Free Essay

Set Up a Lan


Submitted By chavito
Words 3182
Pages 13
Final Project

Final Project

Jorge Acevedo
CMIS 435
Jorge Acevedo
CMIS 435

Table of Contents
REFERENCES I. Introduction
The current design consists of an Intel personal computer with Windows 7 as the operating system and accessing Internet services at 56 kbps modem speeds. The objective is to upgrade to a faster solution through the use of Ethernet Cable and Wireless 802.11n; deploy properly a Local Area Network using the necessary technology, hardware and software specifications, appropriate protocols and group policies; and combined wired and wireless communications to include Internet services provided by an Internet Service Provider.
The incorporated network consists of workstations, printer, scanner, fax and copier bundle; telephone capabilities; server management and protocols. The network would be configured to manage users, files, folders and printer sharing options to include a well implemented security system to prevent intrusion of cyber threats such as unauthorized users, viruses and spillage of information.
A client-server oriented local area network architecture allows for easier and centrally administration of clients and to provide better reliability, top performance, and cost-efficiency a star topology must be implemented as the layout of the network. The server side of the client-server model offers several features that can facilitate the management of nodes such as Remote, and file-printer server capabilities to include data backup. The clients in the client-server layout can access and store files and folders in the server which can be shared by all workgroups.
Internet capabilities are provided by a top Internet Service Provider, Comcast offers bundle packages composed of Internet, Business E-mail, phone and television at low prices. Each bundle package offers telephone services and a variety of features intended for high speed internet connections, for instance, Web Host package, Wireless services, Telecommuting, unlimited data allowances and speeds ranging from 3 Mbps to 150 Mbps for upload and download of data, as well as unlimited local and domestic long distance calls.
To successfully attain network connectivity, appropriate hardware and software must be correctly installed from cables, hubs, and adapter cards to configuring IP addresses, applications and drives; Group policies and protocols must be establish correctly following business rules; needed applications are safely uploaded to attain corporate communications required between staff and consumers.
Network Architecture
The success of the network lies on three major tasks: i. The constant communication between nodes with minimal to no loss of packages. ii. The access of data needed in a timely manner by clients to carry out the required business. iii. Proactive administration of network nodes identifying shortcomings and security breaches promptly. To attain such outcome, all data must be stored and accessed by network clients - computers, printer, and faxes - from a centralized host standing as a server. In addition, network clients must have the capability of sharing folders and files with other network clients using peer-to-peer communication therefore preventing overloading the server and finally every protocol and group policy must be set properly to allow the authentication only through the use of proper credentials. The network configuration consists of Intel computers with Windows 7 operating system, an all-in-one printer, copier, fax and scanner, VoIP telephones, and hub, routers and switches connecting all end systems to one main computer serving as the main server. All nodes connect to each other by using approved cable and connectors. A star topology can provide for better data transfer results; it offers the possibility to easily replace malfunctioning components without a full network shutdown; and it allows for future expansion of the network. While minimizing the possibility of a fault which could bring the network down it requires more cable to connect all end-systems and
Network Structural design

Hardware and Software
Workstation computer Dell XPS 8700 Performance Desktop offers a 4th Generation Intel Core I-7 4700 processor with memory capability of 12 GB Dual Channel double data rate type three (DDR3) synchronous dynamic random-access memory (SDRAM) at 1600 MHz 4 dual in-line memory module (DIMM) and a 1 TB 7200 RPM SATA Hard Drive. It comes with a NVIDIA GeForce GT 645 1 GB GDDR5 Video Card & Optical Drive and a Dell 24 (S2440L) non-touch monitor, Dell (KB213) wired multi-media keyboard, and Dell Laser mouse. Dell XPS 8700 Desktop comes fully loaded with Windows 7 Professional, 64-bit, English operating system. A number of applications are available for a trail based in a time frame these include Microsoft Office 365 suite, Adobe Acrobat for PDF document creation and digital media creation, and McAfee Security software.

Latitude 3330 Laptop with Intel Core I3-3217U Processor offers 320 GB 5400 RPM hard drive, 4 GB DDR3L memory at 1600 MHz with Intel HD 4000 video card and Dell Wireless 5560 Single-mode High Speed Packet data Access (HSPA) and Mini Card with A-GPS for Windows 7 and Windows 8 operating system. Latitude 3330 Laptop offers an anti-glare 13.3” high-definition display to include an integrated 720p high definition video webcam, high quality speakers, stereo headphone/microphone combo jack and integrated microphone. It also offers Intel Advance –N 6235 802.11 a/g/n Dual Band Wi-Fi and Bluetooth 4.0 low energy half mini card for its wireless LAN option.
Multi-Function Printer

Dell Color Multifunction Printer – C1765nfw - versatility and easy network connectivity allows the capability to print, scan, fax and copy wirelessly, from mobile devices and Ethernet connectivity. Included in the box is the Printer Driver and Dell Toner Management Software, power cord, USB cable, placemat, Dell Black and Color Cartridge, and Quick Reference Guide to include the Dell C1756nfw Color Printer. a. Printer Specifications – speeds up to 15 ppm mono and 12 ppm color and a processor speed of 295 MHz; standard memory of 128 MB RAM and Read-only Memory (ROM) of 16 MB. It has a resolution of 600 x 600 dpi with a maximum usage rate of up to 30,000 pages per month. Supports Windows and Mac operating systems 32/64 bit. Printer Management includes: Dell Open-Manage Printer Management, Dell Printer Configuration Web Tool, Dell Color-Track 1.0 and Dell Toner Management System, Standard Printer management information base (MIB) and Nuance Paper-port 14.

b. Copier Specifications – Include Text/Photo, Text, Photo with speeds of 15 cpm mono and 12 cpm color single page; multiple page copy speeds up to 10.6 cpm mono/ 2.5 cpm color. Provides maximum 99 copies as fast as 40 sec (color) and 24 sec (mono) with zoom capabilities from 25 to 400% with 1% increments. Copy settings include Auto Exposure, Collate, Multiple-Up (2-in-1 only), Sharpness, Density, ID Copy, and Frame Erase.

c. Fax Specifications – Standalone mono fax with numerical keypad with fax speeds of up to 33.6 Kbps and memory size of 2 MB. It is capable of speed dial up to 99 locations. Fax Transmit (TX) Features include Broadcast, Delay/Schedule and Forward to include Fax Transmit (XX) features such as Secure, Remote and Polling. Also incorporates junk fax prevention, Fax/Phone/TAM interface which allows additional phone, answering machine or another fax to be connected and share the phone line, PC Fax and Distinctive Ring Pattern Detection with 7 patterns.

d. Scanner Specifications – Scan modes include Flatbed with sizes of 215.9 by 297 mm or 8.5 by 11.7 inches or Automated Document Feeder with scan sizes of 215.9 by 355.6 or 8.5 by 14 inches maximum. It includes an optical resolutions ranging from 1200 by 1200 dpi to 4800 by 4800 dpi and 24-bit color size depth. Scan To features include Server Message Block (SMB), File Transfer Protocol (FTP), Email, USB Host and Application. Scanning file formats include PDF, Tagged Image File Format (TIFF) and JPEG.
VoIP telephones

Aastra 6725 IP telephone is an independently Microsoft Lync endpoint that allows for synchronized integration with the desktop computer enabling enhanced functionality. It supports multiline features and contains two Ethernet network ports with integrated Ethernet switch as its main feature. Microsoft audio codecs in the handset and hand free modes provides an excellent voice quality.
Aastra 6725 IP is compatible with Microsoft Lync Server 2010 software and offers call services like caller ID, caller transfer, call hold, and message waiting capability with headset jack, Data port / 4 pin USB type A and type B connections and compliant with CISPR 22 Class B, EN 60950, CSA 22.2 No. 60950, EN55022 Class B, ICES-003 Class B, FCC Part 15 B, AS/NZS 60950-1, FCC Part 68, RoHS, Waste Electrical and Electronic Equipment Directive.

Dell Networking 2816 Switch is a fan-less design switch with integrated LED lamps for better visual monitoring and analysis. It consists of 16 10/100/1000 Base-T auto-sensing Gigabit Ethernet switching ports with up to 32 Gigabits per second switch fabric capacity, 23.7 Million Packets per Second forwarding rate and 2 Megabyte Packet buffer memory. It can support up to 8,000 MAC Addresses and up to 64 port-based Virtual LANs. Standard support of strict priority and configurable weighted round robin scheduling across queues, Delivers four priority queues per port and honors Ethernet priority with user provisioning and mapping (IEEE 802.1/p) values and honors IP Differentiated services code point (DSCP) values. Dell Networking 2816 Switch supports industry-standard link aggregation adhering to IEEE 802.3/ad standards Link aggregation with static LAG support. It supports four link aggregation groups and up to 4 ports per group. Dell Networking 2816 Switch manages local password and restricted IP addresses for secure access to the switch; Internal Dynamic Host Configuration Protocol (DHCP) Server; Port mirroring with capability of mirroring four source ports improving network traffic monitoring and troubleshooting; Web management interface allows for switch software and configurations to be uploaded easily to and from the switch; and massive frame support for packets up to 9,000 bytes.

Dell PowerEdge T-110 II compact tower server with Intel Xeon E-3-1200 version 2 - 3.10 GHz - 8 Megabyte Cache – Turbo - Quad Core 4th Generation processor provides up to 32 GB memory with 4 dual in-line memory module slots, Dual Channel double data rate type three (DDR3) up to 1600 MHz and maximum internal storage of up to 12 TB. It offers 3.5” Serial Attached SCSI (SAS) (15K; 10K), near-online SAS (7.2k), SATA (7.2K) cabled hard drive options. Provides add-in H200 (SAS/SATA controller) 2 Hard Drives - RAID 1. PowerEdge T-110 II Chassis with cabled 4 by 3.5 Hard Drives. 1. Operating Systems:
Microsoft Windows Server 2012, Microsoft Windows Server 2012 Essentials, Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V), Novell SUSE Linux Enterprise Server, Red Hat Enterprise Linux 2. Virtualization options:
Citrix XenServer, VMware vSphere ESXi, Red Hat Enterprise Virtualization
Storage Backup

Dell PowerVault Linear Tape-Open 4 (LTO4) – 120 Tape Drive offers up to 800 GB built-in capacity with a transfer rate of 432 GB/hr. shrinking the backup window by a third. It consists of a 6 GB Serial Attached SCSI (SAS) interface leveraging higher transfer rates over traditional SCSI interfaces and offers drive-level encryption which protects data efficiently without added cost and expenses of software base encryption.
Dell PowerVault LTO4, is compatible with Dell and x86 IBM and HP Servers. It supports NX4 and other NDMP products. PowerVault LTO4 software include Dell-supported Tape Backup Software, Commvault for Microsoft Windows and Linux ad Symantec Backup Exec for Microsoft Windows. It can read and write to LTO-3 and 4 and only read with LTO-2 Media Types.
Wireless Router

D-Link DIR-655 Xtreme N Wireless Gigabit Router is an 802.11/n wireless router with an integrated 4-port switch and equipped with three Omni-directional external antennas capable of transmitting speeds up to 14 times faster and reaching 16 times farther than 802.11/g while maintaining legacy capabilities with 802.11/g and 802.11/b devices.
The DIR-655 Xtreme can be wired or wireless with a frequency band of 2.4 GHz; it is compatible with Windows 7 operating system with software drivers and utilities included and provides wireless security and high speed internet access to various devices allowing for automatically detection of multimedia, VoIP and online gaming applications without user configuration. It contains four LAN 10 Base-T/100 Base-TX/1000 Base-T – RJ-45 interfaces; One 4 pin USB Type A interface, and one 10 Base-T/100 Base-TX/1000 Base-T – RJ-45 WAN interface.
D-Link supports Data Link protocols – Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.11 /b/g/n; supports Transport protocols – TCP/IP, Point-to-Point Tunneling Protocol (PPTP), UDP/IP, Layer 2 Tunneling Protocol (L2TP), Internet Control Message Protocol (ICMP) /IP, IPsec; and Remote Management Protocol - HTTP. A few of the features offered by DIR-655 include Firewall protection, auto-sensing per device, dynamic IP address assignment, auto MDI/MDI-X, Stateful Packet Inspection, dynamic DNS server, E-mail alert, VPN pass-through, firmware upgradable, wall mountable and Wi-Fi Multimedia.
Firewall Protection

Dell SonicWALL TZ 205 Series provides high performance, integrated intrusion prevention, anti-malware and content/URL filtering capabilities with 512 MB RAM and 32 MB Flash memory. It consist of a 5 Gigabyte Ethernet interface, one console interface and one USB interface to include integrated Wireless Switch and Controller. The Dell SonicWALL supports unrestricted nodes and up to 20 Virtual LAN interfaces. It is a stateful packet inspection firewall with the option for deep packet inspection. Dell SonicWALL TZ is certified by the International Computer Security Association ICSA and it can scan more than 50 protocols with Unlimited File Size protection.
Dell’s SonicWALL certification include the Evaluation Assurance Level EAL4+ (Methodically Designed, Tested and reviewed), Virtual Private Network Consortium (VPNC), Federal Information Processing Standards publication 140-2 (FIPS 140-2). The TZ 205 provides four different tools for better management – the Command Line Interface, Secure Shell (SSH), GUI, and Global Management System (GMS); it supports two Sonic Points that “ensures that wireless traffic is scrutinized with the same intensity as wired network traffic” and It can support up to ten site-to-site VPN tunnels, maximum ten global VPN Clients and up to ten Secure Sockets Layer, VPN Net-Extender Clients.
The SonicWALL TZ 205 provides wireless LAN options including intrusion protection, guest service, dual-band wireless, firewalling and 802.11/b/g/n.
Cabling and Connectors

A necessary component to ensure all devices work properly in a network is the cables and connectors that join these devices. The number of cables and connectors needed is determined by the amount of devices that compose the network, each device requires a cable and connector. The maximum required length for Ethernet 10 Base-T and 100 Base-T is 100 meters with no cables being shorter than three feet long. The quality of network cabling and connectors also is a key element to ensure a good connectivity. Ethernet cables should be rated as Category 5 (Cat 5) or better (Cat 5(e), Cat 6, and Cat 7) provide better connectivity. It is imperative that the cables are purchase from a local computer store this ensures cables can be returned if they are defective. As for connectors the RJ-45 twisted pair cable or patch cable is the standard connector. Normally, the multifunction printer, VoIP Telephone, Desktop and other devices have the necessary cables included such as power cable, USB cables, and adapter cables.

Security software vary from vendor to vendor and carry many essentials for the protection of computers and laptops. One example is McAfee which provides protection against virus, spyware and web threats. Other security software vendors include Symantec, Trend Micro, Kaspersky and ESET. A secondary measure is to ensure no unauthorized user gains access to information stored in a desktop, laptop or server is through the use of a Username/Password combination. Window Server 2012 fully installed in Dell PowerEdge T-110 II provides several features and technology that helps protect the integrity of the network. These include protection of user security group and authentication policy silos adding more credential protection; BitLocker encryption methods; encryption of hard drives and network unlock features. Also, smart cards sign-in services; identification of programs running on domain computers to control the ability of those programs to run. These are only a few of the security capabilities offered by Windows Server 2012. D-Link DIR-655 Xtreme N Wireless Gigabit Router allows encryption using 128-bit Wired Equivalent Privacy (WEP) and 64-BIT Wired Equivalent Privacy (WEP) algorithms and security protocols and security certification programs Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA-2). DIR-655 Xtreme router also supports IEEE 802.1-X Port authentication, Request for Comments (RFC) 826 Address Resolution Protocol, RFC 1071 Computing the Internet checksum, and many others. Dell SonicWALL TZ 205 allows authentication using Lightweight Directory Access Protocol, Local DB, RADIUS, Extended Authentication (XAUTH), and X-Forwarders. Security options available with Dell SonicWALL TZ 205 include gateway anti-virus and anti-spyware, intrusion prevention, content and URL filtering, analyzer reporting, comprehensive anti-spam service, and enforced client anti-virus and anti-spyware.

To provide Internet, and Phone services, Comcast Deluxe 50 bundle priced at $109.95/month offers unlimited data allowance with 50 Mbps download speeds and 10 Mbps upload speeds, includes two Microsoft Outlook 2010 Email boxes with 25 GB storage per email, Microsoft SharePoint and two business telephone lines. Comcast also offers public, private/secure Wi-Fi solutions; options for dynamic and up to 13 static IP addresses; telework capabilities; and Web hosting with 100 MB data transfer, three page site builder, and 10 MB storage. Comcast also offers bundles with Television options.

The layout of a small office/business local area network encompasses various components and a multitude of protocols, policies and standards to ensure the success of the everyday business operation. To insure cost-efficiency and performance the selection of these components and vendors must be strictly scrutinize and research. Dell and Comcast provide 24/7 service assistance, product quality and guarantee. The network builder has the option to choose from the many corporations like Dell and Comcast to assemble their own small office/business LAN.

COMCAST Corporation. (2013). Comcast Business, Built for Business. Retrieved from Comcast Business:
DELL. (2014). Network Diagram. Retrieved from Dell - Small Business Server Solutions:
Wikipedia. (2014, March 04). Local Area Network. Retrieved from Wikipedia, the free encyclopedia:

Similar Documents

Premium Essay

How to Set Up a Lan

...How to set up a LAN How to set up a LAN 1. Assess your needs in a network. The devices you use to set your network up will determine your network's capabilities. You should address your needs in terms of cost, security, connection speed, expandability (adding more computers or devices later) and distance between computers. In general, you will need to keep all the computers in the network within 100 yards (91 m) of each other. 2. Ensure that your computers have wireless networking cards installed. In order to communicate wirelessly with other computers in the network, each computer must have a wireless networking card. If your computers are only a few years old, you are almost guaranteed to already have one built-in, as this is a standard feature on all computers being produced today. If you have an older computer, you may need to purchase and install a networking card. 3. Set up an Internet connection. While L.A.N.s can be set up simply to share files between computers without Internet connectivity, there is little benefit to doing so considering the cost of wiring the entire network. To share an Internet connection between computers, you will first need a broadband Internet connection (such as cable or DSL) set up for your primary computer. Contact a local Internet service provider (ISP) to establish a connection if you don't already have one. 4. Purchase a wireless router. You will need to broadcast your Internet connection wirelessly, and for this, you need...

Words: 546 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1 Networking Components

...and stops sending data. Networking Components When creating a LAN network, there are many different components that are used, what components are used depends on the task that the LAN is setup for. A central hub would be used in larger LAN networks to join separate LAN’s together. When the hub receives a packet, it is then broadcast out to all of the connected devices. This may cause security issues as although each packet is closed with an address on it of the correct device, therefore it will be discarded by any other devices, if a user wanted to, they could capture the packet and open it on the wrong device, and no one would be able to tell. Because of this, a hub is often considered a dumb network...

Words: 610 - Pages: 3

Premium Essay

Unit 1 Assignment 2

...Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company management’s choices and or the proper experts will be called. LAN Domain: A LAN Domain is a collection of computers that are solid to one another. Data closets and physical elements of the LAN, and reasonable elements are to be selected by authorized personnel. This requires strong security & access controls. The LAN Domain can access company wide systems, allowing access...

Words: 413 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company management’s choices and or the proper experts will be called. LAN Domain: A LAN Domain is a collection of computers that are solid to one another. Data closets and physical elements of the LAN, and reasonable elements are to be selected by authorized personnel. This requires strong security & access controls. The LAN Domain can access company wide systems, allowing access...

Words: 414 - Pages: 2

Premium Essay

Convert Router to Acces Point

...How To Convert a Wireless Router into an Access Point Linksys WRT54G Step 1: Connect a computer that is set to obtain its IP address information automatically to a LAN port on the wireless router that you want to convert to an AP. If you don't know how to do this, Figure 1 shows the applicable Windows XP screens. (Get to the Network Connections window by Start > Settings > Network Connections.) [pic] [pic] Figure 1: Checking for "Obtain an IP address automatically" Log into the admin page of the wireless router that you want to convert to an access point. From here on, I'll call this the "AP". Step 2: For simple, one segment LANs, there must be only one DHCP server. Your LAN's router has a DHCP server and you don't want the two to conflict. So turn off the DHCP server on the AP. In Figure 2, you can see that the DHCP server in the WRT54G AP has been disabled. [pic] Figure 2: Shut off the DHCP server; change the IP Step 3: Find your LAN Router's DHCP server range. Figure 3 shows the Basic Network Settings page of the D-Link DGL-4300 that is my LAN's router. This is where the DHCP server controls happen to be. Different routers might have the DHCP server controls on a separate page, so you may have to poke around a little. [pic] Figure 3: LAN router settings The 4300 normally has its Router IP Address set to by default. But you can see in Figure 3, I changed it to This shifted the DHCP server to the 10.168.3.X subnet instead of...

Words: 643 - Pages: 3

Premium Essay

Introduction to Networking

...the following is true about the distance limitations in this LAN? c. All Ethernet user devices can be up to 100 meters away. (but no farther), while WLAN devices can typically be farther away than 100 meters. 2. Which of the following answers matches a particular standard to its maximum bit rate? a. 802.11g: 54 Mbps 3. Which of the following answers list a condition that could have affected the speeds that the engineer observed when testing the WLAN? b. The current radio noise d. The distance between the client device and the AP 4. Which of the following statements are true when comparing the wired and wireless LANs on this floor? b. The wireless LAN has a larger capacity d. A single transmission from the AP to a WLAN user device goes faster than the transmission from the Ethernet switch to a wired user device. 5. Which of the following answers describes the most accurate method the engineer can use to determine the coverage area? a. Do a wireless site survey. 6. Which of the following plays the biggest role in testing and certifying products to prove that they work with other products that have already been certified? c. Wi-Fi Alliance 7. Which of the following answers define a wireless LAN physical layer standard that was originally ratified by the IEEE before the year 2000? a. 802.11a b. 802.11.b 8. Which of the following locations is the least likely place to find a wireless LAN? b. As a link between two Ethernet switches on two different...

Words: 915 - Pages: 4

Premium Essay

It 282 Week 7

...A LAN networks job is to link computers together through a central device. That central device is the router, it is what transfers data to and from computers with an Ethernet cable or wirelessly as long as you are connected to the network. When you connect to the internet you are actually connecting to millions of networks that are connect through a multitude of ways: telephone lines, cable, and even fiber optic lines. A LAN and the Internet are the same only in the way that they both need a router to, well, route traffic. You actually can incorporate the Internet access into a LAN. The modem must be connected to the router and then that will provide a gateway between the Internet and the network connection. A firewall is very important when you use a gateway that will keep unwanted traffic from the public being able to access the LAN. It will only allow your data to go through that has a specific request from the other computers on the LAN. When you use a LAN with Internet access it can cause security risk. Hacker can always find a way around an older firewall, so keep them up to date, and users on the LAN may download files that have malicious files that are attached to files that you did not even know could infect your computer. When one computer on a LAN becomes infected, the infection can easily move throughout the entire LAN and infect all of the other computers in the network. I know this may seem confusing but a LAN and the Internet are used together, they are not the...

Words: 774 - Pages: 4

Free Essay


...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Wireless Lan Security

...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...

Words: 4933 - Pages: 20

Premium Essay

Along The River Mei Lan Quotes

...heroism prevails between good and evil. In the novel Along the River by Adeline Yen Mah, Mei Lan prevails as the main hero. She faces many challenges, but her main challenge is her stepmother who Mei Lan does not get along with at all. Mei Lan displays three main heroic qualities throughout the novel including friendship, bravery, and independence. Mei Lan’s friendly quality becomes visible when she begins to help and guide Ah Zhao. Ah Zhao was a very good artist who could draw, sculpt or paint anything one asked him too, but he lived as a barbarian orphan boy helping...

Words: 1004 - Pages: 5

Free Essay


...An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road · Atlanta, GA 30328 Tel: 404.236.2600 · Fax: 404.236.2626 WWireWireless Lan Security 802.11b Wireless LAN Security Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming 802.11 network technologies. Wireless LAN Business Drivers Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired...

Words: 3757 - Pages: 16

Free Essay

Itsy 1425

...single machine means only the loss of access to the resources on that one machine, the others would continue to function. Any user can share resources on his or her computer with any other user’s computer, and each user can determine what level of access other users have to his or her shared resources. Each user in this group must act as the administrator of his or her computer’s resources. Each user would also have to remember each set of credentials, which can be confusing if they aren’t trained properly in creating secure passwords, which is where efficient training on my part to help them to understand how to create secure passwords, why they’re created and the consequences of not using them properly. Because the company wants to spend as little money as possible the challenge with security will be a huge task. The key is training the personnel on security measures and making sure they understand the consequences of their actions for the company if they choose not to follow them. Ensuring they also know and understand why they need to back up their work and data on a regular basis, install patches as...

Words: 709 - Pages: 3

Premium Essay

Wireless Technology

...Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN). A wireless local area network, or LAN is a flexible data communications system implemented as an augmentation to, or an alternative for a, wired local area network. These networks rely on electromagnetic airwaves to transmit and receive over a defined area, usually a few hundred feet. (Yahoo-wireless) In most cases, a wireless transmitter will be connected directly to a wired land network using Ethernet cables. Once the network feed has been connected to the transmitter, and a constant power supply is established, a steady stream of radio, or infrared waves with be produced (both are electromagnetic waves). The vast majority of wireless LAN systems tend to rely on radio waves as the carries for their signals, because infrared waves tend to have a shorter distance at which they are able to transmit, and are more easily interrupted. Radio waves, or radio carriers as they are referred to, transfer data through modulations of the carrier signal. The addition of data to a radio carrier causes the signal to occupy more than a single frequency. Once data is imprinted onto the radio signal it is a simple reversal...

Words: 1672 - Pages: 7

Premium Essay

Mis Networking Questions

...communication but can also be used for digital. The twisted wires used in today’s LANs, such as CAT5, can obtain speeds up to 1 Gbps but is limited to a maximum run of 100 meters. Coaxial cable consists of thickly insulated copper wire that can transmit a larger volume of data than that of twisted wire. Coax was used in early LANs and is still used for longer runs on larger buildings. Coax has a maximum speed of up to 1 Gbps. Fiber-optic cable has bound strands of clear glass fiber – each one the thickness of human hair. Data is transformed into pulses of light that are then sent through the cable by a laser device at rates varying from 500 Kbps to several trillion bits per second. Fiber-optic is considerably faster, lighter, and durable that wire media and well suited to systems requiring transfers of large volumes of data. But it is more expensive and harder to install than other physical media. Define a LAN, and describe its components and the functions of each component. LAN is a local area networks connect PCs and other digital devices together within a 500-meter radius and used for many corporate computing tasks. LANs typically connect a few computers in a small office, all of the computers in one building, or all of the computers in several buildings in close proximity. LANs are also used to link long-distance Wide Area Networks (WANs) and other networks around the world. One computer in a LAN is a dedicated file server which provides users with access to shared computing...

Words: 1021 - Pages: 5

Premium Essay


...or wirelessly, using wireless networking cards that send and receive data through the air. LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. InTCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications...

Words: 719 - Pages: 3