Unit #2 - Install and Configure Wireless Access Point

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 53

MARY HELP COLLEGE

HARDWARE AND NETWORKING SERVICING


LEVEL IV

UC: BUILD A SMALL WIRELESS LAN


MODULE CODE: EIS HNS4 M03 1123
NOMINAL DURATION: 40 HRS.

UNIT TWO: INSTALL AND CONFIGURE WIRELESS ACCESS POINT


SELECTING ACCESS POINT DEVICE
WHAT IS A WIRELESS ACCESS POINT?

 A wireless access point is a device used to create a


WLAN.

 Businesses in large offices or buildings often use


wireless access points.

 This device is connected to an Internet hub, wired


router, or switch using an Ethernet cable.
 Then project the Wi-Fi signal to the designated area.
SELECTING ACCESS POINT DEVICE
WHAT IS A WIRELESS ACCESS POINT?

 It is best to understand your business


needs before you make a choice.

 Research by your own or/and ask an


expert for recommendations.
THINGS TO CONSIDER

 As more and more enterprises upgrade their


wireless network environment, people also
have doubts about choosing a wireless access
point.

 When choosing a wireless access point, keep


the following points in mind.
THINGS TO CONSIDER
RANGE

 The range that an AP can cover is an important parameter,


and a WAP with a larger coverage area is more beneficial.

 Because it means the number and cost of access points


can be reduced.

 Purchasing WAPs with additional coverage areas can


reduce costs for businesses.

 Most enterprise wireless access points are capable of


covering an area of 5,000 to 10,000 square feet.
THINGS TO CONSIDER
SPEED

The rate at which information travels is also


something we need to consider, usually
measured in bps (bits per second), kilobits,
megabits, or gigabits.

The WAP that supports the 802.11ac protocol


can reach 1200Mbps.
THINGS TO CONSIDER
GAIN ANTENNA

The antenna of the wireless AP is very important,


it will directly affect the signal strength and
transmission range of the wireless AP.
When buying a wireless AP, it is best to choose
one with a booster antenna.
 Booster antenna amplify the incoming signal
to boost it to a sufficient level.
THINGS TO CONSIDER
GUEST ACCESS

 Data breaches and other cyber security issues are


happening every day now.

 Modern systems have intelligent guest access


systems that apply corporate security policies.

 This ensures that guests stay safe on the network.

 Also, there is no need to worry about access from


unsecured devices.
THINGS TO CONSIDER
GUEST ACCESS

 A guest wireless access point provides


internet access to guests, visitors or
customers in a secure and controlled
manner.
 Guest mode in access point is a mode used
to separates traffics from one or more SSIDs.
THINGS TO CONSIDER
NO HARDWARE CONTROLLERS

 In the past, access points also required IT technicians with


specialized knowledge to operate from a computer.

 However, with the advancement of technology, these are no


longer necessary.
 The latest Wi-Fi 6 access points, for example, use software control
in the network and do not require an external controller.

 Software-based control has many benefits over previous hardware-


dependent access points.
THINGS TO CONSIDER
WI-FI TECHNOLOGY

Choose devices using MESH, MIMO and POE


access point technologies based on your
business needs.
MESH technology can be used in home and
commercial equipment.
POE technology adopts low-power cabling
technology and can transmit signals up to 100M.
THINGS TO CONSIDER
PRICE

 It is not that the higher the price, the better the


AP.

 Sometimes the high price will not only increase


the cost, but also cause waste of product function
and performance.

 Too low a price can tempt people to buy inferior or


counterfeit products.
INSTALLING AND CONFIGURE ACCESS
POINTS

 Wireless devices (also known as access


points) provide a secure, affordable, and
easy-to-use wireless LAN solution that
combines mobility and flexibility with the
enterprise-class features required by
networking professionals.
INSTALLING AND CONFIGURE ACCESS
POINTS

Access point serves as the


connection point between wireless
and wired networks or as the center
point of a stand-alone wireless
network.
INSTALLING AND CONFIGURE ACCESS
POINTS

 In large installations, wireless users


within radio range of an access point
can roam throughout a facility while
maintaining seamless, uninterrupted
access to the network.
CONFIGURING WIRELESS ACCESS POINT
D-LINK

 The following methods demonstrates the


procedures to configure a D-Link access point.
 Steps:
1. Change the default admin password.
2. Change the default SSID to something of your
choosing.
CONFIGURING WIRELESS ACCESS POINT
TP-LINK

3. Enable encryption.
4. Disable the DHCP Server function, if your access
point has this feature.
5. Register the hardware (MAC) address of your
wireless card.
 With these steps taken, you should have no
problem connecting securely to your wireless
access point.
THE WIRELESS ACCESS POINT (WAP)

 WAP is a networking devices that enables the

capability for wireless-capable devices to connect to

a wired network.

 Introducing a WAP to your existing wired network is

instrumental to accommodating those devices only

capable of wireless connection.


THE WIRELESS ACCESS POINT (WAP)

 I have not come across a smartphone with an

RJ-45 port yet and so it is only appropriate

that i consider the connectivity capability of

the end user device.


THE WIRELESS ACCESS POINT (WAP)

 It is like creating or deploying another

network purely for wireless devices but

still an essential part of your existing

wired network.
THE WIRELESS ACCESS POINT (WAP)

Figure 2. 1 Wireless Access Point


THE WIRELESS ACCESS POINT (WAP)

 As it is already sated, an access point


provide a secure, affordable, and easy-
to-use wireless LAN solution that
combines mobility and flexibility with
the enterprise-class features required by
networking professionals.
THE WIRELESS ACCESS POINT (WAP)

Figure 2.2. Wireless Access Point (WAP)


THE WIRELESS ACCESS POINT (WAP)

 In the network diagram displayed above


Figure 2.2 show how to connect a
Wireless Access Point to a Wired
Network; you can see clearly two
portions of networks.
THE WIRELESS ACCESS POINT (WAP)

 One being a wired network and the


other being a wireless network.
 The wired network consists of three
wired computers to a switch, which is
connected to a router.
THE WIRELESS ACCESS POINT (WAP)

 The wireless network in the right


portion shows three wireless
computers connected to a wireless
access point (WAP).
MANAGED LAN SERVICE

 Managed LAN service (MLS) is a term used to


describe a service provided by a third party
service provider to manage a company’s
local area network (LAN).
 This type of service provides remote
monitoring and maintenance of the
company’s network infrastructure.
MANAGED LAN SERVICE CONT’D

 This type of service allows companies to


reduce their IT costs and increase productivity.
 The main advantage of MLS over other
solutions is its ability to provide 24/7 support
and proactive monitoring.
 It also offers an easy way to access your
network remotely.
LOCAL AREA NETWORK

 A Local Area Network (LAN) is a high-speed


communication system.

 It allows users to share information and connect to


other computers and peripherals.

 A LAN is usually connected to a server via a router.

 Some types of LANs are wireless while others are


wired.
LOCAL AREA NETWORK CONT’D

 Your company may already have an existing LAN, or


you might need to create one.

 You will need to buy equipment such as switches,


routers, and hubs.

 Depending on the size and type of your network,


you might also need to purchase servers, printers,
fax machines, and modems.
LOCAL AREA NETWORK CONT’D

 If you want to use a managed LAN service,


you should contact a local IT service
provider who specializes in these kinds of
services.
 They will be able to help you decide which
kind of managed LAN service is right for
you.
MANAGED LAN SERVICES
BENEFITS

 Security
 A managed LAN services provider can secure your
network by installing firewalls, intrusion
detection/prevention systems, and other security
products.
 Network monitoring
 A managed LAN services company can monitor your
network 24 hours a day, seven days a week.
 It can alert you when there are problems with your
network.
MANAGED LAN SERVICES
BENEFITS

 Improved network performance


 Managed LAN service providers usually offer
faster speeds than you could get from a public
Internet access point.
 You won’t have to wait long to download large
files.
 Cost savings
 Managed LAN service providers offer lower rates
than you would pay for similar services.
BENEFITS OF USING MANAGED LAN
SERVICES?
 Reliability
 Most managed LAN service providers guarantee
99% uptime.
 If they fail to deliver this level of reliability, they
will refund you for the downtime.
 24-Hour Availability
 Most managed LAN service providers offer 24-
hour availability.
 If an issue arises, they will resolve it immediately.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY

 When planning the testing of a WLAN,


consider the following forms of testing:
 Signal coverage testing.
 Performance testing.
 In-motion testing.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
SIGNAL COVERAGE TESTING

Signal coverage testing determines


where client devices are able to
satisfy coverage requirements.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
PERFORMANCE TESTING

 Performance testing determines


whether the WLAN can satisfy user
needs for using specific applications over
the WLAN.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
IN-MOTION TESTING

 In-motion testing determines whether


users can continue to make use of
applications while roaming throughout
the coverage areas, especially when the
roaming requires handoffs between
access points.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
SECURITY VULNERABILITY TESTING

 Security vulnerability testing ensures


that the WLAN implements required
security mechanisms and offers
sufficient protection to unauthorized
access and passive monitoring.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
ACCEPTANCE/VERIFICATION TESTING

 After installing a WLAN, it is important to run


a series of acceptance/verification tests to
ensure that the WLAN satisfies all
requirements.

 This is especially important if the organization


is having a contractor install the WLAN.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
SIMULATION TESTING

In some cases, such as when


implementing a very large WLAN, it
may be beneficial to simulate the
behavior of the WLAN before
actually installing it.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
PROTOTYPE TESTING

 Prototype testing involves implementing an


individual function of the WLAN that is not well
understood before deploying the complete system.

 For example, an organization may not be very


familiar with 802.1X authentication systems and
may benefit by implementing the 802.1X
authentication in a lab environment with a limited
number of test client devices.
TESTING ACCESS POINT FOR CONNECTION AND
SECURITY
PILOT TESTING

 Before installing the WLAN across the entire


organization, which may include numerous
buildings and different applications, it is
strongly advisable to install the system in a
limited number of facilities (ideally one) and
make that one work effectively first.
UPGRADING LEGACY EQUIPMENT

Many companies faced challenges in


managing traditional manufacturing
equipment that was individually
connected to dedicated hardware.
UPGRADING LEGACY EQUIPMENT

 In order to improve operations, it is


necessary to integrate a modern and
functional ICT system with optimized
monitoring.
 It is also needed to provide staff with the
necessary training to operate the new
system effectively.
UPGRADING LEGACY EQUIPMENT

 We can define the following ICT priorities while


upgrading legacy equipment:
 Networking of legacy production equipment.
 Moving from a fragmented, sub-optimal network to an integrated
management system;
 Upgrading the ICT system;
 Implementation of new work processes and communications;
 Training users on the new ICT system;
 Consultancy to executive management on ICT system optimizations;
UPGRADING LEGACY EQUIPMENT

 Networking of legacy production equipment running


specific software from multiple third-party industry
vendors:
 Each vendor has its own communication protocols and standards,
which can make it difficult to integrate equipment into a single
system.
 This solution required detailed knowledge of industry protocols
and communication standards, as well as the ability to develop
custom software solutions to integrate legacy equipment into the
new system.
UPGRADING LEGACY EQUIPMENT
UPGRADING THE ICT SYSTEM

 The modernization of the system required the replacement of


multiple hardware and software elements, the integration of
old equipment and the implementation of new systems and
applications.

 Very important is that to carry out the entire process without


interrupting ongoing operations, with minimal downtime.

 Outcome: reduce downtime, improve data management and


increase productivity.
UPGRADING LEGACY EQUIPMENT
IMPLEMENTATION OF NEW WORK PROCESSES AND COMMUNICATIONS

It is important to develop new processes that


are compatible with the existing system and
easy to adopt by the client’s staff.

Outcome: increase productivity, reduce errors


and improve communication on operations
between staff members.
UPGRADING LEGACY EQUIPMENT
TRAINING USERS ON THE NEW ICT SYSTEM

The successful implementation of the new ICT


system depended on the ability of the client’s
staff to use it.

Outcome: increase staff confidence, reduce


errors and increase productivity.
UPGRADING LEGACY EQUIPMENT
CONSULTANCY TO EXECUTIVE MANAGEMENT ON ICT SYSTEM OPTIMIZATIONS

 Identify ICT areas affecting the client’s business


processes that need optimization.

 Provide concrete recommendations to the executive


management of the client company, leading to
continuous improvement of system performance and
efficiency.

 Outcome: improve system performance, increase


efficiency and reduce costs.
UPGRADING LEGACY EQUIPMENT
FULL ICT SYSTEM RESPONSIBILITY FOR CONTINUOUS SUPPORT OF BUSINESS AND
PRODUCTION PROCESSES

 To support business and production processes, ensure


that the system is always working optimally.

 Monitor system performance and take proactive


measures to prevent outages and ensure continuity of
operations.

 Outcome: reducing downtime, improving system


performance and increasing productivity, with a positive
effect on the quality of the client company’s products.
End of Unit #2

You might also like