Campus Wireless Coverage Scheme Wireless Coverage Project

Project Overview adopts a common network protocol standard: At present, wireless LANs generally adopt 802.11 series standards. Therefore, WLANs will mainly support 802.11g (54M bandwidth) standards to provide relative network communication services that can be used in practical applications, taking into account multiple types of applications. For future investment protection, it is necessary to support both 801.11a and 802.11b and implement dual-band three-mode technology.

Coverage requirements:

1. Outdoor sites where wired networks cannot be accessed: It is difficult to achieve wired network access in some places in the area, and wireless networks that cover a wide range of outdoor spaces can be accessed through wireless.

2. Inconvenient or constrained indoor space for wired networks: Some indoor spaces in the area have a large space, which can result in the need for many people to access the network at the same time. Using the wired method can only provide a small number of interfaces and cannot meet the requirements. With wireless network coverage to solve a considerable number of mobile devices access the network at the same time.

Wireless network network structure requirements:

The APs deployed for wireless access are connected to the LAN through the convergence layer devices of the LAN. The corresponding interfaces are provided to the wireless network cable at the aggregation layer. The devices at the access layer are described in the solution.

Design Scheme I. Whole Network Logic Topology

Second, the wireless user authentication solution This program mainly uses portal authentication. The wireless AP communicates with the wireless controller through the Layer 2 tunneling protocol. The wireless user authentication points are placed on the wireless service card insertion device and the background iMC authentication and accounting system. As a user authentication point.

Given the current scale of wireless networks, from the perspective of network support capabilities, a single card can be implemented. For wireless users, the wireless controller serves as the endpoint for 802.1x authentication, and the iMC authentication and accounting system serves as the final authentication point. When the user performs handover within the AP, the main task at this time is unified scheduling by the wireless switch, when the user When the coverage of different APs is under different ports, the user will not trigger authentication again.

Third, the whole network security solution wireless local area network public network, network security issues must be considered when building a network, security methods are mainly focused on several aspects: user security, network security, and in the local area network mainly dependent on the user entity The attributes mainly include the layer 2 attributes (such as the MAC address) of the information terminal used by the user and the user's account number and password. For the user, the account information is a real-name principle and is associated with the user's personal information. Considering the security mechanism of air interface information using wireless networks, the security of wireless network-related wired networks should also be considered. The security of existing wired networks is not considered in this technical proposal.

The wireless network security part mainly includes the following aspects:

1. MAC address filtering: MAC address-based filtering is currently supported to restrict terminals with certain types of MAC address characteristics from entering the network.

2. SSID management: It is a scheme of network identification. The network carries out a logical identification. The packets sent by the terminal are required to carry the SSID. If there is no SSID, it cannot enter the network.

3, WEP encryption: WEP encryption is a static encryption mechanism, both sides of the communication have a common key, the air interface information messages sent by the terminal must use a common key for encryption;

4. AES encryption is supported. The AES security mechanism is a dynamic key management mechanism. At the same time, the key generation is also implemented based on an asymmetric key mechanism. At the same time, the management of the key is also regularly updated. The system time can be set by the system. As a rule, the general situation is set to 5 minutes or so, so that illegal users want to obtain a sufficient number of packets to match out the key within 5 minutes. From the perspective of the wireless air interface, it is basically impossible. of;

5. Permission can be divided according to the user name, that is, the same user accesses the wireless network in different places and their permissions remain the same; the key setting may be combined with the user information according to the SSID information, that is, the key generation of different users under different SSIDs. Can be different, this way to a certain extent, to ensure that the issue of serial number between users, thus protecting investment, in order to achieve balance between operation and maintenance;

6. Traffic abnormality and abnormal message supervision are implemented to protect the further security of the network.

Fourth, frequency planning and load balancing solution frequency planning (support dual-band three-mode, it is recommended to deploy 802.11g)

802.11g uses the open 2.4GHz ISM band, and the number of operable channels is 13 European standard channels. Because of its support for direct sequence spread spectrum technology, there is overlap between adjacent frequency points. For true non-overlapping channels, there are only 5 operating center frequency points apart. Therefore, for the 802.11g operating band at 2.4 GHz, only three-cell cellular planning can be theoretically implemented to achieve seamless coverage of hot spots that need to be planned. In addition, because the power template can be in compliance with the adjacent channel and the partition does not interfere, it also greatly affects the effect of frequency planning.

A large number of experiments have been conducted on how to implement 802.11g frequency planning. Experiments have shown that 3 carrier frequencies can also achieve seamless coverage of the areas covered by cellular networks, and provide higher service bandwidth, improve service quality, and develop high-bandwidth services. .
Figure 3 Frequency plan schematic

Functions that need to be used in conjunction with frequency planning include: 1. The AP supports 13 channel settings 2. The AP supports 100mW maximum RF power and multi-level power control 3. The AP supports external antennas and directional antennas 4. AP-supported bridging function is also required for special applications , access and WDS functions 5, wireless network management solutions based on the standard SNMP protocol to achieve device management, special wireless LAN management software Quidview wireless components can achieve all WLAN network management. Network management workstations can be placed anywhere on the Internet, and management of wireless switches can be achieved through standard SNMP. The wireless switch can implement more powerful management, including automatic topology discovery, automatic upgrade, batch configuration, hierarchical management, and hierarchical alarming of the AP, and can implement security functions such as radio frequency scanning and illegal access point monitoring in the wireless coverage space. The wireless LAN management software WXM can configure and manage the entire WLAN wireless network, which has the following features:

1. Zero-configuration installation: The access point does not need to be pre-configured, and the AP inherits the configuration information from the wireless controller. The wireless controller can be connected to the core switch in the center of the equipment room. The wireless AP does not need to be configured in advance. That is, it accesses the wired network through the access layer switch and automatically registers with the wireless controller to obtain the IP address assigned by the DHCP server and automatically Downloading the configuration file works normally, saving a lot of installation and maintenance costs in the large-scale AP project.

2. Anti-theft and anti-intrusion: Sensitive configuration information is not saved locally. Even if the device is invaded and stolen, it will not lose security information. In practice, many APs are placed in public places. If the key, SSID, and other security information are stored locally, once theft threatens the security of the entire network, the wireless AP is installed due to its zero configuration. Once the power is lost, no information is saved. To avoid invasion.

3, support flexible topology: AP allows a variety of deployments, which can be directly or indirectly connected to the management of its wireless LAN controller. The wireless controller and the wireless AP can isolate any router or switch. As long as they are connected together in a wired network, the wireless AP can automatically find the wireless controller to register.

4. Automatically setting transmission power and allocating radio frequency channels: Automatically setting transmission power and allocating radio frequency channels to optimize the size of RF units and meet the requirements of radio frequency channels in various countries. When an individual AP fails, the wireless controller automatically adjusts the power of neighboring APs to compensate for the signal dead zone.

5, identity-based networking: According to the user name to distinguish between user rights, different from the traditional WLAN network through the access of the wired switch port user rights are divided, and can be the user's location, bandwidth, and roaming historical data Record tracking.

6, to provide enhanced security and seamless roaming: Through this identity-based networking features, improved user group authentication access control, always forced roaming policy and monitoring of bandwidth usage to achieve enhanced wireless LAN Security, to achieve a seamless user mobility and freedom, which can be secure connection and roaming, multiple authentication access at a time, eliminating the need for re-authentication under different APs.

7. Security Management: Intrusion detection is provided. The dedicated AP can continuously scan the airspace to provide 24/7 protection for environments requiring higher security. Once there is a rogue access point in the wireless network, the wireless AP reports the corresponding alarm to the wireless controller and displays it through the network management software.

6. Wireless AP Power Supply Solution Since there are a large number of AP devices in this wireless network, the AP deployment position is adjusted according to the actual coverage effect. It is difficult to provide local power supply on the completed buildings. APs are mainly used for outdoor coverage. On the outside, the local power supply problem to the AP is more difficult. The standard 802.3af implements power to the AP. By superimposing a power supply or an embedded switch at the aggregation switch, the data can be transmitted to the AP at the same time through the Ethernet cable, and the power supply distance is up to 100 meters, which meets the requirements of actual networking.

However, APs in some areas need to be placed outdoors, that is, they must be used in conjunction with the outdoor chassis. To ensure that cold weather cold-working outdoor built-in electric heating panels, in addition to providing POE power supply for the AP, the chassis needs to be locally AC power.

GAC Speed Controller

GAC Speed Controller

GAC Speed Controller is rugged enough to be placed in a control cabinet or engine mounted enclosure with other dedicated control equipment. If water, mist, or condensation may come in contact with controller, it should be mounted vertically. This will allow the fluid to drain away from the speed control unit.

We can supplide supplied the GAC speed controller from manufactures .

1. GAC Speed Controller Model

GAC Sereis: ESD2210, ESD5111, ESD5221, ESD5500E, ESD5522E, ESD5550E, ESD5570E, ESD5330, LSM672N, SYC6714 ESD5111, ESD5330 . EDG5500, ESD5131, ESD2110 ESD5526E, ESD2241, ESD5522, ESD5550,ESD5330.

GAC Speed Controller

Engine GAC Speed Control Unit Controller ESD5500E

Other Generator Parts we can provide:
Generator parts: DSE Controller , Comap Controller , Woodward Controller, Cummins Speed Controller, GAC Speed controller, Generator AVR , Engine Actuators, Engine Sensors , Engine Meters .





GAC Speed Controller,GAC Controller,GAC Speed Control Unit,Esd5500E

Jining Kunpeng Construction Machinery Equipment Co., Ltd , https://www.excavatorenginepart.com

Posted on