Pervasive Wireless Local Area Networks and Security Research Paper

Exclusively available on IvyPanda Available only on IvyPanda

Executive summary

Currently, the majority of enterprise networks are replacing wired Ethernet with wireless local area networks. It implies that wired Ethernet will be available as an option to WLAN so it can be minimizing wireless networks. The highest growth in customer preference seen so far in the market is the combination of both pervasive wireless and wired networks – up to 40 percent according to some estimates by analysts.

We will write a custom essay on your topic a custom Research Paper on Pervasive Wireless Local Area Networks and Security
808 writers online

The major concern of these wireless LANs is the security threat whereby every person can access the data transferred using wireless LAN. This problem however has been solved with advances in wireless LAN security standards like WPA2 and wireless intrusion protection systems (Younds, 2003).

Introduction

Analysts have estimated that the number of people changing to wireless local area networks is increasing tremendously. This is because they want to reduce wires in the offices and also save companies a lot of money. The most critical issue in WLAN is dependability. When planning there must be proper coverage because poor reliability from the perspective of the user means no coverage at all (Unger, 2003).

To achieve the most reliable results, wireless service must be extended beyond what enterprise can achieve with an FMC solution that allows users to move from Wi-Fi to cellular when there is a need for Management of the WLAN, which can be complex for resource-constrained IT groups if a separate overlay WLAN scale is not used. A lot of time is used to manage infrastructure and WLAN devices. Most of the time management during operating WLAN devices is spent on managing connectivity and security of the client

Benefits of Wireless Local Area Network

Employees are more productive whether in the office or at home and it enhances comprehensive security capabilities. Managers can manage the work even when they are attending to other official matters a meeting away from the office premises.

The level of production of the company is improved. This is through innovative mobility to endpoint devices and users, providing every time network access. This streamlines business operations and improves productivity to a great deal.

It reduces the cost of operations: this is done through a combination of wireless and wired networking scalable, manageable, and low total cost of ownership. Also, reliability, level of security, and ease of deployment. It is easier to operate since most people are using mobile technology, traveling executives, wireless applications, location services, guest access among other services. This does not require IT professionals but basic computer knowledge is enough to conduct the business.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

In Enhancing collaboration; pervasive WLAN, wireless laptops, and wireless IP phones, people working on a long-term project can be relocated to different places or offices without causing any inconveniences. Once the projects are completed, the employees can return to their original locations. This indeed adds more proficiency in business processes; because of boundless opportunities that heighten efficiency which eventually saves capital among other benefits (Pacguetty, 2007).

Providing WLAN that has mission-critical reliability

There is no devastating thing like dealing with a network, which is unreliable. This is because it may cost the enterprise a lot, for instance very crucial data may be lost. Also, the wrong decision may be made from incorrect interpretation of the computer data.

To achieve reliability, plan for excellent coverage because poor consistency means no coverage at all. It is important to plan coverage for all applications and ensuring continuous service in every area of the enterprise. Some product capabilities are vital for reliability like; hardware redundancy, software inability for AP, session persistency, and dynamic configuration to eliminate network downtime. Once the network is deployed, it is essential to service the network as efficiently as possible (Bugoue, 2006).

The question most asked is whether it is safe to deploy 802.11n before ratification. The answer is yes because the solution is certified by Wi-Fi Alliance who ensures that ratified standard is backward compatible. Use of wireless Local Area Network is commonly used which has replaced wired Ethernet this is because of its advantages to both the company and the users.

Challenges during start-up of WLAN

You must be prepared for challenges, which might arise during instigation so that you can know how to deal with the same. To state but a few; since most companies are clinging to old trends for fear of change, this has reduced innovations by experts and who lack new strategies of solving the problem. Businesses are applying WLAN as an alternative use. For occasional use, especially for giving workers network access when they are in conference rooms to allow guests have internet access on premises of the company. This may reduce concentration on the network when there are visitors.

Another challenge is finding the right vendor for the equipment which can handle the work of the company effectively and offer strong security and reliability. This may result in the enterprise wasting a lot of resources and incur extra expenses, because of failure to locate the right vendor for the equipment to be used in the company. The complexity of managing mixed wireless and wired networks is another major concern and branch office support. This requires added knowledge in both disciplines and may force the company to employ different personnel.

Management of WLAN

Wireless networking is changing at a tremendous pace with once cutting-edge hardware sets becoming legacy gear. Most companies most likely those working towards all-wireless find themselves being owners of mixed vendor wireless LANs. This has made the management to be more complex. To address this management problem we apply some of the tools developed by Airwave which is a multi-vendor wireless management suite. Some of these tools are; AWMS 6.0, which manages and monitors IOS, based point-to-point bridges, Lightweight access points (LWAPP), and Aruba 802.11n access point is radius servers, a Cisco Wireless Local Area Network solution engine among other tools. You need to know who is on the network to schedule them appropriately. One of the most important features of a wireless network management system is the ability to schedule tasks (Younds, 2003).

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Since the WLAN has this feature then it has become very vital in planning a downtime, which is a critical resource. Wireless Management Suite 6.0 helps hardware functionality to go together with its hardware management capabilities. For example, if a wireless user is not able to substantiate to a secure wireless network section, first-level responders with role-appropriate AWMS access can capture symptoms and feedback with screenshots and annotations that can be integrated with systems like Remedy Service Desk (RSD) or used within AWMS. If the company is large enough wireless networks will spread out across the entire location.

Architectural Considerations

Architecture can be defined as a structure of apparatus or concepts that direct an underlying plan. So the architecture of a wireless LAN must be able to meet a set goal for an organization. It should be noted that architecture should act as a guide, not as a blueprint. When designing your architecture of WLAN, the definition of your plan should identify the scope of your performance. A successful architecture relies on business considerations. When designing structural design, focus mainly on two separate technological requirements: business requirements and user requirements.

To shore up the business, the wireless local area network architecture should support the generation of a grid constructive assessment in the type of premeditated, outfitted, or hi-tech payback. To support the user the architecture should take into account parameters like expediency, admittance, accessibility, and support.

When the wireless local area network is complex in its use; it is subject to poor coverage of the time. Little user support hence user-unfriendly. This will make the network less popular and few people will be willing to use it with low investments. To avoid this and make it customer-friendly there is a need to come up with a correct architectural design.

Components for an Effective WLAN Architecture

An effective wireless local area network is one with ease in mobility of the workforce, reducing the cost of infrastructure and escalating efficiency by keeping movable consumers linked. The most important and relevant sustainable architecture is identifying which services and applications the Wireless LAN must support. Since if you do not understand the actual demand from the wireless communications and infrastructure, there is a high chance of understating or overstating the supply.

The WLAN architecture is therefore used as the vehicle through which alignment between infrastructure demand and supply are guided. A summary of step-by-step development is; Determining the purpose of the wireless LAN, defining the range of your WLAN, increasing your timeframe to employ, considering IT protection requirements, recognizing the styles of users, devices, and components you want to support, and coming up with support structure (Boutaba & Geier, 2004).

Security of WLAN

Initially, most of the people feared having wireless communications because they feared the lack of security of their messages. The major worry is in the uncontrollable nature of transporting media.LLAN architecture plays a big role in identifying the components to be incorporated into the system. Some of these tools can be used; passwords, access methodology, encryption, and hashing standards, use the appropriate devices and their respective operating systems (Bugoue, 2006).

Great care should be taken when putting passwords since you must recall them to access the data required. Other documents must be accessed by more than one person hence password must be set to take care of the action. You must encrypt or lock the sites which you think are sensitive and should not be accessed by everyone. The architecture must show how the security chain is interconnected to provide a holistic security posture. The security policies adopted must be explained in the plan, accomplishment, and procedural phases of WLAN to access methodology, encryption, and management strategies.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

You should understand your target group to come up with correct security measures for different stakeholders. Each detail of every stakeholder should be included in the architecture (Younds, 2003).

Operational Support Structure of WLAN

You can manage the system by sending configurations down to them by doing it passively or actively. Passive provision is required in case a change is needed but active is a repeat process (Unger, 2003). The traditional method can be used i.e. operational control of network management. Systems are monitored only when the problem is detected. However, the modern technique is more appropriate than is a proactive operational method where data is examined and signs of trouble are captured and solved before they occur.

Conclusion

With current changes people need to multitask in different aspects there is a need to use WLAN in operations. For instance, a manager can solve a problem when he she is away from the office because the work can continue without having to stop and wait for the approval. With an increased level of protection in the wireless LAN then nothing should be feared since it is a reliable mode of communication.

Work cited

Unger, J.M. (2003). Wireless LAN and switching Fundamentals. New York: McGraw Publisher.

Pacguetty C. (2007). Local Area network: Emphasis on wireless designs Architectural Review.

Bugoue, C. (2006). Pervasive access via WLAN and Cisco Connections.

Younds, L.J. (2003). Computer Networking and Systems Analysis. Hansfort: Delhi.

Boutaba, R., Geier, J. (2004). Discriminatory dynamic scanning for swift: Handoff in WLAN Using Feeler Network. London: Oxford University Press.

Print
Need an custom research paper on Pervasive Wireless Local Area Networks and Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2021, October 5). Pervasive Wireless Local Area Networks and Security. https://ivypanda.com/essays/pervasive-wireless-local-area-networks-and-security/

Work Cited

"Pervasive Wireless Local Area Networks and Security." IvyPanda, 5 Oct. 2021, ivypanda.com/essays/pervasive-wireless-local-area-networks-and-security/.

References

IvyPanda. (2021) 'Pervasive Wireless Local Area Networks and Security'. 5 October.

References

IvyPanda. 2021. "Pervasive Wireless Local Area Networks and Security." October 5, 2021. https://ivypanda.com/essays/pervasive-wireless-local-area-networks-and-security/.

1. IvyPanda. "Pervasive Wireless Local Area Networks and Security." October 5, 2021. https://ivypanda.com/essays/pervasive-wireless-local-area-networks-and-security/.


Bibliography


IvyPanda. "Pervasive Wireless Local Area Networks and Security." October 5, 2021. https://ivypanda.com/essays/pervasive-wireless-local-area-networks-and-security/.

Powered by CiteTotal, the best reference generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1