All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Network Security in an Office Setting, Research Paper Example

Pages: 3

Words: 817

Research Paper

Network security is vital to any successful organization as proper planning and execution is needed to accelerate infrastructure and configuration for efficiency and effective savings. Intel Corporation (2007) is a leading IT development corporation who portrays an innovative idea to develop a wireless LAN (Local Area Network) for small offices, which delivers an estimated 43 percent net savings over 4 years, which accelerated time from months to days.

The network solution which is the most efficient in addressing the wireless network security is Cisco 3845 Integrated Services Router which uses high-level topology of the Cisco architecture, which also includes Light weight Access point protocols, the Wireless Control System and the Wireless LAN Controller, as well as the Cisco Access Control Server and its Authentication, Authorization and Accounting features the solution by providing RADIUS services, as mentioned by the Intel Corporation (2007).  The schematic integration of the 48-power port over Ethernet (PoE) Fast Ethernet switch module for supplying the required LAN  ports capabilities and connecting WLAN access points, that delivers VOIP, Unity Express, a voice mail, wireless controller module, voice and fax extension modules for direct analog fax machines connections as stated by Intel Corporation (2007). Below mentioned are the requirements of the Cisco 3845 ISR system confirming its architecture.

  1. High-availability system that recovers from  access points failures or system interferences.
  2. 5 GHz 802.11a and 2.4 GHz 802.11g connection
  3. Client support includes “desktops, laptops, personal digital assistants, and Wi-Fi* phones (2007)”
  4. The system also has seamless out-of-the-box installation and clearly identifiable control access points.
  5. Central management servers also have tracking capability. It can be used for blacklisting clients, and mitigating security offenses.
  6. Sufficient 100/1000 switch ports to support servers, printers, and other office devices; at least 10
  7. Support for numerous digital LANs for different vocal and data activities, power over Ethernet (PoE) 802.3af, Quality of Service (QoS) 802.1p, and port verification 802.1x
  8. Support for different IP routing initiatives, that include Routing Information Protocol (RIP) version 2, Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF)
  9. Server abilities with Dynamic Host Configuration Protocol (DHCP). This includes vendor-specific capabilities.
  10. IP multicast system assistance and Internet Group Management Protocol (IGMP) snooping.
  11. The system has support for WAN technologies that are affordable., that includes asynchronous exchange mode (ATM), frame distribution, and integrated providers of the digital network (ISDN). Preferred WAN technologies can be deployed but may depend primarily on the service provider. Certain carriers offering service available to the site depend onservice availability, cost, location , and service level contracts.
  12. Certain bandwidth for small offices is usually between 1 and 45 megabits per second (Mbps)
  13. QoS packet classification is a key aspect of the system as well.
  14. Encryption using IP Security (IPsec)
  15. The system provides multicast support
  16. It should have voice trucking
  17. I should also have the ability for working as a standalone gatekeeper. This should apply even with remote gatekeepers.
  18. Support for popularly used codec’s: G.711, G.726, G.729, and special wideband codecs.
  19. It should have support for Session Initiation Protocol (SIP) endpoints
  20. Emergency services such call routing, voice mail capabilities, automated attendant access, and conference calls support.
  21. Remote management can also be provided, with secure management access.
  22. Support for various arays of access controls

The internet protocol journal (2006) mentions the Centralized architecture which is a hierarchical architecture that involves a WLAN controller which is responsible for configuration,

control and management of several WTPs. The Access points receive their addresses dynamically from a Dynamic Host Configuration Protocol and they automatically detect the controller, which is integrated inside the router; the primary wireless service follows the protocol on the 5.2 GHz 802.11a band and is secured using full 802.11i encryption. RADIUS servers that are shared between LAN and WLAN  perform user authentication, and are available on the 2.4 GHz 802.11b and 802.11g band and go thru firewalls for more security, as stated by Wireless LAN design (n.d.).

The following is the model for the Cisco 3845 Integrated Services router as the separation of WAN from LAN is highly encouraged in order to avoid excess wiring, simplify network implementation, and increase agility. As the WLAN requires the Wireless Network username and password every time people try to access it, the firewalls always protect the invaders from misusing the wireless system.

The Internet Protocol Journal, 2006

(The Internet Protocol Journal, 2006)

An ultimate way to enhance security feature on the Cisco 3845 Integrated Services system is to disable/ filter SNMP (HTTP) management, keeping AP (access point) firmware updated  and the correct configuration of the BSSIS (MAC address of AP) as mentioned by Patterson & Poudel (2000).

References

Intel Corporation. (2007). Network in a box: Wireless LAN architecture for Small Offices. Retrieved from: http://www.intel.com/it/pdf/network-in-a-box.pdf

Patterson, M., & Poudel, R. (2000). Wireless Network Design & Architecture: Sanog. Retrieved from: http://www.sanog.org/resources/sanog6/peterson-poudel-wireless-archi-tutorial.pdf.

Sridhar, T. (2006). Wireless LAN Switches –Functions and Development. The Internet Protocol Journal, 9(3).

Wireless LAN design. (n.d.). Wireless LAN design. Cisco Unified Wireless Network Architecture (Chap. 5). Retrieved from: http://www.cisco.com/en/US/docs/solutions/Enterprise/Education/SchoolsSRA_DG/SchoolsSRA_chap5.pdf

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper