Preview

How to Set Up a Wi-Fi Network

Powerful Essays
Open Document
Open Document
1011 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How to Set Up a Wi-Fi Network
Wireless Network Proposal 1

Wireless Network Proposal:
The Implementation Plan

Wireless Network Proposal 2

Abstract The following paper represents my proposal to how the wireless network should be setup in the CIP room at the New Jersey Institute of Technology. Wireless network is a wonderful piece of technology that has allowed us to freely move around places without the need of being stuck in a particular area in order to use the internet. Everyday more and more consumers and businesses are switching to wireless networks. However, as good as this may sound, this isn’t just a plug and play set up we're talking here. There are a lot of security measures that must be considered when implementing a wireless network. There will be an assumption made that the budget for this network isn’t a concerned as long as the equipment being used is justified.

Wireless Network Proposal 3

The objective is to implement a wireless network in the CIP room in a clean, organized and efficient fashion. When setting up the wireless network, I must consider the following things:
What is the network being use for?
What is the most efficient spot to place the router for maximum coverage?
What type of router must I use for this network?
What security measure should I use to protect the network as much as possible?
These are the things I must consider when implementing the network. What is the network being used for? The network is being used at a school for educational purposes from IT courses ranging from wireless networks to computer security systems. The users will be doing basic stuff such as configuring networks, writing documents and using the internet. However, some capabilities must be restricted from the user. A firewall must be setup so that the users are unable to use network for things like such as torrent or downloading any unauthorized files that may slow down the network. Since this network is being used in a

You May Also Find These Documents Helpful

  • Good Essays

    For my home network, I have chosen to gravitate towards a wireless based approach for connecting my PCs, my printer and my storage. The network will be composed of 2 computers with a profile setup for 4 users to access either device; one device is a desktop and the other is a Laptop PC. The wireless aspect will also allow for easy additions of other devices such as tablets and mobile devices as well as gaming devices as the needs of my…

    • 1002 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Upgrading to an optimized WLAN architecture, using 802.11n technology, provides Highbrow Ed with a scalable, efficient, high-performing wireless network. An optimized WLAN architecture combines the advantages of central management and addresses the limitations of having a central wireless switch. Optimized WLAN consists of intelligent Access Points (Aps) and a WLAN controller. The APs forward traffic and enforce security and prioritization policies, while the WLAN controller centrally manages and controls all APs. The APs dispatch all traffic directly from source to destination without requiring a detour to the controller.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The utilization of wireless technology in the place of work, especially in government or public sectors has been escalating at a swift pace. There are a number of reasons behind this detonation. Adopting this technology at workplace enables an organization to benefit from uncountable advantages the technology encompasses. The benefits of using wireless technology in the workplace are measurable, significant, and clear (Seely and Duguid, 2000). Each and every day more and more sectors both in public and private are realizing these adorable benefits, not only for Information technology departments, but similarly for office based staff as well.…

    • 586 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    4. Provide open wireless access for the students and the local population in the areas outside of each building.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab Report

    • 502 Words
    • 3 Pages

    Provide open wireless access for the students and the local population in the areas outside of each building.…

    • 502 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    The third step is to decide upon an access point manager in which you find the access point to manage your network by ether intelligent (fat access point) this has everything you need to handle wireless clients. Then there is a thin access point, which pretty much a radio and antenna that is controlled by a switch and will save you time and money.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Infrastructure deployment scenario will allow for wireless access points (WAPs) to be connected to the existing wired network allowing employees with wireless devices the ability to access the company’s network. This is a commonly used method of enhancing an existing wired network while adding the benefit of mobility to employees and is a cost-effective way to upgrade to a wireless local area network (WLAN). On-the-go employees can potentially improve job productivity while in the Conference Center by having the ability to wirelessly access company printers, file servers, and Internet and/or Intranet without the need to plug into the company network.…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The students who need to have their own server for wireless access to limit the availability of a risk…

    • 306 Words
    • 1 Page
    Satisfactory Essays