Network Design and Structure Dissertations

Network Design and Structure

Title: Network Design – When implementing a network in an organisation, there are some design issues that must be considered before implementation. The requirements of the network must be clearly defined and all the network components to be used have to be clearly defined. Some of the considerations are discussed below.

Network Design and Network Architecture

Network architecture is the infrastructure consisting of software, transmission equipment, and communication protocols define the structural and logical layout of a computer network. The mode of transmission of a network can be wired or wireless depending on the requirements in an organisation. There are various types of networks that can be applied in an organisation depending on the network size. Local area network (LAN) refers to network in a small geographical area, Metropolitan area network (MAN) refers to network in a city, and wide area network (WAN) refers to network that is spread geographically in a wide area. Among the three types of network, the company would implement LAN since it is only covering a small geographical area.

Transmission Media

The transmission medium of a network can be wired or wireless. Wired medium involve use of coaxial cables or fiber-optic cables while wireless media involves wireless transmission of data. Depending on the bandwidth, throughput and goodput we are able to determine the best medium of transmission. Fiber optic cables have low signal loss since they avoid collision, and they are efficient in data transfer in high traffic networks. Coaxial cables are less expensive compared with fiber optic cables, but they have high signal loss caused by collisions. Wireless transmission is efficient in local area network where there are few computers.

Network Design Management Method

The management method of a network can be either peer to peer or client-server. Peer to peer is where there is communication between several computers without a central computer. Client-server is where each client is independent and a central server provides services to the clients. In a peer to peer network, many computers can share a single application installed in one computer. In a client-server, they are designed to support large number of clients where the clients do not share resources. The client-server model security is enhanced because security is handled by the server. It is also easy to upgrade a client server model to meet new requirements in an organisation.

Figure 1, a client server model

 

Network Design
Network Design

Network Topology

Network topology is divided into physical and logical topology. Physical topology refers to the way in which computers and other devices are connected. Logical topology describes the layout of data transmission in a network. Bus, ring, star and mesh topologies are the main types of topologies. Bus topology is a where all devices are connected with a single cable. The topology works for small networks, but it is slow and collisions are common. Ring topology is where the cable runs around where each node is connected to each other. There are fewer collisions compared with a bus topology. A token ring is used to avoid collision. In a star topology, all the devices are connected to a central hub. There is a central management making it is faster in upgrading, but failure of the central hub brings down the entire network. Mesh topology connects all the devices to each other for fault tolerance and redundancy to improve performance.

Network Design Security Requirements

Networks are frequently attacked by hackers and other malicious people. This makes security one of the key considerations when designing a network. To reduce the number of attacks on computer networks, the network should have firewalls, intrusion detection systems, VPN, and DMZ. These measures reduce the threat and detect malicious people in the network.

Scalability

This refers to the ability of the network to grow. The network should be scalable enough to cater for growth in the network infrastructure.

Network Address Translation (NAT)

This is a design consideration where many computers in a private network access the network using one public IP address. This is a measure to enhance security in a network.

Figure 2, Network architecture

Network Architecture Dissertation
Network Architecture

Figure 3, Showing how VPN is implemented

VPN Implementation
VPN Implementation

OSI Reference Model in Network Design

The OSI model has seven layers as highlighted in the diagram. The communication system is sub-dived into layers where each layer sends service requests to the layer below it and receives service requests from the layer above it (FitzGerald & Dennis, 2009).

OSI Model
OSI Model

Layer 1: Physical Layer

Physical layer refers to the hardware and all network devices used in the network. The layer defines the physical devices and the transmission medium. The layer receives service requests of the data-link layer and performs encoding and decoding of data in signals. Protocols in this layer include CSMA/CD, and Ethernet (Liu, 2009).

Layer 2: Data-Link Layer

Data-link layer receives service requests of the network layer and sends service requests to the physical layer. The main function of the data-link layer is to provide reliable delivery of data across networks. Other functions performed by the layer include framing, flow and error control, and error detection and correction. There are two sub layers of the data-link layer; media access control layer, and logical link control layer. Media access control performs frame parsing, data encapsulation and frame assembly. Logical link control is responsible for error checking, flow control and packet synchronisation. Protocols in this layer include; X 25, frame relay and ATM.

Layer 3: Network Layer

Network layer is responsible for managing all the network connections, network congestions, and packet routing between a source and destination. The layer receives service requests of the transport layer and sends service requests to the data-link layer. The main protocols in this layer are IP, ICMP, and IGMP.

Layer 4: Transport Layer

The main purpose of this layer is to provide reliable data delivery which is error free by performing error detection and correction. The layer ensures that there is no loss of data, and data is received as it was sent. The layer provides either connection-less or connection oriented service. There are two protocols in this layer: UDP and TCP.

TCP

  • Sequenced
  • Connection oriented
  • Reliable delivery
  • Acknowledgements and windowing flow control

UDP

  • No sequencing
  • Connection-less
  • No reliable delivery
  • No acknowledgements and no windowing flow control

Layer 5: Session Layer

The main purpose of this layer is to establish and terminate sessions. The layer sets up and terminates connection between two or more processes. It also manages communication between hosts. If there is login or password validation, this layer is responsible for the validation process. Check-pointing mechanism is also provided by this layer. If an error occurs, re-transmission of data occurs from the last check-point. Protocols in this layer include; RIP, SOCKS, and SAP.

Layer 6: Presentation Layer

This layer is responsible for data manipulation, data compression and decompression, and manages how data is presented. The layer receives service requests of the application layer and sends service requests to the session layer. The layer is concerned with the syntax and semantics of the data in transmission. Data encryption and decryption (cryptography) is used to provide security in this layer. Protocols involved in this layer include; ASCII, EBCDIC, MIDI, MPEG, and JPEG.

Layer 7: Application Layer

This layer provides interaction with the end user and provides services such as file and email transfers. The layer sends service requests to the presentation layer. It has several protocols used in communication; FTP, HTTP, SMTP, DNS, TFTP, NFS, and TELNET.

Network Protocols

  • Ethernet – provides transfer of information on Ethernet cable between physical locations
  • Serial Line Internet Protocol (SLIP) – used for data encapsulation in serial lines.
  • Point to point protocol (PPP) – this is an improvement of SLIP, performs data encapsulation of serial lines.
  • Internet Protocol (IP) – provides routing, fragmentation and assembly of packets.
  • Internet Control Management protocol (ICMP) – help manage errors while sending packets and data between computers.
  • Address resolution protocol (ARP) – provides a physical address given an IP address.
  • Transport control protocol (TCP) – provides connection oriented and reliable delivery of packets.
  • User datagram protocol (UDP) – provides connection-less oriented service and unreliable delivery of packets.
  • Domain name service (DNS) – provides a domain name related to a given IP address.
  • Dynamic host configuration protocol (DHCP) – used in the management and control of IP addresses in a given network.
  • Internet group management protocol (IGMP) – support multi-casting.
  • Simple network management protocol (SNMP) – manages all network elements based on data sent and received.
  • Routing information protocol (RIP) – routers use RIP to exchange routing information in an internetwork.
  • File transfer protocol (FTP) – standard protocol for transferring files between hosts over a TCP based network.
  • Simple mail transfer protocol (SMTP) – standard protocol for transferring mails between two servers.
  • Hypertext transfer protocol (HTTP) – standard protocol for transferring documents over the World Wide Web.
  • Telnet – a protocol for accessing remote computers.

Figure 5 shows the TCP/IP architecture

TCP/IP Architecture
TCP/IP Architecture

Layer 1: Network Access Layer

This layer is responsible for placing TCP/IP packet into the medium and receiving the packets off the medium. This layer control hardware and network devices used in the network. Network access layer combines the physical and data-link layer of the OSI model.

Layer 2: Internet Layer

It functions as the network layer in the OSI model. The layer performs routing, addressing and packet addressing in the network (Donahoo & Calvert, 2009).

Layer 3: Transport Layer

The layer has the same functions as the transport layer in the OSI model. The main function of this layer is to provide reliable data delivery which is error free. The layer receives service requests of the application layer and sends service requests to the internet layer.

Layer 4: Application Layer

This is the layer that has applications that perform functions to the user. It combines the application, presentation and session layers of the OSI model.

TCP/IP Commands Used To Troubleshoot Network Problems

There are many TCP/IP commands that can be used to show that there is a break in communication. The commands are: PING, TRACERT, ARP, IPCONFIG, NETSTAT, ROUTE, HOSTNAME, NBSTAT, and NETSH.

Hostname is used to display and show the host name of the computer

Arp is used for editing and viewing of ARP cache.

Ping is used to send ICMP echo to test the reachability of a network

Event viewer shows all the records of errors and events.

References

Donahoo, M. J., & Calvert, K. L. (2009). TCP/IP sockets in C: Practical guide for programmers. Amsterdam: Morgan Kaufmann.

Fall, K. R., & Stevens, W. R. (2012). TCP/IP illustrated. Upper Saddle River, NJ: Addison-Wesley.

FitzGerald, J., & Dennis, A. (2009). Business Data Communications and Network Design. Hoboken, NJ: John Wiley.

Leiden, C., & Wilensky, M. (2009). TCP – IP. Hoboken: For Dummies

Liu, D. (2009). Next generation SSH2 Network Design and Implementation: Securing data in motion. Burlington, MA: Syngress Pub.

Odom, W. (2004). Computer networking first-step. Indianapolis, Ind: Cisco.

Ouellet, E., Padjen, R., Pfund, A., Fuller, R., & Blankenship, T. (2002). Building a Cisco Wireless LAN and Network Design.   Rockland, MA: Syngress Pub.

View More Computing Dissertations Here

If you enjoyed reading this post on Network Design and Structure, I would be very grateful if you could help spread this knowledge by emailing this post to a friend, or sharing it on Twitter or Facebook. Thank you.

Wireless Security Dissertation

Wireless Security

The technology of Wireless Security Networking is one of the most common networking and accessible technology but still the security problems are of great interest of this type of technology. This research paper will prospect the wireless networking and its security as well as will focus on the companies which are involved in this technology and future prospects for this technology.

These days’ computer clients are more fascinated in attaining the Internet wirelessly because of its accessibility and mobility. These days, business travelers prefer and utilize the wireless laptops to keep in contact with the office, home, and friends. A wireless network can unites or connect the computers at various places of your business and home without any involvement of any cords and permit you to work anywhere within the range of network on laptop (Bulk, 2006).

The wireless networks are established on the basis of IEEE criteria and standards which belong to 802 family which contains (802.3) Ethernet that is largely utilized today in offices and homes. Even though the growth and development of the 802.11 standards and technology have been in progress since the late 1990s, basic acceptance of “wireless Ethernet” only originated in year 2000-2001 when (AP) or access point devices turned cheap enough for the home user. (Bulk, 2006) The following items simply provide an overview of the 802.11 family which includes: 1-802.11b (a)- Most widespread (b)- 11Mb maximum, 2.4 GHZ band, 2- 802.11 (a)- Next generation (b)- 54MB maximum, 3- 5GHZ band 3- 802.11g (a)- 54MB maximum, 2.4 GHZ band (b)- Compatible with 802.11b 4- 802.11X (a) Uses Extensible Authentication Protocol (EAP) (b) Supports RADIUS 5- 802.11i (a) TKIP (b) Draft (Bulk, 2006).

The disadvantage of a wireless network is that, except someone takes positive protections, any individual with a wireless laptop or computer can access your network. That means that hacker can attain the personal data and information on your laptop or computer. And if an unaccredited person utilizes your network to commend a crime or transmit spam, the action will be traced on your account. The 802.11 authoritative standard is, in its functioning principles, not that practically different from the Ethernet. It employs a conventional “one can speak, others hear” media access control strategy; the simple difference is that instead of wires, the carrier of the signals are assigned radio frequency. In year 2004, (ISRC) or Information Security Research Center of Queensland University declared that any 802.11 network installed in any business environment could be halt in few seconds simply by transmitting a signal that hinders the other users or parties from trying to talk. On the other hand, same is true for Ethernet; apart from that you must be able to join with the network plug at first, which certainly makes the attacker much easy to trace the trouble in order to solve it (Nichols, & Lekkas, 2006).

That’s not the place where problem terminate. Where the 802.11 standard tried to prevent carrier-level hits, it actually failed dejectedly. The (WEP) or Wired Equivalent Privacy (WEP) method was planned for wireless networks to supply a stage of security and protection against hackers on network sessions by outside members or parties, therefore offering security nearly equivalent to conventional LANs. Though, there are numerous design flaws were found in the WEP scheme in 2001 by the researchers of Zero Knowledge System and University of California, which showed the scheme hideously incompatible. Unfortunately, even by that time Wi-Fi had been deployed extensively to create compulsory adjustments hard to execute or implement (Nichols, & Lekkas, 2006).

General Wireless Security

Now the question arises why it is necessary to concentrate on the security of Wi-Fi. As we know that the general area of 802.11 network security zones are one of the leading bases for future security interests and concern: Any hacker or attacker can be laid where nobody considers him or her to be and keep well away from the network’s authorized premises. Furthermore, the other reason to concentrate on the security of Wi-Fi is its great and widespread utilization and use of 802.11 networks. In year 2006, it is reported that the quantity of shipped 802.11 enabled hardware devices were calculated to outgrow 40 million units, even the cost of these units are keep falling. After the popularity of 802.11g devices in the market, the price of the several 802.11 products dropped to the price level of 100BaseT Ethernet client cards. However, there are various speed disadvantages, but not every network requires fast speed, and in majority of the cases the implementation of wireless network is highly demanded. On the other hand, another reason to concentrate on the wireless security is the offices situated on different areas of the engaged streets, office park and highway (Nichols, & Lekkas, 2006).

 Wi-Fi security problems are addressing with 2 different troubles: Privacy and authentication. Authentication or verification guarantees that only valid clients get access to the entire network. Privacy maintains communication safe from hackers. The implementation of WPA technology properly addressed these two fundamental troubles. Although we have the much strong security technology but accidents and mishaps can occur at any time, to obtain an enjoyable and pleasant practice of Wi-Fi technology users should have sufficient knowledge of the security weaknesses and vulnerabilities, that’s the reason the Wi-Fi Associations suggests that users of wireless networks implement the similar point of care they’ve learned to employ to keep away from scams in the wired world. Moreover, end users must modify their passwords frequently, not to answer or respond the doubtful e-mails, and should look for protected and secured connections. Customers require creating various new and uncomplicated security protections. A habit like linking through a supplier or provider that employs encryption with a list of committed and trusted hotspots, using a VPN, and constantly changing and enabling security inside a home network. Furthermore, customer should make it a point to prefer those products that are having Wi-Fi certification for the utilization of WPA™ (Wi-Fi Protected Access) or WPA2™ security (Nichols, & Lekkas, 2006).

As far as technology is concerned, WEP or Wired Equivalent Privacy is a protocol that supplies security to (WLANs) or wireless local area networks based on the 802.11  Wi-Fi regulations. Moreover, WEP is a (layer 2) or OSI, Data Link Layer security technology that can be switched “on” or “off.” This technology is configured to offer wireless networks the equal level of privacy security as a comparable wired network. Moreover, WEP technology is based on the security scheme known as RC4 that utilize an assemblage of system generated values and secret user keys. The primary enforcements of WEP supported so-called 40-bit encryption, containing a key of 40 bits and 24 extra bits of system produced data. Research has revealed that it is very much easier to decode the 40-bit WEP encryption, and as a result product vendors nowadays use 128-bit encryption or better 256-bit (Hardnono, & Dondeti, 2008).

When communicating through wire, WEP utilize keys in order to encrypt the data stream. The keys generally are not sent on the network rather they stored in the windows registry or on the wireless adapter. Despite of how it is configured on a wireless LAN, WEP just signifies only one aspect of an overall WLAN security scheme. The standard of 802.11 explains the communication that takes place within wireless local area networks (LANs). The (WEP) algorithm is utilized to defend wireless communication from hackers. A secondary purpose of WEP is to stop the illegal approach to a wireless network. WEP depends on a confidential key that is distributed between the access point and the mobile station. The secret key is generally used in order to encrypt the packets before they are transmitted, and integrity verification is used to make sure that packets are not customized during transmission. Another WEP technology offered by the Agere Systems is known as WEP+, which enhances the security by neglecting “weak IVs”. The WEP+ provides its maximum excellence when it is used at both ends of the wireless connection, as this can’t easily be enforced, however, possibilities are always there that possible attack against WEP+ will finally be found (Hardnono, & Dondeti, 2008).

Moreover, Wi-Fi protected access or WPA is another security technology for  Wi-Fi networks. WPA technology improves the encryption and authentication feature of WEP. Actually, WPA was developed in response to the deficiencies of WEP by the networking industry. On the other hand, the technology used behind the WPA technology is the utilization of the (TKIP) or Temporal Key Integrity Protocol as this protocol deals with the encryption weaknesses of WEP. Another advantage of the WPA technology is the built-in or default authentication that is not offered by the WEP technology. Furthermore, another variation of the WPA technology is termed as WPA-PSK or WPA Pre Shared Key, is a simple but still strongest structure of WPA most appropriate for business and home Wi-Fi networking (Hardnono, & Dondeti, 2008).

There is another form of WPA technology which is more advanced and safe and is known as WPA2. This technology provides both data integrity and confidentiality. It is observed that WPA2 provides more security to the wireless network. However, WPA2 can’t offer enterprise security alone. Generally IEEE 802.IX port-based protocol is combined with the WPA2 which provides maximum security and guarantees the secure wireless communication. The technology of WPA is utilized with the TKIP protocol, which further utilizes the RC4 cipher, and it can be executed in software having driver or firmware update. WPA supplies integrity checking using MIC, occasionally termed as “Michael. Meanwhile, WPA2, utilizes a new encryption technique known as CCMP or (Counter-Mode with CBC-MAC Protocol), which is stronger than the RC4 (Hardnono, & Dondeti, 2008).

As far as the future of wireless security is concerned the new 802.11 standards simplify this challenge? However time will tells the best. Moreover, the 802.11i standard is the latest wireless security standard designed to put back WEP and give much effective wireless security. 802.11i was believed to be launched together with the 802.11g, however, as we know that we are not living in the perfect world. (WPA) or Wireless Protected Access Alliance certification version 1 executed various features of current 802.11i development, although, not all products of 802.11 which are sold in market having WPA certification. In the current scenario there are currently many 802.11g networks arranged that are still using non-secure and old versions of WEP (Guna, 2009).

In the coming future it is expected that the next Wi-Fi speed standard, 802.11n, will considerably provide a bandwidth of maximum 108Mbps. Moreover, this 108Mbps will become the industry standard. The latest specifications will be launched at least 1 year before by the IEEE. However, draft-based devices and products could come up with compatibility troubles in case if the authorized standard varied from the draft version. Therefore, it’s much better to stay and wait for the ratified standard before building network over non-authorized gears (Tynan, 2004).

On the other side, in coming future, the possible changes regarding Wi-Fi include the methods and procedures to make this technology more and more dependable and secure. Within a year or two the standard of 802.11i standard will be finalized, which will greatly enhance the security level. Moreover, in future in order to handle the data encryption the majority of the 802.11 i-compliant will need the separate co-processors, which indicates that current Wi-Fi devices and equipment will be replaced to achieve the maximum security (Tynan, 2004).

Wireless Security
Wireless Security

Lastly, in the coming future another advanced standard 802.11e will be largely employed for the special tasks. 802.11e will address the issues of quality services and the delivery of data packets on time. This standard is very much important for certain streaming applications like videoconferencing, and its importance is really vital as business more toward utilizing Voice Over IP on their wireless networks. Some companies have already launched 802.11e standard for some of their products like Broadcom (Tynan, 2004).

These days there are several companies around the globe, which are providing wireless security but when the question arises regarding pioneers the name which strikes first to the mind is “Broadcom.” This company is providing network solution and recently “Broadcom” has declared that the (WAPI) security standards required for all WLAN devices which are sold in China. Moreover, this company declares that it is in the list of companies who first made WLAN chips to present WAPI-enabled assistance designed for mobile devices and wireless routers, including In Concert BCM4325 that joins WLAN, FM technologies and Bluetooth “CBR, 2009).

It is mentioned by the Broadcom, that all the chips control its digital architecture and radio to supply the wireless connectivity in order to share support triple play service and broadband connectivity. According to the Michael Hurlston, general manager as well as vice president of Broadcom, said: “We are delighted to maintain the WAPI standard being a leader in the field of WLAN we are confident and feel proud to be a pioneer of the rapidly increasing wireless communications.” Furthermore, Broadcom, is making effort to promote the global standards for the wireless communication (“Broadcom”, 2003).

The fairly new solution offers an entirely new system to protect the wireless networks against the threats of real world by launching active wireless methods of testing, which are able to evaluate the daily deployed wireless access points. By this approach, the wireless Vulnerability Assessment resolution facilitates IT administrators to find vulnerabilities remotely within their wireless network and automates the authorized agreement reporting, facilitating customers to decrease the operating cost (“Computer Technology Review”, 2009).

Motorola is offering a complete and comprehensive range of WLAN infrastructure resolutions planned to enable the genuine wireless venture, despite the dimensions and size of the business. The company is offering IP or Internet Protocol coverage in outdoors and indoors simultaneously. The company’s wireless range includes mesh, enterprise WLAN, fixed broadband and Motorola solutions for AirDefense wireless security. Moreover, Motorola’s solutions decrease network maintenance and deployment costs, and guarantee the accessibility of commercial and cheap wireless connectivity. By replicating active attacks from the hacker’s viewpoint, the Motorola AirDefense wireless solutions in case of vulnerability Assessment permits the administrator proactively evaluate and assess the level of security of delicate systems over the wireless network, like cardholder data systems. Furthermore, by using the radio device of the wireless sensor to stimulate a wireless client station, the method empowers the IT administrators to perform remotely the assessment of wireless vulnerability from a hacker’s approach (Messmer, 2009).

Motorola Company is recognized around the globe for modernization in the field of communication and is generally centralized on progressing and advancing the mode of style through which world connects. From enterprise mobility, broadband communications infrastructure and public security solutions to mobile devices and high-definition video, Motorola is directing to the next phase of advancement and innovation that will enable people, governments and enterprises to be more attached and more mobile. It is reported that Motorola had sales of nearly US $30.1 billion in year 2008 (Darkreading, 2009).

The issues of spectrum pricing, data protection, and level of security are of primary concern and are having great importance for the advancement and growth of the wireless communication industry. The most important regulatory issue in field of wireless technology is associated with the security, as this issue will be face by the wireless industry over the next two decades. On the other side, the confidence level of the customer in online transactions over the wireless medium is also of great importance. Security contains not only the safety of data but also the safety from monitoring. Distaste for investigation is widely considered as the expected inhibitor of wireless network utilization (Green, 2009).

The basic issues that should be considered are: Wireless communication: as it doesn’t need physical connectivity, also having more chances to survive in case of natural disasters like floods, hurricanes, earthquakes, tornadoes and volcanoes. The other issue is Wireless transmission: as it is easier to seize and intercept than those running over wire-line or fiber connections. Though, fiber can also be intercept however, it is hard to hack it as compare to the wireless. Moreover, public is having common perception that physical connections are having more security and protection. Also, the employment of digital encryption is really helpful to protect the wireless transmission, however, the public concern regarding security and privacy are of great importance and will be addressed in the coming decades by the wireless industry (Green, 2009).

As far as the global implication of wireless security is concerned there are few steps which should be adopted for the implication of wireless security. The initial step towards successful and effective global wireless security is creating a standardized verification infrastructure. However, the user should be required to authenticate on the network. But for the global implication users cannot be enforced to organize or manage multiple user authentication, accounts, identity and passwords. Furthermore, there must be a single set of access identification which must offer for verification at any site or location. Preferably this must be the similar set of certification used to login to the user’s own-workplace. On the other hand, the network systems should be arrange to recognize realms, domain names as well as various other regional identifiers in order that verification or authentication requests can be routed to the approved set of validation servers. By implementing this principle, the user will be able to travel to any place in the world or to any enterprise location and will be granted access to most appropriate networks (Green, 2009).

The second step for the implementation of global wireless security is the change in the access method. It required that the access method should be reliable and consistent everywhere the user travels. Moreover, users don’t want to adjust or reconfigure their systems as they travel from the corporate offices to their branch offices and homes. This indicates that there is a need for the same (Service Set Identifier) or SSID, which should be installed or present everywhere with having same encryption and authentication policies. Additionally, every place must have same authentication infrastructure so that user may not feel any problem. Moreover, users are free enough to be able to start their email application at corporate office, put their laptops in a sleep mode, go home, and start their work again without any need of a separate VPN client (Green, 2009).

Conclusively, the third step is the implementation of the voice mobility. It is observed that many companies and organizations are assessing their (Vo WLAN) or Voice over  WI-FI LAN technology today with estimated wide range deployments occasionally in 00 or 0 0. One of the major outcome and benefit for this technology will be the capacity to utilize it everywhere where there is an availability or access of wireless LAN service. When users move to the remote areas or travel to the remote locations, the service of (Vo WLAN) and voice mobility usually permits their Vo-WLAN handsets to start operation in the same manner as they perform in the normal work locations. Moreover, the mobile network infrastructure must offer secure transmission of voice traffic back to the corporate telephony server, quality of service control and reliable encryption and authentication methods all over the global network (Green, 2009).

References

Broadcom, (2003) Broadcom wireless LAN solutions now Wi-Fi protected access

Bulk, Frank. (2006) The Abcs of wpa2 Wi-Fi security. Network Computing, 17(2), 65-3.

CBR, (2009) Broadcom features wapi security standard on its wireless offerings.

Computer Technology Review, (2009, August 20). Motorola debuts wireless LAN security solution for remote wireless security testing.

Cox, John. (2009) what’s next for Wi-Fi?

Darkreading, (2009) Motorola introduces wireless LAN security solution for remote wireless security testing.

Green, Jon. (2009). Building global security policy for wireless LANs.

Guna, (2009) The Future of wireless security.

Hardnono, Thomas, Dondeti and Lakshminath (2008) Security in wireless LANs and mans.      London: Artech House, Inc.

Messmer, Ellen. (2009). Motorola boosts wireless network security.

Nichols, Randall K., & Lekkas, Panos C. (2006) Wireless security: models, threats, and  solutions. Berkshire, UK: McGraw-Hill Telecom.

Tynan, Daniel. (2004) The Future of wireless.

Click Here To View More IT Dissertations