...display to Apex what they can do to bring their company to enjoy the modern conveniences of a wireless network. This deployment plan will cover Team B’s recommendations based off of the site survey provided by Apex. We will discuss our recommended wireless network type. The access point layout and how these points will be managed. We will go over the foreseen obstacles and what our plan is to overcome these obstacles. Finally, we will go over the security policy that should be implemented to keep Apex as secure with our wireless network as they are with their current wired network. IEEE Network Type Apex Designs has asked our company to design a wireless network for their business. This network will consist of several different pieces of hardware that all will work together to meet Apex’s needs. To ensure that the new network is operational, special considerations must be made as to which IEEE network standard to be used. Since Apex Designs is a business that has a preexisting network installed, the new network must be compatible with the legacy systems already in use. Failure to meet this requirement would cause major interruptions in work flow, thus hindering our joint goal of enhancing Apex Designs productivity. Our proposed network will also allow current and future technology connectivity. In order to meet these requirements, the use of dual band access points will be installed at strategic locations to allow maximum coverage. The access points will use the 802.11ac...
Words: 1940 - Pages: 8
...The Athletes Shack Wireless Upgrade Proposal | | | Proposal with recommendations for installing a wireless network to the existing wire LAN. | | | 6/17/2012 | | Executive Summary 3 Site Survey 4 WLAN Security 5 Beta Testing 7 Equipment 8 Budget 12 Conclusion 12 Bibliography 14 Appendix A: TECHNICAL TERMS 15 Executive Summary The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized that their success depends on exceptional customer service and efficiency on the floors of the store. To take the next step the company is looking to go wireless and use that technology to separate themselves from other sporting good chains. To continue to have an edge over Foot Locker, Champs Sports and other Athletes Shack feel this is a necessary step. Once the WLAN is installed in each of the 10 locations this will allow remote log in via the internet and VPN connection. The expectation is to have a major improvement on customer service. Added technological benefits to sales associates while on the floor will include real time sales pricing quotes, inventory product availability and to check the company website. In store operations will see additional business value through addition of...
Words: 2939 - Pages: 12
...IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 54, NO. 12, DECEMBER 2006 3755 A New Compact Microstrip-Fed Dual-Band Coplanar Antenna for WLAN Applications Rohith K. Raj, Manoj Joseph, C. K. Aanandan, K. Vasudevan, Senior Member, IEEE, and P. Mohanan, Senior Member, IEEE Abstract—A novel compact microstrip fed dual-band coplanar antenna for wireless local area network is presented. The antenna comprises of a rectangular center strip and two lateral strips miprinted on a dielectric substrate and excited using a 50 crostrip transmission line. The antenna generates two separate resonant modes to cover 2.4/5.2/5.8 GHz WLAN bands. Lower resonant mode of the antenna has an impedance bandwidth (2:1 VSWR) of 330 MHz (2190–2520 MHz), which easily covers the required bandwidth of the 2.4 GHz WLAN, and the upper resonant mode has a bandwidth of 1.23 GHz (4849–6070 MHz), covering 5.2/5.8 GHz WLAN bands. The proposed antenna occupy an area of 217 mm2 when printed on FR4 substrate . A rigorous experimental study has been conducted to confirm the characteristics of the antenna. Design equations for the proposed antenna are also developed. ( = 4 7) Index Terms—Coplanar waveguide, dual-band antennas, printed antennas, wireless local area networks (WLANs). I. INTRODUCTION IRELESS LOCAL area networks (WLAN) are being widely recognized as a viable, cost effective and high speed data connectivity solution, enabling user mobility. The rapid developments in WLAN technologies...
Words: 5288 - Pages: 22
...Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers IEEE Computer Society .- Sponsored by the Microprocessor and Microcomputer Standards Committee h Published by the Institute of Electrical and Electronics Engineers, Inc., 345East 4Tth Street, New York, N y lwlz USA. lEEE December 2, 1994 SH 1 7335 Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. THIS PAGE WAS BLANK IN THE ORIGINAL Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers Sponsor Microprocessor and Microcomputer Standards Committee of the IEEE Computer Society Approved March 30, 1994 IEEE Standards Board Approved September 2, 1994 American National Standards Institute Abstract: A signaling method for asynchronous, fully interlocked, bidirectional parallel communications between hosts and printers or other peripherals is defined. A format for a peripheral identification string and a method of returning this string to the host outside of the bidirectionaldata stream is also specified...
Words: 34986 - Pages: 140
...IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000 535 Performance Analysis of the IEEE 802.11 Distributed Coordination Function Giuseppe Bianchi Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, in this paper we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol. Index Terms—802.11, collision avoidance, CSMA, performance evaluation. I. INTRODUCTION N recent years, much interest has been involved in the design of wireless networks for local area communication [1], [2]. Study group 802.11 was formed under IEEE Project 802 to recommend an international standard for Wireless Local...
Words: 8526 - Pages: 35
...wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive attacks are possible and have been heavily publicized, especially in the IEEE 802.11b area. As far as base technology is concerned, wireless security appears to be following the usual “penetrate and path” route. Early wireless security focused almost exclusively on cryptography...
Words: 6431 - Pages: 26
...Research IEEE Group The IEEE 802.1 Working Group is sanctioned to fret about and improve principles and proposed follows in the accompanying territories: 802 LAN/MAN structural planning, internetworking around 802 MANs, LANs, and other wide range networks, 802 by and large network administration, 802 Security, and convention layers above the layers of LLC & MAC. The 802.1 working assembly have four animated assignment aggregations: Interworking, Security, Time Sensitive Networking and Data Center Bridging. IEEE 802.1 handles the building design, security, Metropolitan Area Networks, Wide Area Networks and Local Area Networks, institutionalized by IEEE 802. Following are the key tasks of IEEE 802.1: • Outlines and executes models that manage network administration practices • Furnishes administrations, incorporating LAN/MAN administration, media access control (MAC) connecting, information encryption/encoding and network movement administration (Hiertz, Denteneer, et al. 2010) IEEE 802.1 is contained four assemblies that keep tabs on distinctive guidelines and arrangements in the accompanying zones: • Audio/video (A/V) bridging • Internetworking • Security • Data center bridging The Internetworking assembly handles generally structural planning, connection conglomeration, convention tending to, network way identification/calculation and other specialized practices and suggestions. Need of the IEEE 802 Standard IEEE 802 alludes to a group of IEEE standards managing...
Words: 1026 - Pages: 5
...The Evolution of Wi-Fi Charles Williams Albert Acuna ISSC340 American Military University Abstract From the creation of the IEEE standard in 1997 to current times Wi-Fi has evolved dramatically over the years. An idea to provide connectivity to devices with the absence of cables was adopted globally. Each year brings about new ways of utilizing wireless technology. This study aims to cover Wi-Fi from inception to present day and prospects for the future. The Evolution of Wi-Fi What exactly is Wi-Fi? A popular misconception is that Wi-Fi stands for “wireless fidelity”, however, it can be described as, a technology that uses radio waves to provide internet and network connectivity. The Wi-Fi Alliance, a non-profit organization founded by six companies in 1999, defines Wi-Fi simply as “connectivity”, connectivity in a way that provides freedom and the ability to move about without being tethered by cables, or stuck at a workstation. Wi-Fi symbolizes the ability to transfer data from one source to the next via a wireless link. Any product that houses the radio technology 802.11, a standard that has received widespread adoption, is considered a wireless device. The standard was developed in 1997. Fathers of Wi-Fi With any popular invention or supposed novel idea controversy seems to always linger in the background. When we think of the printing press we think of Johannes Gutenberg, however roots of printing with movable type can be traced back 350 years before...
Words: 3375 - Pages: 14
...The following information supplements the information in the Dell Wireless WLAN Card User Guide. May 2008 Manual Addenda Dell Wireless 1397 WLAN Half Mini Card Power Characteristics Current draw, Power Save mode: 24 mA (average) Current draw, Receive mode: 153 mA (average) Current draw, Transmit mode: 230 mA (average) Power Supply: 3.3 v ----------------------------------------------------------- Dell Wireless 1510 WLAN Half Mini Card Power Characteristics Current draw, Power Save mode: 21.6 mA (average) Current draw, Receive mode: 480 mA (average) Current draw, Transmit mode: 522 mA (average) Power Supply: 3.3 v ----------------------------------------------------------- Draft IEEE 802.11n Interoperability Dell Wireless 1500, 1505 and 1510 cards are 802.11n Draft 2.0 certified. At the time of product release, these cards were validated through testing to work with the following 802.11n wireless routers/APs: · Netgear WNR834B FW 1.0.1.4 and later · Netgear WNR350N FW1.0 and later · Linksys WRT300N FW 0.93.3 and later · Buffalo WZR-G300N FW 1.43 and later · BelkinF5D8231-4 NOTE: • Regardless of the make of wireless router/AP, wireless clients should always be able to connect to the wireless router/AP at legacy link speeds. You should check with the wireless router/AP vendor for AP firmware and client software updates. ----------------------------------------------------------------------- Tray Icon Display "By default, the tray icon is disabled...
Words: 1404 - Pages: 6
...Kudler’s Intranet Our goal in this project is to. * Design a WAN to tie all three KFF locations together. Make the internal network configuration in each store a WLAN, and add VOIP to the multi-store network. * Define which store will house the central servers. * Design the network to be expandable beyond the existing stores. The current specifics of the setup is as follows. La Jolla Store : 100baseT environment, IBM Blade System C3000 running UNIX, Corporate SAP ERP SW, 10 TB NAS Backup, 5KVA APD UPS for power backup, Retail Operations entail NCR RealPOS 82XRT POS Terminals, Management 19 Dell Vostro Computers and 3 HP networked Printers. 2 Cisco routers and firewalls, Inter-store Network, 25 mb Ethernet. 19 VOIP Phones Del Mar/Encinitas Store : 100baseT environment, IBM Blade System C3000 running UNIX, 10 TB NAS Backup, 5KVA APD UPS for power backup, Retail Operations entail NCR RealPOS 82XRT POS Terminals, Management 6 Dell Vostro Computers and 1 HP Laserjet Printers. 2 Cisco routers and firewalls, Inter-store Network, 25 mb Ethernet. 6 VOIP phones per store. La Jolla Diagram : Del Mar, Encinitas Stores (same set up) I find no current issues with the hardware, although I do believe software can be a small issue. The corporate SAP ERP SW software, should be available to the management at the other three stores as well. The standards that would apply to this system and the next system will of course be IEEE 802x depending on if the company has...
Words: 376 - Pages: 2
...communicate with the network through a radio path vice a cable. The device that contains the radio and connects to the wired network is called the “Access Point”. Each client that communicates with the access point must have a wireless PCMCIA card. Once both devices communicate via radio transmission, network access can begin. Each client is configured to communicate with a single access point. A client can move from one access point to another. Roaming from access point to access point (cell to cell), similar to cellular telephone technology, is possible. Technology Discussion There are three wireless technology standards on the market today: Bluetooth, 802.11b, and 802.11a. A new standard, 802.11g, was recently approved by IEEE and products using this technology are expected to be released later this year (3Q). Bluetooth was the first wireless technology to the market. It operates at a frequency of 2.4 GHz (ISM band) using the Frequency Hopping Spread Spectrum (FHSS) modulation method. Bluetooth can transmit data at 700 Kbps at a range of 300 feet indoors. It was primarily intended for “device-to-device” communication as opposed to wireless networking,...
Words: 1089 - Pages: 5
...One of the first items to clear up about this topic is when talking about wireless communications we are just not talking about wireless computers networks. Wireless communications also covers wireless phone networks as well as our wireless computer networks. While writing this paper I will try to keep it on just the wireless computer networks, but you will have to keep in mind that this all was started with the telephone and branched out toward computers and other handheld devices. Me like everyone else probably had never really look at wireless as a very vast network which started in 1876 when the phone was invented by Alexander Graham. In 1877, Charles Williams of Somerville Ma had the first private telephone was installed in the home. Four years later over 47,850 telephones were in use in the U.S. (Fowler, 2009). This was the start of the evolution of Wi-Fi, Guglielmo Marconi, an Italian inventor took it a step closer nine years later, and he proved the feasibility of radio communications by sending and receiving the first radio signal. Then in 1869, the first wireless signal across the English Channel was flasher by Marconi. (Fowler, 2009) This should not be confused with the Birth of Telecommunication as some people have linked Telecommunication with wireless communications as John M Shea, an associate Professor of electrical and Computer Engineering from the University of Florida did in an article were he stated in “The History of Wireless Communications” that...
Words: 3062 - Pages: 13
...System Architecture 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. * System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? * Before selecting a system architecture, the analyst must consider the following issues: * Enterprise resource planning (ERP) * Initial cost and (TCO) * Scalability * Web integration * Legacy system interface requirements * Processing options * Security issues 3. What is enterprise resource planning (ERP) and why is it important? What is supply chain management? * Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in-house software and commercial...
Words: 1431 - Pages: 6
...Practical WLAN security Abstract This report covers the basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today that...
Words: 4798 - Pages: 20
...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...
Words: 18928 - Pages: 76