Design and Implementation of Campus Wide Wireless Network
Chapter One
OBJECTIVES OF THE STUDY
There are several objectives associated with this project namely
Access everywhere: Laptops are portable, and internet access is becoming more so with wireless. A wireless network means the laptops are instantly connected when they walk into class, and even on their way to class.
Accelerate learning: We are all different, some students learn at faster and slower paces. Using networked laptops and a wireless network – teaching staff can create assignments so students can work at their own pace.
Flexible classroom layout: Want to shift desks around for a particular class. Do you need to add more students to the classroom network? With a wireless LAN from Simply Wireless there are no cables or data ports to to limit your flexibility. Moving computers becomes as easy as moving a trolley.
For science teachers: Now science lessons can take place anywhere. The lab is a locations that’s often very difficult to cable, with a wireless network, students can input data while experiments take place, and as they’re observing results.
Web based wireless learning is smart: Wireless makes it easier for students to work on their online assignments. They can access the school intranet from the library or cafeteria, being able to learn anywhere. In sum: You get the flexibility, portability and affordability you need, with the added assurance of Intel reliability and industry-leading expertise.
Computers on wheels: If you don’t have the funding to put a computer in every classroom – wireless is an easy way to maximize your technology investment. You can simply wheel your pool of computers into different classrooms as they are needed. Computers will be used by students more, and rotated hourly if needed. Students can use the pool of computers, access the school network, and work on assignments all from the library, or any wirelessly enabled location. Wireless technology enables computers to roam seamlessly throughout the school – even to portable classrooms or the playground.
More Students, less capital expenditure on IT: Your assignment; get your campus wired to the World Wide Web and other educational resources, but do it within a limited budget. Can you satisfy community expectations, while adhering to your budget? The solution is a Simply Wireless LAN. It’s modular construction allows simple network additions as needed.
CHAPTER TWO
LITERATURE REVIEW
This chapter explains why supporting mobile computing in a TCP/IP internet is difficult, presents five approaches that researchers have proposed to overcome the difficulties, and describes wireless networking systems that are being built at other research institutions.
Internet Addressing and Routing
An IP unicast address is a 32-bit integer that has one of the three forms shown In Figure below
As the figure illustrates, IP uses a hierarchical addressing scheme: each address consists of a network ID (netid) and a host ID (hostid); the network ID identifies a network, and the host ID identifies a host on that network. The addressing scheme facilitates routing. Conceptually, routing a datagram to a host on a given network takes two steps. First, IP routers forward the datagram to the network using the network ID part. Second, when the datagram reaches the destination network, routers deliver the datagram to the host using the host ID part. The hierarchical addressing scheme also makes routing information manageable. An IP router need not maintain routing information on a per-host basis. Consequently, routers exchange less routing information. Furthermore, since network topologies do not change frequently, routers can exchange routing information at longer intervals (e.g., once per 30 seconds, as in RIP.
The Host Mobility Problem
Despite the advantages, the addressing and routing scheme of IP makes mobile computing difficult. Consider the example illustrated in Figure below.
CHAPTER THREE
Research methodology
Research methodology is a collective term for the structured process of conducting research. There are many different methodologies used in various types of research and the term is usually considered to include research design, data gathering and data analysis.
Research methodologies can be quantitative (for example, measuring the number of times someone does something under certain conditions) or qualitative (for example, asking people how they feel about a certain situation). Ideally, comprehensive research should try to incorporate both qualitative and quantitative methodologies but this is not always possible, usually due to time and financial constraints.
Research methodologies are generally used in academic research to test hypotheses or theories. A good design should ensure the research is valid, i.e. it clearly tests the hypothesis and not extraneous variables, and that the research is reliable, i.e. it yields consistent results every time. The approach used here is SSADM.
What is SSADM?
Structured Systems Analysis and Design Method (SSADM) is a systems approach to the analysis and design of information systems. SSADM was produced for a UK government office concerned with the use of technology in government, from 1980 onwards. The names “Structured Systems Analysis and Design Method” and “SSADM” are now Registered Trade Marks of the Office of Government Commerce (OGC), which is an Office of the United Kingdom’s Treasury.
CHAPTER FOUR
SYSTEM DESIGN
PROTOCOLS AND ROUTING: DESIGN
As described in the previous chapter, multiple base stations are needed to provide wireless coverage for the entire campus. As a mobile roams the campus, base stations must cooperate to transfer the ownership of the mobile from one base station to another.
This chapter describes how cross point processors use protocols to determine the ownership of a mobile and to transfer the ownership of a mobile from one base station to the next. The ownership information is the routing information that cross point processors use to forward datagrams for mobiles. This chapter describes routing within cross point and protocol design. The next chapter will describe implementation details.
BIBLIOGRAPHY
- [All93] D. Allen. Hidden Terminal Problems in Wireless LAN’s. IEEE 802.11 Working Group Paper, 1993.
- [ASU88] A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, Massachusetts, 1988.
- [B+94] T. Blackwell et al. Secure Short-Cut Routing for Mobile IP. In Proceed- ings of USENIX Summer 1994 Conference, pages 305{316, June 1994.
- [Bak94] Mary Baker. Changing Communication Environments in MosquitoNet. In Proceedings of the IEEE Workshop on Mobile and Computing Systems and Applications, pages 64{68, Dec. 1994.
- [BCDB95] M. Borden, E. Crawley, B. Davie, and S. Batsell. RFC-1821: Integration of Real-time Services in an IP-ATM Network Architecture. Request For Comments, August 1995. Internet Network Information Center.
- [BLFN96] T. Berners-Lee, R. Fielding, and H. Nielsen. RFC-1945: Hypertext Transfer Protocol { HTTP/1.0. Request For Comments, May 1996. In-ternet Network Information Center.