After the presentation of the project proposal to the site manager, the site manager needs to change the design or the model it can affect on the budget and the schedule prepared for the development of the project. This can be categorized under uncertain risk the project is required to be prepared to handle the risk arising during the development of the project. The project schedule is prepared with an extra duration and budget for handling the risk.
The WEP configuration is used for the user with whom the secret key cannot be shared and for faster connectivity.
WPA configuration:
The Wi-FI Protected access (WPA) configuration is shown in this section using the CLI command. It is used for proving a security and protect the network from external access. The configuration of the WPA also restricts unauthorised device to be connected with the network and thus increases the efficiency and security of the network solution.
The event log of the network can be found under the command tab of the graphical user interface of Cisco Aironet 2600. From the CLI command it can be accessed by using the “show ap CISCO_AP” command.
When the show ap command is inputted in the CLI of the router a message of 1024 line is generated that have 128 character per line which are the event log files of the system. It is necessary to file the old log events and create space for the new log files because flashing of the router deletes all the log files and the events. The backup should be kept to trace of the users and their access for future use.
The wireless standards use for the development of a wireless network are listed as follows:
Wifi (IEEE 802.11) - it is used in most of the wireless devices and this standard can be subdivided into 802.11a 802.11b, 802.11g and 802.11n. Different standards are used for different frequency and throughput.
Zigbee (IEEE 82.15.4-2006) – It is used for low cost mesh network and are used in smart grid or home networks.
The wireless radio technologies that are available for wireless communication are as follows:
- NFC (Near Field Communications)
- Wifi
- WiMAX
- Bluetooth
- Wireless Meter Bus
- DECT
- RFID (Radio Frequency Identification Technology)
- Z-Wave, etc.
The wireless roaming refers to the user when the user connects to the wireless device when moving from the range of one access point to another. The wireless device are deigned to catch the strongest wireless signal and thus when the user moves out of the range of a access point and comes in the range of another access point emitting strong signal the connection is broken and re established with the second access point. It takes about 500ms to connect with the access point and is known as the wireless roaming.
The radio frequency interface is the noise that affects the signal quality and reduces the efficiency of the network device. The noise generated from an electronic device can distort the data packets and thus the network device is required to be installed by keeping a safe distance from the electrical power source. The data packets that are transmitted in the network can get damaged due to the frequency interference and affect on the network performance.
The wireless security used for establishing a secure connection with the wireless access point is as follows:
- Wired Equivalent Privacy WEP
- WPA2 Wi-Fi protected access version 2, and
- WPA
The use of the authentication and the encryption method for connecting the user with the wireless access point increases the security of the network. The user connecting with the network has to use authentication by providing a key and thus securing the network from any external access.
The wireless LAN management tool that is required to be installed in the network for increasing the security of the current network framework is 7600 Wireless Security gateway.
The CLI command is used for by logging into the device using the telnet and entering appropriate command for configuring the device. The device can be reset by erasing all the data from the nvram and the command used for resetting is “write default-config”. The show running config can also be used for finding the configuration of the device and troubleshooting the problem in the network.
The user can enter into the GUI interface of the router by typing the IP address of the device in the web browser of the device connected with the router. The user can enter into the configuration mode to see the settings of the router and use default configuration for resetting the device. The resetting of the device or restarting the device can solve many of the network problems.
The term decibel is related with the wireless equipment and is used as a unit for the measurement of the signal strength. In physics decibel is used for measuring the intensity of sound and it is used in networking to find the loss and gain of the signal strength and can be converted into different measurement units.
The main requirement if the organization is to deploy a Cisco Aironet 2600 device in their organization and connect it with their Windows Server R2 for logging the records in the Active Directory. The software and the hardware required for the successful implementation of the wireless access point in the organizational framework are listed as follows:
- Cisco Aironet 2600 AP product which can run Cisco IOS.
- Cisco secure access control server.
- Funk steel belted RADIUS
- A RADIUS authentication server product which successfully integrates various users into the database.
- CAR or Cisco access registrar
- CA certificates for Cisco Root
- One-Time-Password or GTC required for additional services
- Wireless bridges
- Funk steel belted RADIUS
- Interlink merit
- IAS or Microsoft Internet authentication service
- Cisco Secure ACS
- Interlink Merit
- Cisco Catalyst switches
- Others additional hardware
Bibliography
Abari, O., Rahul, H., Katabi, D., & Pant, M. (2015, April). Airshare: Distributed coherent transmission made seamless. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1742-1750). IEEE.
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Coronel, C. & Morris, S., 2016. Database systems: design, implementation, and management. Cengage Learning.
Coskun, S., Ozgur, L., Polat, O., & Gungor, A. (2016). A model proposal for green supply chain network design based on consumer segmentation. Journal of Cleaner Production, 110, 149-157.
Dennis, A., Wixom, B.H. & Tegarden, D., 2015. Systems analysis & design: An object-oriented approach with UML. John Wiley & Sons.
Edwards, J.A. & Lampert, M.D., 2014. Talking data: Transcription and coding in discourse research. Psychology Press.
Farahani, R. Z., Miandoabchi, E., Szeto, W. Y., & Rashidi, H. (2013). A review of urban transportation network design problems. European Journal of Operational Research, 229(2), 281-302.
Geib, R., & Black, D. (2017). Diffserv-interconnection classes and practice.
Herdrich, A., Verplanke, E., Autee, P., Illikkal, R., Gianos, C., Singhal, R., & Iyer, R. (2016, March). Cache QoS: From concept to reality in the Intel® Xeon® processor E5-2600 v3 product family. In High Performance Computer Architecture (HPCA), 2016 IEEE International Symposium on (pp. 657-668). IEEE.
Jang, J. Y., & Kim, N. W. (2014). The case study for Implementation and verification of Network based on VLSM. The Journal of the Korea institute of electronic communication sciences, 9(11), 1267-1276.
Joshi, J., Gupta, S., Gupta, P., Singh, N., & Kumari, M. (2013). Multi Protocol Label Switching with Quality of Service in High Speed Computer Network. International Journal Of Engineering And Innovative Technology (IJESIT), 2(2).
Khalili, N.R. & Duecker, S., 2013. Application of multi-criteria decision analysis in design of sustainable environmental management system framework. Journal of Cleaner Production, 47, pp.188-198.
Kousias, K., Katsalis, K., Stavropoulos, D., Korakis, T., & Tassiulas, L. (2016, April). Building virtual 802.11 testbeds towards open 5G experimentation. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE (pp. 1-7). IEEE.
Landis, J. R., Williams, D. A., Lucia, M. S., Clauw, D. J., Naliboff, B. D., Robinson, N. A., ... & Mayer, E. A. (2014). The MAPP research network: design, patient characterization and operations. BMC urology, 14(1), 58.
Liu, Y. J. (2014). Optimization of Indoor WiFi System Performance using Cognitive Radio Technique with Directional Antennas.
Moussaoui, A., Semchedine, F., & Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. Journal of Network and Computer Applications, 39, 117-125.
QoS, H. (2016). Internet Technology. Traffic, 352.
Reijers, H. A., Mendling, J., & Recker, J 2015. Business process quality management. In H&book on Business Process Management 1 (pp. 167-185). Springer Berlin Heidelberg.
Robinson, S. 2014. Simulation: the practice of model development & use. Palgrave Macmillan.
Romiszowski, A.J., 2016. Designing instructional systems: Decision making in course planning & curriculum design. Routledge.
Roy, A., Lindem, A., & Mirtorabi, S. (2014). OSPF Transport Instance Extensions.
Sifers, E., Jansone, A., & Lauris, K. (2016). Optimization of University Campus Wireless Network. Baltic Journal of Modern Computing, 4(3), 496.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Souza, V. (2014). U.S. Patent No. 8,655,988. Washington, DC: U.S. Patent and Trademark Office.
Tayal, S.P., 2013. Engineering design process. International Journal of Computer Science and Communication Engineering, pp.1-5.
Valacich, J.S., George, J.F. & Hoffer, J.A., 2015. Essentials of systems analysis & design. Pearson Education.
Vujcik, M. (2013, October). Experience with implementing the Netacad program into a Secondary school educational plan. In Emerging eLearning Technologies and Applications (ICETA), 2013 IEEE 11th International Conference on (pp. 411-414). IEEE.
Waddell, J., Spalding, K., Canizares, G., Navarro, J., Connell, M., Jancar, S., ... & Victor, C 2015. Integrating a career planning and development program into the baccalaureate nursing curriculum: Part I. Impact on students’ career resilience. International journal of nursing education scholarship, vol. 12 no.1, pp.163-173.
Wasson, C.S., 2015. System Engineering Analysis, Design, & Development: Concepts, Principles, & Practices. John Wiley & Sons.
Yue, D., Tian, E. & Han, Q.L., 2013. A delay system method for designing event-triggered controllers of networked control systems. IEEE Transactions on Automatic Control, vol. 58 no. 2, pp.475-481.
Zhang, H., Chen, S., Wang, Q., & Liu, J. (2016). A Congestion Control Mechanism for Streaming Media Transmission Over Wireless Environment. International Journal of Multimedia and Ubiquitous Engineering, 11(8), 257-270.
Zhu, E., Crainic, T. G., & Gendreau, M. (2014). Scheduled service network design for freight rail transportation. Operations research, 62(2), 383-400.