Define wireless equipments

Assignment Help Computer Networking
Reference no: EM13945843

This project is based on a home network that was made two years ago. The initial part of the service was based on the two desk tops and a printer. The task began with having an ISP which was conducted on research on the service offer in my local area. I use equipment furnish by Att, and the set up procedure.

Att furnished a modem, router, and adaptors for the phone line, additions Ethernet cords. I had to buy a wireless card for one of the desk tops. Since setting up this network I have also added four laptops and an addition printer.
The network was set up with basic directions with hooking up the model. I also had to place the adaptors on the home phone lines and the line leading into the model. Once having the equipment set up I did the software hook on and then ensure that everything was in place.

The reason for putting together my own home network was for one the other desk top was in another room and I did not want to run a cord all over the home to the router. Second, which is a benefit to have the network was that we have access to all of the files from both computers. Also my wife's desk, called that as she was the primary user of that desk top and she used it for her home day care was that she printed a lot of material for her computer.
ISO 17799 Is titled Information technology - Security techniques - Code of practice for information security management. It is an information security standard published by ISO-The International Organization for Standardization and the IEC-The International Electro technical Commission.

ISO 17799 was actually changed to IOS/IEC 27002 in 2007. It provides best practices for initiating, implementing or maintaining Information Management Systems. Information Security according to IOS 27002 is defined according to the CIA standard. CIA stands for Confidentiality, Integrity and Availability. ISO 27002 contains 12 sections:
1. Risk Assessment
2. Security Policy
3. Organization of Information Security
4. Asset Management
5. Human Resources Security
6. Physical and environmental security
7. Communications and operations management
8. Access control
9. Information systems acquisition, development and maintenance
10. Information Security incident management
11. Business Continuity Management
12. Conclusion

This project will review VOIP, which specifically the methodologies, protocols and technologies for sending voice communication over the internet. Some of the security issues in regards to VOIP include Identity and Service Theft. This is where services are stolen from a provider or a customer using VOIP. This is due to the fact that encryption in SIP is not common. The first step in securing VOIP communication is of course the use of firewalls. Multiple firewalls should be placed at different junctures in the system including 1) In front of the VOIP system itself, 2) On the PCs and laptops of remote workers to prevent malware from infecting the VOIP system and 3) Between the VOIP provider and the local network. This will prevent malware from gaining access through the provider's network. Another way to secure VOIP is to utilize encryption as part of the SIP protocol. Also, VOIP traffic can be separated from general Internet traffic by using a Virtual Local Area Network or VLAN.
I will look at the utilization of at a small company and reviewing their security set up. Does this company use encryption on their VOIP system, do they utilize firewalls? Also, is the VOIP provider one versed in security measures?

Reference no: EM13945843

Questions Cloud

How do employers measure a liberal arts applicant : How do employers measure a Liberal arts applicant? Should a grads salary be important in measuring the value of a liberal arts degree
Describe and summarize the relationship of the agent : Four major components of a network system then analyzed the four major components of a network system.
Does this change affect the balanced-growth-path value of k : If the economy is initially on a balanced growth path that is dynamically efficient, how does a marginal increase in T affect the welfare of current and future generations? What happens if the initial balanced growth path is dynamically inefficien..
Describe the frame format of a typical ethernet packet. : Explain how carrier sense multiple access with collision detection (CSMA/CD) works.
Define wireless equipments : The reason for putting together my own home network was for one the other desk top was in another room and I did not want to run a cord all over the home to the router.
Realistic example of a rational consumer motive : Describe a real or made up but realistic example of a rational consumer motive that you or someone you know has experienced. What product did you buy, and what was your motive for buying it?
What resources or materials do you have on-hand : Where are you? What is around you? What resources or materials do you have on-hand? What does it sound like? What does it feel like (temperature, etc.)? Are other people there? Do you sit at a desk, on the floor, in a beanbag chair
Does police culture encourage corruption : We have all heard the saying "one bad apple spoils the whole bunch".  • What is the "rotten apple" theory?
Can this many users be supported under circuit-switching : A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 20 Mbps, must share a link of capacity 100 Mbps.

Reviews

Write a Review

Computer Networking Questions & Answers

  Find the mean of the numbers in the array

Input a list of positive numbers (terminated by 0) into an array, find the mean (average) of the numbers in the array, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the resul..

  What are the services provided by tcp

Name four socket functions (C functions) used to create client/server applications. Name the five layers in a typical TCP/IP computer network. What are the services provided by TCP

  Choose an appropriate ephemeral port number

Show the entries for the header of a UDP user datagram that carries a message from a TFTP client to a TFTP server. Fill the check sum with 0s.

  Network discussionmodule 2 application layertopic for

network discussionmodule 2 application layertopic for discussion application layer collapsethis chapter covers lots of

  What resources are available on the internet

What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation? (List at least three resources in your response.)

  Describe the general type of wan connections

Describe the general type of WAN connections and network hardware that will be used to interconnect the offices. Consider the following while responding:

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

  Explain dns and why it is necessary for today networks

Explain DNS and why it is necessary for today networks. Using your local DNS server, try to resolve "www.google.com.au" and report the resolved address(es).

  Relevant remote access applications

For this assignment, submit your initial post addressing the topics below. Continue to follow your classmates' posts for the remainder of the week and post at least one to two follow-up messages to your classmates' posts prior to midnight ET on Su..

  Explain differences in wireless dsl services

Wireless DSL is available in her apartment building for $45 per month for 1.5 Mbps down and 256 Kbps up. Explain the differences in these services and make a recommendation.

  Identify and describe 3 types of computer networks be sure

data communication is an important aspect of modern life. in your own words please address the following in a 4-5 pages

  Which protocol was used for the telephone

Which protocol was used for the telephone to attempt to register with the PBX? What is the type or name of the message or request that is sent by the telephone to the PBX

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd