Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Project scope
Assignment 2 networking designing a network
Project scope
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Project scope
In designing a network, it is essential to first determine the scope of the project by asking key questions that will aid in the design and build. Questions such as how many servers and computers will be connected, what is the intended purpose of the network, and how much money is available are basic questions that come immediately to mind. Other questions such as security considerations, and how will the physical architecture of the building affect the design are often ignored but are equally important to the success of the network. Once these questions have been answered, the process of network design can begin. As the design of the network affects both media choices and performance, it is crucial that a design which takes current needs into account, allows room for growth, and provides a proven path for upgradeability is chosen.
In determining the physical layout of the network, the decision of what type of cable to be used is also decided. When broken down to its simplest form, all types of cabling provide a medium across which network information can travel. The most popular types of network cabling in use today are Twisted-pair (TP) in both unshielded (UTP), and shielded (STP) varieties, and Fiber-optic cable. While the use of Coaxial cable has declined in the arena of Local Area Networking (LAN), it is still prominently featured by Cable Television firms, providing both Television, and Internet services.
While the electrical pulses that Twisted-pair wiring carries over a copper medium is different from the pulses of light carried by Fiber-optic over a glass medium, there are cabling characteristics that apply to both. Each cable has a Bandwidth rating, which specifies the amount of data the medium is rated to carr...
... middle of paper ...
...ectronic eavesdropping, as well as interference from fluorescent lighting, while Fiber-optic cable is not affected by either of these. Aside from eavesdropping, the equipment should be physically secure to prevent the casual user from being overly curious, as there are many credible stories of the evening janitor plugging in a vacuum cleaner, and bringing down an entire network. While this paper has focused on a wired network, based upon TP and Fiber-optic cabling, the presence of Wireless Networking in a business operation cannot be ignored. While wireless speeds are only at 11/54Mpbs, it does provide the convenience of un-tethered freedom for use in meetings. However, the use of Wi-Fi should be carefully considered, as it existence presents a significant security risk for any business, by extending the network beyond the physical constraints of the organization.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
During a conversation last year with a Houston-based network administrator, I asked, “Is wire sniffing at some random public WiFi hotspot illegal?” “No, not at all. It’s just passive…and besides, anyone stupid enough to pass their sensitive information over an unsecure network gets what they deserve.” As it turns out, he was wrong, but he’s not alone in his confusion.
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
Throughout the 1970s, concerted industry efforts at the federal, state and local levels resulted in continued lessening of cable restrictions. These changes, couples with cables pioneering to satellite communications technology, led to a pronounced growth of services to consumers and a substantial increase in cable subscribers.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
A parallel link transmits several streams of data (representing particular bits of a stream of bytes) along multiple channels (wires, printed circuit tracks, optical fibres, etc.).
The concept of fiber optics is simple, yet it provides so many potentialities in the world of technology. Presently the world relies on fiber optical technology for its data and communications systems. The consumer can converse on the telephone and hear voices with clarity, as well as send and receive information on the Internet with ease. However, there still lay a sea of possibilities in this area of technology that has not yet been discovered.
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
Every computer has a port to connect a communication line or cable from a peripheral device. Computers have limited number of ports, so multiplexers are used. They combine signals from multiple terminals and put them all on a single communications line. This increases the efficiency of communication and is cost-effective. The communication line is divided into different sections and the data from each terminal is coded and sent and then received, decoded and directed to the correct section from where it came from. There are four commonly used types of multiplexing, the first is (FDM) frequency division multiplexing. FDM divides the bandwidth of the communication line so that each terminal can transmit data. The individual terminals are separated from guardbands to ensure the signals do not interfere with each other. Multiplexers often have external modems or internal modems built in to convert the data to analog before transmission takes place. The local cable television companies use FDM to send multiple stations over the same line at once.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.