Free Essay on Best Practices Used in Designing and Establishing an Enterprise WLAN

Published: 2023-10-29
Free Essay on Best Practices Used in Designing and Establishing an Enterprise WLAN
Essay type:  Analytical essays
Categories:  Analysis Information technologies Cyber security
Pages: 5
Wordcount: 1212 words
11 min read
143 views

A Wireless Local Area Network (WLAN) is a computer network that is in wireless mode and creates a link between two or more devices using a wireless form of communication. The communication forms a network called a Local Area Network (LAN) within an area that is limited and may include office buildings, homes, computer laboratories, and schools. WLANs are taking up a very important role by improving the value that IT is bringing into our daily lives. Just like any other form of technology, WLANs also come with some unique challenges (Igwe, 2018). On the other hand, the cost of combining wireless technology has become relatively lower, and its deployment has become easy. This has led to many areas implementing the wireless form of technology without considering putting up adequate upfront plans without necessarily addressing the ongoing requirements to support the network's security. This, in turn, has led to the levels of services and security becoming degraded, therefore increasing its rates of failure dramatically on user adoption and seamless usage (Mwenja, 2017). The paper will, therefore, address the best practices that are used in the designing and security involved in establishing WLANs.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Best practices used in designing WLANs:

Under the design of WLAN, many components are brought together to form a single network. They also work hand in hand to give out the necessary results and required by the network users (Bellalta et al., 2016). The design in cooperates four ingredients at the beginning of the design. Firstly, the design considers the type and size of the WLAN. This caters to everything in the physical environment since it is where the wireless network will be placed. They consider the materials, layouts, sources of interference that are potential, and the size. The second consideration in the design is the device itself. The categories here include considering their use in computing devices, mobile devices, and IoT devices (Mwenja, 2017). The rule here is the plans for a suitable wireless connection to all these devices for effectiveness. Since the wireless networks are more complicated, they require a match to the connected devices. Therefore, capacity design and application density becomes essential for the WLANs.

The third practice in the design is planning for the type of applications that will be running on the network. This includes business applications, streaming, communications, and locations. The WLANs puts into consideration the kinds of applications it will be supporting (Abdulraheem et al., 2017). This is because, just like any other device used in the network, every application has an impact on the performance of the network in a different way. Therefore, it requires resources that are different so that it can properly operate. The fourth practice in the design is considering who and what the network will give access to. The WLANs are designed to give access to both personal and business devices without having their security being compromised (Mwenja, 2017). The access is considered in terms of corporate, and the end-user referred to as the BYOD and the guest users. With the level of usage of the WLANs, threats to security, and everything attached to privacy concerns never stops. This is because wireless networks are said to be alive and dynamic kind of network.

Security Involved in WLAN:

The design comes along with physically secure access points. The wireless LAN is evenly distributed so that the access points can be granted in the locations that are considered being inconvenient. In this, they implement encryption in wireless traffic. The WLANs comes along with the encryption built inside it (Igwe, 2018). The encryption ensures that the users of the network are always in charge of their security. Since the access to the network is selective, the access system allows the premises controlled by the network to seem welcoming while offering maximized protection from the external threats and shrinkage challenges (Abdulraheem et al., 2017). A system that proactively controls access monitors manages access and secures various entry and exit points of the network users. Some advanced access points allow the mounting of the devices in place and lock it. Also, in addition to physical security, ensuring local access requires a unique password is key.

The internal and guest users of the network are kept separate. This means that the WLANs guest users are separated from the private LAN users, and the guest user cannot see any connected devices in the Ethernet or any Wi-Fi devices that are logged in to the private network of the Wi-Fi (Bellalta et al., 2016). With this, both the guest and the private users are given effective protection whenever they are connected to WLAN. The attacks from go-betweens will be blocked, downloads of malware will be prevented, and phishing attacks will also be prevented. Besides, legal liabilities will be reduced since the guest internet access is provided with enough security (Abdulraheem et al., 2017). With the WLANs, it is very easy to allow the guest users in the network while segregating them to have internet access only. However, if they require the ability of resources from the internet, they can be given access while being monetized in what they access.

Conclusion:

Many underlying benefits are gained from setting up the wireless network for the guest users, but on the other hand, they also introduce risks. If the risks are not taken into consideration, the guest users can access the WLAN resources and steal or view the information in it that is sensitive. Installation of malware can also happen either deliberately or accidentally and the introduction of vulnerabilities that will otherwise expose the wireless network to opportunistic hackers. Therefore, considering the best practices for the wireless network for the guest users ensures that all the risks are mitigated and that the WLANs security is ensured and is effective to the users. Having a network management system is key as it helps in providing visibility to the wireless network in a real-time mode and meets the needs of the end-users. A scoop from the inside is provided by giving an insight into all the happenings in the wireless network every time. When all this is achieved, time spent in troubleshooting and security issues in the network will be reduced, allowing the users to work in a safer environment and focus on maintaining productivity rather than risks. Therefore, the WLAN supports various devices while in cooperating with security that is of the highest level.

References

Abdulraheem, Y. I., Oguntala, G. A., Abdullah, A. S., Mohammed, H. J., Ali, R. A., Abd-Alhameed, R. A., & Noras, J. M. (2017). Design of frequency reconfigurable multiband compact antenna using two PIN diodes for WLAN/WiMAX applications. IET Microwaves, Antennas & Propagation, 11(8), 1098-1105. https://bradscholars.brad.ac.uk/bitstream/handle/10454/11484/abdulraheem_et_al_2017.pdf

Bella la, B., Bononi, L., Bruno, R., & Kassler, A. (2016). Next-generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions, and open challenges. Computer Communications, 75, 1-25. https://www.iit.cnr.it/sites/default/files/1-s2.0-S0140366415003874-main.pdf

Igwe, C. S. (2018). Experimental Design for the Comparison of Vulnerabilities of Wireless Local Area Network Security Protocols (Doctoral dissertation, Federal University of Technology, Owerri). http://futospace.futo.edu.ng/xmlui/bitstream/handle/123456789/3358/Igwe_Experimental_2018.pdf

Mwenja, J. M. (2017). Framework for Securing Wireless Local Area Network (Doctoral dissertation). http://41.89.49.13:8080/xmlui/bitstream/handle/123456789/713/JOYCE%20M%20MWENJA.pdf

Cite this page

Free Essay on Best Practices Used in Designing and Establishing an Enterprise WLAN. (2023, Oct 29). Retrieved from https://speedypaper.com/essays/best-practices-used-in-designing-and-establishing-an-enterprise-wlan

Request Removal

If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism