Final Project Plan Week 7, communications homework help

User Generated

fnwn1982

Business Finance

Description

During this course, you have developed multiple plans and recommendations for your client, Sunshine Health Corporation. It is now time to present the final plan as your contract has been completed through this first phase. Please review your previous work including that of last week with your Network Security Plan and make revisions and modifications as necessary based on our discussions and research up to this point. This is a plan that would be submitted to your customer for their review and their records of the work that you have been contracted to do. It is important that is clear and concise and easily referenced. The project should include at a minimum: Overview of the contract (up to 1 page, more than a paragraph) Table of contents Executive summary (up to 1 page, more than a paragraph) Review of the individual projects. Each project should be a separate section (including those that were discussions).Review and recommendations. Reference page. Instead of references listed per project, develop a single section with all references and resources utilized throughout the project, using APA format.The assignment should be 8-10 pages of content not counting title page, reference page, or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format. This report is a representation of your business. How do you want your business seen and remembered?



Unformatted Attachment Preview

NETWORK CABLING             Network Cabling Ryan M. Harmon IS535/ Telecommunications 8 November 2016                   NETWORK CABLING In today's world internet is vital for daily task. It is very high in demand and which people will find often feel lost or discounted if they cannot access the internet. This enormous concept that every organization will have. Personally, I gone out to Lowes and inquired about networking cable and found myself in purchase the more expensive cable because of the rating on the wire, this you should never go cheap on especially if you need access to the internet all the time. When you are planning to set up an office, company or a building for networking, you have first created a goal and what is realistic for the company to achieve. Ensure that you have the right people to make the right decisions that are involved in these decisions because you want to do it right the first time. If you end up making the wrong choice this will cost you time and money in the long run, so it's highly important you make the right decision, whether it is expensive at first it will pay off in the long-term. As the Sunshine Health Corporation Company, they have to ensure they do all can do to ensure they provide reliable networking cabling. When the report comes in at after the inspection, it will be highly visible to their proper networking cable. The inspection report came back and stated that the building was the wire was the old cabling. Now the Corporation needs to find and contract a networking company to provide service. Of course, this would mean that the old wiring would have to replace because the legacy cable is slower than then the new cabling. Due to an older building the installation of Wi-Fi, might have some blockage areas that are cannot receive service. But also, considering when you connect to the cable the service will be faster and more secure than Wi-Fi. The cabling should be Category 6 cabling as that has a better rating than Category 5 cabling. As the CAT5 cable has a maximum rating of 1000MBits/second. As the rating for safety CAT6 cabling meets the criteria NETWORK CABLING and is rated higher in the safety aspect. Another reason for CAT6 cabling is because it transfers data at 10000MBits/second. The cabling for the future endeavors as CAT5 would be phased out. So, you might spend a little bit more for the CAT6 cabling but the at the end of the day it would be worth the investment. Something that is going to be required to install CAT6 cable is; cable tester, verification, qualification tester. Now when you look at the building, there will be old cabling with coaxial and telephone cabling that uses RJ11 connectors. With the upgrade of the CAT6 cable, you will be using the 8p*C (RJ45) connector. With a higher connect speed this change would also be an easy installation. Now when you have this in the communications hub room, it needs to be in perfect condition. You will need to have labeling on each cable and at least have two per section. You will need a centralization tray system, and on a raised platform. The labeling process needs to identify and reviewed by the Network Service orientation clearly. Another thing is that the room will also enable the voice and date in the office, and again it needs to be properly arranged. With the CAT6 cabling, it also needs to go along with the RJ45. With Wi-fi being the new thing to be mobile and always connected you would have to install it at each communication room. With that being said you would be able to communicate with the local cabling and signals can send and receive with from the surrounding computers. As the communication, the room would be in a local area. You will have place the scope of the wireless LAN, and it needs to state what the wireless would be able to satisfy including; the standards, system architecture, the access points, and the materials. The company should have placed this in for the bid to see if there were a couple of businesses willing to offer for and then they should have researched to find out who would be the better NETWORK CABLING company to hire. With all the requirements, they should have also conducted an in-depth study of development this action for Local Area Network. This would also include the contractor that would be installing the cable too. As we know now that wireless creates a more mobile environment, unlike the LAN cable that provides the faster connection. With their decisions, they can always opt in to have Wi-fi as well and have a multitype function business as well. With an open area and 20,000 square feet, it would be feasible to have Wi-fi. This would impact the common room along with the entire building. With the installation and complete set up would determine what would be more beneficial and cost efficient at the end. As business needs to operate, they would be successful by replacing the CAT5 for the CAT6. As we know that CAT6 is faster than then CAT5. With the upgrade of the phone to RJ45 would also be install that would bring up that to a higher speed as well. Looking at the expenses wiring would be about $8,000, $5,500 for the equipment, $1,895 for installation, $800 for testing would equal $16,195. Reference  Corporation, F. (2006). Fiber optic cat5, cat 6, and cat 7 cable tester. Retrieved November 7, 2016, from  http://www.flukenetworks.com/Expertise/Learn‐About/Cable‐Testing Five reasons to go wireless. (2008, June 10). Retrieved November 8, 2016, from  http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/work_from_anyw here/why_go_wireless/index.html ASSET RECOVERY Asset Recovery Ryan M. Harmon IS535/ Telecommunications 15 November 2016 ASSET RECOVERY As any company grows it will have to change and if it does it most likely will eventually be shut down. In today's world as computers are evolving all the time along with software and hardware so to become a reliable company, you will also need to up to date to stay with the growing world of today. As a tech, savvy guy myself I like to have the latest greatest gadgets but not being sucked into buying it every time it comes out. So, for companies they should invest in updating their equipment every so often with the latest. Now the question comes to mind in what do you do with that equipment; you will need to recycle that material does not just pile up and clutter up an area because then that just keeps piling up. Asset recovery will be efficient and show only ensure that it does not turn out to disaster again and which would be lost of money during this time. For Sunshine Health Company they will need to obtain a deposition of the equipment so they can have an effective way to undertake this task. With the systems that are outdated ensure they are left unplugged from any of the networks and ensure they are kept in a separate room. As these computers, can be utilized for storing or recording the company's data. As it ages, the computers will get slower, and it will not be able to keep up with the newer systems. If you think about and as old as myself, thinking to the days of dial up the internet connect and used to wait forever and if I were still using that same service I would be waiting a very extended period of time for the Google search page to appear. When things operate at a slow pace, it can very frustrating and through the storage of data. Which when these reaches it peaks whether it is to the data storage limit or outdated hardware this can cause issues for the tech and eventually the company will have to break down to buy new equipment. As the old computers are decommissioned now, they will have to think of what they may want to do with that equipment. Not just the machines can be placed as decommissioned, but the ASSET RECOVERY following can also follow along; voice devices, computer output microfilm, magnetic disks along with CDs. Not just thinking of computers as outdated equipment but you can also think of air conditioners in the communication's rooms, telecommunication equipment; land lines, answering machines, fax machines, and local area networks (LAN). Asset Recovery Management (ARM) has to be considered with several factors being considered. Sunshine Corps, needs to think about the spare parts that have been bought to maintain their equipment. As the parts, should not be part of the company's budget but rather to maintain and repair at an affordable price. With the installation and uninstallation of the equipment in all areas of the company should not be part of the budget either, for example, man hours, material, and operation cost. Sunshine Health Corporation should select the most advanced equipment that the company can purchase to help asset recovery with the quality of updated services. They would also have to consider the feedback from the people which it would increase the moral of the company's employees. For the equipment that would only go up in smoke should be fully torn apart and demolished. Deposition instructions would help the decommissioning process that the company has to consider and would also have to keep a log for that equipment as well. Along with the list, you would have to store the original price, the maintenance log of what that piece of equipment utilized during its cycle of life. Now a cost that the company has to aspect is the price to obtain for all the information during the deposition process. You would also think of acquiring the man hours, transportation costs, and storage cost. As any other serves contracting an asset recovery service would have to be a decision to hiring the right firm to complete this mission. Also in ASSET RECOVERY consideration to look at the service team is ensuring they have all the available equipment to conduct this process properly. Tools and equipment that can be used as a collection of the equipment and the storage facilities are also substantial. With safety in mind, you need to ensure that proper measures are in place to avoid and further damages in this process. Also, having properly trained people on the equipment would be a significant indicator of a good asset recovery service. This would be professional people who are safe and great enthusiasm to be able to carry out these strict guidelines during this collection process. As this equipment, can be stored in a warehouse awaiting further instructions. When is comes to decommissioned assets, you can also think about updating that equipment. Which in a case study you can increase the life from 5 to 15 years. For example Windows 7 or 8 they can upgrade to 8.1 or 10 which are faster than Windows 7 and 8. Windows 10 has a great multitasking feature compared to Windows 8. Which this process can be uninstallation the installing of windows 8 to be able to install Windows 10. With the company having the highly trained and qualified personnel will be tasked to upgrade process. Another job would be installing a new network cabling through the enterprise. As the company is to get rid of the CAT5 cable to CAT6 because like CAT5 only runs 1000 Bits/second CAT6 runs 10000Bits/second. Also, including the telephone cabling that would include the RJ45 connectors compared to the RJ11 connectors which are slower. As the RJ45 are easy to install and available. Another way of deposition is by donating the equipment as well. This would be another choice that Sunshine Health Corporation can select for this asset. Just by giving this computer it can be registry as a generous tax benefit and write-offs. The company will have selected the best organization which is also best if they choose a non-profit organization that would be most ASSET RECOVERY beneficial with the equipment. Before donating the computer Sunshine Health Corporation, they should ensure the material they give is in good condition which if not could lead to expense. This would also bring good will to the corporation as they give their equipment. I would say they can publicize their donation, but in my eyes, I would like always to be a silent gift. Another option in that Sunshine Health Corporation has to select from is salvaging and selling of the decommissioned equipment. Which for the telecommunications equipment; landlines, faxes and an answering machine can be sold for a low price? As the revenue can be utilized in any department. The money can be use as training more people, or particular commodities in like increasing their profit. This can also be a market to track in the highly trained people and utilized it for their salaries. Reference 118, V. H. (2016, May 4). Windows 10 vs. windows 8.1: 5 reasons you're missing out on Microsoft's best OS yet. Retrieved November 16, 2016, from http://www.alphr.com/microsoft/microsoft-windows-10/1000288/why-windows-10-is-betterthan-windows-81 Decommission, asset recovery. Retrieved November 16, 2016, from http://computerrecycling.co.nz/decommision-asset-recovery/ Markgraf, B. (2016). Asset recovery in telecommunications. Small Business Chron. Retrieved from http://smallbusiness.chron.com/asset-recovery-telecommunications-10373.html IEEE SPECIFICATIONS AND STANDARDS IEEE Specifications and Standards Ryan M. Harmon IS535/ Telecommunications 22 November 2016 IEEE SPECIFICATIONS AND STANDARDS A company that is out there to help develop standards and specifications for cabling is The Institute of Electrical and Electronic Engineers (IEEE). Like any business, this has layers that it starts off with from the Ethernet to the wireless. 1997 was when they began to approve of these specifications and how they can be helpful in the communications arena. As this would be the start of a new era and would be cost efficient in investing in. As they create the standards of to a higher network speed along with a low interference rate. 802.11 was the name of the first standard but like some things the first thing is not always liked. This would only support a 2mbps system which was very slow. Commented [G1]: Inserted:  be  Commented [G2]: Inserted: n  Commented [G3]: Inserted: beg  Commented [G4]: Inserted: wa  Commented [G5]: Inserted: ess,  Commented [G6]: Inserted: busi  Commented [G7]: Inserted: Like  Commented [G8]: Deleted:As  As 802.11a is a newer model of 802.11 which only applies to Local Area Networks (LANs). But Commented [G9]: Deleted:compa  Commented [G10]: Deleted:y  with the newer model it supported up to 54mbps in the 5GHz band. Which it also utilized an Orthogonal Frequency Division Multiplexing (OFDM). This was the digital era that started off in Commented [G11]: Deleted:i  Commented [G12]: Deleted:st  Commented [G13]: Deleted:red  the 1980's and had interference among channels near each other. It was transmitting data through the phone lines. With 802.11b around it was less expensive but it only supported 11mbps in the 2.4 GHz bandwidth. This used a Complementary Code Keying (CCK) which replaced the Barker Code in 1999. Commented [G14]: Inserted: n  Commented [G15]: Deleted:actually   As 802.11g had only transmitted through 802.11g, it hands a faster rate compared to the (b). The reasoning why is because of the wireless network WIFI. With WLANs, it gives Commented [G16]: Deleted:the   Commented [G17]: Inserted: ,  supported computers, telephones, and other communications equipment. As the (g) model had transmitted 54 megabits per second, along with using the OFDM compared to the 802.11b which utilized the CCK. Now with the 802.11n it had its eye on CCK, OFDM, and Direct Spread Sequence spectrum (DSSS) modulation. It had supported 1000mbps which were the minimum Commented [G18]: Inserted: ere  Commented [G19]: Inserted: ere  Commented [G20]: Inserted: ,  Commented [G21]: Inserted: give  and could go up to 6000mbps which were way faster than 802.11g. Commented [G22]: Deleted:hand  Commented [G23]: Deleted:as  Commented [G24]: Deleted:as  IEEE SPECIFICATIONS AND STANDARDS As anything 802.11a had its advantages, as it utilized the 5GHz bandwidth and it was not as crowding to the multichannel. Now the 802.11b had only supported 11mbps which could provide 54mbps. Which is good when it is divided up into numerous channels. With 802.11a it can also be quite troubling as well. It can cost more than the others. As the devices, could not be supported like computers, and notebooks. As the lower of distance would be a given to the output power. As 802.11b is cheaper but it can be split up to support various applications. But if you like speed this would not be the one to get because it would only reach 11mbps. It would Commented [G25]: Inserted: into  Commented [G27]: Deleted: own  Commented [G28]: Deleted:actually   Commented [G29]: Deleted:actually   Commented [G30]: Deleted:by  also crowd the lines, unlike 802.11a which mitigates these interferences. It was highly liked Commented [G26]: Inserted: ,  because it was affordable. Commented [G31]: Deleted:ctually a With 802.11n it could provide 300mbps which was unlike the 802.11g as it would only support 54mbps. With this, it had supported three modulations for the digital connections which would be fasters speeds. This also gave you security and was reliable which was able to be used on 802.11a, b, and g. This would also allow you to increase your clients and over a further distance. But the distance would have to depend on some factors like the quality of material, the size of the object and movement along with the direction of the antenna. Commented [G32]: Inserted: ,  Commented [G33]: Inserted: three  802.11n would not have too many issues with the interference. This system was only 2.4GHz which was a risk of WIFI that was less compared to the (b) as it would have a better signal Commented [G34]: Inserted: ,  Commented [G35]: Deleted:3  Commented [G36]: Inserted:  a  recovery. The (n) is also pricey, which is also changeling of an operation to 2.4 GHz, as it has Commented [G37]: Inserted: o  three overlapping channels, and this would mean fewer clients. Commented [G38]: Inserted: r Commented [G39]: Inserted: few  With all this, the Sunshine Health Corporation could consider and apply the technologies that would improve their communications system. As I believe that they should highly consider the 802.11a as this would be the best bang for the buck. It would be expensiveness to install, but in Commented [G40]: Deleted:l  Commented [G41]: Deleted:ss  Commented [G42]: Inserted: ,  Commented [G46]: Deleted:,  Commented [G43]: Inserted: ,  the long run, it would have paid for itself. Now they would have to consider the best company to Commented [G44]: Inserted: ,  IEEE SPECIFICATIONS AND STANDARDS install this equipment. The company willing to do so would have to have the latest equipment to be able to handle this task. With funds that are remaining, they should invest in the best applications. Commented [G45]: Inserted: ,  The company should listen to their employees and realize what they need along with the current technology. With proper training, so they can increase skill-based knowledge. With the 802.11a is reasonable because they connection speed was up to 54mbps to the 5GHz. It also was good in consideration of OFDM. But the downside of this is it is not compatible with other technologies, which can cause issues to its employees. Commented [G47]: Inserted: h  Commented [G48]: Inserted: wi  Another idea is they could switch to the 802.11n. As this would be the latest technology but it would also be the most expensive along with being faster than the 802.11a. This provides from 300mbps, unlike the 54mbps. The security is also way better too. This is also the best reliable system as well. As they have considerations to think of they would have to believe in what invest is the best for them. Commented [G49]: Inserted: ‐  Commented [G50]: Inserted: ,  Commented [G51]: Deleted:the   Commented [G52]: Deleted:o  Commented [G53]: Deleted:s  Commented [G54]: Inserted: eve Commented [G55]: Inserted: bel  Commented [G56]: Inserted: ,  Commented [G57]: Inserted: ing  Commented [G58]: Deleted:th  Commented [G59]: Deleted:nk  Reference IEEE 802.11n Standard. (n.d.). Retrieved November 21, 2016, from http://www.radioelectronics.com/info/wireless/wi-fi/ieee-802-11n.php What is IEEE 802.11n, what are the advantages and challenges for 802.11n in Wi-Fi networks? (2011). Retrieved November 20, 2016, from http://www.excitingip.com/186/what-is-ieee80211n-what-are-the-advantages-and-challenges-for-80211n-in-wi-fi-networks/ WLAN - 802.11 a,b,g and n. (n.d.). Retrieved November 20, 2016, from http://www.ni.com/tutorial/7131/en/ Commented [G60]: Inserted: ?  Commented [G61]: Deleted:.  Running Head: INTERNET SUMMARY Internet Summary Ryan M. Harmon IS535/ Telecommunications 5 December 2016 BROADBAND TECHNOLOGY ANALYSIS BROADBAND TECHNOLOGY ANALYSIS To Interconnect 10 healthcare facilities require a financially beneficial and economical approach. To start with, we need to consider the present environment as well as support distinct expansion levels. On the other hand, not each particular clinical practice can well integrate or rather fit in health data innovation for the most part into their work too in the present time. Also, we can well perceive that not every practice will embrace the healthcare Information Technology at the same level of complexity. Since all this, individuals should for that reason account for a scope of abilities more so amongst data sources as well as data users, including Electronic Health Records (HER) and NonElectronic Health Records users, as people keep on advancing interoperability. Individuals and caregivers have subsequently a constant need to find, send, receive and also utilize their health data within and outside the healthcare delivery system and interoperable infrastructure ought to empower this. All in all, we should concentrate on value. We will continue at all times endeavor to ensure their interoperability struggles and determinations bring about the best value to individuals as well as care providers, advanced health, healthcare, including lower expenses must, therefore, be assessable and determinate after some time furthermore, at any rate, offset the minimum means venture. BROADBAND TECHNOLOGY ANALYSIS References High Availability - Networks (I). (n.d.). Retrieved December 03, 2016, from http://networksandservers.blogspot.co.ke/2011/03/high-availability-networks.html Hochmuth, P. (2006). Are Cisco switches really so expensive? Retrieved December 02, 2016, from http://www.networkworld.com/article/2300612/lan-wan/are-cisco-switches-really-soexpensive-.html Is an all-fiber network really cheaper? (n.d.). Retrieved December 04, 2016, from http://www.thefoa.org/tech/allfiber.htm TELECOMMUNICATIONS TECHNOLOGY Telecommunication Technology Ryan M. Harmon IS535/ Telecommunications 29 November 2016 TELECOMMUNICATIONS TECHNOLOGY Telecommunication Technology Local Area Networks is a typical group of machines such as computers and are related to the prime services that use a common point of communication wing and the current wireless servers. Besides, LAN Comprises and engulfs the peripheral devices and the computers that usually get a connection to the server that is within a unique area geographically. For instance, the commercial and offices which are established by either individuals or the company. It is in such regions where the LAN plays a very vital role as it quickly helps in the connection of the people locally, therefore, making it easier for the quick access to the information that is to be shared in the family or within the company in a smaller location. Secondly, LAN is a sophisticated technology which employs various tactics in handling multiple occurrences in the whole technology. With LAN Switching in place, it does an excellent movement technology that helps the computer and the server to have a connection that yields an additional execution of the tasks and making its entirety movement to be easy. Typically, it is not always convenient for the large operations but more suitable for the small campus backbones. However, local area Network plays a very vital role by ensuring that it allows the users to make a connection on their computers to conventional servers. Typically, these are usually the central computers to the general network. These servers contain some data which are various types. The most dominant data that are in the computer are numbers, for instance, the accounting information, which various financial departments may wish to share within their department with different people in departmental decision making. Consequently, the Department can make a pool of exchange of stuff like the photos that marketing department may wish to dispose of people for them to establish the exact location, through the help of the local area network. And this takes place when one works on the marketing project in a company. TELECOMMUNICATIONS TECHNOLOGY Moreover, it is through this action of LAN which helps many organizations such as banking industries have employed the use this technology in business; they use the automated ATM which one can make the withdrawal of the cash from any point of the location irrespective of the geographical location. However, it makes the work to be so comfortable and convenient to the operators who use the internet enabled gadgets. Local Area Network gives that provision that gives a chance to everyone to work on the same document using the right programs which at least a bigger number can see and have access to at all cost, and able to access them in real time. Perhaps, the most compelling aspect of the central server with a stronger connection regarding internet, and this makes everyone who is entailed to the company can access the same information that is within the department of a company at their doorstep in the desk of the worker or even from home. Nowadays accessing LAN is very simple, one can see the signal from his/her phone. Therefore, it is possible for them to make its abundance availability on our phones. Mobile technology has brought a tremendous development in the communication sector. If today one would imagine that life could be the same today. With the wireless, technology has become a vital part of the world. Mobile technology has made the world to be viewed differently and in various sectors. For instances, Healthcare, wireless communication has brought a tremendous impact on the medical care in the remote areas which eventually as made the world to view mobile wireless to be the most effective regarding the transformation of the world. For instance, the United Nations Foundation which has adopted the use of technology in make equitably distributed health facilities in various parts of the world. The world concerning technology has the business communication to be enhanced. The interface has adopted the drastic and impact change in the world of business. And this has TELECOMMUNICATIONS TECHNOLOGY become more of advantageous to various states than any other organization. Mobile technology can typically improve the services that a firm offers to the customers. It is possible in a case where a secure access the customers regarding the management. However, it is usually easy to access your client's details via regular updates of their details. Lastly, on the advantages, very robust solutions may be found wherever office gets a direct link to the departmental office in which one works in even offline. And at any moment could do them remotely under the guideline of checking the prices and stock availability. Additionally, the vast adoption of cloud computing has brought positive impacts on the mobile devices by providing a technical solution to the problems over the internet. In everything which has merits, there must always be its limitations. There is a relatively high cost of the machines and the equipment which surround the mobile devices. However, such cost which is involved in handling the challenge becomes a puzzle. The mobile information Technology tools put valuable information at risks, whereby those relevant data are disclosed to the unauthorized users in case of unimproved measures is taken which makes the mobile devices against the subjection of such materials into risks. TELECOMMUNICATIONS TECHNOLOGY Work Cited Lan, Vu Phuong, and Dinh Thi Bao Hoa. "Application of remote sensing GIS and technologies for flood mapping to serve impact assessment in Vinh Phuc province." VNU Journal of Science: Earth and Environmental Sciences 27.4 (2016). Vij, Sonakshi, and Amita Jain. "5G: Evolution of a secure mobile technology." Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. IEEE, 2016. Running Head: SUNSHINE’S NETWORK SECURITY PLAN Sunshine’s Network Security Plan Ryan M. Harmon IS535/ Telecommunications 9 December 2016 SUNSHINE’S NETWORK SECURITY PLAN Sunshine’s Network security plan Introduction Sunshine Health Corporation has embraced the incorporation of Local Area Networks as to come out clear on their provided cost benefits and production. Notably, the LANs lack the ultimate protection from security vulnerabilities. As a matter of fact, the entity has only made minimal efforts to secure their network at the different levels. The overall impact is that their confidential files are prone to jeopardize to malicious individuals or groups. For a safe network environment to be realized, various elements ought to be put into consideration. For instance topology, hosts incorporation in the network, selection of the appropriate software and hardware technology as well as their keen configuration to suit the system. Therefore, this article is a presentation of the plan that can be incorporated to secure the pertinent data of Sunshine Health Corporation. Securing the Various Environments Technology has been quite handy in the address of the desires of Sunshine Health Corporation to incorporate automation into work schemes as well as the collection of data and its consequential storage. Since the entity has distributed environments, each of these layouts has different assets which all have different values. For instance, in one of the phases of the organization lies the costs of the embraced technology as well as the software and hardware to produce, store and avail information. The other phase is characterized by human efforts to collect and interpret the availed information so as to deduce and store crucial data that can be used in making decisions (Knapp & Langill, 2014). Therefore, the advantage of ensuring security for the SUNSHINE’S NETWORK SECURITY PLAN network is to protect the progressive stages of assets while at the same time checking on trustworthy and data accuracy. As a result, the firm can achieve excellent levels of trust that are essential for the collection, storage, and dissemination of reliable and accurate information. Counteraction of Control and Security Threats The development of the appropriate measures to mitigate the security threats of the organization is a daunting task that calls for the presentation of a well-schemed security plan. Therefore, the initial stage of the exercise is the establishment of an upper management endorsed policy as well as recommendations from security professionals. As a result, this security layout is meant to achieve the below goals;  Achieve confidentiality by availing system files to exclusively authorized partners as well as the securing of communications.  Checking on authentication of the information to determine its legitimacy, in other words, are the other end users the people that they claim to be?  Control over access to deny or permit the retrieval of information based on different parameters.  Maintenance of data accuracy  To check on non-repudiation through the provision of transmission evidence as well as receipts Firewalls Firewalls are an ideal measure for the entity to maintain its security through the prevention of external intruders. The firewall entails the incorporation of both software and hardware elements that are meant to work systematically and consequently achieve the core goal SUNSHINE’S NETWORK SECURITY PLAN of the prevention of an internal network frame from external attacks. Though they have varying degrees of implementation, they are still useful for the Sunshine Health Corporation as they all function to act as a barrier between the outside world and the internal affairs of the organization (Todd & Rahman, 2015). The purpose of the firewall is to restrict unpermitted traffic while at the same time granting access to that traffic that is not blocked. However, for this case, we need maximum security, and for that reason, the protection from the entry of unauthorized traffics is more critical since the administrator of the networks is already familiar with the permitted accesses. The IS security staff and the CIS auditors are essential in the monitoring of the firewall’s integrity to achieve safety and operational compliance. However, these domains are characterized by unique requirements, but their common elements are that detection of suspicious activities, provision of numerous authentication choices, encryption, and alarms to get catch hackers in the act (Knapp & Langill, 2014). Security Tools With the increased security threats, experts have developed the appropriate tools to correct and monitor the risks. The entity can apply diagnostic tools to identify potential security weak points for the various environments. For instance, they can implement the SATAN (Security Administrator Tool for Analyzing Networks). The tool is an unlimited domain that is released via the internet. However, there has been many controversies on the availability of the device to potential hackers but can, however, be made more useful in the early stages before the hacker makes an attempt to hack a distributed environment. SUNSHINE’S NETWORK SECURITY PLAN The tool can gather the pertinent data of connected internet hosts and consequently detect the presence of malicious services such as remote file transfers. Moreover, the software also provides an outline for the potential misuses of the services. What is more intriguing is that the piece of technology can be used to detect the presence of errors in the scheme for instance bugs in the network utilities as well as the system. It also can identify systems with poor configurations such as the lack of primary precautions, unauthorized activities and the absence of passwords. The software then gives the outline of the serious vulnerabilities and provides a suitable solution to mitigate them (Todd & Rahman, 2015). From the perception of a management branch, those vulnerabilities detected by the software ought not to be tolerated as they are simple weak points that can be utilized by hackers. Therefore, the same can be incorporated into the network system of the Sunshine entity to check and provide solutions for its vulnerabilities (Knapp & Langill, 2014). SUNSHINE’S NETWORK SECURITY PLAN Network Security at the OSI Model Levels Physical Layer At this level, as an IT expert, one is concerned with the prevention of unauthorized personnel from making their way into the system. The measures that can be quite handy at the level include the application of surveillance cameras, arrangement of barriers and implementation of warnings to monitor the access of individuals to the system of networks (Todd & Rahman, 2015). SUNSHINE’S NETWORK SECURITY PLAN Data Link Layer At this stage, the administrator has concerned with the addressing the frames that act as links to connect the network layer and the physical layer. Therefore, it is at this level that switches are deployed where the security of the data link is aimed at making sure that the switches are connected in the correct format. For instance, it is mandatory to join physical access blockage and logic level deactivation of the unused ports all in the bid to prevent fraudulent linkages that could lead to dangerous activities such as eavesdropping (Todd & Rahman, 2015). Network Layer Supernumerary, the router can be quite useful in centralizing traffic management by the use of IP addresses. It is advisable to activate the various security properties in the scheme to avoid controls that are unauthorized. Therefore, the administrator should consider the application of strong passwords in conjunction with the proper management of protocols following encrypted connections. However, it is important to acknowledge the vulnerabilities of the routing procedures to avoid the incorporation of false routers. Moreover, firewalls can also be activated to minimize attacks from malicious parties from outside the health center (Todd & Rahman, 2015). Transport layer The concerns on security at this layer entail the encryption of the data under transfer. Moreover, it also requires the prevention of manipulation of data integrity, authentication of the personnel involved as well as the avoidance of recurrent attacks. For instance, the SYN attacks SUNSHINE’S NETWORK SECURITY PLAN are quite common, and for that reason, there is the urgent need for raising the number of the unsubstantiated networks on the server. Moreover, there is also the option of lowering the time m taken by the server to wait for approval or rather communication to the recommendable time of 75 seconds (Todd & Rahman, 2015). Application layer Under the criteria, our concern lies in the management of sessions and the applications that are achieved by the apparatus. It is at the stage that we find the use of firewalls as the primary effort that can be used to counter the flow of network traffic. However, the application of firewalls at this level is unique as it is oriented towards numerous choices and a wide array of procedures/ protocols. Intrusion Detection Systems are also applied at the level to monitor hazardous reactions or rather a behavior based on various provisions and consequently issue the appropriate warnings (Todd & Rahman, 2015). Conclusion It is crucial to maintaining security through the timely scheduling audits, response to situations, execution of safety testing, reading of logs on reviews, updates on the safety plans and the training of security managers. Strikingly, risks are known to have a dynamic nature as they change over time. Therefore, the security measures should also advance over time. Security is enhanced through the continuous process of monitoring, implementing, improving safety and testing. In fact, updated security mechanism can maintain pace with the latest attacks, which is a motivating factor for the network administrator (Knapp & Langill, 2014). SUNSHINE’S NETWORK SECURITY PLAN References Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Todd, M., & Rahman, S. (2015). Complete Network Security Protection for SME's within Limited Resources. arXiv preprint arXiv:1512.00085. Running Head: TELECMOMMUNICATIONS/TECHNOLOGY Telecommunications/Technology Ryan M. Harmon IS535/ Telecommunications 18 December 2016 SUNSHINE’S NETWORK SECURITY PLAN Describe and explain 3 key components of a Telecommunications/Technology Plan A telecommunication/Technology Plan provides an overview of the current technology as well as the blueprint of how both telecommunications and technology help in the achievement of an organizational mission. Particularly, the plan acts as a mechanism essential in prioritizing and budgeting for technology tools that are critical to the achievement of organizational goals and objectives. Three components of a telecommunications/technology plan include the establishment of clear goals, a professional development strategy and provision for an adequate budget (Yuen, 2013). Notably, the first component of a telecommunications/technology plan is the establishment of clear goals. This should be accompanied by a realistic strategy for the purpose of utilizing information technology as well as telecommunications in the improvement of organizational services (Yuen, 2013). Technology needs such as the provision of electronic resources and computer training and the need to have sufficient computers need to be taken into account. The second component is a professional development strategy. This is essential in ensuring that the organizational staff have the ability to utilize the new technologies for the purpose of the improvement of organizational services (Noh et al, 2016). Besides, it aids in determining the new technologies that can save the organization money. The third component is providing for an adequate budget as well as an implementation process for acquiring and maintaining organizational hardware, software, and professional development. These are needed for the implementation of the strategy. Ensuring that a technology plan possess all these components makes sure that an organization stays current with the technology trends. It also SUNSHINE’S NETWORK SECURITY PLAN helps in prioritizing technologies that fit organizational goals as well as the needs of the community. Explain the advantages and disadvantages of using 802.11g for wireless access and usage in an office environment. Please address these areas: 802.11g is an extension to 802.11b. It is the most widely deployed Wireless LAN for use in wireless access and in an office environment. This is due to the fact that 802.11g meets industrial, office and home user’s needs. As well, 802.11g operates on a frequency of 2.4 GHz and offers an excellent alternative for the growing bandwidth needs. Notably, 802.11g access points and devices can be implemented in application areas where there is the need for higher throughput. Therefore, 802.11g is a proven technology that offers higher throughput essential for multiple application networks and high-bandwidth applications (Collins, Mangold & Muntean, 2010). Advantages 802.11g has a higher bandwidth at 54 Mbps. Also, 802.11g has a higher frequency band of 2.4GHz. Besides speed, 802.11g is completely backward compatible with 802.11b. The technology allows for smooth transition in the event the user wants to upgrade to better performance (Geier, 2015). Disadvantages 802.11g possess a shorter range. In comparison to 802.11b, it costs more by at least 50%. Besides, 802.11g is not widely supported by machines such as PDAs and laptops. Limitations SUNSHINE’S NETWORK SECURITY PLAN Particularly, due to the short range, 802.11g is highly susceptible to interference from different access points. At the beginning, 802.11g signal requires 30 MHz of bandwidth and an individual will not be able to collocate a maximum of around three 802.11g access points within a given area. Strengths 802.11g have a couple of strengths that makes it more admirable than 802. 11b. 802.11g employs orthogonal frequency division multiplexing. This aids in obtaining higher speed for use in wireless access points and usage in an office environment. Electronic services that are utilizing 802.11g can get back to the speed of 11 Mbps and this characteristic makes 802.11g devices as well as 802.11b compatible within a single network (Geier, 2015). SUNSHINE’S NETWORK SECURITY PLAN References Collins, K., Mangold, S., & Muntean, G. M. (2010). Supporting mobile devices with wireless LAN/MAN in large controlled environments. IEEE Communications Magazine, 48(12), 36-43. Geier, J. (2015). Designing and Deploying 802.11 Wireless Networks: A Practical Guide to Implementing 802.11 n and 802.11 ac Wireless Networks for Enterprise-based Applications. Cisco Press. Noh, H., Song, Y., Park, A. S., Yoon, B., & Lee, S. (2016). Development of new technologybased services. The Service Industries Journal, 1-23. Yuen, J. H. (Ed.). (2013). Deep space telecommunications systems engineering. Springer Science & Business Media.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find the completed workLet me know if you have any concerns. Goodbye.

FINAL PLAN PRESENTATION

FINAL PLAN PRESENTATION
Ryan M. Harmon
IS535/Telecommunications
20th December 2016

1

FINAL PLAN PRESENTATION

2

Overview of the contract
Notably, Sunshine Health Corporation offers comprehensive and statewide healthcare
plans in Florida. The management is charged with the responsibility of offering coordinated care
as well as a network of support. There is the need to transform the health of the community and
with this regard, the management needs to address internet issues in the Corporation. Therefore,
Sunshine Health Corporation must ensure that old cabling is replace with a new one. The old
cable is slower. Besides, with the installation of Wi-Fi, there might be some blocked areas that
cannot receive the service. This is a great consideration for the change in the cabling. Connecting
with a new cable will ensure that there is more secure Wi-Fi as well as a faster service in
comparison to the old cabling.
From research, the network cabling should be Category 6 cabling and not Category 5
cabling. While Category 5 has a maximum rating of 1000MBits/second, the Category 6 cabling
meets the criteria and is rated high in security. Furthermore, Category 6 cabling transfers data at
10,000MBits/second. It is notable that the Sunshine Health Corporation will need to spend a little
bit more for the CAT6 cabling. Having Category 6 cabling for the internet services is worth the
investment. There is the need for a cable tester, verification, and a qualification tester for the
installation of the Category 6 cabling. The upgrade to category 6 cabling implies that the
company will change to 8p*C (RJ45) connector. Labelling for each cable is essential and a
centralization tray system will be needed too.
Particularly, with the installation and all the set up complete, the company will have to
spend up to $16, 195. These expenses are from; wiring costing $8,000, equipment for $ 5,500,
$1,895 for installation and $800 for testing.

FINAL PLAN PRESENTATION

3

Table of Contents
Overview of the contract ................................................................................................................. 2
Executive summary......................................................................................................................... 4
Network cabling .............................................................................................................................. 5
Asset recovery................................................................................................................................. 6
IEEE Specifications and Standards ................................................................................................. 7
Internet Summary............................................................................................................................ 7
Broadband technology analysis ................................................................................................... 8
Telecommunication Technology .................................................................................................... 9
Sunshine’s Network Security plan .................................................................................................. 9
Telecommunications/Technology plan ..................................................................................... 10
Review and recommendations ...................................................................................................... 12
References ..................................................................................................................................... 14

FINAL PLAN PRESENTATION

4

Executive summary
Despite the advancements in wireless technologies, many corporations in the 21st century
are dependent on old cabling systems. Nonetheless, it is important to have cabling that goes hand
in hand with the advancements in technology so that a corporation can take advantage of the...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags