This website uses cookies to ensure you have the best experience. Learn more

Implementing A New Wide Secure Wireless Network At Brigham Young University Hawaii

2628 words - 11 pages

Introduction
Brigham Young University Hawaii Campus wants to implement a campus wide secure wireless network. In their existing system there are some network security flaws such as rouge access point (Easily accessible open network), anyone can access and capture important information of users. We have been hired by the BYU-HAWAII to design and install a wireless network solution for the university.
EXISTING SYSTEM
Users-3000
User type-Students, Faculty and staff

Problems in Existing system
Open network (no authentication and authorization):easily accessible by outsider or by any guest user. Anyone can access users (students, faculty)’s important information easily. No monitoring of ...view middle of the document...

The security and privacy of students’ records is extremely important. Therefore we want to employs firewalls, data encryption and email protection as a means of protecting confidential student information.
In the proposed network two floors of each building will be connected with multi layer switch which is further connected to the access points, results to be cost effective due to use of multi layer switch instead of single switch for each floor .considering xirrus in the coming future will be even more better for the campus network as that will replace the excess access points.

The communication between the three buildings can be maintained by two methods either the leasing of Dark Fibre for Private Network from one of the ISP. This service provides optical Fibre as point to point connection between both premises but it’s not the cost effective.

Another option would be to install WiMAX Directional Antenna’s on top of both buildings giving clear Line Of Sight between them.

The line-of-sight service, where a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole, the line-of-sight connection is stronger and more stable, so it's able to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and lots more bandwidth.

Proposed design with Additional High-End Equipments

In this proposed design we have added Gateway / Access controller for centralized management control and configuration and RADIUS server for advanced security.
Also for scalability additional Access Points are installed in each floor which can be dynamically controlled from the Gateway in order to increase Network size at the time of saturation.
Access Gateway and Controller is easy to deploy and simple to administer. Access Gateway appliances can be used to manage the network for with complex design. The Access Gateway Management configures the settings such as internal network, IP address, subnet mask, default gateway IP address, and Domain Name System (DNS) address. Gateway administers can perform operations, such as the authentication, authorization, network resources, logon points, Smart-Groups, address pools, and device profiles to configure endpoint policies.
RADIUS is a client/server protocol. The RADIUS client is typically a NAS and the RADIUS server is usually a daemon process running on a UNIX or Windows NT machine. The client passes user information to designated RADIUS servers and acts on the response that is returned. RADIUS servers receive user connection requests, authenticate the user, and then return the configuration information necessary for the client to deliver service to the user. A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
Floor Design

Each Floor in BYU Hawaii campus comprises of 4 lecture rooms and 4 lab room having 60...

Find Another Essay On Implementing a New Wide Secure Wireless Network at Brigham Young University Hawaii

Functions of A Wide Area Network

2186 words - 9 pages either part of a public switched telephone network or leased line, are suitable for batch data transmission, such as non urgent order entry and point of sale transaction. Dedicated digital phone line permit uninterrupted, secure data transmission at fixed cost. Point to point WAN service providers include both local telephone companies and long distance carrier. Packet-switched network services are typically chosen by organizations which have low

The Design of a Wireless Sensor Network

740 words - 3 pages node failure detection and failure recovery. Integration of a portable GPS device can solve this issue easily but at a higher cost. 7. CONCLUSION This paper has described the design and implementation of a wireless sensor network for monitoring agricultural environment and evaluated the reactivity, robustness and longevity of the network in the field. The nodes in this system always work under different environmental conditions and it is a

Challenges facing a corporation when implementing a network

1218 words - 5 pages market are endless, the challenge is penetrating the areas where access is low.Every office whether it is large or small needs access to a wide variety of communications tools to enhance their internal business process and or to effectively service customers. One of the first considerations is how the network will be used and who will have access to it. A company needs to look at a various types of networking technologies and match them to their

Implementing a Data Warehouse in a Kar Dealer Network

1378 words - 6 pages approaches to choose from when implementing a data warehouse. The first is the top-down approach, which is the most expensive, requires that the global business needs are thoroughly analyzed so that a enterprise wide data warehouse is implemented (Goldfarelli & Rizzi, 2009). The second method, which is more universally accepted, is the less costly bottom-up approach that uses departmental facts and an incremental method of discovery to create several

A Young New Nation

1059 words - 4 pages The colonies, Indians, and slavery. All these names put together one thought, "A young new nation". The colonies were divided into three parts. The northern, middle, and southern colonies. Slavery widely existed in these colonies. Although it was extremely unreasonable in the north. The origins of the "Great Awakening", reasons for the French and Indian war, the conditions after the Treaty of Paris, and the American Revolution. These are all

Architecture and design considerations that should go into building a "secure" network

938 words - 4 pages creation of a secure network. The physical security for critical network assets must be adequate when compared to the severity of damages that a breach could cause. Integrity of construction, cypher locks, access cards, keypads, biometrics, cameras, and guards with access logs are all considerations that must be specified as appropriate for the network and the data which will be used on it. The level of clearance at the individual level should

Proposal For a New University Admissions System

2597 words - 10 pages ; especially even more when they hold personal details which may violate data protection laws if not given restricted access. Likewise such sized systems may also be victim to hacker attacks; whether through a network or perhaps the internet should the admissions system be integrated online. According to the specification the university gets a large number of applications at once. "the University is so popular that it gets 20,000 applications for

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages from unknown sources or system administrators working with operating systems who don't have the proper training. Let look at these four steps to protect your network from mobile security threats If you cannot present a true business justification, then there should be no IT support for wireless PDA's and laptops You should then treat these devices as unauthorized devices and take steps to prevent users from installing these rogue devices on

Moving Away at a Young Age

637 words - 3 pages Moving Away at a Young Age Moving far away from family and friends can be tough on a child at a young age. It has its pros and cons. One learns how to deal with moving away from the people they love and also learn how to deal with adjusting to new ways of life. Everything seems so different and at a young age one feels like they have just left the whole world behind them. That was an experience that changed my life as a person. It taught me

Gynecological Problems at a Young Age

656 words - 3 pages Gynecological problems at any age can be worry some, however, when you are a young woman, being faced with these problems can be very traumatic.When I was about fifteen years old, I would wake up during the night in excruciating pain because my stomach hurt so bad. Time after time my parents would take me to the emergency room at Fairview Hospital in Cleveland, only for doctors to conclude there was nothing wrong. After a couple of years of my

A Look At Young Goodman Brown

1004 words - 5 pages is affected by the experiences he goes through. At the beginning, Goodman is a good young man with faith in everyone's "pure intentions." He innocently believes in the good in everyone, but towards the end of the story, he's view on the world changes. He ends up having a dark perspective and finds himself unable to trust those around him. Young Goodman Brown was a sweet, innocent individual who lived his life carefree. He believed everyone was

Similar Essays

Brigham Young University And The Mountain Meadows Massacre By Juanita Brooks

1092 words - 4 pages Brigham Young University and The Mountain Meadows Massacre by Juanita Brooks The Mountain Meadows Massacre by Juanita Brooks recounts a tragic historical event in a manner that can teach important lessons. The book is well researched and well written and reflects the great historical significance of the massacre. In addition, students learn religious lessons studying the book and its subject. Although some members of the Church and a few of

Building A Secure Network Essay

906 words - 4 pages Building a Secure Network The architecture and build design of a secure network is a very intricate and detailed process. It requires a seasoned hand for the development and implementation of the network diagram. A network diagram is a graphical representation containing your backbone equipment, IP addresses, ISP, host machines, and peripherals. Mostly all network diagrams for SOHO networks are the same but may different depending upon the

A Wireless Sensor Network Essay

2321 words - 10 pages processed at the manager node. This involves huge amount of data to be travelled over network links. Processing capability of centralized node must also be strong enough to sustain such enormous fault data.The centralized approach has been considered as the common solution ,Which enables the base station with unlimited resources to execute a wide range of recovery functions in the network. but the limited hardware and software capability of a

Explaining A Wireless Connection Network Essay

870 words - 3 pages Wireless connection network is great. It allows us to check e-mail while waiting on an airplane we can simple take our simply tale a laptop outside and the afternoon and work on a bright and sunny day while enjoying the day. Unfortunately with all the benefits of having a wireless networks can sometime infuriate you at times. Disconnection can have cursing at your computer while threatening to throw it across the room into a wall it is more