Hailey Davidson Wireless Network Plan PDF

Title Hailey Davidson Wireless Network Plan
Course Key Concepts in Computer Science
Institution University of Windsor
Pages 4
File Size 111.7 KB
File Type PDF
Total Downloads 7
Total Views 132

Summary

Download Hailey Davidson Wireless Network Plan PDF


Description

Assignment #6: Wireless Networking COMP-1047-91 Hailey Davidson 110020650 March 11, 2020

Basic Hardware Requirements for the Network: 1. Wireless Network Adapters 2. Wireless Router and Access Points 3. Wireless Antennas 4. Wireless Repeaters Recommendation: I would recommend a wireless network compared to a wired network due to the obvious and affordable advantages. Wireless network requires absolutely not wires which reduces cost drastically. There will be no need to get contractors to wire cords through the wall due to safety hazards. As well, it promotes freedom and encourages movement within the facility while still having Wi-Fi. Overall, wireless network would be the best choice for this business. Advantages: One advantage is that it doesn’t limit the customers or employees to one area. It will promote costumers to move freely within the facility while still on Wi-Fi. This will allow the customers to participate in all the activities that the business has to offer such as the batting cages, golfing range, etc. Another advantage is that there are no cords, therefore reducing the cost and potential safety hazards such as a tripping hazard. By the company saving money due to not having to reconstruct to hide the cords and the cost of the cords as a whole, they can use this money to put more attractions in their facility. This will increase their revenues greatly while still having good Wi-Fi access for the customers and employees. Disadvantages: Some disadvantages are security problems, potentially installation problems, and maintaining good connection throughout the facility. There can be a lot of security problems if

2

there is no password for the internet. This will allow any users within the connection area to sign on and use the Wi-Fi. Secondly, if the router isn’t installed in a central area the connection can become very week at the far ends of the facility. This could cause a lot of problems with relaying information throughout the facility and as well it can interfere with the training session that the facility holds. There can also be things within the facility such as the technology used for the virtual golf simulation that can interfere with the Wi-Fi connection within that area. Diagram:

Women’s Washrooms Men’s Washrooms Office

Selling Floor

Printer

Main Hallway

Access Point

Training Class Training Class Training Class Batting Cage

3

Golf Simulation

The access point for the store will be in the middle of the main hallway of the facility. The training session rooms will be right next to the access point, giving the computers good connection so there will be no interruption during these sessions. As well, this will give relatively good internet connection throughout the facility. This as well will help the staff be able to access the network for various functions throughout the facility. Two Main Security Issues: Intruders If the internet isn’t locked with a password, anyone with in the connection area will be able to go on and use the Wi-Fi. The unauthorized users could be using this internet connection for hacking purpose or illegal activity purposes. With that being said, the illegal activity will be traced back to the facilities address and could jeopardized the company. To deal with this issue, a WPA key will be used and a strong password will be required that must contain special characters, uppercase and lowercase letters, and numbers to make sure that the network is protected and encrypted. Eavesdroppers These are people that listen to your network traffic. They are able to gain information such as addresses that allows these people to become verified users and be able to open things on your server. As well, they’ll be able to access personal information such a credit card numbers if something has been recently purchased and personal accounts such as social media accounts, etc. Media Access Control (MAC) is a mechanism to support identification and control of computers on an Internet Protocol (IP) network. To deal with this problem, a strong encryption will have to be implemented as well with the WPA key.

4...


Similar Free PDFs