Free Essay

Advance Networking

In:

Submitted By 22october
Words 3045
Pages 13
Advanced Networking

Phase 1: Implementing IPv6

Ahmarijah (AJ) Andrews

IT305-1602B-01

Instructor: Brian Rodgers

May 23, 2016

Executive Summary

[ Create this AFTER completing P5IP… it should summarize the most important points that an executive would want to know relative to what is IN the document. The Index or Table of Contents would follow so that they know where to find more information. ]

Table of Contents

IT305-1503A-01 Network Upgrade Project Plan Executive Summary 1
Table of Contents 2
Section 1: Implementing IPv6 4
Section 2: Network Infrastructure Design 5
Section 3: Linux Networking 6
Section 4: Analyzing Network Traffic 7
Section 5: Network Security 9
References 12
Section 1: Implementing IPv6

Honeywell International

It has been decided that as our presence grows on the global market we have decided that we need to stay better connected with all our subsidiaries and partners. Currently we all connect using IPv4 which as and addressing protocol that has roughly 4billion different combination. But seeing as we currently have approximately seven billion people on this planet let’s say just 1 billion of these people are in the industrialized world. Now for each of these one billion individuals they each have a cell phone that connects to the internet. That’s 1 billion IPv4 addresses used. But let’s not forget that each of these people needs a computer at home for whatever people use computers for now a days, that adds up to an additional 1 billion IPv4 addresses. Let’s face it; currently we recycle IP addresses because we just don’t have enough addresses for every individual. It may seem like everything is operating just fine but it’s actually not. Information is moving much too slowly and there are too many handshakes taking place before our data gets to the required destination. Hence the need to upgrade to and IPv6 address. With IPv6 we can guarantee that every device which needs a network connection can do so without having to wait to receive a temporary address. That means our data will get where it need to go faster regardless of size when compared to IPv4. As a reminder it should be known that IPv4 and IPv6 networks are not interoperable and the number of devices that use IPv4 number is still great. Some of these devices do not support IPv6 at all, so the migration process is necessary since IPv4 and IPv6 will likely coexist for some time.

First of all we will need to train our employees on how to properly transition to IPv6. We will need to make sure our existing equipment is capable of transitioning to the new protocols. Honeywell will need to check that our firewalls are not blocking any Internet Control Message Protocol version 6 (ICMPv6). ICMPv6 is an integral part of IPv6 and performs error reporting and diagnostic functions and has a framework for extensions to implement future changes.

We will have to contact our ISP provider at AT&T to ensure they are informed and work congruently with them on the change. They need to ensure we have the necessary equipment to make the change. We need room in order to grow and increase our presence online. We will have to go through The American Registry for Internet Numbers (ARIN) to get our internet number. That should be were out friends at AT&T come in.

After we make the necessary arrangements with or internet providers we will have to begin auditing our hardware. Since we still plan on changing our telephone service to voice over IP (VoIP) making sure the necessary equipment is available is paramount to a smooth transition. After inspecting the company’s hardware makes sure you exchange out any non-acquiescent hardware so that no delay of transmission ensues.

Steps to configure IPv6 on a Juniper router
When you are setting up IPv6 on a Juniper router you will need to make sure that the firewall filter does not have any requests for it to block any IPv6 addresses. You must then do routine maintenance and update the filter. Then requests from HPC-CERT or HPCMPMO to impassable ports here is an example of Juniper router commands.
Set interface Io0 unit 1 family inet6 address 2001:db8::1
Set interface fe-1/2/0 unit 1 family inet6 address 2001:db8:0:1::/64 eui-64
Set interface ge-0/1/0 unit 6 family inet6 address 2001:db8:0:6::/64eui-64

Protocols
Routing concepts remain same In case of IPv6 but almost all routing protocols have been redefined accordingly.
There exist two forms of routing protocols: • Distance Vector Routing Protocol: A router running distance vector protocol advertises its connected routes and learns new routes from its neighbors. The routing cost to reach a destination is calculated by means of hops between the source and destination. A router generally relies on its neighbor for best path selection, also known as “routing-by-rumors”. RIP and BGP are Distance Vector Protocols. • Link-State Routing Protocol: This protocol acknowledges the state of a Link and advertises to its neighbors. Information about new links is learnt from peer routers. After all the routing information has been converged, the Link-State Routing Protocol uses its own algorithm to calculate the best path to all available links. OSPF and IS-IS are link state routing protocols and both of them use Dijkstra’s Shortest Path First algorithm.
Routing protocols can be divided in two categories: • Interior Routing Protocol: Protocols in these categories are used within an autonomous system or organization to distribute routes among all routers inside its boundary. Examples: RIP, OSPF. • Exterior Routing Protocol: An Exterior Routing Protocol distributes routing information between two different autonomous systems or organization. Examples: BGP.

Routing protocols

• RIPng: stands for Routing Information Protocol Next Generation. This is an Interior Routing Protocol and is a Distance Vector Protocol. RIPng has been upgraded to support IPv6. • OSPFv3: Open Shortest Path First version 3 is an Interior Routing Protocol which is modified to support IPv6. This is a Link-State Protocol and uses Djikrasta’s Shortest Path First algorithm to calculate best path to all destinations. • BGPv4: BGP stands for Border Gateway Protocol. It is the only open standard Exterior Gateway Protocol available. BGP is a Distance Vector protocol which takes Autonomous System as calculation metric, instead of the number of routers as Hop. BGPv4 is an upgrade of BGP to support IPv6 routing.

Section 2: Network Design

IP address ranges for VoIP Network
When it comes down to it IP addresses you need to have a plan for your IPv6 deployment. You first need to make sure that your network is compatible IPv6; you need to make sure you have enough space for all the IP addresses. You will need a networking and computing assessment this requires the authentication that your network is IPv6 comparable with your system. To do this you need to take an account of the system. If the company retains accurate up to date records then there is no need to account for the system. When you are taking an account of the system you might want to log in your IPv4 address space this can help down the line. The next step is classifying your IPv6 ability then you need to look at vendor declarations for provision and compatibility at first. You can then conclude the mitigation steps you will need to set the system up. Here are some examples of IPv6 addresses, 2001:0db8::0001 is not acceptable and must be represented as 2001:db8::1 and
2001:db8:0:0:0:0:2:1 must be shortened to 2001:db8::2:1

VoIP security in your network
There are many things you need to thank about when it comes to securing your VoIP network. There are many different kinds of attacks; some of themes are Denial of Service Attacks then there is Theft of Service and Interception of Calls to name a few, Denial of Service Attacks happen when someone is transferring unauthentic traffic to VOIP services or endpoints to disrupt your network. Luckily there should be countermeasures in place for such an attack. When they try and use Theft of Service the options are Encryption, you may also try Physical security; last but not least try secure wireless networks or VoIP protocols. In the case of Interception of Calls use the same measures you used for Theft of Service Encryption, Physical security; and secure wireless networks,
Hardware required in the implementing of an IP Phone System
First of all you need to remember when you are implementing an IP Phone System you have a few choices of what IP phone system you want. You may choose to install an IP PBX or you can go with the IP voice system. You just need to make the right choice for the company. If you decide on the IP PBX you will need to put in a voice gateway like the Cisco’s SPA8000 you may attach up to eight phones on your network and figure out how many IP headphones you will need. If you choose IP voice system you will need to make a few more judgments regarding what features you would like. They have music when you are on hold and whether or not to have voicemail also how many phone lines you will need. You might want to install Cisco’s Small Business Communications 500 Series; it will handle up to one hundred IP phones. The next step is to get the network ready to do this you need to make sure that the network has enough space to handle the traffic. That way there is no dropped calls in some cases calls might get more priority than data movement. Next you will want to install the product. This is the hardest part when putting in an IP PBX or an IP voice system remember it can and will affect your entire network it’s performance. You need to work together with another IT professional to make sure the network is running right.

Section 3: Linux Networking

Section 4: Analyzing Network Traffic

Section 5: Network Security

Security is a very important concept of a business and we should implement a strong security initiative so that the company can continue to grow in the rapid speed it is moving in. In the policy we will outline how we will protect the company’s assets both physically and the information technology. Though, we will never truly be finished with security as we will need to keep updating it to keep up with security standards.

Intrusion detection is very important so we should implement a system that should combat threats. One intrusion detection system that is very effective is NitroGuard IPS 4245. Another effective intrusion detection system is McAfee Network Security Platform. In my opinion, I believe that both of these systems are both equally effective. Last, the company should be able to block and threats from coming into the network so the company should invest in the best firewall products. One firewall product I will recommend is the very flexible McAfee's Next Generation Firewall. An alternate firewall that can be used at the company would be Palo Alto Networks' PA-7050 which was top rated from Reader’s Choice Viewers.

To ensure the company is protected I would recommend that we have a secure network. I would use packet filtering in the router, firewalls will be required and we should use anti-virus software, both at the gateway, and on each desktop. I also recommend that we use a DMZ network that will be used for internet access for servers that require it.

There are many strategies that can be used in making a secure network. The strategy that I would implement would be the Defense in Depth strategy. In this strategy a single product or device is not relied upon for enforcing security. Instead of using a single device it uses a firewall and router because of their security capabilities. Better encryption solutions, application firewalls, host intrusion prevention software and intrusion detection can all be called.

Another aspect I would recommend is the implementation of application proxies. This will be used for protocols and common applications. The proxies are very important because they add extra security because internal hosts are not exposed to the internet. Examples of this would be emails and web protocols.

After the implementation of application proxies, the “principle of least privilege” is recommended. This will be used to determine access to appropriate network resources. I believe this is essential, it translates to a user that does not need access to a certain system will be denied access. For example, a person that works in the IT department will not have access to the payroll system. This will help the company stay secure and help manage access as well.

The last step would be testing all of the components to make sure each is working well, and above standards. The firewall should only be able to allow access inbound on the web that is on the server with the DMZ which block all other web access by other hosts. The testing should never be done by the same person that built the firewall or did any other security.

Intrusion detection systems are very important in the longevity in a successful company. The two best systems in my opinion are NitroGuard IPS 4245 and McAfee Network Security Platform. I highly recommend either one for the company to implement.

Nitroguard IPS 4245 is a great intrusion detection system it received a 5 out of 5 star from SC Magazine. It is a smart packet-filtering system that uses a sophisticated network to detect intrusion attempts and stops and records intrusion attempts. The Nitroguard IPS is fully featured and have excellent reporting, good presentation of data, SCADA, and DCS protocols. There are also no known weaknesses in these IDS. Models that are lower performance can be as low as $6,495 but I would not recommend those models. The price range that I would recommend would be the fully featured model that goes for $54,495.

The other intrusion detection system that I highly recommend would be the McAfee Network Security Platform. This system also received a five out of five star from SC Magazine for 2015. The main task of this system is to give threat protection from advanced networks. This system uses heuristics, behavior analysis, cloud- based reputation, and protocol discovery. This is one of the more expensive intrusion detection systems but has been proven to be worth the money. The price range can go from between $11,000 to $230,000.

Either one of these intrusion systems would be ideal to purchase but if I had to choose one it would be the Nitroguard IPS simply because it is less expensive and performs at the same level as Mcafee. This is the same system that most major enterprises use for security because it has been proven to work. Not only does it perform well but it is also a very easy to use system.

Firewalls are absolutely essential in any company and we should have the best firewall available. These two firewalls that I would highly recommend would be McAfee's Next Generation Firewall and Palo Alto Networks' PA-7050. Both firewalls were both chosen as Security Reader’s best choice for firewalls for Enterprises for 2014.

McAfee’s Next Generation Firewall is truly one of the best firewalls on the market. It supports IPV6 and aids in clustering and load balancing on many devices. It is excellent for blocking attacks, intrusions and network traffic that is unauthorized. It was also rated high for its reporting capabilities, logging and monitoring. This is essential because the program basically works for you and minimizes management effort which makes the network flow easily. The price of McAfee’s Next Generation Firewall is a one-time payment of $48,856.95 and I guarantee it is worth every cent.

The other firewall that I would recommend would be Palo Alto Networks' PA-7050. In my opinion these two firewalls are competing in their effectiveness but I would recommend Palo Alto Networks' PA-7050 over the Next Generation. Like McAfee’s product, it is designed for excellent logging, reporting and monitoring. What I find impressive with this product is that there is a Sandbox capability that is built in. This means that all payloads that are suspicious can be ran and tested in a safe zone which minimizes additional threats. The difference between this product and others is that it broke the 100 Gbps barrier. According to the Palo Alto Company it can even protect data centers with up to 120 Gbps. This is ideal for our company because it is compatible with large data centers so we can adjust well. The price of this product begins at about $300,000 and readers suggest that it is worth every single cent that it is sold for.

The first important step that we needed to do was integrate a security policy and go from there. We should use packet filtering on our routers and also use a DMZ network for full capabilities. It is also very important that we have the best firewalls, intrusion detection systems, and web scanners. The firewall that I would highly recommend would be Palo Alto Networks' PA-7050 because of its excellent logging, reporting and monitoring. I want the best of the best for this company so I would recommend Nitroguard IPS for our intrusion detection system simply because it is less expensive and performs at the same level as Mcafee. You can never get total security but if we take these steps in securing our network we will be able to get pretty close to it.

References

CTU Online. (Ed.). (c. 2016). Phase 1: Technical Network Requirements for Business [M.U.S.E.]. Colorado Springs, CO: CTU Online. Retrieved May 6, 2016 from CTU Online, Virtual Campus, IT305, Advanced Networking: 1602A-01. https://campus.ctuonline.edu.
Beasley, J. S. & Nilkaew, P. (2013). A practical guide to advanced networking (3rd Ed.) [Electronic Edition]. Indianapolis, IN: Pearson Education, Inc.
Project Management Institute, Inc. (PMI ) (2008). A guide to the project management book of knowledge (4th Ed.) (PMBOK). Newtown Square, PA: PMI

Similar Documents

Premium Essay

Advance Networking Technology

...|Course Title |Advance Computer Networking | Question 1. What does computer networking accomplish? 2. How does networking improve the usefulness of computers? 3. What are the drawbacks of networking computers? 4. What is the future of networking computers? 5. Is computer networking still at infancy, Discuss? Question 1: What does computer networking accomplish? Computer networking is the interconnection of two or more computers to share resources. Computer networking has evolved beyond the sharing of resources; it allows people and machines to communicate, using some of the advanced features or services. Computer networking has brought about increased productivity, cost reduction and synergy between users. Other accomplishments of the computer networks include: • File sharing and management: One of the major accomplishments of computer networking is file sharing, which includes remote file accessing. Organizations or individuals can share documents irrespective of their location provided their PCs are interconnected. It saves time, and provides a more efficient means of transferring data, rather than using storage device to copy and transport data to the other user. • Resource sharing and management: Another important achievement of computer networking is resource sharing. All computers in a network...

Words: 3610 - Pages: 15

Premium Essay

Islamic Financial Contracts

...durable assets and currencies Sharikah al Mufawadah Investment Auctioning Output sharing DP with Management DP without Management Profit sharing Musharakah-based DP Mudharabah-based DP Sharikah al Amwal Sharikah al Abdan Sharikah al Wujuh Profit Sharing Revenue sharing Durable Assets Participation Musaqa Muzara‘a Output (Revenue) Sharing Involuntary: e.g., due to inheritance Voluntary: e.g., jointly purchasing a building for renting Sharikah al milk (Partnership based on joint Ownership) Temporary or Ongoing Musharakah Temporary or Ongoing Mudharabah Sharing Principle Fees deferred Ijara: Rents deferred Financial Murabahah Installment sale Object deferred Sale (ODS) Pre-paid istisna‘ Fees paid in advance Rents paid in advance Pure Salam SHARIKAT: PARTNERSHIPS Qard/Service Charge Heeba (Donations) 'Ariyah (qard of assets) Qard: Interest Free Loans TABARU‘AT: GRANTS Hemish Jedheya-Sale:...

Words: 345 - Pages: 2

Premium Essay

Walmart

...Wal-Mart leadership became successful due to the company’s effective leadership style, their organizational structure and its culture. Wal-Mart’s organization culture is recognized to be more of bonded organization between the employer and the employee. Sam Walton, the company’s owner, shared his vision for the company with his associates and made them partners in the success of his company, after Sam died, his legacy remained the same with new management and continued to grow successfully and still remain number one in retail today, because management recognized his vision and carried it out as Sam would have done. New management did not dismantle Sam’s vision but kept the success going unlike Times Picayune, this organization lacked a successful organizational structure and endured more of procedural issues. After Times Picayune owner, Ashton Phelps Jr. retired, his vision was not carried out as he intended. After 175 years, new owner Ricky Matthews, dismantled Phelps vision and emphasized his own vision that became more procedural and steep, which caused the culture of the business to miscommunicate. Workers in this environment are more focus on pleasing the boss, instead of their work performance due to the company’s rules and policies being procedural and controlled without any flexibility. This type of culture causes employee turnovers and a bad reputation for the business. Matthews not only changed the culture of Time Picayune, but he lay off all active employees without...

Words: 461 - Pages: 2

Premium Essay

Lighthouse Revenue Recognition

...Codification of Accounting Standards, a company should not recognize revenue until 1.“it has performed under the terms of the arrangement” and 2. “unless it will indeed receive and retain payment in a form that has value to the company,” (accountingresearchmanager.com) This means that the company has to perform the duty that they have agreed to in their contract and will receive a form of payment in return. The performance of the arrangement can be the delivery of goods, providing services, or providing information. Once a company performs the terms of the arrangement, the revenue is deemed as earned; however, at least part of the job must be fulfilled. In addition, the company should not recognize revenue even if their clients paid in advance to fulfillment of the agreement. Revenue is realized or realizable when “the seller receives cash or assets from the customer that is convertible into cash,” (accountingresearchmanager.com) This must occur before revenue is recognized. In the case, “Lighthouse”, the issue of how revenue should recognized for the sales of both Ship Finder devices and service arises. In this particular case, the company Lighthouse created a hardware unit which it installs in ships and provides the services for this unit. This device and service are utilized together in providing information to shipping companies on the ship location, speed, and current local weather. Lighthouse requires its customers to sign two separate contracts, one for the device...

Words: 722 - Pages: 3

Premium Essay

Cmgt 554/It Infrastructure Week 3

...Hospital Networking Project (Week 3) University of Phoenix CMGT 554/IT INFRASTRUCTURE Patton-Fuller Community Hospital Networking Project Today most new building construction is built with new technology and is not as much concerned with the type of budgets that a hospital muse consider in order to redesign a whole new network structure for the purpose of being more optimal and maintaining standards that keep up with advances in new technology. In most cases, a hospital’s network can transition over time with new technology and evolve into meeting the demands it requires to perform effectively. However, upgrading a hospital’s entire network can often be very expensive to implement and sustain. There may be a case where components or parts are no longer being produced to meet current and future demands. In the last several years, changes in healthcare put a demand on hospitals to maintain their networks with new, more efficient solutions that can enhance performance, keep cost low, but most one that is reliable . The Network architecture at Patton-Fuller hospital was designed for each department to rely on information flow between each department. In other words, if the accounting department needed information from the pharmacy or admissions in order to create invoices or insurance billing, it would be rely on those departments to share real time information through the network. It is important for a facility as large as a hospital to have a Networking system that...

Words: 1533 - Pages: 7

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Effects of E-Communication on Cooperate Organization

...Title: EFFECTS OF E-COMMUNICATION ON CORPORATE ORGANIZATIONS CHAPTER 1 INTRODUCTION Electronic communication otherwise known as E-Communication is a type of communication carried out using electronic media. Such communications allow transmission of message or information using computer systems, fax machine, e-mail, tele and/or video conferencing and satellite network. People can easily share conversation, picture(s), image(s), sound, graphics, maps, interactive software and many other things. Due to electronic technology, jobs, working locations and cultures are changing and therefore people can easily get access to worldwide communication without any physical movement. Experts have defined electronic communication as the transmission of information using advanced techniques such as computer modems, facsimile machines, voice mail, electronic mail, teleconferencing, video cassettes, and private television networks.” 1.1 Background of the Study Communication is said to be the imparting or exchanging of information by speaking, writing, or using some other medium. It could be between two or more persons, human and machines or any other communicable entity. Group communication can be carried out through various means such as smoke signals and drums which was common in ancient Africa, America and parts of Asian, the fixed semaphore in ancient Europe and electronic means which is most prominent, popular and recent. This research details on the effects of communication...

Words: 8745 - Pages: 35

Premium Essay

Mobile Devices

...Computing technology advances in the past decade have created a more easy and flexible work place. Mobile technology can mean greater productivity, but it also has inadequate security measures to mitigate the risks inherent in the use of mobile devices. There are many factors to consider when deciding if wireless networking or in specifically if wireless technology is a reliable and safe route for the healthcare systems. Given the type of wireless infrastructure and different construction techniques, there are many ways to develop safe, reliable and most importantly a secure wireless health care technology. First, the important thing to consider is the assurance and security that we may face in today's enterprise healthcare systems. For this particular case, there are multiple office spaces in the professional building. With that said there may be multiple wireless transmitters and due to a radio-frequency wireless application may be a source of interference for another application. Security for wireless medical devices and systems must be addressed and make sure that it is able to handle such risks that can be involved. Some things to keep in mind would be if this exchangeability is worth the risks with such diligent information. With these interferences, it's a matter of manageability for a safe and secure method of transferring patient data from one space to another. Secondly, threats differ by groups whether they may be a police force or a medical team and most security...

Words: 529 - Pages: 3

Premium Essay

Instruction Plan

...Instruction Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand the course: Boson Netsim / Packet Tracer acketTracer...

Words: 1513 - Pages: 7

Premium Essay

Unknown

...Medical Device Networking for Smarter Healthcare: Part 3 Next-Generation WLAN Deployments in Hospitals Lantronix, Inc. 167 Technology Drive Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Medical Device Networking for Smarter Healthcare: Part 3 of 4 Contents Introduction..................................................................................................................................................... 3 Wireless Roll-outs........................................................................................................................................... 5 Medical Device Connectivity / Mobile Carts .......................................................................................... 5 Handheld Devices .................................................................................................................................... 6 Computer-based Physician Order Entry (CPOE)..................................................................................... 7 Next-Generation Wireless Applications ......................................................................................................... 7 Location-based Services .......................................................................................................................... 7 Voice-over-WLAN .................................................................................................................................. 8 Internet/Intranet...

Words: 4973 - Pages: 20

Premium Essay

Network Administration

...Advanced Network Technology June 1993 OTA-BP-TCT-101 NTIS order #PB93-203735 Recommended Citation: U.S. Congress, Office of Technology Assessment, Advanced Network Technology--Background Paper, OTA-BP-TCT-1O1 (Washington, DC: U.S. Government printing Office, June 1993). For sale by the U.S. Government Printing Office Supcl IIIILWIICIII (If [k)c ulllLlll\. \lAll stop $s01’, \$ Allllg((u. [)(’ 2(141? () ~?x ISBN 0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a variety...

Words: 37290 - Pages: 150

Free Essay

Network Devices

...Devices on the Network Michael Gustafson NTC/405 10/8/2012 JOHN-HUNG HO Devices on the Network There have been many advances in the world of networking and there are a multitude of devices which are a part of any particular network. I will go over the following network devices: Network interface card (NIC), modems, network hubs, switches, routers, gateways, and repeaters. Also the difference between channels and circuits and the difference between circuit switching and packet switching will be addressed as well as the concept of Ohm’s law and its importance to circuit trouble shooting. A NIC or network interface card is a device which lets a piece of equipment interface with a network. A NIC is a card encoded with a special 48 bit unique number known as a MAC address which helps the network recognize the user so that it can access the network, a NIC supports a transfer up to 1000+ mbps. A transceiver is embedded in the NIC that can transfer media from the network to the NIC. A wireless NIC or WNIC is essentially the same as a wired NIC in that it too has a 48 bit address although the connection is through radio waves transmitted electronically from the NIC’s antennae. The connection is started electronically through antennae and transferred over radio waves then back into an electronic signal in the device. A modem is a piece of equipment used to connect a user’s computer to a network. The modem is essentially a converter in that it can convert analog cables to digitals...

Words: 1142 - Pages: 5

Premium Essay

Essay

...Files on all personnel Purpose: The purpose of this policy is to set forth a standard for which personnel files are kept and recorded. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: All personnel working for or having access to GDI servers or the network shall have a file maintained for them in HR containing at a minimum Name, Social Security Number, Phone Number, Supervisor’s Phone Number, Security Level Clearance, Length of Employment and Systems that person can access. Physical access list Purpose: The purpose of this list is to establish an access list for persons who have direct physical access to the server control room. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: Only persons who are on the Physical Access list shall have access to the servers control room and the servers themselves. These people are Security of server room Purpose: The purpose of this policy is to implement a set of securities in order to further safeguard the server room from unauthorized access. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: This policy is to set forth a new manner in which the Server Room is secured. The Server Room shall have a keypad on all access points. This keypad will require a different code form every person who has access to the room. It shall also retain a file in which all persons who enter the server room is recorded...

Words: 699 - Pages: 3

Premium Essay

Wireless Technology

...Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN). A wireless local area network, or LAN is a flexible data communications system implemented as an augmentation to, or an alternative for a, wired local area network. These networks rely on electromagnetic airwaves to transmit and receive over a defined area, usually a few hundred feet. (Yahoo-wireless) In most cases, a wireless transmitter will be connected directly to a wired land network using Ethernet cables. Once the network feed has been connected to the transmitter, and a constant power supply is established, a steady stream of radio, or infrared waves with be produced (both are electromagnetic waves). The vast majority of wireless LAN systems tend to rely on radio waves as the carries for their signals, because infrared waves tend to have a shorter distance at which they are able to transmit, and are more easily interrupted. Radio waves, or radio carriers as they are referred to, transfer data through modulations of the carrier signal. The addition of data to a radio carrier causes the signal to occupy more than a single frequency. Once data is imprinted onto the radio signal it is a simple reversal...

Words: 1672 - Pages: 7

Premium Essay

Net Sec

...CHAPTOR 12 In the early 1930s, a mathematician developed a formula that could be used to make accurate weather forecasts, something that was unheard of at that time. However, because there were no computers or calculators at that time, it took almost three months of hand calculations to come up with the next day’s forecast. This obviously was far from useful, and many individuals scoffed at such a preposterous solution to weather forecasting. However, with the introduction of computers by the late 1940s, the amount of time needed for the calculations was dramatically decreased. Suddenly, this model became very popular, and today it forms the basis for all weather forecasting. The point here is that it sometimes requires vision to see how an idea or technology could be used. This vision also applies to new technologies like wireless communications. Some users question why we should consider wireless technology when the existing wired system seems to work just fine. In this chapter, you will learn what it takes to convert the potential of wireless technology into a successful business reality. We’ll look at the steps needed to incorporate wireless technology into a business, and at the advantages and challenges that face business users who consider adopting this new technology. Advantages of Wireless Technology The advantages of incorporating wireless technology into a business are far-reaching and can positively impact an organization in many ways. In addition to the...

Words: 8259 - Pages: 34