Topic telecommunications and network security an evaluation


Topic: TELECOMMUNICATIONS AND NETWORK SECURITY

Question: Application Activity

Wireless LANs have essentially become the wave of the future. Wireless LANs enable users to connect to the network over a much more spread out area. This ability essentially takes a LAN and allows it to have properties of that of a wide area network (WAN). In order to standardize the flow of information on these wireless LANs, there arose a need for a communication protocol. The most prevalent and widely recognized out of these is the IEEE 802.11 standard. This communication protocol is the foundation of wireless communication. Although wireless LANs are becoming more popular as time passes, there is still a demand for the wired LAN. Essentially, each accomplishes the same task, simply through a different means.

Assume that you are an experienced network technician and have been contracted to establish a WLAN in an individual's home. The person who has hired you for this job is flexible, but has a few requirements in which you must follow. These requirements include that the network must be able to support at least five computers and two additional devices such as tablets or other wireless devices. The network should also be able to support a reliable Internet connection, streaming video, and contain adequate security features. These security features may be hardware or software, but be sure to fully explain the security plan. The report must be a minimum of 7 pages, excluding the title page, Visio diagrams, and references.

In your report, present between 2-3 options to the client for consideration. In your report, be sure to include the following:

  • A listing of the cost associated with each option presented to the user. This can be accomplished by utilizing a budget spreadsheet which outlines the cost step by step.
  • An evaluation of the pros and cons associated with each of the options presented to the user.
  • An assessment of the capabilities of each of the network configurations, to include the network's specifications and capabilities. Be sure to frame this in a way that would be easy for a non tech-savvy individual to understand.
  • A diagram created by Microsoft Visio or a subsequent visual design tool which diagrams the network to include the manner in which the network will be secured.
  • An explanation of which network configuration you feel is the most advantageous given the user's needs.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Topic telecommunications and network security an evaluation
Reference No:- TGS02328698

Expected delivery within 24 Hours