Types of Network media

There is many media type. I will choose three type of media. They are –

The primary type of twisted pair cables

The primary type of coaxial cables

The primary type of fiber optic cables

Network media is the actual path over which an electrical signal travels as it moves from one component to another. I want to explain the common types of network media, including twisted-pair cable, coaxial cable, fiber-optic cable.
Twisted Pair Cable
Twisted pair cable is can use for telephone communication and can cable ethernet networks. A pair of wires that can transmit data. When electronic signal through a wire, that create small magnetic field around a wire. When place two wire together, the magnetic fields are opposite of each other. So, two magnetic fields are disappear. They can distory any magnetic fields outside. There are two type of twisted pair cable, unshielded twisted pair (UTP)and shielded twisted pair (STP).
UTP Cable
UTP cable is used for various networks. This cable include eight copper wires covered by an insulating material. UTP cable canceling effective of electromagnetic interference (EMI) and radio frequency interference (RFI). UTP cable is install using the Registered jack (RJ 45) connector. The RJ-45 has eight wire connector. UTP cable is used to connect local-area network(LAN).
Advantages of UTP cable
UTP cable has many advantages. The cable size is small (approximately 0.43 cm) and easy to install. This cable price is less than other type of network cable. UTP has no wiring ducts as other network cable. It can be most important to consider when installation a network in a building.
Disadvantages of UTP cable
Twisted pair cable has also disadvantages. However, UTP cable is more avoid electrical noise and interference than other network cables. UTP cable transmit short signal than coaxial cable and fiber optic cable.
Coaxial cable
Coaxial cable is made of outer hollow conductor and inner wire made of two conducting element. The center of a cable is made of copper wire. Copper wire has surrounding by flexible insulation. Metallic foil is coted over the insulating called second layer. Second layer is reduce the amount of outside interference. Coaxial cable is support 10 to 100 mbps of transfer rate. Coaxial cable is little expensive than UTP cable. However, coaxial cable can cheaper in physical bus topology. Coaxial cable can cabled long distant than UTP cable. Twisted pair cable can run 100 meters(328 feets). Using coxial cable, distance is 500 meters(1640 feets).

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Fiber optic cable
Fiber optic cable can carry more data in longer distance with light signal than electrinic signal carry coxial cable. Fiber optic cable can run 100km(60 miles) without amplifing the light signal. Fiber optical can be used medium for telecommunication and networking because it is more flexible than other cable. Light transmition through the fiber due to reflection within the material.
Advantages of fiber optic cable

Disadvantages of fiber optic cable
Disadvantages of fiber optic cable is cost and durability. That cable is more expensive the other cable.
Network Topology
Star Topology
This topology is common type of topology used in home and office. At the star topology, central connection called hub which is computer hub or switch. The best advantages is – something fault in cable, only one computer can get bad affected and not entire network.
Advantages of star topology

Star topology is simple in function and easy to manage

In star topology, problems can be easily located and easy to troubleshoot

The Star Topology is very simple in format so it is very easy to expand on the Star Topology.

Star Topology Disadvantages

In star topology, entire network is fully depend on hub or switch

If there is many nodes, cable is long to connect and network can be slow down

Mesh topology
In mesh topology to complete, all the nodes are connected to each other. On the network throung hops, every node is connect to other nedes. Some nodes are connect to single hops and some nodes are connect with more than one hops. Mesh topology include the concept of route. Unlike other topology, message can send several path from source to destination.
 

Network Management Justification for Handmade Furniture Ltd

 
Based on the initial inspections carried out recently, Handmade Furniture Ltd has experienced difficulties managing the IT infrastructure as well as providing IT support for staff. The existing network management and support services are carried out in an uncontrolled procedures which have resulted in number of data losses and possible hacking attempts. This can lead to future compromises such as financial losses, disruption of services etc., which can tarnish company’s reputation.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

This report includes the justifications of selecting network management plan for the company based on the current infrastructure and future implementations. The selection of the choice should consider multiple criteria which are costs, security and administrative controls as key points along with technical expertise.Report consists of terms of reference followed by justification for the selection of network management plan, elements of network management plan, options for improving IT support and recommendations.The suggested network management plan will be extended for the proposed network infrastructure and security upgrade project in near future.
The scope of this report is to provide guidance on selecting an option for IT support by preparing a network management plan. The reports prepared for the reference of the Handmade Furniture Ltd board members. Report includes key elements of the network management plan and excludes technical details of design or configurations and product descriptions. Main sections are the elements of network management plan including fault management, configuration management, accounting management, performance management and security management. There will be several follow up reports after which include technical plan. This will be submitted after the IT staff have been hired.
Overview
It is suggested to have own IT support staff and completely manage and maintain IT support in-house for an agreed number of months. Once the IT operations are streamlined and new upgrades completed, IT support outsourcing option needs to be selected.
As the Initial step, Handmade Furniture Ltd should identify the IT staffing needs. This should include identifying the job role, qualifications and experience level and the communication hierarchy. This step requires in-house human resource skills to recruit staff based on the recommended staffing needs. The option of selecting permanent IT staff or contract staff needs to be done carefully. The higher level positions need to be permanent whereas desktop support etc. can be on contract basis. Furthermore, the web development project needs to be outsourced as there is no need to have a permanent web developer in-house.
Once the IT staff are available, next step is to assign job roles and duties to the staff. Along with the job roles, the immediate supervisors need to be listed. In addition to daily job role, IT team will have additional work to streamline the current network infrastructure and the operational procedures. Most important point is to have backup staff. Each IT job role needs to be backfilled with another staff member.
There will be two sub plans included in the management plan. These are :
1. Plan to manage the network infrastructure restructuring.
2. Plan to maintain the new network operations and procedures.
First sub plan will provide IT staff with adequate training to prepare for the upcoming network upgrades. Second sub plan is to use in-house IT staff for network management within the company.
Justification of network management plan selection
As opposed to IT support outsourcing, use of in-house IT staff has several advantages. Considering the existing network issues and incidents as well as operational procedures, company needs to have major changes. Subsequently this can result in backup/archiving company’s data, changing passwords and creating user accounts etc.  The most important asset of the company is its data. Therefore, use of an outsourced party to handle company’s data is not a recommended practice. (Vigeant, 2015). The upcoming project for network upgrades include implementing a WIFI system, upgrading all PCs  and  moving emails and systems  to cloud. These tasks require handling user accounts, data as well as security procedures . There will be high level of readiness for the future projects by establishing an in-house IT staff.
One of the downside of the in-house IT staff is the operational cost when considering employed funds, claims and expenses. On the other hand, there is a big competition between the IT support companies offering attractive costs for maintaining networks. However most of these offers include limited number of support engineers compared to a team of staff available in house. The more support staff available in the outsource team more budget required. (Rossi, 2016)
Another advantage is the efficiency of communication. With an in-house IT support team, there will be two levels of communication between staff and the manager or senior staff member. With an outsourced IT support team, there can be multiple levels of communication such as between managers/senior staff, senior level to junior level etc.
A help desk is required to manage IT support requests handled by an outsourced IT team. At the current level, company should streamline the IT operations before implementing a help desk. Therefore, company is not in a good position to outsource IT operations.
With the implementation of new proposed IT procedures such as cloud based email, etc. there can be more frequent support incidents as users are new to these applications. Assign to handle a large volume of incidents by an outsourced team can be expensive and inefficient without implementing a help desk. On the other hands, once new systems and network elements are in place, there can be an increase in IT support incidents. Therefore, having more IT support staff in house can be an extra cost. At this stage, best option is to outsource IT support. (Vigeant, 2015).
One of the major decision point of the selection of in-house or outsourced solution is the size of the network. Generally a network with 50-100 PCs is consider as a small to medium business. It is not required to have a large IT support team as the supports requests can be handled in house. (Gluck, n.d.).
Followings are the key benefits of outsourcing IT support (Editors, n.d.)
·               Reduce labor cost
·               Can focus on key business
·               Less training is needed as outsourced IT staff should have the required skills.
IT Staff requirements
Selecting skilled IT staff is essential for the successes of the management plan .There are no IT staff to train the new staff, So the new IT staff need to be able to work with minimum supervision and guidance. Following is an overview of the skills required.

Role

Skills/Qualifications

Experience

Comment

Head of IT

PM, Information security, Networking

10+ Years

Optional ( If available in house)

Senior network administrator

Microsoft Windows server, Wireless networking, Cloud office 365

5+ Years

Network administrators

Microsoft Windows server/desktop, Wireless networking, Cloud office 365,cabling

3-5 years

Desktop support

Microsoft Windows desktop, Hardware, Wireless networking

1-2 Years

Web Developer

Web design/development skills

3-5 Years

Needs to be outsourced

Table 1: In-house IT staff requirements
Job roles for IT staff
This is important to define level of authority and responsibilities. At present, there are unrestricted controls between staff. Most important point is that no single person assigned responsibilities. Each task should have a backup person assigned.
Security management -Install and configure central antivirus console
This is required because currently the virus guards are installed as standalone in each PC. Monitoring of virus guards is not easy with this setup. It is not a good practice to assign users to monitor virus guards. Installation of new antivirus has to be done by the network administrators and the monitoring needs to be done on daily basis by the SNR network administrator. Also, a report on a given frequency can be submitted automatically to head of IT. (Safari, n.d.)
Accounting Management -Configure a central backup plan
User data for all the PCs has to backup automatically to a central storage. Existing NAS storage can be used for this. The important point is that data must be backed up automatically on a schedule. Two options available for this
1. Use backup software to backup files to NAS
2. Create folders for each user in server and the folders should backup to NAS storage.
Also network segments need to be used (Ex Virtual Networks or VLANs) to provide access control, based on users and groups. Also, a directory service is required so that each user has their own user account and password. This helps to apply access controls to folders and files based on user ownership.
Fault Management -Implement a help desk
The existing and current IT support requests can be better handled by implementing a help desk. Help desk provides reporting and monitoring facilities for support requests. (Safari, n.d.)  Once company plans to outsource IT support,this help desk can be useful to manage the outsource team as well. However, since all the offices and users are in one location, having a help desk is not mandatory and the implementation is subjected to cost.
Help desk has two options:
1. Develop a customized help desk (This needs to be outsourced).
2. Buy an off the shelf help desk product.
Configuration management -Network and operational procedure documentation
At present, there is no documentations about user accounts, configurations etc. This can cause critical issues especially in a crisis situation. As an element of the network management Plan, Company should start documenting all networks and IT related configurations, credentials etc. All changes have to be approved by head of IT and a sequence of version needs to be used. Documentations need to be stored as hard copies and soft copies in a secure place. (Safari, n.d.)
Performance management – Implement a network monitoring system
There needs to be a network monitoring system (NMS) which provides network performance, speed, errors and alarms etc. in real time. This should have features to send alerts to administrators via SMS, generate reports etc.  One of the examples of a NMS is SOLARWINDS. (Solarwinds.com, n.d.)
  Diagram 1-  Monitoring plan work percentage
As shown in the diagram above overall management plan can be divided into 5 phases according to FCAPS model for network management. Out of these phases configuration management requires highest amount of time and effort followed by fault management.  The reason for this is that currently there is zero level of documentation. Also no standard fault management procedure is in use.  Performance management requires less effort as the network is currently in acceptable performance level. Under accounting management more work will need to be done in proposed future project as there is a need for a directory to manage user accounts via server.

Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

Two options for having in-house IT staff at the initial stage is either to hire permanent staff or hire contract staff. Company needs a senior level IT manager on permanent basis to manage in-house IT staff as well as any future outsourcing requirements.  Desktop support and junior network administrators can be hired on contract basis either on an hourly rate or a fixed cost. However, the IT manager should ensure that all work done is being documented in order to provide continuous support services. After the initial stages of the management plan there should be reviews to decide to go with an outsourced option or to continue in-house IT support.
The website development and help desk implementation work needs to be outsourced. Having these resources in -house is an additional financial overhead.Two options to outsource IT support services are either to  outsourced engineers internally within the company or to request support as required using either on-call or remote support. The first option requires extra operational cost for space, electricity and power etc. However, this option is more recommended than the second option. Second option requires service level agreement (SLA) with strict terms on initial response time. Also, this option requires a help desk to be maintained to log incidents and manage response time.
In terms of help desk a customized help desk is most suitable as most of the off the shelf packages have extra features which is not required and is adding extra cost. Also, most of the outsourced companies offer a help desk service, included in their services being offered. This can be considered as well.
It is recommended to have in-house IT staff for the initial stages of the network management plan and for the duration of proposed new network upgrades.  Company has to take the decision of continuing with in-house IT staff or outsource IT support services at the end of the implementations. The decision might be based on cost, number of incidents, as well as other operational policies and procedures. Having an in-house senior level managerial position to provide overall management of the IT services is mandatory.
At present, company has zero level of IT support. From this point up to the completion of network upgrades, continuous support service is required with extra effort involving outside of the office hours work as well. With an IT outsource team, this is not practical as there are agreed work time in an outsourced agreement. The extra hours might be charged separately with a higher rate.
Use of FCAPS model for network management is recommended as the five areas of these models is essential for the management plan. Documentation plan is an important sub plan of the overall plan. Company needs to start from level zero in documentation. Documentation includes network configurations, user accounts and passwords, file permission for users, backup plan as well as hardware warranty and software license vendor details.It is expected to increase efficiency after implementing the help desk. Managing operational procedures through help desk saves time and cost.
The final conclusion is that Handmade Furniture Ltd requires in-house IT staff at the initial stage of the network management plan. Further they should recruit a senior level person as the level of CIO and head of IT for overall IT management role. In addition to this, company should start documenting all IT related work, configurations and procedures.
Editors, A. (n.d.). The Benefits of Outsourcing for Small Businesses | AllBusiness.com. [online] AllBusiness.com. Available at: https://www.allbusiness.com/the-benefits-of-outsourcing-for-small-businesses-2-1084-1.html [Accessed 27 Feb. 2017].
Gluck, S. (n.d.). Benefits Vs. Risks of Outsourcing IT Services. [online] Smallbusiness.chron.com. Available at: http://smallbusiness.chron.com/benefits-vs-risks-outsourcing-services-2504.html [Accessed 26 Feb. 2017].
Phifer, L. (2003). WLAN security: Best practices for wireless network security. [online] http://searchsecurity.techtarget.com/. Available at: . http://searchsecurity.techtarget.com/WLAN-security-Best-practices-for-wireless-network-security [Accessed 26 Feb. 2017].
Rossi, B. (2016). In-house vs. outsourced IT: what makes the most business sense?. [online] Information Age. Available at: http://www.information-age.com/house-vs-outsourced-it-what-makes-most-business-sense-123461194/ [Accessed 26 Feb. 2017].
Safari. (n.d.). Example of Adapting a Network Maintenance Model [Book]. [online] Available at: https://www.safaribooksonline.com/library/view/ccnp-routing-and/9780133149906/ch01lev3sec14.html [Accessed 27 Feb. 2017].
Solarwinds.com. (n.d.). Network Management Software – Network Tools | SolarWinds. [online] Available at: http://www.solarwinds.com/network-management-software [Accessed 27 Feb. 2017].
Vigeant, S. (2015). In-House vs. Outsourced IT Staffing: The Pros and Cons. [online] Dataev.com. Available at: http://www.dataev.com/it-experts-blog/in-house-vs.-outsourced-it-staffing-the-pros-and-cons [Accessed 25 Feb. 2017].

The Proper Definition Of A Social Network Site

The purpose of this paper is to educate you with the proper definition of a social network site, a brief overview of its history and how they have evolved to being used in almost every facet of life today.
Social Network: Definition
Social network site is a web-based service that allows individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system (Boyd, & Ellison, 2007).
While the term ”social network site” is used to describe this concept, the term ”social networking sites” is also commonly used, and both can be used back and forth. I refrained from using the term ”networking” for two reasons: emphasis and scope. ”Networking” signifies intent of a new relationship, more often than not between strangers. Although people do network on these sites, it is not the main attraction, nor is it what makes them stand out from other forms of computer-mediated communication. The term “community” refers to networks that are ethnically homogenous.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The uniqueness of social network sites does not come in the fact that they allow individuals to meet new people, but rather that they allow users to identify and publicize their social networks. This usually results in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between ”latent ties” (Haythornthwaite, 2005) who share some offline connection. On most of the popular social networking sites, members do not actually ”network” or look to meet new people; instead, they are primarily communicating with people who are already a part of their extended social network. To emphasize this articulated social network as a critical organizing feature of these sites, we label them ”social network sites.”
As mentioned earlier, while social network sites may have a number of unique features to them, their background still consists of people’s profiles that display a list of their friends who are also members of the site. Profiles are a one page summary of an individual. When an individual newly joins a social network site, they are typically asked to answer basic questions that help to create one’s profile. They typically ask for your name, age, sex, interests and location. There is also a section that allows one to upload a photograph and some networks even allow users to upload music and themes to enhance the look of their profile page.
Once a user has joined a social network, the next step is typically to identify other friends on the system or network and request access to their profiles and/or networks via a “friend request”. The term ”Friends” can be misleading, because the connection does not necessarily mean friendship in the everyday vernacular sense, and the reasons people connect are varied (Boyd, 2006). At this stage, users can scroll through their friend list and view each friend’s profile and their friend list. Some networks may permit access to profile pages in the same network even though a unique connection has not been established while others may not. Some even allow users to restrict access to their page. For example, if you are not directly connected to another user, you cannot view or have limited view to their profile page.
Another feature of most social network sites is messaging. There is usually a mechanism in place for friends to communicate with one another on the network. For example, if you like a friend’s profile photograph, there should be a way to tell them there and then. The most common lingua for such is “comment”. Friend’s comment on each other’s pages and pictures and some even have email-like services on the networks but not all started out like this.
History of Social Networks
According to the criteria used to define social network sites, SixDegrees.com was the very first social networking site. It allowed its users to create profiles, add their friends on the site and, beginning in 1998, view their friend’s profiles. Profiles existed on most major dating sites and many community sites. Some sites allowed users to list friends although no one else could view them. Others allowed members to join networks such as high schools or colleges and see others in their networks but they could not create profiles for years. SixDegrees was the first social networking site that allowed it users to do all these.
Figure
Although SixDegrees garnered much public acclaim, its attempt to be a sustainable business failed and as such, the service shut down in 2000. With hindsight, the developers believed that the site offered more than was required. Meanwhile at this time most people who began using the internet more often had no networks of friends who were constantly online. It brought about complaints of boredom online. There was basically nothing to do after adding friends because people were not interested in networking with strangers.
If you take a look at Figure 1, you can see a table that lists almost all the communities and social networks that have been established over a ten year period from 1997 to 2006. Some of these networks and communities did not actually have all the features that qualify them as a social networking site. Some names appear more than once as the years went by, the latter occurrence signifies their re-launch as a full social networking site.
From 1997 to 2001, AsianAvenue, BlackPlanet, and MiGente began supporting various combinations of profiles and publicly listed friends. They allowed their users to create personal, professional, and dating profile and they could identify friends on their personal profiles without seeking approval for those connections. In 1999 when LiveJournal came around, it facilitated single connections on user pages. On LiveJournal, users mark others as their friends in order to read their journals. Cyworld, the Korean virtual world site kicked off in 1999 and by 2001 it re-launched as a full social networking site with features such as friend lists, guestbooks and diary pages as did the Swedish web community LunarStorm.
After 2003, the social networking sites hit it big time. Several began to pop up for different reasons. While the basic profile based structured remained their purpose diversified – some were for friends meeting old and new ones while others sought to cater to a more professional and business minded demography. Care2 connected activists to one another, Couchsurfing networked travelers and people with couches and MyChurch brought together churches and their members. Gradually as user-generated content began to grow, attention shifted to sites like Flickr (picture sharing), Last.FM(music listening) and YouTube(video uploads).
Now most of these upcoming social networking sites were being launched from Silicon Valley where a lot of angel investors were pumping money into them and as such any site that developed outside of that area barely got attention. This is why some sites developed in the U.S had better reception outside the country. Examples will be Orkut(Brazil’s number one) and MSN Spaces.
The advent of MySpace was aided by the ailing Friendster. Rumors that Friendster would begin to charge its users only succeeded in putting the sword to the heart on the already ailing site. MySpace garnered most of its initial popularity from rock bands out in Los Angeles who were trying to get their names out. They used it to advertise their shows and club owners used it to advertise bands and ticket sales. The demographic for MySpace gradually shifted toward young teenagers and adults who liked music and wished to connect with their favorite artists. Another thing that the site had going for it was that it allowed users to customize their pages and add their favorite songs to their pages. This and the fact that some adults began using it to meet minors to solicit sexual interaction were part of the reasons that MySpace began to fall just shortly after it got purchased for about $540 million.
Apart from these network sites, there were others whose primary focus was a particular group of people such as when Facebook began in 2004. Facebook began in early 2004
as a Harvard-only SNS (Cassidy, 2006). To be a member, you had to be a registered student of Harvard University and use your school email address to register. With time, the network expanded but the restrictions still applied. It went to other schools but still required that a school email be used to register. This gave most people the perception that it was more of a community than a social networking site.
Benefits of Social Network Sites
Today social network sites are being used in very different ways that benefit a whole lot of people. Everyone seems to find a way to use them to their benefit. Consumers and manufacturers use social network sites to give and get feedback on their products. By analyzing feedback given by consumers on social network sites, blogs and other means, manufacturers have the ability to improve their sales, know when to up-sell and down-sell, they also know how to minimize cost of acquiring new consumers and many other methods.
In some countries, the leaders use social network sites as a means of getting closer to the people. Some representatives use it to get feedback from their people and listen to their problems. Leaders can explain to their people what exactly the implications of certain policies and they can also get input or public opinion on certain issues that may require voting in the house. It is an essential tool in modern day leadership and political campaign. The results of the last presidential elections held in the United States were predicted by analyzing feedback about the respective candidates on sites like Facebook and Twitter. It also helped the candidates in addressing campaign issues that concerned the people. Senator Obama even had a MiGente profile that he used to reach out to the Latin-American population during the course of his campaign.
Educators are finding new ways to engage their students in the learning process as well as improve teaching methods through social networking sites. Students across the world interact with one another via Skype, Twitter and Facebook during classes as a method of learning about other parts of the world and how they learn over there. In January 2009, Silvia Tolisano, a teacher in Jacksonville, Florida developed a project that involved over 300 participants in schools across the globe. The goal was to prove how helpful social networking sites can be in student education. According to her, “It creates a global awareness that there is a wider world out there and that we are not alone. They find it’s just as easy to collaborate with a class in England as with the class next door.”
Social network sites not only benefit the student, the educators as well benefit from sites like Twitter and Ning. While students haven’t become enamored with Twitter yet, it has become a hot spot for educators to find professional development and resources (Michelle R. Davis, 2010). One of the most popular types of educator events on Twitter are “EdChats”-one-hour conversations that take place every Tuesday around a particular topic. The chats are the brainchild of several educators, including Thomas Whitby, a co-creator of a 3,700-member Ning site called The Educator’s PLN, for “professional learning network.”
 

Network Security and Vulnerability Threat Table

LAN Security
Is the local area network that access control using the private VLANs and it’s a networking device within a small geographical area. They are not safe and secure compared to other networks because it’s easy to access the WLAN security compared to others its more of convenience over security thus it will help business and IT organizations to improve on their network by providing suitable choices for WLAN security for organizations to have a safe WLAN in their working place they must have procedures that outlines forms of double connections that are allowed in the work place for security purposes, also to consider security and its impacts to other networks for instance theWLAN ,to have client devices and APs,also to perform attack and vulnerability monitoring respectively to support this type of network and lastly to carry out a regular assessment about WLAN security in the organization.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The wireless system helps devices to connect to the computer minus them being connected to the network,WLAN consists of client devices for examples the laptops and the access points(APs),the APs connect client devices with distributing system(DS) and DS it’s the only way by which client devices can pass information or communicate with LAN and other networks. Also we have wireless switches that help the WLAN is administrators to manage it.
WLAN Architecture
It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security  thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices.
The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture, and independent.
Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case.
Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic.
Microcells and roaming; a microcell is an area coverage for an  AP,they help users to move between  access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect
Threats of WLAN
The following explains the security threats of WLAN that are likely to happen: eavesdropping, spoofing and denial of service
A) Eavesdropping
Involves attack against the confidentiality of data that is transmitted across the network, eavesdropping is a big threat because the attacker can intercept the transmission over air from a distance that is away from the organization
B) Spoofing
It is where the attacker could gain access to data and resources in the network by assuming the identity of a valid user this is because some networks do not authenticate the source address thus the attackers may spoof MAC addresses and hijack sessions.
C) Denial of service
This is where the intruder floods the network with either genuine or fake information affecting the availability of the network resources, WLAN are very vulnerable against denial service attacks due to the nature of the radio transmission.

LAN Security

Is a wireless networking device within a small locality that access control using the private VLANs.

Identity management

Is the system discipline whereby the right people access the right and valid information at the right moments and for good particular reasons.

Physical security

It’s the protection of the hardware, software, networks, and data from actions that could cause loss or damage to an organization for instance theft.

Personal security

Availability

Is the quality or state of information or data of being available and easily accessed.

Privacy

Is the state of a person to seclude himself or herself, or information about him or her, so it’s the procreation of information or confidentiality of data.

Cyberattactks in tabular format

Type of attack

Effect

Malware

It’s a computer code that a malicious function, used to destroy  or steal private data in a computer.

Password attacks

They attack on cracking a person or user is password so that the attacker may obtain access to a secured system.

Denial of service

Focuses on the interruption of a network service when an attacker sends volumes of traffic to the network that is targeted.

The following will be employed to mitigate the above types of attacks on the computer:
Threat intelligence reports, are documents that describe types of system and information that is on mission or the one being targeted and information important to the organization.
We have security alerts that are notifications about the current vulnerabilities and some security concerns.
Tool configuration is the recommendations for mechanisms that support the exchange, analyzing, and the use of threat information.
Indicators can also be used, they suggest or tell that an attack is imminent or its underway for instance we have the IP.
Plan of protections
openStego-it’s a free steganography that has the following functions:
Data hiding where it can hide data within a cover file watermarking files with an invisible signature.
Quickstego -helps someone to hide text in pictures so that its only users of quickstego who can be able to retrieve and go through those messages.
Oursecret -enables the user to hide text files for instance images and videos thus suitable for sending confidential information.
Veracrypt -it adds enhanced security to the algorithms used for system and partions encryption making it immune to new developments in brite-force attacks.
Axcrypt -it integrates seamlessly with windows to compress, encrypt, decrypt, store, send, and work with individual files.
GPG-it enables to encrypt and sign data, communication, as well as access modules for all public directories.
Cryptographic mechanisms to organization
Cryptographic is writing is in secret code within the context of any application and these are the requirements for it;
Authentication, privacy, intergrity, and non-repudiation
They include:schannel CNG provider model,ECC cipher suites,AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into  cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system.
Benefits
The use of using public keys enables individuals to convert data into the encrypted form.
Used to hide crucial important and vital information.
Helps in preventing leakage of vital data from a network
Helps in the authentication of users over the transfer or flow of data in electronic way.
Risks associated with these are that they make the problem of general key recovery difficult and expensive and too insecure and expensive for many applications and users as large.
File encryption tools
Veracrypt, axcyrpt, Bitlocker, GNU Privacy Guard and 7-zip
File encryption method
We have the following methods; exceptions, syntax, remarks and security
Results of the encryption files
They provide an overview and pointers to resources on EFS
They also point to the implementation strategies and best practices
Encryption technologies
Shift/Caesar cipher-it’s a tool that uses the substitution of a letter by another one further in the alphabet.
Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets.
Perfect cipher-these are ciphers that can never be broken even with after an unlimited time.
Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits.
Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system.
RSA-is a public-key in the cryptosystems and is used for the transmission of secure data.
Advanced encryption standard-it’s a cipher based on the substitution-permutation network and works fast in both the hardware and software.
Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text.
Text block coding-are the family of error-correcting codes that do encode data in bits.
Information hiding and steganography-is the process of concealing a file, video, image or file.
Digital watermarking-is the practice of hiding digital information in a carrier signal in the system.
Masks and filtering-masks show which of the part of the message is displayed.

Description

security architecture of the organization

It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security  thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices.
The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case.
Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic.
Microcells and roaming a  microcell is an area coverage for an  AP,they help users to move between  access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect.

the cryptographic means of protecting the assets of the organization

Cryptographic is writing is writing in secret code within the context of any application and these are the requirements for it;
Authentication,privacy,intergrity and non-repudiation
They include: schannel CNG provider model, ECC cipher suites, AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into  cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system.
Benefits
The use of using public keys enables individuals to convert data into the encrypted form.
Used to hide crucial. important and vital information.
Helps in preventing leakage of vital data from a network
Helps in the authentication of users over the transfer or flow of data in electronic way.

the types of known attacks against those types of protections

Password attacks-it’s a third party who tries to get access of information by cracking the password.
Malware-codes with malicious intent to steal data or destruction of the computer system.
DOS attacks-it majors on or targeting disruption of the network and can be prevented by keeping the system secure.

Strong passwords are the only way against this attack.
Malware should be avoided by doing away with links to unknown users.

How to ward off the attacks

Malware-avoid clicking and downloading attachments from unknown users.
Phishing-through verification of any requests from organization via email over the business phone.
Passwords attacks-use of strong passwords
DOS attacks-the system of the organization to be kept secure with software updates.

Encryption Technologies Data Hiding Technologies
and

Shift/Caesar cipher-it’s a tool that uses the substitution of a letter by another one further in the alphabet.
Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets.
Perfect cipher-these are ciphers that can never be broken even with after an unlimited time.
Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits.
Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system.
RSA-is a public-key in the cryptosystems and is used for the transmission of secure data.
Advanced encryption standard-it’s a cipher based on the substitution-permutation network and works fast in both the hardware and software.
Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text.
Text blocks coding-are the family of error-correcting codes that do encode data in bits.
Information hiding and steganography-is the process of concealing a file, video, image, or file.
Digital watermarking-is the practice of hiding digital information in a carrier signal in the system.
Masks and filtering-masks show which of the part of the message is displayed.

Network security vulnerability and threat table above
Common Access Card Deployment Strategy
How identity management can be part of security program and CAC deployment plan
Identity management involves telling what the user can do to certain devices at a given time. Identity management can be part of the program because of its reasons well known for instance: increasing security, also production while decreasing the cost and effort.
The program tools of identity management need to run as application towards a server because it defines the type of user and devices allowed to work on a certain network this for it to be part of the program, must depend on alerts, reports, policy definition and alarms
Thus offering directory integration and connection of the wireless and non wireless users and meeting almost the operational and security requirements.
Deployment plan of the common access control
Can come for different reasons so as to deploy and enforce the authorization policy for instance:
The organization -wide authorization policy  that is driven from compliance level of organizational requirement.also departmental authorization policy where they have some special data handling the requirements that would be passed to various department. Then the specific data management relating to compliance and targeting at the  protection of the right access of information.
Email Security Strategy
Types of public-private key pairing
Public keys may be disseminated widely but private are only known to user owner. This makes two functions-the authentication when public key is used to verify or show a private user sent a message and encryption where the holder of the private key can decrypt the message.
Authentication-is when the public key is used to verify that a holder of the paired private key sent the message.
Non-repudiation-it’s an attribute of communication that seeks to prevent the occurrence of the untrue or false denial of involvement by either party because it provides the originator of data with credible evidence showing information was received as it was addressed.
Hashing -it’s used to index and retrieve items in database because it is faster to find an item through the use of shorter hashed key thus hashing being the transformation of a string of characters into a shorter fixed length than the original size.
This added security benefit will ensure integrity of messaging by:
Speeding being high  this is when the number of entries is large because maximum number of entries can be predicted in advance so that the bucket array can be allocated once also one may reduce the average lookup cost by a careful choice of the hash function and even the internal data  of structures.
Pretty Good Policy-it’s a program that is used to encrypt and decrypt email over the internet as well as to authenticate digital messages with signatures the stored files that are already encrypted.
GNU privacy Guard-it’s an encryption software program since it uses the combination of conventional symmetric-key cryptography for speed.
Public key infrastructure -it’s a cryptography key that enables the distribution and the identification of the public encryption keys thus enabling the devices to exchange data securely over various networks.
Digital signature -it’s an electronic signature that can be used to authenticate the identity of the person sending the message.
Mobile device encryption-they help mitigate security risks whereby data must be encrypted while it is in transit and when in storage.
How to use smartcard readers tied to computer systems
Smartcard are the credit-sized plastic cards that do contain the circuit card that are integrated they can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes.
A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks.
Complexibility of cost and technical of email encryption strategic to security benefits
The following elements must be considered:
The basics because encryption is a process that is based on the cipher that makes or ensures information is hidden.Aslo choosing what to encrypt because it will be part of the risk management and the planning process of data governance. The three states of data in order for data to be secure from data in motion to data at rest and last data in use.
Recommendation
Smart card can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes.
A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks
A deployment plan  it’s a step to step on what need to happen in the last stage in the email security strategy, for a deployment plan to be effective the following must be put into consideration:
Layered application that deals with the design management dependencies   between components also the people who structure application layers should not be same again to structure the hardware infrastructure.
Reference
Atul.kahate, cryptography, and Network security Tata mc Graw.Hill Publishing Company Limited, 2003
E .kranakis primarily and cryptography, Wiley, 1986

Threats to Quality Web Designs Network System (QWD)

Executive Summary
The main purpose of this report is to existent the potential security threats that aspects Quality Web Designs network system (QWD). QWD specializes in website and web content design for dissimilar types of business and any type of security threat can significantly disturb its business operations. It is significant to uncover any potential vulnerabilities, assess potential threats, and the potentials of the threat happening. It is also vital to calculate what might happen to the business process and competitive edge of the company if the threat occurs. Two security vulnerabilities in both QWD security policies and software are deliberated in the report. Finally, we discuss the impact the security modifications have on the business process.
Company Overview
Quality Web Design (QWD) is an institute that focusses in the Web site and Web content design for all different types of businesses. QWD’s assignment is to deliver best quality Web design that will increase consumer income to QWD’s customer Web sites. QWD’s database comprises over 250,000 branded images and graphical designs that will improve most Web site’s demand to a goal demographic. QWD is able to offer its clients the capability to offer their audience a customized interface.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Indifference lot of consistent services were delivered by Quality web Design Company to their customers in such a way that there won’t be any security problems in the organization anymore. There were several limitations to every company and Quality web Design can overcome them. QWD superiorities itself in having their own web designers that use ritual scripts and applications. This sets the company apart from other competition. The company operates Microsoft Visual Studio Team Foundation Service server to promise constant development of the site from start to end. The company also has its own payroll, marketing, and accounting departments which are significant to the business operations.
Security Vulnerabilities
Security Policy Vulnerability
QWD’s security policy does not discourse the topic of employee’s using company equipment such as the IPhone’s, Windows cell phones, and laptops for personal use. This should be lectured in an Acceptable Use Policy. By the company not making a policy, only for the company use only they are making the equipment, it grasses the company vulnerable to open occurrences. It is not impracticable to contemplate that employees do use company delivered equipment for personal use. Employees usage the devices to send and receive private emails through non-related company sites such as Gmail, Hotmail, and Yahoo. They use the company devices to surf the web, shop for items, play games, download applications, get on social networks such as Myspace, Facebook, and Twitter, watch videos, and even listen to music. According to one site on employee internet use, employees spend about one-third of their time on the Internet for personal reasons. (Employee Internet Use) This means that out of a regular 40 hour work week, employees are spending 13.33 hours doing personal Internet usage. This also relates to employees who offer their mobile numbers for personal use on the Internet. Sometimes sites need registration and things such as contact phone numbers must be included, Unfortunately, for some employees, the only number they have to use is the company issued mobile phone. It means that the employee is given that the company mobile phone as their point of contact number.
This type of vulnerability delivers the prospect of pressures beside the company by not having a policy in place. The threat that can arise is if an employee downloads a virus, malware, or Trojan to their mobile phone, laptop, and even desktop. This is especially so for the remote devices because when these are connected to the Exchange server, it can infect the corporate network. If an employee is using their desktop to surf the Internet for private usage and they open an email sent by a contact that has a virus attached, it can infect the network. Another example is if an employee registers for something personal online, such as sweepstakes, this can be a problem. If a hacker gets a hold of the information, the hacker could send a text message that has instructions to download something that contains a virus. If an employee is under the guess that they have won something that they know they signed up for, many will not hesitate to download the link.
Since devices such as mobile phones and laptops are used more often off site by employees, providing them more time to use for their personal use, it makes the risk highly likely. If statistics suggest that employees are on the Internet one-third of the time for private use at work, it would seem to be a lot higher when employees are at home or not at work. This means they are checking emails more often and downloading content which could be infected. They could even let family members and friends use their devices to access the Internet.
Employee Internet Use editorial also conditions that over $85 billion is vanished each year by companies because employees are using company time to access the Internet for personal use. If anything the employee has downloaded and allowed to infect the company network, it is safe to say that number goes up. If infections are passed onto the network, it could halt business processes. In order to fix the problem, it would cause the company time and money. The company also has to try and assess how much and what type of damage was caused by the attack. It could also keep employees from accessing necessary applications, emails, and work on time sensitive projects.

Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

Software Vulnerability
Agreeing to Microsoft Visual Studio (2008), the Team Foundations Server (TFS) is a software implement that offers project administration abilities, recording, work stalking, and source control. Team foundations server also holds a data warehouse where all data from testing implements, source control, and item tracking are stored. QWD customs TFS in its business routes as a warehouse of custom applications, procedural written scripts, and web site templates. The TFS warehouse contains a database code source, an application server, and a web server. QWD’s TFS server is placed at their corporate office, though it can also be opened distantly by Internet Protocol Security (IPSec) tunnel connecting the corporate office to the database server.
TFS has a cross-site scripting (XSS) vulnerability that may give an unofficial remote attacker admission to an application (Cisco, n.d.). XSS is in the list of the top 10 web application vulnerabilities and signifies 26 percent of assaults from a review done by the Open Web Application Security Project (Nithya, Pandian, & Malarvizhi, 2015). The vulnerability is a result of not sufficient confirmation on user-supplied input in constraints referred to the exaggerated application. A remote attacker who has not been authenticated may use the vulnerability to convince a QWD user to follow a malicious link that leads to a malicious site and use deceptive instructions to convince the user to click the link. If the remote attacker is successful, they can execute cross-site scripting attacks and can motive severe security damages such as cookie hold up and account hijacking (Shar & Tan, 2012).
The vulnerability will result in insignificances to assignment serious business procedure since the attacker can increase access to QWD’s intranet, Microsoft Share Point, the web server, and cookie-based validation. The assailant can delete or alter QWD website patterns and custom written scripts that are deposited on the server.
In addition, QWD’s competitive advantage will be exaggerated by the damage of integrity, loss of key customers and associates. Reserved data can be sold to competitors making QWD suffer losses and bear the cost of repair.
Summary
In any organization, the corporation must take into explanation any security matters that can offend the company, employees, and its customers. QWD must take into account the vulnerabilities related to its technological procedure and how it can mark the business. It is main to look at the software and security policy vulnerabilities and how to defend the company from any probable pressures and threats. It is supposed that by addressing the satisfactory use policy of company equipment for private use and the wireless access points of company laptops, this can aid in keeping the company network more secure.
References

Clancy, Heather. (2011). Mobile device security strategies. Retrieved on March 21, 2012, from http://searchnetworkingchannel.techtarget.com/feature/Mobile-device-security-strategies
Defending Cell Phones and PDAs Against Attack (2006 August 9). Retrieved on March 21, 2012, from http://www.us-cert.gov/cas/tips/ST06-007.html
Elliott, Christopher. (2011) Retrieved on April 10, 2012, from http://www.microsoft.com/business/en-us/resources/technology/broadband-mobility/6-wireless-threats-to-your-business.aspx?fbid=Hsna4GJxWrg
Employee Internet Use. Retrieved on March 29, 2012, from http://www.connections-usa.com/employee-internet-usage.html
Evil Twin. Retrieved on April 4, 2012, from http://searchsecurity.techtarget.com/definition/evil-twin
Hotspot Usage to Reach 120 Billion Connects by 2015, Says In-Stat (2011 August 29). Retrieved on March 29, 2012, from http://www.prweb.com/releases/2011/8/prweb8751194.htm
MiFi® 4082 – Intelligent Mobile Hotspot. Retrieved from http://www.novatelwireless.com/index.php?option=com_content&view=article&id=276:mifir-4082-intelligent-mobile-hotspot&catid=19:mifi&Itemid=12
Mobile Broadband Cards. Retrieved on April 10, 2012, from

http://www.todayswirelessworld.com/mobile-broadband-cards/ Mobile Broadband Cards

Computer Dynamics Network Proposal

Computer Dynamics is a company with 300 computers in three adjacent five-story building with 100 computers in each building. The LAN’s are similar in each building with a data center is located in one building on the second floor. There are no other office locations. The current system is poorly designed and must be completely replaced. Develop a logical design for this enterprise campus that considers the seven network architecture components.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The first thing that I would do is conduct a site survey of the company’s existing network and obtain any documentation  such as site names, locations contacts, cabling layout, server room location, and operational hours. I then would run a network analysis of the entire network to check the efficiency of the current system. Faults that are defined during the test then I would addressed them prior to the new system install. The assumptions that I have made are that each building will have twenty computers per floor and the main building will also include the data center on the second floor.
I would then meet with Computer Dynamics Company to identify the requirements of what they expect for a network. Topics to address would be the type of applications that are being used and any future application requirements that they may expect, goals of the company, and if any limitations or constraints they may have. Gathering the preliminary information from the customer I could then start the design process.
The proposal to Computer Dynamics Company would be based off the seven network architecture components.  Each building LAN would be designed using a physical star topology that would connect the twenty computers on each floor with shielded twisted pair cable to a twenty four port 10 gigabyte switch. I would also propose a wireless network for each building along with a wired network. The wireless network would involve replacing the existing access points with 802.11ac access points three per building. The placement of the new access points on different channels would be placed on floors one, three and five of each building.
The twenty four port ten gigabyte switches installed on each floor of the three buildings would be connected to a main switch located on the main floor of each building. They in turn are connected to a router placed in each building on the first floor. The connections between the five switches to the router in each building would use multi-mode fiber optic cabling as well as the connections from building to building.
The designated main building will contain the data center on the second floor which contains the servers for the company. This data center would also contain the e-commerce edge enabling potential customers along with their existing customers to the view the company website. Each of the buildings LAN’s would connect to the data center through a switch with a fiber uplink port. The main building networks along with the other two buildings would be terminated via the other end of the fiber cable into ports on the main building data switch.
Any connectivity to the outside via internet service would be connected through a gateway router that is connected directly into the main data switch. The need for a 10/100/1000 service needs to be provided by the companies ISP. Using this design would enable all 300 computer to have internet access and the ability to connect to any company server located at any of the other buildings.

Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

The last part of my proposal would be to test the new/upgrade system to ensure it meets Computer Dynamics requirements. I then would propose Computer Dynamics company use the network for an established period of time so they can monitor, verify, and make recommendations as needed. Once they are satisfied with the operation of the new network system, I would provide them with documentation of the site names, locations contacts, cabling layout, server room location, and equipment upgrades or changes of locations.
Works Cited
FitzGerald, Jerry, Alan Dennis, and Jerry FitzGerald. Business Data Communications and Networking. New York: Wiley, 1996. Print.
“How to design network | Eight step design methodology.” Networking Virtualization. N.p., n.d. Web. 18 Feb. 2017.

Resolving Problems with a Local Area Network

Network user problems:

Explain different problems that a user of a local area network may faces while accessing the network.

Poor or bad cable issue: –Poor or bad cable issue is problem of a local area network which faces by user while accessing the network. In this problem, if the client computer is capable forconnect to the network, the performance might be reducing. Everyone could not be able to attach to the computer. Moreover, the current Gigabit network to the desktop is general, so that is why Gigabit category 5 will not work for less than concert and four pairs of cable as well.
Can’t get an IP address: – The system is disconnected or ineffective. The operating system that can alert an address of the DHCP server (Dynamic Host Configuration Protocol) has not received. Furthermore, afterwards verifying the status of the system adapter can be configured to it. DHCP server could be out and server service will be interrupted as well. In addition, the device never reached the server for the first time.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Printing problem issue: – Printing problem is also of user area network which faces by user while accessing the network. Printing does not constantly work on network. To determine if a user is experiencing this problem, many people have the same problem. Moreover, only one problem, so it may be that the computer is not properly mapped to the printer server. If it does not cause the network between the client and the printer can be responsible for it.

Provide a scenario as an example to explain a user having difficulties accessing the network.

I am going to explain the scenario of a company difficulties which faced by user. AWI is a company and which company have so many computers.  There is some problem like poor or bad cable printing problem, can get’s IP addresses. After that, user did find the issues and solve it with the help of internet.

Identify and describe the potential solution to any 2 two of the problems mentioned above.

Solution of Poor or bad cable: –First of all, user should check cable, after that if any cable issue. Then user should change the cable. The cable has become untwisted; re-terminating the cable may resolve the errors. While following new advancements like power over Ethernet and Gigabit. The category 5 should be improved.
Printing problem issue: –In the beginning. Verify the configuration of printer, ensure it has a good IP address and can access the printer server as well. Apart from this, the print driver has settled printed problems.

Create a form to document the problems and their solutions in knowledge base.

                                              Knowledge Base-Form

Name of the CompanyAWI

Client’s NameRajwinder Kaur

Date and Time09/02/2017 -12.00pm

Problem Detail:In this company, user faced local area networking problem while accessing the network. This is poor or bad cable.  In this problem, if client computer is capable for connecting to the network, then performance can reduce. Gigabit cat5 will not work for four pairs of cable.

Name of the Technician Lakhwinder Kaur
Date and Time10/02/2017- 12.00pm
Service Hours 30 minutes
Proposed Solution:
First of all, user should check the cable and find out the errors. Then, if problem in cable so, change the cable.

ResourceInternet,  Crimping  Tools, Cable
Costs$20
Procedure Personal First of all, I did find the problem and
Then, got the information from internet,
   How we can solve the problem. Finally, I
did solve my problem.

Company ContactAddressAWI International Education Group
Information
Phone02232078935
                                            Websiteawi64@gmail.com

Fileserver problems (Application server):

Explain different problems associated with setting up a file server.

Hard disk failure: – A hard disk failure issue of fileserver.
A hard disk failure problem happen while a disk drive malfunction and accumulated the information and that can’t be accessed correctly configuration to computer. Moreover, Due to this problem, heats up the desktop and laptop when starts. Due to inadequate or defective fan ventilation of the CPU, hardware equipments damage.
Slow speed: –In file server issues second point is slow speed. In slow speed issue when server is not working properly then, processor takes too much time for downloading the files and so on. Moreover, sometime this issue occur when we keep extra data in computer.
Security Issues: -In security issue, server folder security used for the
             client to offer the access to the file in the group. Moreover, on the file
            Server if the safe information is passed on the server and then user
           should look after the data on the server.

Provide a scenario as an example to explain problems related with file or application server.

Spark is a company in Auckland (New Zealand). This company have lots of computers. Users faced so many problems like hard disk failure, security issues and slow speed as well. Find the issue with the help of internet and then, installed antivirus software and got information how can fix it. Finally, I resolved the problem.

Identify and describe the potential solution to any two of the problems mentioned above.

Solution of Hard disk failure issue: – Firstly, system should be shut down properly. It also is stay away from the installing supposed software. Hard disk ought to be clean commonly. Structure do update time to time. Moreover, should swap the HDD after three to four year.
Solution of security issues: -There are so many good antivirus programs for the solution of securityissue. Update the antivirus software version to secure the computer system for malware and provide security providers on the internet against viruses, Trojans etc.

Create a form to document the problems and their solutions in knowledge base.

Performance issues:

Explain different issues related to network performance.

Hard drive usage: – Hard drive usage is first and the foremost issue of network performance. Mostly information exchange starts and finishes with a hard drive.Specifically, if at least two projects attempt to get to the hard drive in the meantime, information throughput will drop exponentially. Moreover, it is normally the slowest part inside the machine.
CPU usage: –CPU must be shared by grater part of the product running on a framework. Framework with different CPUs is not quicker than those of single CPU. In present day working frameworks, there are regularly twenty to sixty projects running when the client is not doing anything. Window is here and then slower on different CPU.
RAM: -In spite of the fact that system information exchange does not ordinarily include much direct memory utilization.
Moreover, user computer accidently start again as user in the central of something.  The folder structure of hard drive might be gradually deteriorated and user will not longer be able to boot user machine.

Provide a scenario as an example to explain performance problem related to a local area network.

Identify and describe the potential solution to any two of the problems mentioned above.

Solution of CPU usage problem: –In addition, user should update to your computer. Some programs are doing slow your computer, so that is why should remove that programs. As well should keep antivirus in your computer for remove the virus. Ought to be changing the power settings that will help in growing the processor capacity.
Solution of RAM problem: –First of all, user should test the memory modules and should check which module is not working. After that, also ought to be checking the memory slots. If any problem in memory slot so user could restore the motherboard. After change the memory slot module the lined up should be correctly on the bottom.

Create a form to document the problems and their solutions in knowledge base.

                                  TASK 2
Monitor and maintain the performance of a local area network:
2.1   Identify and list any 5 network monitoring tools. Also      describe the features of those tools which deal with the performance issues of a local area network.
Monitoring tools and features

Total network monitor: -This device is the non-stoppable host, monitors network services. They also informed us that all issues need attention. Apart from this, this trouble is given a full report. The device is fixed to troubles successfully or negative consequence or still using the color code was imperfect.

Nagios: -A flawless network to run all applications and all services must be up and running on the network at all times. An application, services, helps administrators to maintain critical systems at all times. Furthermore, to keep all this time is going to be good and also we need special control equipment i.e Nagois. This application is the core monitoring engine acts as a heart.

The dude: -This dude monitoring tool is responsive device. Everyone can create automatic analysis for the device. Apart from this, it detects the trouble and alerts you while monitoring devices.
Microsoft network monitor: – Microsoft network monitor is local area network monitoring tool. This tool monitors the performance issues of a LAN network. Moreover, the operation control, to analyze and to capture the flow of traffic in the network allows to administrator. Mostly a device that network administrators must find easy to control.  This device is helpful for troubleshoot the networks problems and applications as well.

Advanced IP scanner: –In advanced IP scanner monitoring tool perfectly an administrator in a local area network, like network, wireless, routers devices for example mobile phones must be monitored. Moreover, this monitoring tool to share databases on a remote machine if HTTP and FTP has been able to connect as it helps us. This device allows starting the computer and shutting down the remote computer as well.
2.2   Install any available network monitoring tool on a computer having Windows Server 2008 and monitor the bandwidth usage over a period of at least 5 minutes.

Figure1. It shows the dashboard IP addressed by bytes.

Figure2. This picture represents the summary of capsa.
2.3   Analyze the information showed in the bandwidth monitoring graph to explain if the usage of network is reaching to its limits.
First of all, I did install the capsa software. This software examines according the Internet protocol address. This represents the traffic buffet information. Moreover, this software gives information of summary and shows bytes, packets and bps so on.
2.4   Explain different technique for preventing performance problems to occur in a local area network.
There are so many different techniques for preventing performance of a local area network.
First, incline the number and speed of hard disk. Second,for load the balance of server should be added new servers and network functions. Increase to server memory is very vital for preventing the performance of a local area network.Also, should be setting of operating system. One thing is more; user should files moves from the server to the client PC.
                                         TASK 3
3.1   Identify and explain different security exposures and violations concerned with the security of a local area network.
Probes: – Probes confirm for protected servers or services so as to might be successively on computer on user LAN.  These tests are generally completed through programs that get a collection of IP addresses selected by the individual running the program. Moreover, there are some common services like mail, web and so on. Apart from this, when set up of other services then program try to observe. Furthermore, if it know how to login or else get access to that service. Probes are not to run some servers which you cannot recognized.
Worms: –A worm is a separate malware computer program. It is very harmful for network. Worm replicates itself to spread one system to another system. It does not require human intervention to spread.  It makes unusual to storage devices.
Virus: –Viruses are normally not security threat in a local area network to PCs. Virus can create lots of troubles. Moreover, it can be change the implementation of processor. It can transmit the virus one computer to another computer as well. Furthermore, virus can do loss the data.Due to the virus processor working slowly.
Trojan Horses: –Trojan horse is any malicious computer program which is used for hack into a computer through misleading client of its correct intention. This threat attacker’s use for private information like as banking information, passwords and personal identity as well. Moreover, this threat use for spreading malware across the network.
Also, it can be corrupt the data and deletion to files.
3.2 Determine the possible solutions to these exposure and violations by giving at least 1 example each form an industrial perspective.
Solution of Virus: – Malicious software is very helpful for removing the virus, because without malicious software is very to remove the virus. Apart from this, there are some removal tools as well. User should install antivirus software for removing the virus. As well, user ought to be keep antivirus application for updating the computer.
Solution of Trojan Horses:- Firewall software could compose invisible to user PCs.Firewall software too advise to user while programs on user PCs try to the attached with internet without significance. It will give information if user gets some virus.User should remove problems which are affected by Trojan horses threat.
TASK 4
4.1   The sender in a LAN send 10110110; a hacker alter the data and the receiver receive 10100110. As a network expert analysis to find out the position of error bit.

P1

P2

1

P4

0

1

1

P8

0

1

1

0

1

2

3

4

5

6

7

8

9

10

11

12

P1 = 10101              Odd      P1=1
P2 = 11111              Odd      P2=1
P4 = 0110                Even     P4=0
P8 = 0110                Even     P8=0
Transmitting data

1

1

1

0

0

1

1

0

0

1

1

0

1

2

3

4

5

6

7

8

9

10

11

12

Hacker attack the receiver data

1

1

1

0

0

1

0

0

0

1

1

0

1

2

3

4

5

6

7

8

9

10

11

12

P1= 1 1 0 0 0 1         Odd
P2=1 1 1 0 1 1          Odd
P4=0 0 1 0 0             Odd
P8=0 0 1 1 0             Even
Add parity bit: P1+P2+P4+P8= P7
So, P7 position is wrong.
4.2 Analysis a 10 bit sequence 1010011110 and a divisor of 1011 for error checking using CRC.
Data: 1010011110
Divisor:1011
1001000111

1

0

1

0

0

1

1

1

1

0

0

0

0

1

0

1

1

0

0

0

1

0

1

1

1

0

1

1

0

1

1

0

0

1

0

1

1

0

1

1

1

0

1

0

1

1

0

1

0

1

0

1

0

1

1

0

0

0

1

                                           1001000111

Client Server Network Architecture Essay

Abstract
This report is about the client server network architecture in which each computer or process on the network is either a client which is low end computer which request services and or a server which is high end powerful computer which is highly capable of providing services to many different clients at the same time. The task which servers performs are like managing disk drives which are called file servers, managing printers which are called print servers or managing network data traffic known as network server. Clients are PCs which require or use these facilities from servers which include sharing files, printers, storage and sometimes processing. All the clients and servers in a network communicate by using different protocols which are set of rules or standards which govern the communication between any computers or devices connected in a network. This client server architecture is also known as two-tier architecture.(1)

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Introduction
The advent of personal computers gave birth to the idea of client/server architecture. Before personal computers, programs were written for mainframes. Software written for mainframes was often coded in a monolithic format that is the user interface, business logic and data access functionality are all contained in a single application. Because the entire application ran within the mainframe this was not a problem.(2)
Client/server model, needed to share many kind of services. As time passed the need of these services increased so servers also evolved. Many clients started sharing services of common server. Example can be of our web browser which is a client and requests services from web server like web pages or files. This is sometime also knows as Hyper Text Transfer Protocol server (HTTP) also for computer to make requests like a client Transfer Control Protocol/Internet Protocol (TCP/IP) and for transfer of files over internet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more nodes in a network.(3)
The relationship between two computer programs in which one program makes a request and other which provide the required service is called a client/server relationship. It is a backbone of interconnection of two or more programs or computers anywhere across the network. Example could be an ATM machine in which we send request for balance check or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is sent back to the client to display in front of user.(4)
Client Server Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the application will be on the server instead of client because server has more disk space and power as compare to PC also the data will also be in server along with the application. In three-tier architecture the load is divided between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less contention system for resources will be available because each server will be used either to process data or application requests.(6)
Literature Review
In modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of faster and better network system growing tremendously companies are bound to upgrade their system every six months. Now Hures is also facing same problems. This is very common problem in any company because of the rapid development of business systems so to cater these problems any company should keep this in mind while developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that even internal and external environment is affecting the company.

The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for flexibility of coping with these changes. However it comes with its own challenges which we will discuss here.

 

Client/Server is built on three basic building block they are client which is a small or less capable hardware or software then middleware which is a software which lies in between and server more powerful then client.
The first block client runs different applications on its operating system which provides graphic user interface. Clients could have web browser for example as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distributed System Management) it could be simple element to the entire front-end managing application.
Middleware is application which has three categories: transport stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture.
Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which can be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network.

 

The additional server like email could be used depending on size and usage of the network. Hures could also use similar OS in all workstations it also plays very important part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less strain on servers.

 

The Alternative architecture which could overcome Hures problem can be client queue client or another one called peer to peer architecture. Client queue client Architecture is also called passive queue Architecture.
In Client queue client all points including servers are simple clients. It was developed to continue on traditional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this track and order number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results.
Peer-to-Peer Architecture rather than focusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the network. This architecture goes against previous client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to repair or upgrade without clients being affected and it’s more secure and easy to maintain.

 

Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only authorize data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or World Wide Web (WWW) but is only restricted to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customizable so it’s your preference whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. Any outside person trying to access company files will be blocked by firewalls.

 

The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications such as newsletters, policy manuals, and price list etc. It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet it’s safer and secured because only authority can access the website.
The Disadvantages of this intranet to be considered would be like firstly it is very expensive to setup and maintain because a special team of people need to be hired and trained for handling the process of managing resources of this particular company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall budget for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be done at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget.

 

It is very true that the popularity of intranet software and the internet pose threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the most advantage of networking technology in the business world and because it enables us to take full use of wireless and internet technology at the same time it is the most flexible most secure and gives more privacy as compared to offered by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in consideration that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As far as security is considered there are always threats to any open network system. To reduce the risk of infiltration from outside sources proper monitoring of network on continues level is severely needed. The most important aspect of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use their plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the unplanned damages to revenue but again the cost of doing all these procedures will be substantial.

 

Network Attacks in Real Time Scenario Over Campus Network

Amit Mahajan* Vibhakar Mansotra**
ABSTRACT
This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic flow over the network.
Keywords: UTM, Attacks, Visualization, Afterglow, tcpdump.
I INTRODUCTION
Networks have been under attack from the time Internet came into existence. There is consistently some lack of determination connected with the effect of these attacks. In the present situation of PC innovation, any institution can have enormous machine frameworks of distinctive natures. With the advancement of technology, Organizations have started facing difficulties due to different types of computer viruses and attacks. This resulted in tremendous loss of the internal assets like data and utility of time. Thus there is an urgent need to study these attacks and network breaches by means of which one will be able to devise preventive measures and thereby protect the internal assets.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

In view of the above objectives one has to understand the networks and how they expand widely. Also one has to understand the attacks and breaches. Mostly the internet is one of the sources of the viruses and attacks but quite often the local network is also a major source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway level to scan the outgoing and incoming traffic. Where these kind of mechanism to study the behavior of internal attacks is vague. One is very much interested in knowing the kind of traffic flow, and its identification etc in the network. This kind of approach will help the user community to adopt preventive measures or in other words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the network can be used as a tool to scan the network traffic. The behavior of the network may be understood through penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem.
SURVEY OF WORK
Asmaa Shaker Ashoor and Sharad Gore in their research differentiated the Intrusion Detection System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare the stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can pass through in between the devices in real time.
Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses about the Present run-through for fighting cyber-attacks which are typically used by the Intrusion Detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem difficulty by separating the simulations of the attacker’s capability and opportunity and thus fuses the two to determine the attacker’s intent. The results of the research demonstrate that the algorithm TANDI predicts that the future attack action precisely as long as it is not a coordinated attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for further analysis. This can be further analysed with the help of simulation.
Nilima R. Patil and Nitin N. Patil in their paper discussed about the importance of attack graph to check the possible attacks in the network. Using attack graph, analysis can be done effectively. This helps the administrators to further analyze the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to decide what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs.
Rosslin John Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second level in addition to access control intrusion confinement can dramatically enhance the security especially integrity and availability of a system in many situation. It showed that intrusion confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of errors. Developing a more concrete isolation protocols will further be studied in the future research.
Meera Gandhi and S.K Srivastava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to identify and fight with some common attacks over the network systems. In such systems log displays the list of attacks to the administrator for ambiguous action. This system works as an observant device in the event of attacks directed towards an entire network.
In the light of the above available information a need has been felt to undertake similar type of work in the University of Jammu as well. This will help in study of attacks received by the network of the campus. The network is setup on optical fiber backbone with around 100 distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility available over the network is plays an important role in helping the students, researches, teacher and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus.
II EXPERIMENTAL SETUP USING UTM
University of Jammu is one of the pioneer higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of focus on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivity’s to cater the needs of the university fraternity. This internet bandwidth connectivity’s constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 1:1 OPTICAL FIBER lease line from reliance and 1 Giga optical fiber connectivity from National Knowledge Network. Students, researchers and teaching faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of teaching and centers other than administrative blocks which are connected through this optical fiber back bone network. All the three girls and boys hostels are also connected through the optical fiber backbone. There are around 100 distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipment’s are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506.
In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from world’s top IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of load balancing of internet bandwidths, Antivirus and anti-spam scanning at the gate way level, User identity based firewall rules, gateway level IDS and IPS scanning and AAA authentications etc.
This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network.
Figure: 1 UTM Deployment in Gateway Mode

With the increase in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks reduce the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to produce the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and affecting the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network applications and ports to which they are associated. This study will help the university and other institutes which are using the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service.
III DATA COLLECTION AND ANALYSIS USING UTM
As described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 lakh. These 13 lakh IPS attacks have been classified into 5 categories broadly example HTTP/ HTTPS, ICMP, UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in figure-2:
Figure -2 Classifications of Attacks

Out of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identified to 162810 by the IPS and them display is shown in figure-3:

From the figure-3 it may be noted that the prominent attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % web misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series:
Week 1

Week 2

Week 3

Week 4

Week 5

Week 6

Week7
Week 8

Week 9

Week 10

Week 11

Week 12

Week13
Week 14

Week15
Week 16

Week 17

Week 18

Week 19
Week 20
Week 21
Week 22

Out of 22 weeks, the percentage of Attack Responses 403 Forbidden is the most dominant one.
Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unauthorized access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client making the request to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to exploit vulnerability on the victim’s server. Certain applications do not perform strict checks when confirming the credentials of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compromised and trust relationships established between the victim server and the other hosts that can be exploited by an attacker. In such Attack Scenarios; attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can exploit the weaknesses to gain the administrator access without any exploit code.While the other prominent attacks are:-
ICMP trace route: This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover live hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies.
Web- MISC handler Attacks: this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server.
The other attack which has very high severity level is the SNMP attack. From the figure- 4 shown below , it is noted that there is a peak in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced.

Figure: 4 shows16 different types of attacks out of 22 attacks per week are shown

Figure –5 different types of major attacks per week
Figure: 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous: – ATTACK-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation DoS (7062)
IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO STUDY THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORK
To study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to capture real time at the core switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump –nnelr data.pcap l wc –l at the root.
This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields.
Tcpdump-vttttnnelr ju.pcap|./tcpdump2csv.pl”timestamp sourcemac destmac sip dip sport dport flags len proto ttl id offset tos ipflags” > ju.csv.
The Csv file is then exported to Mysql database.
load data infile ’ju.csv’ into table analysis fields terminated by ’,’ lines terminated by ’n’ (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset);
Further, ju.csv file was converted to dot file, which was converted to png file.
tcpdump -vttttnnelr Ju.pcap |./tcpdump2csv.pl|./afterglow.pl-c color.properties > Ju.dot
Cat Ju.dot | neato -Tpng –o Ju.png
Figure 6 shows Whole Traffic captured for network

Figure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised.

Figure 7 shows the out going traffic of port 80

Figure -8 shows ATTACK from IP 192.176.2.25
Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified.
V CONCLUSION AND FUTURE SCOPE
IDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which exist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance.
VI REFERENCES
[1] Paxson. Bro: A System for Detecting Network Intruders
in Real- Time. In Computer Networks, volume 31 (23–
24), pages 2435–2463, 1999
[2] G. Stein, B. Chen, A.S. Wu, and K.A. Hua, “Decision
Tree Classifier for Network Intrusion Detection with
GA- Based Feature Selection,” Proc. 43rd ACM
Southeast Regional Conf.—Volume 2, Mar. 2005.
[3] Schwartz, Matthew, “Beyond Firewalls and IPS:
Monitoring Network Behavior.” February 2006,
available on http://esj.com/articles/2006/02/07/beyond-
Firewalls-and-ips-monitoring-networkbehavior.aspx
[4] S. J. Yang, J. Holsopple, and M. Sudit, “Evaluating Threat
Assessment for Multi-stage Cyber Attacks,” in Proceedings
of IEEE MILCOM: 2nd IEEE Workshop on Situation
Management (SIMA), Washington, DC, Oct 23-25, 2006
[5] Z. Yu and J. Tsai, “An efficient intrusion detection system
using a boosting-based learning algorithm”. International
Journal of Computer Applications in Technology, Vol. 27
(4), 2007, 223-231.
[6] Meera Gandhi, S.K.Srivatsa “Detecting and preventing
Attacks using network intrusion detection systems”
International Journal of Computer Science and Security,
Volume (2) : Issue (1) June 2009
[7] Asmaa Shaker Ashoor, Prof. Sharad Gore, “Intrusion
Detection System (IDS) &Intrusion Prevention System
(IPS): Case Study”. International Journal of Scientific &
Engineering Research Volume 2, Issue 7, July-2011
[8] Rosslin John Robles, Tai-hoon Kim,SeungLee,” A Study
on Intrusion Confinement for Internal Network”, Journal of
Security Engineering), vol.5issue no1, P73, 2008
[9] Patil, Nilima R.; Patil, Nitin N, ” A comparative study of
network vulnerability analysis using attack graph” World
Journal of Science & Technology; 2012, Vol. 2 Issue 3, p91
*University of Jammu, e-mail id :amit_ja2@rediffmail.com , **University of Jammu, email id: vibhakar20@yaho.com
1
 

QOD Protocol for Wireless Network Service Quality

CHAPTER 1
INTRODUCTION

A generalized treatment of a topic – a summary oroutline
The development of the wireless network must be prevented in various applications of wireless networks and they can be used in several areas of the hybrid networks respectively. Here the wireless network such as Wi-Fi in laptops and in mobiles can be used to increase the use of wireless networks. These wireless applications are used in the several fields such as in watching videos, playing games and also in watching TV also in wireless mobile devices. While performing all such functions some security will be needed in the specific wireless networks.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The applications of wireless networks should be directly connect some wireless mobile devices for required operations. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area.
Here we proposed a routing protocol in the wireless networks for the overall performance of the network respectively. The protocol provides the respective applications for the transmission of data across the wireless networks. The quality of service will be provided in the specific areas of networks and overall network performance will be maintained as in required manner. The quality of service support will reduces the delay in the end-to-end transmission delay in the throughput also be reduced.
However in the hybrid wireless networks, one thing have been proven that it is a better network structure for the future generation, and it have been proved that it will be helpful for the network communication. For example the mobile ad hoc network is also a wireless network in that the mobile devices are connected with the wireless communication. These MANETs will automatically form a network organization to elaborate the usage of network as required and the mobile ad hoc network is also a wireless network in that the mobile devices are connected with the wireless communication.
Thus the network security will be provided using some specific applications and thus the significant security will be provided.
In the hybrid wireless networks it combines the networks infrastructure and the structure of MANET respectively. Number of reservation based routing protocols are to be used to provide the infrastructure wireless communication and it improves the scalability of the wireless network. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network.
The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will used for the internet servers through the access points. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area.
The reservation-based protocols have been implemented for MANETs and that will specify the routes that is formed by the specific nodes and respective links that are associated with the resources to fulfill the quality of service requirements. Also such protocols will increases the QoS of the MANETs for some extents, they also suffers some of the problems like race conditions and the invalid reservation respectively.
The invalid reservation is nothing but the invalid resources will be useless when the data forwarding path between source to destination node will breaks. And race condition is nothing but double allocation of the similar resources for two different qualities of service routes respectively.
In order to specify the quality of service support capability in wireless networks, we had proposed a distributed routing protocol for the quality of service support. Usually a wireless network has the several base stations and also the access points across the wireless networks. There are two main features regarding the data transmission in the hybrid wireless networks. The one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small.
Taking the full advantage of these two features the distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission; it also removes the duplicate copy of data from the data stream (redundant data). By performing these operations above protocol will provides the high quality of service for the hybrid wireless networks.
There are five contributions in our project they are resource reservation based protocol for mobile ad hoc networks. Sometimes wireless networks faces invalid reservation and as well as the race condition respectively. Here we proposed a distributed routing protocol for enhance a quality of service (QOD).
The reply message of the transmission includes the information of the certain resources packets in packet scheduling feasibility, transmission delay, and reduces the traffic in the transmission. Hence the packets scheduling feasibility and the mobility of the node determines the size of the packets. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points. The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks.
The message should contain the whole information according to the available resources for finding the feasibility of scheduling packets and transmission delay and also the redundancy in traffic in the every transmission. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points.
The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks. The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks.
Number of reservation based routing protocols are to be used to provide the infrastructure wireless communication and it improves the scalability of the wireless network. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will use for the internet servers through the access points.
On the basis of this information, the specific source node will selects the replied neighbor that should guarantees the quality of service delay in the transmission of packets to the access points. The selected neighbor node specifically updates its status about the transmission of the data packets in the hybrid wireless networks which ensures their feasibility scheduling and transmission delay of the transmitted data packets respectively.
The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The packet scheduling feasibility and the mobility of the node determines the size of the packets. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points.
Sometimes wireless networks faces invalid reservation and as well as the race condition respectively. Here we proposed a distributed routing protocol for enhance a quality of service (QOD). In wireless networks there are two features one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small. Taking the full advantage of these two features the distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data.
This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission of data and the redundant data will be removed from the data stream and the protocol will make the fastest data transmission across the network. The packets scheduling feasibility and the mobility of the node determine the size of the packets.
The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will used for the internet servers through the access points. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area.
The distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission; it also removes the duplicate copy of data from the data stream (redundant data). By performing these operations above protocol will provides the high quality of service for the hybrid wireless networks.

Here we used a QOD protocol for providing a quality of service and also overall network performance can be maintained. The transmission delay can be reduced with the help of distributed routing protocol and network life time can be increased. The traffic in the data stream or packet stream is also reduced with the help of this protocol and also eliminates the redundant data from the data stream.

In the traditional wireless networks, it is difficult to provide the good quality of service and hence we proposed a QOD protocol to overcome such drawbacks. This protocol should select the respective neighbour node when the source node is not within the range. The protocol should helps in reducing the transmission delay in the hybrid wireless network. It also helps in resizing the packets to make an easy flow in the wireless networks and the physical security will be provided. The traffic will be removed from the stream of data and also the redundant data should be removed, hence overall network performance will be maintained and quality of service will be provided.

The reservation-based protocols have been implemented for MANETs and that will specify the routes that is formed by the specific nodes and respective links that are associated with the resources to fulfill the quality of service requirements. Also such protocols will increases the QoS of the MANETs for some extents, they also suffers some of the problems like race conditions and the invalid reservation respectively. The invalid reservation is nothing but the invalid resources will be useless when the data forwarding path between source to destination node will breaks. And race condition is nothing but double allocation of the similar resources for two different quality of service routes respectively.
In wireless networks there are two features one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small. Taking the full advantage of these two features the distributed routing protocol transmits the packets.
This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission of data and the redundant data will be removed from the data stream.