SlideShare a Scribd company logo
1 of 7
Download to read offline
FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY
DCOMP205, WIRELESS NETWORK APPLICATION
Title : Individual Assignment
Issue Date : Week 2
Due Date : Week 4
Lecturer/Examiner : Mr. Abass Conteh
Name of Student/s : Ibrahim Pateh Bah
Student ID No. : 905002467
Class : BICT1201
Semester/Year : Year 3, Semester 1.
Academic Honesty Policy Statement
I/We, hereby attest those contents of this attachment are my own work. Referenced works, articles,
art, programs, papers or parts thereof are acknowledged at the end of this paper. This includes data
excerpted from CD-ROMs, the Internet, other private networks, and other people’s disk of the computer
system.
Student’s Signature : Date: 13th
MAY 2022
LECTURER’S COMMMENTS/GRADE: for office use only upon receive
Remark
DATE :
TIME :
RECEIVER’S NAME :
i
Table of Contents
Introduction ............................................................................................................................................1
Ethical Issues for Wireless Network........................................................................................................1
Networking and End User Devices for the Office ...............................................................................2
SYSTEM REQUIREMENTS.................................................................................................................2
Network Design...................................................................................................................................2
Analyze and secure the wireless network using WPA2. .....................................................................3
Health Issues...................................................................................................................................3
Availability.......................................................................................................................................3
Privacy.............................................................................................................................................3
Wireless Integrity............................................................................................................................3
Confidentiality.................................................................................................................................3
Implementation of the above network using Cisco Packet Tracer.....................................................4
Conclusion...............................................................................................................................................4
References ..............................................................................................................................................5
1
Introduction
A wireless network design will be planned and develop for Hill Cot Road Hospital. Hill Cot
Road Hospital is a Sierra Leonean based organization, which comprises of 2 buildings within
its complex area. The specific report will be going to develop a wireless network design for
the organization as well for its employees such that it can provide them strategy in saving
revenue and delivers more productivity as well. Therefore, the entire network design will be
based on star topology because based on the design of building complex it will be easier to
implement this framework. As this network system provides many good things simultaneously
there are changes of system break down, important data will be secured. The system will be
secured using WPA2 technology.
The foundation of this project is the significance of a computer network for a contemporary
business. For the fictitious businesses Plastic Fantastic and Cashflow, I served as a consultant.
These two businesses require assistance in establishing a brand-new computer network. My
responsibility is to tailor each company's proposal to meet their demands and expectations.
Ethical Issues for Wireless Network
A complete computer network system must be maintained in order to concentrate.
Independent contractors must obtain permission from the preferred network system. Each
component of this assignment is necessary for its proper completion. Because everything is
localized, database errors and theft have become more frequent. A business must create a
robust network system. It must adhere to specific logic to secure the data in order to comply
with government regulations. There is a system that governor clauses developed.
The developed system must be created in a way that makes it flexible enough for anyone to
use. Working on a network shouldn't present any challenges for employees who share the
same network. In order for anyone to be able to work from anywhere in the company when
all the computers are properly connected to a network, a flow-less design must be created.
Since every computer is connected to a single server, everyone can access the data. A system
is designed in such a way that it should have a wide bandwidth and be able to connect to
both the internet and the World Wide Web, or WWW. This network is built with the expectation
that it will be reliable. IT networks are created to ensure that people, organizations, and
businesses run smoothly. This network system aids in securing an entire IT system because
there is always a chance for a breakdown.
Typically, the following activities involve breaching access points:
1. to visit adult websites or to introduce malware into the network
2. to steal from banks and commit money theft
3. in order to gain experience with hacking
2
Networking and End User Devices for the Office
SYSTEM REQUIREMENTS
Hill Cot Road Hospital is a medium-sized organization. Thus, for avoiding any problems
within the network infrastructure, the computers in each of the 2 buildings are connected to
three 10/100 Mb switches with 24 ports each. The employees including doctors, nurse, admin,
management staffs will be equipped with highly configures computers with:
• 6GB RAM
• 500GB SSD
• Each PC with 3 USB ports and with Windows 11 OS enterprise edition
• Processors will be AMD Ryzen 7 of 10th gen
• Several staffs will have different IoT enabled devices like room temperature Hospitalal
information transferring tools, air quality sensors, data capturing machine.
• Three HP laser printers will be connected to the computer devices. Most of the computer
devices will be running on Windows 11 OS such that each device can have high
flexibility to execute advance operations. Nevertheless, it is mandatory for the employees
and managers of the company to share files within the building and associated
departments. Majority of files like planning history records, storage and transportation
summary. These record files will also be available for downloads and operation while any
staffs will be away from the enterprise. The printers that will be allocated will be
comprised to each computers making copies of documents at every department.
Network Design
This network design is based on client requirements, and it is determined by the company's
growth. This network design is based on the company's future growth and will be used.
Justification
The purpose of authentication is to determine whether the construction system is correct.
Here, the developed system fulfils the expected rationale and meets the Hospital Requirement
for whom it was designed. We completed the validation process at the end of the project. The
use of such authentication is used to determine whether the system has achieved its intended
use. This demonstrates the meeting's purpose and the client's requirement.
3
Analyze and secure the wireless network using WPA2.
Health Issues
Microwave signals, like those in mobile phones, are used by wireless LAN. Therefore, any
health issue will be comparable to a cell phone. A typical wireless AP's transmitted power is
100mW or less. even if the radio wave produced by the power sent by a GSM handset will be
as high as two Watts. Following a comparison of the two values, it is discovered that using
the wireless AP is safe.
Availability
The term network availability refers to the ease with which it can be used. When the student,
who is the primary user on campus, requires a high-quality network that is also timely. Users
can access the network at the same speed from any location on campus. Parallel processing,
in conjunction with communication changes, maintains a high level of network availability. It
requires financial assistance to improve availability. To improve network quality, campus must
be adaptable and trustworthy. When the network system is well maintained, the accessibility
of more networks is always visible. The computer network requires updates in order to form
more resources for updated changes. Such operations are carried out by conducting an audit
of the computer network. Every network develops its own type of availability, which should
be maintained on a regular basis. Regular network maintenance is required to increase
bandwidth and improve availability. The entire network system is dependent on cables and
routers; some are directly connected to cables while others are wirelessly connected. Trees
and other obstacles may grow in campus buildings, so they must be maintained on a regular
basis.
Privacy
Aside from simply tracking a user's MAC address, data collection can also enable the derivation
of locations, movements, and contacts. Although tracking other aspects of the wireless
signalling protocol is less obvious, big data approaches allow for the detection of patterns in
wireless communications, leaving a trail of "electronic fingerprints" wherever users go. Third-
party actors who passively monitor radio links and decode exposed information may gain
access to this information. Users are unlikely to be aware that some information is visible to,
and sometimes intentionally provided to, operators of "visited" networks such as hotspots,
hospitality networks, retail stores, and others.
Wireless Integrity
Network Integrity informs you whether or not users are connecting to an evil twin or suspicious
network. Attackers create evil twin hotspots, which are Wi-Fi access points set up by an
attacker. The fake hotspot looks exactly like a legitimate hotspot, complete with the primary
network name of a nearby business, such as a coffee shop that offers free Wi-Fi to its
customers. An attacker can steal account names and passwords and redirect victims to
malware or phishing sites by imitating a legitimate hotspot and tricking users into connecting
to it.
Confidentiality
Confidentiality is the property of data in general security is required for most organizations.
To maintain confidentiality in a wireless network, it is not an easy task today. There are many
packet analysers available on the internet that are commonly used to break the network. For
example, an access point transmitting 3000 bytes at 11mbps will take 24 bits space after
4
approximately 10 hours. Some privacy is being developed to protect data theft and can be
recorded. If anything, nefarious appears in the system, an alert will appear. As a result,
security measures can be implemented to reduce the risk of data theft. Different users employ
various forms of protection. A sample is created in order to better understand the user. This
sample provides information about security, such as password protection, and how the
campus should be secured.
Implementation of the above network using Cisco Packet
Tracer
Conclusion
Hill Cot Road Hospital and its network infrastructure diagram has been developed for
making its service more flexible, scalable and deliver better productivity to clients. The
technical and business focus of the organization has been focused and an associated network
design thus, has been developed to offer better services to the staffs and management as
well. the design has been architecture in such a way, that in upcoming days, the network
infrastructure will provide a lossless and rigid connectivity even in a disastrous condition.
Therefore, the current study has addressed a scalable network design for the campus with
implementing several equipment for each of the two buildings as well.
5
References
Beyond standards, 2022. Data Privacy and ease of use in wireless networks. [Online]
Available at: https://beyondstandards.ieee.org/data-privacy-and-ease-of-use-in-wireless-networks/
[Accessed 12 June 2022].
Diva Portal, 2022. [Online]
Available at: http://www.diva-portal.org/smash/get/diva2:695650/FULLTEXT02
[Accessed 12 June 2022].
Giac, 2022. Avoid Ethical Legal Issues Wireless Network-discovery. [Online]
Available at: https://www.giac.org/paper/gsec/2285/avoid-ethical-legal-issues-wireless-network-
discovery/103942
[Accessed 14 June 2022].
Techdocs, 2022. Getting Started with Network Integrity. [Online]
Available at: https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-
and-management/endpoint-security/sescloud/Secure-Connection/getting-started-with-network-
integrity-v129873021-d4152e868.html
[Accessed 12 June 2022].
UK Essays, 2022. Wireless Networks Security Privacy And Ethical Issues Computer Science Essay.
[Online]
Available at: https://www.ukessays.com/essays/computer-science/wireless-networks-security-
privacy-and-ethical-issues-computer-science-
essay.php#:~:text=Confidentiality%20is%20the%20property%20of%20the%20data%20in,will%20tak
e%2024%20bit%20space%20after%20approximately%
[Accessed 13 June 2022].

More Related Content

Similar to Wireless Network Design for Hill Cot Road Hospital

An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System Saptarshi Nag
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignBizeducator.com
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
How io t is changing our world
How io t is changing our worldHow io t is changing our world
How io t is changing our worldmanoharparakh
 

Similar to Wireless Network Design for Hill Cot Road Hospital (14)

An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and Design
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Black_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdfBlack_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdf
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
How io t is changing our world
How io t is changing our worldHow io t is changing our world
How io t is changing our world
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Wireless Network Design for Hill Cot Road Hospital

  • 1. FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY DCOMP205, WIRELESS NETWORK APPLICATION Title : Individual Assignment Issue Date : Week 2 Due Date : Week 4 Lecturer/Examiner : Mr. Abass Conteh Name of Student/s : Ibrahim Pateh Bah Student ID No. : 905002467 Class : BICT1201 Semester/Year : Year 3, Semester 1. Academic Honesty Policy Statement I/We, hereby attest those contents of this attachment are my own work. Referenced works, articles, art, programs, papers or parts thereof are acknowledged at the end of this paper. This includes data excerpted from CD-ROMs, the Internet, other private networks, and other people’s disk of the computer system. Student’s Signature : Date: 13th MAY 2022 LECTURER’S COMMMENTS/GRADE: for office use only upon receive Remark DATE : TIME : RECEIVER’S NAME :
  • 2. i Table of Contents Introduction ............................................................................................................................................1 Ethical Issues for Wireless Network........................................................................................................1 Networking and End User Devices for the Office ...............................................................................2 SYSTEM REQUIREMENTS.................................................................................................................2 Network Design...................................................................................................................................2 Analyze and secure the wireless network using WPA2. .....................................................................3 Health Issues...................................................................................................................................3 Availability.......................................................................................................................................3 Privacy.............................................................................................................................................3 Wireless Integrity............................................................................................................................3 Confidentiality.................................................................................................................................3 Implementation of the above network using Cisco Packet Tracer.....................................................4 Conclusion...............................................................................................................................................4 References ..............................................................................................................................................5
  • 3. 1 Introduction A wireless network design will be planned and develop for Hill Cot Road Hospital. Hill Cot Road Hospital is a Sierra Leonean based organization, which comprises of 2 buildings within its complex area. The specific report will be going to develop a wireless network design for the organization as well for its employees such that it can provide them strategy in saving revenue and delivers more productivity as well. Therefore, the entire network design will be based on star topology because based on the design of building complex it will be easier to implement this framework. As this network system provides many good things simultaneously there are changes of system break down, important data will be secured. The system will be secured using WPA2 technology. The foundation of this project is the significance of a computer network for a contemporary business. For the fictitious businesses Plastic Fantastic and Cashflow, I served as a consultant. These two businesses require assistance in establishing a brand-new computer network. My responsibility is to tailor each company's proposal to meet their demands and expectations. Ethical Issues for Wireless Network A complete computer network system must be maintained in order to concentrate. Independent contractors must obtain permission from the preferred network system. Each component of this assignment is necessary for its proper completion. Because everything is localized, database errors and theft have become more frequent. A business must create a robust network system. It must adhere to specific logic to secure the data in order to comply with government regulations. There is a system that governor clauses developed. The developed system must be created in a way that makes it flexible enough for anyone to use. Working on a network shouldn't present any challenges for employees who share the same network. In order for anyone to be able to work from anywhere in the company when all the computers are properly connected to a network, a flow-less design must be created. Since every computer is connected to a single server, everyone can access the data. A system is designed in such a way that it should have a wide bandwidth and be able to connect to both the internet and the World Wide Web, or WWW. This network is built with the expectation that it will be reliable. IT networks are created to ensure that people, organizations, and businesses run smoothly. This network system aids in securing an entire IT system because there is always a chance for a breakdown. Typically, the following activities involve breaching access points: 1. to visit adult websites or to introduce malware into the network 2. to steal from banks and commit money theft 3. in order to gain experience with hacking
  • 4. 2 Networking and End User Devices for the Office SYSTEM REQUIREMENTS Hill Cot Road Hospital is a medium-sized organization. Thus, for avoiding any problems within the network infrastructure, the computers in each of the 2 buildings are connected to three 10/100 Mb switches with 24 ports each. The employees including doctors, nurse, admin, management staffs will be equipped with highly configures computers with: • 6GB RAM • 500GB SSD • Each PC with 3 USB ports and with Windows 11 OS enterprise edition • Processors will be AMD Ryzen 7 of 10th gen • Several staffs will have different IoT enabled devices like room temperature Hospitalal information transferring tools, air quality sensors, data capturing machine. • Three HP laser printers will be connected to the computer devices. Most of the computer devices will be running on Windows 11 OS such that each device can have high flexibility to execute advance operations. Nevertheless, it is mandatory for the employees and managers of the company to share files within the building and associated departments. Majority of files like planning history records, storage and transportation summary. These record files will also be available for downloads and operation while any staffs will be away from the enterprise. The printers that will be allocated will be comprised to each computers making copies of documents at every department. Network Design This network design is based on client requirements, and it is determined by the company's growth. This network design is based on the company's future growth and will be used. Justification The purpose of authentication is to determine whether the construction system is correct. Here, the developed system fulfils the expected rationale and meets the Hospital Requirement for whom it was designed. We completed the validation process at the end of the project. The use of such authentication is used to determine whether the system has achieved its intended use. This demonstrates the meeting's purpose and the client's requirement.
  • 5. 3 Analyze and secure the wireless network using WPA2. Health Issues Microwave signals, like those in mobile phones, are used by wireless LAN. Therefore, any health issue will be comparable to a cell phone. A typical wireless AP's transmitted power is 100mW or less. even if the radio wave produced by the power sent by a GSM handset will be as high as two Watts. Following a comparison of the two values, it is discovered that using the wireless AP is safe. Availability The term network availability refers to the ease with which it can be used. When the student, who is the primary user on campus, requires a high-quality network that is also timely. Users can access the network at the same speed from any location on campus. Parallel processing, in conjunction with communication changes, maintains a high level of network availability. It requires financial assistance to improve availability. To improve network quality, campus must be adaptable and trustworthy. When the network system is well maintained, the accessibility of more networks is always visible. The computer network requires updates in order to form more resources for updated changes. Such operations are carried out by conducting an audit of the computer network. Every network develops its own type of availability, which should be maintained on a regular basis. Regular network maintenance is required to increase bandwidth and improve availability. The entire network system is dependent on cables and routers; some are directly connected to cables while others are wirelessly connected. Trees and other obstacles may grow in campus buildings, so they must be maintained on a regular basis. Privacy Aside from simply tracking a user's MAC address, data collection can also enable the derivation of locations, movements, and contacts. Although tracking other aspects of the wireless signalling protocol is less obvious, big data approaches allow for the detection of patterns in wireless communications, leaving a trail of "electronic fingerprints" wherever users go. Third- party actors who passively monitor radio links and decode exposed information may gain access to this information. Users are unlikely to be aware that some information is visible to, and sometimes intentionally provided to, operators of "visited" networks such as hotspots, hospitality networks, retail stores, and others. Wireless Integrity Network Integrity informs you whether or not users are connecting to an evil twin or suspicious network. Attackers create evil twin hotspots, which are Wi-Fi access points set up by an attacker. The fake hotspot looks exactly like a legitimate hotspot, complete with the primary network name of a nearby business, such as a coffee shop that offers free Wi-Fi to its customers. An attacker can steal account names and passwords and redirect victims to malware or phishing sites by imitating a legitimate hotspot and tricking users into connecting to it. Confidentiality Confidentiality is the property of data in general security is required for most organizations. To maintain confidentiality in a wireless network, it is not an easy task today. There are many packet analysers available on the internet that are commonly used to break the network. For example, an access point transmitting 3000 bytes at 11mbps will take 24 bits space after
  • 6. 4 approximately 10 hours. Some privacy is being developed to protect data theft and can be recorded. If anything, nefarious appears in the system, an alert will appear. As a result, security measures can be implemented to reduce the risk of data theft. Different users employ various forms of protection. A sample is created in order to better understand the user. This sample provides information about security, such as password protection, and how the campus should be secured. Implementation of the above network using Cisco Packet Tracer Conclusion Hill Cot Road Hospital and its network infrastructure diagram has been developed for making its service more flexible, scalable and deliver better productivity to clients. The technical and business focus of the organization has been focused and an associated network design thus, has been developed to offer better services to the staffs and management as well. the design has been architecture in such a way, that in upcoming days, the network infrastructure will provide a lossless and rigid connectivity even in a disastrous condition. Therefore, the current study has addressed a scalable network design for the campus with implementing several equipment for each of the two buildings as well.
  • 7. 5 References Beyond standards, 2022. Data Privacy and ease of use in wireless networks. [Online] Available at: https://beyondstandards.ieee.org/data-privacy-and-ease-of-use-in-wireless-networks/ [Accessed 12 June 2022]. Diva Portal, 2022. [Online] Available at: http://www.diva-portal.org/smash/get/diva2:695650/FULLTEXT02 [Accessed 12 June 2022]. Giac, 2022. Avoid Ethical Legal Issues Wireless Network-discovery. [Online] Available at: https://www.giac.org/paper/gsec/2285/avoid-ethical-legal-issues-wireless-network- discovery/103942 [Accessed 14 June 2022]. Techdocs, 2022. Getting Started with Network Integrity. [Online] Available at: https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security- and-management/endpoint-security/sescloud/Secure-Connection/getting-started-with-network- integrity-v129873021-d4152e868.html [Accessed 12 June 2022]. UK Essays, 2022. Wireless Networks Security Privacy And Ethical Issues Computer Science Essay. [Online] Available at: https://www.ukessays.com/essays/computer-science/wireless-networks-security- privacy-and-ethical-issues-computer-science- essay.php#:~:text=Confidentiality%20is%20the%20property%20of%20the%20data%20in,will%20tak e%2024%20bit%20space%20after%20approximately% [Accessed 13 June 2022].