StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Architecture - Research Paper Example

Cite this document
Summary
These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security. These…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Network Security Architecture
Read Text Preview

Extract of sample "Network Security Architecture"

Running head: Secure Wireless LAN Architecture SECURE WIRELESS LAN ARCHITECTURE According to Hermans (2005) there are two major methods for implementing WLAN networks today, both of which involve Wireless 802.11 standard. These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security. These architectures are namely the Centralized and Distributed AP WLAN architectures. The former requires one or multiple servers or switches to be deployed while the latter approach is more coherent to the IEEE 802.

11 standard. The IEEE 802.11 specifies a group of technologies governing wireless Ethernet connectivity between client devices and wireless hubs connected to a physical network, (Conover et al., 2000). When analyzing the vulnerability of a WLAN, it is crucial to identify the trusted and un-trusted parts. The security edge in the Centralized approach is the WLAN switch. Here, the Access Points lack strong encryption or authentication technology hence making it vulnerable to rogue inappropriate communication between APs.

In Distributed Architecture, on the other hand, security is extended to the client devices where strong encryption occurs at both the APs and client devices along with authentication. This makes attacks more difficult because the security edge is closer to the users. In this case, a Distributed Architecture can be considered more superior to the centralized architecture as the APs handle the packets and only traffic management needs to go to and from a central point. Careful planning, implementation and management are needed to eliminate WLAN security risks in an organization.

This can be aided by establishing security policies and practices, separating internal networks logically, eliminating unnecessary protocols, protecting wireless devices, restricting AP connections, enabling VPN access only, among other measures. ReferencesConover, N. (2000, July 11). Wireless LANs Work Their Magic. Retrieved from Symantec: http://www.networkcomputing.com/1113/1113f2side2.htmlHermans, J. (2005, February 16). WLAN Architecture- Best Practices. Retrieved from Ultra Electronics: www.

ultra-3eti.com/assets/1/7

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Architecture Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Network Security Architecture Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1638493-network-security-architecture
(Network Security Architecture Research Paper Example | Topics and Well Written Essays - 250 Words)
Network Security Architecture Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1638493-network-security-architecture.
“Network Security Architecture Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1638493-network-security-architecture.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Architecture

Why Do We Need Content-Centric Networking

Given that the architecture allows caching effects as an automatic consequence of packet delivery, memory can be utilized without building costly application-level caching services.... Name data networking or content-centric networking represents an alternative approach to the architecture of computer networks.... The modern internet architecture centers on a host-based conversation model generated to enable geographically distributed users to utilize a number of significant, immobile computers....
4 Pages (1000 words) Essay

Detailed Description of the LTE Issues

These include the quality of service security challenges.... These include packet loss, delay, jitter and the issues with the original wireless security standards.... This implies that some packets are lost along the network.... The first is through network packet loss as a result of overflow in the router buffer, transmission error, rerouting and link failures.... The delay originates from different points such as at the receiver, at the network or at the source....
3 Pages (750 words) Essay

Firewall Architectures and Techniques A study on the high speed network security they provide

There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall. … The project is intended to describe and evaluate firewall architectures and techniques and network security they provide.... The firewall is the central issue of the network security policy of the enterprise that defines procedures to protect the network and its contents and users from loss and damage. Firewall Architectures and Techniques: A study on the high-speed network security they provide INTRODUCTION 1 Introduction to the problem being tackled, and the rationale behind choosing the problem With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world....
2 Pages (500 words) Essay

What is Technology, Green Architecture and Green Electricity

reen architecture is highly crucial in 21st century because it allows architectures to create solid foundation of building at a micro level.... The concept of nanotechnology has became a crucial aspect for creating architecture since it is a fairly new idea....  Architect Magazine: Architectural Design | Architect Online: A premier site for architecture Industry News & Building Resources.... The whole is undoubtedly a vital components for organization as it upholds security, embeds flexibility and allows corporations to implement a modern IT system....
2 Pages (500 words) Essay

The Advantages and Benefits of the Wireless Networks

t is very essential that the authorities had the responsibility of deploying the wireless network are aware of the solutions they are seeking from the new network that is not readily available in the traditional wired network architecture (Trulove, 2002).... epending on the deployment area, age of wired infrastructure, building architecture, and types of applications to be supported both stand-alone and centrally coordinated architectures have advantages and disadvantages....
7 Pages (1750 words) Research Paper

Border Control Using Wireless Sensor Technology

Wireless border control sensor network architecture is made up of three main components: sensor nodes, gateways, and task managers.... Sensor nodes are the components at the end of the architecture which capture the data at the border (through sensing).... The task managers are the receiving ends of the wireless border control sensor network architecture.... They are being widely applied in security, military, and agriculture owing to their automated ability to… In border control, they are preferred in that they can monitor borders without requiring physical personnel and again, they are not detectable by intruders....
4 Pages (1000 words) Research Paper

WAN Architecture Overview

The paper "WAN architecture Overview" explains the success of any organization due to its ability to reach the customers.... The need for the WAN architecture technologiesOne of the key needs of the WAN architecture to an organization is to provide faster access to files.... he WAN architecture is also of great need particularly in effective management of remote organization offices.... nother indispensable need of the WAN architecture is the ability to reach the global customer base....
6 Pages (1500 words) Case Study

Quality of Service in Networks

o best understand the full implications of applying QoS to systems discussed within this essay it is first essential to understand a little of the basic QoS architecture and management therewith.... Basic QoS architecture The three fundamental architectural components upon implementation of a QoS system are:QoS identification and marking techniques for coordinating QoS from end to end between network elements,QoS within a single network element (queuing, scheduling and traffic-shaping tools), andQoS policy, management and accounting functions to control and administer end to end traffic across a network (Cisco Systems, 2002)....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us