Current wired wireless infrastructure

Running Head: CURRENT WIRED/WIRELESS INFRASTRUCTURE 1
Current Wired Infrastructure and Recommended Improvements/Upgrades Report
Insert Name:
Insert: Institution
Instructor:
Insert Date:
CURRENT WIRED/WIRELESS INFRASTRUCTURE 2
Table of Contents
Task 1: ......................................................................................................................................... 3
Introduction ................................................................................................................................. 3
Part 1.1: Current Appraisal of the Current Wired Network Infrastructure ................................. 4
1.1.1 Weaknesses of the Current Network .............................................................................. 5
1.1.2 Strengths ........................................................................................................................ 6
1.2 Suggested Upgrades .............................................................................................................. 6
1.3 Assumptions .......................................................................................................................... 7
1.4 Issues during the Design Phase ............................................................................................. 8
1.5 Logical Design for Proposed Network ............................................................................... 10
1.6 Physical Design for the Proposed Network ........................................................................ 11
1.7 Equipment and Cost List ..................................................................................................... 12
1.8 The cost of materials ........................................................................................................... 13
1.9 Network maintenance costs ................................................................................................ 13
1.10 Network Management ....................................................................................................... 14
Task 2 ........................................................................................................................................ 14
2.1 Proposed Scheme ................................................................................................................ 14
2.1.1 Assumptions ................................................................................................................. 15
2.2 Maximum Transfer Rate ..................................................................................................... 16
2.2.1 The Theoretical Maximum Transfer Rate .................................................................... 16
2.2.2 Likely Maximum Transfer Rate................................................................................... 17
2.2.3 Time to Transfer 20GB ................................................................................................ 17
2.2.4 Assumptions ................................................................................................................. 17
2.3 Improvements ..................................................................................................................... 18
2.4 Other Network Technologies .............................................................................................. 19
2.4.1 Dense Wavelength Division Multiplex ........................................................................ 19
2.4.2 Digitized spaces ........................................................................................................... 19
2.4.3 Machine learning ......................................................................................................... 20
2.5 Real Throughput Explanation ............................................................................................. 20
2.5.1 Reason One .................................................................................................................. 21
2.5.2 Reason Two ................................................................................................................. 21
Task 3: ........................................................................................................................................... 21
Part 3.1 Proposed Connection ................................................................................................... 21
3.2 Security Risks ......................................................................................................................... 22
3.2.1 Security Risk One ........................................................................................................ 22
3.2.2 Security Risk Two........................................................................................................ 22
3.2.3 Security Risk Three ...................................................................................................... 23
3.2.4 Integrity Protection ...................................................................................................... 23
3.3 Internet Access .................................................................................................................... 24
References ..................................................................................................................................... 25
CURRENT WIRED/WIRELESS INFRASTRUCTURE 3
Task 1:
Introduction
Modern Mouldings Company like any other the world over-relies heavily on information sharing
capabilities so that clients could be served efficiently and in a productive manner. However, it is
important to state that the business world is experiencing a paradigm shift to meet time-bound
demands. As such, the organization adopted a wired network approach through the use of
computer networking technologies that change over time (microsoft.com). Despite having two
options, the business organization in the past settled on the wired network due to reduced cost of
system installation and structured network that uses a network cable to connect computers rather
than adopting wireless networks that utilizes radio frequencies when connecting to computers
(Mathy and Frank, 2017).
One would obviously reiterate that wireless network is advantageous compared to the wired
networks, but to some point, each type of network has merits and demerits (Dan, 2008). For
instance, Modern Holdings Company has experienced consistent security and privacy threats that
are likely to increase in case a wireless system is adopted (infotel-systems.com). However, to
become competitive in the business, the organization has to embrace wireless technology as well
(Mathy and Frank, 2017). Meaning that the company will have to integrate both wired and
wireless networks to thrive in the volatile technology-oriented manufacturing/production market
arena (compnetworking.about.com).
CURRENT WIRED/WIRELESS INFRASTRUCTURE 4
Part 1.1: Current Appraisal of the Current Wired Network Infrastructure
The company in focus is Modern Mouldings. This is a rapidly expanding firm that produces
precision plastics and metallic moldings basically for commercial and industrial use. The main
departments within the company include accounts, sales, production, design, administration and
store/distribution. The current managing director is Mr. Alan Switchman, the man behind the
development especially in IT network systems to ease operations within respective departments
and the targeted clients (RF Wireless World, n. d). Nonetheless, it is important to mention that
the departments within the company own computing facilities that are based either on
Linux/Unix or old PCs that run on Windows operating systems. However, after the company
moved to new premises a year ago, the company received a government grant to modernize
existing network infrastructure, and also upgrade all its PCs (Dan, 2008).
The company management has agreed on the upgrading of all PC systems to the new models that
run Windows 10, the server system is not excluded. New server system that runs Windows
server 2016 operating system has been agreed upon (Bradley, 2017a). Nonetheless, based on the
explained scenario, it is realistic to state that any organization requires a change to equally
compete within the existing markets. As such, Modern Mouldings Company require an upgrade
of existing network segments/components rather than performing the full upgrade (Karanvir, &
Er, 2015). Total overhaul of the existing system at once is likely to impact the productivity of the
organization negatively since employees may require more time, while some employees may
develop resistance to change. Thus continuous upgrade is preferred since it enables the system
users to understand respective changes with time leading to positive perception about the
improved network system (Zhong, 2012).
CURRENT WIRED/WIRELESS INFRASTRUCTURE 5
1.1.1 Weaknesses of the Current Network
Despite the fact that wired systems have high data transfer speed (uploading and downloading),
the use of physical cabling is disadvantageous since such are prone to physical damage that
could stall the whole system since fault tracing is difficult and time consuming being that one has
to conduct numerous tests to determine the areas affected.
The second weakness I noticed was that the efforts to upgrade existing computers to the latter
PCS, adopted (wired network) system is not fast enough to provide great work output since
network connection and file sharing capabilities are slower compared to what exists in wireless
broadband network connections. This is basically due to the fact that wired LAN hubs slows
down the speed of internet access hence the need to adopt latest technology that allows for faster
data transfer comparatively.
The third weakness is that the design department being resistant to change is a disgrace to the
company. This is a great weakness since it derails efforts to conform to the latter changes in
technology. In fact the design department should be at the forefront in adopting technological
interventions since its forms the basis for production of competitive brands within the saturated
markets.
The fourth weakness which is also a great concern is the interference that the existing wireless
communication especially between design department and their production counterparts, posing
a great security threat firstly due to the resistance in implementing changes, and again, wireless
networks does not support firewall as opposed to wired networks. This makes it possible for
every Tom, Dick and Harry to connect to the roaming wireless network with ease thus further
posing great risks to company information that could be intercepted online, and/or maliciously
CURRENT WIRED/WIRELESS INFRASTRUCTURE 6
accessed. In short, it is important to state that wireless LANs are less secure than wired LANs
(Mathy and Frank, 2017).
1.1.2 Strengths
Unlike in wired networks that printing has to be done from specific computers that are directly
connected to the printers, the main strength that the company will enjoy is the online printing. In
fact as proposed by the sales department to have an online or networked printer, such efforts are
encouraging since it enables employees or the organization to be able to select the network
printer and print information directly without having to physically move to the printer location.
Another strength is that despite the difference in terrains, adopting wireless network and through
the use of routers, switches and repeaters radio signal strength would be regenerated, a fact that
enables a people to connect to network from anywhere within the range hence one does not need
to get back to the office to have the computers, tablets or smart phones connected to the network
(Prof. Satish, et al., 2012).
The third strength is that adopting both wired and wireless network enables the wireless network
to be protected through the wired system through a process referred to as wired equipment
Privacy (WEP) encryption standards. Moreover, adopting such strategy is in line with the IEEE
standards that enables any device that use either wired or wireless connection to communicate
within the company network system. In fact it is open for further upgrade with time due to
compatibility.
1.2 Suggested Upgrades
Initially, it could be assumed that every employee of Modern Mouldings Company regardless of
the respective areas of specialty has to be well conversant with IT networks application systems
CURRENT WIRED/WIRELESS INFRASTRUCTURE 7
to work efficiently and successfully in deliver assigned tasks (infotel-systems.com). Whilst the
information technology-based network interventions are numerous in the market, quality system
equipment is expensive to acquire, a fact that may delay the company’s rate of upgrading (Prof.
Vilas, Sunil, & Swati, 2014). During the first stage of upgrading, clients and company
employees alike are likely to find it difficult to navigate through the system since not all
upgrades take effect immediately (Stefan & Vladimir, 2012).
Upgrading Modern Mouldings Company IT system would improve internet connectivity and as
well add bandwidth, update access layer LAN cabling, support wireless access in distinct areas,
provide redundancy for the company’s key services and create a Wide Area Network (WAN)
(pcstats.com). Prior to operating system software upgrade, the company should focus on
improving the existing PCs, and network so that the superior operating software would be
integrated when the network and security issues are already solved (Karanvir, & Er, 2015).
1.3 Assumptions
Based on the existing advantages of having both wired and wireless networks, it is important to
make presumptions that Modern Mouldings Company does not require a total overhaul of the
existing wired network system, but an upgrade of the system so that security would be enhanced
with convenience in terms of data transfer rate and accessibility. This would enhance
coordination and service delivery both at the departmental levels and the clients as well.
Network infrastructure is an important aspect as far as keeping data safe and private within an
existing myriad of devices required for the successful transfer of information. As such, adopting
new technology is assumed to open more avenues to enhance faster acquisition of information
not forgetting security aspect. This is in line with the company objectives that focuses more on
CURRENT WIRED/WIRELESS INFRASTRUCTURE 8
client satisfaction, quality products and secure information sharing platform for enhanced
interaction in line with the core values of the company.
1.4 Issues during the Design Phase
Network coverage and the speed of data transfer are of great consideration when designing new
or upgrading a network system, poor network, is among causes of adverse impacts on
productivity. In addition, to overcome such, the company has to invest slightly more on better
quality networking equipment cognizant of the fact that human errors are also inevitable. It is
advisable not to make a configuration of the network system using untested equipment. All tests
are supposed to be done in a lab environment to ascertain reliability (Dan, 2008) Zhong, 2012).
The new equipment should overcome the threats and weaknesses of the previous ones so that the
existing limitations would not be realized afterwards. The main challenge would be financial
facets in settling acquisition costs, but otherwise, quality equipment are preferred during
upgrading of network system.
Table Showing Router Information
Table 1: Router information
Device
Port
IP
Virtual IP
Virtual Router Redundancy Protocol ID
Router 1
Fc0/0
192.168.1.2
192.168.1.1
1
Fc01
192.168.2.2
192.168.2.1
2
Router 2
Fc0/0
192.168.1.3
192.168.1.1
1
Fc01
192.168.2.3
192.168.2.2
2
The logical design has got two routers; the primary and secondary router. The primary router is
dedicated to computer PCs while the secondary router will only be used for printing. However,
CURRENT WIRED/WIRELESS INFRASTRUCTURE 9
the respective departments within the organization have been provided with their own Virtual
LAN to ease network management of distinct networks. But, the adopted topology (star-bus)
enables the respective networks to communicate with each other easily. This is as a result of
adopting real-life approach to network design taking into consideration the challenges that we
face. In addition, it is a reality that fibre technology has been used to increase the speed of data
transfer. However, Cat5 Ethernet cable will be used.
Table 2: Workstation, printers and servers IP addresses
Usage
IP setting
Printers/Servers
Static
Workstations
DHCP
The information in table two above indicate that printer IP addresses could be assigned
192.168.1.1 to even 192.168.1.120…, while workstations could be assigned 192.168.2.1 till any
number be it 192.168.2.15 based on either the number of departments available or the number of
printers that the company has. Printers and servers are supposed to be assigned the initial
addresses while workstations get the remaining addresses.
CURRENT WIRED/WIRELESS INFRASTRUCTURE 10
1.5 Logical Design for Proposed Network
CURRENT WIRED/WIRELESS INFRASTRUCTURE 11
1.6 Physical Design for the Proposed Network
CURRENT WIRED/WIRELESS INFRASTRUCTURE 12
1.7 Equipment and Cost List
S. No.
Item
Qty
Approx.
Rate(USD)
Total
1
AIR-ANT2524DW-R 2.4 GHz 2 dBi/5 GHz 4 dBi
Dipole Ant.,White, RP-TNC
50
$230
$11,500
2
AIR-AP3802E-E-K9 802.11 ac W2 AP w/CA; 4x4:3;
Mod; Ext
Ant; mGig -E Domain
50
$260
$13000
3
C1-AIR-CT5520-K9 (Cisco ONE - 5520 Wireless
Controller w/rack mounting kit)
10
$280
$2800
4
CON-SNT-CT5520K9 (SNTC Wireless Controller
w/rack mo)
5
$50
$250
5
CAB-C13-CBN (Cabinet Jumper Power Cord,
250VAC 10A, C14-C13 Connectors)
10
$25
$250
6
LIC-CT5520-DTLS-K9 Cisco 5DTLS License520
Wir
1
$800
$136
7
LIC-SME-3YR Cisco Meraki Systems Manager
Enterprise Device License, 3 Year
1
$250
$250
8
C1 -MSE-PAK Cisco ONE MSE License PAK
1
$500
$250
9
AIR-PSU1 -770W 770W AC Hot for 5520
Controller-Plug Power Supply
1
$30
$30
10
AIR-BZL-C220M4 Cisco 5520 Wireless Controller
Security Bezel
1
$120
$120
11
AIR-CT6870-NIC-K9 PCIe Network Interface 20G
1
$70
$70
12
AIR-SD-32G-S 32GB SD Card for UCS servers
1
$102
$102
13
AIR-TPM2-001 Trusted Platform Module 1.2 for
UCS (SPI-based)
1
$128
$128
14
CON-ECMU-C1FPAIR SWSS UPGRADES C1
Foundation Perpetual - Wireless
1
$105
$105
15
C1 -WLC-PAK Cisco ONE Wireless LAN Controller
AP License PAK (any WLC)
1
$105
$105
16
C1 -MSE-LS-1 Cisco ONE CMX Base (Location
+Connect) - 1AP license
1
$2000
$2000
17
C1 -ISE-BASE-AP Cisco ONE Identity Services
Engine25 EndPoint Base Lic
3
$1450
$4350
18
C1 -MSE-WIPS-1 Cisco ONE Mobility Svcs
Intrusion Prevention 1AP - Wireless
1
$2000
$2000
19
C1 -MSE-CMX-1 CisMobile Experience 1AP Licco
ONE Mobility Svcs-Connected
1
$1300
$1300
20
AIR-SD240GBKS4-EV 240GB 2.5 inch Enterprise
Value 6GSATA SSD
1
$106
$106
CURRENT WIRED/WIRELESS INFRASTRUCTURE 13
21
C1F1VAIR-01 Tracker PID v01 Fnd Perpetual
AIRno delivery
1
$78
$78
22
AIR-MR-1X081RU-A 8GB DDR4-2133-MHz
RDIMM/PC4-17000/single rank/x4/1.2v
5
$300
$1500
23
MSE-MRAID12G Cisco 12G SAS Modular Raid
Controller
1
$30
$30
24
7 MSE-CPU-E52650D 2.30 GHz E510C/25MB
Cache/DDR4 2133MHz-2650 v3/105W 2
10
$50
$500
25
CON-ECMU-C1FPC38S SWSS UPGRADES Cisco
ONE Foundation Perp Cat5 850 24Prt
5
$100
$500
26
PWR-C1-1100WAC/2 1100W AC Config. 1
Secondary Power Supply
20
$25
$500
27
Software tools (R-PI31-SW-K9 Prime Infrastructure
3.1 Software)
5
$90
$450
28
Installation Cost
1
250
$250
29
Maintenance cost
1
$14,563.2
$14,563.2
30
Training costs
$17,852
$17,852
31
Labor
10% of
cost of
materials
$357.04
$357.04
Total $ (USD)
$ 68,369.2
Equivalent to
£48,834.14
1.8 The cost of materials
The cost of restructuring the existing network infrastructure to integrate wireless network is not
consistent since it is based on the manufactures of the communication devices acquired for the
realization of reliable network system within the company.
1.9 Network maintenance costs
In handling network management, the company will employ a network maintenance engineer
who will be able to monitor the transceivers noting down the existing changes in temperature,
CURRENT WIRED/WIRELESS INFRASTRUCTURE 14
transmitted data, received data and any other concern like freezing of signals and as well monitor
the respective repeaters and routers to affirm the causative facts of network failure when need be.
1.10 Network Management
This does not only involve monitoring the signal failure but it encompasses full control of
activities in a network system. As such, most of the assigned tasks within the management would
be performed by network administrator, like network security, anti-spyware, system back-up,
and creation of new communication nodes and corresponding authentication requirements.
Task 2
2.1 Proposed Scheme
This task will explore the viability of adopting wireless network system between design and
production departments. In accomplishing this task, it is important to firstly affirm the viability
of the connection and the estimate of the traffic that is supposed to be using the wireless network.
The number of devices that will use the wireless network in the production department are 46,
though not a single devise is indicated from the design department, but presumably the same
number would apply as in the case of production department. It implies that there would be about
92 devices that are supposed to use the wireless network connection.
As such, after realizing the number of devices to use the network, it is appropriate to split them
into light, medium and heavy data usage respectively. In order to be on the safe side as far as
data traffic is concerned, let’s assume that 36 devices from each of the two department totaling to
72, 8 devices from each are of medium usage, totaling to 16, while only 2 devices from each
department totaling to 4 are to be of light usage. However, considering the totals for respective
usage categories, the following calculations were arrived at:-
CURRENT WIRED/WIRELESS INFRASTRUCTURE 15
(4x500Kbps)+ (16x900 Kbps) + (72x2000Kbps)
= (2000 Kbps+14,400 Kbps + 144,000 Kbps) =160,400Kbps
= (160,400/1000) = 160.4 Mbps
Hence 160.4Mbps is the approximate bandwidth required for the wireless network connection.
The calculation explanatively implies that the wireless connection speed is moderately fast when
applying the peak network usage time as well as for normal browsing and data transfer at off-
peak. But, it is necessary to use of repeaters with a minimum speed of 160.4Mbps for further
amplify the signal at close intervals of about 30 metres from each other till the signal reaches the
nodes within the network coverage area. However, as the business expands, it is a reality that the
company would require a faster network connection that is capable of handling additional work
load in the future.
2.1.1 Assumptions
Initially, it is a reality that the standardized transceiver antennas that are often omnidirectional,
and characterized by a gain of zero (0) dBl, which is an important consideration when calculating
radio transmit power. This further enables the calculation of maximum data transfer speed.
The indication of respective data transfer speeds from light (500Kbps), medium (900 Kbps) and
high (2000 Kbps) are useful in calculation of the required bandwidth.
Another assumption is that the wireless usage is applicable for all devices between the design
and production department respectively.
CURRENT WIRED/WIRELESS INFRASTRUCTURE 16
It is assumed that majority of majority of network devices may not be over relied on heavy usage
as indicated in the earlier that about 80% of the devices to be of heavy usage. And the fact that
the wireless antenna traverse all directions, it implies that all users would find the network within
the coverage area.
2.2 Maximum Transfer Rate
2.2.1 The Theoretical Maximum Transfer Rate
The required transmission scheme and corresponding bandwidth are important consideration that
should be availed before working out the theoretical maximum transfer rate. The nyquist formula
would then be applied as follows:
C= B.log2.M
In this case C=the theoretical maximum bit rate, B= the channel bandwidth, while M is the
transmission scheme.
Now, through substitution, we have
B=2400 MHZ Radio channel bandwidth
M= 8
Then we would have C=2400*log2 (8) =2400*3
=7200Megabits per second= (7200/8 bits) = 900 Megabytes/second
It implies that 7,200 Mbps is the theoretical maximum transfer rate, which may not be realistic
since physical devices have distinct limitations. However, according to the IEEE standards of
operation (SOP), 802.11n that was released in 2009 is only limited to 600Mbps, despite having
high obstacle penetration, high compatibility, high congestion, and can be used for longer
distances without signal distortion. However, the existing physical barriers and interference
related to wireless frequencies causes variation in the actual transmission speed (Wi-fi.com).
CURRENT WIRED/WIRELESS INFRASTRUCTURE 17
2.2.2 Likely Maximum Transfer Rate
With assumption that bite rate error is 1.0*10
-3,
maximum transfer rate could be found through
multiplying
the bit rate error by the distinct maximum transfer rate.
However, it is important to initially determine the number of bits that are received in error. As
such the maximum transfer rate has to be determined and multiplied by the bit rate error, with
assumption that a maximum of 600,000,000 bits are sent per second.
We would have (600,000,000*0.001) =600,000 bps
Then we less 600,000 from 600,000,000 which is as follows
= (600,000,000-600,000) = 599,400,000 bps
= (599,400,000/1000, 000) = 599.4 Mbps
Hence it implies that the likely maximum bit rate of the new channel is 599.4 Mbps
2.2.3 Time to Transfer 20GB
I firstly convert 20GB into Megabytes which is = (20*1024) =20,480 Megabytes, then we divide
the value by 599.4 Mbps. We have (20480/599.4)= 34.1675, correcting to two decimal places,
we get 34.17 seconds , which is slightly above half a minute. This is realistic since the wireless
connection would be able to transfer 20GB data within half a minute, this is quite commendable
speed indeed for the business.
2.2.4 Assumptions
The first assumptions made while handling the data transfer concerns was that the transfer
scheme contains eight (8) levels/bits per signal element. This is as a result of the adoption of
standards transmission scheme according to IEEE standards.
CURRENT WIRED/WIRELESS INFRASTRUCTURE 18
2.3 Improvements
In today’s LAN, many users are likely to connect and share local resources, services, and the
internet remotely. In wireless systems, many access points are connected within a wired network
backbone that acts as a link between wired and wireless network. Since such communication
adopts half-duplex, meaning that only one radio frequency can send traffic at a time (Prof. Vilas,
Sunil, & Swati, 2014). General routing encapsulation protocol is advisable to be used for
transmitting data traffic. However, access points should not be deployed too far from each other
in order to enhance signal strength and quality (compnetworking.about.com).
A large VLAN is recommended for Modern Mouldings Company since it enables wireless users
to the network through creating a large broadband domain (Bradley, 2017b). It is a reality that
adopting a scalable solution is more beneficial for a network not only economically, but also
based on the fact that it has less administrative burdens, and efficient, thus Modern Mouldings
Company is supposed to adopt centralized wireless system architecture (Mathy and Frank, 2017).
However, since technology plays a great role in enhancing company productivity and based on
the fact that Modern Mouldings Company require network to enhance productivity, it is feasible
that the company has to continuously face off wired network and instead integrate wireless
network connection to enhance ease of access to information be it live or remotely through
wireless communication gadgets. Thus necessitating adoption of continuous system that would
enable the change to be implemented in a way that employees embrace since they should always
be part of change (Prof. Vilas, Sunil, & Swati, 2014; compnetworking.about.com).
However, since the requirements for the company network system upgrade are affordable and
within the company’s reach, it is important to state that the proposed upgrade is a reality that has
CURRENT WIRED/WIRELESS INFRASTRUCTURE 19
real-life impacts on the general productivity of the company, its benefits would be realized
immediately the wireless section is integrated (Mathy and Frank, 2017).
2.4 Other Network Technologies
2.4.1 Dense Wavelength Division Multiplex
Dense wavelength division multiplexing (DWDM) the (Wi-Fi 6) is a technology that integrates
or multiplexes signals from different sources to share a single optical fibre channel but maintains
a complete separation between the data streams. The Wi-Fi 6, that is also referred to as 802.11ax
has over 80 separate light wavelengths that carry signals. This is an upgrade of the highest-speed
Wi-Fi protocol widely used the world over. This technology provides a great improvement in
network efficiency across Wi-Fi brands including the brands that are older than 2.4GHz
frequencies (Bradley, 2017b; www.wi-fi.org). The main advantage of using Wi-Fi 6 technology
is that it increases the device density that co-exists within a single space with a corresponding
increase in the speed of all devices when there is more than one device in use (Zhong, 2012).
This device (Wi-Fi 6), a 5G is rolled out this year (2019) (www.wi-fi.org).
2.4.2 Digitized spaces
Digitized spaces is another technology that forms part of new resolutions that adopts geo-
location technology that entirely depends on wireless radios found in mobile devices, and data
mining software aimed at creating opportunities that enhance the understanding of the
coexistence between people and things (Mathy and Frank, 2017). This technology allows any
business organization to not only the available space they use online but also when and the
specific client/ customer who used that space. It enhances tracking of events that take place
within an organization at any instances (Karanvir, & Er, 2015).
CURRENT WIRED/WIRELESS INFRASTRUCTURE 20
However, in our situation adopting digitized space technology for Modern Mouldings Company
would enable the network administrator to identify areas that experience weak wireless signals
and thus allows for the deployment of new and highly precise access ports. Security wise, this
technology enables notification of unusual access points and patterns with ease along with
wireless networks that indicate physical breaches (Bradley, 2017b).
2.4.3 Machine learning
Machine learning is another technology that has more effective networking insight for better
work management in an organization. It enhances the adoption of quickly-changing conditions
that varies uniquely with every network (microsoft.com). In a nutshell, this technology enables
individuals to understand the health patterns that could be used to identify network failures
cognizant of the requisite skills that enhance effective production in an industrial environment
(Zhong, 2012). Companies that adopt artificial intelligence inclusive of machine learning are
able to get ahead in optimizing performance and ensuring that there is a secure network system
in place through spotting anomalies that would otherwise be missed (Stefan & Vladimir, 2012).
2.5 Real Throughput Explanation
The term link throughput, as used in wireless networks refers to the rate at which data packets
are transmitted between a wireless client and wireless router. This takes place between the
transmission control protocol/user datagram protocols (TCP & UDP) layer. For example, taking
a link rate of 300 Mbps, the corresponding TCP/UDP layer speed would be between 50 to
90Mbps (Stefan & Vladimir, 2012).
CURRENT WIRED/WIRELESS INFRASTRUCTURE 21
2.5.1 Reason One
One reason for the existing low rate of data packet transfer is the varying processing powers of
the physical hardware used in setting up a network system, for example cables, routers, and the
device microprocessor speed. The lower the hardware processing speed the fewer the number of
packets that would be transmitted.
2.5.2 Reason Two
The other reason that is likely to affect the rate of data transfer is network congestion and as well
packet losses. Network congestion does not only reduce the rate of data packet transfer but it also
lead to partial of complete loss of data packets. At time, a system would discard data packets due
to poor routing and/or mismatch of destination IP addresses.
Task 3:
Part 3.1 Proposed Connection
Before connecting the warehouse with the main site, it is a reality that one has to consider the
wired network data transfer rate since it is the backbone of the wireless network that is supposed
to serve the warehouse (Bradley, 2017b). An ambiguity edge router would be used to connect a
switch with many ports. A router should be placed within every 40 meters on both sides of the
building to enhance the signal strength until you reach the warehouse. This would enable faster
data transfer between the warehouse, company generally and the global network (infotel-
systems.com).
However, it is important to have both employees and guest connections so that every person who
has to access the network from the warehouse has to be authorized in one way or the other. This
approach enhances the utilization of quality network services due to full coverage leading to lots
CURRENT WIRED/WIRELESS INFRASTRUCTURE 22
of traffic. The routers should be placed half the wall since they would not be permanently fixed.
One or more would be either replaced or reset at one point in time. Servicing would also be done,
hence the router should be mounted at a point that could be accessed with ease when need be
(Bradley, 2017b).
3.2 Security Risks
3.2.1 Security Risk One
Theoretically, it is a reality that wireless LANs are less secure as compared to wired LANs since
wireless communication signals are often roaming and could be easily compromised or
intercepted. Such weaknesses are proved to be more theoretical than practical.
Wired Equipment Privacy (WEP) is used to protect wireless network data. This is an encryption
standard that is capable of providing reasonable safety to wireless communication to the
standards of a wired network (Mathy and Frank, 2017). Unless the firewall is properly
configured, it is realistic that not a single computer network is secure be it wired or wireless
(Stefan & Vladimir, 2012). Unauthorized access to the network system should be controlled in
order to reduce the dangers of spoof emails and other forms of spyware.
3.2.2 Security Risk Two
Hacking is another great concern that Modern Mouldings Company should avoid at all costs.
Company and employee data should be encrypted, the network administrator should at all times
monitor the system logs and ensure that no intrusion is allowed (Prof. Vilas, Sunil, & Swati,
2014). In wireless networks, knowledge of the range at which the wireless network could be
accessed and adopting appropriate software system to grant access to only authorized persons,
CURRENT WIRED/WIRELESS INFRASTRUCTURE 23
and from registered computers, tablets and smartphones is an important consideration to data
protection and system integrity (Mathy and Frank, 2017).
3.2.3 Security Risk Three
Attack by harmful programs like Trojan horse, Denial of service (DOS), E-mail borne viruses,
and packet sniffing. In order to avoid such attach, one should not run servers at a level too close
to capacity, use packet filtering, and also keeping up-to-date on security-related patches. In
addition, having updated antivirus software is important in reducing cyber-attack to grant both
wired and wireless network system flawless functionality (Bradley, 2017b).
3.2.4 Integrity Protection
Data integrity and confidentiality could only be achieved through adopting proper security
mechanisms and avert probable network system intrusion. In so doing the organization has to
ensure that staff is well trained to be able to handle their login details as secrets that could be
used by malicious persons to compromise the company network system (Sachi & Vibhore,
2013). Information communication technology is ranked among the sectors that exhibit
continuous change, the network system administrator should be at par with the latest technology
so that the organization would organize for on-job training for employees should there be a
change in approach to tackling existing security challenges (Zhong, 2012).
Since network security is among the global threats, it is important to adopt realistic approaches to
enhance data security and integrity (Dan, 2008). As such, network system user information like
username and passwords should always be used for authentication so that every log details of the
persons accessing the system would be kept (Sachi & Vibhore, 2013). Another fact is the
creation of an access control list. This is a digitized list of authorized persons to access distinct
CURRENT WIRED/WIRELESS INFRASTRUCTURE 24
networks at specific nodes. This approach is effective in determining the level of system
intrusion since it captures all details of the culprits, a fact that is considered effective in reducing
intrusion rate since it leaves no stone unturned in case of network security audits (infotel-
systems.com).
3.3 Internet Access
In every country irrespective of the requirements for production and service delivery, internet
service providers have the sole responsibility to provide organizations with required network
services so that they could be able to not only access, use and participate in their routine areas of
work, but also transit network, provides domain registration, UseNet services, networking and
colocation (Bradley, 2017b). In Modern Mouldings Company, the internet service providers have
the responsibility to monitor the existing system and avail the requisite information for approval
before being awarded tenders.
In conclusion, counteracting the network related problems that Modern Mouldings Company
experience in association with wired/wireless IP transmission, there are a series of solutions
would be adopted. For example, data classification and corresponding scheduling schemes
within data link layer so that effects of delay could be reduced leading to good quality of service
(QoS). Maximizing channel data rate utilization through packet header compression, improving
IP transmission quality through adaptive header correction methods. Management of complex
networks require linking quality reports and observation of system operations within terms of
reference agreed during acquisition and installation of the network. Some algorithms are already
implemented in respective network devices like router and radios, scheduling should be properly
classified in order to solve arising problems related to network and link design.
CURRENT WIRED/WIRELESS INFRASTRUCTURE 25
References
Bradley, M. (2017a). What Hardware Is Required to Build a Wireless Network? WWW
document. Available at: https://www.lifewire.com/required-to-build-wireless-networks-
816542 [Accessed 01 May, 2019].
Bradley, M. (2017b). Wireless Standards 802.11a, 802.11b/g/n, and 802.11ac. WWW document.
Available at: https://www.lifewire.com/wireless-standards802-11a-802-11b-g-n-and-802-
11ac-816553[Accessed 01 May, 2019]
Dan, H. (2008). “Simultaneous Authentication of Equals: A Secure, Password-Based Key
Exchange for Mesh Networks”, 2008 Second International Conference on Sensor
Technologies and Applications.
http://compnetworking.about.com/od/wirelesssecurity/
http://www.infotel-systems.com/wireless%20networking%20outline.htm
http://www.microsoft.com/hardware/broadbandnetworking/10_concept_what_is_wireless
.mspx
http://www.wi-fi.org/OpenSection/wireless_vs_wired.asp?TID=2
IDhobale, J. V., IIDr. Kalyankar, N. V., IIIDr. Khamitkar, S. D. (2014) “Wired and Wireless
Computer Network Performance Evaluation Using OMNeT++ Simulation Environment”
International Journal of Research in Electronics and Communication Technology
(IJRECT)
Karanvir, S. M., and Er. (2015) “Comparison of WLAN with WIMAX Networks” International
Journal of Advanced Research in Computer Science and Software Engineering.
Mathy, V., and Frank, P. (2017). “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2”,
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
Security.
CURRENT WIRED/WIRELESS INFRASTRUCTURE 26
Prof. Satish, K., Shah, Ms., Sonal, J., Rane, Ms., and Dharmistha, D. V. (2012) “Performance
Evaluation of Wired and Wireless Local Area Networks” International Journal of
Engineering. Research and Development
Prof. Vilas, D., Sunil, W., and Swati, S. (2014) “Wired Equivalent Security Algorithm for
Wireless LAN” International Journal of Emerging Technology and Advanced
Engineering.
RF Wireless World. (no date). WEP vs WPA vs WPA2. WWW Document. Available at:
http://www.rfwireless-world.com/Terminology/WEP-vs-WPA-vsWPA2.html [Accessed
02 May, 2019].
Sachi, P., and Vibhore, T. (2013) “Performance Analysis of Wired and Wireless Network using
NS2 Simulator” International Journal of Computer Applications.
Stefan, P., and Vladimir, W. (2012). Wireless Mesh Networks - Efficient Link Scheduling,
Channel Assignment and Network Planning Strategies. WWW Document. Available at
:http://www.intechopen.com/books/wirelessmesh-networks-efficient-link-scheduling-
channel-assignment-and-networkplanning-strategies/channel-assignment-schemes-
optimization-for-multi-interface-wireless-mesh-networks-based-on-link-loa [Accessed 01
May, 2019].
Zhong, F. (2012). “IPv6 Stateless Address Autoconfiguration in Ad Hoc Networks” , in
book Personal Wireless Communications, Lecture Notes in Computer Science, Springer
Berlin Heidelberg, ISBN 978-3-540-3-6, pp 665-678.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.