Wireless Network Design for Hill Cot Road Hospital
1. FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY
DCOMP205, WIRELESS NETWORK APPLICATION
Title : Individual Assignment
Issue Date : Week 2
Due Date : Week 4
Lecturer/Examiner : Mr. Abass Conteh
Name of Student/s : Ibrahim Pateh Bah
Student ID No. : 905002467
Class : BICT1201
Semester/Year : Year 3, Semester 1.
Academic Honesty Policy Statement
I/We, hereby attest those contents of this attachment are my own work. Referenced works, articles,
art, programs, papers or parts thereof are acknowledged at the end of this paper. This includes data
excerpted from CD-ROMs, the Internet, other private networks, and other people’s disk of the computer
system.
Student’s Signature : Date: 13th
MAY 2022
LECTURER’S COMMMENTS/GRADE: for office use only upon receive
Remark
DATE :
TIME :
RECEIVER’S NAME :
2. i
Table of Contents
Introduction ............................................................................................................................................1
Ethical Issues for Wireless Network........................................................................................................1
Networking and End User Devices for the Office ...............................................................................2
SYSTEM REQUIREMENTS.................................................................................................................2
Network Design...................................................................................................................................2
Analyze and secure the wireless network using WPA2. .....................................................................3
Health Issues...................................................................................................................................3
Availability.......................................................................................................................................3
Privacy.............................................................................................................................................3
Wireless Integrity............................................................................................................................3
Confidentiality.................................................................................................................................3
Implementation of the above network using Cisco Packet Tracer.....................................................4
Conclusion...............................................................................................................................................4
References ..............................................................................................................................................5
3. 1
Introduction
A wireless network design will be planned and develop for Hill Cot Road Hospital. Hill Cot
Road Hospital is a Sierra Leonean based organization, which comprises of 2 buildings within
its complex area. The specific report will be going to develop a wireless network design for
the organization as well for its employees such that it can provide them strategy in saving
revenue and delivers more productivity as well. Therefore, the entire network design will be
based on star topology because based on the design of building complex it will be easier to
implement this framework. As this network system provides many good things simultaneously
there are changes of system break down, important data will be secured. The system will be
secured using WPA2 technology.
The foundation of this project is the significance of a computer network for a contemporary
business. For the fictitious businesses Plastic Fantastic and Cashflow, I served as a consultant.
These two businesses require assistance in establishing a brand-new computer network. My
responsibility is to tailor each company's proposal to meet their demands and expectations.
Ethical Issues for Wireless Network
A complete computer network system must be maintained in order to concentrate.
Independent contractors must obtain permission from the preferred network system. Each
component of this assignment is necessary for its proper completion. Because everything is
localized, database errors and theft have become more frequent. A business must create a
robust network system. It must adhere to specific logic to secure the data in order to comply
with government regulations. There is a system that governor clauses developed.
The developed system must be created in a way that makes it flexible enough for anyone to
use. Working on a network shouldn't present any challenges for employees who share the
same network. In order for anyone to be able to work from anywhere in the company when
all the computers are properly connected to a network, a flow-less design must be created.
Since every computer is connected to a single server, everyone can access the data. A system
is designed in such a way that it should have a wide bandwidth and be able to connect to
both the internet and the World Wide Web, or WWW. This network is built with the expectation
that it will be reliable. IT networks are created to ensure that people, organizations, and
businesses run smoothly. This network system aids in securing an entire IT system because
there is always a chance for a breakdown.
Typically, the following activities involve breaching access points:
1. to visit adult websites or to introduce malware into the network
2. to steal from banks and commit money theft
3. in order to gain experience with hacking
4. 2
Networking and End User Devices for the Office
SYSTEM REQUIREMENTS
Hill Cot Road Hospital is a medium-sized organization. Thus, for avoiding any problems
within the network infrastructure, the computers in each of the 2 buildings are connected to
three 10/100 Mb switches with 24 ports each. The employees including doctors, nurse, admin,
management staffs will be equipped with highly configures computers with:
• 6GB RAM
• 500GB SSD
• Each PC with 3 USB ports and with Windows 11 OS enterprise edition
• Processors will be AMD Ryzen 7 of 10th gen
• Several staffs will have different IoT enabled devices like room temperature Hospitalal
information transferring tools, air quality sensors, data capturing machine.
• Three HP laser printers will be connected to the computer devices. Most of the computer
devices will be running on Windows 11 OS such that each device can have high
flexibility to execute advance operations. Nevertheless, it is mandatory for the employees
and managers of the company to share files within the building and associated
departments. Majority of files like planning history records, storage and transportation
summary. These record files will also be available for downloads and operation while any
staffs will be away from the enterprise. The printers that will be allocated will be
comprised to each computers making copies of documents at every department.
Network Design
This network design is based on client requirements, and it is determined by the company's
growth. This network design is based on the company's future growth and will be used.
Justification
The purpose of authentication is to determine whether the construction system is correct.
Here, the developed system fulfils the expected rationale and meets the Hospital Requirement
for whom it was designed. We completed the validation process at the end of the project. The
use of such authentication is used to determine whether the system has achieved its intended
use. This demonstrates the meeting's purpose and the client's requirement.
5. 3
Analyze and secure the wireless network using WPA2.
Health Issues
Microwave signals, like those in mobile phones, are used by wireless LAN. Therefore, any
health issue will be comparable to a cell phone. A typical wireless AP's transmitted power is
100mW or less. even if the radio wave produced by the power sent by a GSM handset will be
as high as two Watts. Following a comparison of the two values, it is discovered that using
the wireless AP is safe.
Availability
The term network availability refers to the ease with which it can be used. When the student,
who is the primary user on campus, requires a high-quality network that is also timely. Users
can access the network at the same speed from any location on campus. Parallel processing,
in conjunction with communication changes, maintains a high level of network availability. It
requires financial assistance to improve availability. To improve network quality, campus must
be adaptable and trustworthy. When the network system is well maintained, the accessibility
of more networks is always visible. The computer network requires updates in order to form
more resources for updated changes. Such operations are carried out by conducting an audit
of the computer network. Every network develops its own type of availability, which should
be maintained on a regular basis. Regular network maintenance is required to increase
bandwidth and improve availability. The entire network system is dependent on cables and
routers; some are directly connected to cables while others are wirelessly connected. Trees
and other obstacles may grow in campus buildings, so they must be maintained on a regular
basis.
Privacy
Aside from simply tracking a user's MAC address, data collection can also enable the derivation
of locations, movements, and contacts. Although tracking other aspects of the wireless
signalling protocol is less obvious, big data approaches allow for the detection of patterns in
wireless communications, leaving a trail of "electronic fingerprints" wherever users go. Third-
party actors who passively monitor radio links and decode exposed information may gain
access to this information. Users are unlikely to be aware that some information is visible to,
and sometimes intentionally provided to, operators of "visited" networks such as hotspots,
hospitality networks, retail stores, and others.
Wireless Integrity
Network Integrity informs you whether or not users are connecting to an evil twin or suspicious
network. Attackers create evil twin hotspots, which are Wi-Fi access points set up by an
attacker. The fake hotspot looks exactly like a legitimate hotspot, complete with the primary
network name of a nearby business, such as a coffee shop that offers free Wi-Fi to its
customers. An attacker can steal account names and passwords and redirect victims to
malware or phishing sites by imitating a legitimate hotspot and tricking users into connecting
to it.
Confidentiality
Confidentiality is the property of data in general security is required for most organizations.
To maintain confidentiality in a wireless network, it is not an easy task today. There are many
packet analysers available on the internet that are commonly used to break the network. For
example, an access point transmitting 3000 bytes at 11mbps will take 24 bits space after
6. 4
approximately 10 hours. Some privacy is being developed to protect data theft and can be
recorded. If anything, nefarious appears in the system, an alert will appear. As a result,
security measures can be implemented to reduce the risk of data theft. Different users employ
various forms of protection. A sample is created in order to better understand the user. This
sample provides information about security, such as password protection, and how the
campus should be secured.
Implementation of the above network using Cisco Packet
Tracer
Conclusion
Hill Cot Road Hospital and its network infrastructure diagram has been developed for
making its service more flexible, scalable and deliver better productivity to clients. The
technical and business focus of the organization has been focused and an associated network
design thus, has been developed to offer better services to the staffs and management as
well. the design has been architecture in such a way, that in upcoming days, the network
infrastructure will provide a lossless and rigid connectivity even in a disastrous condition.
Therefore, the current study has addressed a scalable network design for the campus with
implementing several equipment for each of the two buildings as well.
7. 5
References
Beyond standards, 2022. Data Privacy and ease of use in wireless networks. [Online]
Available at: https://beyondstandards.ieee.org/data-privacy-and-ease-of-use-in-wireless-networks/
[Accessed 12 June 2022].
Diva Portal, 2022. [Online]
Available at: http://www.diva-portal.org/smash/get/diva2:695650/FULLTEXT02
[Accessed 12 June 2022].
Giac, 2022. Avoid Ethical Legal Issues Wireless Network-discovery. [Online]
Available at: https://www.giac.org/paper/gsec/2285/avoid-ethical-legal-issues-wireless-network-
discovery/103942
[Accessed 14 June 2022].
Techdocs, 2022. Getting Started with Network Integrity. [Online]
Available at: https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-
and-management/endpoint-security/sescloud/Secure-Connection/getting-started-with-network-
integrity-v129873021-d4152e868.html
[Accessed 12 June 2022].
UK Essays, 2022. Wireless Networks Security Privacy And Ethical Issues Computer Science Essay.
[Online]
Available at: https://www.ukessays.com/essays/computer-science/wireless-networks-security-
privacy-and-ethical-issues-computer-science-
essay.php#:~:text=Confidentiality%20is%20the%20property%20of%20the%20data%20in,will%20tak
e%2024%20bit%20space%20after%20approximately%
[Accessed 13 June 2022].