lab 401
Not yet in Network
Main Distribution Facility
Lab 402
Not yet in Network
HP Server
Lab 404
Email Server
Lab 405
Internet Server
Lab 406
File Server
Lab 407
Domain Controller
Server Lab 408
Figure 1
a function that assigned only for a specific task. These groups of server are
called the main distribution facility (MDF) for it distributes the different kind
of resources which are needed by the user. Listed below are the server name
contained with some program (created in visual fox pro) that currently
used by the registrar, accounting and canteen. The said offices are
• ISA Server – The main function of this server is to monitor the two
laboratories (403 and 404) that intended for browsing Cisco websites.
• E-Mail Server - This server are intended for the website email of PCC
website.
• File Server – This is one of the most access servers in the network,
for it contains all the installer which installed in every computer like
• Domain Controller Server - This server are intended for the local
network (domain) of the school. With this server, it can allow or not a
Main
Distribution
Facility
Figure 2
Office of College
College
TSVD Deans Office the Guidance College OSA
Faculty
President Office
Figure 3
Main
Distribution
Facility
HP Server
Figure 4
Switch Connected to
HP SERVER
IMC
Figure 5
With the fast emerging of the new technology in our society nowadays,
almost of the offices and departments of the Pasig Catholic College are
shifting manual into computerized based program. With this project studies
This network will not only cater for the sharing of files of the faculty
personnel, but to provide also easy access on the network were in the
an advance studies.
believes that the Pasig Catholic College community will benefit a lot in terms
of:
network as they move from place to place. For a business, this implies
based wireless network requires little more than a single access point.
building).
For the past four years in our stay in PCC, the researcher observed the
professors. With this thesis project, the era of paper documents will be
any paper to be carried. Moreover, the students the can reproduce it again it
again for this resources will be available always in the network. The easiness
to retrieve these documents from the network will be the advantage of the
set-up this project. The proponents of the said project is suppose to use a
wireless router that will serves as the access point in the school area, the
the said network, and the devices (Laptop) that will connect to the network
and of course will be used by the stakeholders. The project group is trying to
use an application (Packet Tracer 4.11/3.2) which will be use for simulation
purposes, however this application were not a part of the designed network.
cater this issue. Thereof this document contains a proposed project and the
probable result at the end of this study. This include on how the proposed
new technology reserves the right to operate and implement this plot.
document, the said department being an exclusive office that will implement
this project has the freedom to add more rules, guidelines and assert the
school as their new facility that will be used by the students, teachers and
welcome; on the other hand they must recognize the advocate of this
Create Milestone 1
Create Milestone 3
Create Milestone 4
(SECTION 1-3)
March-
April Implementation Implementation…………………..
onwards
Gen-Y – Generation Y
IM – Information Management
IT - Information Technology
PC – Personal Computer
RF – Radio Frequency
Proposed Enhancement
especially in Pasig Catholic College. With this new high-tech devices and
resources (internet) which these students have, they can easily manage
their studies. Nowadays, majority of the student are very dependent to the
internet, an easy access to the network are the big advantage of those who
knows how to maximize this resources. Every assignment and project which
the teacher gives is only a one click for them. Browsing to the internet and
copying the needed files and answers are normal for them even without
The researchers are also aware with this kind of system which the
other students do. With that, the proponents of the project established a
plan to create a new network were in the main requirements (devices use by
With all the brainstorm and collected ideas to each member of the
group and to the survey done by the researchers they have come up with
this idea, the WLAN connection for PCC community. The survey done last
school year (2007-2008) concluded them to build up this project, also with
project study requires the following hardware enable to used this facility, the
wireless router, laptop with built-in Wi-Fi (or not) and storage mass. Wireless
router will be used as the access point inside the school vicinity; this access
point will serve as the main connection reference of the teachers and
students. They must connect to this access point enable them to browse the
connection will be limited and eventually you cannot access the WLAN
department and registered their device (laptop) so that they can maximize
Location preference, before installing the access point you must know
first what part of the school was highly visited by the student and teachers.
Because that will be the tactical location where to place the access points
Interface Requirements
Their main interface will focus on how to connect to the WLAN, after all the
procedure in connecting the network they can now browse the internet and
shared the necessary files that they will be needed in their study (for
Performance Requirements
transfer rate, upload rate will vary to the internet service provider (ISP) of
the school, the more bandwidth the higher the rate. Formerly the ITC
1mbps for their bandwidth usage that result to low performance during the
the school) the operation hour (8:00am– 3:00pm) gets at least 197mbps
The location of the user will be a factor also of the good performance
of the network. For, the distance and walls is one barrier that makes the
radio wave signal become weak. Therefore the researchers provide some
hotspots that have a high signaled area in the school (e.g. school ground,
Security Requirements
department for them to get the passphrase to the WLAN connection. The
The Wi-Fi Protected Access (WPA) is a feature of the router that is use so
that the assigned passphrase will not be easily encrypt by the Wi-Fi hackers.
researchers are only allowed to view the current settings, same as above the
During the operation of the WLAN, the storage mass (researchers use
availability of the documents that are being save in the desktop are always
accessible by the students. Note that even the storage mass is off still that
WLAN is on going.
In maintenance, the technician assigned will not be need long time for
maintaining the WLAN, for there is an installed Linksys Easy Link Advisor
(LELA). The LELA will help the technician to monitor who are currently
connected to the network, and by looking to the list of MAC address that are
registered to their office they can easily distinguish who will be prevent and
We can’t deny the fact that ITC department serves as one of the
maintains the computers in every office of the institution like the grade
can communicate and send documents to other offices however they must
currently connected to the network (wired). The current network of ITC was
using a static (not DHCP) IP addressing which means the IP address of each
connection to the domain. With this scenario the researcher gets an idea to
create a new network (wireless network) that will eliminate this kind of
member of the domain group. With the proposed project of the group, it
allows the students to inter-act to the network wirelessly provided they have
a laptop. With the said proposed project, student will be benefited more on
the way that they must know how to maximize the said network.
students, the lessen the time they read it. Unlike if the lectures are in the
network, they will not worry anymore the bringing of their notes and they
can focus to their study in the classroom. That’s why this project study are
that may happen to this proposed new network. We all know that in our
current time many students of Pasig Catholic College have a well verse
knowledge in computer technology, were in they can hack and destruct files
of the others, this security issue are very common in all network using a
wireless connection. Enable to avoid this risk the researcher of this project
wireless network.
Possible stakeholders can use this network provided they ask must follow the
rules and guidelines set by the ITC and the researcher upon using the
wireless network.
For this project, the uses of network devices and its location are the
router.
The position of device (router) inside the school vicinity, it must be located
to the center part the building to be able to distribute the signal evenly.
An open area can create much more radio frequency compare to the inside
of building.
With this researched, the proponent’s aims to work out the following purpose
• Upload the important files that needed by the student in their study
and can be easily access. Just like CCNA modules for computer related
courses.
process, still error and malfunction will almost be part of the network upon
• Ask assistance to the ITC technical staff for they have a more
• Refer to the users manual which created by the researcher and look
• Check the personal devices; somehow it is the wrong way of using the
• To avoid destructive files like viruses, the personal device must consist
This project study aims to benefit PCC community (PCC Community include
beneficiaries that will benefits this project study are the following:
Limitation
its main purpose in this institution is to only connect users through a one
network, were in each user can benefit in different ways; and “not” to
The final set-up of the network will be the last phase of this project
after its testing, and the in-charge department (ITC) will maintain the said
network.
The following are the possible user that may use this wireless network
(WLAN), teachers, NTP and students can be classified as the direct users for
they are the one who will access this network. And the
Indirect user is the technical support that assigned to maintain the wireless
because their only rule is to monitor and maintain the said network.
TEACHERS / FACULTY:
allow their students to study in advance. Teachers can also leave assignment
and sit work to their students by uploading it to the network, that even she’s
STUDENTS:
Students can also study in advance to their subject. Students may eliminate
the bulkiness of paper in their bags. For computer related course, especially
in Cisco subject; they can browse their modules anywhere in the school
For non-teaching personnel, they may download files which they are
needed even without going to ITC, provided file was uploaded and being
shared.
technology and academic (study) are the main concern of the researchers.
Improving the study habit of students that even outside the classroom they
can browse their lesson without any documents (include the hard-copy of
The technician are the one who maintain the wireless network, they
may allow or prevent the none registered MAC address on their office.
The subject System Analysis and Design and Project Management which is
instructed by Mrs. Wilma de Pano serves as our directives upon creating this
researched study.
the project that we were developing. Below are the simple explanations on
proving if the said project is worth to be developed. Stated here also the
In this stage data flow diagram and other process modeling are
created. But in our case since we are not developing a system, we come-up
The entity relationship diagram (ERD) for the system being developed
data flow diagram, system diagram and primitive diagram are being created
matrix.
forms, queries, reports and others. But we think we will not do it in our
project.
dialogue that will help users get to the on-line outputs and inputs of the
project, but in our case will set-upping a network that will serve as our
project protocol.
All of the document that will be created will be based on the following
application stated above. Creating a milestones and section are all word
based application while constructing a Gantt chart and WBS were both be
done in Microsoft project. Although there are application that can support
activity. But in simulation process only a Packet Tracer can support that
activity.
Time
By the period given used for the conceptualization of the said project,
it will take at least one whole semester before its testing and possible
completion, the promoter of this project is continuously seeking the best and
easiest possible means to realize this attempt in the soonest possible time.
Still, it is assumed, for fairness sake, that the prototype will be finished in 6
months or less
Methodology
There are many preparation and tools which are needed in this project
study; the group has planned to use different kinds of methods upon
we will be using are business case, problem statement matrix and WBS.
Since this project study is not a system we will not be using any diagram like
the data flow diagram, context diagram and class diagram otherwise we will
use an architectural design by the use of Microsoft Visio for our project study
and a Packet Tracer 4.11 for our simulation purposes. We will be using also
milestone monitoring.
Restrictions:
Before the first execution of this project study, the said network must
It is clearly stated that the main role of the students in this project
was to view and download only files from the network. Any other actions
that they may do are not allowed by the in-charge department. For teacher,
system. Other employee (NTP) can access also directly to the network to
the other hand they are registered on the ITC department. Password is also
Upon connecting to the internet wirelessly, the user’s wi-fi device will
ask a password in order to join the web, if the user’s device is not yet
registered to the ITC office he cannot access the network, otherwise he/she
must go to the office to register his device and ask the login password. The
security protocol of the device was configured on its system by the used of
WPA2( personal + AES and fill out '1234567890abc'). With this kind of
process only registered laptop can only connect to network and at the same
System Architecture
3.1 Hardware
In this proposed network , all the system hardware that will be use in this
project are very relevance to the group, for it is the main requirements of
our project to be able to create a new network. With the following hardware
stated below, we believe that this project study will be possible and may be
WIRELESS ROUTER
consider. For it will serves as an access point in an area was in all data
Model : WRT54G2
MAC Filtering
simple
demonstration basis for it also reach almost 3/4 of the required specification
which wireless router N have. But the project group highly recommends to
the ITC department to use a wireless router N technology for it has a high
The Access Point built into the Router uses a dual-band version of the
overlaying the signals of multiple radios for each band, Wireless-N's "Multiple
In, Multiple Out" (MIMO) technology multiplies the effective data rate. Unlike
reflections, MIMO actually uses these reflections to increase the range and
reduce "dead spots" in the wireless coverage area. The robust signals travel
Wireless-G.
get. It works great with standard Wireless-G, -A, and -B equipment, but
when both ends of the wireless link are Wireless-N, the router can increase
the throughput even more by using twice as much radio band, yielding
speeds much faster than standard Wireless-G. But unlike other speed-
mode for Wireless-N devices, while still connecting to other wireless devices
mode ensures that the Router checks for other wireless devices in the area
Since the Router can operate in both the 2.4 and 5 gigahertz radio
set up your network to handle video streaming on one radio band, and use
To help protect your data and privacy, the Router can encode all wireless transmissions
with industrial-strength 256-bit encryption. It can serve as your network's DHCP Server, has a
powerful SPI firewall to protect your PCs against intruders and most known Internet attacks, and
supports VPN pass-through. Configuration is a snap with the web browser-based configuration
utility.
standard for design, expanded bandwidth, and robust performance. It's the
ideal router for all your current and future digital entertainment needs.
and easy way to setup, view, manage, and repair your network - it's like
having a Linksys expert in your home helping you to get the most out of
your home network! Install it, set it up, and let it work for you! Linksys
will alert you to new devices, potential problems, security breaches and
updates. If a problem occurs LELA steps in with a wizard to guide you and
But in this project the researcher designed a server based PC in this wireless
network for it will serve as the fileserver or storage of all documents that the
teachers may uploaded. This PC will be also used in configuring the router in
the network.
• 1 GB memory
to access and use the proposed network. Laptop must be a Wi-Fi ready.
And even the laptop is not a Wi-Fi ready it can be also use by means of
PDA, cell phone, MP3/4 and even desktop as long as it can detect wireless
signals.
USB Wi-Fi
user.
PRINTER SERVER
Since the ITC has this device the researches plan to connect it to their
team.
Server PC
PDA
Cell Phone
Figure 6
Proposed System
cable (straight through cable), and the devices (laptop, PDA and cell phone)
in order to lessen and/or avoid the malicious hacker that will try to hack the
network.
3.3 Software
MS OFFICE
Basically this is the first software that we will be using by the group
enable us to create our document plan our schedule and designing our
PACKET TRACER
systems. The said software is so powerful we can create real time checking
of what will happen if a packet is sent from one end to another. By using this
we can simulate the design and decide on which scenario or setup is best for
our system.
Figure 1.2 shows the actual set-up of the project inside the vicinity of
WRGT54G wireless router G), definitely building consist of 2 access point are
the area were in frequently visited by the students like library, canteen and
classroom that are use by the students in their study, earlier before the
researcher stated that downloading of files are the main role of students in
all the area with Wi-Fi signals the researcher plan to allocate an access point
The four routers that was mentioned above are located in the three-
faculty room of the school ; the college, high school, and grade school
faculty office respectively and the other one is put on the ITC office. This are
the places choose by the researchers because of the result that they gather
from their survey that shows the number of the students visiting the library
especially high school and college, and to the computer laboratory in fourth
floor.
Notice that even though the researcher set-up their wireless router on the
ITC and on the college faculty office still the researcher mentioned that
between the college faculty and ITC, therefore Wi-Fi signals can be feel on
that area.
most of the teachers are downloading files and document in the internet that
they uses for their topic discussion, therefore they need not to go to ITC just
Wi-Fi
internet firewall
All Wi-Fi users that want to connect to the wireless network must
have the network connectivity provision to the ITC department in order them
to browse and access the internet and share files to their co-
the said department; by doing this, they may undergo concise orientation on
how to use the said facility (wireless network) properly and beneficially to
their part. They will be given also the rules and regulation of using Wi-Fi that
Authentication
their media access control (MAC) address on the time that the user
registered their device to the department. By means of this process they can
1. Teachers that already registered their laptop to the ITC office are
4.4 Installation
project will be decided to implement by the department head. But for a while
the researcher already installed 1 access point located inside the ITC
department. The said access point where place near the window in order to
broadcast high signal to the ground. Actually, with the experiment done by
the researcher the accounting department can detect Wi-Fi signals outside
their office that result them to freely access to the internet sometimes.
how far its signal reaches (thick walls and ceiling can affect the performance
of its signal) so that you can mark the area which has a strong and weak Wi-
Fi signal (hotspot are). You must also identify who are the users that will use
For example, the researchers set that the main role of the students is
to download files which their teachers uploaded and they can browse the
internet in addition. While the teacher are allowed to upload document and
4.5 Maintenance
optimally can be challenging. Luckily, the researchers and ITC technician can
Just like, enabling the media access control address filtering or MAC
make a simple database which will be use for storing the media
network.
Illustration 2: LELA
4.6 Overview
dominant use for teaching that will be call school of the 21st
century.
whole PCC community and ads to the 1st class facility of the
to enroll in PCC. PCC will become a Wi-Fi campus just like other
4.7 Recommendation
the other hand the school will get a profit to this facility and
router). With this idea the researchers believes that the return of
CHAPTER 5
Access Point of
Grade Faculty
(ISP)
IP Link
Access Point of
High Faculty
Access Point of
College Faculty
Switch from MDF
Router
located ITC office
Linksys WRT54G2
Inside the ITC office Server PC
`
Avira Anti-Virus
Diagram 1: Schematic Diagram of Proposed Network
The diagram shows how the wireless LAN is being set-up inside the
school premise. In the schematic diagram shown above, the ISP will give a
four wireless routers through the switch. The public IP will be used as the
static IP address of each router to enable the internet, but the configuration
of the router to network the Wi-Fi devices will be using a dynamic host
Each access point (AC) has corresponding users to avoid traffic in the
network, for example: AC point of Grade School – only teachers and non
router, provided that they have a network connectivity provision. And same
to other access point, its label is equivalent to those who are allowed to
access on that device. On the other hand AC located inside the ITC which
label wrt54g2 is the access point allocated for students, it has a server pc
that will be used as the storage medium in order to save the files and
documents that the teacher wants to upload, and later downloaded by the
students.
Access Point
To ISP
Wi-Fi Device
Wi-Fi Device
Wi-Fi Device
The diagram show how the Wi-Fi devices connect to the WLAN, once
the wireless router has been configure and you have the network
The table shows the signal receives by the device (laptop) to the
different area of the school. Wall and flooring affects the signal more, radio
Note that the size thickness of the flooring is approximately 2 feet while the
building
Open Canteen
Diagram 3: Set-up of the wireless router located at the second floor (high school faculty) of the Msgr. Sunga
As of now are there is no testing done in this area for there are some
factors to be considered. But the real position of this router in the building
are located outside the high school faculty room. The researcher decides to
put it there in order to broadcast signal to the near offices just CCF, EVP and
Diagram4: Set-up of the wireless router located at the ground floor of the Fr. Urbano building.
Clinic
Grade School Access Point
Grade School Faculty
department and the Wireless LAN users will be aware on which parts of the
school have the high radio frequency signal (hot spot) and which place
cannot receive signal (dead spot). Signal receive by the device will differ on
its location, just like when the user are inside the classroom and there is no
opening they will receive less of signal compare to those who are in the open
Statistics shown are base on the actual measuring of the distance and
RF signal that are being receive by the laptop used by the researchers. Note
that the wireless router that is being used in this phase was the Linksys
WRT54G2 Wireless Router-G and NOT the proposed router which the
department will decide to used WRT610N Router, the data on the table will
network is what you will do to that network, will you browse the Internet,
download files or upload lectures. You must have a direct plan when using
the WLAN because always remembers that the bandwidth that our school
paid to the ISP was being wasted if you don’t know how to use it sensibly
that sometimes causes traffic to the network. Anyone who wants to use this
facility must have a wireless laptop and the network connectivity provision
from the ITC, this two requirements are only way to make use of this
project.
User must find the wireless LAN symbol on his/her laptop (lower-right
part of the screen, near the system clock), once you find it right click and
select scan for WLANs, your device will pop-up a message box display all
connect, but basically in this project the researchers set a WLAN for each
user (student, faculty of different department). After you decided where you
want to connect another message box will appear that requiring you to put
the network security key or the passphrase for you to completely join the
and every month this key are being replace by the technician who maintains
the said network for security reason. After you have inputted all necessary
requisite you are now connected to the WLAN. You can now browse the
internet and download your lectures at your steady place (as long as you can
lectures which their teacher uploaded” but the question is how to do that.
want to access, for example our server pc has a computer name of itc19.
But before typing the computer name don’t forget the double back slash (
// ) .
After doing that wait for 10-20 second to partially connect to the computer
that you are accessing, once there is a dialog box that asking for username
and password supply it, basically that username and password of the
computer that you are accessing are the one you need to input to the dialog
wireless) you can now download the files that your needed.
to serve as our server pc. The picture shown above is the actual screen shot
The folders above are shared files of the itc19; each folder contains
part student can easily copy this file and save it to his desktop. Always
remember that this shared files are allow only for student to copy or
download it. Student cannot add any files to this computer unless they will
go the ITC and request for uploading files. No one also are allowed to delete
this files, even they try to delete files it will not work for there is a security
To access the web-based utility, launch the web browser on your computer,
and enter the Router’s default IP address, 192.168.1.1, in the Address field.
users will see a similar screen.) Leave the User name field blank. The first
time you open the Web-based utility, use the default password admin. (You
The first screen that appears is the Basic Setup screen. This allows you
In this page you can change the default setting of your router and assign
unique password and service set identifier (SSID) for your router.
The basic settings for wireless networking are set on this screen.
manual and Wi-Fi Protected Setup. Wi-Fi Protected Setup is a feature that
makes it easy to set up your wireless network. If you have client devices,
such as wireless adapters, that support Wi-Fi Protected Setup, then you can
keyboard). Make sure this setting is the same for all points in your
wireless network. For added security, you should change the default
process, still error and malfunction will almost be part of the network upon
• Ask assistance to the ITC technical staff for they have a more
• Refer to the users manual which created by the researcher and look
• Check the personal devices; somehow it is the wrong way of using the
• To avoid destructive files like viruses, the personal device must consist
Solution: Follow these instructions until your computer can connect to the
Internet:
• Make sure that the Router is powered on. The Power LED should be
• If the Power LED is flashing, then power off all of your network devices,
2. Router
3. Computer
of the ports numbered 1-4 on the Router, and the modem must be
Solution:
• Check if you correctly type the computer name of the pc you want to
access.
• Verify your connection status, are sure that you are connecting to the
right WLAN.
Solution:
• Check USB Wi-Fi maybe its loosen (for non Wi-Fi ready laptop)
including distance from the access point, volume of network traffic, building