StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Network for The Athletes Shack - Business Plan Example

Cite this document
Summary
The paper "Wireless Network for The Athlete’s Shack" proposes wireless connectivity and  ‘access points’ for the TAS environment. Cisco delivers a borderless mobility experience which gives users access to the information and resources with the quality and performance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Wireless Network for The Athletes Shack
Read Text Preview

Extract of sample "Wireless Network for The Athletes Shack"

? Full Paper Executive Summary The Athlete’s Shack (TAS) comprises of a chain of stores for sporting goods. As the time passes by, the company has expanded and now comprises of 10 stores in the area. Likewise, for integrating these stores, the company is seeking a wireless network solution that will synchronize all the stores with wireless broadband service by incorporating wireless local area network in each store and provide connectivity to TAS employees on iPads. For this reason, wireless technology company is contacted for a complete wireless solution. The business challenge for TAS is to: Provide wireless access to their employees, as well as secure synchronization of all 10 stores Increase efficiency, synchronization and portability of computing devices Gain competitive advantage by proving better customer service to their customers Network Solution: By incorporating Cisco unified wireless network and Cisco adaptive security appliance, a secure and efficient wireless network will be implemented. 2 Assessment For catering the needs of the business for TAS, there is a requirement of secure and effective wireless network connectivity for all the 10 stores within the same area. There are no requirements for establishing connectivity on long distant stores. However, security is a primary concern, as data channels will be established in the environment. For addressing the security issue, Cisco provides rich features and adds an extra layer of security on the wireless networks. The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices. Some of these technologies are WEP, WPA etc. Moreover, after securing the data in transit by encryption, we have also proposed a wireless intrusion prevention system that will continuously monitor and prevent the network from cyber threats. However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from one of the employees of TAS. For addressing human threats, acceptable use policy and password policies will be implemented. 3 Solution As the TAS environment requires wireless connectivity, ‘access points’ are required. ‘Access points’ are the device which is used to connect devices equipped with wireless technology. ‘Access points’ transmits and receive radio signals adjacent to a network hub over a limited distance. However, distant varies from different model types and wireless technology adopted. The TAS requirement is to provide access of network resources to the staff for connecting the iPads. Cisco delivers a borderless mobility experience which gives users access to the information and resources with the quality and performance. 3.1 Wireless connectivity of TAS sites TAS haw 10 stores within the same area, and there is no information regarding the distance of each of these sites with each other. When designing a wireless point to point connectivity, the distance is always considered due to limitation of wireless technology. Cost is also a major factor when implementing and designing a wireless network. There are two methodologies which can be adopted for connecting all 10 sites to provide Internet connectivity. 3.1.1 Wi-Fi 802.11/y It is a relatively new wireless standard defined by IEEE 802.11 standards with more enhanced capabilities as compared to 802.11n. It operates on 3.6 to 3.7 GHz on 54 Mbps with the distance of 3 miles (Parsons & Oja, 2009). The distance which is required to connect all of these 10 sites can be achieved by connecting via 802.11y Wi-Fi technology. However this technology is currently available only in United States of America. The hardware which is required to connect all these 10 sites is relatively of low cost. This is a low cost solution but it has certain limitations as it is available only in the United States. There are very few IEEE 802.11y complaint devices available. The router can be installed at any one end of either side to broadcast the signals compatible to 802.11y standards. The router must support functions such as Firewall, Network Address Translation, Dynamic Host Configuration Protocol, Local Area Network ports (more than one). Similarly, Voice over IP, Wireless Local Area Network and Max wireless data must support a transfer rate of 54 Mbps or more. The complaint standards requirements will be IEEE 802.11h, IEEE 802.11n, IEEE 802.11y, IEEE 802.11 IEEE 802.11a IEEE 802.11b IEEE 802.11d IEEE 802.11g etc.. As the router will support ranges up to 3 miles, users can connect to the wireless network directly. Security can also be applied as the wireless router must support a firewall and Wired Encryption Privacy and other security along with encryption techniques can be configured. Moreover, Dynamic Host Configuration Protocol can be configured by defining the IP address range in the router IOS. The parameters for defining the DHCP server are DHCP Server, Start IP Address and End IP Address. By configuring the DHCP server, the router will automatically assign IP addresses to the host it connects. 3.1.2 Access points (Angelescu, 2010) Each ‘Cisco Aironet 1500 series access points’ are compatible to operate on the frequency range: ‘802.11/g’. Depending on the area of the store, minimum of two access points are recommended for each store, so that the employees can roam within the store premises without service disruption. ‘Access points’ will be configured to assign IP addresses automatically to the TAS staff by Dynamic Host Configuration Protocol (DHCP). For connecting the ‘access points’, workstations will require a Wi-Fi Ethernet card. If the iPad already has the capability of connecting to the wireless network, then there is no requirement of an operating system with a functional wireless Ethernet adapter. The ‘Cisco access point 1500 series’ will perform as a unified wireless network by integrating ‘Cisco 4400 wireless LAN controller’, ‘Cisco Aironet 1500 Series Access points’ and ‘Cisco 3300 Series Mobility Services Engine’ to support these features: Cisco Clear air Technology Service mobility engines Context aware Services Mobility services from the local area network Unified application delivery integration with the Wi-Fi, LAN, Wi-max and cellular networks API on Simple Object Access Protocol (SOAP) Extensive Markup Language (XML) for third party application development Security policies Mobility 3.2 Cisco Unified Wireless network As there is no requirement of a hub on any of the stores, any one of the stores can be considered as the hub branch where implementation of wireless technology will be conducted. The wireless infrastructure of Cisco which is called a ‘Cisco Wireless Control System’ consists of following components: Cisco 4400 wireless LAN controller Cisco Aironet 1500 Series Access points Cisco 3300 Series Mobility Services Engine Integrated support for (wIPS) Built in support for ‘Cisco context-aware services’. 3.2.1 Cisco Wireless Control System The ‘Cisco Wireless Control System’ accomplishes planning, monitoring, deployment and reporting on indoor and outdoor wireless networks. The life comprehensive life cycle management platform of ‘Cisco Wireless Control System’ enables the reduction of operational cost with integrated tools, templates and guidelines. It enhances information technology efficiency via a spontaneous flexible graphical user interface (GUI). The centralized administration significantly eliminates the staffing requirements. For future perspective, the wireless architecture can also support the scalability of Local area network and Wireless Local Area Network to an enterprise level. The advantage for using Cisco technology gives the wireless network a stride forward by ‘Cisco Clean Air Technology’. This technology protects the performance of ‘802.11n’ by extenuating Radio Frequency (RF) interference. 3.2.2 Cisco 4400 Series Wireless LAN Controllers The ‘Cisco 4400 wireless LAN controller’ supports a variety of wireless LAN functionality consisting of security policies, intrusion detection system (IDS), quality of service (QoS) and mobility. The framework of ‘Cisco 4400 Wireless LAN Controllers’ consists of ‘Cisco access points’ and ‘Cisco wireless control system’ to support efficient wireless connectivity. ‘Cisco 4400 series Wireless LAN Controller’ provides scalability, security and reliability for the wireless network. 3.2.3 Cisco Clear air Technology The ‘Cisco Aironet 1500 series access points’ will transmit and receive data via wireless technology ‘802.11n’ which support up to 70 Mbps. However a minimum requirement for the wireless network of TAS is ‘802.11a’ which supports up to 54Mbps. By implementing the wireless devices empowered by Cisco, ‘clean air technology’ delivers this speed benchmark with high reliability to support the essential application, video and voice throughput. On the other hand this technology eliminates the interference which is caused by the characteristics of radio frequency transmission. The network administrator can analyze the wireless network due to visibility in to the wireless spectrum provided by ‘Cisco Clean Air Technology’. The uniqueness of this technology also includes the intelligent automatic adjustments of Radio Frequency (RF) interferences within the network to optimize wireless coverage. The user interface provides access to real time statistics of devices and systems located anywhere within the network so that the network administrators can apply policies on instant basis without disrupting services. 3.2.4 Cisco service mobility engines The ‘Cisco 3300 Series Mobility Services Engine’ integrates the local area network in to mobility networks. The requirement for voice communication within the 10 stores, TAS requires support for ‘IP telephony ’and‘ wireless accesses within the sites, ‘Cisco 3300 Series Mobility Services Engine’ plays a vital role. (Ccna wireless st.gd.W/Cd2010) The engines include the provision of mobility services from the local area network. It offers reliability and management in application deliverance to the mobility services. The ‘Cisco 3300 Series Mobility Services Engine’ supports a variety of services. 3.2.5 SOAP and XML Support Unified application delivery integration with the Wi-Fi, LAN, Wi-max and cellular networks, reduces the operational tasks and complexities associated with the requirements of the network. The ‘Cisco 3300 Series Mobility Services Engine’ supports ‘API’ on Simple Object Access Protocol (SOAP) and extensive Markup Language (XML) for third party application development. It supports the simultaneous delivery of compound mobility services with centralized distribution and configuration for all network topologies (Paquet, 2009). 3.2.6 Cisco Context aware Services The ‘Cisco Context aware Services’ are the built in components of the ‘Cisco Service Mobility Engine 3300 series’. This value added service helps the business applications by capturing, and combining intelligence from various points in the network. The captured intelligence from the network is then interpreted in to the business requirements to optimize the deliverance of mobility applications. ‘Cisco Context-Aware software’ is a major element of the ‘Cisco Context-Aware Mobility solution’, which enlarge the base of the ‘Cisco Unified Wireless Network architecture’. A ‘Cisco mobility service’ is an application instance operating on the ‘Cisco 3300 Series Mobility Services Engine’. It has the following capabilities (Henry, 2012): • “The service acts across multiple edge technologies such as 802.11 wireless and 802.3 wired networks. • The service provides a value-add function across multiple network elements. • The service provides an interface to that value-add function to external applications and servers using a mobility services engine API. • The service adds intelligence to the network through its function to enhance the usability of the network. • The service provides visibility into the network that otherwise applications and servers would not easily obtain. • The service can be combined with other mobility services to achieve higher order functions. • The service can be managed using the mobility service API. • The service can be deployed across multiple MSEs to scale the function it provides” 3.3 Wireless Intrusion Prevention System (W IPS) (For Wireless Networks) This security feature is integrated within the ‘Cisco Unified Wireless Network Architecture’. ‘WIPS’ provide specific threat detection methodology and improved protection against malicious code, unauthorized access, security vulnerabilities and other sources which may disrupt the network performance. The ‘Cisco WIPS’ analyze and identify wireless threats and manages mitigation and resolution of security and performance concerns on a centralized point. Most wireless networks are not designed to protect the network core which is impenetrable by most wireless networks, while ‘Cisco WIPS’ has proactive threat protection to eliminate attacks on network cores. ‘Cisco Wireless LAN Controllers’ are integrated within the enterprise networks core infrastructure. They communicate with ‘Controller-based Access Points’ over ‘Layer 2’ or ‘Layer 3’ infrastructure of the ‘OSI’ model. These devices support automation of numerous ‘WLAN’ configuration and management functions across all enterprise locations. 4 Firewall Firewalls are the most essential component in the context of network security. Viruses are generated on a daily basis adopting different methodologies to invade the networks and disrupt services. The first point of contact for viruses and malicious software are the firewalls. The firewall policies include the access list containing the file extensions, file names, data packet sizes, traffic from trusted networks etc. The rules and policies are set by the network administrator according to the network requirements. As the TAS have remote sites, ‘Cisco ASA 5500’ firewall with built in intrusion detection system is recommended. This security appliance will serve as an all-rounder to protect the network at an optimal level, at the same time saving the cost for purchase of a separate security appliance. As a fundamental part of the Cisco products family, Cisco Intrusion Prevention System (IPS) is a preference for small medium and corporate networks. They provide protection against more than 30,000 known threats, with timely signature updates and Cisco Global Correlation to dynamically evaluate, identify and eliminate emerging Internet threats. The most widely knows threats from which the ‘Cisco IPS’ protects are directed attacks, Worms, Malware, and Application abuse (Frahim & Santos, 2013). The major element for the Cisco Secure Borderless Network, the Cisco ASA 5505 Series Adaptive Security Appliances deliver better scalability, a broad span of technology and solutions, and efficient, always on security considered to meet the requirements of a huge array of deployments. Due to incorporating the world’s most famous and secure firewall, a wide ranging, highly efficient intrusion prevention system (IPS) along with Cisco Global Correlation and assured coverage, high-performance VPN and always on remote access, the Cisco ASA 5505 Series supports secure, high-performance connectivity and protects critical assets in any organization for the utmost productivity. The Cisco ASA 5505 Series is the Adaptive Security Appliance for the next-generation. It is integrated with full-featured security appliance for undersized organizations, remote offices and enterprise teleworkers environment. The Cisco ASA 5505 Series offers high-performance firewall, SSL and IPsec VPN and rich networking services in a modular, “plug-and-play” appliance. While utilizing an integrated Cisco ASDM, the Cisco ASA 5505 is speedily deployed and easily managed. Thus enabling organizations to minimize operations cost. The Cisco ASA 5505 provides a supple 8-port 10/100 Fast Ethernet switch. These switches are dynamically joined together to generate up to three separate VLANs for home, business and Internet traffic enhanced network segmentation and security use. The Cisco ASA 5505 offers two powers over Ethernet (PoE) ports ease the installation of Cisco IP phones along with the zero-touch secure voice over IP (VoIP) functionalities. Moreover, the implementation of the external wireless access points is available for the extended network mobility. Another high-performance intrusion preventions and worm mitigation service is also available with the addition of the AIP SSC services. Therefore, multiple USB ports are used to allow the additional services and functionalities to access when needed. The Cisco ASA 5505 Series helps an organization to improve their effectiveness and efficiency related to the protection of their networks and applications that are linked with them. In fact, exceptional investment protection procedure can be gained while following these elements mentioned below: 1. The Cisco ASA 5505 Series incorporates various full-featured, high-performance security services, consisting number of applications for example firewall, SSL and IPsec VPN, IPS including Global Correlation and definite coverage, antivirus, anti-spam, anti-phishing and web filtering services (Deal, 2009). Moreover these technologies along with the real-time reputation technology, helps to distribute highly effective network and application-layer security, user-based access control, worm mitigation, malware protection, enhanced staff’s productivity, quick messaging and peer-to-peer control, and secure remote user and site connectivity. (Deal, 2009) The single IPS that is the market’s most famous technology, Cisco IPs with Global Correlation offers double efficacy of legacy IPS and consist of assured coverage for the improved peace of mind. Thus providing flawless user and user-less access for a broad spectrum of system and remote platforms, the Cisco ASA 5585-X transports always-on secure mobility with incorporated web security and IPS for the policy makers and threat protection specialist (Deal, 2009). 2. The Cisco ASA 5505 Series recommends strong business, sheer protection from the fast-evolving risk environment with the help of its unique combination of applications and software extensibility and its powerful Modular Framework (MPF). These applications are designed as a modern extensible multiprocessor. In fact the software architecture of the Cisco ASA 5505 Series allows an organization to easily establish an additional high-performance security services with the help of security service processors (SSPs), security services modules (SSMs) and security services cards (SSCs). This will enables the organizations to invest without any risks and helping them to expand the security related services of their Cisco ASA 5505 Series as their initial security providers. The overall services that are provided by this are easily managed with the help of powerful Cisco Modular Policy Framework that allows an organization to generate highly customized security related policies. Thus making this procedure more easy and simple to add new security and networking services into their vacant policies (Deal, 2009). 3. The Cisco ASA 5505 Series allows a standard regarding the consistency on a single platform in order to reduce the entire operational cost of security. This will help to lower down the training cost for the employees and also to simplify the configuration management procedure. On the contrary, the common hardware platform of the series lowers the sparing cost. In addition, the efficiency is configured with the help of deploying integrated capabilities, obviating the necessity for the complex designs needed to connect standalone solutions (Deal, 2009). 4. The Comprehensive management interfaces-The graphical Cisco Adaptive Security Device Manager (ASDM), a comprehensive command line interface (CLI), verbose sys log, and Simple Network Management Protocol (SNMP) support round out a rich complement of management options. Moreover, a platform is provided in order to support Multi-unit deployments and their advantages related with the Cisco Security Manager. This helps in managing disturbed deployments of more than hundred devices at a time (Deal, 2009). References Angelescu, S. (2010). CCNA certification all-in-one for dummies Wiley. Ccna wireless st.gd.W/Cd (2010). McGraw-Hill Education (India) Pvt Limited. Deal, R. (2009). Cisco asa configuration McGraw-Hill Education (India) Pvt Limited. Henry, D. J. 2012,CCNP wireless (642-747 IUWMS) quick reference, 2nd edition Cisco Press. Frahim, J., & Santos, O. (2013). Cisco asa: All-in-one firewall, ips, and VPN adaptive security appliance Cisco Press. Parsons, J. J., & Oja, D. (2009). Computer concepts 2010: New perspectives Cengage South-Western. Paquet, C. (2009). Implementing cisco IOS network security (IINS): CCNA security exam 640-553 (authorized self-study guide) Cisco Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Athlete's Shack Wireless Upgrade Term Paper”, n.d.)
The Athlete's Shack Wireless Upgrade Term Paper. Retrieved from https://studentshare.org/information-technology/1464664-the-athleteyies-shack-wireless-upgrade
(The Athlete'S Shack Wireless Upgrade Term Paper)
The Athlete'S Shack Wireless Upgrade Term Paper. https://studentshare.org/information-technology/1464664-the-athleteyies-shack-wireless-upgrade.
“The Athlete'S Shack Wireless Upgrade Term Paper”, n.d. https://studentshare.org/information-technology/1464664-the-athleteyies-shack-wireless-upgrade.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Network for The Athletes Shack

K-Swiss: Not Running Fast Enough

A sharp drop in sales, including a 34 percent drop in domestic sales, caused second-quarter 2007 profits to fall for K-Swiss Inc.... the Westlake Village, California company founded in 1966 by two brothers from Switzerland, Art and Ernie Brunner, avid skiers who penetrated the sports footwear market with the first all-leather tennis shoes priced three times that of others in the market. … In 1986, Steven Nichols bought the company for $20 million....
22 Pages (5500 words) Research Paper

How the Fourth Revolution is Changing the World and How Newspapers Must Take Advantage of It

Online social networks are being used for all kinds of businesses in order to provide information to potential users and customers that will increase… The newspaper business is in peril of becoming obsolete because of the nature of the information that is available online.... In using technologies such as online social networks, newspapers can explore ways in which to take advantage of all the ways in which to exploit the In a qualitative study that attempts to explore the many ways in which users are experiencing the use of Facebook and Twitter in reference the The Sun and The Daily Telegraph, the ways in which the newspaper industry can find advantages to using online social networks will be examined....
35 Pages (8750 words) Essay

The Effects of the Media Violence on Violent Behaviours

However, less or no consideration to female athletes, high achieving students or business champions have cut off the interest of sponsors, viewers and general population.... Portraying them in their swimming costumes (instead of their sports uniform) and interviewing them about their marriages and personal issues make it more difficult for women to prove their existence in the sports world as great athletes....
10 Pages (2500 words) Essay

Vodafone in United Kingdom

The researcher of this essay aims to analyze Vodafone in the United Kingdom.... This research will begin with the evaluation of Vodafone's competitive environment; Vodafone's market positioning strategies; Porter's theory and resources and capabilities of Vodafone.... hellip; The purpose of this research is to investigate the following: cultural change in Vodafone; strategic change/ Drift; Vodafone development change; Vodafone method of development; Vodafone role of corporate parenting; Vodafone's different Eras; Vodafone portfolio development since Vittorio Colao became CEO; Vodafone Business strategy....
6 Pages (1500 words) Coursework

BRITISH ELITE ATHLETE DEVELOPMENT AND ITS ORGANISATIONAL PERSPECTIVE

athletes that represent Great Britain come from Northern Ireland, the United Kingdom and all of its overseas territories except three as well as the 3 states that depend on the Crown.... Managers in athletics have the task of overseeing the development of athletes from average performers to elite performance with the ability to perform competitively with the best athletes from all over the world.... In light of the competitive nature of elite sport, the biological, psychological and physical development of British athletes is crucial to the attainment of expertise and successes in representing Great Britain in both international and local sport events....
14 Pages (3500 words) Research Paper

Utilizing Drivers of Consumer Behavior in Effective Marketing of Samsung

The main objective of the study "Utilizing Drivers of Consumer Behavior in Effective Marketing of Samsung" is to outline the general abstract principles of buyer behavior.... Furthermore, the writer will develop recommendations regarding marketing strategy for Samsung company.... hellip; Consumer behavior is defined as the learning of how the individual customers, organizations or groups buy, use, select and dispose of services, ideas, and goods to satisfy or please their wants and needs (Mooij, 2010)....
10 Pages (2500 words) Case Study

The Olympics Comes to London in 2012

The objective of the "The Olympics Comes to London in 2012" paper is to unveil the information systems been implemented by the Olympic team in preparation for the Olympics games in 2012.... The paper is to explore the teams contacted for the implementation of the information systems.... hellip; There has been a body responsible for the integration of the various systems developed by the various expert groups....
11 Pages (2750 words) Term Paper

The Athletes Shack Wireless Upgrade

The paper "The Athlete's Shack Wireless Upgrade" discusses that for catering to the needs of the business for TAS, there is a requirement of secure and effective wireless network connectivity for all the 10 stores within the same area.... Cost is also a major factor when implementing and designing a wireless network.... Moreover, after securing the data in transit by encryption, we have also proposed a wireless intrusion prevention system that will continuously monitor and prevent the network from cyber threats....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us