Verified Document

Wireless Options For The Production Building Term Paper

Networking Wireless Options for the Production Building

Lake View Chemicals has made the decision to implement a new wireless networking option for their production building. The requirement to move between different locations within their building to utilize more versatile portable computers as opposed to being mired at fixed workstations is the main objective. As an IT consultant for Aspen IT Services, I feel that as Lake View Chemicals explores the use of wireless networking because of their need for staff members in the production building to be mobile, certain requirements must be met. This short report aims to meet that need but it also explains some concerns. An assessment of what the company does is essential to create a viable recommendation.

The company produces chemicals for both industrial and pharmaceutical companies. Their campus consists of three buildings, an administration building (management, financial, and sales), a research building (contains laboratories, scientists, and engineers) and the production building (used for manufacturing chemical products and for shipping). The existing network consists of a reliable twisted-pair cable setup inside each building and a secure fiber-optic cable tying the buildings together as well as the floors within the buildings. Lake View Chemicals has specialized manufacturing and chemical processes that have been patented and has an extensive research and development process in order to create new products. The company considers its existing research team to be one of the best in the industry and therefore...

There is little doubt that establishing a wireless network on the campus would not entail a great deal of physical effort. The real problem for Lake View Chemicals is that in this highly competitive globalized economy, a critical topic in the data communications and networking area has become network and data security. External competition is not the company's only concern because of the industry they are in. Terrorism has also become a major concern for companies that produce medicines and chemical compounds that could be used as weapons.
As Lake View Chemicals adds wireless technology into their infrastructure, they also need to verify that they institute reliable management capabilities into their network. "On a wired network, authentication is implicit in the connection to the network itself. Data ports on the walls almost always go to the real network infrastructure, and altering traffic as it traverses the wire is difficult. Wireless networks, however, have a very different physical topology. It is much easier to inject messages into an authentication sequence or hijack authorized sessions in the absence of strong mutual authentication and integrity checks." (Gast) Network security that incorporates the internet and internal networked environments need to solve three…

Sources used in this document:
References

Dekker, Marcel. (2009). Security of the Internet. Retrieved November 10, 2009, from http://www.cert.org/encyc_article/tocencyc.html#Overview

Gast, Matthew. (2009). Wireless LAN Security: A Short History. Retrieved November 10, 2009, from http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Networking
Words: 2156 Length: 8 Document Type: Term Paper

Wireless Network Implementation Wireless business networks allow multiple computers to share files, software applications, printers, and a single, high speed Internet connection. Several versions of wireless systems have developed since 1998, each still useful, depending on the nature of the business and its practical requirements. Home computer users embraced wireless technology from its inception, but business users have only recently begun incorporating wireless networking recently, owing to system and information security

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Wi-Fi Real-Time Location Tracking Wireless
Words: 1711 Length: 6 Document Type: Thesis

"Setting New Standards: Changes Are Coming to the World of WiFi, Where Safer and Speedier Wins the Race." The Journal (Technological Horizons in Education) 35.3 (2008): 26. Cisco Systems White Paper "Wi-Fi-Based Real-Time Location Tracking: Solutions and Technology" 2006, http://www.cisco.com/en/U.S./prod/collateral/wireless/ps5755/ps6301/ps6386/prod_white_paper0900aecd80477957.pdf Daly, Una. "The Hidden Costs of Wireless Computer Labs: Mobile Labs May Bring Us a Step Closer to One-to-One Computing, but with the Proliferation of Security Problems and Tech Support Issues,

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Document Type: Term Paper

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

It Solutions to Coach, Inc.
Words: 3831 Length: 12 Document Type: Case Study

Again, it is not simply good enough to have a policy that addresses the need for a broad, systematic outline of changes to the telecommunications network, such as is the case with Coach, Inc. But rather, it is imperative this policy address both the broad policy issues (strategies) and the daily integrations of this new policies within various aspects of the organization (tactical)(MILLER 2003). The third component of this methodology

Computer Engineering and Information Systems
Words: 854 Length: 2 Document Type: Case Study

it's the same with a Wi-Fi network, where the higher the frequency and the more data is communicated via the wave, the more the actual performance of the RF plane changes. And just like an RF plane that can take in very high frequencies of waves while others will bounce off the device or begin to have properties like light waves (meaning they refract and reverberate) the same holds

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now