How to organize wi-fi in the office. Wi-Fi networks. Organization and construction. How we built our WiFi network

This review will present products used to build Wi-Fi networks based on thin access points. This option for deploying corporate and operator networks is based on the protocol CAPWAP (Control And Provisioning of Wireless Access Points Protocol, control and provisioning protocol for wireless access points), developed by the IETF. The idea of ​​this approach is quite trivial - to divide the wireless network into two layers, the control layer and the connection layer.
Control level implemented based on specialized AC access controllers (Access Controller), includes all the functionality of a wireless network. This includes access control with authentication and authorization of users, generation and storage of encryption keys, roaming of subscribers and their switching to less loaded access points, optimization of the use of radio channels and much more.
The connection level is organized based on the use of fairly simple and cheap WTP (Wireless Termination Point) access points, whose tasks are reduced to supporting data encryption in the radio channel and interacting with the access controller using the CAPWAP protocol. Typically, wired lines are used to connect thin access points. A solution based on Ethernet networks with PoE technologies for powering access points has become quite common.
This option for building a wireless network has its undeniable advantages. Firstly, reducing costs when deploying a network covering a large area or having a large number of access points. Despite the fairly high price of the access controller, the savings on the cost of access points are significant. Secondly, reducing operating costs by centralizing management of the entire network. This allows you to automate routine processes for updating software and settings of all access points. Thirdly, a high level of network security is ensured. Thin access points do not store confidential information, the loss of which could affect the security of the network as a whole. It is also much easier to organize the management of security policies for different categories of subscribers and the access points themselves.
However, wireless networks based on thin access points have their own disadvantages. The biggest problem may be a failure of the access controller. Moreover, this is not only a failure of the equipment itself, but also a loss of connectivity with it for all or part of the access points. Therefore, it is necessary to provide controller redundancy in the network, which in turn affects the cost of the project.

Building a wireless network

As already noted, the solution using “thin” access points is most often used to create large-scale wireless networks. Let's consider the option of building a W-Fi network with dozens and hundreds of hot spots.

The figure shows a network that is hardly worth recommending for practical implementation, but it quite allows us to describe the principles of operation of this approach.
As can be seen from the figure, the wireless network is an overlay network, which allows significant savings on the deployment of the underlying infrastructure. To connect access points, an access network built using any technology can be used. After all, a “thin” access point can be considered as a regular network device with its own IP address. By and large, connecting access points can occur using a public global network. This connection option is not efficient, but can be useful for quickly deploying a temporary hotspot.
The core of a wireless network is the wireless access controller, the performance and characteristics of which determine the overall performance of the network. The RADIUS server provides solutions to issues of user identification and authorization, as well as, if necessary, interface with the billing system.
When a subscriber establishes a connection with an access point within the range of which he is located, the decision to provide services is made by the central office controller. To do this, using the DHCP protocol, the terminal device is assigned a temporary IP address and the subscriber is able to enter his credentials. This data goes to the RADIUS server, which determines the available resources, rights and authority of this user. Based on this data, the access controller allocates the necessary resources to the established connection and monitors its status.
This operating algorithm increases the volume of service network traffic, but at present, with the high throughput of access lines, this drawback is hardly worth taking into account when planning a network.

Wireless network equipment manufacturers and their products

Not all wireless solution providers have in their catalog products related to the subject of this review. To a certain extent, this is due to the need to create specialized access controllers, which not every manufacturer can do. Therefore, the review will focus on controllers that are available on the domestic market.

One of the most reputable companies providing wireless network solutions is Aruba Networks. Its portfolio includes seven controller models aimed at use in networks of various sizes. Senior model Aruba 6000 Multi-Service Controller refers to carrier-grade equipment and can manage the operation of more than 8 thousand access points, while serving over 32 thousand users simultaneously. This model includes VPN and firewall functions with performance of 32 and 80 Gbit/s, respectively. The series also belongs to the category of multiservice controllers Aruba 3000, which includes three models that differ in the number of managed access points, subscribers served, and VPN and firewall performance. These models are more suitable for creating corporate wireless networks. For very small networks, in which it is expected to install from 6 to 48 access points, we can recommend models Aruba 2400, Aruba 800 and Aruba 200. All Aruba controller models are designed to support mobile VoIP communications. This is provided by the Call Admission Control, RF management and QoS functions.
To connect access points, Aruba recommends using one of three dedicated access concentrator models, which are designed to securely transport traffic over an IP network using tunnel technologies. Concentrator models differ in throughput performance.
The manufacturer offers a wide selection of access points to work in conjunction with any of the controllers. Among these access points, it is worth noting four models AP-120, AP-121, AP-124 and AP-125, which support MIMO (Multiply Input Multiply Output) technology and, according to the vendor, provide radio connection speeds of up to 300 Mbit/s. These and all other Aruba access point models can operate in the 2.4 GHz and 5 GHz bands. For outdoor use, the manufacturer recommends three models - AP-85TX, AP-85FX and AP-85LX. To connect the first model, a 10/100Base-T interface with PoE technology is used. The other two models connect to the network using optical interfaces and can be carried over distances of up to 2 and 10 km, respectively.

Bluesocket Company, founded in 1999, specializes in developing solutions for wireless networks and offers a wide range of products for their construction. Including in the company’s product catalog you can find a line of six models of scalable wireless network controllers BlueSecure (BlueSecureController - BSC). All these models have the same capabilities for managing access points and ensuring network security. The models differ from each other only in performance. The junior model BlueSecure 600 supports up to 8 access points and is capable of providing simultaneous operation for 64 users. The older model BlueSecure 7200 can be the basis for building a large-scale wireless network with about 300 access points and 8 thousand simultaneously working clients. All BlueSecure models have built-in firewall functionality and intrusion and malware detection through real-time monitoring. The manufacturer also notes the presence of proprietary Secure Mobility roaming technology in the controllers, which allows users not to interrupt their sessions while moving between access points, even if they temporarily leave the radio zone. The controllers support the connection of access points through the routing layer, which simplifies the use of the Internet as an access network.
According to the manufacturer, its controllers can work with access points from most well-known vendors, but to provide access to a full set of network monitoring and management functions, it is recommended to use BlueSocket access points. There are currently three access point models available BlueSecure Access Point, supporting 802.11 a/b/g standards. Models with index 1500 and 1540 each have two built-in omnidirectional antennas, the second model can also use external antennas.
The access point with index 1800 is made in full compliance with the 802.11n draft 2.0 standard and supports MIMO technology. This access point has two radio interfaces with a built-in antenna array, the ability to connect external antennas, and a Gigabit Ethernet port with PoE technology. All access points can operate with 802.11e technology to prioritize multimedia traffic on a wireless network.

Brocade Company, one of the leading providers of data center solutions, acquired well well-known network equipment manufacturer Foundry Networks. Among the products of this company are devices for building wireless networks, which will be offered on the Russian market under the Brocade brand.
The equipment set for creating a “thin” wireless network includes four types of controllers, differing in the number of supported access points and performance. If the youngest model MC500 can serve up to five points, then the senior model of this family MC5000 capable of working with 1000 “thin” access points. As the latter, the company offers two models AP208 and AP201, differing in the number of subbands. The equipment supports technology for automatically setting radio zones.
According to the vendor, a solution based on this equipment is capable of serving up to 100 active users per access point. In addition, this equipment is designed to support telephone communications using VoIP technology. Thanks to developed QoS mechanisms, it is possible to support up to 30 simultaneous voice communication channels on each access point. The controllers also provide roaming of voice calls between points without delay and packet loss. The solution is able to automatically detect VoIP protocols (SIP, H.323, Cisco SCCP, SpectraLink SVP and Vocera), adjusting the prioritization mechanisms to them.
The MC5000 controller additionally has firewall functionality, providing more than 10 thousand simultaneous sessions in this mode.

Cisco Corporation offers a wide range of solutions for building wireless networks. The company's approach, which is called Unified Wireless solution. In accordance with this concept, the network is built on the basis of four components: access points, aggregation network, control network and mobile services.
Access points are segmented based on the tasks they solve and the implementation option. The company provides models for placement inside heated rooms, for example, Cisco AP 1140G, 1130G, 521G, and unheated rooms, for example, Cisco AP 1240G, 1252AG, as well as street performance, for example, Cisco AP 1310, 1410. Cisco access points can operate either in control mode from a central controller or independently as a thick client. This option undoubtedly increases the cost of the solution, but can significantly increase the reliability of the wireless network.
The aggregation network is represented by wireless access controllers, which provide centralized security policies, quality of service, and also provide tools for managing radio resources and ensuring mobility. For centralized management of access points and transmission of data traffic, the proprietary LWAPP (Lightweight Access Point Protocol) protocol is used. Cisco's portfolio includes a large number of controller models that can serve from 1-2 to 300 access points. For example, Cisco 2106, which supports from 6 to 25 access points, and Cisco WiSM (module for Catalyst 6500 and Cisco 7600), capable of managing up to 300 points.
To coordinate the operation of the controllers, a centralized control system WCS (Wireless Control System) is used. This software uses the SNMP protocol to receive and transmit management data to the controller. The provision of mobile services is carried out using the MSE (Mobility Services Engine) product, which allows determining the location and history of movements of mobile subscribers and “unauthorized” devices. This product has an interface for interacting with WCS and applications from third party application developers, and also supports the SNMP protocol.

Equipment line ProCurve from HP, includes controllers and access points to create a wireless network. Unlike other manufacturers, HP offers specialized modules installed in ProCurve network switches as WLAN controllers. For this purpose, two types of modules and two types of additional modules used for redundancy are available. Three models of radio ports can be used as access points.
Module Wireless Edge Services zl Provides centralized wireless network management, network security policy and a variety of network services. To reserve the operation of this module, use Redundant Wireless Services zl, which automatically takes over control of ProCurve radio ports in the event of Wireless Edge Services zl unavailability or failure.
Module Wireless Edge Services xl focuses on the integration of WLAN management systems and role-based user service policies to deploy and centrally manage a multi-service network. To reserve the operation of this module, use Redundant Wireless Services xl.
ProCurve 210, 220 and 230 radio ports differ in their operating ranges and design.

NETGEAR Company offers a solution for building a wireless network for small and medium enterprises. This solution includes full-featured ProSafe Smart WFS709TP controller, which can manage up to 16 access points and serve up to 256 subscribers. To increase the number of points, controllers can be combined according to a hierarchical principle, providing a maximum of 48 access points. One of the distinctive features of the ProSafe Smart controller is the management of wireless coverage through automatic configuration of all radio channel parameters, including signal strength, load balancing and anti-aliasing.
This controller is also capable of providing delay-sensitive service with proper quality. First of all, this is voice communication using VoIP protocols. For ProSafe, Smart features Call Admission Control, voice-enabled fast roaming and QoS management.
To work with the controller, the manufacturer offers two models of access points - WAGL102 and WGL102. The first of them is capable of operating in the frequency ranges of 2.4 GHz and 5 GHz using the 802.11g and 802.11a protocols. Another model is focused on working according to the 802.11g standard in the 2.4 GHz band.

Solution Ruckus Wireless is more aimed at small and medium-sized businesses, in which standard network applications are in demand and there is no particular need for complex and non-standard settings for the operation of a wireless network. To work with equipment from this manufacturer, you do not need to be an expert in the field of WiFi and information technology.
The core of the Ruckus Wireless solution is ZoneDirector 1000 wireless network controller, which is capable of managing 25 ZoneFlex access points and supporting up to 1,250 concurrent users. Among the advantages of the controller, the manufacturer notes a simplified configuration system based on a web interface, as well as developed security and management tools.
As an access point, the vendor offers multimedia model ZoneFlex 7942, which is based on the 802.11n standard with support for MIMO technology. The most important part of this access point is a software-controlled antenna array consisting of six vertically polarized and six horizontally polarized high-gain antenna elements. It uses proprietary BeamFlex technology, which provides high performance, extended coverage and support for multimedia traffic transmission thanks to automatic adaptation of radio beams. This technology eliminates the process of setting up the radio zone of an access point, which requires high qualifications.

Trapeze Networks Company is considered one of the leaders in solutions for organizing wireless networks. For this, the company offers platform called Trapeze Smart Mobile. This platform includes five models of WLAN controllers and four types of access points.
The family of controllers is represented by models serving from four ( wireless network controller MXR-2) up to 512 access points ( wireless network controller MX-2800). All controllers have similar functionality, including support for advanced user identification capabilities, network security, support for VoIP protocols and QoS mechanisms. The controllers have a built-in ability to work with the IEEE 802.11n protocol, which replaces 802.11g and has noticeably better characteristics in terms of transmission speed and range. Automatic configuration of radio zones for each point and dynamic selection of operating frequencies are provided.
In addition to managing a wireless network, Trapeze controllers have advanced network capabilities, including a firewall and an intrusion and malware detection system. The manufacturer especially emphasizes the possibility of combining WLAN controllers into cluster and domain structures. A cluster can include up to 64 controllers and manage up to 10,240 subscribers. Clusters can also be combined into a so-called network domain, which can support the work of almost 33 thousand controllers.
To work in conjunction with controllers, the vendor offers three models of “thin” access points for placement indoors and one model for outdoors. Models MP-371, MP-422A and MP-620A are variants of 802.11 a/b/g access points operating in the 2.4 GHz and 5 GHz bands. Of greater interest is access point MP-432, which is designed in accordance with the requirements of the 802.11 n standard and fully supports MIMO technology. According to the manufacturer, the aggregate speed is 600 Mbit/s, which corresponds to the theoretical maximum for this standard.

As can be seen from this review, the solution for building a wireless network using “thin” access points is becoming very popular. All leading manufacturers offer their own options for building networks of various sizes.

WLAN controllers

Model WTP number Number of users Network interfaces Additional features
Aruba 6000 / Aruba Networks 8192 32768 up to 72 FE, up to 40 GE, up to 8 10GE Firewall, VPN, VoIP
BlueSecure 7200/Bluesocket 300 8000 4 G.E. Firewall, IPS
MC5000/Brocade 1000 up to 100 on WTP up to 4 GE Firewall, VoIP
Cisco WiSM/Cisco 300 10000 Depends on Catalyst 6500 or Cisco 7600 configuration
ProCurve Edge Services zl/HP 156 no data Depends on ProCurve switch configuration
ProSafe Smart WFS709TP / NETGEAR 16 256 8 FE, 1 GE VoIP
ZoneDirector 1000 / Ruckus Wireless 25 1250 2 F.E. Built-in authentication portal
MX-2800 / Trapeze Networks 512 no data 8 GE, 2 10GE VoIP

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://allbest.ru

INTRODUCTION

CHAPTER I. OVERVIEW OF WIRELESS ACCESS TECHNOLOGY Wi-Fi

1.1 Features of the development of wireless access technologies

1.2 Basic wireless network standards

1.3 Wi-Fi wireless network topologies

1.4 Wireless equipment used in Wi-Fi networks

CHAPTER II. STRUCTURAL AND ORGANIZATIONAL CHARACTERISTICS OF THE RESEARCH OBJECT

2.1 General characteristics of the enterprise

2.2 Structural diagram of the internship place

2.3 Study of enterprise local area networks

CHAPTER III. ORGANIZING A WIRELESS ACCESS NETWORK AT AN ENTERPRISE

3.1 Organizing a Wi-Fi network

3.2 Setting up a Wi-Fi network

3.3 Administration of WI-FI network

CONCLUSION

LIST OF REFERENCES USED

INTRODUCTION

The relevance of research. Wireless Internet access is currently becoming more and more popular. The need for wireless connections is growing very quickly all over the world, especially in the field of business and IT technology.

Users with wireless access to information can work even more productively and better than their colleagues tied to wired telephone and computer networks, since there is a dependence on a specific communications infrastructure.

At the present stage of development of network technologies, the development of wireless Wi-Fi networks is more convenient in conditions requiring mobility, ease of installation and use. Wi-Fi (from the English wireless fidelity - wireless association) is a broadband wireless communication standard of the 802.11 family, studied in 1997.

As a rule, Wi-Fi development is used to organize wireless local computer networks, as well as to organize so-called high-speed Internet access points.

Wireless networks have a number of advantages compared to traditional wired networks, the main of which, of course, is:

Ease of deployment;

Flexibility of the network architecture, when the probability of dynamic configuration of the network topology is guaranteed when mobile users connect, move and turn off without significant loss of time;

Speed ​​of design and implementation;

A wireless network does not require cabling (often requiring separation of walls).

At the same time, wireless networks at the present stage of their development are not without some shortcomings.

It must be said that this dependence of the connection speed and range of action on the presence of obstacles and on the distance between the receiver and transmitter.

One of the methods for increasing the range of a wireless network is to develop a distributed network based on several wireless access points.

When developing such networks, there is a possibility of transforming the created network into a single wireless zone and increasing the connection speed beyond the dependence on the number of walls (obstacles).

The problem of network scalability is solved in the same way, and the introduction of external directional antennas allows us to solve the problem of obstacles.

Subject of study of this work - theoretical aspects and issues of organizing and administering wireless networks in an organization.

Object of study- limited liability company "Amazon".

Purpose This work is to design a wireless access network at Amazon LLC in order to increase the level of informationization, provide modern communication services, and describe the process of administering the designed wireless network.

Based on this goal, we can formulate a number of interrelated tasks:

Consider the theoretical aspects of organizing Wi-Fi wireless networks in an organization;

Reveal the essence and give the concept of wireless computer networks;

Describe the organization where the wireless network is supposed to be organized;

Outline practical issues of organizing and administering wireless computer networks in an organization (using the example of Amazon LLC);

These tasks predetermined structure diploma work. It consists of an introduction, three chapters, a conclusion and a list of references.

CHAPTERI. OVERVIEW OF WIRELESS ACCESS TECHNOLOGY Wi-Fi

1.1 Features of the development of wireless access technologies

At the dawn of the development of radio technology, the term “wireless” was used to refer to radio communications in the broad sense of the word, i.e. in fact, in all cases when information was transmitted wirelessly.

Later, this interpretation almost fell out of use, and “wireless” began to be used as an equivalent to the term “radio” or “radio frequency” (RF - radio frequency).

At this point, the pair of representations are considered interchangeable in the case of a frequency range from 3 kHz to 300 GHz. However, the term “radio” is more often used to describe technologies that have long been available (radio broadcasting, satellite communications, radar, radiotelephone communications, etc.).

And the term “wireless” these days is usually used to refer to new radio communication technologies, such as microcellular and cellular telephony, paging, subscriber access, etc.

There are 3 types of wireless networks (Fig. 1.1): WWAN (Wireless Wide Area Network), WLAN (Wireless Local Area Network) and WPAN (Wireless Personal Area Network)

When building WLAN and WPAN networks, as well as broadband wireless access systems (BWA - Broadband Wireless Access), similar technologies are used.

The main difference between them (Fig. 1.2) is the spectrum of operating frequencies and the properties of the radio interface.

Figure 1.1 - Range of personal, local and global wireless networks

Figure 1.2 - Classification of wireless technologies

WLAN and WPAN networks operate in the unlicensed 2.4 and 5 GHz frequency spectrum, meaning their deployment does not require frequency planning and coordination with other radio networks operating in the same spectrum. BWA (Broadband Wireless Access) networks use both licensed and unlicensed spectrum (from 2 to 66 GHz).

Wireless local area networks WLAN. The main purpose of wireless local networks (WLANs) is to provide access to information resources inside a building. The second most significant area of ​​implementation is the organization of public commercial access points (hot spots) in crowded places - hotels, airports, cafes, as well as the organization of temporary networks for the period of events (exhibitions, seminars).

Wireless local networks are formed based on the IEEE 802.11 family of standards. These networks are also popular as Wi-Fi (Wireless Fidelity), and although the term Wi-Fi itself is not clearly defined in the standards, the Wi-Fi brand has received the most extensive distribution in the world.

In 1990, the IEEE 802 Standards Council (Institute of Electrical and Electronic Engineers) formed a working group on standards for 802.11 wireless LANs.

This group began developing a common standard for radio equipment and networks operating at the 2.4 GHz frequency with speeds of 1 and 2 Mbit/s. The standard creation effort was completed after 7 years, and the first 802.11 specification was ratified in June 1997.

The IEEE 802.11 standard has become the main standard for WLAN products from an independent international organization. But by the time the standard was published, the data transmission speed initially inherent in it turned out to be insufficient. This served as a prerequisite for the following improvements, so now we can talk about a group of standards.

1.2 Basic wireless network standards

Currently, 3 standards of the IEEE 802.11 group are widely used.

The IEEE 802.11g standard, generally accepted in 2003, is a logical development of the 802.11b standard and implies data transmission in the same frequency spectrum, but at the highest speeds.

Apart from this, the 802.11g standard is fully compatible with 802.11b, that is, any 802.11g device must support work with 802.11b devices. The highest data transfer speed in the 802.11g standard is 54 Mbit/s.

When developing the 802.11g standard, two competing technologies were considered: the orthogonal frequency division OFDM method, taken from the 802.11a standard and recommended for consideration by Intersil, and the binary packet convolutional encoding method PBCC, recommended by Texas Instruments.

As a result, the 802.11g standard covers a compromise conclusion: OFDM and CCK technologies are used as basic ones, and the optional implementation of PBCC technology is provided.

The IEEE 802.11a standard provides a data transfer rate of 54 Mbit/s. Unlike the basic standard, the 802.11a specifications provide for service in the new 5GHz frequency spectrum. Orthogonal frequency multiplexing (OFDM) was chosen as a signal modulation method, which ensures the highest communication survivability in the conditions of multipath signal propagation.

IEEE 802.11n standard. This standard was approved on September 11, 2009. 802.11n is comparable in transmission speed to wired standards. The highest transmission speed of the 802.11n standard is approximately 5 times higher than the productivity of classic Wi-Fi.

You can note the following main advantages of the 802.11n standard:

High data transfer speed (about 300 Mbit/s);

Uniform, stable, reliable and high-quality coverage of the station’s coverage area, the absence of uncovered areas;

Compatible with previous versions of the Wi-Fi standard.

Disadvantages:

Large consumption capacity;

Two operating spectrums (probable replacement of equipment);

Complicated and large-sized equipment.

An increase in transmission speed in the IEEE 802.11n standard is achieved, firstly, by doubling the channel width from 20 to 40 MHz, and secondly, by implementing MIMO technology.

The development of MIMO (Multiple Input Multiple Output) involves the use of multiple transmitting and receiving antennas. By analogy, traditional systems, that is, systems with one transmitting and one receiving antenna, are called SISO (Single Input Single Output).

Ways to improve performance. The data transfer speed depends on almost all reasons (Table 1. 3) and, above all, on the bandwidth. The wider it is, the greater the exchange speed. The second reason is the number of parallel threads. In the 802.11n standard, the largest number of channels is the same - 4. The type of modulation and encoding method in this case are given great importance. Noise-resistant codes, such as those traditionally used in networks, imply the introduction of some redundancy. If there are a lot of security bits, the transmission speed of useful information will decrease. In the 802.11n standard, the highest conventional encoding speed is up to 5/6, that is, for every 5 bits of data there is one extra bit. Table 3 shows the exchange rates for QAM and BPSK quadrature modulation.

Table 1.3 - Data transfer rate for different types of modulation

Consequently, with other similar parameters, QAM modulation guarantees even greater speed.

802.11n transmitters and receivers. The IEEE 802.11n standard allows the introduction of up to 4 antennas at the access point and wireless adapter. Mandatory mode involves two antennas at the access point and one antenna and wireless adapter. The IEEE 802.11n standard provides both regular 20 MHz and double-width channels.

The social structural technique of the transmitter is depicted in Figure 1. 5. The transmitted data passes through a scrambler, which inserts extra zeros or ones into the code (called pseudo-random rumble masking) to avoid long x sequences of similar characters. Later, the data is divided into N streams and sent to a specific error correction (FEC) encoder. For systems with one or two antennas, N = 1, and if 3 or 4 transmitting channels are used, then N = 2.

Figure 1.4 - General structure of a MIMO-OFDM transmitter

The encoded sequence is divided into separate spatial streams. The bits in each stream are interleaved (to eliminate block errors) and then modulated. Next, space-time streams are created, which pass through the inverse fast Fourier transform block and arrive at the antennas. The number of space-time streams is equal to the number of antennas. The design of the receiver is similar to the structure of the transmitter shown in Figure 1. 5. however, all actions are performed in the reverse order.

Figure 1.5 - General structure of a MIMO-OFD receiver

1.3 Wi-Fi wireless network topologies

Networks of the 802.11 standard have every chance of being built on any of the following topologies:

*Independent Basic Service Sets (IBSSs);

*Basic Service Sets (BSSs);

*Extended Service Sets (ESSs).

Independent Basic Service Areas (IBSS).

IBSS is a group of 11 stations operating in accordance with the 802 standard, communicating with each other. Figure 1.10 shows how stations equipped with 802.11 wireless network interface cards (NICs) can form an IBSS and communicate directly with each other.

Figure 1.6 - Ad-Hoc network (IBSS)

A dedicated network, or independent basic service area (IBSS), occurs when individual client devices form a self-sustaining network without the use of a separate access point (AP). When developing such networks, no maps of the location of their deployment and preparatory plans are developed, therefore they are traditionally small and have a limited extent sufficient to transmit the shared data when such a need arises.

Since IBSS does not have an access point, timing is performed non-centrally. The customer sets a control (beacon) interval to create a set of target beacon transmission time (TBTT). When the TTTT is completed, any IBSS customer does the following:

*Suspends all untriggered backoff timers from the previous TVTT;

*Describes the latest random delay;

Basic Service Areas (BSS). BSS is a group of 802 standard 11 stations communicating with each other. The development of BSS implies the presence of a special station, which is called an AP (Access Point).

The access point is the main point of communication for all BSS stations. Client stations do not communicate exactly one with another. Instead, they communicate with the access point, and it then directs the frames to the destination station. The access point may have an uplink port through which the BSS connects to a wired network (for example, an Ethernet uplink). Therefore, BSS is sometimes called BSS infrastructure. Figure 1.7 shows a typical BSS infrastructure.

Figure 1.7 - BSS local wireless network infrastructure

Extended Service Areas (ESS): A number of BSS infrastructures are likely to be interconnected via their uplink interfaces. Following where the 802.11 standard operates, the uplink interface integrates the BBS with the Distribution System (DS).

A number of BBSs connected to each other through a distribution system form an extended service area (ESS). The uplink to the distribution system is not necessarily required to use wire merging.

Figure 1.8 shows an example of a practical implementation of ESS. The specification of the 802.11 standard leaves the possibility of implementing this channel as a wireless one. However, more often the uplinks to the distribution system are wired Ethernet links.

Figure 1.8 - Extended service area of ​​ESS wireless network

1.4 Wireless equipment used in Wi-Fi networks

Nowadays, wireless networks make it possible to connect users wherever cable connection is difficult or where absolute portability is needed. At the same time, wireless networks interact without problems with wired networks.

Wi-Fi hotspots. All access points can be divided according to the connection method: via a USB port and an Ethernet connection port - RJ45. The latter are very successful because they are more basic to set up and manage, and also have a higher transmission speed to the local network.

Access points have every chance of being indoor (in door) and all-weather (out door). To create a wireless network indoors, use the indoor version of the device. They have the lowest price and, as a rule, a good aesthetic appearance.

Such access points operate within one or several rooms. In open areas of the territory (flat illusion), it is possible to work at a distance of 300 meters with the use of conventional omnidirectional antennas. All-weather access points are provided to create a radio network between buildings. Depending on the types of antennas, such devices are capable of creating communication channels at a distance of 3-5 km. The longest range of a wireless communication channel increases noticeably with the use of amplifiers. In this case, the length of the radio channel reaches 8-10 km. Access point type devices are shown in Figure 1.9.

Combined devices. Of great interest are wireless access points that combine the functions of other devices, for example, a high-speed wireless broadband router with an integrated Fast Ethernet switch. The router allows you to quickly and easily set up shared Internet access for a wired or wireless network or carry out the general implementation of a broadband communication channel and a cable/DSL modem at home or in the office.

Figure 1.9 - Types of access points: a, b - internal; c, d - external

Wi-Fi adapters. To connect to a Wi-Fi wireless network, it is enough to own a laptop or personal digital assistant (PDA) with an attached Wi-Fi adapter.

Any wireless Wi-Fi adapter must meet several needs:

1. comparability with standards is required;

2. work in the frequency spectrum 2.4 GHz - 2.435 GHz (or 5 GHz);

3. support WEP and better WPA protocols;

4. support 2 types of connections “point-to-point” and “computer server”;

5. Support roaming function.

There are 3 main variations of Wi-Fi adapters, recognized by connection type:

Connected to a computer's USB port. Such adapters are compact, easy to set up, and the USB interface guarantees a “hot plug” function;

Connected via PCMCIA connector (CardBus) of the computer. Such devices are placed inside a computer (laptop) and support various standards that allow you to send information at a speed of 108 Mbit/s;

Devices built into the computer motherboard are the most promising option. Such adapters are installed on Intel Centrino series laptops. And, currently used on the vast majority of mobile computers. All types of wireless adapters are presented in Figure 1.10.

CHAPTERII. STRUCTURAL AND ORGANIZATIONAL CHARACTERISTICS OF THE RESEARCH OBJECT

2.1 General characteristics of the enterprise

Amazonka LLC is an enterprise specializing in providing services in the field of telecommunications and electronic document management.

Amazon LLC was registered on May 11, 2005. The company is located at: 367000, Makhachkala, st. Irchi Kazaka, 31.

Main view activities is: "Activities in the field of telecommunications". The legal entity is also registered in such OKVED categories as: “Wholesale trade of radio and television equipment, technical media (with and without records)”, “Retail trade of technical media (with and without records)”. The position of the head of the company is general director.

Organizational and legal form (OPF) - limited liability companies.

Type of property - private property.

Amazon LLC works with reporting via the Internet to the Federal Tax Service, Pension Fund, Social Insurance Fund and Rosstat. The provision of services is possible in all regions of Russia without exception. A service that allows a system subscriber connected in one region to submit reports to inspectorates in other regions. Each user has the right to choose the region for reporting.

In addition to the above services for providing tax reporting via the Internet, the organization provides a wide range of additional services:

· preparation of reports to the Pension Fund of Russia

· video seminars, educational video seminars on taxation and accounting issues

Document specialist, documents for LLC registration

· certificates from the Federal Tax Service on the status of settlements with the budget, reconciliation reports, etc.

· certificates from the Pension Fund of the Russian Federation on the status of settlements for insurance premiums, penalties and fines

· verification of counterparties, protection from fly-by-night companies

· financial analysis, assessment of the likelihood of a tax audit

· correspondence with the Federal Tax Service, Pension Fund and Rosstat: explanatory notes, news.

Electronic reporting via the Internet, provided by Amazon LLC, is an electronic document management system via the Internet using cryptographic information protection tools.

In such document flow, according to the provisions of Russian legislation, intermediaries are always involved (between the taxpayer and government agencies). What electronic reporting via the Internet is is known, at least a little, to accountants and entrepreneurs. This is due to the fact that many businesses, according to the Tax Code, are simply required to use reports via the Internet and submit them to regulatory authorities.

For many years in a row, the state has complicated reporting issues so much that it was mainly accountants who delved into them. But this topic is also interesting for entrepreneurs, because electronic reporting via the Internet is, after all, the cost of “accounting”, and on the other hand, very often for small businesses it is much cheaper to generate and submit reports without contacting accountants , and accounting offices. This applies to enterprises (individual entrepreneurs, LLCs) that apply special tax regimes - simplified tax system, UTII, patent. The extremely complex and contradictory general taxation system leaves virtually no chance for an entrepreneur to understand it and constantly be aware of endless changes. Therefore, few entrepreneurs can do without an accountant.

Working with papers cannot be a choice in the Internet era, and you simply need to look for some program with which you could generate electronic reports. And it is formed on the basis of data from accounting. The best option, of course, is when electronic reporting is also submitted via the Internet. There are quite a lot of programs developed for entrepreneurs and accountants for keeping records. Some are needed for maintaining records electronically and generating electronic reports, others for sending reports via the Internet.

There are both free and paid programs that differ in features, convenience, support, etc. Technologies change each other, and now it is already possible to use the reporting program via the Internet from any laptop, computer, etc. that has access to the network, without installing anything. In fact, it’s like using online banking, only the level of protection is the highest possible (1G).

The choice of a company accounting program depends on many conditions: the taxation system (some businesses can operate without accounting, for example), the size of the company (many entrepreneurs have the opportunity to independently keep records and submit reports), etc., etc. Some people choose expensive and powerful solutions, and then spend their budgets on adaptation and updates, others look for free programs.

But all this is one side of the coin. Electronic reporting must be generated somewhere, or rather, through something, it must be sent to government agencies (tax authorities, etc.). And all of the programs listed are engaged in practically one thing - either generating or transmitting ready-made reports.

It just so happened that for many years entrepreneurs and accountants had to buy various programs, naturally taking a long time or not choosing very much, which solved individual problems. And finally, programs have appeared that for small (and, partly, medium) businesses solve and will solve most problems related to accounting and electronic reporting via the Internet. Moreover, both for the work of an entrepreneur, a staff accountant, and for accounting services. These programs have a number of completely new characteristics:

1) such a program does not need to be downloaded, installed, updated, implemented, the program is available via the Internet, it always contains the latest, up-to-date reporting forms, formulas for calculating taxes, contributions, etc.

2) the program (service) can keep records and generate any reports by pressing one key (can you feel how pleasant it will be to press this key)

3) the program (service) sends electronic reports via the Internet to all four regulatory authorities.

Submission of reports via the Internet can be carried out by a representative of the taxpayer. In this case, the enterprise itself no need to obtain a digital signature, buy licenses and enter into an agreement with a special operator. It is enough for him to issue a power of attorney to the representative, and the representative will take care of submitting reports via the Internet. Such reporting is signed by the signature of a representative who acts on the basis of a power of attorney.

The exchange takes place with special files of the established electronic report format (RFF). Which are signed not with the usual signature in our understanding, but with a digital signature. A digital signature is, one might say, a file with a certain set of characters. All documents signed electronically have the same legal significance as paper ones.

Reporting to the Federal Tax Service through the Amazon company involves several stages of document flow:

1. Submitting a report - the special operator generates confirmation of the dispatch date.

2. Receipt of the Federal Tax Service report - the tax office sends a notice of receipt of the report

3. Test protocol:

o Notification of refusal - the report was not accepted, errors should be corrected and the initial report should be re-sent

o Receipt of acceptance - the report is accepted, it is assigned a registration number and the report is considered submitted on the date - recorded in the confirmation of the date of dispatch

o Notification of clarification - the report requires correction - the report should be corrected and re-sent with the next correction number.

o Notification of entry - submission of reports to the tax office is completed

Tax document management usually takes up to two days. Thus, the submission of tax reports is considered completed on time if 2 conditions are met simultaneously:

· the date in the confirmation of the dispatch date is less than the deadline established by law for submitting reports

· a receipt has been received and a registration number has been assigned to the report.

Submitting tax reports via the Internet frees you from the need to duplicate and submit data on paper.

2.2 Structural diagram of the internship place

The organizational structure of Amazonka LLC TCMS-15 can be classified as built according to a linear-functional scheme using elements of a matrix structure. This is shown in Fig. 2.1.

To analyze the effectiveness of the organizational management structure of an organization, you need to give a brief description of all its constituent units.

Director of the organization: organizes all the work of the company and is responsible for its position and activity to the state and Amazon LLC. The director represents the company in all institutions and organizations, manages the company's property, concludes contracts, issues decrees for the company,, in accordance with labor legislation, accepts and dismisses employees, uses approval measures and imposes penalties on company employees, opens bank accounts for the company, conducts work for the operational management of the organization, is engaged in planning, coordinating the work of all departments and services of the organization, makes decisions on the current activities of the organization.

The chief engineer (who is also the chief deputy director of the organization) oversees the following issues: the operation of rows, the work of TUSM (technical units of union highways), occupational health and safety at the enterprise, patent and invention work, issues of metrology (compliance with standards).

Deputy Director of General Affairs. Subordinate to him: the logistics department and the work of the chief mechanic, which includes: the motor transport workshop.

Chief accountant: resolves accounting issues, is responsible, together with the director, for the accuracy of the data provided to the tax office and accounting department of Amazon LLC.

The chief economist manages the work of planning and economic stimulation in the company, increasing labor productivity, identifying and using production reserves, improving the organization of production, labor and wages, etc. Subordinate to him is the economic department, which develops annual and quarterly plans for the organization and individual technical management, controls their implementation, describes ways to eliminate shortcomings, organizes and improves in-plant and intra-shop planning, develops standards for the formation of economic incentive funds, maintains operational statistics, analyzes the performance characteristics of main units, workshops, develops and submits projects for proposal, explores and introduces avant-garde experiment in organization of planning and economic work, etc.

Also subordinate directly to the director are: the security department, the human resources department, and marketing work.

Based on a study of the organizational structure of Amazon LLC, the following conclusion can be drawn: the organizational structure is designed ineffectively, since it does not fully meet the goals and reasons on which the successful activity of the company depends.

Firstly, in the organization Amazonka LLC -15, the marketing department is not endowed with sufficient capabilities and resources to implement the programs planned by the parent company, its hierarchical importance is small, the number of the department is 3 people.

Secondly, according to the existing organizational structure, the rule of “controllability norms” is not observed, since, for example, the director of the organization, as follows from the application, has 10 people in his own personal management, the main engineer (the second person in the organization) - 12, which This is completely unacceptable at such the highest level of management, where the standard of control is the same for a maximum of 7 people.

In the analytical part, the following prerequisites for designing and improving the organizational structure of the organization’s management were identified:

Poor performance of the company.

Main control overload. The Amazon LLC branch manages to operate satisfactorily only at the cost of unnecessary, grueling overload on several high-ranking managers. The director of the organization has 3 people in his own personal management, the chief engineer - 2;

Disagreements on organizational issues. The existing structure creates obstacles to effective work, makes it difficult to achieve the goals of certain departments or divisions, and does not accurately reflect the meaning of some multifunctional roles.

Increasing the contrast of services offered. Amazon LLC plans to operate in several new markets: creating a multimedia communication network, selling electrical products.

The whole process of designing and improving the organizational structure consists of three large stages:

1) creation of a general structural diagram of the management apparatus;

2) development of the composition of the main divisions and connections between them;

3) regulation of the organizational structure.

The creation of a general structural diagram in all options is of fundamental importance, since this determines the key properties of the organization, as well as the directions along which the most in-depth design of the organizational structure must be carried out.

The fundamental features of the organizational structure that are determined at this stage include the goals of the production and economic system and the difficulties to be solved; general specification of multifunctional and software-targeted subsystems that ensure their acquisition; number of levels in the control system; the degree of centralization and decentralization of capabilities and responsibilities at various levels; the main forms of relationship between the provided organization and the surrounding environment; requests to the economic mechanism, forms of information processing, staffing of the organizational system.

According to the charter, the main goal of Amazon LLC is to meet the needs of the population, the national economy, the protection of the Russian Federation and other consumers in the transmission of information through long-distance and international electronic communications, radio broadcasting and television, as well as the acquisition of profit.

The author believes that the goals set for the organization can be achieved within the framework of a linear-functional organizational management structure with the introduction of parts of the matrix structure. For their actual implementation, it is necessary to distinguish between the following main multifunctional blocks: the marketing department, the operation department, the financial department, the department for major repairs and capital construction, and the personnel department.

Amazon LLC is going to continue to expand the range of services it provides to provide new ones, in particular large commercial organizations, which account for a significant portion of earnings and in the struggle for which Amazon LLC faces stiffer competition. In particular, Amazon LLC plans to increase the amount of added value services provided, including fax data transmission, paging, e-mail, multimedia services, Internet access, and IP telephony. R

Thus, the marketing department must have the highest status and capabilities, must be an autonomous structural unit of the organization and obey the deputy director of the organization for marketing. For the effective work of the marketing department, it is necessary to determine the department’s place in the overall organizational structure and develop the department’s relationships with other departments of the organization. The designed structure of enterprise management exceeds the existing one in the following aspects: compliance of the organizational structure with the goals of the organization; speed of decision making; adaptability of the organizational structure.

The structural methodology of Amazon LLC is presented in Figure 2.1.

Figure 2.1. - Block diagram of Amazon LLC

2.3 Study of enterprise local area networks

A local area network (LAN) is a network whose components - computers, terminals, communications equipment - are located at a relatively small distance from each other (10 km).

A local network is traditionally intended for the collection, transmission, dispersed and distributed processing of information within one laboratory, department, office or company, and is often practiced to perform certain functions according to the profile of the company and its individual subsections. In almost all cases, a LAN serving its local information system is intertwined with other computer networks, internal or external, up to regional or global networks.

The main purpose of any computer network is to provide information and computing resources to users connected to it.

The connection between the LAN and the Internet can be done through a host computer, such as a web server or a gateway server (often called a proxy server) - a workstation that has special software for working on the Internet, for example the EasyProxy program, WinProxy, WinGate.

Local computer networks can be systematized according to a number of characteristics (Fig. 2.2.).

There is a parallel classification of computer networks, in which local networks are defined somewhat differently: a local network is a computer network that serves the needs of one company.

Local workgroup networks at Amazon LLC traditionally connect a number of PCs that operate under the same operating environment. A number of computers often have special servers designed to perform the functions of a file server, print server, or fax server

Figure 2.2. - Classification of local area networks

Among such computer networks are:

By management level: Departmental local networks are used by a small group of company employees who work in one subsection (HR department, accounting department, marketing department, etc.). Such a network can have up to hundreds of computers. Most often, it has a number of dedicated servers dedicated to resources such as application programs, databases, laser printers, modems, etc. These networks, as a rule, use one network technology and one or two operating systems. Geographically, they are most often located in the same building.

Campus networks got their name from the word campus - student village. The main purpose is to connect several small networks into one. Campus networks have the potential to cover significant areas and connect many disparate networks. Their main purpose is to ensure interaction between networks of departments and work groups and create access to company databases and other precious network resources. wireless local computing

Collective networks are networks of the scale of only a company, a company. They can cover vast territories. Due to the high cost of private dedicated communications and poor protection from unauthorized access of switched communication channels, they most often use the communication capabilities of the Internet, and therefore the territorial location does not play a role for such networks.

According to their purpose, LANs can be divided into:

Computing, performing mostly computational work;

Information and computing, not counting settlement operations, carrying out

Information, primarily providing information services to users (creation and special execution of documents, delivery to the user of directive, current, reference and other relevant information);

Information retrieval is a type of information that is practiced in searching for information in network storages on a network topic suitable for the user;

Information managers, processing current technical and technological information and producing the resulting information, on the basis of which actions are automatically taken on the managed system, etc.

Based on the number of computers connected to the network, networks can be divided into small ones, connecting 10-15 machines each, medium ones - 50 machines each, and large ones - over 50 machines. Amazon LLC has a large computer network.

According to the territorial location, LANs are divided into densely located (all computers are located in one room) and distributed (computers on the network are located in different rooms).

Based on bandwidth, LANs are classified into:

LAN with low bandwidth (data transfer speeds within 10 megabits per second), most often using narrow coaxial cable or twisted pair as communication channels;

LAN with average throughput (data transfer rates - several 10 megabits per second), most often used as communication channels by coaxial cable or shielded twisted pair;

LAN with enormous bandwidth (data transmission speeds amount to hundreds and even thousands of megabits per second), mostly used as communication channels via fiber-optic cables.

According to the topology, LANs are divided into bus, loop, radial, mesh, hierarchical and mixed.

According to the types of computers that are used, they can be distinguished between similar and heterogeneous. Homogeneous LANs use the same types of computers, the same operating systems and the same composition of subscriber facilities. In homogeneous networks it is much easier to create many distributed information procedures.

According to the organization of management, LANs are divided into: LANs with centralized management; LAN with decentralized control.

In a LAN, the most important thing for the user is 2 structural and functional links: workstations and servers. Not all LANs have dedicated servers; in some cases, the server functions appear to be distributed among network workstations.

In networks without centralized management (peer-to-peer networks), there is no single center for managing the interaction of workstations and there is a lack of a single device for storing data. Network management functions are transferred from one station to another. The network operating system is distributed across all workstations. Any network station can act as both a buyer and a server.

Pros of peer-to-peer networks: low price; the highest inviolability.

Disadvantages of peer-to-peer networks: the likelihood of including a small number of workstations (no more than 10); complexity of network management; difficulties in updating and configuring station software; complexity of providing information security.

In networks with centralized control (two-rank or server networks), one of the computers (server) implements procedures intended for use by all workstations, manages the interaction of workstations and performs a whole range of service functions. Amazon LLC has organized exactly this kind of network.

CHAPTER III. ORGANIZING A WIRELESS ACCESS NETWORK AT AN ENTERPRISE

3.1 Organizing a Wi-Fi network

The project “Wireless Wi-Fi access at Amazon LLC” is based on equipment using the 802.11n standard that has received a Wi-Fi certificate. Wi-Fi covers the entire office area and brings all users into a single network with Internet access. The network is implemented by wireless unified access points installed throughout the main office, controlled by a wireless switch.

ASUS RT-N12 is a next-generation unified wireless access point that complies with the IEEE 802.11n standard. Easy to manage and massive, the provided access point is specialized for deploying networks in stand-alone wireless access point mode or in managed access point mode, which is managed when connected to a wireless switch.

Companies have every chance to start working by organizing a network with the support of one intelligent ASUS RT-N12 access point, which provides a range of advanced LAN functions, and then at any time switch to a centralized management system after connecting a similar ASUS RT-N12 access point to a unified wired/ wireless switch.

The 802.11n standard increases bandwidth by 6 times more than 802.11a/g networks. The ASUS RT-N12 access point is backward compatible with 802.1a/b/g devices and allows 2x2:2* configuration in both Tx/Rx directions. The development of Multiple In Multiple Out (MIMO) and channels with increased capacity increase the physical data transfer rate when using the 802.11n standard. MIMO guarantees the simultaneous transmission of multiple signals, supporting multiple antennas instead of just one. The introduction of ASUS RT-N12 at the company prepares the platform for the future generation of wireless devices and mobile applications.

ASUS RT-N12 supports APSD (Automatic Power Storage Mode) function on schedule and off schedule. Unscheduled APSD (U-APSD) is the most efficient way to control feeding compared to the Power Save Polling 802. 11. The main advantage of U-APSD is the ability to synchronize the transmission and reception of voice frames with the access point, thus adapting can switch to energy storage mode when no packets are being sent or received. ASUS RT-N12 is fully compatible with 802.3af standard devices even in high power consumption mode. Unlike the 802.11n access point of other manufacturers, which require PoE or 802.3at when operating at both frequencies, ASUS RT-N12 guarantees the constant assistance of ASUS energy-saving technology

ASUS RT-N12 switches automatically configure each connected ASUS RT-N12 access point, so no configuration is required during installation. When replacing ASUS RT-N12, the access point is automatically configured with the same parameters as the previous device, which significantly simplifies the replacement process.

ASUS RT-N12 supports a set of integrated features that allow administrators to implement a secure network and connect to any switch and router compatible with Ethernet devices. Advanced wireless networking features supported by the access point include: WEP data encryption, WPA/WPA2 security, MAC address filtering, inter-access point load balancing, QoS/WMM (Wireless Media) and rogue access point detection. ASUS RT-N12 supports the ability to save security options locally. You can increase wireless inclusions by attaching several ASUS RT-N12 access points to other access points using the 802.11a/g/n standard. Thanks to the AP Clustering function, you can connect 8 access points for easy management and options for all access points. Companies that do not require a complex network infrastructure have every chance to use the ASUS RT-N12 to install a wireless network without additional hardware.

As an alternative, the ASUS RT-N12 can operate in conjunction with a unified wired/wireless switch. In the provided mode, a number of ASUS RT-N12 access points have every chance of being connected directly or indirectly to one of these switches to provide the highest level of security and wireless mobility. When connected to these switches, any ASUS RT-N12 access point automatically adjusts to the best RF channel and transmitter output capacitance, providing wireless customers with the best signal quality in both the 2.4GHz and 5GHz bands, providing continuous wireless merging.

ASUS RT-N12 guarantees the highest wireless connection speed for any frequency range. By simultaneously operating in two frequency spectrums, you can create two networks that use the full bandwidth of the wireless channel, which will increase the overall productivity of the wireless network. In addition, ASUS RT-N12 remains fully backward compatible with 802.11b equipment operating at 2.4 GHz.

Most of the available LAN network controllers perform centralized traffic processing, which from time to time causes unnecessary delay. ASUS RT-N12 access point - when connected to an ASUS RT-N12 switch - provides administrators with a range of additional functions. Depending on the wireless application, wireless traffic may be routed back to the switch for overall security purposes or forwarded locally to the access point for good performance.

This series access point provides administrators with the greatest management flexibility, with options to redirect guest traffic to the switch for centralized security management and redirect VoIP traffic directly to the access point for good performance. Most importantly, ASUS RT-N12 supports AP Clustering and Wireless Distribution System (WDS) functions. The WDS feature allows the access point to operate in wireless bridge mode, connecting two different networks without the need for a cable.

ASUS RT-N12 continuously scans both frequency spectrums and their associated channels to detect unauthorized inclusions, while providing fusion for mobile shoppers. If an unauthorized activation is detected, the access point sends a report to the DWS-4026 switch, which manages it.

Using the management console, an administrator can identify an unauthorized access point and take appropriate action. ASUS RT-N12 supports features such as 64/128/152-bit WEP data encryption, WPA/WPA2 and Multiple SSID for any RF channel.

When connected to a DWS-4026 switch, these functions, along with MAC address filtering and SSID broadcast prohibition, can be used to enhance security features and restrict access to the internal network from outside. ASUS RT-N12 supports 802.1Q VLAN Tagging and WMM (Wi-Fi Multimedia) for data transfer of applications such as VoIP and audio/video streaming.

3.2 SetupWi-Finetworks

Setting up Wi-Fi networks with an access point (Infrastructure)

Setting up such a network should begin with setting up an access point. The setup procedure and the configurable characteristics themselves are similar for most access points. Virtually all access points have at least one connector for connecting to a wired network. To set up an access point, you must first turn it on with a network cable to your laptop or PC. Setting up most access points is done through the WEB interface (that is, through a browser).

We turn on the access point with cable support to the PC. To set up the connection you need to do the following.

Any wired network comes with cables and Ethernet networks are no exception. Therefore, discussion of connecting to Ethernet networks must begin with cables. Coaxial cable was initially used as a cable in Ethernet networks in two varieties: “thin” and “thick”

At the moment, twisted pair cable has replaced coaxial cable. We will configure Wi-Fi networks at Amazon LLC using a twisted pair cable. It guarantees speeds from 10 Mbit/s to 1000 Mbit/s. The main advantage is the support of full duplex mode, when data can be transmitted in two directions at once. There are several categories of such cables: CAT-3 (at the moment practically not used), CAT-5, CAT-5E (using speeds of 1000 Mbit/s), CAT-6, etc. The differences boil down mainly to the largest bandwidth. CAT-5E cables are more common and cheaper. Ethernet development involves 2 main types of cables:

...

Similar documents

    The principle of operation of wireless networks and devices, their vulnerabilities and main threats. Wireless network information protection tools; WEP, WPA and WPA-PSK modes. Setting up network security when using intrusion detection systems using Kismet as an example.

    course work, added 12/28/2017

    General concepts about wireless local networks, study of their characteristics and basic classifications. Application of wireless communication lines. Benefits of wireless communications. Ranges of the electromagnetic spectrum, propagation of electromagnetic waves.

    course work, added 06/18/2014

    General concepts and basic aspects of building wireless local networks, features of their structure, interface and access points. Description of the IEEE 802.11 and HyperLAN/2 standard protocol for access control to the transmission medium. Key goals of the Wi-Fi Alliance.

    course work, added 11/29/2011

    Introduction to modern digital telecommunication systems. Operating principles of wireless subscriber radio access networks. Features of IEEE 802.11 access control. Analysis of electromagnetic compatibility of a group of wireless local networks.

    thesis, added 06/15/2011

    Organization of an access network based on fiber-optic transmission technology. Installation of computer networks. Configuring Active Directory Rights Management Services. Working with network protocols. Setting up a wireless connection. Physical network topology.

    practice report, added 01/18/2015

    Analysis of the wireless data transmission standard. Ensuring communication security, the main characteristics of vulnerabilities in the IEEE 802.16 standard. Options for building local computer networks. Types of implementations and interactions of WiMAX and Wi-Fi technologies.

    course work, added 12/13/2011

    History of creation, principle of operation of Bluetooth. Advantages of Wi-Fi technology, types of connections. Construction of a wireless access network with the installation of an access point and wireless Wi-Fi adapters. Equipment setup and performance check.

    thesis, added 04/29/2014

    Research and analysis of wireless data networks. Wireless communication technology wi-fi. Bluetooth near field communication technology. Wireless network throughput. Algorithms for alternative routing in wireless networks.

    course work, added 01/19/2015

    Characteristics of typical network topologies. Composition of communication lines and types of computer networks. Principle and standards of Ethernet technology. MAC address structure and Open Systems Interconnection (OSI) model. The composition of network equipment and the routing process.

    practice report, added 05/23/2015

    Basic capabilities of local computer networks. Internet needs. Analysis of existing LAN technologies. Logical design of LAN. Selection of equipment and network software. Calculation of costs for creating a network. Network performance and security.

Nobody thought that over the past 20 years a computer with Internet access would appear in every home (in civilized countries). So are wireless network standards. 802.11x, which were previously considered something expensive and complicated, can now be found in almost every home, albeit “secret”, because officially the use WiFi(I will call it the entire range of standards 802.11x) is prohibited without appropriate permission.

Actually, WiFi intended for wireless connection of two or more computers within one room, maximum - one apartment or office. However, these are the same radio signals that, as we know, can be directed, amplified or carried through a cable. Then the scope of application of the technology can be somewhat expanded: entire buildings and even neighborhoods can be connected to each other. But we are faced with two problems: technical and economic.

Technical problem: wavelength occupied by most standards WiFi, is in the 2.4 GHz range, and at such high values ​​it becomes extremely difficult to “drive” the signal into the wire. Due to the high frequency of the signal, the transmitters must certainly be in the line of sight, or at most separated by a weak partition such as tree foliage, but not by the wall of the house. And the transmitter power is still too small for such distances, and I have not seen any available devices for signal amplification on the open market.

The economic problem is that existing devices for amplifying and distributing radio signals are incredibly expensive, but a wireless network must provide the main condition - to be cheaper than wired technologies. Why then is it needed at all, since for that kind of money you can already install an “overhead” network cable line? Let me give you an example: the cost of an antenna for distribution Wi-Fi radio waves- $200, cost of 50m cable Belden H1000 with branded tips - $60... Only one thing is good: straight hands and knowledge of physics can reduce these costs by more than 10 times! That is, you can spend no more than $10 on the entire network (not including Wi-Fi adapters)!

Formulation of the problem

Wireless networks have created a lot of opportunities to connect computers in the most accessible (or cheapest) way, the wired connection of which would be too expensive. So my friend and I were faced with a similar task - to connect the “incompatible”.

It would seem that even for existing standards WiFi the task is very difficult: you need to connect computers in apartments located on opposite sides of two houses, even if they are located nearby (at a distance of 100m) from each other. What kind of direct visibility is there? Here is an example diagram:

The action plan is:


Antenna

In general, any new idea is a little adventurous and always runs into someone’s “don’ts,” “idiocy,” and so on, there will definitely be an “article” where everything planned is crossed out by a categorical statement from a cool “specialist,” and at the bottom we can most often see links to a small online store with such, you know, “ridiculous” prices...
There are many types of antennas for WiFi networks: omnidirectional, parabolic, canned, biquad, point-directional. The most affordable and simple ones are can antennas and biquads. They can be easily directed (that is, concentrate the entire signal in a certain direction), easy to manufacture (it’s not for nothing that I mentioned tin and coffee cans), they are not bulky (but lightness and inconspicuousness are important). But for our network we chose the can type - it is more compact than a biquad and has a fairly narrow radiation pattern (just right for a point-to-point connection). After all, it’s not for nothing that he’s all GSM works. You can, of course, use a dish with the transmitter in focus, or build an unsurpassed efficiency divided by price, FA-20.

Making a can antenna involves using certain laws of wave theory. In short: the signal in the bank is maximum at the first quarter of the sine wave, and this is where we must place a waveguide of a certain length in order to read it or even amplify it.

We used a diet food antenna and my friend used a 125 cup Nescafe can. Their characteristics turned out to be close to ideal. Therefore, if you can’t find a jar of the right size at home, grab a ruler and go to the supermarket.

During manufacturing, another concern arises - lightning protection. You need to make sure that there is a lightning rod nearby and that the antenna does not stick out at the highest place. Don't forget about it! Plus, don’t forget about waterproofing, especially if the antenna is located in a location that is not very accessible.

Connector

In Western sources we come across a requirement to use a special high-frequency connector for wireless networks of this type. But it is expensive and difficult to buy, so it was decided to make do with the most ordinary ones that were still available in radio stores. This is what the kit looks like:

We solder our waveguide to the central conductor, which, in theory, should crimp the wire. The most time-consuming part is to solder the wire to the mating (outer) end, because there is no other way except to climb inside the connector. The easiest way is to form a loop from the end and drop a little tin to melt the solder inside the connector.

The wire

The wires should ideally have a characteristic impedance of 50 ohms and as little attenuation as possible. But I already mentioned the price of such wires, but we needed no less than 50 meters of cable - a third of the distance from computer to computer, and a cheap cable like RG-58 introduced very strong attenuation. Therefore, I had to use a workaround - a cheaper 75 ohm cable. The fact is that at high frequencies the mismatch losses (I refer to information from one of the forums) are small - about 10%. The main role here is played by attenuation per meter. Therefore the cable was chosen RG-6U. And the characteristics are like those of an expensive 50-ohm, and the price is divine - only $0.2 per meter.

Wi-Fi adapter

At the time of buying WiFi adapter, you need to remember the following: in principle, the characteristics of the offered assortment are most often the same, so you don’t need to be guided by the thought that “this one has a decibel more power, so I’ll take it.”

But the presence of an external connector and an external antenna in the delivery package is mandatory. No, of course, you can also buy an adapter with a small antenna directly next to the connector, but believe me: you’ll have a hard time soldering! The only exception may be the presence of the so-called. “pigtail” - an adapter from an RP-SMA connector to a connector for an external antenna ( N-Type).

However, the price of such a piece of wire is from $10, coupled with the glassy look of the manager. Therefore, this method is only suitable if you have this same wiring and high-quality high-frequency connectors.

In our opinion, we chose the company's adapter as the most suitable Edimax. The company's model for PCI just one - EW-7128G.

Antenna mount

An important part of good signal reception is high-quality mounting. Here everyone gets out of it in their own way, but I will give my mounting option, although I don’t consider it the most successful (at least be prepared to re-adjust your antenna after 2 days of network operation).

An aluminum plate is attached along the can from the 3.5″ compartment of the case ATX. As a rule, holes are already made at the factory in the places we need, and all we have to do is carefully drill the can in the center. The can is attached to the outer holes, and to the central hole, the fastening itself is secured with a self-tapping screw to the end of any beam (I used an old baseboard).

Calculation

Sound calculation is an important detail of success, using which you will be able to resist all the “machinations of imperialism” in the form of small commercial “articles”.

So we have:

Of course, my data is very approximate, but it gives a clear picture that even in such “terrible” conditions, the network’s functionality will be ensured. Plus, we must not forget that a can antenna concentrates the signal in one direction, which means more useful power will reach the recipient.

Installation

The next stage is aiming. The best way here is experimentation, but it doesn’t hurt to calculate the range of angles. We have a standard geometric problem.

The tilt of the antenna on the roof will also be slightly more than 4 degrees, and good mounting strength must be ensured.

Test run
Before the first launch of a new network, I would like to calculate all the costs of its creation.

There remains the very last step, for which, in fact, everything was started - the ceremonial inclusion. It was produced without the bottles of champagne, orchestra and folk festivals that would be appropriate for this phenomenon. A dry screenshot simply appeared on the screen, which answered all our questions:

To be honest, we didn’t believe in success until the very end. The channel calmly maintains connection speed 11MBit/sec., but the actual copying speed is half that - under good conditions (i.e., with the antenna aligned correctly), the average speed is 600 KB/sec, reaching the recipient approximately 4/5 packages, the rest arrive after a repeated request (after retry).

Conclusion
I think you can see everything for yourself. Construction process WiFi networking is actually not as difficult in practice as it seems. The main thing in this matter is accurate calculation and straight hands. Of course, high-quality components are also desirable, but this is not so critical.

Wi-Fi is a Wi-Fi Alliance brand for wireless networks based on the IEEE 802.11 standard. Under the abbreviation Wi-Fi, a whole family of standards for transmitting digital data streams over radio channels is currently being developed.

Typically, a Wi-Fi network diagram contains at least one access point and at least one client. It is also possible to connect two clients in point-to-point mode (Ad-hoc), when the access point is not used, and the clients are connected via network adapters “directly”.

The Wi-Fi standard does not describe all aspects of building wireless local area networks. Therefore, each equipment manufacturer solves this problem in its own way, using those approaches that it considers the best from one point of view or another.

Based on the method of combining access points into a single system, we can distinguish:

Autonomous access points (also called autonomous, decentralized, smart)

Access points operating under the control of a controller (also called “lightweight”, centralized)

Controllerless, but not standalone (managed without a controller)

Based on the method of organizing and managing radio channels, wireless local networks can be distinguished:

With static radio channel settings

With dynamic (adaptive) radio channel settings

With a “layered” or multilayer structure of radio channels

Benefits of Wi-Fi:

Wireless Internet allows you to deploy a network without laying cables. Places where cable cannot be installed, such as outdoors and buildings of historical value, can be served by wireless networks.

Allows mobile devices to access the network as it is compatible with equipment thanks to mandatory certification with the Wi-Fi logo.

Mobility because you are not tied to one place and you can use the Internet in any environment.

Within the Wi-Fi zone, several users can access the Internet from computers, laptops, phones, etc.

The radiation from Wi-Fi devices during data transmission is an order of magnitude (10 times) less than that of a cell phone.

Disadvantages of Wi-Fi:

Many devices operate in the 2.4 GHz band, such as Bluetooth enabled devices, etc., and even microwave ovens, which impairs electromagnetic compatibility.

Wi-Fi has a very high overhead. It turns out that the data transfer speed in the Wi-Fi network is always lower than the declared speed. The actual speed depends on the share of service traffic, which depends on the presence of physical barriers between devices (furniture, walls), the presence of interference from other wireless devices or electronic equipment, the location of devices relative to each other, etc.

The frequency range and operating restrictions are not the same in different countries. For example, in Russia, wireless access points, as well as Wi-Fi adapters with an EIRP exceeding 100 mW (20 dBm), are subject to mandatory registration.

The WEP encryption standard can be broken even with the correct configuration (due to the weak strength of the algorithm). New devices support more advanced data encryption protocols WPA and WPA2. The adoption of the IEEE 802.11i (WPA2) standard in June 2004 made it possible to implement a more secure communication scheme that is available in new equipment.

In point-to-point (Ad-hoc) mode, the standard requires the implementation of a speed of 11 Mbit/s (802.11b). WPA(2) encryption is not available, only the easily crackable WEP.

For industrial use, Wi-Fi technologies are currently offered by a limited number of suppliers.

The use of Wi-Fi devices in enterprises is due to their high noise immunity, which makes them applicable in enterprises with many metal structures. Currently, the technology is widely used in remote or hazardous production, where the presence of operational personnel is associated with increased danger or is completely difficult. For example, for telemetry tasks at oil and gas production enterprises, as well as for monitoring the movement of personnel and vehicles in mines and mines, to determine the location of personnel in emergency situations.