Free Essay

None

In:

Submitted By Checeba0
Words 1465
Pages 6
Appendix J

Checeba Lawton

3/9/2014

Wireless Network Plan

Deployment Scenario The best deployment scenario for this particular situation would be the infrastructure setup, because this type of networking mode would enable the system to utilize both the wireless components, as well as the wired components. By doing this, the network could utilize the WLAN for most of its networking needs, while still having the capability to merge a LAN into this WLAN design.

Deployment Scenario Rationale

I decided to go with the infrastructure networking mode due to the physical limitations within the Customer Service Call Center’s floor design, since the infrastructure format would allow the wireless access points to communicate with other wireless access points that are beyond wireless coverage. In addition, for areas that are not considered mobile or require a higher level of security, the use of a wired connection could be used, while still allowing the wireless portion of the network to connect to the wired segment. In other words, it provides a way for the wireless access points to communicate with the rest of the network, which is vital for connecting multiple wireless access points, as well as connecting a WLAN to a LAN.

Hardware Components

• Component Name: Access Point o Rationale for using component: The use of five wireless access points are needed, so wireless coverage can be at an acceptable level throughout all areas of the floor plan

o Rough cost estimate: : The cost of a wireless access point would be around $129.00 each, which would total about $645.00 to supply wireless coverage throughout the floor plan.

• Component Name: Switch

o Rationale for using component: The implementation of a switch is needed to enable each wireless access point to be connected physically by a networking cable, which allows the wireless network to connect to the internet or other LAN based elements. o o Rough cost estimate: The average cost of a switch is $39.00

• Component Name: Network Cable (Less than 100 feet) • o Rationale for using component: This component is needed to connect the access points to the switch, since the wireless access points are unable to communicate to a wired network without the appropriate networking cables.

o Rough cost estimate: The networking cable needed to connect each wireless access point to the router would be less than 1000 ft. However, the CAT-6 networking cable needed can be purchased on a 1000 feet role for only $89.95, which would provide some extra cabling for future expansions or additional wiring needs.

IEEE Wireless Network Type

Apex Designs has identified that an 802.11n LAN will be implemented.

Access Point Management

Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to be configured separately for each access point.

Location of Wireless Devices
Network Performance Impediment Report (overview of floor plan and possible impediments)
The Customer Service Call Center floor plan is designed with a few obstacles to consider, before implementing a wireless network. For instance, the floor plan is broken into two sectors, which is due to the metal filing cabinet located in the center of the floor plan. As a result, this makes it difficult to utilize a single access point to cover both sides of this obstacle. Furthermore, the incorporation of the glass windows, as well as the solid wall structure located next to the conference room would restrict the travel of network’s wireless signals. Even though the cubicles located on both sides of the filing cabinet, as well as the cooking equipment located in the break room are also considered a problem, they only present a low signal blocking challenge, since the cubicle walls’ effect on the wireless signal is limited and the break room is away from the wireless network’s main-point-of-concern. However, the solid wall structure and the metal filing cabinet are both considered high-risk factors, because they require additional networking components to create a working wireless network.

Summary list of possible impediments to wireless performance • Metal filing cabinet (High) • Solid wall structure (High) • Glass windows (Low) • Electrical equipment in break room (Low) • The amount of various walls and cubicles •

Locations of wireless devices are depicted in Appendix I

Wireless Security Policy

List of Security Protections

• Address Filtering • Shared Key Authentication • Disable SSID Broadcasting • Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools.

Summary of Protections

1. Address Filtering: I chose address filtering, because this feature is designed to prevent unauthorized devices from connecting to the wireless network, which is based on each device’s MAC address. By doing this, only the internal computers that are on the WLAN’s approved MAC list would be able to connect to the wireless network. In-other-words, this tool is useful for preventing outside attempts to the WLAN by restricting their access from the beginning. Even though it may be difficult to manage the approved MAC address list on a large sized network, the overall benefit of using this feature would be substantial enough to employ, since the additional time to maintain the approved MAC IDs could be limited by restricting the use of outside devices from being added, which would essentially limit all computer use to only company owned devices.

2. Shared Key Authorization: This security feature was chosen to provide the WLAN with an additional level of security in an attempt to counter a potential security breach. By employing the Shared Key Authentication protocol, the network would send the user a challenge text in, which the user would be required to respond with the correct answer, before being accepted onto the network. By controlling each computer’s Mac address, as well as requiring each user to undergo the Shared Key Authentication process, the overall level of network security would become stronger, which is due to the dual protection techniques that are being used.

3. Disable SSID Broadcasting: By disabling the SSID broadcast feature on the WLAN, the possibility of someone outside the company gaining the WLAN’s device information would be reduced, since the information would not be openly transmitted for someone to discover. As a result, this would prevent a potential security breach, since one could easily gain access to a wireless device by having the unit’s SSID due to the information that is included within this type of data communication. In-other-words, the less information that is offered about the wireless network, the better-off the WLAN would be, since the more system characteristics that are being presented to an intruder would only assist him or her in an attack.

4. Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools: In regards to this security selection, the use of WPA or WPA2 should be used instead of WEP or Shared Key Authentication if it is available, since this wireless network protection is more secure than its previous counterparts. However, the equipment being used on the wireless network would have to be compliant to do so. Nevertheless, if this is not available for use, the incorporation of a network monitoring program should be performed, which would allow the network to be monitored for security weaknesses, as well as allow one to be alerted about a potential network attack.

Possible Network Vulnerabilities

Address Filtering: It is difficult to manage large numbers of MAC addresses, MAC address can be accessed in plain text, and an intruder can falsify the MAC address on his or her device to gain access to the network.

Shared Key Authentication: An intruder could break the default key by using a dictionary attack, stealing the challenge text, or by encrypting the text through a mathematical system.

Disabling the SSID broadcast: This feature should be disabled, because if it is not the SSID could be obtained by stealing it or by viewing it in plain text that would enable one to use the brute force attack to gain access to the network.

Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools: The use of WEP can be problematic due to the intruder’s ability to break the key code, which could be caused by a weak WEP key, by viewing the key in plain text due to a collision, or caused by the weak key generating capabilities of the RC4 generating platform.

References

(2006). CWNA Guide to Wireless LANs, 2e, Ciampa. Retrieved from University of Phoenix.

Belkin. (2010). 5-Port Network Switch. Retrieved from http://www.belkin.com/IWCatProductPage.process?Product_Id=136528

NetGear. (2010). Access Points. Retrieved from http://www.netgear.com/Products/APsWirelessControllers/AccessPoints.aspx

Directron. (2010). 1000 Foot Cat. 6 Cables. Retrieved from http://www.directron.com/1000cat61.html

Similar Documents

Premium Essay

Foreshadowing In Agatha Christie's And Then There Were None

..."It is perfectly clear. Mr. Owen is one of us….” (Christie 150). These famous words from Agatha Christie’s novel, And Then There Were None, would define the murder mystery genre for generations to come. Her use of many literary devices, such as foreshadowing, symbolism, and similes, allowed her to truly express herself. Agatha Christie utilized the gramophone as foreshadowing for the identity of the killer, the 10 solider boys as a motif for the characters’ deaths, and the seaweed as a symbol of guilt and regret all to add suspense to her novel, And Then There Were None. The gramophone in Agatha Christie’s novel, And Then There Were None, foreshadowed who among them was Mr. Owen, thus adding suspense to the story. Near the beginning of the book, all of the characters gather to eat dinner, when suddenly a...

Words: 850 - Pages: 4

Premium Essay

And Then There Were Nonr Summary

...And Then There Were None Agatha Christie ← Plot Overview → Eight people, all strangers to each other, are invited to Indian Island, off the English coast. Vera Claythorne, a former governess, thinks she has been hired as a secretary; Philip Lombard, an adventurer, and William Blore, an ex-detective, think they have been hired to look out for trouble over the weekend; Dr. Armstrong thinks he has been hired to look after the wife of the island’s owner. Emily Brent, General Macarthur, Tony Marston, and Judge Wargrave think they are going to visit old friends. When they arrive on the island, the guests are greeted by Mr. and Mrs. Rogers, the butler and housekeeper, who report that the host, someone they call Mr. Owen, will not arrive until the next day. That evening, as all the guests gather in the drawing room after an excellent dinner, they hear a recorded voice accusing each of them of a specific murder committed in the past and never uncovered. They compare notes and realize that none of them, including the servants, knows “Mr. Owen,” which suggests that they were brought here according to someone’s strange plan. As they discuss what to do, Tony Marston chokes on poisoned whiskey and dies. Frightened, the party retreats to bed, where almost everyone is plagued by guilt and memories of their crimes. Vera Claythorne notices the similarity between the death of Marston and the first verse of a nursery rhyme, “Ten Little Indians,” that hangs in each bedroom. The next morning...

Words: 4161 - Pages: 17

Premium Essay

Novel

...And Then There Were None by AGATHA CHRISTIE CHAPTER 1 IN THE CORNER of a first-class smoking carriage, Mr. Justice Wargrave, lately retired from the bench, puffed at a cigar and ran an interested eye through the political news in the Times. He laid the paper down and glanced out of the window. They were running now through Somerset. He glanced at his watch-another two hours to go. He went over in his mind all that had appeared in the papers about Indian Island. There had been its original purchase by an American millionaire who was crazy about yachting-and an account of the luxurious modern house he had built on this little island off the Devon coast. The unfortunate fact that the new third wife of the American millionaire was a bad sailor had led to the subsequent putting up of the house and island for sale. Various glowing advertisements of it had appeared in the papers. Then came the first bald statement that it had been bought-by a Mr. Owen. After that the rurnours of the gossip writers had started. Indian Island had really been bought by Miss Gabrielle Turl, the Hollywood film star! She wanted to spend some months there free from all publicity! Busy Bee had hinted delicately that it was to be an abode for Royalty??! Mr. Merryweather had had it whispered to him that it had been bought for a honeymoon-Young Lord L-- had surrendered to Cupid at last! Jonas knew for a fact that it had been purchased by the Admiralty with a view to carrying out some very hush hush experiments...

Words: 53558 - Pages: 215

Free Essay

None

...None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to any work but this. None I don’t want to give you rights to...

Words: 1132 - Pages: 5

Premium Essay

None

...Memory Systems Exam PSYCH 640 October 6, 2014 Gaston Weisz   Student Name: Class: Cognitive Psychology 640 [Memory Systems Test] Achieved Score: Possible High Score: 100 MULTIPLE CHOICE QUESTIONS 1. What type of memory stores information for about 30 seconds? A. Working Memory B. Long Term Memory C. Short Term Memory D. None of the Above E. All of the Above 2. What is the estimated amount of neurons in the human brain? F. 1 Trillion G. 450 Billion H. 100 billion I. 895 million J. 1,000 trillion 3. What is the correct explanation for encoding memory? A. Encoding in psychology is taking information into the mind and coding it with brain code and storing the information for later retrieval B. Encoding memory is when memory is recalled to working memory for use and access, then returned to long term memory when the information is no longer required C. Encoding in psychology is the transformation, as well as the transfer of information into a memory system that requires selective attention which is the focusing of awareness on a particular set of stimuli or events. D. Encoding memory is when your brain applies “1’s and 0’s” to information that is collected and placed in long term memory or discarded depending on if the memory is rehearsed or discarded • True or False questions: True False 1. Can a false memory seem real and be perceived as a genuine memory? True False 2. Is long term memory controlled by the hippocampus portion...

Words: 316 - Pages: 2

Free Essay

None

...KEEP THIS BOOKLET FOR YOUR RECORDS Assistance Application Information Booklet Welcome to the State of Michigan Department of Human Services (DHS) We have programs to help you and/or your household (everyone living in your home) with food, medical care, child care, cash and emergencies. We can also tell you about other programs and resources that may help meet your needs. We look forward to helping you and your household. If you need help with reading, writing, hearing, etc., please tell us. If you need an interpreter, we will provide one or you may bring your own. Steps to Assistance - Apply online for assistance programs at www.michigan.gov/mibridges. You may bring, mail or fax your assistance application to the DHS office in your area. You can find the address and phone number to the office in your area in your phone book under the state government section, or online at www.michigan.gov/dhs-countyoffices. 2 - Read this booklet and keep it. It tells you about our programs and has important information. When you sign the assistance application, you agree to the rules in this booklet. 3 - Answer the questions on the assistance application. We need your answers to decide what help you may receive. You can apply for all or some of our programs. 4 - For some programs we may need to ask for more information (proof). We will let you know what we need. 5 - We will send you a letter in the mail telling you if you are approved or denied. Keep this letter. It has important information...

Words: 19332 - Pages: 78

Premium Essay

None

...distribution. The timeframe for this strategy is the end of the week to the vice president. With such a short time to complete this complex tasking would require a formal communication channel, in which to explain the direction to the team with the requirement and with the tasking deadline. Therefore, the final presentation is due Thursday, for the meeting with the vice president on Friday. The presentation to the vice president will occur on Friday will dictate a formal communication channel. Scenario number two, is a role of a travel agency manager, in which first thing in the morning, the username and password to company application system does not allow anyone to access the application. This immediately caused a work stoppage, to where none of the travel agents could perform assigned responsibilities, affecting existing, and new customers. An informal communication channel, of a telephone call to the IT Department, determined the cause to the username and password problem. Because there was no formal communication put in place by the travel agency, this dictates an informal communication channel. The IT Department determined the...

Words: 614 - Pages: 3

Free Essay

None

...None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things can ever work anymore, ever again. None of these things...

Words: 321 - Pages: 2

Premium Essay

None

...Carl robins works as a recruiter at a new campus for ABC, Inc. However, even though his only worked there for six months his faces serious problems and has found himself in quite a predicament. After hiring fifteen new trainees for his operational supervisor, and scheduling an orientation for new hires to take place in mid-June. After assuring his supervisor Monica Carrolls that the work she ask would be done by the time she wanted, he stated noticing everything was going wrong and time was running out. Soon he realized that the paper work his supervisor asked for was not completed and files were missing. The missing files consisted of several missing applications that weren’t completed on the new trainee’s transcripts. Also he found out none of them had been sent to the clinic for a mandatory drug screen. At this point his frustration was through the roof but, the bad news did not end there only continued. Soon he found out, after reviewing the scheduling log for the training room he notice that there was yet another problem. The training room where he is to hold the orientation for the new trainees is booked up and reserved for the entire month. Alternatives Fighting procrastination is an...

Words: 682 - Pages: 3

Free Essay

None

...with a reality that isn’t changeable. This world; which is contingent; is imperfect in an aesthetic moral way. This goes after reality, because it’s awesome and unique. This phase refers back to Plato, where’s the concept, that the world is “real” and more “factual”; plus, the fantasy world we live in, as of our embodied frame of mind. Our universe has many correct forms. With relations to this, it’s hard to explain correctly; so how they’re not both in common, be kin in any other way. How can you tell from the “really real”, and the “want to be real”? You can examine the perception, which will show the lines of metaphysics realness, and not the outcome of regular skills. With skills, we find objects and forces, that are perceptional, and none perceptional; that we can keep intake. We find a universe that’s always changing. Idols are conceived, breathed, and ended. The solar system is after an agenda course as everything in it. In life, we’re models of constellations, and goes after our fate. You know everything is different because it’s in a current. Within our sense skills, this is the knowledge of oue universe. B. Is The Physical World Real, More or Less Than The Spiritual or Psychological The physical universe is more realer than either, because the physical is concerned on seeing and observing things. With the spirit you doesn’t see it, it’s what embeds the soul, and believing by faith. The psychological is within your mentality, because it causes you to imagine and...

Words: 977 - Pages: 4

Free Essay

None

...Elemental Geosystems, 5e (Christopherson) Chapter 1 Foundations of Geography 1) Geography is described as A) an Earth science. B) a human science. C) a physical science. D) a spatial science. Answer: D 2) The word spatial refers to A) the nature and character of physical space. B) items that relate specifically to society. C) things that are unique and special. D) eras of time. Answer: A 3) A principal methodology governing geographic inquiry A) is behavioral analysis. B) involves spatial analysis. C) uses chronological organization. D) is field work. Answer: B 4) Which of the following best describes the current emphasis in the field of physical geography? A) understanding soil development B) modeling economic interrelationships among countries C) studying weather D) understanding how Earth's systems interact to produce natural phenomena Answer: D 5) Which of the following most accurately characterizes the goal of geography? A) the production of maps B) memorization of the names of places on world and regional maps C) memorization of the imports and exports of a country D) understanding why a place has the characteristics that it does Answer: D 6) Which of the following terms...

Words: 5034 - Pages: 21

Premium Essay

None

...WEAKNESSES OF THE BIG BANG THEORY According to Marmet (2005) , the big bang theory believes that the universe originated from an extremely dense concentration of material. The original expansion of this material is called the big bang theory. Moskowits (2010) describes the big bang theory as an assertion that the universe began extremely hot and dense. Around 14 billion years ago, space itself expanded and cooled down eventually allowing atoms to form and clump together to build the stars and galaxies we see today. Taylor (2012) says According to the Big Bang theory, all matter and all space was originally part of an infinitesimally small point called the Singularity. The theory says nothing about where that singularity came from. It is assumed to have come about by a random quantum event. The theory was first proposed in the 1930s, based on Edwin Hubble's discovery that distant galaxies are receding. Hubble measured the distances to a large number of galaxies which was based on the observed brightness of certain stars within them, he went on to collate these distances with their electromagnetic spectra. As it turned out, more distant galaxies had the features in their spectral lines shifted to lower frequencies in a linear manner: that is, more distant galaxies exhibit greater redshifts. The only known mechanism for generating a spectral shift is the Doppler effect, which means that distant galaxies are receding from us. Another dominant idea connects the dots between the...

Words: 1683 - Pages: 7

Premium Essay

None

...can we look at? 1. Purpose: to predict what’s going to happen in the future 2. Look at recent performance, outlook, changes in the company, changes in the market(s) the company is in, and other indicators. b. Working on Bank of America, what was challenging about, for example, finding Weighted Cost of Capital? 1. It was difficult to find because of the many different markets and submarkets that each have their own cost of capital. 2. The percent of each of these that BoA has was difficult to find. III. Homework Problems a. 9-5 1. Part A: Find Total Debt i. Assets – Equity (Common Stock + Retained Earnings) – Accts. Payable = Total Debt Side note: Equity also includes preferred stock, but this company has none ii. $1,200,000 – $720,000 – $375,000 = $105,000 2. Part B: AFN = (A*/S0) ΔS – (L*/S0) ΔS -MS1 (RR) i. A* = Assets = $1,200,000 ii....

Words: 667 - Pages: 3

Premium Essay

None

...Title Name SCI 207: Dependence of man on the environment Instructor Date Title Abstract In these experiments that we have conducted, we used oil, vinegar, laundry soap, and soil to simulate contaminated groundwater. We then constructed a variety of filters to attempt to clean the ground water and make it drinkable. We also tested various bottled and tap water for certain chemicals. Introduction Many areas have water containing impurities from natural or artificial sources. These impurities may cause health problems, damage equipment or plumbing, or make the water undesirable due to taste, odor, appearance, or staining. Those impurities which cause health problems should be attended to immediately; other problems caused by water impurities can be corrected if they are a nuisance. Before beginning any treatment plan, have water tested by an independent laboratory to determine the specific impurities and level of contamination. This will help you select the most effective and economical treatment method. (Ross, Parrott, Woods, 2009) The reason why we conducted this experiment is to test the filtration to remove oil, vinegar, and laundry detergent has on soil before it reaches groundwater. These chemicals go to our local water supply, but first it goes through the soil. Materials and Methods The materials and methods section should provide a brief description of the specialized materials used in your experiment and...

Words: 687 - Pages: 3

Free Essay

None

...Psychoanalytic Psychology 2004, Vol. 21, No. 3, 353–370 Copyright 2004 by the Educational Publishing Foundation 0736-9735/04/$12.00 DOI: 10.1037/0736-9735.21.3.353 THE UNEXPECTED LEGACY OF DIVORCE Report of a 25-Year Study Judith S. Wallerstein, PhD Judith Wallerstein Center for the Family in Transition and University of California, Berkeley Julia M. Lewis, PhD San Francisco State University This follow-up study of 131 children, who were 3–18 years old when their parents divorced in the early 1970s, marks the culmination of 25 years of research. The use of extensive clinical interviews allowed for exploration in great depth of their thoughts, feelings, and behaviors as they negotiated childhood, adolescence, young adulthood, and adulthood. At the 25-year follow-up, a comparison group of their peers from the same community was added. Described in rich clinical detail, the findings highlight the unexpected gulf between growing up in intact versus divorced families, and the difficulties children of divorce encounter in achieving love, sexual intimacy, and commitment to marriage and parenthood. These findings have significant implications for new clinical and educational interventions. The study we report here begins with the first no-fault divorce legislation in the nation and tracks a group of 131 California children whose parents divorced in the early 1970s. They were seen at regular intervals over the 25-year span that followed. When we first met our ...

Words: 10773 - Pages: 44