Free Essay

Lan Paper

In:

Submitted By wayne1966
Words 265
Pages 2
Robert W. Ramirez
LAN Topologies
IT/240
Carlos Zapata
May 31, 2014

LAN Topologies
Case Project I
The changes in equipment that would be required to bring Old-Tech Corporation up to date and solve the shared bandwidth problem would be to change their network scheme. To go from a Star topology to and extended star topology, which their logical topology would be a ring.
We would have to buy five wireless nic-cards to start to accommodate the cabling issue in the warehouse as well as a wireless access point and a wireless router.
Case Project II
EBiz.com would do well with a Switched Logical topology using a physical star topology.
The Network will be Server based running four or five servers each with a certain task. The network will host at least 250 computers not including the servers with room to accommodate at least 50 more computers for future employees. I will implement a number of switches to accommodate the three or more floors that we need to access.
Case Project III
ENorm Inc. would do well with a Mesh Topology; we would use existing wiring closets to run the new cables needed to setup the network. We would also setup the wireless WAN to connect the two offices together. The network will be server based and will have a separate data base server at each location to handle application and data at each location, but accessible to all who need to have access to it. We would have switches in place to handle the necessary bandwidth we decide to go with

Similar Documents

Free Essay

Hum 111

...festivals. The gunpowder was used in weapons at the end of the 10th Century, when firearms such as exploding arrows heads, flintlock rifles and cannon became available on a large scale. During the 18th century when Western powers invaded China, the Chinese troops were still using flintlock rifles and cannons. At the end of the 14th century a Chinese named Wan Hu fitted a chair with 47 prototype self-made rockets and held a large kite in his hands. His plan was to fly into space and then float back down to the Earth using the kite. The rockets ended up exploding and killing Wan Hu but in his honor In the 1970s, the International Astronomical Union named a lunar crater after Wan to commemorate the first person who attempted to fly using rockets. (LAN, 2008) (2) Pasta It was around 300 BCE. Shu Hsi, an official editor of ancient texts and one of the most learned men of China. A pasta enthusiast, in about 300 CE, he composed a poem titled: A Rhapsody on Pasta. Chinese made pasta from rice flour. It was soft and was usually used to create Chinese dumplings. (...

Words: 1913 - Pages: 8

Free Essay

Ankara

...An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road · Atlanta, GA 30328 Tel: 404.236.2600 · Fax: 404.236.2626 WWireWireless Lan Security 802.11b Wireless LAN Security Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming 802.11 network technologies. Wireless LAN Business Drivers Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired...

Words: 3757 - Pages: 16

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Information System

...Topic 1 a) Discuss any 3 key skills and characteristic should an information system manager posses. b) Today’s Point of Sales – Electronic Fund Transfer (POS-EFT) system requires several components to function. List and discuss the function for these components. a) An Information System (IS) manager has two principle roles within an organization. He has to be able to manage the change processes that are inevitably initiated by the introduction of technology into his workplace, and he has to manage the operational aspects of business and organizational activities founded on computing and communication technology. Hence an IS manager is a leading figure in both organizational change and performance. From this definition, it is a natural deduction that for IS manager to work effectively, they must have or need to be: * Detailed knowledge of the organization’s mission and vision, its peculiar business strategies and implementation skills. With these understanding, the IS manager will then be able to design an information system which can help the organization to achieve its goal. * Skilled in inter-personal management. This consists of communication skills both written and oral, people oriented and also negotiation skill. Regardless of how an organization structures its information system department, system development is a team effort. So learning how to work and communicate effectively with other team members is important for any information system professionals...

Words: 1563 - Pages: 7

Premium Essay

Test

...an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions...

Words: 18577 - Pages: 75

Premium Essay

Responding

...worth over $5 million in revenue to your $10 million company. The client seeks to ensure that your small organization has the technical acumen to prepare, guide, and assess merging the two company networks.  Write a two to three (2-3) page paper in which you: 1. Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size.  2. Graphically depict and effectively promote your company’s structured development and services using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Explain what the client can expect from your services. Our organization is a small sized network consulting company that specializes in LAN configuration, Inter-LAN routing designing, topology designs, and VLAN configurations.   Our quality team of experts are all CCIE qualified in all the services we can provide for the merger of the two networks.   Many of our consultants are highly rated in the industry.   The following is a partial listing of some of the previous work that we have performed for a variety of enterprises.   We can provide references upon your request.       • We have designed a hierarchical LAN topology.       • For a private network we designed their address scheme.       • We provided additional network security by configuring port security on switches.       • We...

Words: 383 - Pages: 2

Free Essay

Wireless Vulnerabilities

...hardware and software, modes of communication, and the system architecture. * Operational - methods that individuals perform as for as information system * Administrative - feeble countermeasures in the authoritative methodology that influence the information systems. * Physical - frail countermeasures in the physical design of, and access to, offices and fenced in areas where computerized data frameworks are house. * Personnel - feeble countermeasures in approach, procedure, and methods utilized for security screening of staff having entry to the system. I would like to focus my paper on Wireless Vulnerabilities, because assailants have discovered new parkways to exploit shortcomings in remote systems that, as a rule, have yet to be tended to by associations. There are a few known vulnerabilities that happen for the most part as a result of the very way of the LAN, which utilizes radio frequencies...

Words: 2588 - Pages: 11

Free Essay

Radio Frequency (Rf) Interference Analysis and Optimization

...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...

Words: 18928 - Pages: 76

Premium Essay

It 205 Week 4

...Welcome to WritePoint, the automated review system that recognizes errors most commonly made by university students in academic essays. The system embeds comments into your paper and suggests possible changes in grammar and style. Please evaluate each comment carefully to ensure that the suggested change is appropriate for your paper, but remember that your instructor's preferences for style and format prevail. You will also need to review your own citations and references since WritePoint capability in this area is limited. Thank you for using WritePoint. Internet Tools at Dirt Bike IT 205 Week 4 Kenneth Thompson Karen Cann November 10, 2013 Internet Tools at Dirt Bike At Dirt Bike’s, management is concerned with how much money is being [Doctoral rule (but good advice for any academic writer)--If not a noun (as in "human being"), the word "Being" is hard to imagine; it means "existing." Try to rewrite this without using "being"--with action words like "attending," "working," "living," "experiencing," simply "as"--or even removing "being" completely] spent on their internal and external communication and obtaining information on the subject of developments in both the motorcycle industry and global economy. At the company’s request, I will investigate Dirt Bike’s concerns and provide recommendations for how the organization could use Internet tools and technology to help employees better communicate with...

Words: 1659 - Pages: 7

Free Essay

Foundation of It

...Recommendation………………………………………………………………………….………5 Counter Measures to Wireless Insecurity……………………………………………………….6-7 Discussion…………………………………………………………………………..……………..7 Conclusion……………………………………………………………………………..………..8-9 Bibliography……………………………………………………………………………………..10 Abstract End of the twentieth century and the beginning of twenty-first century has marked a great advancing period in technological world, especially Internet. Internet has allowed users around the world to communicate with each other very quick and fast. And with the development of Wi-Fi, these communication methods have been even more available. But Wi-Fi also brings its disadvantages with it since potential hackers can access the network faster than wired networks. In this research paper, our team has put forward a goal to observe and find information about the communications ways through the internet and how to improve the security of a wireless network. During our research our team members carefully researched and practiced all those communication methods. Our goal was to evaluate the best ways of communication. Our team members have also learned the threats that could affect Wi-Fi. Our next goal was to prevent all of those threats, to find security measures and evaluate which security measure would work the best. In order to experiment the Wi-Fi and its security we have taken a hotel in Djizak City, Afrosiyob Hotel, which has been opened in July, 2012 and does not have Wi-Fi system. We will implement a Wi-Fi network and...

Words: 2429 - Pages: 10

Premium Essay

Sitnefit

...| Network Administrator | Memo To: John Smith From: Felix Pino CC: Richard Pierce Date: 4/27/2015 Re: Site Survey Benefits Dear Sir, It has come to my attention that we have not been allocated time and money to do a proper site survey. I feel this is a detrimental path for your new system. A site survey is the precursor to a successful wireless network implementation. Like with many things, upfront planning and documentation facilitates the smooth deployment of the new network. With a site survey an engineer completes the physical check and identifies the best locations for the wireless access points, then creates a site report. The throughput of the access points is then fine-tuned using specialized training of those doing the evaluation. The final report will include a hardware list, where to install the products, the configuration of the devices, and suggestions for antenna placement for each device. All of these things can and will save the company money in the long run. Some of the things that can go wrong without a proper site survey are not getting optimal performance from our new network, over purchasing of equipment or under purchasing of equipment, not getting full coverage inside the buildings, potential interference that you would not know about beforehand, unauthorized access to your network and so on and so forth There are three types of tools needed for a site survey, wireless tools, measurement tools, and documentation tools. Wireless tools are such...

Words: 457 - Pages: 2

Free Essay

Wireless Lan Security

...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...

Words: 4933 - Pages: 20

Free Essay

Wireless Network

...convenient access for customers and other users. WLAN provides users many benefits such as portability, flexibility, reduced hardware need and lower installation cost. Without a doubt, the benefits of WLAN enhance an organisation’s overall productivity. However, WLAN is not without its own security problems. WLAN infrastructures that are not secured would actually affect the security posture of the LAN environment as well. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms. This paper will mainly focus on the wireless access points (APs) as devices that act as a central transmitter and receiver or WLAN radio signals. It will begin by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats and vulnerabilities, this paper will look at Rogue APs, Ad-Hoc Networks, MAC Spoofing, Honeypot APs and Denial of Service. Keywords: Wireless Local Area Network, WLAN, Wireless Security, Wireless Access Points, Wireless Security Threats, Vulnerabilities 1.0 Introduction A WLAN is a flexible data communications...

Words: 3541 - Pages: 15

Free Essay

Wireless Network Security

...Reis Barrie Research Paper CNT4514 Wireless Vulnerabilities The world of wireless networks as we all know is one of the most rapidly growing areas in our world today. With the massive amount of data that is going on, “the cloud” the security of all of our data is questioned. As well with so many of our day to day tasks relying on our wireless capabilities it make you wonder how safe is it to rely so heavily on something. We have to ask the questions what are the key vulnerabilities of wireless networks and even just of networks in general. Different types of networks have different levels of safety and it is a good idea to know not only which are safe but the vulnerabilities of said networks to keep our information out of the wrong hands and keep our day to day life moving as smoothly as possible. Unlike wired LANs the wireless LAN users are not restricted to the physical area of a wired system. While this may feel beneficial to the user it is also very beneficial to sniffing and eavesdroppers who are listening to the radio waves that are broadcasted through the air. Intercepting these packets they can pick up messages that may contain sensitive information. Seeing how the range of a wireless LAN can extend beyond the building the eavesdroppers don’t even need to be inside the building. A simple thing you can do is open up your wireless adapter on your computer and see how many open wireless networks are around you. From my house I currently have 4 open wireless networks...

Words: 1614 - Pages: 7

Premium Essay

Unknown

...Medical Device Networking for Smarter Healthcare: Part 3 Next-Generation WLAN Deployments in Hospitals Lantronix, Inc. 167 Technology Drive Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Medical Device Networking for Smarter Healthcare: Part 3 of 4 Contents Introduction..................................................................................................................................................... 3 Wireless Roll-outs........................................................................................................................................... 5 Medical Device Connectivity / Mobile Carts .......................................................................................... 5 Handheld Devices .................................................................................................................................... 6 Computer-based Physician Order Entry (CPOE)..................................................................................... 7 Next-Generation Wireless Applications ......................................................................................................... 7 Location-based Services .......................................................................................................................... 7 Voice-over-WLAN .................................................................................................................................. 8 Internet/Intranet...

Words: 4973 - Pages: 20