Friday, May 31, 2013

How to configure TL-WA5110G/TL-WA5210G as a repeater

Suitable for: TL-WA5110G, TL-WA5210G




Attention:TL-WA5110G /TL-WA5210G can only support WEP security type under Repeater/Universal Repeater mode.
Information of Root Router:
  • LAN IP: 192.168.1.1
  • SSID: TP-LINK-test
  • Encryption Type: WEP Open Hexadecimal
  • Passphrase: 0123456789
      
    Preparation
    Since the DHCP function on TL-WA5110G /TL-WA5210G is disabled by default, we have to manually assign an IP address as 192.168.1.x to the computer to match the default IP address (192.168.1.254) of the AP. Please click here for detailed instruction.
    For example, we can configure the computer’s Local Area Connection IP address as 192.168.1.100/255.255.255.0
    Then please connect the computer to the AP with an Ethernet cable.
    Configuration on Device (TL-WA5110G / TL-WA5210G):
    1.   Login to the Repeater’s management page.
    In the address bar of the web browser, type in the IP address of the repeater (default is 192.168.1.254) and press Enter.
    Type in the Username and Password (default is admin).



  2.  Click Operation Mode, select AP mode and click Save.



 3.   Click Wireless -> Wireless Mode. Select Universal Repeater as the Wireless Mode. Then click Survey.
(If the Root Router supports WDS, you can select Repeater as Wireless Mode.)
 


4.   Find the Root Router’s SSID on the AP List, and then click Connect.



   

5.   Click Save. 

If you can see the following picture, please wait until it refreshes back to the Status page.

 


6.    Do the same Wireless Security Settings as your Root Router.
At Repeater/Universal Repeater mode, TL-WA5110G /TL-WA5210G can only support WEP as security type. And if your Root Router´s wireless network is secured, please make sure that the security type is WEP.
 
In our example, the Root Router is WEP secured.      
Click Wireless ->Security settings
Select WEP, and set the same Type, Key Format and Key Type as the Root Router.
Then put in the same password "0123456789".
Click Save.
 
 
7. Click System Tools->Reboot->Reboot to restart the device.
 
 
After you go through all the above steps, the Repeater should be working properly with the Root Router.
NOTE:
After you finish the settings, please change the Local Area Connection IP address setting for your computer back to the default.
 
 

 

Thursday, May 30, 2013

TP-Link TL WA5210G Configuration Client Mode

The Image below shows how an AP client works.


Here we take the following information as an example. However, you need configure it properly according to the basic information of your own router.

Information of Root Router:
  • LAN IP: 192.168.0.254
  • SSID: TP-LINK-test
  • Encryption Type: wpa2-psk
  • Password: 0123456789

Preparation:
Since the DHCP function on the AP is disabled by default, we have to manually assign an IP address for the computer to match the IP address (192.168.1.254 in default) of the Client. Please click here for detailed instructions.
Here, you can configure the IP address as 192.168.1.100/255.255.255.0.




Connect the computer to the LAN port of AP with an Ethernet cable.
Configuration on Client (TL-WA5110G OR TL-WA5210G):

Step 1
Log onto the Client’s management page.
In the address bar, type in http://192.168.1.254, then press enter.



 Then type in the username and password, which are both “admin” in default.


Step 2
Click Network on the left side menu. Please make sure the AP’s IP address is in the same IP segment with the Root Router’s to avoid the IP conflict. In this instance, we can change the IP to “192.168.0.1”. Then click Save.
 
And then change the IP address of your computer back to 192.168.0.100/255.255.255.0, logon the web page with 192.168.0.1 again.

Step 3
On the left side menu, click on Operation Mode, selectAP/Standard APmode, and clickSave.
 

Step 4
Click Wireless ->Wireless mode. Select Client as the wireless Mode. Then click Survey.

Step 5
Find the Root Router’s SSID on the AP list, and click Connect.

Step 6
Click Save.
If you see this picture, please wait until it refresh back to the status page.

Step 7
Click Wireless ->Security settings. You must make sure the Security type of your root AP. Here we take wpa2-psk as a example. Select WAP-PSK/WPA2-PSK, and type in the password “0123456789”. Then click Save.

After you go through all the above steps, the Client should work properly with the Root Router.

Please re-configure the IP settings of your computer to Obtain an IP address automatically/Obtain a DNS server address automatically in order to connect to Internet after all the settings, click here for detailed instructions. Then you can check the connectivity by using Ping in command prompt on that computer. For how to use Ping, please refer to how to use Ping command.

NOTE:
If you have a broadband router which provide you Internet connection, please re-configure the IP settings of your computer to Obtain an IP address automatically/Obtain a DNS server address automatically to suitable for the router in order to connect to Internet after done the settings.

If the Ping is not successful, please check all above settings carefully, or contact TP-LINK support for help.


Open Systems Interconnection (OSI) Reference Model

At one time, most vendors agreed to support OSI in one form or another, but the OSI was too loosely defined and proprietary standards were too entrenched. Except for the OSI-compliant X.400 and X.500 e-mail and directory standards, which are still widely used, what was once thought to become the universal communications standard now serves as the teaching model for all other protocols.

Most of the functionality in the OSI model exists in all communications systems, although two or three OSI layers may be incorporated into one.

Example of how the OSI Layers work using an e-mail sent from the computer on the left.

Data travels from the sending computer down through all the layers to the physical layer where the data is put onto the network cabling, and then sent to the physical layer of the receiving computer where the process reverses and the data travels up through the layers to the application layer of the receiving computer.

E-mail sent from John:
Meet me at Carl's 1:30

John

E-mail received from John:
Meet me at Carl's 1:30

John



Identify sender
and intended receiver; is there an e-mail application available?

APPLICATION

layer 7
Identified sender and intended receiver; found e-mail application.
Encode data with X coding key; use ASCII characters.

PRESENTATION

layer 6
Decoded data with X decoding key; used ASCII characters.
Initiate and terminate the session according to X protocol.

SESSION

layer 5
Initiated and terminated the session according to X protocol.
Make sure all data is sent intact.

TRANSPORT

layer 4
Make sure all data has arrived intact.
Keep track of how many hops;

open shortest path First;

Go to IP address 255.65.0.123

NETWORK

layer 3
Keep track of how many hops;

opened the shortest path First;

Went to IP address 255.65.0.123
Is the initial connection set up? Put data into frames according to X standard.

DATA LINK

layer 2
The initial connection set up. Decoded data in frame according to X standard.
Send as electrical signal over the network cable at X voltage, and X Mbps.

PHYSICAL

layer 1
Receive electrical signal over the network cable at X voltage, and X Mbps.


A look at each of the OSI layers , and the role it plays.


APPLICATION

layer 7
Gives user applications access to network. This layer represents the services, that directly support the user applications such as software for file transfers, database access, and E-mail
PRESENTATION

layer 6
The presentation layer, usually part of an operating system, converts incoming and outgoing data from one presentation format to another. Presentation layer services include data encryption and text compression.
SESSION

layer 5
Opens manages, and closes conversations between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handling.
TRANSPORT

layer 4
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Sequences data packets, and requests retransmission of missing packets. It also repackages messages for more efficient transmission over the network.
NETWORK

layer 3
Establishes, maintains and terminates network connections. Routes data packets across network segments. Translates logical addresses and names into physical addresses.
DATA LINK

layer 2
Transmits frames of data from computer to computer on the same network segment. Ensures the reliability of the physical link established at layer 1. Standards define how data frames are recognized and provide the necessary flow control and error handling at the frame set.
The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
PHYSICAL

layer 1
The Physical layer defines all the electrical and physical specifications for devices. This includes the layout of pins, voltages, and cable specifications. Hubs, repeaters and network adapters are physical-layer devices.
Defines cabling and connections. Transmits data over the physical media.
Some common network devices and protocols and where they are implemented in the OSI model.


OSI LAYER

DEVICES

PROTOCOLS
APPLICATION

layer 7

SNMP, SMTP, FTP, TELNET, HTTP, NCP,
SMB, AppleTalk
PRESENTATION

layer 6

NCP, AFP, TDI
SESSION

layer 5

NetBIOS
TRANSPORT

layer 4

NetBEUI, TCP, SPX, NWlink
NETWORK

layer 3
Routers, layer 3 (or IP) switches.
IP, IPX, NWlink, NetBEUI
DATA LINK

layer 2
Bridges and switches, Ethernet incorporates both this layer and the Physical layer.
-
PHYSICAL

layer 1
Hubs, repeaters, network adapters, Parallel SCSI buses. Various physical-layer Ethernet incorporates both this layer and the data-link layer. Token ring, FDDI, and IEEE 802.11.
-

The unofficial other OSI Layer 2.5
While not a part of the official OSI model, the term "Layer 2.5" has been used to categorize some protocols that operate between the data link layer 2 and the network layer 3. For example, Multiprotocol Label Switching (MPLS) operates on packets (layer 2) while working with IP addresses (layer 3) and uses labels to route packets differently.
Interfaces
In addition to standards for individual protocols in transmission, there are also interface standards for different layers to talk to the ones above or below, usually operating system specific. For example, Microsoft Winsock, and Unix's sockets and System V Transport Layer Interface, are interfaces between applications (layers 5 and above) and the transport (layer 4). NDIS and ODI are interfaces between the media (layer 2) and the network protocol (layer 3).

Layer
Examples
TCP/IP
AppleTalk
OSI
Novell IPX
Application
HL7

Modbus

SIP
HTTP

SMTP

SMPP

SNMP

FTP

Telnet

NFS

NTP
AFP

PAP
FTAM

X.400

X.500

DAP

Presentation
TDI

ASCII

EBCDIC

MIDI

MPEG
XDR

SSL

TLS
AFP

PAP
ISO 8823

X.226

Session
Named Pipes

NetBIOS

SAP

SDP
Session establishment for TCP
ASP

ADSP

ZIP
ISO 8327

X.225
NWLink
Transport
NetBEUI
TCP

UDP

RTP

SCTP
ATP

NBP

AEP

RTMP
TP0

TP1

TP2

TP3

TP4

OSPF
SPX

RIP
Network
NetBEUI

Q.931
IP

ICMP

IPsec

ARP

RIP

BGP
DDP
X.25 (PLP)

CLNP
IPX
Data Link
Ethernet

Token Ring

FDDI

PPP

HDLC

Q.921

Frame Relay

ATM

Fibre Channel

LocalTalk

TokenTalk

EtherTalk

Apple Remote Access

PPP
X.25 (LAPB)

Token Bus
IEEE 802.3 framing

Ethernet II framing
Physical
RS-232

V.35

V.34

Q.911

T1

E1

100BASE-TX

ISDN

SONET

DSL

Localtalk on shielded, Localtalk on unshielded
(PhoneNet)
X.25 (X.21bis)

EIA/TIA-232

EIA/TIA-449

EIA-530

G.703


notes:
X.400 An ISO and ITU standard for addressing and transporting e-mail messages. It conforms to layer 7 of the OSI model and supports several types of transport mechanisms, including Ethernet, X.25, TCP/IP, and dial-up lines.


X.500 An ISO and ITU standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information, such as country, state, and city. X.500 supports X.400 systems.


Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.
The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide.
Different protocols are used for different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs. 


Wednesday, May 29, 2013

TP-Link TL WA5210G Configuration

















TP-Link TL WA5210G configurations as access point
Connect all the cables to it and to your computer,Open your browser and type its default ip(192.168.1.254) to access it web console.A pop up page will ask you to enter user name and password.
Tip:Default username and password is “Admin”


Once you will see its web console main page,


Click on Quick setup in the left navigation bar.Click on Next to proceed to the setup,Select AP  in the operation mode page and click Next.You can select AP-Client router if you want it to connect to you WISP.But we are going to configure it to use as a Wifi Access Point so we will choose AP(Access Point).

In the next step,you will see the Wireless Settings, 
Enter your Network Name in the SSID Field,This name will be shown in the air.

Select your Current country in the Region Filed.
Choose a channel that is not used or less used by other devices in your area.(Remember:Choosing the same channel for more than one devices in the same range may disturb your wireless distribution).

Click Next.



After reboot device will be Configured and now you can detect its wireless signals on wireless devices.Now we will Change some of its  settings to make it work flawlessly.
Click on the Network Tab in the left Navigation bar.Now we will change its default IP So that hackers may not try to get into our device or they may not flood our device.

Change the last prefix of your IP Address and click save.(e.g 192.168.1.254 change to 192.168.1.200).
                           Tip:After reboot, access your device’s web console with new changed IP i.e 192.168.1.200

Now we will change the distance settings,click on Wireless menu in the left navigation bar and select the sub-menu named Distance Settings.
Set the Adjust option to outdoor,and put distance to 4 kilometers.(Trust me,it will not through signals to 4 kilometers we are just setting it to get max. coverage)
Now Click on Wireless settings and make sure your are using the Vertical Antenna in Antenna Settings.
                                            Tip:If you are using an external antenna with it,you must set Antenna Settings to External.

Now Click On System Tools and click on password to change your current password.
Now we will take the backup of our settings so that in case of  loosing our config. we should not waste our time on re config.
Click on Backup in system tools and click on Backup.You will get a backup file,save it to your computer.