Wireless networks let you connect all sorts of devices in your home — not just computers, but also printers, smartphones and tablet computers, storage servers, audio components, and even your television. Wireless networking isn’t hard to do, but it’s even easier when you have an idea of what all the acronyms and jargon mean, what your technology choices are, and what equipment you need to buy to build a network from scratch.
This tool will download and update the correct WiFi Bridge driver versions automatically, protecting you against installing the wrong WiFi Bridge drivers. About The Author: Jay Geater is the President and CEO of Solvusoft Corporation, a global software company focused on providing innovative utility software. Use vonets wifi bridge software download toolbar lets you can also includes a media player. 4.71.1 Vonets WiFi Bridge. Nothing happen no Windows open it just load and stop. But not detect the bridge may have been network driver. Industrial Wi-Fi Data Acquisition Module and Bridge. IEC-61131 Development Software; Touch Screen Controller Development Software; OPC Servers; M2M Management Software. Industrial Media Converters (Ethernet - Fiber) Products & Services Industrial Data Communications. Paragon Bridge Lite is a brand new Contract Bridge software game package. It features superb, crisp, clear graphics and sounds. It is incredibly easy to use and understand.
With 20 years of experience, Compex excels in Qualcomm Atheros based WiFi hardware and software development. Our Products OEM products ranging from Wireless Embedded Boards to WiFi Modules. ABD - Automated Bridge Design software. - A small software development firm specializing in bridge engineering applications. OpenSees - Open System for.
Wireless LANs are just like any other technology in one way — they’re full of acronyms and obscure jargon that make no sense to the average person who hasn’t spent a lifetime in technology. Heck, even the term “wireless LAN” contains an acronym. When you go to buy, configure, and use wireless networking equipment, you’re going to run into these words. To reduce the stress of all this technobabble, here’s a glossary that’ll help you quickly get on your way:
802.11: The general standard, developed by the IEEE (the Institute of Electrical and Electronics Engineers — the folks who create many of the standards for networking equipment), for wireless local area networks. Within the 802.11 standard are various substandards, including 802.11b (11 Mbps using the 2.4 GHz spectrum), 802.11a (54 Mbps using the 5 GHz spectrum), 802.11g (54 Mbps using the 2.4 GHz spectrum), and 802.11n (300 Mbps using the 2.4 GHz spectrum, the 5 GHz spectrum, or both).
access point (AP): A wireless LAN base station that connects a wired network (such as the wired Ethernet connection on a broadband modem or router) to the wireless network. The AP contains a radio transceiver (which transmits and receives radio signals), and most APs contain a router that directs your networked devices’ data to and from the Internet.
Bluetooth: A standard system for wireless personal area networks (PANs). Bluetooth provides speeds of up to 3 Mbps at short ranges (typically less than 10 meters). PAN technologies, such as Bluetooth, are complementary to LAN technologies (like 802.11) and are typically used to connect peripheral devices, such as keyboards to computers or wireless headsets to mobile phones.
Ethernet: A standard data communications protocol enabling computers and computer peripheral devices, such as printers, to interface with one another and across networks for the exchange of information. The most common variation of Ethernet found in home networks is the 100 Mbps 100BaseT variant, although many of other variations exist with speeds of 1,000 Mbps and beyond.
IP address: The “phone number” of the Internet, the IP address is used to identify computers and devices connected to the Internet and allows traffic to be routed across the Internet. Most wireless home networks have two IP addresses: a public IP address (used by your modem and access point or router) that identifies your network to other computers on the Internet, and a set of private IP addresses, used only within your network. Your access point (or separate router, if you have one) translates between your public and private IP addresses to send data to the right computer within your network.
local area network (LAN): A computer data communications network used within a limited physical location, such as a house.
network adapter (also network interface card, or NIC): A device that connects to an internal bus in a PC, which provides an interface between the computer or device and the LAN. For wireless networks, network adapters typically connect to the PC Card bus or to the USB bus of the device being networked. Most computers today already have the wireless network adapter built in.
Network Address Translation (NAT): A process performed in your access point (or separate router, if you use one) to translate, or create a tie, between your internal network’s private IP addresses and the public IP address assigned to your network by your Internet service provider (ISP). A NAT router is a device that performs this translation and lets devices on your network using nonroutable private IP addresses communicate with devices on the Internet.
service set identifier (SSID): Also referred to as ESSID, network name, service area, and other names, this term identifies a specific wireless LAN. To connect to a network, a device must “know” the SSID of the network.
Wi-Fi Protected Access (WPA): An improvement to WEP, WPA adds — among other changes — a key (TKIP, or Temporal Key Integrity Protocol) that changes dynamically over time, which eliminates the greatest shortcoming of WEP. WPA is the minimum level of security you should choose, if at all possible. WPA-Enterprise adds 802.1x authentication to make the network even more secure.
Wi-Fi Protected Access 2 (WPA2): WPA2 adds even further enhancements to WPA, including AES (Advanced Encryption Standard), which makes the encryption key almost impervious to current cracker attacks.
Wired Equivalent Privacy (WEP): The encryption system used by wireless LANs to provide security on the network. WEP uses an encryption key (which can be 40 or 104 bits long — these keys are often referred to as 64- and 128-bit keys because of some extra bits used in the WEP system) to encrypt data flowing across the network. Without the WEP encryption key, unauthorized users see only garbled data and cannot read what is being sent across the network.
wireless Ethernet bridge: A device that connects to an Ethernet port on a networked device (such as a PC, game console, or networked audio system) and provides wireless network adapter functionality for that device.
wireless LAN repeater: A device that extends the range of a wireless LAN by receiving signals from an access point (and other devices on a wireless LAN) and retransmitting them. A wireless LAN repeater is often placed in a separate part of the house and is used to allow devices that are too far from the access point to “get on” the wireless LAN.
Most people just refer to their wireless LAN as Wi-Fi. Which is good — we like simple names that everyone knows. But Wi-Fi actually covers a range of technologies, all part of the IEEE 802.11 family of standards, and each of these technologies differs in both its capabilities and its compatibility with other Wi-Fi gear. This table provides a quick, at-a-glance view of the four main 802.11 Wi-Fi variants, what frequencies they use, how fast they are, and how they work with other versions of 802.11.
Wireless LAN Technology | Frequency | Maximum Speed | Compatibility | Availability |
---|---|---|---|---|
802.11b | 2.4 GHz | 11 Mbps | 802.11g | Obsolete, still supported in network adapters |
802.11a | 5 GHz | 54 Mbps | 802.11n (where 5 GHz is supported, at 54 Mbps) | Obsolete, still supported in network adapters |
802.11g | 2.4GHz | 54 Mbps | 802.11b (at 11 Mbps) | Now |
802.11n | 2.4 GHz or 5 GHz (not all support 5 GHz) | 300 Mbps | 802.11g (at 54 Mbps); 802.11b (at 11 Mbps); 802.11a (at 54 Mbps where 5 GHz is supported) | Now |
You don’t need all that much to put together a wireless home network. The basics include a wireless base station (an access point — AP — or wireless home router) and appropriate wireless network adapters in your computers and other devices attached to the network. This list provides an overview of all the bits and pieces you either will or might need in your network. Hint: Don’t forget the cables! (They don’t always come in the box with your wireless gear, and there’s nothing worse than having to run back to the store because you forgot a $3 cable!)
Stuff You Need | Quantity You Need |
---|---|
Broadband DSL, fiber-optic, or cable modem connection | One |
Wireless LAN access point (AP) | One (or maybe more if you have a big house) |
CAT-5e/6 patch cable* | Two: A short one, to connect AP to broadband modem; and a 100-foot one, for troubleshooting and emergencies |
Wireless LAN network adapters | One per computer (usually preinstalled) |
Wireless Ethernet bridge | One per other networked device with Ethernet port (for example, original Xbox) |
Home network router | One (optional; usually included in access point) |
Wireless repeater | One or more (optional) |
* Make sure that your broadband router, AP, and other gear comes with a CAT-5e/6 patch cable, or be sure to buy one separately in addition to the cable you need to connect the AP to the broadband router (if your AP doesn’t come with a cable).
This document describes how to establish a point-to-point wireless link with the use of Cisco Aironet Wireless Bridges with Cisco LEAP authentication.
Ensure that you have basic knowledge of these topics before you attempt this configuration:
Configuration of basic parameters on the wireless bridge
Configuration of the Aironet 802.11a/b/g Wireless LAN (WLAN) Client Adapter
Extensible Authentication Protocol (EAP) authentication methods
The information in this document is based on these software and hardware versions:
Two Aironet 1300 Series Wireless Bridges that run Cisco IOS® Software Release 12.3(7)JA firmware
Two Aironet 802.11a/b/g Client Adapters that run firmware version 2.5
Note: This document uses a wireless bridge that has an integrated antenna. If you use a bridge which requires an external antenna, ensure that the antennas are connected to the bridge. Otherwise, the bridge is unable to connect to the wireless network. Certain wireless bridge models come with integrated antennas, whereas others need an external antenna for general operation. For information on the bridge models that come with internal or external antennas, refer to the ordering guide/product guide of the appropriate device.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
This document uses this network setup:
This setup uses two Aironet 1300 Series Wireless Bridges. One of the bridges is configured for root bridge mode and the other bridge is configured for non-root bridge mode. Client A associates with the root bridge and Client B associates with the non-root bridge. All the devices use IP addresses in the range 10.0.0.0/24, as the network diagram shows. This configuration establishes a point-to-point wireless connection between the bridges. Before the wireless bridges can communicate, they must authenticate to each other. The bridges use any one of these authentication methods:
Psiphon 3 free download for samsung. WhatsApp for Samsung Galaxy Pocket S5301 is a young and dynamic application for a mobile phone that also meets these features. Thanks to its technical performance and its low price, the Samsung Galaxy Pocket S5301 has become the choice for many users, that also want to be in touch all day.
Open authentication
Shared Key authentication
EAP authentication
This document uses LEAP for authentication and uses the local RADIUS server on the root bridge in order to validate the credentials.
Note: This document does not explain how to configure the client adapter to associate with the wireless bridges. This document focuses on the configuration of point-to-point connectivity between the root and non-root bridges. For information on how to configure the wireless client adapter to participate in a WLAN, refer to Basic Wireless LAN Connection Configuration Example.
Refer to Cisco Technical Tips Conventions for more information on document conventions.
A wireless bridge is a Layer 2 device that connects two or more LANs, which are often in different buildings, through the wireless interface. Wireless bridges provide higher data rates and superior throughput for>
Access the 1300 wireless bridge through the GUI and go to the Summary Status window.
Complete these steps:
Open a web browser and enter the IP address in the address line.
This example uses the IP address 10.0.0.1 for the root bridge. For information on how to assign an IP address to the wireless bridge, refer to the Obtaining and Assigning an IP Address section of the document Configuring the Access Point/Bridge for the First Time.
Press Tab in order to bypass the Username field and advance to the Password field.
The Enter Network Password window displays.
Enter the case-sensitive password Cisco, and press Enter.
The Summary Status window displays, as this example shows:
Configure the radio interface.
Enable the radio interface and define it as a root bridge.
This radio interface acts as the wireless interface for the root bridge.
Note: The radio interface is disabled by default on 1300 wireless bridges that run Cisco IOS Software Release 12.3(7)JA.
Complete these steps:
Choose Network Interfaces > Radio0-802.11G > Settings.
The Network Interfaces: Radio0-802.11G Settings window displays. You can use this window to configure various parameters that relate to the radio interface. These parameters include:
Role in the radio network
Radio data rates
Radio transmit power
Radio channel settings
Antenna settings
Other parameters
Click Enable under Enable Radio in order to activate the radio interface.
Enable root mode on the wireless bridge.
Under Role in Radio Network, click Root Bridge.
Note: The Role in Radio Network parameter allows you to configure the wireless bridge in these ways:
Root bridge
Non-root bridge
Root bridge with wireless clients
Non-root bridge with wireless clients
Root access point (AP)
Repeater AP
Workgroup bridge
Scanner
Install mode
If you want to configure the wireless bridge for root bridge/non-root bridge mode and you have wireless clients that are associated to the wireless bridge, you need to choose either Root Bridge with Wireless Clients or Non-Root Bridge with Wireless Clients for the Role in Radio Network parameter. In this way, the wireless bridge functions as a root/non-root bridge and also accepts wireless client associations.
Note: If you use an IEEE 802.11b standard bridge or have 802.11b clients with the 1300 wireless bridge, ensure that you do not choose Require for the Orthogonal Frequency Division Multiplexing (OFDM) data rates. If you choose Require for these data rates, the devices do not associate. The devices do not associate because the 802.11b devices do not support OFDM rates that operate based on the IEEE 802.11g standard. In the Network Interfaces: Radio0-802.11G Settings window example, the OFDM data rates appear with an asterisk (*) beside the rates. The settings in this example also show you how you must configure the data rates for 802.11b devices that operate in a 802.11g environment.
Enter 1 for the Distance (Km) parameter, leave all the other parameters at their default values, and click Apply at the bottom of the window.
Note: This document explains the point-to-point configuration with integrated (nonremovable) antennas that are placed close to each other. The bridges are less than 1 kilometer (km) apart. For this reason, all the other radio parameters are left at their default values. A configuration of other parameters can be necessary, however. The necessity of the configuration of other parameters depends on the environment in which these wireless bridges are deployed and the type of antenna that you use. These are other parameters that you may configure:
Antenna gain
Radio distance
Note: This is the distance between the bridges.
Definition of the transmit and receive antenna
Power level that is used for communication
Other parameters
Note: Refer to the Outdoor Bridge Range Calculation Utility in order to calculate these parameters. Always use this utility before you deploy the bridges in order to ensure good throughput and performance. For more information on how to configure the other parameters of the radio interface on the wireless bridge, refer to Configuring Radio Settings.
Enable LEAP authentication with a local RADIUS server in order to authenticate the wireless bridges.
Configure LEAP authentication on the root bridge, and then configure the non-root bridge as a LEAP client in order to authenticate to the root bridge. Complete these steps:
Choose Security > Server Manager in the menu on the left, define these parameters under Corporate Servers, and click Apply:
IP address of the RADIUS server
Note: For the local RADIUS Server, use the IP address of the AP. In the example, the IP address to use is the IP address of the root bridge, which is 10.0.0.1.
Authentication and accounting ports
Shared secret of the RADIUS server
Note: In the example, the shared secret is Cisco.
Note: The local RADIUS server listens on ports 1812 and 1813.
In the Default Server Priorities area of this window, select the local RADIUS server IP address and click Apply.
In order to enable WEP encryption, complete these steps:
Note: LEAP authentication requires WEP encryption to be enabled.
Choose Security > Encryption Manager.
In the Encryption Modes area, choose Mandatory for WEP Encryption and choose WEP 128 bit from the drop-down menu beside Cipher.
In the Encryption Keys area, choose 128 bit as the Key Size and enter the Encryption Key.
Note: This encryption key must match the encryption key that you configure on the non-root bridge.
In this example, the encryption key is 1234567890abcdef1234567890.
Here is an example:
Create a new service set identifier (SSID) for the bridges to use in order to communicate.
Complete these steps:
Choose Security > SSID Manager from the menu on the left.
The SSID Manager window displays.
Enter the new SSID in the SSID field. Imageline edison standalone vst v2.1-doa: full version software.
This example uses Cisco as the SSID.
In the Authentication Settings area, check the Network EAP check box and click Apply.
This enables LEAP authentication.
Here is an example:
Note: In Cisco IOS Software Release 12.3(4)JA and later, you configure SSIDs globally and then apply them to a specific radio interface. Refer to the Creating an SSID Globally section of the document Configuring Multiple SSIDs in order to configure SSIDs globally. Also, in Cisco IOS Software Release 12.3(7)JA, there is no default SSID.
Scroll down to the Global Radio0-802.11G Properties area and complete these steps:
From both the Set Guest Mode SSID and the Set Infrastructure SSID drop-down menus, select the SSID that you configured.
For this example, select Cisco.
Check the Force Infrastructure Devices to associate only to this SSID check box.
This action configures the SSID Cisco as an infrastructure SSID and enables guest mode for this SSID.
Configure the local RADIUS server parameters.
Choose Security > Local Radius Server, and click the General Set-Up tab.
In the Local Radius Server Authentication Settings area, click LEAP.
In the Network Access Server (AAA Client) area, define the IP address and shared secret of the RADIUS server and click Apply.
For the local RADIUS server, use the IP address of the AP.
Here is an example:
In the Individual Users area, define the individual users and click Apply.
The user name and password that you configure must match the user name and password of the LEAP client. In this example, these fields must match the user name and password of the non-root bridge. The example user name is NonRoot, and the password is Cisco123.
Note: Groups are optional. The group attributes do not pass to the active directory and are only locally relevant. You can add groups later, after you confirm that the base configuration works correctly.
Now that you have configured the root bridge, it is ready to associate with clients and non-root bridges. Configure the non-root bridge in order to complete this setup and establish a point-to-point wireless connection.
You can use the CLI in order to configure the bridge using telnet.
This section presents the information to configure the wireless bridge as a non-root bridge. The non-root bridge authenticates as a LEAP client to the local RADIUS server on the root bridge.
Access the wireless bridge through the GUI and go to the Summary Status window.
Complete the instructions in Step 1 of the section Configure the Root Bridge in order to reach the Summary Status window.
Note: The non-root bridge is configured with IP address 10.0.0.2.
This window displays:
Configure the SSID for communication.
Choose Security > SSID Manager from the menu on the left.
The SSID Manager window appears.
Enter the same SSID that you configured on the root bridge in the SSID field.
In the Authentication Settings area, check the Network EAP check box.
Scroll down to the General Settings configuration parameters, define the user name and password for EAP Client, and click Apply.
This user name and password must exist on the RADIUS server for successful LEAP authentication. In this example, the user name and password must be on the local RADIUS server on the root bridge. Use the user name NonRoot and password Cisco123, which you already configured on the local RADIUS server.
Scroll down to the Global Radio0-802.11G SSID Properties area of this window and complete these steps:
From both the Set Guest Mode SSID and the Set Infrastructure SSID drop-down menus, select the SSID that you configured.
For this example, select Cisco.
Check the Force Infrastructure Devices to associate only to this SSID check box.
This action configures the SSID Cisco as an infrastructure SSID and enables guest mode for this SSID.
Enable the radio interface and configure the radio interface for non-root mode.
Complete these steps:
Enable the radio interface and define it as a non-root bridge.
Note: The radio interface is disabled by default.
Complete these steps:
Choose Network Interfaces > Radio0-802.11G > Settings.
The Network Interfaces: Radio0-802.11G Settings window displays.
Click Enable under Enable Radio in order to activate the radio interface.
Enable non-root mode on the wireless bridge.
Complete these steps:
For Role in Radio Network, click Non-Root Bridge.
Enter 1 for the Distance (Km) parameter, leave all the other parameters at their default values, and click Apply at the bottom of the window.
Configure the non-root bridge as a LEAP client.
Choose Security > Encryption Manager.
In the Encryption Modes area, choose Mandatory for WEP Encryption and choose WEP 128 bit from the drop-down menu beside Cipher.
In the Encryption Keys area, choose 128 bit as the Key Size and enter the Encryption Key.
You must use the same WEP encryption key that you used on the root bridge. In this example, the encryption key is 1234567890abcdef1234567890.
You can use the CLI to configure using telnet.
This example sets a LEAP user name and password for the SSID bridgeman:
Use this section to confirm that the bridges can associate with each other.
After you configure the wireless bridges for point-to-point connectivity, the local RADIUS server that you configured on the root bridge performs authentication with the use of LEAP.
In order to verify successful LEAP authentication, check that the Summary Status report on the root bridge looks like this example:
Check that the Association table looks like this example:
Verify the connectivity on the non-root bridge Association table.
Use the ping test to verify the point-to-point connection.
Choose Association > Ping/Link Test.
The ping output confirms the establishment of point-to-point connectivity between the wireless bridges.
Now that you have established the point-to-point connectivity between the wireless bridges, verify the connectivity between the end clients that connect to the wireless bridges.
After you configure the client adapters, the clients associate with the bridges. This example shows the Summary Status window on the root bridge with Client A associated:
The ping test output from the command prompt on Client A confirms reachability to Client B. Here is an example of the ping test on Client A:
Verify these items in order to troubleshoot the connectivity between the wireless bridges:
Ensure that the bridges are configured appropriately in their roles.
Ensure that security settings are identical on both the bridges; wireless settings (such as channel and SSID) should be configured identically on both the bridges.
Ensure that the least congested channel is selected; there should be least interference in the path between the bridges.
Check if appropriate antennas are used for the radios.
Ensure that the antennas of both the bridges are aligned properly to receive maximum signal.
Ensure Layer 3 connectivity. You can use the ping command in order to verify Layer 3 connectivity.
For more information on how to troubleshoot bridge connectivity, refer to Troubleshoot Common Problems with Wireless Bridged Networks.