Question

Case You own a small computer business and you specialize in setting up networks for small...

Case

You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that contains a golf simulation area. The staff needs to be able to access the network for various functions from each of these areas during training and selling. The computer in the office is a desktop computer. The printer is also located in the office. All other computers are laptops and used from various locations. Each computer must have Internet access. You decide that a wireless network is the best choice, so you need to research the hardware requirements and submit a proposal to the owner.

What to do:

1. Create a new word processing document and save it as "YOUR_NAME_WirelessNetworkPlan.docx".

2. If you need to learn more about wireless networking, log onto the Internet, and then use a search engine to search for information on the phrase “basic wireless networking.” Use any of the search results to get you "up-to-speed".

3. Write a list of basic hardware requirements for the network.

4. Explain why you would recommend the wireless network rather than a wired network. Summarize the advantages of wireless networking.

5. Add a brief explanation of some of the disadvantages of wireless networking, identifying any place in the store that might not be able to make effective use of wireless networking.

6. Draw a diagram (of your office) that identifies each of the areas that will be networked and identify the location where you would install an access point. Use the drawing tools available in your word processor or a drawing program. (DO NOT COPY A DIAGRAM FROM THE INTERNET) Explain your reasoning.

7. List two main security issues that you must address with wireless networking and how you plan to deal with these issues. Describe anything else you will do to secure the network.

8. Check for spelling errors, save your changes, and then submit the document and drawing to your instructor.

Homework Answers

Answer #1

3. Write a list of basic hardware requirements for the network.

a. Wireless Access Point

b. Wi-Fi Router

c. Wireless NIC

d. Wire based network switch

4. Explain why you would recommend the wireless network rather than a wired network. Summarize the advantages of wireless networking.

· Mobility

We can stay connected to network wherever we move.

· Accessibility

The network access is available throughout the specified area.

· Expandability

We can add new devices and the network can grow in size.

· Cost saving

Wireless network is cheaper to install and maintain.

5. Add a brief explanation of some of the disadvantages of wireless networking, identifying any place in the store that might not be able to make effective use of wireless networking.

· Wireless network has less control over devices when compared to wired.

· Getting coverage in some buildings or places may be difficult.

· Wired network is superior o wireless network in terms of security.

· Wireless network are inferior to wired network in the case of speed.

· There are high chances for collisions and interference.

6. Draw a diagram (of your office) that identifies each of the areas that will be networked and identify the location where you would install an access point. Use the drawing tools available in your word processor or a drawing program. (DO NOT COPY A DIAGRAM FROM THE INTERNET) Explain your reasoning.

7. List two main security issues that you must address with wireless networking and how you plan to deal with these issues. Describe anything else you will do to secure the network.

· Denial of Service attack (DoS) – The attacker tries to flood the network by sending packets continuously.

· Spoofing and session hijacking – The attacker assumes the identity of the legitimate user and gains the control of the network.

· Eavesdropping and spying – Here unauthorized third party intercepts the data.

Following methods can be implemented to secure the wireless network:

· Service Set Identifiers (SSID) – We can set a strong password for our network to avoid unauthorized access.

· Media Access Control (MAC) – This are the addresses attached to the NIC of the device.

· Wired Equivalent Privacy (WEP) – WEP uses encryption mechanism, so that the device that knows the key can only access the network.

· Firewall – This is a system that protects the network by preventing unauthorized data flow to and from the system.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
In this activity, you search the Internet to find examples of devices that physically secure wireless...
In this activity, you search the Internet to find examples of devices that physically secure wireless components. Select a device and write a summary of it. Start your Web browser, and perform an Internet search for wireless physical security devices. Visit several sites, and examine at least three different devices. Select one device and write a two- to a three-paragraph summary of it. Include details such as the device’s cost, its purpose, how it works, and where to get it....
You are the project manager for an upgrade of computers in your company. You need to...
You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the company network, as well as a common installation of software, security components, and so forth. You must submit your risk identification in a summary that will be used during a presentation for the CIO. In a 3–5 page document, complete the following: Identify four...
Stock Inc. has two sites in Pittsburgh that are four miles apart. Each site consists of...
Stock Inc. has two sites in Pittsburgh that are four miles apart. Each site consists of a large factory with office space for 25 users at the front of the factory and up to 50 workstations in two work cells on each factory floor. All office users need access to an inventory database that runs on a server at the Allegheny Street location; they also need access to a billing application with data residing on a server at the Monongahela...
A small retail business has a local store and a newly established and growing online storefront....
A small retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things: Protection from power outages Always-available connectivity in case of an outage The owner has decided to implement battery backups for the computer equipment. Which of the following would BEST fulfill...
Comp4U is a local computer store you will open that will build computers from components when...
Comp4U is a local computer store you will open that will build computers from components when a customer places an order. We will have a local store where some sample computers will be on display and we will build the computers in the back room on a lab bench using simple tools such as screwdrivers and pliers. You load up the software and test the computer overnight. We will also have some sophisticated test equipment we will use to test...
Inventory . Orders Warranty Types You own a small Computer Retailing company that sells computer systems....
Inventory . Orders Warranty Types You own a small Computer Retailing company that sells computer systems. You have created a spreadsheet that stores basic sales information. Inventory: Lists the computer & upgrade costs for each system identified by product number and product name. Order: Lists basic customer information such as, their name, computer purchased, and warranty cost (if chosen) by the customer. Warranty Types: Lists the warranty costs. The cost of the warranty is based on the type of warranty...
Can you draw a network diagram for this? In VISO would be an extra bonus There...
Can you draw a network diagram for this? In VISO would be an extra bonus There are two available rooms, named RH230 and RH231, in your building. You are asked to set up a server room in RH230 and a computer lab in RH231. Design a Local area network that satisfies the following conditions.  You have two 8-port switches.  Cables as you need.  Four server machines in RH230: Gateway server, DNS server, DHCP server, and Web server....
You are required to submit a Case Study Analysis report for topic related to business analytics....
You are required to submit a Case Study Analysis report for topic related to business analytics. This homework will result in a survey paper examining the use of business analytics in organization transformation. REQUIREMENTS: The Case study should be obtained from reputable journals, white papers, conference papers, reputable magazine articles, or any acceptable reference for academia. Your report should consist a summary of real-time business analytics solution implemented in industries. The summary should include the organizational details, the business transformation,...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT