This document provides instructions for setting up a wireless network in a workshop setting. It describes connecting a wireless router and configuring it to broadcast a wireless signal with a chosen name. It then guides configuring laptops and phones to connect to the wireless network. The document also covers adding security by configuring a wireless password and restricting connections by MAC address. Finally, it discusses extending the wireless range by connecting a second wireless router to the first one via Ethernet cable.
It's a full day tutorial slides for KAIST students to understand the Web Technology. This full-day tutorial will show you what you need to know the web technologies when you have some plan to design future new services.
ICDL Secure Use of IT:
Key Concepts of data security; protect computer from malware and unauthorised access; types of networks; browse www and email securely; security issues of e-mail and instant messaging; back-up and restore data safely; securely dispose of data and devices.
The document provides an overview of using the Internet and its various resources and technologies. It discusses topics such as online communications methods like email and social networking; terminology like domains, URLs, and browsers for navigating the web; issues like spam, malware, and piracy; and the origins and future of the Internet infrastructure. It aims to educate users on making the most of Internet resources while avoiding common problems and legal issues.
This document provides a user guide for ProteMac NetMine, a firewall software for Mac OS X. It introduces NetMine, describing its features for filtering network traffic and controlling application access. It also outlines the minimum system requirements and installation instructions. The guide explains how to use the NetMine interface and notification windows to set rules allowing or denying applications' network access. It provides directions for generating rulesets, adding manual rules for applications, and specifying default settings. Technical support contact information is also included.
The presentation discussed web security issues including client-side, server-side, and data transmission risks and proposed SSL as a solution to encrypt data exchange between clients and servers, providing authentication, integrity, and confidentiality of data. It described the SSL architecture and protocols for encrypting records, negotiating keys during handshake, and alerting of errors. The presentation also covered the SET protocol for secure online payment transactions.
Computer and network security helps protect data and equipment from internal and external threats. Internal threats come from inside an organization from users and employees, while external threats come from outside the organization from unauthorized users. Security threats can physically damage equipment or steal and corrupt data. Malware like viruses, worms, Trojans, and spyware are common security threats that can be installed without user knowledge and harm computers. Organizations implement security policies, passwords, and other measures to protect against these threats.
A network connects computers together so they can share data and resources. There are two main types: a local area network (LAN) covers a small area like a school and uses cables or wireless technology; a wide area network (WAN) connects computers across large distances using telecommunications links. The document provides examples of LANs and WANs and discusses how networks transmit data and ensure security.
Tutorial 06 - Real-Time Communication on the Internetdpd
This document discusses various methods of real-time communication over the Internet, including chat, instant messaging, and web-based chat sites. It describes the history and features of Internet Relay Chat (IRC) and popular instant messaging programs. The document also explores virtual communities and their use in business, as well as the evolution of wireless networks that enable mobile Internet access.
It's a full day tutorial slides for KAIST students to understand the Web Technology. This full-day tutorial will show you what you need to know the web technologies when you have some plan to design future new services.
ICDL Secure Use of IT:
Key Concepts of data security; protect computer from malware and unauthorised access; types of networks; browse www and email securely; security issues of e-mail and instant messaging; back-up and restore data safely; securely dispose of data and devices.
The document provides an overview of using the Internet and its various resources and technologies. It discusses topics such as online communications methods like email and social networking; terminology like domains, URLs, and browsers for navigating the web; issues like spam, malware, and piracy; and the origins and future of the Internet infrastructure. It aims to educate users on making the most of Internet resources while avoiding common problems and legal issues.
This document provides a user guide for ProteMac NetMine, a firewall software for Mac OS X. It introduces NetMine, describing its features for filtering network traffic and controlling application access. It also outlines the minimum system requirements and installation instructions. The guide explains how to use the NetMine interface and notification windows to set rules allowing or denying applications' network access. It provides directions for generating rulesets, adding manual rules for applications, and specifying default settings. Technical support contact information is also included.
The presentation discussed web security issues including client-side, server-side, and data transmission risks and proposed SSL as a solution to encrypt data exchange between clients and servers, providing authentication, integrity, and confidentiality of data. It described the SSL architecture and protocols for encrypting records, negotiating keys during handshake, and alerting of errors. The presentation also covered the SET protocol for secure online payment transactions.
Computer and network security helps protect data and equipment from internal and external threats. Internal threats come from inside an organization from users and employees, while external threats come from outside the organization from unauthorized users. Security threats can physically damage equipment or steal and corrupt data. Malware like viruses, worms, Trojans, and spyware are common security threats that can be installed without user knowledge and harm computers. Organizations implement security policies, passwords, and other measures to protect against these threats.
A network connects computers together so they can share data and resources. There are two main types: a local area network (LAN) covers a small area like a school and uses cables or wireless technology; a wide area network (WAN) connects computers across large distances using telecommunications links. The document provides examples of LANs and WANs and discusses how networks transmit data and ensure security.
Tutorial 06 - Real-Time Communication on the Internetdpd
This document discusses various methods of real-time communication over the Internet, including chat, instant messaging, and web-based chat sites. It describes the history and features of Internet Relay Chat (IRC) and popular instant messaging programs. The document also explores virtual communities and their use in business, as well as the evolution of wireless networks that enable mobile Internet access.
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre
The document provides instructions for setting up and using a new Maxis Fibre Internet connection. It includes:
1) A welcome message informing the customer that they can now enjoy faster internet speeds on their devices anywhere in their home.
2) Information about free voice calling packages and instructions for accessing call charges and terms after using free credit.
3) A thank you and details on where to find support documents like user guides, FAQs and troubleshooting tips enclosed in the welcome kit.
The document provides instructions for setting up a basic home network by connecting a modem, router, and computer with network cables and configuring the router using a setup wizard, allowing the user to share their internet connection and files between multiple devices on the network. Key devices needed are a modem from an internet provider, a router to create the network, and network cables to connect everything together. The instructions guide the reader through physically connecting the devices, running the router setup, and troubleshooting basic connection issues.
1. The document provides instructions for configuring a Wi-Fi repeater by connecting it to a computer via an Ethernet cable or wirelessly, and describes the different modes (repeater and AP) and settings.
2. It explains how to back up and restore the repeater's settings, upgrade its firmware, and change the management password.
3. Additional information is provided on adding computers to the repeater's wireless network through WPS or by manually configuring the computer's network settings.
1) The document provides a tutorial for creating a WiFi hotspot on a Windows 7 or later computer to share an internet connection and allow an Android device to connect.
2) It involves downloading software, configuring the internet connection to be shared over WiFi, setting up the hotspot with a password, and configuring the Android device with static IP settings to connect to the hotspot.
3) Once completed, both the computer and Android device will be connected to the internet through the shared WiFi hotspot connection.
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
CSS Module 8 - Configuring the Wireless Access Pointkenjifritz
The document provides steps to configure a wireless access point by resetting it to factory default settings, changing the SSID and password, and enabling MAC address filtering. This involves connecting a laptop to the access point, accessing the configuration page, modifying settings like the SSID and password, and adding the laptop and phone's MAC addresses to the access point's allowed list so they can connect to the secured wireless network.
The document provides instructions for setting up a home wireless network, including choosing a wireless router, determining internet speed needs, and protecting the network from viruses. It recommends purchasing a dual-band router from a reputable manufacturer based on the number of devices to be connected and speeds needed for streaming/gaming. Free antivirus software like Avast and AVG are suggested to scan for and remove viruses on a monthly basis in order to safely use the internet.
This document provides instructions for setting up and troubleshooting Fast Remote Desktop, which allows controlling a Windows PC from an iPad. It includes steps to install the VideoOverIP software on the PC, find the PC's IP address, enter login credentials in the iPad app, and check that the VOIP service is running. It also provides guidance on port forwarding for remote connections and checking the iPad's network connectivity and IP address.
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdfHaseebAli795005
This document provides instructions for building a simple network in Cisco Packet Tracer, including adding devices, configuring the devices with IP addresses, creating wireless access, and testing connectivity. The network consists of a PC, wireless router, cable modem, internet cloud, Cisco server, and laptop. The devices are configured, the laptop connects to the wireless network, and ping tests verify connectivity between the PC and Cisco server. Once completed, the network configuration is saved as a Packet Tracer activity file.
The hacker or hackers that breached Sony's PlayStation Network and Qriocity services has cost Sony over $170 million. Sony has invested heavily in strengthening its networks before reopening the services. A Sony executive said a secure online environment is their top priority as they work to restore all services by the end of the month while offering customers free security and rewards for their patience.
This document provides information on securing wireless networks both at home and in public places. It discusses threats like piggybacking, wardriving, and unauthorized access that can occur if a wireless network is not properly secured. The document then gives steps to secure a home wireless network, such as encrypting the network traffic, changing default passwords, and keeping the wireless access point software updated. It also provides tips for safely using public wireless networks, like only connecting to trusted networks, using a VPN if possible, and disabling file sharing.
This document provides librarians with basic instructions to help customers troubleshoot common wireless connection problems at the library. It outlines quick fixes like checking the wireless switch, performing a power cycle, or having Windows repair the connection. It advises referring customers with more serious issues to professionals and allowing self-research. The document also notes problems beyond the scope of this guide, like needing driver or OS updates.
This document provides tips for troubleshooting issues with Linksys wireless routers. It begins by having the user verify the problem is with the router and not other network components. Next it recommends restarting the router and computer by unplugging them for 10 minutes. If that does not work, it instructs how to access the router settings by typing its IP address into a web browser in order to check wireless settings, firmware updates, and access restrictions. Finally, it suggests resetting the router to factory defaults as a last resort. The document stresses that technical support is available if needed when troubleshooting Linksys router problems.
1) Linksys router setup involves connecting the modem and a computer to the router via Ethernet cables, then accessing the router's default IP address (usually 192.168.1.1) in a web browser to configure the router's network settings.
2) The configuration process allows changing settings like the wireless network name and password as well as Internet connection settings depending on the user's internet service provider (ISP).
3) Common ISP connection types are cable, which may require cloning the MAC address of the computer, and DSL, which may require configuring PPPoE settings.
The document provides instructions for manually installing and configuring various ADSL modems, including the 2Wire 2701-A, SpeedTouch 530/510, Siemens Speedstream 4200, and SpeedTouch 536 modems. It describes connecting the modems, installing drivers, entering login credentials in the modem interface, and testing the connection. Auto-setup instructions are provided for the 2Wire 2701-A modem which guide the user through installation with a setup CD. Troubleshooting tips are also included.
The document provides steps for setting up a home router connection. It explains that setup can take under an hour depending on the router model and location. It outlines connecting the router to the internet modem, entering default login credentials to access the admin panel for configuring internet connection settings, adding additional computers to the wireless network, and securing the router by changing default passwords and enabling firewalls. It advises calling technical support or searching online forums if help is needed troubleshooting router issues.
This document provides instructions for setting up a D-Link DI-604 broadband router. It explains that an internet connection and modem are required. The router acts as a DHCP server to assign IP addresses. Instructions are given to connect the router to the modem and computers, and to use the setup wizard to configure basic network settings like the wireless password and internet connection type. Technical support contact information is also included.
The document provides steps to set up a NETGEAR N750 wireless router and connect wireless devices to the network. The 6 steps are to: 1) unplug the modem and router, 2) cable the router, 3) cable the computer, 4) power on the modem, 5) power on the router, and 6) insert the CD and follow prompts to set up the wireless network. It also describes how to set up wireless security and connect wireless devices to the new network.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document discusses network programming using Python sockets. It covers data communication fundamentals, TCP and UDP sockets, and examples of TCP and UDP client-server communication using Python's socket module. It also discusses higher level networking in Python using modules like httplib, urllib2, smtplib, and SocketServer that build upon the lower-level socket module.
This document provides an overview of IoT (Internet of Things), including defining IoT, describing its benefits and applications, reviewing market forecasts, identifying the pillars and infrastructure of IoT, examining underlying technologies like sensors and connectivity standards, exploring challenges, and recommending strategies for success. Key topics covered include defining IoT as the interconnection of people, processes, data and things via devices connected to the internet; analyzing market forecasts with over 200 billion connected devices by 2020 and $1.3 trillion market value; and identifying security, expertise shortages, and standards as major challenges.
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre
The document provides instructions for setting up and using a new Maxis Fibre Internet connection. It includes:
1) A welcome message informing the customer that they can now enjoy faster internet speeds on their devices anywhere in their home.
2) Information about free voice calling packages and instructions for accessing call charges and terms after using free credit.
3) A thank you and details on where to find support documents like user guides, FAQs and troubleshooting tips enclosed in the welcome kit.
The document provides instructions for setting up a basic home network by connecting a modem, router, and computer with network cables and configuring the router using a setup wizard, allowing the user to share their internet connection and files between multiple devices on the network. Key devices needed are a modem from an internet provider, a router to create the network, and network cables to connect everything together. The instructions guide the reader through physically connecting the devices, running the router setup, and troubleshooting basic connection issues.
1. The document provides instructions for configuring a Wi-Fi repeater by connecting it to a computer via an Ethernet cable or wirelessly, and describes the different modes (repeater and AP) and settings.
2. It explains how to back up and restore the repeater's settings, upgrade its firmware, and change the management password.
3. Additional information is provided on adding computers to the repeater's wireless network through WPS or by manually configuring the computer's network settings.
1) The document provides a tutorial for creating a WiFi hotspot on a Windows 7 or later computer to share an internet connection and allow an Android device to connect.
2) It involves downloading software, configuring the internet connection to be shared over WiFi, setting up the hotspot with a password, and configuring the Android device with static IP settings to connect to the hotspot.
3) Once completed, both the computer and Android device will be connected to the internet through the shared WiFi hotspot connection.
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
CSS Module 8 - Configuring the Wireless Access Pointkenjifritz
The document provides steps to configure a wireless access point by resetting it to factory default settings, changing the SSID and password, and enabling MAC address filtering. This involves connecting a laptop to the access point, accessing the configuration page, modifying settings like the SSID and password, and adding the laptop and phone's MAC addresses to the access point's allowed list so they can connect to the secured wireless network.
The document provides instructions for setting up a home wireless network, including choosing a wireless router, determining internet speed needs, and protecting the network from viruses. It recommends purchasing a dual-band router from a reputable manufacturer based on the number of devices to be connected and speeds needed for streaming/gaming. Free antivirus software like Avast and AVG are suggested to scan for and remove viruses on a monthly basis in order to safely use the internet.
This document provides instructions for setting up and troubleshooting Fast Remote Desktop, which allows controlling a Windows PC from an iPad. It includes steps to install the VideoOverIP software on the PC, find the PC's IP address, enter login credentials in the iPad app, and check that the VOIP service is running. It also provides guidance on port forwarding for remote connections and checking the iPad's network connectivity and IP address.
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdfHaseebAli795005
This document provides instructions for building a simple network in Cisco Packet Tracer, including adding devices, configuring the devices with IP addresses, creating wireless access, and testing connectivity. The network consists of a PC, wireless router, cable modem, internet cloud, Cisco server, and laptop. The devices are configured, the laptop connects to the wireless network, and ping tests verify connectivity between the PC and Cisco server. Once completed, the network configuration is saved as a Packet Tracer activity file.
The hacker or hackers that breached Sony's PlayStation Network and Qriocity services has cost Sony over $170 million. Sony has invested heavily in strengthening its networks before reopening the services. A Sony executive said a secure online environment is their top priority as they work to restore all services by the end of the month while offering customers free security and rewards for their patience.
This document provides information on securing wireless networks both at home and in public places. It discusses threats like piggybacking, wardriving, and unauthorized access that can occur if a wireless network is not properly secured. The document then gives steps to secure a home wireless network, such as encrypting the network traffic, changing default passwords, and keeping the wireless access point software updated. It also provides tips for safely using public wireless networks, like only connecting to trusted networks, using a VPN if possible, and disabling file sharing.
This document provides librarians with basic instructions to help customers troubleshoot common wireless connection problems at the library. It outlines quick fixes like checking the wireless switch, performing a power cycle, or having Windows repair the connection. It advises referring customers with more serious issues to professionals and allowing self-research. The document also notes problems beyond the scope of this guide, like needing driver or OS updates.
This document provides tips for troubleshooting issues with Linksys wireless routers. It begins by having the user verify the problem is with the router and not other network components. Next it recommends restarting the router and computer by unplugging them for 10 minutes. If that does not work, it instructs how to access the router settings by typing its IP address into a web browser in order to check wireless settings, firmware updates, and access restrictions. Finally, it suggests resetting the router to factory defaults as a last resort. The document stresses that technical support is available if needed when troubleshooting Linksys router problems.
1) Linksys router setup involves connecting the modem and a computer to the router via Ethernet cables, then accessing the router's default IP address (usually 192.168.1.1) in a web browser to configure the router's network settings.
2) The configuration process allows changing settings like the wireless network name and password as well as Internet connection settings depending on the user's internet service provider (ISP).
3) Common ISP connection types are cable, which may require cloning the MAC address of the computer, and DSL, which may require configuring PPPoE settings.
The document provides instructions for manually installing and configuring various ADSL modems, including the 2Wire 2701-A, SpeedTouch 530/510, Siemens Speedstream 4200, and SpeedTouch 536 modems. It describes connecting the modems, installing drivers, entering login credentials in the modem interface, and testing the connection. Auto-setup instructions are provided for the 2Wire 2701-A modem which guide the user through installation with a setup CD. Troubleshooting tips are also included.
The document provides steps for setting up a home router connection. It explains that setup can take under an hour depending on the router model and location. It outlines connecting the router to the internet modem, entering default login credentials to access the admin panel for configuring internet connection settings, adding additional computers to the wireless network, and securing the router by changing default passwords and enabling firewalls. It advises calling technical support or searching online forums if help is needed troubleshooting router issues.
This document provides instructions for setting up a D-Link DI-604 broadband router. It explains that an internet connection and modem are required. The router acts as a DHCP server to assign IP addresses. Instructions are given to connect the router to the modem and computers, and to use the setup wizard to configure basic network settings like the wireless password and internet connection type. Technical support contact information is also included.
The document provides steps to set up a NETGEAR N750 wireless router and connect wireless devices to the network. The 6 steps are to: 1) unplug the modem and router, 2) cable the router, 3) cable the computer, 4) power on the modem, 5) power on the router, and 6) insert the CD and follow prompts to set up the wireless network. It also describes how to set up wireless security and connect wireless devices to the new network.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document discusses network programming using Python sockets. It covers data communication fundamentals, TCP and UDP sockets, and examples of TCP and UDP client-server communication using Python's socket module. It also discusses higher level networking in Python using modules like httplib, urllib2, smtplib, and SocketServer that build upon the lower-level socket module.
This document provides an overview of IoT (Internet of Things), including defining IoT, describing its benefits and applications, reviewing market forecasts, identifying the pillars and infrastructure of IoT, examining underlying technologies like sensors and connectivity standards, exploring challenges, and recommending strategies for success. Key topics covered include defining IoT as the interconnection of people, processes, data and things via devices connected to the internet; analyzing market forecasts with over 200 billion connected devices by 2020 and $1.3 trillion market value; and identifying security, expertise shortages, and standards as major challenges.
This document discusses designing converged networks that support both data and multimedia applications like voice and video over IP. It outlines the benefits of converged networks like cost reduction through a single unified network. It also examines the challenges of converged networks, such as ensuring quality of service for real-time multimedia. Different QoS strategies are presented to meet requirements for bandwidth, packet loss, delay and jitter. The document reviews traditional enterprise networks and how voice can be supported over IP networks using protocols like SIP, H.323 and IAX.
This document contains a multiple choice quiz about scaling networks. It covers topics like EtherChannel, Spanning Tree Protocol, redundancy, and first hop redundancy protocols. The questions test understanding of concepts like how EtherChannel combines links, the port states in STP, advantages of redundancy, and protocols for link aggregation.
This document provides an overview of IP addressing and subnetting. It discusses IP address format, classful and classless addressing, subnetting, VLSM, and provides an example of using VLSM to allocate addresses to subnets of varying sizes from a single class C network. The key topics covered are IP address format, routing with classful vs classless addressing, how subnetting divides a network into smaller subnets, and how VLSM allows variable length subnet masks for flexible address allocation.
This document provides instructions for setting up a wireless ad hoc network between two Windows 7 laptops to share files and internet access. The key steps are:
1. Create an ad hoc wireless network on one laptop and configure a WPA2 security key.
2. Join the ad hoc network from the other laptop and verify both laptops receive IP addresses on the same subnet.
3. Browse and share files between the laptops using the wireless connection.
4. Optionally, one laptop can share its wired internet connection by configuring its Ethernet interface for sharing. This allows the other laptop indirect internet access over the ad hoc wireless network.
1. School of Engineering Technology and Applied Science
Department of Information and Communication Engineering
Technology
Computer Systems and Network
Friday, April 24, 2015
Workshop on Setting up a Wireless/WiFi Network
Instructor: Ali Nezhad
2. Page 2 of 13
Computer Systems and Networks Programs
Centennial College
Computer and Communication Networks Bachelor Degree (CCN)
Computer Systems Technology – Networking (CSTyN)
Computer Systems Technician – Networking (CSTN)
Computer Repair And Maintenance Certificate (CRAM)
What makes CentennialDifferent…?
Accredited Programs
o Canadian Technology Accreditation Board (CCTT/CTAB)
Co-op
Hands-on
State-of-the-Art Labs
Full Spectrum of Programs
Program Coordinator:
Dr. Ali Al-Rubaie
(416) 289-5000 ext. 3434
aalrubaie@centennialcollege.ca
3. Page 3 of 13
Objectives:
Learn how to create/set up a wireless network at home/school so that you can use your
desktop/laptop/smart phone to access the Internet remotely and securely.
Network Topology
We find Wireless/WiFi networks everywhere; at schools, hospitals, Tim Hortons and
homes. To build a WiFi network, all that we need is a Wireless Router/Access Point
(AP), which is normally connected to the Internet through one of the Internet Service
Providers like Bell or Rogers. To be able to connect to the Wireless Router, user
devices, like PC, laptop, tablet PC and Smart phones, should be equipped with a
wireless/WiFi interface. The topology of this network is shown below:
4. Page 4 of 13
INTERNET
Lab Tasks:
Network device factory default recovery
Basic wireless router configuration
Configure laptops and Smart phones to access the router
Configure Security key on the router and wireless computers
Configure MAC address filtering
Extend wireless range using additional routers
Team and Duration:
Three to five students per team per lab session (90 minutes)
5. Page 5 of 13
Introduction to Computer Addressing:
1. MAC (Medium Access Control) Address
Physical or Hardware Address
Each purchased PC, laptop, tablet PC or Smart Phone has its own
Unique and Permanent MAC address
Has Local Significance only; can be used to communicate only with
other users in the same local network.
For example, each Centennial student has a unique student no. which is
recognized only inside Centennial and does not have any meaning for
your Family Doctor, your bank or Canada revenue agency.
2. IP (Internet Protocol) Address
Logical, or Software, Address
A Unique and Temporal Address assigned to your device when you join
a network like School network, Tim Hortons network, network at home,
…etc. It will be taken away from you when you leave the School, Tim
Hortons or Home.
Has Global Significance; can be used to communicate with any user on
the Internet.
For Example, the SIN is Unique and has a Significance on the National
level; it is recognized all over Canada, not only in the School, the Family
Doctor office or your bank branch.
Lab Procedure:
A. Basic Wireless Setup
1. Connect the PC to any of the four Ethernet ports at the back panel of the Wireless Router Linksys
WRT120N router (as shown in the figure below) using one Ethernet (UTP) cable. The Laptop and
Smart Phone will be used to join the Wireless network
6. Page 6 of 13
Wireless Laptop/Smart Phone Linksys WRT120N Wired PC
2. Power on wireless router Linksys WRT120N, press the Reset button for over 2 seconds. Then,
your wireless router will have factory default settings. The default password is recovered (default
password: admin, no username)
3. After connecting your PC to any of wireless router’s four ports, check if your PC has retrieved IP
address from the router by the following steps:
a. Click Windows Start button, then key in “cmd” command in “Search programs and files”
field. You will see the following Window:
b. In the command line, key in “ipconfig” command to verify your IP address. Do you have
192.168.1.X IP address in the command output (X is a value in the range 101 to 140)? If
yes, move on to the next step. If not, repeat step 1 and check again.
4. Start your PC’s Browser (IE, Firefox, or Chrome), key in 192.168.1.1 in the Brower’s Web link
field.
7. Page 7 of 13
5. You will see Linksys WRT120N authentication page. Key in password as admin, leave username
blank.
6. Now, you should be able to see Linksys WRT120N graphic interface as show below.
Congratulations, you can now configure the router for your own wireless network establishment.
7. Click “Wireless” option on the left top field. You can now see the following interface.
8. Page 8 of 13
Check "Manual" in "Configuration View", then you will see:
Key in a new name in Network Name (SSID) field, list the name here: __________(for example,
funnet, each group should have a different name).
Make sure that the option “SSID Broadcast” is set to Enabled and then click "Save Settings".
Note: In the last part of this workshop, every two groups will be paired and perform an
experiment jointly. It is recommended that if one group names their network funnet the peer group
name theirs funnet-extender.
B. Check the Wireless Connection
8. Now, let’s work on the Laptop and learn how to join the wireless network that you just set:
a. Click the wireless network icon, shown below, at the bottom-right corner of the screen
and read available networks.
9. Page 9 of 13
b. Select your network with the wireless network name you set in step 4 (SSID name), if you
do not find it then click Refresh Network List. Click Connect and You are Connected!
Note how the Wireless Network icon had been changed to indicate that you are
connected.
9. Now, let’s work on the Smart Phone (Samsung) and learn how to join the wireless network that
you just set:
a. Select the Setting group then select Wi-Fi, you will see a list of available WiFi networks.
b. Select your network with the wireless network name you set in step 4 (SSID name), click
Connect. You are Connected!
C. Test Internet connectivity.
At home or in the office, you would have an Internet connection through your ISP (Internet Service
Provider). In the college, we are not allowed to connect your router to the college network for security
reasons. Instead, we will use a local server to emulate the Internet.
Your instructor has already prepared the setup in a way that you can connect to the server
plustwo.setasicet.int by plugging the uplink port of your router into one of the yellow ports behind the
monitors on your desk.
Now, you should be able to connect to the server by starting a browser on your cell phone or the
laptop and typing the server name plustwo.setasicet.int.
D. How about Security?
You may have noticed that at this time anyone can connect to the WiFi network configured in
the previous steps. No password or security constraints have been configured. You definitely do
not want your network to be available to unauthorized users like neighbors or hackers; they will
share your Internet bandwidth which will downgrade the Internet connection speed and could
also be a security and privacy concern.
10. Page 10 of 13
In the following steps, you will learn how to define some security constraints and configure a
secure WiFi network.
10. Click "Wireless Security", you will note that Security is disabled by default. Pull down “Security
Mode”:
There are different Security modes listed there and we will select "WPA Personal" in this lab.
After selecting this mode, you may get the following message:
Click OK.
Key in Passphrase (8-63 characters long): ___________, this is a Password or Access Key that you will
have to provide in order to connect to the WiFi network. For example, you may use myPass123 as a
passphrase.
Click "Save Settings"
Check the Connection:
11. Now, let’s work on the Laptop and learn how to join the secure wireless network that you just set:
a. First, you will notice that your laptop had been disconnected automatically from the network
after configuring the Security mode and Passphrase.
11. Page 11 of 13
b. Click the network connection icon at the bottom-right corner of the screen and view available
networks.
c. Click on the wireless network with the name you set in step 4 (SSID name), click Connect.
d. You will be asked to provide the Password that you defined in step 10. Type the Password
and You are Connected
12. Now, let’s work on the Samsung Smart Phone and learn how to join the secure wireless network
that you just set:
a. As with the Laptop configuration above, you will notice that your Smart Phone had been
disconnected automatically from the network after configuring the Security mode and
Passphrase.
b. Select the Setting group then select Wi-Fi, you will see a list of available WiFi networks.
c. Select your network. You will be asked to provide a Password. Type in the Password
that you configured in step 10 and You are Connected!
E. One More Step in Building a Secure Network – MAC Filtering
As we mentioned in the Introduction, each PC/Laptop/Smart Phone has a unique MAC address that no
other device can have. So, to make your network more secure, you can define which device has the right
to connect to your network using its MAC address as the device ID. That way, the router will allow ONLY
devices with those MAC addresses and block all other devices.
13. Click "Wireless MAC filter", you will see the following:
14. Click "Enabled" option, you can select either the devices you want to block or those you want to
permit. In most cases we use the later. Check "Permit"
15. You can add the MAC addresses manually. The MAC addresses can be found as follows
a. For Laptop, go to START Run cmd ok. Then, type ipconfig/all, scroll to the
12. Page 12 of 13
Ethernet Adapter Wireless Network Connection and find there the Physical Address
which is the MAC address.
What is your Laptop MAC Address? _______________________________
b. For Smart Phone, go to Settings Wi-Fi Advanced and you will find the MAC address
there.
What is your Smart Phone MAC Address? _______________________________
16. Since the Laptop and Smart Phone had been already connected to the Wireless Router, the
Router is aware of their MAC addresses. Click "Wireless Client List" and you will get the devices
MAC addresses. Compare these addresses with the MAC addresses you wrote down above,
they should be exactly the same.
17. Let’s select to save only the Laptop (dell) MAC address by clicking on the corresponding box in
the list, click on Add and then Save Settings.
a. Is the laptop still connected?
b. How about the Smart Phone
F. Range Extension
The coverage area of a wireless router or access point depends on a number of factors such as its
supported standard (.11 a/b/g/n/ac), its antennas and in particular its location. Wireless signals can be
weakened by distance and objects like walls and other obstacles. Even the type of materials used in walls
is important. Therefore, in any wireless network there may be dark spots where the signal levels are low
which means the connection will be either unusable or at least the transmission rate will be low.
To improve the situation a secondary wireless device may be used. There are many names to describe
such a device which may mean slightly different things. Some of these names are signal booster (a.k.a
range extender), router, repeater, bridge or an access point.
An economical solution may exist if you have a second wireless router which may not be in use at the
moment such as an older model which you retired after buying your new unit. This is possible by
connecting the second router in one of several possible configurations to the first router.
Although the two routers may be connected wirelessly (which may be desirable), for the sake of simplicity,
in this lab we will connect them using an Ethernet cable. For a wireless configuration, the firmware of the
second router (if even amongst the supported models; at this time it seems that our WRT120n routers are
not supported.) must usually be upgraded using software such as DD-WRT, Tomato or OpenWRT.
The following figure depicts the scenario for the next experiment. In this setup, the second router will also
work as an actual router not just a wireless access point or a repeater.
13. Page 13 of 13
18. Team up with the group sitting next to you. If one group has the funnet network, the other group will
own the funnet-extender.
19. Disconnect the Internet port of the funnet-extender router from the ISP (yellow jack behind the
monitor) and connect it to one of the LAN ports of the funnet using a straight through cable.
20. In order to simulate a realistic situation, you may wrap the funnet router in some aluminum foil. In
that case, its signal should be considerably weakened so that your devices may not be able to
successfully connect to the server using that router anymore (you may need to clear your browser
cache). Now, try connecting your devices to funnet-extender and try loading the same server web
page or pinging it again. Were you successful?
21. Free practice and document for future reference.
Family Room Basement
ISP
funnetfunnet-extender
Internet
Port
Internet
Port
LAN
Port