Telecommunications and network security

Assignment Help Computer Network Security
Reference no: EM131533144

Topic: TELECOMMUNICATIONS AND NETWORK SECURITY

Question: Application Activity

Wireless LANs have essentially become the wave of the future. Wireless LANs enable users to connect to the network over a much more spread out area. This ability essentially takes a LAN and allows it to have properties of that of a wide area network (WAN). In order to standardize the flow of information on these wireless LANs, there arose a need for a communication protocol. The most prevalent and widely recognized out of these is the IEEE 802.11 standard. This communication protocol is the foundation of wireless communication. Although wireless LANs are becoming more popular as time passes, there is still a demand for the wired LAN. Essentially, each accomplishes the same task, simply through a different means.

Assume that you are an experienced network technician and have been contracted to establish a WLAN in an individual's home. The person who has hired you for this job is flexible, but has a few requirements in which you must follow. These requirements include that the network must be able to support at least five computers and two additional devices such as tablets or other wireless devices. The network should also be able to support a reliable Internet connection, streaming video, and contain adequate security features. These security features may be hardware or software, but be sure to fully explain the security plan. The report must be a minimum of 7 pages, excluding the title page, Visio diagrams, and references.

In your report, present between 2-3 options to the client for consideration. In your report, be sure to include the following:

  • A listing of the cost associated with each option presented to the user. This can be accomplished by utilizing a budget spreadsheet which outlines the cost step by step.
  • An evaluation of the pros and cons associated with each of the options presented to the user.
  • An assessment of the capabilities of each of the network configurations, to include the network's specifications and capabilities. Be sure to frame this in a way that would be easy for a non tech-savvy individual to understand.
  • A diagram created by Microsoft Visio or a subsequent visual design tool which diagrams the network to include the manner in which the network will be secured.
  • An explanation of which network configuration you feel is the most advantageous given the user's needs.

Reference no: EM131533144

Questions Cloud

What is the company cost of capital : a. What is the company cost of capital? What is the after-tax WACC, assuming that the company pays tax at a 35% rate?
How would you explain the chicken-egg conundrum : How would you explain the "chicken-egg" conundrum as to which disorder came first, the mental illness or the addiction?
What is the expected return of wt stock without? leverage : a. What is the expected return of WT stock without? leverage?
Equilibrium price of risk in terms of expected return : The slope of the capital market line is the equilibrium price of risk in terms of expected return.
Telecommunications and network security : Topic: TELECOMMUNICATIONS AND NETWORK SECURITY. An evaluation of the pros and cons associated with each of the options presented to the user
How do this year results compare to prior years results : Prepare closing entries as of August 31, 2011 (the perpetual inventory system is used). Analysis Component
Calculate the etc and eac for the project : calculate the ETC and EAC for the project. Will the client be pleased or angry?
The importance and methods of designing valid research : Discuss the importance and methods of designing valid and reliable research in the behavioral sciences.
Applicable present value tables : Define the Cost of Capital and how it can be measured in your selected firm. Calculate present value using applicable present value tables.

Reviews

len1533144

6/16/2017 5:04:01 AM

APPLICATION ACTIVITY, Meets the following: 2–3 options for the client included; Cost listing included; Pros and cons included; Assessment of capabilities in laymen’s terms included; Explanation of author’s opinion of most advantageous network configuration included; Title page, diagrams, and references included; Minimum page length (7 pages) is met. Proper spelling and grammar are used; Minimum of 5 peer-reviewed sources included; and Current APA format is followed, including citations and references.

Write a Review

Computer Network Security Questions & Answers

  The proposed cyber security act

Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Secur..

  Analyze the basic attacks that occur in cyberspace each

analyze the basic attacks that occur in cyberspace. each type of threat actor attempts to achieve certain goals

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Describe the acquisition procedures and tools for windows

Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition - Describe the acquisition procedures and tools for Windows and Linux data acquisitions.

  What are the advantages of complex routing algorithms

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each? Which ones are most commonly used in today's networks?

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Several convicted cases of cyberstalking

There are several convicted cases of cyberstalking and Internet fraud/abuse. Misha Glenny, a United Kingdom-based journalist, recently wrote a book on the subject matter appropriately titled Dark Markets

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  Describes the application protocols associated with services

Describes the application protocols associated with these services. Explain how the application layer manages distributed applications and their protocols.

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  Examine common web application vulnerabilities and attacks

Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

  Information on the current security state

You selected an organisation, and provided information on the current security state and made suggestions of improvements to their security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd