Wireless Network with Security Infrastructure Lab Requirements (Windows CE 5.0)
The wireless network with a security infrastructure consists of one desktop server computer, one CEPC, two wireless access points, and one hub. Using multiple access points provides you with a broad spectrum of test scenarios, such as roaming.
The requirements listed refer to the hardware and software Microsoft used for testing purposes. If you decide to use different products in your wireless network, refer to the product-specific documentation.
The following illustration shows a schematic of the wireless network you will create.
The following table shows the devices that are required for this network.
Item name and function | Software | Configured as |
---|---|---|
PBHOST
Development and host computer. |
Windows 2000 Professional Edition or later with Microsoft Windows CE Platform Builder installed. | Host computer for CEPC. |
CETEST
Wireless client device. CEPC. |
Windows CE .NET 4.1 or later. | An Enterprise Web Pad with applications. See Creating a Wireless Run-time Image for a CEPC for a list of required Catalog items. |
TESTSERVER
Domain controller, IAS server, and certificate server. |
Windows Server 2003 | Must have the following items installed and configured:
|
CEWPA
Provides open wireless access using Wi-Fi Protected Access (WPA). Must support WPA. |
Proprietary software. | Air Staton G54**, model: WLA-G54 54MBPS, wireless bridge base station. |
CE8021X
Provides open wireless access using 8021x authentication Must support IEEE 802.1x. |
Proprietary software. | CISCO AIRONET 350** series Ethernet Access Point. |
Additional Hardware Requirements
The following table shows the additional hardware you will need to set up your test lab.
Item | Number |
---|---|
PCMCIA network adapter for CEPC, compatible with Windows CE .NET 4.2 or later. | 1 |
WPA-compatible wireless LAN Adapter for CEPC compatible with Windows CE .NET 4.2 or later, for example Linksys WPC 11** wireless LAN adapter. | 1 |
Ethernet cables. | 5 |
Hubs. | 2 |
**The non-Microsoft software and hardware referenced in this document are included for illustrative purposes only. Illustrations that use such third party software and hardware as examples are not intended to be an endorsement or recommendation of any of these products. We provide this information only as a convenience for our customers for purposes of explaining a practical application and do not provide warranties of any kind, whether express, implied or statutory, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.
See Also
How to Set Up a Wireless Network with a Security Infrastructure
Last updated on Thursday, February 02, 2006
Send Feedback on this topic to the authors