1. Author: OLATUNDE ISMAILA 1
ST PATRICKS INTERNATIONAL COLLEGE – LONDON
OLATUNDE ISMAILA
P1015927
SECOND YEAR HND PROJECT
STREET WIRELESS NETWORK DESIGN
2. Author: OLATUNDE ISMAILA 2
Acknowledgement
Haven done lot of research and attending all my lectures, I received contributions from my
project master MOHAMMED HASSAN and also from my course mate OBEN JOSEPH AYUK and I
thank GOD for giving me the strength and wisdom to concentrate throughout this two years.
Also to my mum Miss OLATUNDE and my grandfather in Nigeria who solemnly stood by me
financially, materially and spiritually to see me be an engineer and I thank them very much for
their massive contributions.
Abstract
This project brings the facts and considerations about designing wireless network for a street
based on specific requirements. The street wireless network will involve deploying wireless
antennas within that particular street, put in place the necessary protocols and the appropriate
securities for it smooth operation. Also, I will be discussing the concept of wireless network,
standard protocols, wireless antennas, authentications, and mode of access of the network.
Designing and simulating the street wireless network will be done using Smart Draw, Cisco
packet tracer and or OPNET respectively which are network designing and simulation tools. The
main aim of designing and deploying this network is to provide wireless connectivity to users
within a street in Lagos-Nigeria measured to be about 500 meters.
The concept of wireless local area network (LAN) will be discussed but not in details and also
detail of the design and implementation of the network will be discussed in the later chapters.
3. Author: OLATUNDE ISMAILA 3
Table of Contents
Acknowledgement..........................................................................................................................2
Abstract.........................................................................................................................................2
CHAPTER 1: INTRODUCTION................................................................................................................5
Chapter introduction.......................................................................................................................5
Project scope..................................................................................................................................5
Background....................................................................................................................................5
Problemexperience and solution.....................................................................................................6
Aim and Objective...........................................................................................................................7
Project plan and deliverables...........................................................................................................7
Project Time Line............................................................................................................................8
Chapter summary...........................................................................................................................8
CHAPTER 2: LITERATURE REVIEW.........................................................................................................8
Chapter introduction.......................................................................................................................8
DOMAIN BASED LITERATURE REVIEW..................................................................................................8
Application of wireless network.......................................................................................................8
Origin of wireless network...............................................................................................................9
How to use the wireless network.....................................................................................................9
TECHNOLOGICAL LITERATURE REVIEW...............................................................................................10
Technological specifications ..........................................................................................................10
Network and Telecommunication oriented development................................................................10
DEVELOPMENT LITERATURE REVIEW.................................................................................................12
Reviewing System Development Lifecycle (SDLC)............................................................................12
Chosen SDLC and methodology .....................................................................................................13
Benefits of the SDLC and methodology...........................................................................................13
Techniques and reasons for...........................................................................................................14
CHAPTER 3: ANALYSIS AND DESIGN ...................................................................................................14
Chapter introduction.....................................................................................................................14
Functional and Non-functional requirement analysis ......................................................................15
Techniques used to capture requirement.......................................................................................16
Problemfound during analysis.......................................................................................................17
Street network design structure ....................................................................................................18
4. Author: OLATUNDE ISMAILA 4
Simulation network design............................................................................................................18
Chapter summary.........................................................................................................................19
CHAPTER 4: IMPLEMENTATION .........................................................................................................20
Chapter introduction.....................................................................................................................20
Software simulationimplementation.............................................................................................20
Connection and IP addressing method...........................................................................................20
Wireless network securityimplementation ....................................................................................20
Problemfaced during implementation...........................................................................................21
Configuration methods .................................................................................................................21
Chapter summary.........................................................................................................................24
CHAPTER 5: TESTING.........................................................................................................................25
Chapter introduction.....................................................................................................................25
Testing methodology used ............................................................................................................25
Testing the wireless network.........................................................................................................25
Testing before and after configuration...........................................................................................26
Testing the network authentication...............................................................................................27
Chapter summary.........................................................................................................................28
CHAPTER 6: EVALUATION..................................................................................................................28
Chapter introduction.....................................................................................................................28
Evaluation against objectives.........................................................................................................28
End-users perspective...................................................................................................................28
Chapter summary.........................................................................................................................28
CHAPTER 7: CONCLUSION .................................................................................................................29
Overall conclusion.........................................................................................................................29
Reference.....................................................................................................................................29
Appendixes.........................................................................................Error! Bookmark not defined.
5. Author: OLATUNDE ISMAILA 5
CHAPTER 1: INTRODUCTION
Chapter introduction
This is a project to design and implement wireless network connectivity in a street of 200
meters in Lagos- Nigeria using devices like wireless antennas as detail about the project scope
will be discussed of in the later chapters. Designing, implementing this project will depend on
the project scope and scenario as well as the project plan and deliverables. Configurations and
all security measures will be discussed in details.
Project scope
Bono Street in Lagos-Nigeria is a newly developed street and comes be a street I was bone and
grew up from birth for 19 years. With that street there exists no internet café and even coffee
shops that has internet facilities. As a globalized world by the internet, life seems to be
uncomfortable to get facilities and one of kilometers to access the internet. So I have decided
to voluntarily setup an internet connection using Wi-Fi antennas within my street so that
everyone living there will benefit from it.
The street is measured to be 500 meters in length with limited wide range of houses. Users
within that street will be able to access the internet services from their mobile devices like
laptops, tablets, mobile phones, PDA, etc. and might be or not configured with authentications.
But if configured with authentication, they will require entering the street name as username
and housing number for the password. All the other equipment’s like routers and switching
infrastructures will be designed and kept out of users reach and it will be a very scalable,
reliable, fault-tolerant and manageable network.
Background
The design and implementation of this network came from my self-imagination as I know the
benefits of global infrastructure (internet) and I have seen how I and my people don’t benefit
from this infrastructure services. From my two years of studies at St-Patrick’s college London, I
have done series of coursework which are in the form of small projects for which I have learned
and researched more of networking technology especially the wireless network and how it
works.
6. Author: OLATUNDE ISMAILA 6
Also from sources like YouTube videos, journals, cisco tutorials, and online books, this have
motivated me and made me capable of designing such an infrastructure to reduce stress on the
people. I have studies the area in detail, put in place the functional and nonfunctional
requirement to facilitate the design and implementation of the project. It will indeed change
lives within my community especially to students and educators.
Problem experience and solution
There are many problems that prompted me to design and implement a wireless network in
the street in Lagos and are due to the community not getting to know the world through the
internet. The internet has become today a source of information, learning and communication.
The indigence suffer a lot especially colleges and universities who just know that something
exists like the internet with great features and benefits but have no access to such services.
Everyone within the street will have access to the wireless internet with just limited restrictions
and big questions is how to keep its performance at the peak as multiple users will be using the
network concurrently.
Solutions
Indeed the big answer is ‘’Yes’’, there is a solution to the above problem. In implementing the
wireless network to the above problem, It is known that there are many different types of
wireless connectivity ranging from wireless networks to wireless devices and to keep the
performance to the peak, it will depend on what type and what devices are been chosen.
Hence, wireless antenna will be used to remedy the above problem and the exact one to be
used is the wireless access point antenna (Multiple Direction Antennas) which will either be
mounted on a tall tower or within buildings. Detail of its design, implementation and testing
will be discussed in the later chapters.
7. Author: OLATUNDE ISMAILA 7
Aim and Objective
AIM
The aim of this project is to design and implement wireless network connectivity using wireless
access point antennas which will be deployed on or within buildings to enable internet
connectivity. Also the technology of wireless network and the wireless LAN will be discussed in
brief.
OBJECTIVE
The objective part of this project is to design, implement, test and simulate the wireless
network using the following respective tools; Smart Draw, Cisco Packet Tracer or OPNET. Also
implementing the appropriate protocols will be discussed in the later chapters.
Project plan and deliverables
The table below shows the structure by which I will use to complete the entire project and
other related tasks:
ACTIVITY FROM TO
Project initial stage 20/09/2014 26/09/2014
Proposal 27/09/2014 17/10/2014
Project requirements 18/10/2014 24/10/2014
Project topic research 25/10/2014 08/11/2014
Literature review 09/11/2014 07/12/2014
Gathering requirements 08/12/2014 10/01/2015 + Break
Analysis and design 11/01/2015 09/02/2015
Functional and non-functional requirement 10/02/2015 23/02/2015
Network architecture 24/02/2015 22/03/2015
Simulation design 23/03/2015 + Break 15/05/2015
Implementation 16/05/2015 14/06/2015
Testing phrase 15/06/2015 16/07/2015
Network evaluation 17/07/2015 30/07/2015
8. Author: OLATUNDE ISMAILA 8
Documentation 31/07/2015 06/08/2015
Project Time Line
Chapter summary
While waiting to deliver the best and most reliable source of communication to my people, I
have introduced the chapter and all what that has to be done is explained. The wireless
network will detailed be explained below and whatever benefits it will offer.
CHAPTER 2: LITERATURE REVIEW
Chapter introduction
This chapter will lead to the aspect of reviewing the relevant product sub-topics and will
ensure that wireless network be explained in details, the lifecycle and development
methodology used and the applicable network technology specifications.
DOMAIN BASED LITERATURE REVIEW
Application of wireless network
Chandra, Praphul, 2008
Wireless technology comes in many different forms and is seen to be a technology that allows
one to send and receive data wirelessly from two or multiple wireless devices. It has globalize
the world and is seen to be the fastest and most reliable medium of communication and has
come with different technologies and bandwidths. It most widely used medium of
communication is the radio wave (free space medium).
9. Author: OLATUNDE ISMAILA 9
Examples of wireless devices could be;
Laptop
Mobile phones
PDA
Tablets
IPad etc
Some benefits of the application and benefits offered by wireless technologies are;
1. It offers mobility services as can access data fromany location
2. Reach ability services as users are better connected
3. Can easily be installed
4. Less maintenance cost
5. Offers services for SMS and MMS.
Origin of wireless network
Chandra, Praphul, 2008
Before the invention and application of wireless network, people were using the wired
network for data transfer and other communication services. The wireless network or
technology started from telegraph and telephony, radio and television and finally from
computer network to the internet.
But for wireless fidelity (Wi-Fi) network to be designed for my community; at first they were
using the traditional means of communication to convey messages and other communication
services from one location to another like the local postal services which takes a long period to
deliver messages. The wireless networks today have come with great features and provide
better services to meet ones need.
How to use the wireless network
Using the wireless network (Wi-Fi) is simple as everyone within that street through their
wireless devices will be required to enter the user name and password which is the street name
10. Author: OLATUNDE ISMAILA 10
for user name and house number for password. After doing this, he will be connected to the
network named “Street Wi-Fi” and then start using the internet for whatever he intends to.
Uses will not have to know the actual location of the Wi-Fi infrastructure and authentication
but will have to use its services as long as he or she wants. Hence, the wireless access point
antennas will be mounted either on towers or on the buildings for free and fast access.
TECHNOLOGICAL LITERATURE REVIEW
Technological specifications
From my project top and its related functionalities, the chosen technology for reviewing is the
network and telecommunication oriented development. I will have to review multiple wireless
networks (Wi-Fi) so as to get a clear knowledge on how it works.
Network and Telecommunication oriented development
Reviewing the Merging of Outdoor and Indoor Wi-Fi
This is an outdoor wireless network architecture which is the same as my proposed wireless
network to be designed for my community. The network shows that it is the merging of indoor
Wi-Fi network purposely designed to meet the clients need. Also the wireless antenna is in the
same line of sight with the client CPE (client-customer premises equipment) and an institution.
Hence, the software on the outdoor Wi-Fi device addresses the specific application need for
wireless local area network (WLAN) application deployment.
HARDWARE
Router Cisco or other wireless routers
Wireless antenna Integrated bridge/ AP solution
WLG2000 PMP Bridge
Residential antenna Client CPE
11. Author: OLATUNDE ISMAILA 11
Reviewing Wi-Fi antennas for Multiple Connections
These wireless networks (Wi-Fi) have the capability of connecting mobile users, business users
and home users. The home and the business wireless access point antenna are connected to
the WISP main antenna likewise the mobile user’s antenna.
HARDWARE
Wireless Antenna OWL400 (AP MODE)
OWL400 (CPE MODE)
OWL800
Layer 3 switch Cisco Catalyst
Laptops CPU- 3.8GHz
12. Author: OLATUNDE ISMAILA 12
Reviewing a Community Wi-Fi Network
This is a community wireless network systemthat is deployed in almost all areas of the street
of that community and this is to enable wireless connectivity. It also offers wireless,
connectivity to metro busses for which passengers can use the internet when traveling. This is a
very cost effective network that delivers high-capacity, high- reliability, and multi- service
networks.
HARDWARE
Wi-Fi antenna MIMO Antenna
Router DSL
IEEE 802 PROTOCOL
DEVELOPMENT LITERATURE REVIEW
Reviewing System Development Lifecycle (SDLC)
Aarno, Daniel, and Jakob Engblom, 2005
System development lifecycle (SDLC) is the step-by-step application development lifecycle in
system, information system and software engineering to describe a process for planning,
13. Author: OLATUNDE ISMAILA 13
analyzing, design, and implementation for deploying an information system. SDLC provides the
detail processes, that are required for planning, executing and managing a system and it
contain the following types and their development methodologies;
SDLC Methodology
Waterfall SDLC Structured System Analysis and Development
Methodology (SSADM)
Spiral SDLC Extreme Programming (XP)
Iterative and Incremental SDLC Rapid Application Development (RAD), ICONIX, and
SCRUM
V-Model SDLC V-Model methodology
Chosen SDLC and methodology
The chosen system development lifecycle and development methodology for my project is the
V-model which is one that executes processes in sequential manner in V-SHAPE. It is also known
be as a verification and validation model for systems development. Testing processes using the
V-model is planned in parallel with a corresponding phase of development. Hence, the
verification phase takes place on one side of the V, and validation phase takes place on the
other side.
Benefits of the SDLC and methodology
As explained above, some of the benefits or reasons that made me choose the V-SHAPE model
system developments are;
1. V-MODEL is simple and easy to implement and use.
2. With V-MODEL, defects are found at early stage of the project
3. V-MODEL works well for small scale projects with well understood requirements.
4. V-MODEL is a highly disciplined model and stages are completed one at a time
V-model can easily be managed due to its rigidity as each stage has specific deliveries and a
review process.
14. Author: OLATUNDE ISMAILA 14
Techniques and reasons for
For the realization of this project, that is the design, implementation and testing, I WILL USE
THE CISCO PACKET TRACER TOOL TO DEMONSTRATE IT. Cisco packet tracer is a networking tool
that provides multiple opportunities for one to demonstrate networking concepts and also
have a platform that allows one to practice using the command-line interface (CLI). It comes
with great features like simulation features that will enable me to design, implement, test and
simulate the wireless network I am setting up for the community.
Some of the reasons for choosing cisco packet tracer are;
1. It supports all the protocols on the TCP/IP suit.
2. Can be used for designing, configuring and testing networking.
3. It provides the logical and physical workplace
4. Provides real-time and simulation modes as networking is concerned
5. Applicable for LAN, switching, TCP/IP, routing and WAN protocols.
CHAPTER 3: ANALYSIS AND DESIGN
Chapter introduction
This chapter will requires the discussion being focused on how the wireless network for the
community will be analyzed and designed. Also discussing on the functional and nonfunctional
requirement, the applicable techniques for capturing the requirement and the simulation
process will take place.
15. Author: OLATUNDE ISMAILA 15
Functional and Non-functional requirement analysis
Function requirement
Function requirement in this context will define the functions of the system(wireless network)
and the available components which are a set of inputs, behavior and output of the system.
Hence, it will specify documented operation and activities that the wireless network system
must be able to perform.
Examples of these functional requirements could be;
Authentication
Business rules to be carried out
Operation of the network devices, etc.
Functional requirements found on the wireless network are;
Component Description Justification Image
Router (wireless) Linksys E900 For routing and wireless
connectivity
Modem Belkin Wi-Fi
802.11n
To work together with the
router while connecting to
the antenna
Wireless Antenna COL2406 Antenna To enable wireless
connectivity within the
street
16. Author: OLATUNDE ISMAILA 16
Cable CAT6 SFTP Ethernet For connections between
the router/modem and the
antenna
Non- functional requirement
Non- functional requirement in this context describes the attribute of the design network
system like security, reliability, maintainability scalability and usability. Non-functional
requirement will also involve or be constraints or restrictions on the designed network system.
Examples of these non-functional requirements could be;
Accessibility
Backup
Efficiency
Portability
Security
Safety
Software, tools and standards
Recovery, etc.
Techniques used to capture requirement
The various techniques used in capturing the functional requirements of the street network
design are as follows;
Techniques Explanation
Feasibility studies Feasibility studies was one of the techniques used and it was
carried out by assessing the practicality of the proposed plan;
that is by analyzing the ability to complete the proposed project
17. Author: OLATUNDE ISMAILA 17
successfully considering the following factors;
Economic factors
Technological factors
Interview With this technique, users of the network were interviewed
based on the existing systemin order for the designer to get to
know details about it. He may conclude by upgrading it or
proceeding to design a new one.
Questionnaire The questionnaire technique was also used as a way of
capturing requirements and it was done by questioning users
individually and in groups about the system to be designed. The
direct and indirect questioning was used.
Observation The direct and indirect observation has been carried out by
studying the project environment and it users as this will help
the analyst to know the following;
What has to be done
When they have to be done
The duration to do it
Why it has been done
Problem found during analysis
For the proposed network, no problem was experienced during the analysis part of it as the
existing systemwas analyzed, functional and nonfunctional requirement has also been
analyzed. The simulation software chosen was able to run my computer that runs on Microsoft
windows 7 as it is the latest pc and software compared to the Macintosh machines which will
require additional software to make it compatible with the chosen simulation tool (cisco packet
tracer).
18. Author: OLATUNDE ISMAILA 18
Street network design structure
The above diagram is demonstrating how users within a street access internet via a Wi-Fi
access point antenna from any location.
Simulation network design
19. Author: OLATUNDE ISMAILA 19
The above simulation is for the wireless network design for a street whereby users can access
internet within that street by entering the SSID and the WEP (Wired Equivalent Privacy for IEEE
802.11). Entering these details will enable them access to the network at any time. The Wi-Fi
antenna is shown above where all the other devices are connected to it like the router/Modem,
connectivity components and other devices.
Chapter summary
The analysis and design have been done according to the project aimand objectives and the
actual network and simulation was design using their appropriate software tools. We now
proceed with the implementation part of the project.
20. Author: OLATUNDE ISMAILA 20
CHAPTER 4: IMPLEMENTATION
Chapter introduction
The implementation part of the street wireless network proposal will focus on explaining how
the simulation, connectivity, IP address technique, security and the configuration part of it will
be implemented.
Software simulation implementation
The cisco packet tracer simulation software was used for designing the wireless network and
simulating it to work in the real world practice. The packet tracer software allows the
configuration of wireless devices and wireless access points for users to access wireless internet
within a particular area.
It would cost a of money in physically buying all the equipment to be used for this project like
the wireless access point antenna etc. but this simulation comes with all this features and have
helped me to save cash.
Connection and IP addressing method
The connectivity of the network takes place wirelessly except the Wi-Fi access point antennas
which will be mount every 50 meters to ensure that users get full network within that street at
any time and at high speed. The Wi-Fi access point antennas will constitute devices like the
COL2406 antenna, CAT6 SFTP Ethernet, router/modem all mounted on a single tower to
perform this task.
As for the IP addressing assignment, the router will be configured DHCP and when any wireless
device is connected to the network, it will receive or it will be assigned with an IP address.
Hence, it was same like a home network whose router is already configured by the internet
service provider (ISP).
Wireless network security implementation
The security part of this network will be configured on the router using a range of mechanisms
and it will also ensure that users of the network will be required to enter their authentication
credentials that are username and password before they can access the internet.
21. Author: OLATUNDE ISMAILA 21
Other security measures that will be put in place is how to manage and monitor the wireless
network from an unauthorized access and also heavy traffics. Some of the management and
monitoring tools for the wireless networks are;
CommView for Wi-Fi: it is a packet sniffer for wireless network and ensures that packets
will be captured and also searches for specific strings and packet types. It has the
capability of altering network admins when there is traffic. Hence, it helps to improve
Wi-Fi security.
Wireless wizard: this tool was designed in order to get the best possible performance
from Wi-Fi networks. It also has features for diagnosing the network and for testing the
network performance.
Wireless key generator: it is a tool designed for improving wireless network security
and on this tool; network admins can specify the required security type and key
strength. It also generates random key encryptions for applications which then minimize
the temptation to use simple keys that can easily be hack able.
Problem faced during implementation
Actually, there was a problem faced during implementation which was that on the cisco packet
tracer software it does not have devices like the Wi-Fi access point antenna. Meanwhile my
project was based on using wireless point antenna, positioning them at a certain range on the
street so as to provide wireless connectivity.
So the solution to this problem was to use the normal wireless access points to simply
simulate the network. The normal wireless access point will now act as the Wi-Fi success point
antennas so as to be able to simulate it.
Configuration methods
Sample of wireless devices and components and their mode are used to access the internet.
22. Author: OLATUNDE ISMAILA 22
Below is the interface of the wireless router on the Wi-Fi antenna that is configured for
authentication.
Configuring the required authentications for the router for which users will require to enter
before they can connect to the network. That is the wired equivalent privacy (WEP).
23. Author: OLATUNDE ISMAILA 23
Configuring internet protocol address such that wireless devices can get IP addresses
automatically.
24. Author: OLATUNDE ISMAILA 24
Basic wireless settings
Configuring user devices for Wi-Fi connection.
Chapter summary
The implementation phase of the network is completed but the only issue was the lack of
certain wireless network devices like the Wi-Fi access point antenna which will be replaced by
the normal wireless access point in order to be able to simulate the network. But in real-life
implementation, the Wi-Fi access point antennas will be used.
25. Author: OLATUNDE ISMAILA 25
CHAPTER 5: TESTING
Chapter introduction
Testing the wireless network will ensure that errors are detected so that it should not be
experienced during or after it have been put to use. The network configuration will be tested
using ranges of methods that will be described below and one of it will be choosing to carry on
the testing part of the project
Testing methodology used
There are two possible methodologies that will be described below and this methodologies are
processes that are been carried out on a system in order to ensure that it is working according
to the aim and objectives of the project. The two testing methods are;
Black box testing
White box testing
The black box testing technique is one of the simplest and easy to use testing methods
especially on the Wi-Fi network design for a street. It does involve coding processes, less
expensive and this testing requires just a little knowledge on what is required to be done.
The white box testing method is one that requires high level of programming skills and the
tester must know or have good knowledge on what exist in the box and what is to be done.
It is one of the most expensive testing methods as it will be required to hire highly qualified
programmers and the testing duration for this method takes longer than the black box.
Hence, the testing method selected for testing the street wireless network is the black box
testing method. Reasons for choosing the black box method are as follows:
Does not require programming experts
Does not take long period to carry out the testing
Does not incur expenses.
Testing the wireless network
After the design and implementation phase, the wireless network will be tested for accuracy
using the black box testing method with the help of the “PING” command via the command line
26. Author: OLATUNDE ISMAILA 26
interface on the cisco packet tracer. From any of the wireless devices, the “PING” command will
be used to ping another wireless device at the other end by sending a request to it and if
successful, the source device will get a reply that the receiving device can be reached. It will
notify to the source device the number packet sent and those received and also the time it
takes for the device at the other end to receive the data.
Testing before and after configuration
This testing will ensure that users can communicate with each other while on the network and
also the configuration is properly done.
Using “IPconfig” to check the TCP/IP configuration.
Ping from one device to another.
Devices can be ping from one end to another.
27. Author: OLATUNDE ISMAILA 27
Testing the network authentication
As users of the network will be required to enter their authentication details before using the
network, testing the network authentication will be carried out by using a device that does not
know the user name and password of the network to try to logon to the network and if he is
28. Author: OLATUNDE ISMAILA 28
requested to enter his credentials, then the authentication is ok. But it he simply gain access to
the network then the authentication is not properly configured and anyone can easily get
access to it which is not proper. Only the inhabitants within the street are required to use the
network band they know what credentials to use.
Chapter summary
Testing the street wireless network have accurately been done and it is seen that the project
objective and aim have been met. The testing method chosen has helped me to know what to
do when it involves testing a system.
CHAPTER 6: EVALUATION
Chapter introduction
This is the evaluation phase of the wireless network design for a street and is one that involves
giving credit to the design project based on the project objectives, end-users perspectives and
designer perspective. Hence, other evaluators may come thereafter to judge what has been
design for future reasons.
Evaluation against objectives
This is an evaluation on the street wireless network based on its objectives. It will be evaluated
against the objectives of the project to ensure that the wireless device connectivity, positioning
the Wi-Fi access point antenna, and other objective part of the project was accurately carried
out. Also ensuring that the simulation, configuring and testing part of the project based on the
objective were met and the network is perfectly working.
End-users perspective
Also the street wireless network will be evaluated against end-users perspectives that is what
end-users will be expecting from the network which may be in term of its performance,
usability, scalability, robustness, quality of service, productivity and how it could be expanded
in the future.
Chapter summary
The street wireless network and design implemented, configured and tested will change life
and levels within my street as they will experience a new stage in life that they have never
29. Author: OLATUNDE ISMAILA 29
before. It will reduce transport cost, cyber café cost and will ease communication to do
research via the internet.
CHAPTER 7: CONCLUSION
Overall conclusion
Finally the project have been design and deployed and it is like a new life coming to my area as
the inhabitants will stress no more in using postal services that will take longer periods to
deliver their messages. Now the internet facility will serve them on whatever they want to do
within a short while. There will be other services that the people will benefit on like the use of
voice over IP, that making telephone calls over the internet and online chats using the internet
as this will help to reduce cost compared to making phone calls using normal telephone lines.
Reference
- Aarno, Daniel, and Jakob Engblom. Software And System Development Using Virtual
Platforms. Waltham: Morgan Kaufmann, 2015. Print.
- Carballar Falcón, José Antonio, and José Antonio Carballar. Wi-Fi. San Fernando de
Henares (Madrid): RC libros, 2010. Print.
- Chandra, Praphul. Wireless Networking. Amsterdam: Elsevier/Newnes, 2008. Print.
- Desikan, Srinivasan, and Gopalaswany Ramesh. Software Testing. Bangalore, India:
Dorling Kindersley (India), 2006. Print.
- Grady, Jeffrey O. System Requirements Analysis. Amsterdam: Elsevier Academic Press,
2006. Print.
- Saunders, Simon R. Antennas And Propagation For Wireless Communication Systems.
Chichester: Wiley, 1999. Print.