SlideShare a Scribd company logo
1 of 29
Author: OLATUNDE ISMAILA 1
ST PATRICKS INTERNATIONAL COLLEGE – LONDON
OLATUNDE ISMAILA
P1015927
SECOND YEAR HND PROJECT
STREET WIRELESS NETWORK DESIGN
Author: OLATUNDE ISMAILA 2
Acknowledgement
Haven done lot of research and attending all my lectures, I received contributions from my
project master MOHAMMED HASSAN and also from my course mate OBEN JOSEPH AYUK and I
thank GOD for giving me the strength and wisdom to concentrate throughout this two years.
Also to my mum Miss OLATUNDE and my grandfather in Nigeria who solemnly stood by me
financially, materially and spiritually to see me be an engineer and I thank them very much for
their massive contributions.
Abstract
This project brings the facts and considerations about designing wireless network for a street
based on specific requirements. The street wireless network will involve deploying wireless
antennas within that particular street, put in place the necessary protocols and the appropriate
securities for it smooth operation. Also, I will be discussing the concept of wireless network,
standard protocols, wireless antennas, authentications, and mode of access of the network.
Designing and simulating the street wireless network will be done using Smart Draw, Cisco
packet tracer and or OPNET respectively which are network designing and simulation tools. The
main aim of designing and deploying this network is to provide wireless connectivity to users
within a street in Lagos-Nigeria measured to be about 500 meters.
The concept of wireless local area network (LAN) will be discussed but not in details and also
detail of the design and implementation of the network will be discussed in the later chapters.
Author: OLATUNDE ISMAILA 3
Table of Contents
Acknowledgement..........................................................................................................................2
Abstract.........................................................................................................................................2
CHAPTER 1: INTRODUCTION................................................................................................................5
Chapter introduction.......................................................................................................................5
Project scope..................................................................................................................................5
Background....................................................................................................................................5
Problemexperience and solution.....................................................................................................6
Aim and Objective...........................................................................................................................7
Project plan and deliverables...........................................................................................................7
Project Time Line............................................................................................................................8
Chapter summary...........................................................................................................................8
CHAPTER 2: LITERATURE REVIEW.........................................................................................................8
Chapter introduction.......................................................................................................................8
DOMAIN BASED LITERATURE REVIEW..................................................................................................8
Application of wireless network.......................................................................................................8
Origin of wireless network...............................................................................................................9
How to use the wireless network.....................................................................................................9
TECHNOLOGICAL LITERATURE REVIEW...............................................................................................10
Technological specifications ..........................................................................................................10
Network and Telecommunication oriented development................................................................10
DEVELOPMENT LITERATURE REVIEW.................................................................................................12
Reviewing System Development Lifecycle (SDLC)............................................................................12
Chosen SDLC and methodology .....................................................................................................13
Benefits of the SDLC and methodology...........................................................................................13
Techniques and reasons for...........................................................................................................14
CHAPTER 3: ANALYSIS AND DESIGN ...................................................................................................14
Chapter introduction.....................................................................................................................14
Functional and Non-functional requirement analysis ......................................................................15
Techniques used to capture requirement.......................................................................................16
Problemfound during analysis.......................................................................................................17
Street network design structure ....................................................................................................18
Author: OLATUNDE ISMAILA 4
Simulation network design............................................................................................................18
Chapter summary.........................................................................................................................19
CHAPTER 4: IMPLEMENTATION .........................................................................................................20
Chapter introduction.....................................................................................................................20
Software simulationimplementation.............................................................................................20
Connection and IP addressing method...........................................................................................20
Wireless network securityimplementation ....................................................................................20
Problemfaced during implementation...........................................................................................21
Configuration methods .................................................................................................................21
Chapter summary.........................................................................................................................24
CHAPTER 5: TESTING.........................................................................................................................25
Chapter introduction.....................................................................................................................25
Testing methodology used ............................................................................................................25
Testing the wireless network.........................................................................................................25
Testing before and after configuration...........................................................................................26
Testing the network authentication...............................................................................................27
Chapter summary.........................................................................................................................28
CHAPTER 6: EVALUATION..................................................................................................................28
Chapter introduction.....................................................................................................................28
Evaluation against objectives.........................................................................................................28
End-users perspective...................................................................................................................28
Chapter summary.........................................................................................................................28
CHAPTER 7: CONCLUSION .................................................................................................................29
Overall conclusion.........................................................................................................................29
Reference.....................................................................................................................................29
Appendixes.........................................................................................Error! Bookmark not defined.
Author: OLATUNDE ISMAILA 5
CHAPTER 1: INTRODUCTION
Chapter introduction
This is a project to design and implement wireless network connectivity in a street of 200
meters in Lagos- Nigeria using devices like wireless antennas as detail about the project scope
will be discussed of in the later chapters. Designing, implementing this project will depend on
the project scope and scenario as well as the project plan and deliverables. Configurations and
all security measures will be discussed in details.
Project scope
Bono Street in Lagos-Nigeria is a newly developed street and comes be a street I was bone and
grew up from birth for 19 years. With that street there exists no internet café and even coffee
shops that has internet facilities. As a globalized world by the internet, life seems to be
uncomfortable to get facilities and one of kilometers to access the internet. So I have decided
to voluntarily setup an internet connection using Wi-Fi antennas within my street so that
everyone living there will benefit from it.
The street is measured to be 500 meters in length with limited wide range of houses. Users
within that street will be able to access the internet services from their mobile devices like
laptops, tablets, mobile phones, PDA, etc. and might be or not configured with authentications.
But if configured with authentication, they will require entering the street name as username
and housing number for the password. All the other equipment’s like routers and switching
infrastructures will be designed and kept out of users reach and it will be a very scalable,
reliable, fault-tolerant and manageable network.
Background
The design and implementation of this network came from my self-imagination as I know the
benefits of global infrastructure (internet) and I have seen how I and my people don’t benefit
from this infrastructure services. From my two years of studies at St-Patrick’s college London, I
have done series of coursework which are in the form of small projects for which I have learned
and researched more of networking technology especially the wireless network and how it
works.
Author: OLATUNDE ISMAILA 6
Also from sources like YouTube videos, journals, cisco tutorials, and online books, this have
motivated me and made me capable of designing such an infrastructure to reduce stress on the
people. I have studies the area in detail, put in place the functional and nonfunctional
requirement to facilitate the design and implementation of the project. It will indeed change
lives within my community especially to students and educators.
Problem experience and solution
There are many problems that prompted me to design and implement a wireless network in
the street in Lagos and are due to the community not getting to know the world through the
internet. The internet has become today a source of information, learning and communication.
The indigence suffer a lot especially colleges and universities who just know that something
exists like the internet with great features and benefits but have no access to such services.
Everyone within the street will have access to the wireless internet with just limited restrictions
and big questions is how to keep its performance at the peak as multiple users will be using the
network concurrently.
Solutions
Indeed the big answer is ‘’Yes’’, there is a solution to the above problem. In implementing the
wireless network to the above problem, It is known that there are many different types of
wireless connectivity ranging from wireless networks to wireless devices and to keep the
performance to the peak, it will depend on what type and what devices are been chosen.
Hence, wireless antenna will be used to remedy the above problem and the exact one to be
used is the wireless access point antenna (Multiple Direction Antennas) which will either be
mounted on a tall tower or within buildings. Detail of its design, implementation and testing
will be discussed in the later chapters.
Author: OLATUNDE ISMAILA 7
Aim and Objective
AIM
The aim of this project is to design and implement wireless network connectivity using wireless
access point antennas which will be deployed on or within buildings to enable internet
connectivity. Also the technology of wireless network and the wireless LAN will be discussed in
brief.
OBJECTIVE
The objective part of this project is to design, implement, test and simulate the wireless
network using the following respective tools; Smart Draw, Cisco Packet Tracer or OPNET. Also
implementing the appropriate protocols will be discussed in the later chapters.
Project plan and deliverables
The table below shows the structure by which I will use to complete the entire project and
other related tasks:
ACTIVITY FROM TO
Project initial stage 20/09/2014 26/09/2014
Proposal 27/09/2014 17/10/2014
Project requirements 18/10/2014 24/10/2014
Project topic research 25/10/2014 08/11/2014
Literature review 09/11/2014 07/12/2014
Gathering requirements 08/12/2014 10/01/2015 + Break
Analysis and design 11/01/2015 09/02/2015
Functional and non-functional requirement 10/02/2015 23/02/2015
Network architecture 24/02/2015 22/03/2015
Simulation design 23/03/2015 + Break 15/05/2015
Implementation 16/05/2015 14/06/2015
Testing phrase 15/06/2015 16/07/2015
Network evaluation 17/07/2015 30/07/2015
Author: OLATUNDE ISMAILA 8
Documentation 31/07/2015 06/08/2015
Project Time Line
Chapter summary
While waiting to deliver the best and most reliable source of communication to my people, I
have introduced the chapter and all what that has to be done is explained. The wireless
network will detailed be explained below and whatever benefits it will offer.
CHAPTER 2: LITERATURE REVIEW
Chapter introduction
This chapter will lead to the aspect of reviewing the relevant product sub-topics and will
ensure that wireless network be explained in details, the lifecycle and development
methodology used and the applicable network technology specifications.
DOMAIN BASED LITERATURE REVIEW
Application of wireless network
Chandra, Praphul, 2008
Wireless technology comes in many different forms and is seen to be a technology that allows
one to send and receive data wirelessly from two or multiple wireless devices. It has globalize
the world and is seen to be the fastest and most reliable medium of communication and has
come with different technologies and bandwidths. It most widely used medium of
communication is the radio wave (free space medium).
Author: OLATUNDE ISMAILA 9
Examples of wireless devices could be;
 Laptop
 Mobile phones
 PDA
 Tablets
 IPad etc
Some benefits of the application and benefits offered by wireless technologies are;
1. It offers mobility services as can access data fromany location
2. Reach ability services as users are better connected
3. Can easily be installed
4. Less maintenance cost
5. Offers services for SMS and MMS.
Origin of wireless network
Chandra, Praphul, 2008
Before the invention and application of wireless network, people were using the wired
network for data transfer and other communication services. The wireless network or
technology started from telegraph and telephony, radio and television and finally from
computer network to the internet.
But for wireless fidelity (Wi-Fi) network to be designed for my community; at first they were
using the traditional means of communication to convey messages and other communication
services from one location to another like the local postal services which takes a long period to
deliver messages. The wireless networks today have come with great features and provide
better services to meet ones need.
How to use the wireless network
Using the wireless network (Wi-Fi) is simple as everyone within that street through their
wireless devices will be required to enter the user name and password which is the street name
Author: OLATUNDE ISMAILA 10
for user name and house number for password. After doing this, he will be connected to the
network named “Street Wi-Fi” and then start using the internet for whatever he intends to.
Uses will not have to know the actual location of the Wi-Fi infrastructure and authentication
but will have to use its services as long as he or she wants. Hence, the wireless access point
antennas will be mounted either on towers or on the buildings for free and fast access.
TECHNOLOGICAL LITERATURE REVIEW
Technological specifications
From my project top and its related functionalities, the chosen technology for reviewing is the
network and telecommunication oriented development. I will have to review multiple wireless
networks (Wi-Fi) so as to get a clear knowledge on how it works.
Network and Telecommunication oriented development
Reviewing the Merging of Outdoor and Indoor Wi-Fi
This is an outdoor wireless network architecture which is the same as my proposed wireless
network to be designed for my community. The network shows that it is the merging of indoor
Wi-Fi network purposely designed to meet the clients need. Also the wireless antenna is in the
same line of sight with the client CPE (client-customer premises equipment) and an institution.
Hence, the software on the outdoor Wi-Fi device addresses the specific application need for
wireless local area network (WLAN) application deployment.
HARDWARE
Router  Cisco or other wireless routers
Wireless antenna  Integrated bridge/ AP solution
 WLG2000 PMP Bridge
Residential antenna  Client CPE
Author: OLATUNDE ISMAILA 11
Reviewing Wi-Fi antennas for Multiple Connections
These wireless networks (Wi-Fi) have the capability of connecting mobile users, business users
and home users. The home and the business wireless access point antenna are connected to
the WISP main antenna likewise the mobile user’s antenna.
HARDWARE
Wireless Antenna  OWL400 (AP MODE)
 OWL400 (CPE MODE)
 OWL800
Layer 3 switch  Cisco Catalyst
Laptops  CPU- 3.8GHz
Author: OLATUNDE ISMAILA 12
Reviewing a Community Wi-Fi Network
This is a community wireless network systemthat is deployed in almost all areas of the street
of that community and this is to enable wireless connectivity. It also offers wireless,
connectivity to metro busses for which passengers can use the internet when traveling. This is a
very cost effective network that delivers high-capacity, high- reliability, and multi- service
networks.
HARDWARE
Wi-Fi antenna  MIMO Antenna
Router  DSL
 IEEE 802 PROTOCOL
DEVELOPMENT LITERATURE REVIEW
Reviewing System Development Lifecycle (SDLC)
Aarno, Daniel, and Jakob Engblom, 2005
System development lifecycle (SDLC) is the step-by-step application development lifecycle in
system, information system and software engineering to describe a process for planning,
Author: OLATUNDE ISMAILA 13
analyzing, design, and implementation for deploying an information system. SDLC provides the
detail processes, that are required for planning, executing and managing a system and it
contain the following types and their development methodologies;
SDLC Methodology
Waterfall SDLC Structured System Analysis and Development
Methodology (SSADM)
Spiral SDLC Extreme Programming (XP)
Iterative and Incremental SDLC Rapid Application Development (RAD), ICONIX, and
SCRUM
V-Model SDLC V-Model methodology
Chosen SDLC and methodology
The chosen system development lifecycle and development methodology for my project is the
V-model which is one that executes processes in sequential manner in V-SHAPE. It is also known
be as a verification and validation model for systems development. Testing processes using the
V-model is planned in parallel with a corresponding phase of development. Hence, the
verification phase takes place on one side of the V, and validation phase takes place on the
other side.
Benefits of the SDLC and methodology
As explained above, some of the benefits or reasons that made me choose the V-SHAPE model
system developments are;
1. V-MODEL is simple and easy to implement and use.
2. With V-MODEL, defects are found at early stage of the project
3. V-MODEL works well for small scale projects with well understood requirements.
4. V-MODEL is a highly disciplined model and stages are completed one at a time
V-model can easily be managed due to its rigidity as each stage has specific deliveries and a
review process.
Author: OLATUNDE ISMAILA 14
Techniques and reasons for
For the realization of this project, that is the design, implementation and testing, I WILL USE
THE CISCO PACKET TRACER TOOL TO DEMONSTRATE IT. Cisco packet tracer is a networking tool
that provides multiple opportunities for one to demonstrate networking concepts and also
have a platform that allows one to practice using the command-line interface (CLI). It comes
with great features like simulation features that will enable me to design, implement, test and
simulate the wireless network I am setting up for the community.
Some of the reasons for choosing cisco packet tracer are;
1. It supports all the protocols on the TCP/IP suit.
2. Can be used for designing, configuring and testing networking.
3. It provides the logical and physical workplace
4. Provides real-time and simulation modes as networking is concerned
5. Applicable for LAN, switching, TCP/IP, routing and WAN protocols.
CHAPTER 3: ANALYSIS AND DESIGN
Chapter introduction
This chapter will requires the discussion being focused on how the wireless network for the
community will be analyzed and designed. Also discussing on the functional and nonfunctional
requirement, the applicable techniques for capturing the requirement and the simulation
process will take place.
Author: OLATUNDE ISMAILA 15
Functional and Non-functional requirement analysis
Function requirement
Function requirement in this context will define the functions of the system(wireless network)
and the available components which are a set of inputs, behavior and output of the system.
Hence, it will specify documented operation and activities that the wireless network system
must be able to perform.
Examples of these functional requirements could be;
 Authentication
 Business rules to be carried out
 Operation of the network devices, etc.
Functional requirements found on the wireless network are;
Component Description Justification Image
Router (wireless) Linksys E900 For routing and wireless
connectivity
Modem Belkin Wi-Fi
802.11n
To work together with the
router while connecting to
the antenna
Wireless Antenna COL2406 Antenna To enable wireless
connectivity within the
street
Author: OLATUNDE ISMAILA 16
Cable CAT6 SFTP Ethernet For connections between
the router/modem and the
antenna
Non- functional requirement
Non- functional requirement in this context describes the attribute of the design network
system like security, reliability, maintainability scalability and usability. Non-functional
requirement will also involve or be constraints or restrictions on the designed network system.
Examples of these non-functional requirements could be;
 Accessibility
 Backup
 Efficiency
 Portability
 Security
 Safety
 Software, tools and standards
 Recovery, etc.
Techniques used to capture requirement
The various techniques used in capturing the functional requirements of the street network
design are as follows;
Techniques Explanation
Feasibility studies Feasibility studies was one of the techniques used and it was
carried out by assessing the practicality of the proposed plan;
that is by analyzing the ability to complete the proposed project
Author: OLATUNDE ISMAILA 17
successfully considering the following factors;
 Economic factors
 Technological factors
Interview With this technique, users of the network were interviewed
based on the existing systemin order for the designer to get to
know details about it. He may conclude by upgrading it or
proceeding to design a new one.
Questionnaire The questionnaire technique was also used as a way of
capturing requirements and it was done by questioning users
individually and in groups about the system to be designed. The
direct and indirect questioning was used.
Observation The direct and indirect observation has been carried out by
studying the project environment and it users as this will help
the analyst to know the following;
 What has to be done
 When they have to be done
 The duration to do it
 Why it has been done
Problem found during analysis
For the proposed network, no problem was experienced during the analysis part of it as the
existing systemwas analyzed, functional and nonfunctional requirement has also been
analyzed. The simulation software chosen was able to run my computer that runs on Microsoft
windows 7 as it is the latest pc and software compared to the Macintosh machines which will
require additional software to make it compatible with the chosen simulation tool (cisco packet
tracer).
Author: OLATUNDE ISMAILA 18
Street network design structure
The above diagram is demonstrating how users within a street access internet via a Wi-Fi
access point antenna from any location.
Simulation network design
Author: OLATUNDE ISMAILA 19
The above simulation is for the wireless network design for a street whereby users can access
internet within that street by entering the SSID and the WEP (Wired Equivalent Privacy for IEEE
802.11). Entering these details will enable them access to the network at any time. The Wi-Fi
antenna is shown above where all the other devices are connected to it like the router/Modem,
connectivity components and other devices.
Chapter summary
The analysis and design have been done according to the project aimand objectives and the
actual network and simulation was design using their appropriate software tools. We now
proceed with the implementation part of the project.
Author: OLATUNDE ISMAILA 20
CHAPTER 4: IMPLEMENTATION
Chapter introduction
The implementation part of the street wireless network proposal will focus on explaining how
the simulation, connectivity, IP address technique, security and the configuration part of it will
be implemented.
Software simulation implementation
The cisco packet tracer simulation software was used for designing the wireless network and
simulating it to work in the real world practice. The packet tracer software allows the
configuration of wireless devices and wireless access points for users to access wireless internet
within a particular area.
It would cost a of money in physically buying all the equipment to be used for this project like
the wireless access point antenna etc. but this simulation comes with all this features and have
helped me to save cash.
Connection and IP addressing method
The connectivity of the network takes place wirelessly except the Wi-Fi access point antennas
which will be mount every 50 meters to ensure that users get full network within that street at
any time and at high speed. The Wi-Fi access point antennas will constitute devices like the
COL2406 antenna, CAT6 SFTP Ethernet, router/modem all mounted on a single tower to
perform this task.
As for the IP addressing assignment, the router will be configured DHCP and when any wireless
device is connected to the network, it will receive or it will be assigned with an IP address.
Hence, it was same like a home network whose router is already configured by the internet
service provider (ISP).
Wireless network security implementation
The security part of this network will be configured on the router using a range of mechanisms
and it will also ensure that users of the network will be required to enter their authentication
credentials that are username and password before they can access the internet.
Author: OLATUNDE ISMAILA 21
Other security measures that will be put in place is how to manage and monitor the wireless
network from an unauthorized access and also heavy traffics. Some of the management and
monitoring tools for the wireless networks are;
 CommView for Wi-Fi: it is a packet sniffer for wireless network and ensures that packets
will be captured and also searches for specific strings and packet types. It has the
capability of altering network admins when there is traffic. Hence, it helps to improve
Wi-Fi security.
 Wireless wizard: this tool was designed in order to get the best possible performance
from Wi-Fi networks. It also has features for diagnosing the network and for testing the
network performance.
 Wireless key generator: it is a tool designed for improving wireless network security
and on this tool; network admins can specify the required security type and key
strength. It also generates random key encryptions for applications which then minimize
the temptation to use simple keys that can easily be hack able.
Problem faced during implementation
Actually, there was a problem faced during implementation which was that on the cisco packet
tracer software it does not have devices like the Wi-Fi access point antenna. Meanwhile my
project was based on using wireless point antenna, positioning them at a certain range on the
street so as to provide wireless connectivity.
So the solution to this problem was to use the normal wireless access points to simply
simulate the network. The normal wireless access point will now act as the Wi-Fi success point
antennas so as to be able to simulate it.
Configuration methods
Sample of wireless devices and components and their mode are used to access the internet.
Author: OLATUNDE ISMAILA 22
Below is the interface of the wireless router on the Wi-Fi antenna that is configured for
authentication.
Configuring the required authentications for the router for which users will require to enter
before they can connect to the network. That is the wired equivalent privacy (WEP).
Author: OLATUNDE ISMAILA 23
Configuring internet protocol address such that wireless devices can get IP addresses
automatically.
Author: OLATUNDE ISMAILA 24
Basic wireless settings
Configuring user devices for Wi-Fi connection.
Chapter summary
The implementation phase of the network is completed but the only issue was the lack of
certain wireless network devices like the Wi-Fi access point antenna which will be replaced by
the normal wireless access point in order to be able to simulate the network. But in real-life
implementation, the Wi-Fi access point antennas will be used.
Author: OLATUNDE ISMAILA 25
CHAPTER 5: TESTING
Chapter introduction
Testing the wireless network will ensure that errors are detected so that it should not be
experienced during or after it have been put to use. The network configuration will be tested
using ranges of methods that will be described below and one of it will be choosing to carry on
the testing part of the project
Testing methodology used
There are two possible methodologies that will be described below and this methodologies are
processes that are been carried out on a system in order to ensure that it is working according
to the aim and objectives of the project. The two testing methods are;
 Black box testing
 White box testing
The black box testing technique is one of the simplest and easy to use testing methods
especially on the Wi-Fi network design for a street. It does involve coding processes, less
expensive and this testing requires just a little knowledge on what is required to be done.
The white box testing method is one that requires high level of programming skills and the
tester must know or have good knowledge on what exist in the box and what is to be done.
It is one of the most expensive testing methods as it will be required to hire highly qualified
programmers and the testing duration for this method takes longer than the black box.
Hence, the testing method selected for testing the street wireless network is the black box
testing method. Reasons for choosing the black box method are as follows:
 Does not require programming experts
 Does not take long period to carry out the testing
 Does not incur expenses.
Testing the wireless network
After the design and implementation phase, the wireless network will be tested for accuracy
using the black box testing method with the help of the “PING” command via the command line
Author: OLATUNDE ISMAILA 26
interface on the cisco packet tracer. From any of the wireless devices, the “PING” command will
be used to ping another wireless device at the other end by sending a request to it and if
successful, the source device will get a reply that the receiving device can be reached. It will
notify to the source device the number packet sent and those received and also the time it
takes for the device at the other end to receive the data.
Testing before and after configuration
This testing will ensure that users can communicate with each other while on the network and
also the configuration is properly done.
Using “IPconfig” to check the TCP/IP configuration.
Ping from one device to another.
Devices can be ping from one end to another.
Author: OLATUNDE ISMAILA 27
Testing the network authentication
As users of the network will be required to enter their authentication details before using the
network, testing the network authentication will be carried out by using a device that does not
know the user name and password of the network to try to logon to the network and if he is
Author: OLATUNDE ISMAILA 28
requested to enter his credentials, then the authentication is ok. But it he simply gain access to
the network then the authentication is not properly configured and anyone can easily get
access to it which is not proper. Only the inhabitants within the street are required to use the
network band they know what credentials to use.
Chapter summary
Testing the street wireless network have accurately been done and it is seen that the project
objective and aim have been met. The testing method chosen has helped me to know what to
do when it involves testing a system.
CHAPTER 6: EVALUATION
Chapter introduction
This is the evaluation phase of the wireless network design for a street and is one that involves
giving credit to the design project based on the project objectives, end-users perspectives and
designer perspective. Hence, other evaluators may come thereafter to judge what has been
design for future reasons.
Evaluation against objectives
This is an evaluation on the street wireless network based on its objectives. It will be evaluated
against the objectives of the project to ensure that the wireless device connectivity, positioning
the Wi-Fi access point antenna, and other objective part of the project was accurately carried
out. Also ensuring that the simulation, configuring and testing part of the project based on the
objective were met and the network is perfectly working.
End-users perspective
Also the street wireless network will be evaluated against end-users perspectives that is what
end-users will be expecting from the network which may be in term of its performance,
usability, scalability, robustness, quality of service, productivity and how it could be expanded
in the future.
Chapter summary
The street wireless network and design implemented, configured and tested will change life
and levels within my street as they will experience a new stage in life that they have never
Author: OLATUNDE ISMAILA 29
before. It will reduce transport cost, cyber café cost and will ease communication to do
research via the internet.
CHAPTER 7: CONCLUSION
Overall conclusion
Finally the project have been design and deployed and it is like a new life coming to my area as
the inhabitants will stress no more in using postal services that will take longer periods to
deliver their messages. Now the internet facility will serve them on whatever they want to do
within a short while. There will be other services that the people will benefit on like the use of
voice over IP, that making telephone calls over the internet and online chats using the internet
as this will help to reduce cost compared to making phone calls using normal telephone lines.
Reference
- Aarno, Daniel, and Jakob Engblom. Software And System Development Using Virtual
Platforms. Waltham: Morgan Kaufmann, 2015. Print.
- Carballar Falcón, José Antonio, and José Antonio Carballar. Wi-Fi. San Fernando de
Henares (Madrid): RC libros, 2010. Print.
- Chandra, Praphul. Wireless Networking. Amsterdam: Elsevier/Newnes, 2008. Print.
- Desikan, Srinivasan, and Gopalaswany Ramesh. Software Testing. Bangalore, India:
Dorling Kindersley (India), 2006. Print.
- Grady, Jeffrey O. System Requirements Analysis. Amsterdam: Elsevier Academic Press,
2006. Print.
- Saunders, Simon R. Antennas And Propagation For Wireless Communication Systems.
Chichester: Wiley, 1999. Print.

More Related Content

Viewers also liked

Gender Differences on Interacting Effects of Marriage & Health Insurance on C...
Gender Differences on Interacting Effects of Marriage & Health Insurance on C...Gender Differences on Interacting Effects of Marriage & Health Insurance on C...
Gender Differences on Interacting Effects of Marriage & Health Insurance on C...Cross-Validation & Knowledge Translation
 
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477Marcela Daniela Gutierrez
 
virtual reality | latest |best presentation
virtual reality | latest |best presentationvirtual reality | latest |best presentation
virtual reality | latest |best presentationvipin mishra
 
Regolamento concorso letterario poesie per armonie 2016
Regolamento concorso letterario poesie per armonie 2016Regolamento concorso letterario poesie per armonie 2016
Regolamento concorso letterario poesie per armonie 2016Stella Peppe Lidia Piero
 
Deberes de las personas que publican en la
Deberes de las personas que publican en laDeberes de las personas que publican en la
Deberes de las personas que publican en laJennifer Reinel
 
Business Valuations, Business Plans and Business Projections Explained!
Business Valuations, Business Plans and Business Projections Explained!Business Valuations, Business Plans and Business Projections Explained!
Business Valuations, Business Plans and Business Projections Explained!Kunal Kamath Sarpal
 
The self(less) publisher what can game theory teach us about open data
The self(less) publisher  what can game theory teach us about open dataThe self(less) publisher  what can game theory teach us about open data
The self(less) publisher what can game theory teach us about open dataBenjamin Cave
 
International journal of Software Engineering & Applications (IJSEA)
International journal of Software Engineering & Applications (IJSEA)International journal of Software Engineering & Applications (IJSEA)
International journal of Software Engineering & Applications (IJSEA)ijseajournal
 
Seguridad, privacidad y medidas de prevención2
Seguridad, privacidad y medidas de prevención2Seguridad, privacidad y medidas de prevención2
Seguridad, privacidad y medidas de prevención2Arely Pliego
 

Viewers also liked (20)

PKI
PKIPKI
PKI
 
Ijeet 07 05_001
Ijeet 07 05_001Ijeet 07 05_001
Ijeet 07 05_001
 
Gender Differences on Interacting Effects of Marriage & Health Insurance on C...
Gender Differences on Interacting Effects of Marriage & Health Insurance on C...Gender Differences on Interacting Effects of Marriage & Health Insurance on C...
Gender Differences on Interacting Effects of Marriage & Health Insurance on C...
 
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477
Dialnet didactica delasfuncioneslinealesy-cuadraticasasistid-4230477
 
Sistemas operativos 1[1]
Sistemas operativos 1[1]Sistemas operativos 1[1]
Sistemas operativos 1[1]
 
Los virus
Los virusLos virus
Los virus
 
Redes 3
Redes 3Redes 3
Redes 3
 
virtual reality | latest |best presentation
virtual reality | latest |best presentationvirtual reality | latest |best presentation
virtual reality | latest |best presentation
 
Regolamento concorso letterario poesie per armonie 2016
Regolamento concorso letterario poesie per armonie 2016Regolamento concorso letterario poesie per armonie 2016
Regolamento concorso letterario poesie per armonie 2016
 
Deberes de las personas que publican en la
Deberes de las personas que publican en laDeberes de las personas que publican en la
Deberes de las personas que publican en la
 
Business Valuations, Business Plans and Business Projections Explained!
Business Valuations, Business Plans and Business Projections Explained!Business Valuations, Business Plans and Business Projections Explained!
Business Valuations, Business Plans and Business Projections Explained!
 
The self(less) publisher what can game theory teach us about open data
The self(less) publisher  what can game theory teach us about open dataThe self(less) publisher  what can game theory teach us about open data
The self(less) publisher what can game theory teach us about open data
 
Energía solar
Energía solarEnergía solar
Energía solar
 
International journal of Software Engineering & Applications (IJSEA)
International journal of Software Engineering & Applications (IJSEA)International journal of Software Engineering & Applications (IJSEA)
International journal of Software Engineering & Applications (IJSEA)
 
Coffe cat's
Coffe cat'sCoffe cat's
Coffe cat's
 
Seguridad, privacidad y medidas de prevención2
Seguridad, privacidad y medidas de prevención2Seguridad, privacidad y medidas de prevención2
Seguridad, privacidad y medidas de prevención2
 
Normas apa
Normas apaNormas apa
Normas apa
 
Aplicações android
Aplicações androidAplicações android
Aplicações android
 
Desenvolvimento Linux
Desenvolvimento LinuxDesenvolvimento Linux
Desenvolvimento Linux
 
Conhecendo o Android
Conhecendo o AndroidConhecendo o Android
Conhecendo o Android
 

Similar to HND PROJECT FOR OLATUNDE ISMAILA 1 1 (1)

FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORTSoham Wadekar
 
Building the hyperconnected society
Building the hyperconnected societyBuilding the hyperconnected society
Building the hyperconnected societyLittle Daisy
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network Shashank Narayan
 
Front Matter Smart Grid Communications
Front Matter Smart Grid CommunicationsFront Matter Smart Grid Communications
Front Matter Smart Grid Communicationsapoorvkhare
 
Evaluation of Real-Time Communication in IoT Services by WebRTC
Evaluation of Real-Time Communication in IoT Services by WebRTCEvaluation of Real-Time Communication in IoT Services by WebRTC
Evaluation of Real-Time Communication in IoT Services by WebRTCChandan Sarkar
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3Abub6666
 
Network Basics (printouts)
Network Basics (printouts)Network Basics (printouts)
Network Basics (printouts)wx672
 
Manuscrit de Doctorat_El Abdellaouy Hanane
Manuscrit de Doctorat_El Abdellaouy HananeManuscrit de Doctorat_El Abdellaouy Hanane
Manuscrit de Doctorat_El Abdellaouy HananeElabdellaouy Hanane
 
Computer networking-principles-bonaventure-1-30-31-otc1
Computer networking-principles-bonaventure-1-30-31-otc1Computer networking-principles-bonaventure-1-30-31-otc1
Computer networking-principles-bonaventure-1-30-31-otc1javibadi
 
Professional networking online A qualitative study of LinkedIn use in Norway ...
Professional networking online A qualitative study of LinkedIn use in Norway ...Professional networking online A qualitative study of LinkedIn use in Norway ...
Professional networking online A qualitative study of LinkedIn use in Norway ...Oscar Trimboli
 
exfo_reference-guide-local-loop-dsl-v1_en.pdf
exfo_reference-guide-local-loop-dsl-v1_en.pdfexfo_reference-guide-local-loop-dsl-v1_en.pdf
exfo_reference-guide-local-loop-dsl-v1_en.pdfMohamedshabana38
 

Similar to HND PROJECT FOR OLATUNDE ISMAILA 1 1 (1) (20)

FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORT
 
Building the hyperconnected society
Building the hyperconnected societyBuilding the hyperconnected society
Building the hyperconnected society
 
978-3-659-82929-1
978-3-659-82929-1978-3-659-82929-1
978-3-659-82929-1
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
 
Front Matter Smart Grid Communications
Front Matter Smart Grid CommunicationsFront Matter Smart Grid Communications
Front Matter Smart Grid Communications
 
Evaluation of Real-Time Communication in IoT Services by WebRTC
Evaluation of Real-Time Communication in IoT Services by WebRTCEvaluation of Real-Time Communication in IoT Services by WebRTC
Evaluation of Real-Time Communication in IoT Services by WebRTC
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3
 
Ospf Design Guide
Ospf Design GuideOspf Design Guide
Ospf Design Guide
 
12.06.2014
12.06.201412.06.2014
12.06.2014
 
Network Basics (printouts)
Network Basics (printouts)Network Basics (printouts)
Network Basics (printouts)
 
thesis
thesisthesis
thesis
 
thesis
thesisthesis
thesis
 
Manuscrit de Doctorat_El Abdellaouy Hanane
Manuscrit de Doctorat_El Abdellaouy HananeManuscrit de Doctorat_El Abdellaouy Hanane
Manuscrit de Doctorat_El Abdellaouy Hanane
 
Computer networking-principles-bonaventure-1-30-31-otc1
Computer networking-principles-bonaventure-1-30-31-otc1Computer networking-principles-bonaventure-1-30-31-otc1
Computer networking-principles-bonaventure-1-30-31-otc1
 
report
reportreport
report
 
My PhD Thesis
My PhD Thesis My PhD Thesis
My PhD Thesis
 
Professional networking online A qualitative study of LinkedIn use in Norway ...
Professional networking online A qualitative study of LinkedIn use in Norway ...Professional networking online A qualitative study of LinkedIn use in Norway ...
Professional networking online A qualitative study of LinkedIn use in Norway ...
 
Metro ethernet-dg
Metro ethernet-dgMetro ethernet-dg
Metro ethernet-dg
 
Broadband Technology
Broadband TechnologyBroadband Technology
Broadband Technology
 
exfo_reference-guide-local-loop-dsl-v1_en.pdf
exfo_reference-guide-local-loop-dsl-v1_en.pdfexfo_reference-guide-local-loop-dsl-v1_en.pdf
exfo_reference-guide-local-loop-dsl-v1_en.pdf
 

HND PROJECT FOR OLATUNDE ISMAILA 1 1 (1)

  • 1. Author: OLATUNDE ISMAILA 1 ST PATRICKS INTERNATIONAL COLLEGE – LONDON OLATUNDE ISMAILA P1015927 SECOND YEAR HND PROJECT STREET WIRELESS NETWORK DESIGN
  • 2. Author: OLATUNDE ISMAILA 2 Acknowledgement Haven done lot of research and attending all my lectures, I received contributions from my project master MOHAMMED HASSAN and also from my course mate OBEN JOSEPH AYUK and I thank GOD for giving me the strength and wisdom to concentrate throughout this two years. Also to my mum Miss OLATUNDE and my grandfather in Nigeria who solemnly stood by me financially, materially and spiritually to see me be an engineer and I thank them very much for their massive contributions. Abstract This project brings the facts and considerations about designing wireless network for a street based on specific requirements. The street wireless network will involve deploying wireless antennas within that particular street, put in place the necessary protocols and the appropriate securities for it smooth operation. Also, I will be discussing the concept of wireless network, standard protocols, wireless antennas, authentications, and mode of access of the network. Designing and simulating the street wireless network will be done using Smart Draw, Cisco packet tracer and or OPNET respectively which are network designing and simulation tools. The main aim of designing and deploying this network is to provide wireless connectivity to users within a street in Lagos-Nigeria measured to be about 500 meters. The concept of wireless local area network (LAN) will be discussed but not in details and also detail of the design and implementation of the network will be discussed in the later chapters.
  • 3. Author: OLATUNDE ISMAILA 3 Table of Contents Acknowledgement..........................................................................................................................2 Abstract.........................................................................................................................................2 CHAPTER 1: INTRODUCTION................................................................................................................5 Chapter introduction.......................................................................................................................5 Project scope..................................................................................................................................5 Background....................................................................................................................................5 Problemexperience and solution.....................................................................................................6 Aim and Objective...........................................................................................................................7 Project plan and deliverables...........................................................................................................7 Project Time Line............................................................................................................................8 Chapter summary...........................................................................................................................8 CHAPTER 2: LITERATURE REVIEW.........................................................................................................8 Chapter introduction.......................................................................................................................8 DOMAIN BASED LITERATURE REVIEW..................................................................................................8 Application of wireless network.......................................................................................................8 Origin of wireless network...............................................................................................................9 How to use the wireless network.....................................................................................................9 TECHNOLOGICAL LITERATURE REVIEW...............................................................................................10 Technological specifications ..........................................................................................................10 Network and Telecommunication oriented development................................................................10 DEVELOPMENT LITERATURE REVIEW.................................................................................................12 Reviewing System Development Lifecycle (SDLC)............................................................................12 Chosen SDLC and methodology .....................................................................................................13 Benefits of the SDLC and methodology...........................................................................................13 Techniques and reasons for...........................................................................................................14 CHAPTER 3: ANALYSIS AND DESIGN ...................................................................................................14 Chapter introduction.....................................................................................................................14 Functional and Non-functional requirement analysis ......................................................................15 Techniques used to capture requirement.......................................................................................16 Problemfound during analysis.......................................................................................................17 Street network design structure ....................................................................................................18
  • 4. Author: OLATUNDE ISMAILA 4 Simulation network design............................................................................................................18 Chapter summary.........................................................................................................................19 CHAPTER 4: IMPLEMENTATION .........................................................................................................20 Chapter introduction.....................................................................................................................20 Software simulationimplementation.............................................................................................20 Connection and IP addressing method...........................................................................................20 Wireless network securityimplementation ....................................................................................20 Problemfaced during implementation...........................................................................................21 Configuration methods .................................................................................................................21 Chapter summary.........................................................................................................................24 CHAPTER 5: TESTING.........................................................................................................................25 Chapter introduction.....................................................................................................................25 Testing methodology used ............................................................................................................25 Testing the wireless network.........................................................................................................25 Testing before and after configuration...........................................................................................26 Testing the network authentication...............................................................................................27 Chapter summary.........................................................................................................................28 CHAPTER 6: EVALUATION..................................................................................................................28 Chapter introduction.....................................................................................................................28 Evaluation against objectives.........................................................................................................28 End-users perspective...................................................................................................................28 Chapter summary.........................................................................................................................28 CHAPTER 7: CONCLUSION .................................................................................................................29 Overall conclusion.........................................................................................................................29 Reference.....................................................................................................................................29 Appendixes.........................................................................................Error! Bookmark not defined.
  • 5. Author: OLATUNDE ISMAILA 5 CHAPTER 1: INTRODUCTION Chapter introduction This is a project to design and implement wireless network connectivity in a street of 200 meters in Lagos- Nigeria using devices like wireless antennas as detail about the project scope will be discussed of in the later chapters. Designing, implementing this project will depend on the project scope and scenario as well as the project plan and deliverables. Configurations and all security measures will be discussed in details. Project scope Bono Street in Lagos-Nigeria is a newly developed street and comes be a street I was bone and grew up from birth for 19 years. With that street there exists no internet café and even coffee shops that has internet facilities. As a globalized world by the internet, life seems to be uncomfortable to get facilities and one of kilometers to access the internet. So I have decided to voluntarily setup an internet connection using Wi-Fi antennas within my street so that everyone living there will benefit from it. The street is measured to be 500 meters in length with limited wide range of houses. Users within that street will be able to access the internet services from their mobile devices like laptops, tablets, mobile phones, PDA, etc. and might be or not configured with authentications. But if configured with authentication, they will require entering the street name as username and housing number for the password. All the other equipment’s like routers and switching infrastructures will be designed and kept out of users reach and it will be a very scalable, reliable, fault-tolerant and manageable network. Background The design and implementation of this network came from my self-imagination as I know the benefits of global infrastructure (internet) and I have seen how I and my people don’t benefit from this infrastructure services. From my two years of studies at St-Patrick’s college London, I have done series of coursework which are in the form of small projects for which I have learned and researched more of networking technology especially the wireless network and how it works.
  • 6. Author: OLATUNDE ISMAILA 6 Also from sources like YouTube videos, journals, cisco tutorials, and online books, this have motivated me and made me capable of designing such an infrastructure to reduce stress on the people. I have studies the area in detail, put in place the functional and nonfunctional requirement to facilitate the design and implementation of the project. It will indeed change lives within my community especially to students and educators. Problem experience and solution There are many problems that prompted me to design and implement a wireless network in the street in Lagos and are due to the community not getting to know the world through the internet. The internet has become today a source of information, learning and communication. The indigence suffer a lot especially colleges and universities who just know that something exists like the internet with great features and benefits but have no access to such services. Everyone within the street will have access to the wireless internet with just limited restrictions and big questions is how to keep its performance at the peak as multiple users will be using the network concurrently. Solutions Indeed the big answer is ‘’Yes’’, there is a solution to the above problem. In implementing the wireless network to the above problem, It is known that there are many different types of wireless connectivity ranging from wireless networks to wireless devices and to keep the performance to the peak, it will depend on what type and what devices are been chosen. Hence, wireless antenna will be used to remedy the above problem and the exact one to be used is the wireless access point antenna (Multiple Direction Antennas) which will either be mounted on a tall tower or within buildings. Detail of its design, implementation and testing will be discussed in the later chapters.
  • 7. Author: OLATUNDE ISMAILA 7 Aim and Objective AIM The aim of this project is to design and implement wireless network connectivity using wireless access point antennas which will be deployed on or within buildings to enable internet connectivity. Also the technology of wireless network and the wireless LAN will be discussed in brief. OBJECTIVE The objective part of this project is to design, implement, test and simulate the wireless network using the following respective tools; Smart Draw, Cisco Packet Tracer or OPNET. Also implementing the appropriate protocols will be discussed in the later chapters. Project plan and deliverables The table below shows the structure by which I will use to complete the entire project and other related tasks: ACTIVITY FROM TO Project initial stage 20/09/2014 26/09/2014 Proposal 27/09/2014 17/10/2014 Project requirements 18/10/2014 24/10/2014 Project topic research 25/10/2014 08/11/2014 Literature review 09/11/2014 07/12/2014 Gathering requirements 08/12/2014 10/01/2015 + Break Analysis and design 11/01/2015 09/02/2015 Functional and non-functional requirement 10/02/2015 23/02/2015 Network architecture 24/02/2015 22/03/2015 Simulation design 23/03/2015 + Break 15/05/2015 Implementation 16/05/2015 14/06/2015 Testing phrase 15/06/2015 16/07/2015 Network evaluation 17/07/2015 30/07/2015
  • 8. Author: OLATUNDE ISMAILA 8 Documentation 31/07/2015 06/08/2015 Project Time Line Chapter summary While waiting to deliver the best and most reliable source of communication to my people, I have introduced the chapter and all what that has to be done is explained. The wireless network will detailed be explained below and whatever benefits it will offer. CHAPTER 2: LITERATURE REVIEW Chapter introduction This chapter will lead to the aspect of reviewing the relevant product sub-topics and will ensure that wireless network be explained in details, the lifecycle and development methodology used and the applicable network technology specifications. DOMAIN BASED LITERATURE REVIEW Application of wireless network Chandra, Praphul, 2008 Wireless technology comes in many different forms and is seen to be a technology that allows one to send and receive data wirelessly from two or multiple wireless devices. It has globalize the world and is seen to be the fastest and most reliable medium of communication and has come with different technologies and bandwidths. It most widely used medium of communication is the radio wave (free space medium).
  • 9. Author: OLATUNDE ISMAILA 9 Examples of wireless devices could be;  Laptop  Mobile phones  PDA  Tablets  IPad etc Some benefits of the application and benefits offered by wireless technologies are; 1. It offers mobility services as can access data fromany location 2. Reach ability services as users are better connected 3. Can easily be installed 4. Less maintenance cost 5. Offers services for SMS and MMS. Origin of wireless network Chandra, Praphul, 2008 Before the invention and application of wireless network, people were using the wired network for data transfer and other communication services. The wireless network or technology started from telegraph and telephony, radio and television and finally from computer network to the internet. But for wireless fidelity (Wi-Fi) network to be designed for my community; at first they were using the traditional means of communication to convey messages and other communication services from one location to another like the local postal services which takes a long period to deliver messages. The wireless networks today have come with great features and provide better services to meet ones need. How to use the wireless network Using the wireless network (Wi-Fi) is simple as everyone within that street through their wireless devices will be required to enter the user name and password which is the street name
  • 10. Author: OLATUNDE ISMAILA 10 for user name and house number for password. After doing this, he will be connected to the network named “Street Wi-Fi” and then start using the internet for whatever he intends to. Uses will not have to know the actual location of the Wi-Fi infrastructure and authentication but will have to use its services as long as he or she wants. Hence, the wireless access point antennas will be mounted either on towers or on the buildings for free and fast access. TECHNOLOGICAL LITERATURE REVIEW Technological specifications From my project top and its related functionalities, the chosen technology for reviewing is the network and telecommunication oriented development. I will have to review multiple wireless networks (Wi-Fi) so as to get a clear knowledge on how it works. Network and Telecommunication oriented development Reviewing the Merging of Outdoor and Indoor Wi-Fi This is an outdoor wireless network architecture which is the same as my proposed wireless network to be designed for my community. The network shows that it is the merging of indoor Wi-Fi network purposely designed to meet the clients need. Also the wireless antenna is in the same line of sight with the client CPE (client-customer premises equipment) and an institution. Hence, the software on the outdoor Wi-Fi device addresses the specific application need for wireless local area network (WLAN) application deployment. HARDWARE Router  Cisco or other wireless routers Wireless antenna  Integrated bridge/ AP solution  WLG2000 PMP Bridge Residential antenna  Client CPE
  • 11. Author: OLATUNDE ISMAILA 11 Reviewing Wi-Fi antennas for Multiple Connections These wireless networks (Wi-Fi) have the capability of connecting mobile users, business users and home users. The home and the business wireless access point antenna are connected to the WISP main antenna likewise the mobile user’s antenna. HARDWARE Wireless Antenna  OWL400 (AP MODE)  OWL400 (CPE MODE)  OWL800 Layer 3 switch  Cisco Catalyst Laptops  CPU- 3.8GHz
  • 12. Author: OLATUNDE ISMAILA 12 Reviewing a Community Wi-Fi Network This is a community wireless network systemthat is deployed in almost all areas of the street of that community and this is to enable wireless connectivity. It also offers wireless, connectivity to metro busses for which passengers can use the internet when traveling. This is a very cost effective network that delivers high-capacity, high- reliability, and multi- service networks. HARDWARE Wi-Fi antenna  MIMO Antenna Router  DSL  IEEE 802 PROTOCOL DEVELOPMENT LITERATURE REVIEW Reviewing System Development Lifecycle (SDLC) Aarno, Daniel, and Jakob Engblom, 2005 System development lifecycle (SDLC) is the step-by-step application development lifecycle in system, information system and software engineering to describe a process for planning,
  • 13. Author: OLATUNDE ISMAILA 13 analyzing, design, and implementation for deploying an information system. SDLC provides the detail processes, that are required for planning, executing and managing a system and it contain the following types and their development methodologies; SDLC Methodology Waterfall SDLC Structured System Analysis and Development Methodology (SSADM) Spiral SDLC Extreme Programming (XP) Iterative and Incremental SDLC Rapid Application Development (RAD), ICONIX, and SCRUM V-Model SDLC V-Model methodology Chosen SDLC and methodology The chosen system development lifecycle and development methodology for my project is the V-model which is one that executes processes in sequential manner in V-SHAPE. It is also known be as a verification and validation model for systems development. Testing processes using the V-model is planned in parallel with a corresponding phase of development. Hence, the verification phase takes place on one side of the V, and validation phase takes place on the other side. Benefits of the SDLC and methodology As explained above, some of the benefits or reasons that made me choose the V-SHAPE model system developments are; 1. V-MODEL is simple and easy to implement and use. 2. With V-MODEL, defects are found at early stage of the project 3. V-MODEL works well for small scale projects with well understood requirements. 4. V-MODEL is a highly disciplined model and stages are completed one at a time V-model can easily be managed due to its rigidity as each stage has specific deliveries and a review process.
  • 14. Author: OLATUNDE ISMAILA 14 Techniques and reasons for For the realization of this project, that is the design, implementation and testing, I WILL USE THE CISCO PACKET TRACER TOOL TO DEMONSTRATE IT. Cisco packet tracer is a networking tool that provides multiple opportunities for one to demonstrate networking concepts and also have a platform that allows one to practice using the command-line interface (CLI). It comes with great features like simulation features that will enable me to design, implement, test and simulate the wireless network I am setting up for the community. Some of the reasons for choosing cisco packet tracer are; 1. It supports all the protocols on the TCP/IP suit. 2. Can be used for designing, configuring and testing networking. 3. It provides the logical and physical workplace 4. Provides real-time and simulation modes as networking is concerned 5. Applicable for LAN, switching, TCP/IP, routing and WAN protocols. CHAPTER 3: ANALYSIS AND DESIGN Chapter introduction This chapter will requires the discussion being focused on how the wireless network for the community will be analyzed and designed. Also discussing on the functional and nonfunctional requirement, the applicable techniques for capturing the requirement and the simulation process will take place.
  • 15. Author: OLATUNDE ISMAILA 15 Functional and Non-functional requirement analysis Function requirement Function requirement in this context will define the functions of the system(wireless network) and the available components which are a set of inputs, behavior and output of the system. Hence, it will specify documented operation and activities that the wireless network system must be able to perform. Examples of these functional requirements could be;  Authentication  Business rules to be carried out  Operation of the network devices, etc. Functional requirements found on the wireless network are; Component Description Justification Image Router (wireless) Linksys E900 For routing and wireless connectivity Modem Belkin Wi-Fi 802.11n To work together with the router while connecting to the antenna Wireless Antenna COL2406 Antenna To enable wireless connectivity within the street
  • 16. Author: OLATUNDE ISMAILA 16 Cable CAT6 SFTP Ethernet For connections between the router/modem and the antenna Non- functional requirement Non- functional requirement in this context describes the attribute of the design network system like security, reliability, maintainability scalability and usability. Non-functional requirement will also involve or be constraints or restrictions on the designed network system. Examples of these non-functional requirements could be;  Accessibility  Backup  Efficiency  Portability  Security  Safety  Software, tools and standards  Recovery, etc. Techniques used to capture requirement The various techniques used in capturing the functional requirements of the street network design are as follows; Techniques Explanation Feasibility studies Feasibility studies was one of the techniques used and it was carried out by assessing the practicality of the proposed plan; that is by analyzing the ability to complete the proposed project
  • 17. Author: OLATUNDE ISMAILA 17 successfully considering the following factors;  Economic factors  Technological factors Interview With this technique, users of the network were interviewed based on the existing systemin order for the designer to get to know details about it. He may conclude by upgrading it or proceeding to design a new one. Questionnaire The questionnaire technique was also used as a way of capturing requirements and it was done by questioning users individually and in groups about the system to be designed. The direct and indirect questioning was used. Observation The direct and indirect observation has been carried out by studying the project environment and it users as this will help the analyst to know the following;  What has to be done  When they have to be done  The duration to do it  Why it has been done Problem found during analysis For the proposed network, no problem was experienced during the analysis part of it as the existing systemwas analyzed, functional and nonfunctional requirement has also been analyzed. The simulation software chosen was able to run my computer that runs on Microsoft windows 7 as it is the latest pc and software compared to the Macintosh machines which will require additional software to make it compatible with the chosen simulation tool (cisco packet tracer).
  • 18. Author: OLATUNDE ISMAILA 18 Street network design structure The above diagram is demonstrating how users within a street access internet via a Wi-Fi access point antenna from any location. Simulation network design
  • 19. Author: OLATUNDE ISMAILA 19 The above simulation is for the wireless network design for a street whereby users can access internet within that street by entering the SSID and the WEP (Wired Equivalent Privacy for IEEE 802.11). Entering these details will enable them access to the network at any time. The Wi-Fi antenna is shown above where all the other devices are connected to it like the router/Modem, connectivity components and other devices. Chapter summary The analysis and design have been done according to the project aimand objectives and the actual network and simulation was design using their appropriate software tools. We now proceed with the implementation part of the project.
  • 20. Author: OLATUNDE ISMAILA 20 CHAPTER 4: IMPLEMENTATION Chapter introduction The implementation part of the street wireless network proposal will focus on explaining how the simulation, connectivity, IP address technique, security and the configuration part of it will be implemented. Software simulation implementation The cisco packet tracer simulation software was used for designing the wireless network and simulating it to work in the real world practice. The packet tracer software allows the configuration of wireless devices and wireless access points for users to access wireless internet within a particular area. It would cost a of money in physically buying all the equipment to be used for this project like the wireless access point antenna etc. but this simulation comes with all this features and have helped me to save cash. Connection and IP addressing method The connectivity of the network takes place wirelessly except the Wi-Fi access point antennas which will be mount every 50 meters to ensure that users get full network within that street at any time and at high speed. The Wi-Fi access point antennas will constitute devices like the COL2406 antenna, CAT6 SFTP Ethernet, router/modem all mounted on a single tower to perform this task. As for the IP addressing assignment, the router will be configured DHCP and when any wireless device is connected to the network, it will receive or it will be assigned with an IP address. Hence, it was same like a home network whose router is already configured by the internet service provider (ISP). Wireless network security implementation The security part of this network will be configured on the router using a range of mechanisms and it will also ensure that users of the network will be required to enter their authentication credentials that are username and password before they can access the internet.
  • 21. Author: OLATUNDE ISMAILA 21 Other security measures that will be put in place is how to manage and monitor the wireless network from an unauthorized access and also heavy traffics. Some of the management and monitoring tools for the wireless networks are;  CommView for Wi-Fi: it is a packet sniffer for wireless network and ensures that packets will be captured and also searches for specific strings and packet types. It has the capability of altering network admins when there is traffic. Hence, it helps to improve Wi-Fi security.  Wireless wizard: this tool was designed in order to get the best possible performance from Wi-Fi networks. It also has features for diagnosing the network and for testing the network performance.  Wireless key generator: it is a tool designed for improving wireless network security and on this tool; network admins can specify the required security type and key strength. It also generates random key encryptions for applications which then minimize the temptation to use simple keys that can easily be hack able. Problem faced during implementation Actually, there was a problem faced during implementation which was that on the cisco packet tracer software it does not have devices like the Wi-Fi access point antenna. Meanwhile my project was based on using wireless point antenna, positioning them at a certain range on the street so as to provide wireless connectivity. So the solution to this problem was to use the normal wireless access points to simply simulate the network. The normal wireless access point will now act as the Wi-Fi success point antennas so as to be able to simulate it. Configuration methods Sample of wireless devices and components and their mode are used to access the internet.
  • 22. Author: OLATUNDE ISMAILA 22 Below is the interface of the wireless router on the Wi-Fi antenna that is configured for authentication. Configuring the required authentications for the router for which users will require to enter before they can connect to the network. That is the wired equivalent privacy (WEP).
  • 23. Author: OLATUNDE ISMAILA 23 Configuring internet protocol address such that wireless devices can get IP addresses automatically.
  • 24. Author: OLATUNDE ISMAILA 24 Basic wireless settings Configuring user devices for Wi-Fi connection. Chapter summary The implementation phase of the network is completed but the only issue was the lack of certain wireless network devices like the Wi-Fi access point antenna which will be replaced by the normal wireless access point in order to be able to simulate the network. But in real-life implementation, the Wi-Fi access point antennas will be used.
  • 25. Author: OLATUNDE ISMAILA 25 CHAPTER 5: TESTING Chapter introduction Testing the wireless network will ensure that errors are detected so that it should not be experienced during or after it have been put to use. The network configuration will be tested using ranges of methods that will be described below and one of it will be choosing to carry on the testing part of the project Testing methodology used There are two possible methodologies that will be described below and this methodologies are processes that are been carried out on a system in order to ensure that it is working according to the aim and objectives of the project. The two testing methods are;  Black box testing  White box testing The black box testing technique is one of the simplest and easy to use testing methods especially on the Wi-Fi network design for a street. It does involve coding processes, less expensive and this testing requires just a little knowledge on what is required to be done. The white box testing method is one that requires high level of programming skills and the tester must know or have good knowledge on what exist in the box and what is to be done. It is one of the most expensive testing methods as it will be required to hire highly qualified programmers and the testing duration for this method takes longer than the black box. Hence, the testing method selected for testing the street wireless network is the black box testing method. Reasons for choosing the black box method are as follows:  Does not require programming experts  Does not take long period to carry out the testing  Does not incur expenses. Testing the wireless network After the design and implementation phase, the wireless network will be tested for accuracy using the black box testing method with the help of the “PING” command via the command line
  • 26. Author: OLATUNDE ISMAILA 26 interface on the cisco packet tracer. From any of the wireless devices, the “PING” command will be used to ping another wireless device at the other end by sending a request to it and if successful, the source device will get a reply that the receiving device can be reached. It will notify to the source device the number packet sent and those received and also the time it takes for the device at the other end to receive the data. Testing before and after configuration This testing will ensure that users can communicate with each other while on the network and also the configuration is properly done. Using “IPconfig” to check the TCP/IP configuration. Ping from one device to another. Devices can be ping from one end to another.
  • 27. Author: OLATUNDE ISMAILA 27 Testing the network authentication As users of the network will be required to enter their authentication details before using the network, testing the network authentication will be carried out by using a device that does not know the user name and password of the network to try to logon to the network and if he is
  • 28. Author: OLATUNDE ISMAILA 28 requested to enter his credentials, then the authentication is ok. But it he simply gain access to the network then the authentication is not properly configured and anyone can easily get access to it which is not proper. Only the inhabitants within the street are required to use the network band they know what credentials to use. Chapter summary Testing the street wireless network have accurately been done and it is seen that the project objective and aim have been met. The testing method chosen has helped me to know what to do when it involves testing a system. CHAPTER 6: EVALUATION Chapter introduction This is the evaluation phase of the wireless network design for a street and is one that involves giving credit to the design project based on the project objectives, end-users perspectives and designer perspective. Hence, other evaluators may come thereafter to judge what has been design for future reasons. Evaluation against objectives This is an evaluation on the street wireless network based on its objectives. It will be evaluated against the objectives of the project to ensure that the wireless device connectivity, positioning the Wi-Fi access point antenna, and other objective part of the project was accurately carried out. Also ensuring that the simulation, configuring and testing part of the project based on the objective were met and the network is perfectly working. End-users perspective Also the street wireless network will be evaluated against end-users perspectives that is what end-users will be expecting from the network which may be in term of its performance, usability, scalability, robustness, quality of service, productivity and how it could be expanded in the future. Chapter summary The street wireless network and design implemented, configured and tested will change life and levels within my street as they will experience a new stage in life that they have never
  • 29. Author: OLATUNDE ISMAILA 29 before. It will reduce transport cost, cyber café cost and will ease communication to do research via the internet. CHAPTER 7: CONCLUSION Overall conclusion Finally the project have been design and deployed and it is like a new life coming to my area as the inhabitants will stress no more in using postal services that will take longer periods to deliver their messages. Now the internet facility will serve them on whatever they want to do within a short while. There will be other services that the people will benefit on like the use of voice over IP, that making telephone calls over the internet and online chats using the internet as this will help to reduce cost compared to making phone calls using normal telephone lines. Reference - Aarno, Daniel, and Jakob Engblom. Software And System Development Using Virtual Platforms. Waltham: Morgan Kaufmann, 2015. Print. - Carballar Falcón, José Antonio, and José Antonio Carballar. Wi-Fi. San Fernando de Henares (Madrid): RC libros, 2010. Print. - Chandra, Praphul. Wireless Networking. Amsterdam: Elsevier/Newnes, 2008. Print. - Desikan, Srinivasan, and Gopalaswany Ramesh. Software Testing. Bangalore, India: Dorling Kindersley (India), 2006. Print. - Grady, Jeffrey O. System Requirements Analysis. Amsterdam: Elsevier Academic Press, 2006. Print. - Saunders, Simon R. Antennas And Propagation For Wireless Communication Systems. Chichester: Wiley, 1999. Print.