During this course, you have developed multiple plans and recommendations for your client, Sunshine Health Corporation. It is now time to present the final plan as your contract has been completed through this first phase. Please review your previous work including that of last week with your Network Security Plan and make revisions and modifications as necessary based on our discussions and research up to this point. This is a plan that would be submitted to your customer for their review and their records of the work that you have been contracted to do. It is important that is clear and concise and easily referenced. The project should include at a minimum: Overview of the contract (up to 1 page, more than a paragraph) Table of contents Executive summary (up to 1 page, more than a paragraph) Review of the individual projects. Each project should be a separate section (including those that were discussions).Review and recommendations. Reference page. Instead of references listed per project, develop a single section with all references and resources utilized throughout the project, using APA format.The assignment should be 8-10 pages of content not counting title page, reference page, or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format. This report is a representation of your business. How do you want your business seen and remembered?NETWORK CABLING
Network Cabling
Ryan M. Harmon
IS535/ Telecommunications
8 November 2016
In todays world internet is vital for daily task. It is very high in demand and which
people will find often feel lost or discounted if they cannot access the internet. This enormous
concept that every organization will have. Personally, I gone out to Lowes and inquired about
networking cable and found myself in purchase the more expensive cable because of the rating
on the wire, this you should never go cheap on especially if you need access to the internet all the
When you are planning to set up an office, company or a building for networking, you
have first created a goal and what is realistic for the company to achieve. Ensure that you have
the right people to make the right decisions that are involved in these decisions because you want
to do it right the first time. If you end up making the wrong choice this will cost you time and
money in the long run, so its highly important you make the right decision, whether it is
expensive at first it will pay off in the long-term. As the Sunshine Health Corporation Company,
they have to ensure they do all can do to ensure they provide reliable networking cabling. When
the report comes in at after the inspection, it will be highly visible to their proper networking
The inspection report came back and stated that the building was the wire was the old
cabling. Now the Corporation needs to find and contract a networking company to provide
service. Of course, this would mean that the old wiring would have to replace because the legacy
cable is slower than then the new cabling. Due to an older building the installation of Wi-Fi,
might have some blockage areas that are cannot receive service. But also, considering when you
connect to the cable the service will be faster and more secure than Wi-Fi. The cabling should be
Category 6 cabling as that has a better rating than Category 5 cabling. As the CAT5 cable has a
maximum rating of 1000MBits/second. As the rating for safety CAT6 cabling meets the criteria
and is rated higher in the safety aspect. Another reason for CAT6 cabling is because it transfers
data at 10000MBits/second. The cabling for the future endeavors as CAT5 would be phased out.
So, you might spend a little bit more for the CAT6 cabling but the at the end of the day it would
be worth the investment. Something that is going to be required to install CAT6 cable is; cable
tester, verification, qualification tester.
Now when you look at the building, there will be old cabling with coaxial and telephone
cabling that uses RJ11 connectors. With the upgrade of the CAT6 cable, you will be using the
8p*C (RJ45) connector. With a higher connect speed this change would also be an easy
installation. Now when you have this in the communications hub room, it needs to be in perfect
condition. You will need to have labeling on each cable and at least have two per section. You
will need a centralization tray system, and on a raised platform.
The labeling process needs to identify and reviewed by the Network Service orientation clearly.
Another thing is that the room will also enable the voice and date in the office, and again it needs
to be properly arranged. With the CAT6 cabling, it also needs to go along with the RJ45.
With Wi-fi being the new thing to be mobile and always connected you would have to
install it at each communication room. With that being said you would be able to communicate
with the local cabling and signals can send and receive with from the surrounding computers. As
the communication, the room would be in a local area. You will have place the scope of the
wireless LAN, and it needs to state what the wireless would be able to satisfy including; the
standards, system architecture, the access points, and the materials.
The company should have placed this in for the bid to see if there were a couple of businesses
willing to offer for and then they should have researched to find out who would be the better
company to hire. With all the requirements, they should have also conducted an in-depth study of
development this action for Local Area Network. This would also include the contractor that
would be installing the cable too. As we know now that wireless creates a more mobile
environment, unlike the LAN cable that provides the faster connection.
With their decisions, they can always opt in to have Wi-fi as well and have a multitype function
business as well. With an open area and 20,000 square feet, it would be feasible to have Wi-fi.
This would impact the common room along with the entire building.
With the installation and complete set up would determine what would be more
beneficial and cost efficient at the end. As business needs to operate, they would be successful by
replacing the CAT5 for the CAT6. As we know that CAT6 is faster than then CAT5. With the
upgrade of the phone to RJ45 would also be install that would bring up that to a higher speed as
Looking at the expenses wiring would be about $8,000, $5,500 for the equipment, $1,895
for installation, $800 for testing would equal $16,195.
Corporation, F. (2006). Fiber optic cat5, cat 6, and cat 7 cable tester. Retrieved November 7, 2016, from 
Five reasons to go wireless. (2008, June 10). Retrieved November 8, 2016, from 
Asset Recovery
Ryan M. Harmon
IS535/ Telecommunications
15 November 2016
As any company grows it will have to change and if it does it most likely will eventually be shut
down. In todays world as computers are evolving all the time along with software and hardware
so to become a reliable company, you will also need to up to date to stay with the growing world
of today. As a tech, savvy guy myself I like to have the latest greatest gadgets but not being
sucked into buying it every time it comes out. So, for companies they should invest in updating
their equipment every so often with the latest. Now the question comes to mind in what do you
do with that equipment; you will need to recycle that material does not just pile up and clutter up
an area because then that just keeps piling up. Asset recovery will be efficient and show only
ensure that it does not turn out to disaster again and which would be lost of money during this
time. For Sunshine Health Company they will need to obtain a deposition of the equipment so
they can have an effective way to undertake this task.
With the systems that are outdated ensure they are left unplugged from any of the networks and
ensure they are kept in a separate room. As these computers, can be utilized for storing or
recording the companys data. As it ages, the computers will get slower, and it will not be able to
keep up with the newer systems. If you think about and as old as myself, thinking to the days of
dial up the internet connect and used to wait forever and if I were still using that same service I
would be waiting a very extended period of time for the Google search page to appear. When
things operate at a slow pace, it can very frustrating and through the storage of data. Which when
these reaches it peaks whether it is to the data storage limit or outdated hardware this can cause
issues for the tech and eventually the company will have to break down to buy new equipment.
As the old computers are decommissioned now, they will have to think of what they may want to
do with that equipment. Not just the machines can be placed as decommissioned, but the
following can also follow along; voice devices, computer output microfilm, magnetic disks along
with CDs.
Not just thinking of computers as outdated equipment but you can also think of air conditioners
in the communications rooms, telecommunication equipment; land lines, answering machines,
fax machines, and local area networks (LAN).
Asset Recovery Management (ARM) has to be considered with several factors being considered.
Sunshine Corps, needs to think about the spare parts that have been bought to maintain their
equipment. As the parts, should not be part of the companys budget but rather to maintain and
repair at an affordable price. With the installation and uninstallation of the equipment in all areas
of the company should not be part of the budget either, for example, man hours, material, and
operation cost. Sunshine Health Corporation should select the most advanced equipment that the
company can purchase to help asset recovery with the quality of updated services. They would
also have to consider the feedback from the people which it would increase the moral of the
companys employees. For the equipment that would only go up in smoke should be fully torn
apart and demolished.
Deposition instructions would help the decommissioning process that the company has to
consider and would also have to keep a log for that equipment as well. Along with the list, you
would have to store the original price, the maintenance log of what that piece of equipment
utilized during its cycle of life. Now a cost that the company has to aspect is the price to obtain
for all the information during the deposition process. You would also think of acquiring the man
hours, transportation costs, and storage cost. As any other serves contracting an asset recovery
service would have to be a decision to hiring the right firm to complete this mission. Also in
consideration to look at the service team is ensuring they have all the available equipment to
conduct this process properly.
Tools and equipment that can be used as a collection of the equipment and the storage facilities
are also substantial. With safety in mind, you need to ensure that proper measures are in place to
avoid and further damages in this process. Also, having properly trained people on the equipment
would be a significant indicator of a good asset recovery service. This would be professional
people who are safe and great enthusiasm to be able to carry out these strict guidelines during
this collection process. As this equipment, can be stored in a warehouse awaiting further
When is comes to decommissioned assets, you can also think about updating that
equipment. Which in a case study you can increase the life from 5 to 15 years. For example
Windows 7 or 8 they can upgrade to 8.1 or 10 which are faster than Windows 7 and 8. Windows
10 has a great multitasking feature compared to Windows 8. Which this process can be
uninstallation the installing of windows 8 to be able to install Windows 10. With the company
having the highly trained and qualified personnel will be tasked to upgrade process. Another job
would be installing a new network cabling through the enterprise. As the company is to get rid of
the CAT5 cable to CAT6 because like CAT5 only runs 1000 Bits/second CAT6 runs
10000Bits/second. Also, including the telephone cabling that would include the RJ45 connectors
compared to the RJ11 connectors which are slower. As the RJ45 are easy to install and available.
Another way of deposition is by donating the equipment as well. This would be another
choice that Sunshine Health Corporation can select for this asset. Just by giving this computer it
can be registry as a generous tax benefit and write-offs. The company will have selected the best
organization which is also best if they choose a non-profit organization that would be most
beneficial with the equipment. Before donating the computer Sunshine Health Corporation, they
should ensure the material they give is in good condition which if not could lead to expense. This
would also bring good will to the corporation as they give their equipment. I would say they can
publicize their donation, but in my eyes, I would like always to be a silent gift.
Another option in that Sunshine Health Corporation has to select from is salvaging and
selling of the decommissioned equipment. Which for the telecommunications equipment;
landlines, faxes and an answering machine can be sold for a low price? As the revenue can be
utilized in any department. The money can be use as training more people, or particular
commodities in like increasing their profit. This can also be a market to track in the highly
trained people and utilized it for their salaries.
118, V. H. (2016, May 4). Windows 10 vs. windows 8.1: 5 reasons youre missing out on
Microsofts best OS yet. Retrieved November 16, 2016, from
Decommission, asset recovery. Retrieved November 16, 2016, from
Markgraf, B. (2016). Asset recovery in telecommunications. Small Business Chron. Retrieved
from http://smallbusiness.chron.com/asset-recovery-telecommunications-10373.html
IEEE Specifications and Standards
Ryan M. Harmon
IS535/ Telecommunications
22 November 2016
A company that is out there to help develop standards and specifications for cabling is
The Institute of Electrical and Electronic Engineers (IEEE). Like any business, this has layers
that it starts off with from the Ethernet to the wireless. 1997 was when they began to approve of
these specifications and how they can be helpful in the communications arena. As this would be
the start of a new era and would be cost efficient in investing in. As they create the standards of
to a higher network speed along with a low interference rate. 802.11 was the name of the first
standard but like some things the first thing is not always liked. This would only support a 2mbps
system which was very slow.
Commented [G1]: Inserted:  be 
Commented [G2]: Inserted: n 
Commented [G3]: Inserted: beg 
Commented [G4]: Inserted: wa 
Commented [G5]: Inserted: ess, 
Commented [G6]: Inserted: busi 
Commented [G7]: Inserted: Like 
Commented [G8]: Deleted:As 
As 802.11a is a newer model of 802.11 which only applies to Local Area Networks (LANs). But
Commented [G9]: Deleted:compa 
Commented [G10]: Deleted:y 
with the newer model it supported up to 54mbps in the 5GHz band. Which it also utilized an
Orthogonal Frequency Division Multiplexing (OFDM). This was the digital era that started off in
Commented [G11]: Deleted:i 
Commented [G12]: Deleted:st 
Commented [G13]: Deleted:red 
the 1980s and had interference among channels near each other. It was transmitting data through
the phone lines. With 802.11b around it was less expensive but it only supported 11mbps in the
2.4 GHz bandwidth. This used a Complementary Code Keying (CCK) which replaced the Barker
Code in 1999.
Commented [G14]: Inserted: n 
Commented [G15]: Deleted:actually  
As 802.11g had only transmitted through 802.11g, it hands a faster rate compared to the
(b). The reasoning why is because of the wireless network WIFI. With WLANs, it gives
Commented [G16]: Deleted:the  
Commented [G17]: Inserted: , 
supported computers, telephones, and other communications equipment. As the (g) model had
transmitted 54 megabits per second, along with using the OFDM compared to the 802.11b which
utilized the CCK. Now with the 802.11n it had its eye on CCK, OFDM, and Direct Spread
Sequence spectrum (DSSS) modulation. It had supported 1000mbps which were the minimum
Commented [G18]: Inserted: ere 
Commented [G19]: Inserted: ere 
Commented [G20]: Inserted: , 
Commented [G21]: Inserted: give 
and could go up to 6000mbps which were way faster than 802.11g.
Commented [G22]: Deleted:hand 
Commented [G23]: Deleted:as 
Commented [G24]: Deleted:as 
As anything 802.11a had its advantages, as it utilized the 5GHz bandwidth and it was not as
crowding to the multichannel. Now the 802.11b had only supported 11mbps which could provide
54mbps. Which is good when it is divided up into numerous channels. With 802.11a it can also
be quite troubling as well. It can cost more than the others. As the devices, could not be
supported like computers, and notebooks. As the lower of distance would be a given to the
output power. As 802.11b is cheaper but it can be split up to support various applications. But if
you like speed this would not be the one to get because it would only reach 11mbps. It would
Commented [G25]: Inserted: into 
Commented [G27]: Deleted: own 
Commented [G28]: Deleted:actually  
Commented [G29]: Deleted:actually  
Commented [G30]: Deleted:by 
also crowd the lines, unlike 802.11a which mitigates these interferences. It was highly liked
Commented [G26]: Inserted: , 
because it was affordable.
Commented [G31]: Deleted:ctually a
With 802.11n it could provide 300mbps which was unlike the 802.11g as it would only support
54mbps. With this, it had supported three modulations for the digital connections which would
be fasters speeds. This also gave you security and was reliable which was able to be used on
802.11a, b, and g. This would also allow you to increase your clients and over a further distance.
But the distance would have to depend on some factors like the quality of material, the size of
the object and movement along with the direction of the antenna.
Commented [G32]: Inserted: , 
Commented [G33]: Inserted: three 
802.11n would not have too many issues with the interference. This system was only 2.4GHz
which was a risk of WIFI that was less compared to the (b) as it would have a better signal
Commented [G34]: Inserted: , 
Commented [G35]: Deleted:3 
Commented [G36]: Inserted:  a 
recovery. The (n) is also pricey, which is also changeling of an operation to 2.4 GHz, as it has
Commented [G37]: Inserted: o 
three overlapping channels, and this would mean fewer clients.
Commented [G38]: Inserted: r
Commented [G39]: Inserted: few 
With all this, the Sunshine Health Corporation could consider and apply the technologies that
would improve their communications system. As I believe that they should highly consider the
802.11a as this would be the best bang for the buck. It would be expensiveness to install, but in
Commented [G40]: Deleted:l 
Commented [G41]: Deleted:ss 
Commented [G42]: Inserted: , 
Commented [G46]: Deleted:, 
Commented [G43]: Inserted: , 
the long run, it would have paid for itself. Now they would have to consider the best company to
Commented [G44]: Inserted: , 
install this equipment. The company willing to do so would have to have the latest equipment to
be able to handle this task. With funds that are remaining, they should invest in the best
Commented [G45]: Inserted: , 
The company should listen to their employees and realize what they need along with the current
technology. With proper training, so they can increase skill-based knowledge. With the 802.11a
is reasonable because they connection speed was up to 54mbps to the 5GHz. It also was good in
consideration of OFDM. But the downside of this is it is not compatible with other technologies,
which can cause issues to its employees.
Commented [G47]: Inserted: h 
Commented [G48]: Inserted: wi 
Another idea is they could switch to the 802.11n. As this would be the latest technology but it
would also be the most expensive along with being faster than the 802.11a. This provides from
300mbps, unlike the 54mbps. The security is also way better too. This is also the best reliable
system as well. As they have considerations to think of they would have to believe in what invest
is the best for them.
Commented [G49]: Inserted: ‐ 
Commented [G50]: Inserted: , 
Commented [G51]: Deleted:the  
Commented [G52]: Deleted:o 
Commented [G53]: Deleted:s 
Commented [G54]: Inserted: eve
Commented [G55]: Inserted: bel 
Commented [G56]: Inserted: , 
Commented [G57]: Inserted: ing 
Commented [G58]: Deleted:th 
Commented [G59]: Deleted:nk 
IEEE 802.11n Standard. (n.d.). Retrieved November 21, 2016, from http://www.radioelectronics.com/info/wireless/wi-fi/ieee-802-11n.php
What is IEEE 802.11n, what are the advantages and challenges for 802.11n in Wi-Fi networks?
(2011). Retrieved November 20, 2016, from http://www.excitingip.com/186/what-is-ieee80211n-what-are-the-advantages-and-challenges-for-80211n-in-wi-fi-networks/
WLAN – 802.11 a,b,g and n. (n.d.). Retrieved November 20, 2016, from
Commented [G60]: Inserted: ? 
Commented [G61]: Deleted:. 
Internet Summary
Ryan M. Harmon
IS535/ Telecommunications
5 December 2016
To Interconnect 10 healthcare facilities require a financially beneficial and economical
approach. To start with, we need to consider the present environment as well as support distinct
expansion levels.
On the other hand, not each particular clinical practice can well integrate or rather fit in
health data innovation for the most part into their work too in the present time. Also, we can well
perceive that not every practice will embrace the healthcare Information Technology at the same
level of complexity.
Since all this, individuals should for that reason account for a scope of abilities more so
amongst data sources as well as data users, including Electronic Health Records (HER) and NonElectronic Health Records users, as people keep on advancing interoperability. Individuals and
caregivers have subsequently a constant need to find, send, receive and also utilize their health
data within and outside the healthcare delivery system and interoperable infrastructure ought to
empower this.
All in all, we should concentrate on value. We will continue at all times endeavor to
ensure their interoperability struggles and determinations bring about the best value to
individuals as well as care providers, advanced health, healthcare, including lower expenses
must, therefore, be assessable and determinate after some time furthermore, at any rate, offset the
minimum means venture.
High Availability – Networks (I). (n.d.). Retrieved December 03, 2016, from
Hochmuth, P. (2006). Are Cisco switches really so expensive? Retrieved December 02,
2016, from http://www.networkworld.com/article/2300612/lan-wan/are-cisco-switches-really-soexpensive-.html
Is an all-fiber network really cheaper? (n.d.). Retrieved December 04, 2016, from
Telecommunication Technology
Ryan M. Harmon
IS535/ Telecommunications
29 November 2016
Telecommunication Technology
Local Area Networks is a typical group of machines such as computers and are related to
the prime services that use a common point of communication wing and the current wireless
servers. Besides, LAN Comprises and engulfs the peripheral devices and the computers that
usually get a connection to the server that is within a unique area geographically. For instance,
the commercial and offices which are established by either individuals or the company. It is in
such regions where the LAN plays a very vital role as it quickly helps in the connection of the
people locally, therefore, making it easier for the quick access to the information that is to be
shared in the family or within the company in a smaller location. Secondly, LAN is a
sophisticated technology which employs various tactics in handling multiple occurrences in the
whole technology. With LAN Switching in place, it does an excellent movement technology that
helps the computer and the server to have a connection that yields an additional execution of the
tasks and making its entirety movement to be easy. Typically, it is not always convenient for the
large operations but more suitable for the small campus backbones.
However, local area Network plays a very vital role by ensuring that it allows the users to
make a connection on their computers to conventional servers. Typically, these are usually the
central computers to the general network. These servers contain some data which are various
types. The most dominant data that are in the computer are numbers, for instance, the accounting
information, which various financial departments may wish to share within their department with
different people in departmental decision making. Consequently, the Department can make a
pool of exchange of stuff like the photos that marketing department may wish to dispose of
people for them to establish the exact location, through the help of the local area network. And
this takes place when one works on the marketing project in a company.
Moreover, it is through this action of LAN which helps many organizations such as
banking industries have employed the use this technology in business; they use the automated
ATM which one can make the withdrawal of the cash from any point of the location irrespective
of the geographical location. However, it makes the work to be so comfortable and convenient to
the operators who use the internet enabled gadgets. Local Area Network gives that provision that
gives a chance to everyone to work on the same document using the right programs which at
least a bigger number can see and have access to at all cost, and able to access them in real time.
Perhaps, the most compelling aspect of the central server with a stronger connection regarding
internet, and this makes everyone who is entailed to the company can access the same
information that is within the department of a company at their doorstep in the desk of the
worker or even from home. Nowadays accessing LAN is very simple, one can see the signal
from his/her phone. Therefore, it is possible for them to make its abundance availability on our
Mobile technology has brought a tremendous development in the communication sector.
If today one would imagine that life could be the same today. With the wireless, technology has
become a vital part of the world. Mobile technology has made the world to be viewed differently
and in various sectors. For instances, Healthcare, wireless communication has brought a
tremendous impact on the medical care in the remote areas which eventually as made the world
to view mobile wireless to be the most effective regarding the transformation of the world. For
instance, the United Nations Foundation which has adopted the use of technology in make
equitably distributed health facilities in various parts of the world.
The world concerning technology has the business communication to be enhanced. The
interface has adopted the drastic and impact change in the world of business. And this has
become more of advantageous to various states than any other organization. Mobile technology
can typically improve the services that a firm offers to the customers. It is possible in a case
where a secure access the customers regarding the management. However, it is usually easy to
access your clients details via regular updates of their details. Lastly, on the advantages, very
robust solutions may be found wherever office gets a direct link to the departmental office in
which one works in even offline. And at any moment could do them remotely under the
guideline of checking the prices and stock availability. Additionally, the vast adoption of cloud
computing has brought positive impacts on the mobile devices by providing a technical solution
to the problems over the internet.
In everything which has merits, there must always be its limitations. There is a relatively
high cost of the machines and the equipment which surround the mobile devices. However, such
cost which is involved in handling the challenge becomes a puzzle. The mobile information
Technology tools put valuable information at risks, whereby those relevant data are disclosed to
the unauthorized users in case of unimproved measures is taken which makes the mobile devices
against the subjection of such materials into risks.
Work Cited
Lan, Vu Phuong, and Dinh Thi Bao Hoa. Application of remote sensing GIS and technologies
for flood mapping to serve impact assessment in Vinh Phuc province. VNU Journal of Science:
Earth and Environmental Sciences 27.4 (2016).
Vij, Sonakshi, and Amita Jain. 5G: Evolution of a secure mobile technology. Computing for
Sustainable Global Development (INDIACom), 2016 3rd International Conference on. IEEE,
Sunshine’s Network Security Plan
Ryan M. Harmon
IS535/ Telecommunications
9 December 2016
Sunshine’s Network security plan
Sunshine Health Corporation has embraced the incorporation of Local Area Networks as
to come out clear on their provided cost benefits and production. Notably, the LANs lack the
ultimate protection from security vulnerabilities. As a matter of fact, the entity has only made
minimal efforts to secure their network at the different levels. The overall impact is that their
confidential files are prone to jeopardize to malicious individuals or groups. For a safe network
environment to be realized, various elements ought to be put into consideration. For instance
topology, hosts incorporation in the network, selection of the appropriate software and hardware
technology as well as their keen configuration to suit the system. Therefore, this article is a
presentation of the plan that can be incorporated to secure the pertinent data of Sunshine Health
Securing the Various Environments
Technology has been quite handy in the address of the desires of Sunshine Health
Corporation to incorporate automation into work schemes as well as the collection of data and its
consequential storage. Since the entity has distributed environments, each of these layouts has
different assets which all have different values. For instance, in one of the phases of the
organization lies the costs of the embraced technology as well as the software and hardware to
produce, store and avail information. The other phase is characterized by human efforts to collect
and interpret the availed information so as to deduce and store crucial data that can be used in
making decisions (Knapp & Langill, 2014). Therefore, the advantage of ensuring security for the
network is to protect the progressive stages of assets while at the same time checking on
trustworthy and data accuracy. As a result, the firm can achieve excellent levels of trust that are
essential for the collection, storage, and dissemination of reliable and accurate information.
Counteraction of Control and Security Threats
The development of the appropriate measures to mitigate the security threats of the
organization is a daunting task that calls for the presentation of a well-schemed security plan.
Therefore, the initial stage of the exercise is the establishment of an upper management endorsed
policy as well as recommendations from security professionals. As a result, this security layout is
meant to achieve the below goals;
 Achieve confidentiality by availing system files to exclusively authorized partners as well
as the securing of communications.
 Checking on authentication of the information to determine its legitimacy, in other words,
are the other end users the people that they claim to be?
 Control over access to deny or permit the retrieval of information based on different
 Maintenance of data accuracy
 To check on non-repudiation through the provision of transmission evidence as well as
Firewalls are an ideal measure for the entity to maintain its security through the
prevention of external intruders. The firewall entails the incorporation of both software and
hardware elements that are meant to work systematically and consequently achieve the core goal
of the prevention of an internal network frame from external attacks. Though they have varying
degrees of implementation, they are still useful for the Sunshine Health Corporation as they all
function to act as a barrier between the outside world and the internal affairs of the organization
(Todd & Rahman, 2015).
The purpose of the firewall is to restrict unpermitted traffic while at the same time
granting access to that traffic that is not blocked. However, for this case, we need maximum
security, and for that reason, the protection from the entry of unauthorized traffics is more
critical since the administrator of the networks is already familiar with the permitted accesses.
The IS security staff and the CIS auditors are essential in the monitoring of the firewall’s
integrity to achieve safety and operational compliance. However, these domains are
characterized by unique requirements, but their common elements are that detection of
suspicious activities, provision of numerous authentication choices, encryption, and alarms to get
catch hackers in the act (Knapp & Langill, 2014).
Security Tools
With the increased security threats, experts have developed the appropriate tools to
correct and monitor the risks. The entity can apply diagnostic tools to identify potential security
weak points for the various environments. For instance, they can implement the SATAN
(Security Administrator Tool for Analyzing Networks). The tool is an unlimited domain that is
released via the internet. However, there has been many controversies on the availability of the
device to potential hackers but can, however, be made more useful in the early stages before the
hacker makes an attempt to hack a distributed environment.
The tool can gather the pertinent data of connected internet hosts and consequently detect
the presence of malicious services such as remote file transfers. Moreover, the software also
provides an outline for the potential misuses of the services. What is more intriguing is that the
piece of technology can be used to detect the presence of errors in the scheme for instance bugs
in the network utilities as well as the system. It also can identify systems with poor
configurations such as the lack of primary precautions, unauthorized activities and the absence of
passwords. The software then gives the outline of the serious vulnerabilities and provides a
suitable solution to mitigate them (Todd & Rahman, 2015).
From the perception of a management branch, those vulnerabilities detected by the software
ought not to be tolerated as they are simple weak points that can be utilized by hackers.
Therefore, the same can be incorporated into the network system of the Sunshine entity to check
and provide solutions for its vulnerabilities (Knapp & Langill, 2014).
Network Security at the OSI Model Levels
Physical Layer
At this level, as an IT expert, one is concerned with the prevention of unauthorized
personnel from making their way into the system. The measures that can be quite handy at the
level include the application of surveillance cameras, arrangement of barriers and
implementation of warnings to monitor the access of individuals to the system of networks (Todd
& Rahman, 2015).
Data Link Layer
At this stage, the administrator has concerned with the addressing the frames that act as
links to connect the network layer and the physical layer. Therefore, it is at this level that
switches are deployed where the security of the data link is aimed at making sure that the
switches are connected in the correct format. For instance, it is mandatory to join physical access
blockage and logic level deactivation of the unused ports all in the bid to prevent fraudulent
linkages that could lead to dangerous activities such as eavesdropping (Todd & Rahman, 2015).
Network Layer
Supernumerary, the router can be quite useful in centralizing traffic management by the
use of IP addresses. It is advisable to activate the various security properties in the scheme to
avoid controls that are unauthorized. Therefore, the administrator should consider the application
of strong passwords in conjunction with the proper management of protocols following
encrypted connections. However, it is important to acknowledge the vulnerabilities of the routing
procedures to avoid the incorporation of false routers. Moreover, firewalls can also be activated
to minimize attacks from malicious parties from outside the health center (Todd & Rahman,
Transport layer
The concerns on security at this layer entail the encryption of the data under transfer.
Moreover, it also requires the prevention of manipulation of data integrity, authentication of the
personnel involved as well as the avoidance of recurrent attacks. For instance, the SYN attacks
are quite common, and for that reason, there is the urgent need for raising the number of the
unsubstantiated networks on the server. Moreover, there is also the option of lowering the time m
taken by the server to wait for approval or rather communication to the recommendable time of
75 seconds (Todd & Rahman, 2015).
Application layer
Under the criteria, our concern lies in the management of sessions and the applications
that are achieved by the apparatus. It is at the stage that we find the use of firewalls as the
primary effort that can be used to counter the flow of network traffic. However, the application
of firewalls at this level is unique as it is oriented towards numerous choices and a wide array of
procedures/ protocols. Intrusion Detection Systems are also applied at the level to monitor
hazardous reactions or rather a behavior based on various provisions and consequently issue the
appropriate warnings (Todd & Rahman, 2015).
It is crucial to maintaining security through the timely scheduling audits, response to
situations, execution of safety testing, reading of logs on reviews, updates on the safety plans and
the training of security managers. Strikingly, risks are known to have a dynamic nature as they
change over time. Therefore, the security measures should also advance over time. Security is
enhanced through the continuous process of monitoring, implementing, improving safety and
testing. In fact, updated security mechanism can maintain pace with the latest attacks, which is a
motivating factor for the network administrator (Knapp & Langill, 2014).
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical
infrastructure networks for smart grid, SCADA, and other Industrial Control Systems.
Todd, M., & Rahman, S. (2015). Complete Network Security Protection for SMEs within
Limited Resources. arXiv preprint arXiv:1512.00085.
Ryan M. Harmon
IS535/ Telecommunications
18 December 2016
Describe and explain 3 key components of a Telecommunications/Technology Plan
A telecommunication/Technology Plan provides an overview of the current technology as
well as the blueprint of how both telecommunications and technology help in the achievement of
an organizational mission. Particularly, the plan acts as a mechanism essential in prioritizing and
budgeting for technology tools that are critical to the achievement of organizational goals and
objectives. Three components of a telecommunications/technology plan include the
establishment of clear goals, a professional development strategy and provision for an adequate
budget (Yuen, 2013).
Notably, the first component of a telecommunications/technology plan is the
establishment of clear goals. This should be accompanied by a realistic strategy for the purpose
of utilizing information technology as well as telecommunications in the improvement of
organizational services (Yuen, 2013). Technology needs such as the provision of electronic
resources and computer training and the need to have sufficient computers need to be taken into
The second component is a professional development strategy. This is essential in
ensuring that the organizational staff have the ability to utilize the new technologies for the
purpose of the improvement of organizational services (Noh et al, 2016). Besides, it aids in
determining the new technologies that can save the organization money. The third component is
providing for an adequate budget as well as an implementation process for acquiring and
maintaining organizational hardware, software, and professional development. These are needed
for the implementation of the strategy. Ensuring that a technology plan possess all these
components makes sure that an organization stays current with the technology trends. It also
helps in prioritizing technologies that fit organizational goals as well as the needs of the
Explain the advantages and disadvantages of using 802.11g for wireless access and usage in
an office environment. Please address these areas:
802.11g is an extension to 802.11b. It is the most widely deployed Wireless LAN for use
in wireless access and in an office environment. This is due to the fact that 802.11g meets
industrial, office and home user’s needs. As well, 802.11g operates on a frequency of 2.4 GHz
and offers an excellent alternative for the growing bandwidth needs. Notably, 802.11g access
points and devices can be implemented in application areas where there is the need for higher
throughput. Therefore, 802.11g is a proven technology that offers higher throughput essential for
multiple application networks and high-bandwidth applications (Collins, Mangold & Muntean,
802.11g has a higher bandwidth at 54 Mbps. Also, 802.11g has a higher frequency band
of 2.4GHz. Besides speed, 802.11g is completely backward compatible with 802.11b. The
technology allows for smooth transition in the event the user wants to upgrade to better
performance (Geier, 2015).
802.11g possess a shorter range. In comparison to 802.11b, it costs more by at least 50\%.
Besides, 802.11g is not widely supported by machines such as PDAs and laptops.
Particularly, due to the short range, 802.11g is highly susceptible to interference from
different access points. At the beginning, 802.11g signal requires 30 MHz of bandwidth and an
individual will not be able to collocate a maximum of around three 802.11g access points within
a given area.
802.11g have a couple of strengths that makes it more admirable than 802. 11b. 802.11g
employs orthogonal frequency division multiplexing. This aids in obtaining higher speed for use
in wireless access points and usage in an office environment. Electronic services that are
utilizing 802.11g can get back to the speed of 11 Mbps and this characteristic makes 802.11g
devices as well as 802.11b compatible within a single network (Geier, 2015).
Collins, K., Mangold, S., & Muntean, G. M. (2010). Supporting mobile devices with wireless
LAN/MAN in large controlled environments. IEEE Communications Magazine, 48(12),
Geier, J. (2015). Designing and Deploying 802.11 Wireless Networks: A Practical Guide to
Implementing 802.11 n and 802.11 ac Wireless Networks for Enterprise-based
Applications. Cisco Press.
Noh, H., Song, Y., Park, A. S., Yoon, B., & Lee, S. (2016). Development of new technologybased services. The Service Industries Journal, 1-23.
Yuen, J. H. (Ed.). (2013). Deep space telecommunications systems engineering. Springer Science
& Business Media.

Purchase answer to see full

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.