...making their working hours more productive and decrease the amount of time needed to manually count the inventory. This will allow for a seamless flow of data from our warehouse location to our store shelves to allow for a more productive selling advantage. Also, it will drop maintenance cost to a minimum by incorporating our own in house IT personnel to maintain the network without having to outsource any maintenance personnel. For these benefits, I encourage you to approve of this upgrade in our inventory process. It will benefit our organization in many ways and improve employee morale. If you have any questions or suggestions, I would be glad to answer them for you. Sincerely, Contents LIST OF ILLUSTRATIONS iv ABSTRACT v INTRODUCTION 1 OVERVIEW…………………………………………………………………………………………………………………….1 BACKGROUND…………………………………………………...……………………………………………..…………1 STATEMENT OF PROBLEMS…………………………………..……………………………………..…………….2 PROBLEM 1…………………………………………………………………………..…………………..…………..2 PROBLEM 2……………………………………………………………………………………………………………..2 FINDINGS 2 INSTALLATION COST 3 EASE OF...
Words: 2039 - Pages: 9
...of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications. As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted...
Words: 2926 - Pages: 12
...& Security Description The Senior Network Engineer’s role is to ensure the stability and integrity of in-house storage, virtualization, data, and wireless network services. In addition, the Network Engineer is responsible for the configuration, installation, monitoring, maintenance, upgrade patching and associated troubleshooting of Roxbury Community College systems and network infrastructures. This individual will also analyze and resolve network hardware and software problems in a timely and accurate fashion, and provide end user training where required. Responsibilities Performs daily network maintenance and management of network resources including servers, storage, virtualization, routers and switches Deploy company LANs, WANs, and wireless networks, including servers (rack and blade), storage, routers, switches, and other hardware Configure networks and systems to ensure their smooth and reliable operation for fulfilling business objectives and processes Monitor performance and troubleshoot problem areas as needed Create and maintain documentation as it relates to network configuration, systems, processes, and service records Ensure network connectivity of all servers, workstations, telephony equipment, and other network appliances Conduct research on network products, services, protocols, and standards to remain abreast of developments in the technology industry * Monitor and test network performance and provide network performance statistics and...
Words: 467 - Pages: 2
...utilize a Microsoft Visual Studio Team Foundation Service (TFS) server to manage their content and the progress of the project. “Team Foundation is a set of tools and technologies that enable a team to collaborate and coordinate their efforts on building a product or completing a project. Team Foundation enhances team communication, tracks work status, supports team roles, enacts the team process, and integrates team tools.” (Microsoft.com (2011) Team Foundation Overview) In addition to the Team Foundation, they also utilize Visual Studio to code, and build the websites. These resources are accesses through different methods. Those methods include WAN connection, VPN connection through a remote office, and through the corporate office via LAN. They also have other services such as Outlook Web Access for E-mail that is accessed via the methods mentioned above. They have also created security control measures that are published through the corporate security manual. Two Security Vulnerabilities Software Vulnerability The main vulnerability I see on the software side would be protecting their Server. Since Quality Web Design utilizes the access to their servers via remote connection and wireless access, these servers can become victims of Man-in-the-Middle...
Words: 927 - Pages: 4
...Wireless Security and Monitoring for the Home Network Raymond Turner Version 1.4b GIAC GSEC Practical Assignment August 21, 2003 Abstract Marketing trends estimate that by the end of 2006, 21 million homes will have implemented a Local Area Network (LAN), and of those 21 million homes 65% will use wireless solutions. [1] The rapidly decreasing cost for wireless devices and the proliferation of wireless solutions provided by the major Internet Service Providers seems to clearly support these growth estimates. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Home wireless users and security professionals the world over are conceptually trying to solve similar problems. They both need to find a way to provide a secure working environment. There are two distinct approaches to this security dilemma, security prevention, and security detection. An example of security prevention would be a firewall device that restricts specific traffic or ports to or from specific hosts. Although this provides protection against unauthorized traffic, it has no means for determining if an attack is being attempted via an authorized port. An example of security detection would be an IDS (Intrusion Detection System) device that contains a signature to identify a specific attack via authorized or unauthorized ports. [2] Security professionals often have the technology and resources to develop security solutions based on prevention, detection, or a combination of the two. However, home...
Words: 6220 - Pages: 25
...of radio waves and detect the presence of interfering signals without the use of test equipment. Walls, doors, elevator shafts, people, and other obstacles offer varying degrees of attenuation, causing the RF radiation pattern to be irregular and unpredictable. As a result, it’s absolutely necessary to perform a wireless site survey to fully understand the behavior of radio waves within the operating environment before installing access points. The goal of a wireless site survey is to determine the number and placement of access points that provides adequate signal coverage throughout a facility. A wireless site survey also detects the presence of RF interference coming from other sources that could degrade the performance of the wireless LAN. Also keep in mind that the facility of the WLAN is highly impactful on the whether it requires a survey. For example a small room office may not require a site survey. With the given example a small office might only require an access point or a router located within the office to require adequate coverage. A larger facility is going to require a well scoped survey to be able to provide sufficient coverage to all areas, and if a larger facility isn’t properly surveyed other areas in the facility might be affected by poor coverage or no coverage. Example of these areas would be airports, hospitals, colleges. When conducting a site survey keep in mind what type of coverage is going to be needed or be provided, and also what technology is...
Words: 657 - Pages: 3
...My Home Network Vinay Kumar Reddy Mandadi Wilmington University Home Network Introduction: "A network is an interconnection in between two or more systems or computers in an order to communicate each other by sharing the data ". Today, networking concept got importance by its features, especially of sharing the information and is widely practicing in an Organization level too. Mainly networking concept is categorized into 3 main categories based upon the performance namely LAN, MAN and WAN. For our home purpose generally we use LAN technology. Local Area Network can up to a building and it can be either in Wired or in Wireless. For Wired Technology we use Ethernet Cables along with the Router, Switch, Hub and for Wireless WI-FI and Bluetooth technologies are widely using. My Network: We use Verizon as ISP that provide signal to my home network. Verizon gives a firewall that gives security between web server and modem. The firewall limit users from accessing certain portions of the internet. We use a broadband modem from Cisco that gives advanced sign to my home system. The signals from modem is dispersed to few gadgets utilizing wireless router. In addition conveying the signals to numerous ports, my wireless router transmits wireless signal to several devices. To use a wireless network, a modem, preferable one Ethernet connection is required. For this connection I used CAT 5e cable , which is an extended version of CAT 5. This cable can transmit the...
Words: 627 - Pages: 3
...How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The...
Words: 1907 - Pages: 8
...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...
Words: 18928 - Pages: 76
...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...
Words: 4933 - Pages: 20
...Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving...
Words: 18577 - Pages: 75
...Practical WLAN security Abstract This report covers the basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today that...
Words: 4798 - Pages: 20
...their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch B. port C. hub D. node Answer: C 6. Reference: Networks Near and Far Difficulty: Moderate In a local area network, a ____________ only transmits data to the destination node. A. switch B. port C. hub D. router Answer: A 7. Reference: Networks Near and Far Difficulty: Moderate LAN stands for: A. local area nodes. B. logical arrangement of networks. C. local area...
Words: 3749 - Pages: 15
...wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities. There were two problems with the original WEP encryption system. Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network or unintentional attack which exploits the lack of verification of control frames in the wireless network iv. Injection of traffic A new tool has been released which allows a malicious user to inject or insert traffic at the application layer. The potential for misuse of this tool is great: the example used had pornographic images being displayed on the screen of wireless users. v....
Words: 906 - Pages: 4
...A local area network (LAN): connects two or more devices in a limited geographical region so that every device on the network can communicate with every other device. Connects Pc’s in one building. A wide area network (WAN): is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. It interconnects LAN’s. Analog technologies: information is translated into electric pulses of varying amplitude (waves). Digital technologies translation of information is into binary format (zero or one) where each bit is representative of two distinct amplitudes. Communication and media channels: Twisted pair cable: most prevalent, used almost all business telephone wiring. Copper wires, inexpensive. Slow for transmitting data, subject to interference and easily tapped. Coaxial Cable: insulated copper wires. Less susceptible to electrical interference than twisted and can carry more much data. (TV uses it) more expensive and inflexible Fiber Optics: thousand of filaments of glass fibers that transmit information via light pulses. Surrounded by cladding. More data and security. Transmission Technologies: Digital Subscriber Line (DSL): a high-speed, digital data transmission technology using existing analog telephone lines. Network Protocol: Ethernet: A common LAN protocol A protocol...
Words: 2572 - Pages: 11