New User? Start here.
Error goes here
Hazard or OHS/WHS issue
1, 2, 3
Electrical hazards in the organza ion.
The wiring of the organization must be enclosed and protective shields should be used to cover the wires used for connection.
Violation of network cabling plan
The right cable is required to be used for interconnecting the devices.
Elimination of the risk of fire and health issues
The site is required to be kept clean and dry
(a) The project team created for the development of the project should have efficient knowledge about the development of the project. The team member should be assigned with a team leader and should have a sound knowledge about the networking and configuration of the wireless devices. The project is developed regarding implementation of Cisco Aironet 2600 in the organization for increasing the flexibility of the organization. The installation of the wireless router would help the employees to connect their wireless device in the network and thus achieving more efficiency. The project team member should analyze the requirement of the project and install the wireless access point such that it covers the office are. They must have skills and knowledge about configuring the device for increasing the security of the network. A list of the project team members is prepared with the details of their skills and knowledge that are required for the successful development of the project are as follows.
Network Engineer – Wireless network security and ethical hacking
Network Designer – Requirement assessment, Auto CAD knowledge, privacy knowledge, cyber security analysis, database and IoT device
Field Engineer – Skill for wireless deployment, Mobility solution
Support Engineer – IP routing knowledge, RFID managing and application, securing access point, Quality assurance and embedded software.
Project Manager- Good communication skill, analysis and technical knowledge
Trainer- The trainer must have good communication skill to communicate with the employees and train them to use the network and utilize its features.
Maintenance staffs- the maintenance staffs are associated with cleaning and maintaining the network connection.
System analyst- should have good knowledge about the organizational framework and the requirement of the project.
(b) The resources and the activities that are required for the implementation of the wireless device in the office are tabulated below:
Installation of Cisco Aironet 2600 in the organization
Starting the development of the project
Project planning for the installation of the wireless access point
Analyzing the organizational framework for the deployment of the device
Preparation of a network design for installation of the wireless access point
User and group creation for maintaining the Windows Active Directory
Configuration of the Windows Server R2 and analyzing the service
Configuration of the Windows Server R2 Active Directory
Configuration of the network policy of the windows server R2
Configuration of the RADIUS server port
Analyzing the Cisco Arionet 2600 Router service and requirement
Network Designer and Field Engineer
Preparation of a checklist for installation
Organizational data stored in Site Log
Verification of the power sources and voltage fluctuation in the site
Completion of the power checkup at the site
Analysis for the tools required for installation of the Access point
Arrangement of the required equipments
Analyzing the starter guide of the device required to be installed in the site
Storing the registration card of the device for getting service and warranty
Project Manager, Network engineer
Documenting the contact information for the cisco service
Verification of the serial number and the product information
Network designer and Network Engineer
Arrangement of electrical connection
Configuration of the device for enabling remote access
Configuring the device for providing service to local users and devices
Verify the distance between the access points
Completion of the sequence steps for starting the project
Network Designer and Network Engineer
Verification of the operation
Verification of the image for software
Implementation of a site log
Installation checklist copied
Network Engineer, Project Manager
Insertion of data into site log and completion of each procedure
Network Engineer, Network Designer
Installation of the hardware device
Selection of the area for the deployment of the device
Wiring for providing power to the device
Installation of rubber mounting for deployment of the router
Installation of rack for installation of the device
Installation of brackets for deployment of the device
Setting connection between the wireless access point and the router using RJ-45
Setting the modem and connecting it with the wireless access point
Deployment of the Ethernet Cable
Cleaning of the site
Setting auxiliary and console port
Setup connection with the console port
Installation of RJ-45 and auxiliary cable
Connect setup between the router and the ASCII terminal
Auxiliary port connection setup
Setting up DCE and DTE device
Setting up network connection
Setting Token ring connection
Network Designer, Network Engineer and Support engineer
Setting Serial connection
Testing of the wireless network
Testing the wireless coverage area
Acceptance or verification testing of the network
Simulation testing of the network
System analyst, Field Engineer
Maintenance of the workstation
Floor equipment inspection
Cleaning of the site after installation of the device
Providing training to the staffs
Creation of the user manual
Providing training to the staff
Trainer and Network Engineer
Project sign off
After the presentation of the project proposal to the site manager, the site manager needs to change the design or the model it can affect on the budget and the schedule prepared for the development of the project. This can be categorized under uncertain risk the project is required to be prepared to handle the risk arising during the development of the project. The project schedule is prepared with an extra duration and budget for handling the risk.
The WEP configuration is used for the user with whom the secret key cannot be shared and for faster connectivity.
The Wi-FI Protected access (WPA) configuration is shown in this section using the CLI command. It is used for proving a security and protect the network from external access. The configuration of the WPA also restricts unauthorised device to be connected with the network and thus increases the efficiency and security of the network solution.
The event log of the network can be found under the command tab of the graphical user interface of Cisco Aironet 2600. From the CLI command it can be accessed by using the “show ap CISCO_AP” command.
When the show ap command is inputted in the CLI of the router a message of 1024 line is generated that have 128 character per line which are the event log files of the system. It is necessary to file the old log events and create space for the new log files because flashing of the router deletes all the log files and the events. The backup should be kept to trace of the users and their access for future use.
The wireless standards use for the development of a wireless network are listed as follows:
Wifi (IEEE 802.11) - it is used in most of the wireless devices and this standard can be subdivided into 802.11a 802.11b, 802.11g and 802.11n. Different standards are used for different frequency and throughput.
Zigbee (IEEE 82.15.4-2006) – It is used for low cost mesh network and are used in smart grid or home networks.
The wireless radio technologies that are available for wireless communication are as follows:
The radio frequency interface is the noise that affects the signal quality and reduces the efficiency of the network device. The noise generated from an electronic device can distort the data packets and thus the network device is required to be installed by keeping a safe distance from the electrical power source. The data packets that are transmitted in the network can get damaged due to the frequency interference and affect on the network performance.
The wireless security used for establishing a secure connection with the wireless access point is as follows:
The use of the authentication and the encryption method for connecting the user with the wireless access point increases the security of the network. The user connecting with the network has to use authentication by providing a key and thus securing the network from any external access.
The wireless LAN management tool that is required to be installed in the network for increasing the security of the current network framework is 7600 Wireless Security gateway.
The CLI command is used for by logging into the device using the telnet and entering appropriate command for configuring the device. The device can be reset by erasing all the data from the nvram and the command used for resetting is “write default-config”. The show running config can also be used for finding the configuration of the device and troubleshooting the problem in the network.
The user can enter into the GUI interface of the router by typing the IP address of the device in the web browser of the device connected with the router. The user can enter into the configuration mode to see the settings of the router and use default configuration for resetting the device. The resetting of the device or restarting the device can solve many of the network problems.
The term decibel is related with the wireless equipment and is used as a unit for the measurement of the signal strength. In physics decibel is used for measuring the intensity of sound and it is used in networking to find the loss and gain of the signal strength and can be converted into different measurement units.
The main requirement if the organization is to deploy a Cisco Aironet 2600 device in their organization and connect it with their Windows Server R2 for logging the records in the Active Directory. The software and the hardware required for the successful implementation of the wireless access point in the organizational framework are listed as follows:
Abari, O., Rahul, H., Katabi, D., & Pant, M. (2015, April). Airshare: Distributed coherent transmission made seamless. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1742-1750). IEEE.
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Coronel, C. & Morris, S., 2016. Database systems: design, implementation, and management. Cengage Learning.
Coskun, S., Ozgur, L., Polat, O., & Gungor, A. (2016). A model proposal for green supply chain network design based on consumer segmentation. Journal of Cleaner Production, 110, 149-157.
Dennis, A., Wixom, B.H. & Tegarden, D., 2015. Systems analysis & design: An object-oriented approach with UML. John Wiley & Sons.
Edwards, J.A. & Lampert, M.D., 2014. Talking data: Transcription and coding in discourse research. Psychology Press.
Farahani, R. Z., Miandoabchi, E., Szeto, W. Y., & Rashidi, H. (2013). A review of urban transportation network design problems. European Journal of Operational Research, 229(2), 281-302.
Geib, R., & Black, D. (2017). Diffserv-interconnection classes and practice.
Herdrich, A., Verplanke, E., Autee, P., Illikkal, R., Gianos, C., Singhal, R., & Iyer, R. (2016, March). Cache QoS: From concept to reality in the Intel® Xeon® processor E5-2600 v3 product family. In High Performance Computer Architecture (HPCA), 2016 IEEE International Symposium on (pp. 657-668). IEEE.
Jang, J. Y., & Kim, N. W. (2014). The case study for Implementation and verification of Network based on VLSM. The Journal of the Korea institute of electronic communication sciences, 9(11), 1267-1276.
Joshi, J., Gupta, S., Gupta, P., Singh, N., & Kumari, M. (2013). Multi Protocol Label Switching with Quality of Service in High Speed Computer Network. International Journal Of Engineering And Innovative Technology (IJESIT), 2(2).
Khalili, N.R. & Duecker, S., 2013. Application of multi-criteria decision analysis in design of sustainable environmental management system framework. Journal of Cleaner Production, 47, pp.188-198.
Kousias, K., Katsalis, K., Stavropoulos, D., Korakis, T., & Tassiulas, L. (2016, April). Building virtual 802.11 testbeds towards open 5G experimentation. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE (pp. 1-7). IEEE.
Landis, J. R., Williams, D. A., Lucia, M. S., Clauw, D. J., Naliboff, B. D., Robinson, N. A., ... & Mayer, E. A. (2014). The MAPP research network: design, patient characterization and operations. BMC urology, 14(1), 58.
Liu, Y. J. (2014). Optimization of Indoor WiFi System Performance using Cognitive Radio Technique with Directional Antennas.
Moussaoui, A., Semchedine, F., & Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. Journal of Network and Computer Applications, 39, 117-125.
QoS, H. (2016). Internet Technology. Traffic, 352.
Reijers, H. A., Mendling, J., & Recker, J 2015. Business process quality management. In H&book on Business Process Management 1 (pp. 167-185). Springer Berlin Heidelberg.
Robinson, S. 2014. Simulation: the practice of model development & use. Palgrave Macmillan.
Romiszowski, A.J., 2016. Designing instructional systems: Decision making in course planning & curriculum design. Routledge.
Roy, A., Lindem, A., & Mirtorabi, S. (2014). OSPF Transport Instance Extensions.
Sifers, E., Jansone, A., & Lauris, K. (2016). Optimization of University Campus Wireless Network. Baltic Journal of Modern Computing, 4(3), 496.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Souza, V. (2014). U.S. Patent No. 8,655,988. Washington, DC: U.S. Patent and Trademark Office.
Tayal, S.P., 2013. Engineering design process. International Journal of Computer Science and Communication Engineering, pp.1-5.
Valacich, J.S., George, J.F. & Hoffer, J.A., 2015. Essentials of systems analysis & design. Pearson Education.
Vujcik, M. (2013, October). Experience with implementing the Netacad program into a Secondary school educational plan. In Emerging eLearning Technologies and Applications (ICETA), 2013 IEEE 11th International Conference on (pp. 411-414). IEEE.
Waddell, J., Spalding, K., Canizares, G., Navarro, J., Connell, M., Jancar, S., ... & Victor, C 2015. Integrating a career planning and development program into the baccalaureate nursing curriculum: Part I. Impact on students’ career resilience. International journal of nursing education scholarship, vol. 12 no.1, pp.163-173.
Wasson, C.S., 2015. System Engineering Analysis, Design, & Development: Concepts, Principles, & Practices. John Wiley & Sons.
Yue, D., Tian, E. & Han, Q.L., 2013. A delay system method for designing event-triggered controllers of networked control systems. IEEE Transactions on Automatic Control, vol. 58 no. 2, pp.475-481.
Zhang, H., Chen, S., Wang, Q., & Liu, J. (2016). A Congestion Control Mechanism for Streaming Media Transmission Over Wireless Environment. International Journal of Multimedia and Ubiquitous Engineering, 11(8), 257-270.
Zhu, E., Crainic, T. G., & Gendreau, M. (2014). Scheduled service network design for freight rail transportation. Operations research, 62(2), 383-400.
To View this & another 50000+ free samples. Please put
your valid email id.
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
Get Moneyinto Your Wallet
Total 13 pages, 1 USD Per Page
*The content must not be available online or in our existing Database to qualify as
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Data Networks And Security. Retrieved from https://myassignmenthelp.com/free-samples/kit111-data-networks-and-security/cisco-aironet.html.
"Data Networks And Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/kit111-data-networks-and-security/cisco-aironet.html.
My Assignment Help (2021) Data Networks And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/kit111-data-networks-and-security/cisco-aironet.html[Accessed 17 September 2021].
My Assignment Help. 'Data Networks And Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/kit111-data-networks-and-security/cisco-aironet.html> accessed 17 September 2021.
My Assignment Help. Data Networks And Security [Internet]. My Assignment Help. 2021 [cited 17 September 2021]. Available from: https://myassignmenthelp.com/free-samples/kit111-data-networks-and-security/cisco-aironet.html.
The respective sample has been mail to your register email id
* $5 to be used on order value more than $50. Valid for
We have sent login details on your registered email.
MyAssignmenthelp.com is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at MyAssigemnthelp.com have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.
Tata Motors is an industry which concentrates majorly in the manufacture of commercial vehicles. It is located in India and falls under the group of companies called multinationals since its operations cuts across the entire continent. It was founded in 1868. This mega-company is ranked in the fifth position globally in the manufacturing of cumbersome and medium commercial trucks. Moreover, it is pivotal to underscor...
Types of strategy employed in operations management
There are four different types of strategy employed in managing the growth and business prospects of different start ups and business organizations. The global strategy of operations management states that standardised and cost effective products are sold by an organization. The main aim of the strategy is to promote the flagship of the business through the establishment of cross...
Information and communication technology have reshaped the world into a more dynamic place where most of the current tasks are operated in a technically advanced atmosphere. The wide rate of popularity of the ICT has enabled many solutions to the societies or the organizations towards their more complex problem. This has bettered the life and eased the way of living a life. The development of ICT technology is strongly spr...
1.1 The sensitive information includes the discussion about the racial and the ethical origin, with the political issues, religious beliefs and the other preferences of the sexual standards. This works over the membership of groups or the criminal records where the law puts the special restrictions based on the information collection.
1.2 a. Collection: The Government organisation works over the collection of the personal ...
The two countries chosen for the assignment are Australia and the United States of America, both being two predominant economies of the world.
Both the USA and Australia being net importer of oils, the reduction in the global oil prices are expected to have positive implications for the country. However, the decrease in the same does effect the domestic producers adversely as they face a reduction in p...
Are you confident that you will achieve the grade? Our best Expert will help you improve your grade
PM206 Logistics And Operations Management
BUS644 Operations Management
ITC331 Ethics And Professional Practice
SIT772 Database And Information Retrieval
MBA644 Managerial Economics
HIST 158 History Of American Immigration
BUS302 Occupational Health Management
SWGS S 1251 Feminism And Social Justice
BSB61015 Advanced Diploma Of Leadership And Management
MORG4038 Management And Organisations
UPP085 Academic Numeracy
BFA714 Australian Tax Law
ZAA135 Professional Communication
BMA250 Managerial Social Responsibility
ESP318 Introduction To Research Methods
JNB159 Financial Resource Management
BAA752 Foundations Of Integrated Care
JNB330 Supply Chain Management
BEA112 Principles Of Finance
Just refer 5 friends to earn more than $2000.
After the successfull payment you will be redirected to the detail page where you can see download full answer button over blur text.You can also download from there.
Or you can also download from My Library section once you login.Click on the My Library icon
My Library page open there you can see all your purchased sample and you can download from there.
That's our welcome gift for first time visitors
It is too easy to create or access your own library, just enter your email and make your search
MyAssignmenthelp.com stores a huge
COLLECTION OF QUESTIONS AND SAMPLES, which you can refer to any time you want.
Every time you find something useful, you can save that using the bookmark tool. From the next time,
can access that from your personalized library.
With this feature, you get to create your own collection of documents. You get free
choose and bookmark any document you wish.
Accessing the collection of documents is absolutely easy. Once you bookmark a sample,
access its content with a few clicks on your mouse.
This personalized library allows you to get faster access to the necessary documents.
longer need to spend hours to locate the sample you need.
Finding a sample from a list of thousands is nothing less than spotting a needle in a
Personalizing your own library relieves you from that stress.
On APP - grab it while it lasts!
*Offer eligible for first 3 orders ordered through app!
ONLINE TO HELP YOU 24X7
OR GET MONEY BACK!
OUT OF 33845 REVIEWS
Received my assignment before my deadline request, paper was well written. Highly