Escolar Documentos
Profissional Documentos
Cultura Documentos
Group
1
WIRELESS NETWORKING
SETUP AND CONFIGURATIONS
2
Wireless Networking
Setup and hree configurations
Configurations
Overview
of WLAN’s
ad-hoc network
Two types
Infrastructure network
The Media Access Control Layer Standards or (MAC)
Performs several vital functions in a WLAN.
These functions can be broken into four distinct classifications:
The mechanics of how these functions are performed center around the frames that are
sent and received in a WLAN.
4
Discovering the WLAN
Part 1
he first major function of the MAC layer involves defining procedures for a wireless
device to discover the WLAN.
When a wireless device is powered on or roams into an area of wireless coverage it
must find or discover the access point or other wireless devices.
This discovery is a twofold process: the AP or other wireless devices must transmit an
appropriate frame, and the wireless device must be looking for those frames.
Beaconing
At regular intervals the AP in an infrastructure network or wireless device in an ad hoc
network sends a beacon frame both to announce its presence and to provide the
necessary information for other devices to join the network. This process is known as
beaconing.
Discovering the WLAN
Part 2
6
Advantages Disadvantages
Advantages Disadvantages
14
Independent Service Set
15
Advantages Disadvantages
It may be recommended that D-Link switches and wireless access points as an alternative
to other expensive solutions.
The D-Link solution offers lower initial buy-in
Better overall performance
Ease of management that lowers total cost of ownership over the long run.
By using D-Link DWL-3200 model and Access Points in numerous strategic locations
throughout the high school campus.
The APs connect to the main wired network
Which features D-Link DES-1526 24-port POE switches.
In total, you can deploy 10 access points and four switches, effectively blanketing an
approximate area of 200,000 square foot of heavy concrete building ( for which most
schools are constructed of) with seamless and centrally managed wireless coverage.
The school manages everything centrally via Active Directory with RADIUS
authentication.
The system would feature Wi-Fi Protected Access security with Temporal Key Integrity
Protocol which makes it easier to deploy RADIUS authentication.
All users are managed through Active Directory, and the switches are all managed through
a simple, easy-to use Web utility.