StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems: Networking Fundamentals - Assignment Example

Cite this document
Summary
The assignment "Information Systems: Networking Fundamentals" focuses on the major issues in the notion of networking fundamentals. IEEE 802.15.1 Bluetooth protocol stack is based on Bluetooth technology, and it is commonly used in cases of wireless personal area networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Information Systems: Networking Fundamentals"

Information Systems: Networking Fundamentals Name Course Instructor’s Name 30th April 2010 1. Comparison of the IEEE 802.15.1 Bluetooth protocol stack to the OSI model IEEE 802.15.1 Bluetooth protocol stack is based on the Bluetooth technology, and it is commonly used in cases of wireless personal area network. Some of the features associated with this technology include low cost, short range, small networks, and communication within a radius of less than ten meters. On the other hand, OSI model defines a layered communication layer that is utilised in network protocol design especially in computers. OSI model divides the network architecture to seven distinct layers that complement each other (Cooklev, 2004). These seven layers each has specific role that ensures information and data is passed from one network link to another ensuring integrity of the entire process is championed. IEEE 802.15.1 Bluetooth protocol stack also has layers that aides the transfer of data and voice into ensuring the process of communication is fulfilled. Thus, the two technologies play a major role that is similar to some extent, which means that there are certain features that they share. OIS and IEEE 802.15.1 Bluetooth protocol stack share certain technological characteristics, especially the data link layer and physical layer of OSI model. These two layers complements with four sub-layers of IEEE 802.15.1 Bluetooth protocol stack model (Walke, Mangold & Berlemann, 2006). RF layer is associated with antenna power range; the baseband layer allows establishment of Bluetooth physical link that exists between the devices been connected – forming a piconet, the link manager allows setting up links between the Bluetooth devices in question. Other tanks that are completed by the link manager include power mode, security and connection states of devices. The Logical Link Control and Adaptation Protocol (L2CAP) provide a medium in which upper layer protocols can communicate with each other easily (Angelescu, 2009). 2. IEEE’s Project 802 The IEEE 802 is a name that is given to standards that deals with metropolitan area networks and local area networks. This means that the project considerations for those networks that vary variable size packets; this differs with other technologies such as the cell-based network in which data is transmitted uniformly in units called cells, or isochronous networks in which data is transmitted in streams (Angelescu, 2009). The number 802 originates from three next free numbers that could be assigned by IEEE; it is also associated with the first meeting, which took place in February 1980. The protocols and services that are specified in the IEEE 802 are mapped to the physical link and data link of the OSI model. Furthermore, the IEEE 802 further splits the Data Link layer into two layers that are commonly referred to as Media Access Control (MAC) and Logical Link Control (LLC). Because of its presences in the OSI model, the layers become Data Link Layer (with MAC Sub-layer and LLC Sub-layer), and the Physical Layer (Dubendorf, 2003). During the IEEE meeting, different proposals were presented in which the entire project was divided into three groups. Group IEEE 802.1 dealt with general architecture that brought into consideration bridging techniques and VLAN, the second group, IEEE 802.2 were response for Logical Link Control Protocols such as Internet Protocol, and the third group, IEEE 802.3 were responsible for the medium and physical access control requirements and are credited for producing over 30 standards. Other and newer committees that played a major role in defining networking fundamentals include IEEE 802.11 for wireless LANs (Wi-Fi) and IEEE 802.16 were responsible for Wi-Max (Walke, Mangold & Berlemann, 2006). Generally, IEEE Project 802 has played a major role in defining the way data, information is transferred between different nodes ensuring integrity, and other factors that shape the information are maintained. Differentiation and specialisation between the components of IEEE Project 802 has resulted in innovation and creativity in ensuring that the final products are optimal. 3. UWB applications UWB applications are based on the ultra wideband technology that utilises radio technologies o transfer information. Some characteristics associated with UWB include low transmission energy, difficult to intercept, high bandwidth for short ranges, multipath immunity and has numerous processing and signal generation architectures. Its advantages include high throughput capacity, low cost & low power, fading robustness, and flexibility (Cooklev, 2004). These characteristics and advantages as made this technology to be appropriate for numerous applications that includes in radar, geo-positioning and communications. The companies that utilises UWB in their daily accomplishments and provides these services to the consumers includes Zebra Enterprise Solutions (http://zes.zebra.com/about-us/index.jsp) and Staccato Communications (http://www.euwb.eu/news/staccato-and-artimi-gain-momentum-in-uwb-technology) Zebra Enterprise Solutions Target users The company provide applications that enables locating, tracking, optimising and managing assets, people, equipments and across supply chain. This means that the capability of the application includes optimising parts for manufacturing, location analysis, real time asset management e.g. fleet control. Thus, the target users mostly include business and private organisations e.g. manufacturing industries and fleet management organisations. Benefits to the users The technology is flexible in that new data and information can be added without difficulties It allows for location monitoring using numerous back ups if UBW may fail, and they include the use of GPS. It can be modelled to suite requirements for each of organisational needs that the software is supposed to be used Shortcomings Most of the applications are customised which means that it is expensive to acquire and maintain Limitations Limitations exist in case of supportive technologies and the cost of acquiring the application. Staccato Communications Who are the target users? The company produces both software and hardware that is based on UWB technology under the name Ripcord2. The technology is targeted for all CMOS solutions in a single chip, which also brings into consideration wireless USB that utilises the same technology. Generally, it means that the target market all consumers who want to utilise these devices since or any other computer peripheral. What are the benefits to the users? The wireless USB allows devices to communicate without actual physical connection Information transferred is reliable and fast It can be utilised in any equipment and may help in accomplishing daily requirements Shortcomings The productions still new in the market, hence it will take some time before people get used. Limitations Since the technology is based on a chip means that acquiring the hardware and utilising it could be expensive since it requires changes to the hardware. 4. Power over Ethernet (PoE) Power over Ethernet also referred to as PoE describes a technology that allows both electricity power and data to pass through Ethernet cabling (Froehlich, 2010). The Ethernet cable should be of CAT5 or CAT 3 for low-level power. The power can come from the Ethernet switch. Some companies and industries that produce access points that support power over Ethernet include: DWL-2200 AP High Speed Access Point – D-Link is a company that produces wireless and wired networking technologies. Advancement in technology has resulted in the company deploying a new AirPeremier 802.11g Access point that supports the requirements of PoE. The device is designed to be utilised within business-class environments that allows provision of manageable and secure ireless LAN options. Other characteristics that are associated with this technology include centralised management, high performance, security, and with an integrated PoE support. http://www.dlink.com/products/?pid=347 Cisco WAP4410N Wireless-N Access Point – The device allows for wireless technology connection and it operates efficiently as physically connected devices. This access point incorporates MIMO technology and thus extends consistency and connection’s range. Moreover, the PoE capability ensures that it can be installed in walls without electrical outlets. http://www.cisco.com/en/US/products/ps10052/index.html TPS23750 – this component supports numerous tasks and activities. It has an 802.3af PoE Interface with a side DC/DC converter control. The devices allows for converter sequencing and Internal PoE. The device can be utilised in all applications that support PoE devices that include VoIP Phones, and Wireless Access Points. http://focus.ti.com/docs/prod/folders/print/tps23750.html POE module – Silver Telecom Company has developed numerous varieties of PoE suite different requirements. It built with numerous specifics that are supported or follows the principles championed by IEEE802.3af standard, allows class programming and has built in signature recognition. The PoE modules come with different output voltage to suite different voltage requirements, thermal protection or even short circuit protection. The PoE is available in three packages, which are surface mount (SMT), dual in line (DIL), and single in line (SIL). http://www.silvertel.com/?gclid=CJCjzeWzrqECFROElAodyD4o_A ProSafe FS108P – it provides Ethernet Switching services. The device is capable of providing both data and power from a singe point of access with the help of CAT5 cable. http://www.netgear.com/Products/Switches/DesktopSwitches/FS108P.aspx Most of the Power over Ethernet devices are affordable and can be utilised easily. Moreover, most of them come with features that improve on data and power transmission. 5. Security implications of having the SSID broadcast option enabled This is a technology that is available in Wireless Access Point (WAP) and has capabilities of configurations providing an avenue for the user to either enable to disable broadcasting of the SSID. Disabling of the option adds little security measures because it prevents SSID from being broadcasted with Beacon frames and Probe Request. This makes the SSID not been a valid security tool. When the SSID is enabled in poses numerous threats and benefits to the networking (Cooklev, 2004). Enabling SSID makes computers within the signal reach to be accessed by other computers. This provision provides a means for hackers to know that a computer is near by and they could try to enter into the network (Froehlich, 2010). Moreover, the hackers know that the SSID name is usually easily to crack because it referrers to the products or names of companies that produce networking components. To reduce these risks since a user may want to use befits associated with SSID, it is prudent to ensure that the new SSID name is unique to prevent chances of eavesdropping by hackers (Dubendorf, 2003). Additionally, enabling SSID poses new problems to key management since it is a secret key and thus the network administrator will have extra tasks. This is because every user is forced to configure into the new SSID, and if the administrator looks out a person from the network, the administrator will be forced to change all SSID names. This is because the SSID names are supposed to be the same for the entire network. 6. Main drawbacks of the wired equivalent privacy (WEP) protocol Wired Equivalent Privacy (WEP) uses a shared key to provide security in a wireless environment. However, utilisation of WEP is associated with numerous threats especially in those circumstances that require high security (Cooklev, 2004). This means that in those situations that requires better security measures such as access control, authentication and virtual private networks should be utilised. The main disadvantages associated with Wired Equivalent Privacy include: The cryptography of WEP is weak. It has been shown that it is possible to discover or know the shared secret code through analysing captured traffic. In the case of provision of security to WLAN, utilisation of WEP is inadequate. In such circumstances, the technology should be supported by another technology to operate efficiently. For it to operate efficiently, it is a requirement that the WEP has been implemented on all the APs and on all clients. Else, those APs and clients that are not connected may not access available resources. It poses challenges during management – this means that t does not have mechanisms or means in which to change the shared secret. This means that changing secret key requires changing simultaneously all the clients and all APs. WEP security measure does not protect against forgery of packets It does not prevent replay attacks. This means that an attack can record and replay packets 7. Comparing the wired equivalent privacy (WEP) protocol against the Wi-Fi protected access (WPA) protocol The WPA technology (Wi-Fi Protected Access) came with the main aim of solving the challenges and shortcomings associated with WEP (Walke, Mangold & Berlemann, 2006). The WAP cryptography can be used without change of hardware in networks that originally utilised WEP cryptography. However, there is a major difference in the way the two technologies operates and provides their security requirements. Some of the similarities or differences that this technology operates in include: Personal WAP that is used for domestic or small office use authentication does not require the use of authentication server and t data cryptography key can ran up to 256 bits. On the hand, WEP requires an alphanumeric string and it is usually used to initiate the fist session with the client or AP. This is based on the fact the AP and the client both possess the key in advance, which means that WPA provides mutual authentication, and thus the key, is never transmitted in a way that hackers or eavesdroppers can capture it (Cooklev, 2004). Moreover, the reason that WPA came after the WEP is that the WPA allows for a safer and secure means and thus a more complex data encryption on the Message Integrity Check and Temporal Key Integrity Protocol (Angelescu, 2009). These two checks or protocols provide a means in which attacks of bit-flipping type are protected, a common threat that is usually associated with hashing technique. Comparing between the security features of WAP to that of WEP, four security features have been added to the WAP (Walke, Mangold & Berlemann, 2006). These features include presence of cryptographic MIC called Michael to counter forgeries, and IV sequencing technique that deals with attacker’s arsenal of replay attacks. Another unique security feature that is absent in WEP but present in WAP is the rekeying mechanism that allows provision of integrity keys and fresh encryption and thus undoes the threat tat is associated with attacks that stems form key reuse. From this analysis and numerous technologies associated with WPA, it shows that the WPA is a better security measure. Integrity and security of information and data is crucial which means that the most appropriate method should be used to protected and secure data and this technology if given to choose between WAP and WEP, the WAP is the best (Dubendorf, 2003). References Angelescu, S., 2009. CCNA Certification All-In-One for Dummies. New York: For Dummies. Cooklev, T., 2004. Wireless communication standards: a study of IEEE 802.11, 802.15, and 802.16. New York: IEEE Standards Association. Dubendorf, V., 2003. Wireless data technologies. New York: John Wiley and Sons. Froehlich, A., 2010. CCNA Voice Study Guide: Exam 640-460. New York: John Wiley and Sons. Walke, B., Mangold, S. & Berlemann, L., 2006. IEEE 802 wireless systems: protocols, multi-hop mesh/relaying, performance and spectrum coexistence. New York: John Wiley and Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Informaition Technology Example | Topics and Well Written Essays - 2429 words, n.d.)
Informaition Technology Example | Topics and Well Written Essays - 2429 words. https://studentshare.org/logic-programming/2044723-informaition-technology
(Informaition Technology Example | Topics and Well Written Essays - 2429 Words)
Informaition Technology Example | Topics and Well Written Essays - 2429 Words. https://studentshare.org/logic-programming/2044723-informaition-technology.
“Informaition Technology Example | Topics and Well Written Essays - 2429 Words”. https://studentshare.org/logic-programming/2044723-informaition-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems: Networking Fundamentals

Operating Systems and Networking

Today IT and all internet-based information systems have become very significant in promoting and expanding business operations.... The case study 'Operating Systems and networking' demonstrates that there are various functional tools or requirements that are involved in a network solution.... The use of information technology helps different forms of businesses improve the effectiveness and efficiency of business practices, managerial operations, decision making, and workgroup collaboration....
5 Pages (1250 words) Case Study

Local Area Network Design/ Network fundamental

Report on Local Area Network/Network fundamentals Name: XXXXX Professor: XXXXX Institution: XXXXX Course: XXXXX Date: XXXXX Current LAN Network problems Ageing Cabinets/ traffic issues Despite the current network being wired with the CAT 5 cabling, the current cabinets that hold the patch panels need replacement.... Incompatible systems Several departments in both companies are using different systems that are incompatible.... A good example is the accounts department which is using different payroll systems and stock control systems which are incompatible....
5 Pages (1250 words) Assignment

Computer Information Security Certification

Specialty exams are on management, procedural programming, system development, business information systems, systems programming, software engineering, database resource management and micro-computing and networks.... Certified information systems Auditor (CISA) is another security certification available for computer professionals.... CISA exams scan be taken by any person with interest in information systems audit, control and security.... It is internationally recognized as the highest level certification in technical networking....
8 Pages (2000 words) Research Paper

Networking Funamentals

In networking fundamentals, Local Area Network (LAN) may require equilibrium among LAN theory and LAN apply.... So it is critical that a networking route hit equilibrium among standard and lab carry out.... This approach gives organizations equally a fine thoughtful of the LAN protocols and the exploit of LAN in today's data networking.... This propensity also shows in data communication and networking projects in general, for instance....
14 Pages (3500 words) Essay

Multimedia Capstone Final Response

The essay "Multimedia Capstone Final Response" focuses on the critical analysis of the major issues in the student's response to the multimedia capstone.... Fundamentalism, in the sense that Gardner refers to it, manifests in a way that is similar to programming in a bio-computer.... ... ... ... The mind of the individual with the fundamental view about some aspect of reality, be it in his or her own life, the corporation, or society, is taken to be a given....
16 Pages (4000 words) Essay

Facebook and Human Resource Management

Through the years, it has developed from a simple networking site to a sophisticated digital community frequented by hundreds of millions of people interacting, sharing content and creating relationships.... It is important to highlight that Facebook is a social networking website.... A Pew Research Center study found that of those who use social networking sites, 92 percent use Facebook, followed by MySpace with a meager 29 percent (Hampton et al....
5 Pages (1250 words) Research Paper

Fundamentals of Network Security

The risk of overlooking information is minimized through the use of complex and diverse computer forensic techniques, not relying on just one of them as depicted by the article published in the Journal of information systems Security (1997).... The paper "fundamentals of Network Security" discusses that a combination approach towards computer forensics is proposed to comprehensively as well as effectively gather facts for processing of information regarding the allegation of the employee for a possible crime....
15 Pages (3750 words) Coursework

Information Security Management

This assignment "information Security Management" discusses data miners that have also had serious violations of privacy.... The law allows data mining for the sake of the collection of personal information for various uses including census, budgeting, and finance.... In view of the fact that such information does not include the patient's name, phone number, address, and social security number, the idea that a patient's privacy would be violated may seem far-fetched....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us