Sunteți pe pagina 1din 35

ASIA PACIFIC INSTITUTE OF INFORMATION TECHNOLOGY APIIT Diploma Part II

INCOURSE ASSIGNMENT TELECOMMUNICATION


Prepared By A.N.Ahamed Nishadh (CB004081) S.D.Ilangakoon (CB004041) A.C.Tiffaniya Fernando (CB004165) Module Code & Title AICT005-3-2 - TELE Cohort DF10A1ICT Date of Submission 02nd September 2011 Instructor Mr.Balachandran Gnanasekaraiyer

Submitted in partial fulfillment for the degree of Bachelor of Science (Hons) in Computing

GANTT CHART

ACKNOWLEDGEMENTS
Firstly we would like to thank our lecturer Mr. Balachandran Gnanasekaraiyer for all the help and guidance given to us while doing this assignment. Especially for teaching us this module in such a way that we were able to learn this highly technical module very easily. Also there are many individuals who have helped us in numerous ways directly and indirectly so that we were able to complete this assignment. APIIT Lanka for providing us with resources and the Tech Team at APIIT Lanka for their assistance at required times. And last but not least our friends, parents and the well-wishers without whose moral support and encouragement, we would not have been able to do a good job. Finally, if there are any shortcomings in this project, then we request to excuse us for all those and accept this documentation. Ahamed Nishadh Deshan Ilangakoon Tiffaniya Fernando

ii

TABLE OF CONTENTS
1.0 - INTRODUCTION ............................................................................................ 1 2.0 ASSUMPTIONS AND LIMITATIONS ........................................................... 3 3.0 IMPORTANCE OF WiFi ................................................................................. 4 4.0 IMPLEMENTATION OF WiFi ........................................................................ 8 4.1 - HARDWARE REQUIREMENTS ........................................................... 8 4.1.1 WIRED NETWORK ........................................................................ 8 4.1.2 WIRELESS ACCESS POINT (WAP) .............................................. 8 4.1.3 WIRELESS ADAPTER ................................................................... 9 4.2 CRITERIA.............................................................................................10 4.3 SKILLS .................................................................................................11 4.4 COSTS ..................................................................................................11 4.5 SOFTWARE REQUIREMENTS ...........................................................12 4.5.1 REGULATIONS .............................................................................13 4.6 SECURITY ...........................................................................................15 4.7 SAFETY ................................................................................................16 5.0 PLACES SUITABLE FOR IMPLEMENTATION ......................................... 17 6.0 ADVANTAGES OF USING Wi-Fi ................................................................ 19 7.0 DISADVANTAGES OF USING Wi-Fi.......................................................... 21 8.0 CONCLUSION .............................................................................................. 23 9.0 CRITICAL EVALUATION ........................................................................... 24 10.0 BIBLIOGRAPHY ........................................................................................ 25 11.0 MEETING MINUTES.................................................................................. 26 11.1 MEETING 1 ........................................................................................26 11.2 MEETING 2 ........................................................................................27 11.3 MEETING 3 ........................................................................................28

iii

11.4 MEETING 4 ........................................................................................29 12.0 AGREED WORK PERCENTAGE............................................................... 30

iv

1.0 - INTRODUCTION
The topic that our group has taken on to research on is WiFi wireless communication method. WiFi stands for Wireless Fidelity and comes under the 802.11 standard set by the Institute Electrical and Electronics Engineers (IEEE). This is the governing body that ensures that all WiFi devices remain interoperable. WiFi are hugely popular in most places where large crowds gather or where basically the need to cover a large area with internet access. WiFi allows a person to do exactly that. It will cover a given range in a 360 degree rotation from one central point. With this any number of devices may be connected up to the network. For this technology to work several hardware components are required. These are a wired network, a wireless access point and a wireless adapter. With these three devices a wireless network can be setup and it can be accessed by any device with a wireless adapter. The WiFi communication first was officially sanctioned by the IEEE in 1997 with the first standard that was the 802.11. This was a very basic and inadequate and failed to meet the growing demand for faster data transmission. This gave rise to newer, faster and better standards that are currently being used in all WiFi networks. This wireless network will normally provide up to 200 feet coverage but for best data transmission a wireless device should be within 100 feet of the wireless access point. These networks will either accessible by anyone, this is known as an Open network, while a WiFi network that is password protected will be considered a Closed network. The main reason to either Open or Close a network is so that the accessibility will be limited. This depends on where the WiFi access point is placed and also on who the user is intended to be. If it is for a private user and the provider of the network wishes it to be used only by a limited few people
1

then the network is made closed and is protected by a password. If it is for the general public then it will be an open network and will be accessible by anyone. This communication technology uses radio frequency waves that have been modulated to carry the data signals. The various standards operate on both the 2.4GHz and 5GHz frequencies. The 2.4GHz being the more popular choice as it provides for greater signal range. This technology has greatly affected the way that people connect up to the internet and any place lacking in this will be looked down upon and not considered up to standards.

2.0 ASSUMPTIONS AND LIMITATIONS


During the compiling of this document we have come up with several limitations and assumptions. One of them is that we have not taken into consideration thickness of the walls when we the signal travels. It is known that the strength of the radio signals reduce when they penetrate through walls and hence the distance the signal travels will be limited depending on the thickness of the walls. Another assumption is that we have not specified brands or specific device models for the equipment are that we have specified in the documentation. In here also the signal strengths differ according to the quality of the products and the models used.

3.0 IMPORTANCE OF WiFi


In todays world it is all about information communication. In the corporate world companies will fight each other in an effort to gain control over their competitors and information is the vital tool that will give one company the edge over the other. In this race to have control information is a vital tool and the reliability and the accuracy of this information is vital. Corporations will implement this technology in their corporate buildings or in their public lobby areas. Hotels, libraries airports and other such places where large number of people travel to and fro carrying out their daily business tasks it is important that the are able to remain connected to the internet and that they are able to do so with the greatest of ease. Corporate business men are now not the only people that fine the need to stay connected vital for their day to day activities. These are the young adults who find the need to stay connected is as important to them as it is to business men and women. With daily web browsing and keeping in touch with friends while on the move is becoming a hot trend and therefore the demand for wireless internet access grows even more. To make this possible is that most of the new electronic devices that are now available in the market come with an inbuilt hardware and software that allows them to easily connect with the internet. These are known as wireless adapters and they are vital when it comes to wireless networking. Blackberries, IPhones, laptops and all other such devices that are now used to connect to the internet come with inbuilt facilities that allow the user to access the internet. Given bellow are statistics that show the users of WiFi networks and also the places where WiFi is most frequently accessed.

(Anon., 2007) The above image clearly shows that the majority of the people using WiFi are people high earning businessmen and women who are between the ages of 30-49. Next are the young adults who have very low incomes. These are the teenagers who find it important to communicate and keep in touch with their friends while on the move.

(Boutin, 2009) The image above shows us the places where WiFi is frequently accessed and this image clearly depicts it people who are traveling. This is 82.3% of the users. It goes to show the importance of WiFi specially when people are traveling around and need to the internet connection to be as mobile as themselves. Corporations would generally not have a WiFi connection in the main office rooms. These would be wired to provide additional security for a company; however they sometimes to provide WiFi hotspots in lobby areas of corporations to allow visitors to access the internet. In the event that the company provides laptops to employees instead of desktop computers having a WiFi network will provide the company to provide the employees with access to the company network at a very low cost for the company as setting up a WiFi network is a lot cheaper than wiring an entire office. This way companies will be able to greatly cut down on the costs that it will incur. The social lives of people also are affected by WiFi. To people it is all about keeping in touch with their friends and family and a WiFi network will allow people to keep in touch with the greatest of ease. This will help people keep in touch just as long as there is a WiFi network and the user has a wireless adapter.
6

WiFi is easy to setup and once setup the coverage is and the number of devices that can connect up is far greater than if it had been a wired network. The reason being in a wired network there is limited number of network access points and thus limiting the number of people that can connect to the network. However with a wireless network this number can be vastly increase and anyone with a wireless adapter in any device will be able to access the network.

4.0 IMPLEMENTATION OF WiFi


4.1 - HARDWARE REQUIREMENTS
WiFi is a wireless communication method used to connect a variety of digital devices to the internet. For a WiFi network to exist several other components need to be in place first. These requirements are: 1. Wired Network 2. Wireless Access Point 3. Wireless Adapter

4.1.1 WIRED NETWORK


A wired network is essential and is the first component that needs to be in place. This is because even a wireless connection needs some form of wired line to access the Internet Service Provider (ISP). This wired connection can be either Digital Subscriber Line (DSL), cable or even both depending on the ISP. This wired connection is needed so that the wireless access point can be connected and the WiFi signal broadcasted. (allychevalier, 2010)

4.1.2 WIRELESS ACCESS POINT (WAP)


This is the point from which the wireless signal will be broadcast and is the point at which the wired network connects. It is a sort of a middle man between the wired network and the wireless devices. This theoretically is any devices that can perform the function of broadcasting a wireless signal to allow wireless devices to connect and is connected to the wired network. The WAP functions by passing packets of data between the wired and the wireless network. A WAP device is controlled by what is known as a Wireless Local Area Network (WLAN) controller. The functions of a WLAN controller is to basically to automatically adjust the power, authentications, channels and all other features that are required by a wireless network. Theses functionalities are now commonly combined and carried out by what is known as a Wireless Router.

A wireless router generally contains the software that enables it to route and carry out the function of the WAP which is to transfer data back and forth between the wired network and the wireless devices. Thus since the wireless router carries out the functionalities of a WAP it should contain a minimum of one port that allows is to connect to the wired connection. However the wireless router may contain more than one port allowing other devices to connect directly to the wired network. (allychevalier, 2010)

4.1.3 WIRELESS ADAPTER


A wireless adapter is the device that allows the electronic device like a Personal Computers (PC) or Laptops connect to the wireless access point. Presently wireless adapters are a standard and can be found in almost every PC or Laptops and these cards are prebuilt with the added feature that they can be removed if required. These adapter card were however not usually inbuilt in computers that were built before WiFi became an accepted and common place standard. In situations like this the User will have to connect an external wireless adapter. This adapter would commonly refer to as a Dongle and would be connected in through a Universal Serial Bus (USB) port. These devices would then provide the computer or laptop with internet access after the required software was installed. A wide variety of devices now come with inbuilt wireless adapters. Devices such as Computers, Laptops, Android devices, iPods etc. and all these devices can now easily access the internet with their adapters. A WiFi connection can also be used to create a wireless bridge. This is a part of a LAN and it allows connecting several LAN together without the use of network cables. This method is a very inexpensive and easy way to set up an Ethernet. (allychevalier, 2010)

(Kaleem, 2008)

The above image clearly shows how a WiFi network can be set up using the three devices that I have detailed above. This network diagram shows a wired as well as a wireless network all connected to the same wireless router. The hardware that has been mentioned above is the basic requirements that are needed to have a wireless WiFi network. Apart from this there are several other hardware devices that are available to be set in place that can be placed to further develop and to facilitate better WiFi signals. Other such devices are Wireless Repeaters and Range Expanders. These devices help to transmit a signal over a larger are and to help if the signal is weak to pick up the signal and to strengthen the signal. These devices are optional and can be set up if the user so wishes. It is however not essential unless the need to broadcast the signal over a longer range is found.

4.2 CRITERIA
When selecting an appropriate standard for WiFi it is important to firstly decide on where the device is going to be placed and if any obstacles lie in the line of the signal. Variables such as the thickness and the material used to build walls will affect the performance of a wireless signal.

10

Also the device that is used to broadcast the signal will also play a role in how far a signal can travel and the strength of a signal. Another vital aspect that needs to be considered before setting up a wireless is whether a wireless device is actually needed. A wireless access point is highly vulnerable to attack from any external party and is an easy mode through which a hacker can access a network. If highly sensitive information is available on a network then great care must be maintained at all times to ensure that hackers cannot gain access easily to the network via the wireless access point.

4.3 SKILLS
To operate and access a WiFi network two distinct set of skills are required. To access a wireless network the user does not need any specialized skills or training, all that is required is a knowledge of the device that is being used to access the WiFi network and the password, if any, to access the WiFi. With a vast majority of modern devices all it takes is a simple press of a button and the device will connect up to an available WiFi network. With these basic requirements any person is able to access a WiFi network. To operate and maintain a WiFi network however a person who is skilled in computer networking and network security will be required. This is because to operate and maintain a WiFi system it takes the above mentioned skills. Therefore if a WiFi system is to be installed it is advisable to either have a trained professional on site or hire out the assistance of one from a technical service company.

4.4 COSTS
The prices that will be incurred will change depending on the supplier and service provider who is used when setting up a WiFi network. A wired network will vary in costs depending on the Internet Service Provider (ISP) that is used. In Sri Lanka two main ISP would be Dialog and Sri Lanka Telecom (SLT). Both these ISP supply wired network facilities and have slightly

11

different costs from a little over 8,000LKR to around 500LKR from SLT (Telecom, 2011) . These charges change depending on the package and the usage of the network. The price of a WiFi access point will also like the network costs change depending on the supplier of the hardware. To quote a sample price of good quality wireless router, a D-Link product price has been quoted. A D-Link wireless router DIR-615 WIRELESS N 300 ROUTER will cost around 6,589LKR. Price reference (Anon., 2011) The price of a wireless adapter may be in most probability covered in the cost of the device that is going to access the WiFi network. Also if the wireless access point is located in public place the cost of the wireless adapter will can be ignored by whoever is providing the WiFi coverage as the cost of the adapter will be incurred by the persons accessing the WiFi network. Additional costs will be for the setting up and the maintaining the network. If there is an in-house technical assistant then the cost will be for the salary of the tech assistant. If the services of a technical assistant have to be obtained from an outside company then the cost will depend on the company and the type of service that is required to be performed.

4.5 SOFTWARE REQUIREMENTS


There is no specific software that is used for WiFi. The main software that will be used is if a network has to be created to allow for a large amount of WiFi traffic. In the case of the adapter and the device that contains the adapter the software will generally come pre-installed. This means that the user is not required to install any other software except that he will need to have an operating system that is compatible with the requirements of the wireless adapter software and a web browser installed so that the person accessing the network can access the internet.

12

4.5.1 REGULATIONS
There are five regulatory standards that have been defined by the Institute of Electrical and Electronics Engineers (IEEE) and all devices must belong to one of these standards to if it is to be usable. However the most highly recommended standard is 802.11n. The information bellow relating to the standards were obtained from (Wilson, n.d.) (Bttrich, 2005) (Anon., 2009). 802.11 The first standard that was developed initially is 802.11. This standard allowed for a maximum data transfer limit of only 2 Megabits per second (2Mbit/s). In a modern era where large volumes of data are transferred, it is impractical to have such a low data transfer speed. Therefore this standard and devices that are compatible with this standard is no longer produced. This standard broad cast its signal on the 2.4GHz band. 802.11a The next standard that was developed to overcome the short comings of the 802.11 standard was the 802.11a standard. This standard was a great improvement on the previous 802.11 as it allowed for much higher bandwidth. It was able to transmit at speeds of 54 Mbit/s and transmitted at a frequency of 5GHz. The main users of this standard due to its high speed were mostly corporations rather than individuals. This standard uses Orthogonal Frequency-Division Multiplexing (OFDM). This is where multiple numbers of subcarriers are used to transmit the signal. This methods main advantage is that it allows for a large number of signals to be carried using the sub carriers. The main drawback however comes when this signal is used indoors or when obstacles line its path. This is due to the high frequency its range is easily diminished when it travels through obstacles. Obstacles such as walls and other objects the signal gets absorbed by the obstacles and thus is unable to transmit to its full length.
13

The biggest advantage with 802.11a was that it was able to greatly reduce the amount of interference. This was because of the multiplexing method used. 802.11b With the drawbacks of the original standard 802.11 a new standard was required to meet the increased demands of internet traffic. This demand spurred the need to develop a new standard that would meet the ever growing demands of the internet users. This is the reason 802.11b was developed. A modification of the original 802.11 it was now however able to transmit at speeds of 11Mibt/s. This was a great improvement compared with the previous 2Mibt/s that was in use. This standard again keeping with its predecessor 802.11 used the same frequency of 2.4GHz. However the problem arose if users tried to use both 802.11a and 802.11b. This was because the two standards used 2 separate frequencies and therefore the devices used to pick up the signals were incapable of picking up both signals. Devices were present that could pick up both frequencies but it could pick only one signal at a time, not both. The standard 802.11b was a great standard when it came to indoor performance and when looked at the cost. However this standard also became obsolete and lost its popularity when newer and faster standards were developed that were cheaper to use. 802.11g This was the most popular standard and also the most commonly used standard up until 2009. This standard was the second revision of the initial 802.11 and was highly popular with all users. The 802.11g standard like its original standard of 802.11 also used the same 2.4GHz frequency. But the main advantage and the main appeal lay in the fact that it was able transmit at speeds of 54Mbit/s. This standard was essentially a combination of the strong features of 802.11a and 802.11b and therefore easily became the most popular standard. This standard is great for long range transmission as it uses the 2.4GHz frequency and does not suffer to greatly when traveling through obstacles. Also since it uses
14

the same frequency as 802.11b it is compatible with devices that support 802.11b and also most devices support both these standards. 802.11n This is the most recent standard and was in use since 2010. This new standard is by easily far more superior as it is able to achieve speeds up to and in excess of 100Mibt/s. This provides great advantages for users as it allows for higher internet traffic. This standard also can use either 5GHz or 2.4GHz and devices that support 802.11g also support 802.11n. This standard also has the greatest range of all the other standards allowing for even greater long range connectivity.

4.6 SECURITY
A major problem that crops up when using a WiFi network is that the network is extremely vulnerable to an attack from an outside source in an attempt to access classified network information. The reason a WiFi network is so easily viable to attack is since it is a signal that is simply being broadcast and any person with a wireless adapter will be able to tap into the network and use it for their own purposes. There are several ways of protecting a network from hacking and intrusions. A simple way to stop an outside person accessing unauthorised information would be to have a firewall or a proxy server that would govern the flow of traffic and prevent any person from gaining access to the network. Another way to protect the network is to have the WiFi on a separate physical network to that of networks that contain classified and valuable information. This way the security of the network is improved vastly. A very simple and basic way to protect ones network is to restrict the access to the wireless network by setting usernames and passwords. Therefore only people with the right password will be able to enter the system. This is a very basic and simple

15

form of protecting the system and will generally succeed in deterring most novice hacker and intruders from accessing the system.

4.7 SAFETY
The safety of a network will vary with how easy it is to access the network. A wired network will be significantly harder as an intruder will have to tap the wire if he is to gain access and this is not an easy process. However a wireless network it does not require such effort as the signal is sent out in a full 360 degree range and anyone with a wireless adapter can gain access. The way to prevent this has been mentioned below under the security topic. Therefore depending on how secure the network is the safety of the information that is being transmitted through it improves. This network however will not provide any physical problems to any of its users. The signal ray will not harm any person or even the devices, unless a virus is downloaded via the internet. Apart from these risks a wireless network is as safe as the level of security it has implemented to guard its valuable data.

16

5.0 PLACES SUITABLE FOR IMPLEMENTATION


In 2003 it was common to find businesses (offices), schools, hospitals, hotels, and public buildings without Wi-Fi network connectivity. Today all major hotels, every large corporate enterprise, every university and most local colleges, and manufacturing, warehouse and retail across the country depend on Wi-Fi wireless networks every day. Hotels: In a hotel most of the guests will be surfing Internet, ultimately it is useless to connect network cables and get connected to Internet, its really uncomfortable to the customers. All ways customers will prefer using internet without any difficulties. Also except for laptops there are several other equipment to surf internet available, such as mobile phones, notepad and etc. in most of the hotels the whole area is connected with Wi-Fi, in some hotels there is separate place called Wi-Fi zone so when people need to surf internet they will go there sit relax and surf internet. The only thing they have to do is turning the device on and get connected to Wi-Fi. Hospitals: Implement Wi-Fi devices for inventory bar-code scanning, medical records and medication management. Medical staff have instant access to patient records. And, with the integration of voice service, these people can communicate to each other instantly, without incurring cell phone charges. Banks and other Commercial centers: On-the-go database searching, point-of-sale and credit card authorization, security cameras, "walkie-talkie" voice communications in a warehouse or on a corporate campus, and a variety of other productivity enhancing applications. University: Wi-Fi technology is essentials for a university as well. Students can use their laptops and surf internet, not necessary to use the labs all the time. This is an

17

advantage because the number of computers in the labs doesnt need to be large amount, and also the cabling cost will be reduced. Offices: Now days even the offices uses the Wi-Fi connection. The cabling costs can be reduced, if the cable is used to connect computers to the internet if a new computer installed in the office the cabling should be done again, but if Wi-Fi technology is used those are not necessary, any amount of computers can use the Wi-Fi connection. The work there to be done is make wireless connection between the computer and the wireless router through WiFi. It also help to connect computers, printers, fax machines, and Wi-Fi enabled cell phones together into a single communication network without having to run wires through the wall. In an office enviroment it helps to retrieve files or presentations from the corporate network, check email, and surf the Internet from the conference room or cafeteria without having to find a place to plug in your computer. Residence: If residence is a Wi-Fi zone, internet will be accessible from any room in the house. And also the cabling space wont be essential. For security purpose it can be password protected as well. So its an advantage to use Wi-Fi even in private residences. Shopping Complex: These days shopping complexes also provide Wi-Fi zone in a way to attract customers. In such places they have password protected the Wi-Fi connection unwanted persons access to the WiFi system. Implement Wi-Fi devices for inventory bar code scanning, on-the-go database searching, point-of-sale and credit card authorization, security cameras, "walkie-talkie" voice communications in a warehouse and a variety of other productivity enhancing applications. This is use full to both the owners and the customers as well. (Connect 802, n.d.)

18

6.0 ADVANTAGES OF USING Wi-Fi


According to (www.bwif.org, n.d.) advantages of using WiFi can be quoted as follows : y Wi-Fi uses unlicensed radio spectrum and does not require regulatory approval for individual deplorers. y Wi-Fi products are extensively available in the market. There are different brands of access points and user's network interfaces are able to interoperate at a very basic service level. y y Prices are considerably lower as competition amongst vendors' increases. Wi-Fi networks can support roaming. This allows mobile users with laptop computer to be able to move from one access point to another. y Numerous access points and network interfaces support various degrees of encryption to protect traffic from interception. Wi-Fi has a set of global standards. Not like the cellular carriers, the same Wi-Fi users can work in different countries around the world at all time. Flexible Working: Access the Internet, do File Transfers, even Print from anywhere within 100 meters of the Wi-Fi Access Point. Reduce Cable Clutter: Reduce the clutter of wires and cables behind your Desktop/ Notebook Reduce Setup Cost: y If you are setting up a new office, you can reduce the IT setup cost by implementing Wi-Fi - you can save the cost of cabling and the cost on Network sockets y It allows local area networks (LANs) to be setup with cabling. This can reduce associated costs of network connection and expansions. Places where cables cannot be run, such as outdoor areas and historical buildings can use wireless LANs.

19

Avoid Deterioration with Time: Network Cables and Sockets tend to deteriorate over time, while Wi-Fi does not have this disadvantage Eliminate Re-configuring Computers: If you have more than one office location and your staff travel between offices, installing Wi-Fi Networks at each location makes good sense. Your staff can then access the Internet and Network at all locations, without having to re-configure their Internet settings each time (welloiledpc, n.d.) (bwif, n.d.)

20

7.0 DISADVANTAGES OF USING Wi-Fi


Password and Security: It is important to secure your Wi-Fi connection at home or the office. Otherwise, anyone with a Wi-Fi enabled computer, phone, notebook or any other Wi-Fi supporting devices can access your data and Internet connection. Security is more difficult to guarantee and requires configuration. If a technical person configures the router and setup a Password-protection to the Wi-Fi connection that will be an easy process and once you set up all your Computers and devices to access your Wi-Fi network, you do not need to type in passwords each time thereafter. Signal Strength Sensitivity: Wi-Fi Networks are sensitive to signal strength. To ensure good connectivity, you must ensure that all computers and gadgets receive adequate signal strength at all times. Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user. Effect of Climatic Conditions: Wi-Fi signals are likely to be adversely affected by climatic conditions such as thunderstorms. Increased number of Network Devices: You are increasing the number of devices on your Network, by incorporating a Wi-Fi Access point (this is a must, for Wi-Fi access). Also, you will need a power socket to plug in and power the Wi-Fi Access Point. As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly. As standards change, it may be necessary to replace wireless cards and/or access points. Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.
21

A wired LAN is most likely to be required to provide a backbone to the WLAN; a WLAN should be a supplement to a wired LAN and not a complete solution. Long-term cost benefits are harder to achieve in static environments that require few moves and changes. (Wireless Center, n.d.) (bwif, n.d.)

22

8.0 CONCLUSION
The wireless communication technology that we have selected for this assignment is WiFi communication technology. This is a highly popular technology and is used widely in many public and private users. This technology which originated in 1997 has now grown to such an extent that it is a vital aspect when setting up most building or corporations. It has also become widely popular among the private consumers and has been set up in many homes to allow for greater mobility in accessing the internet. We have carried out extensive research into this field of wireless communication and have looked into many aspects like the hardware and software requirements, the prerequisites and the advantages and disadvantages of this communication technology. We have also given a sample network plan showing how the network is to be setup and the manner in which it is best placed so that co clashes in signal occur.

23

9.0 CRITICAL EVALUATION


This Telecommunication assignment was a research based assignment and it was to investigate into a wireless communication network. The wireless

communication standard that we picked is the Wi-Fi technology and it is a highly popular communication method and is used in many industries and personal homes. Our group consisted of three members and we have divided our work into the groups and have started research into the different fields. A key factor that helped us in this assignment was the knowledge that we had obtained during the course of lectures that were conducted for us. We had to research deploying to the details relating to Wi-Fi and have researched and presented the facts that have been presented in the documentation and our evaluation and analysis also have been submitted. We have researched into the various versions of Wi-Fi standard and have decided on the best standards that should be used. We have also presented findings on the hardware and the costs that have been incurred. The advantages and disadvantages of this wireless network have also been given and have been evaluated by a team member. This assignment also gave us a great opportunity to work as a team and to build our team working skills and also gave us a great opportunity to benefit from others knowledge. This assignment also helped us develop our knowledge further regarding Telecommunication and also to learn key terms in this field.

24

10.0 BIBLIOGRAPHY

allychevalier, 2010. Bright Hub. [Online] Available at: http://www.brighthub.com/computing/hardware/articles/62904.aspx [Accessed 15 August 2011]. Anon., 2007. Marketing Charts. [Online] Available at: http://www.marketingcharts.com/topics/affiliate-marketing/pew-one-third-of-internetusers-also-use-wireless-15/ [Accessed 18 August 2011]. Anon., 2009. Technically Easy. [Online] Available at: http://technicallyeasy.net/2009/03/about-the-80211-wireless-network-standards/ [Accessed 25 August 2011]. Anon., 2011. D-Link. [Online] Available at: http://www.dlink.com/DIR-615 [Accessed 31 August 2011]. Boutin, P., 2009. Venture Beat. [Online] Available at: http://venturebeat.com/2009/08/31/jiwire-study-dodges-the-big-question-how-manywi-fi-hotspot-users-are-there/ [Accessed 18 August 2011]. Bttrich, S., 2005. WiFi Hardware. [Online] Available at: http://wireless.ictp.it/school_2005/lectures/sebastian/wifi_hardware.pdf [Accessed 25 August 2011]. Kaleem, Z., 2008. WLAN Book. [Online] Available at: http://www.wlanbook.com/wpcontent/uploads/2008/04/wired-wireless-internet.jpg [Accessed 20 August 2011]. Telecom, S.L., 2011. Sri Lanka Telecom Broadband Packages. [Online] Available at: http://www.slt.lk/broadband/package_e.html [Accessed 31 August 2011]. Wilson, M.B.a.T.V., n.d. Tech-How WiFi Works. [Online] Available at: http://computer.howstuffworks.com/wireless-network1.htm [Accessed 25 August 2011].

25

11.0 MEETING MINUTES


11.1 MEETING 1

26

11.2 MEETING 2

27

11.3 MEETING 3

28

11.4 MEETING 4
Meeting/Project Name: Meeting 4 Date of Meeting: 25th August 2011 Time: 08.50 am Minutes Prepared By: Deshan Ilangakoon Location: L4CR2 1. Meeting Objective To check on the progress of the groups work. To present Mr. Mr.Balachandran Gnanasekaraiyer with the work done so far 2. Attendance at Meeting Present Absent Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Tiffaniya Fernando (CB004165) 3. Agenda and Notes, Decisions, Issues Topic Check on progress of work and have it appraised by Mr. Mr.Balachandran Gnanasekaraiyer. To show Sir the work that had been completed so far for eveluation 4. Action Items Action Continue on research and documentation Owner Ahamed Nishadh Deshan Ilangakoon Tiffaniya Fernando Due Date 31st August 2011

Owner Ahamed Nishadh Ahamed Nishadh

Time 08.50am 09.15am

5. Next Meeting (if applicable) Date: 01/09/2011 Time: Objective: Compile document

05.00pm

Location:

APIIT Caffeteria

Lecturer

29

12.0 AGREED WORK PERCENTAGE


Names Of Group Members

Topic

Ahamed Nishadh (CB004081)

Deshna Ilangakoon (CB004041)

Tiffaniya Frenando (CB004165)

1.0 Introduction Choosing the topic Introduction Gantt Chart 2.0 Report Analysis Technology Involved Importance of the Technology Criteria Required Circumstances for implementation Where Wi-Fi is best suited Advantages of WiFi Disadvantages of Wi-Fi 3.0 Conclusion Conclusion Critical Evaluation Weekly Meeting Reports 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 33.4% 33.3% 100% 100% 33.3%

30

S-ar putea să vă placă și