Verified Document

Insurance Company Information Technology The Term Paper

Depending on the number of connections to the Internet, there would need to be one of these Cisco Switches at each inbound Internet location in the company. It is assumed that there is a single Internet connection that CoverAll Insurance Company relies on today. The following table provides the specifications of the Cisco WS-C2950-24. CISCO WS-C2950-24 SPECIFICATIONS

Product Description

Cisco Catalyst 2950-24 - switch - 24 ports

Device Type

Switch - stackable

Form Factor

External - 1U

Dimensions (WxDxH)

17.5 in x 9.5 in x 1.7 in Weight

6.6 lbs

RAM

16 MB SDRAM

Flash Memory

MB

Ports Qty

24 x Ethernet 10 Base-T, Ethernet 100 Base-TX

Data Transfer Rate

100 Mbps

Data Link Protocol

Ethernet, Fast Ethernet

Remote Management Protocol

SNMP, RMON, Telnet

Communication Mode

Half-duplex, full-duplex

Features

Network monitoring, full duplex capability, uplink, VLAN support, manageable, stackable

Compliant Standards

IEEE 802.3, IEEE 802.3u, IEEE 802.1D, IEEE 802.1Q, IEEE 802.1p, IEEE 802.3x, IEEE 802.1x

Power

AC 120/230 V AC 110/220 V ± 10% (50/60 Hz)

Manufacturer Warranty

Limited lifetime warranty

CISCO WS-C2950-24 NETWORKING

Ports Qty

24 x Ethernet 10 Base-T, Ethernet 100 Base-TX

Data Transfer Rate

100 Mbps

Data Link Protocol

Ethernet, Fast Ethernet

Remote Management Protocol

SNMP, RMON, Telnet

Connectivity Technology

Wired

Communication Mode

Half-duplex, full-duplex

Switching Protocol

Ethernet

MAC Address Table Size

8K entries

Status Indicators

Port status, link activity, collision status, port transmission speed, port duplex mode, bandwidth utilization %, power, link OK

Features

Network monitoring, full duplex capability, uplink, VLAN support, manageable, stackable

Compliant Standards

IEEE 802.3, IEEE 802.3u, IEEE 802.1D, IEEE 802.1Q, IEEE 802.1p, IEEE 802.3x, IEEE 802.1x

Next, CoverAll Insurance Company needs to securely install eight Linksys WRT54GX4 Wireless Routers, which include a 4-port switch that supports the 802.11g wireless networking standard and also has VPN pass-through as well.

The WRT54GX4 needs...

The WRT54GX4 plugs directly into the existing CAT-5 cabling already installed in the company today. As of May, 2008 the WRT54GX4 sells for $126 each, totally $1,008. As the WRT54GX4 is the strongest wireless router that Linksys manufactures, the company's workers will be able to use wireless access throughout each of the eight floors of the company. The following table provides the specifics of the WRT54GX4 wireless router.
Carrier Services

Pricing for T1 service vary significantly across broadband providers. Covad offers full T1 connection support at $369 per month with a switch included. It is more economical for CoverAll Insurance Company to purchase the Cisco Switch mentioned earlier in this paper. Analysis of T1 services provided a range of $365 to $775 for a two-year contract including a Service Level Agreement (SLA) for 99.999% uptime. Pricing is negotiable as many of these vendors include the cost of a high speed switch as well.

References

Borri, M Casoni, ML Merani. "Effectiveness and issues of congestion control in 802.11g wireless LANs. " Wireless Networks 14.2 (2008): 171-182. ABI/INFORM Global. ProQuest. 12 May. 2008

Venkatesh Obanaik, Lillykutty Jacob, AL Ananda. "Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks. " Computer Networks 50.13 (2006): 2225.

ABI/INFORM Global. ProQuest. 22 May. 2008

Bruce Potter. "Wireless vulnerability assessment. " Network Security 2005.6 (2005): 14-15. ABI/INFORM Global. ProQuest. 20 May. 2008

Swale, MMJ Fontenoy. "Implementing multiservice wireless LANs in the enterprise. " BT Technology Journal 25.2 (2007): 149-155. ABI/INFORM Global. ProQuest. 21 May. 2008

Model Number

WRT54GX4

Standards

IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b

Channels

11 Channels (U.S., Canada)

13 Channels (Europe)

Ports/Buttons

Internet: One 10/100 RJ-45 Port

LAN: Four 10/100 RJ-45 Switched Ports

One Power Port

One Reset Button

Cabling Type

UTP CAT 5

LEDs

Power, DMZ, Wireless, Ethernet (1, 2, 3, 4), Internet

RF Power Output

18 dBm for Wireless-B/17 dBm for Wireless-G

UPnP able/cert

Able

Security Features

Stateful Packet Inspection (SPI) Firewall

Wireless Security

WPA, WPA2, 802.1x, WEP, and Wireless MAC Filtering

Sources used in this document:
References

Borri, M Casoni, ML Merani. "Effectiveness and issues of congestion control in 802.11g wireless LANs. " Wireless Networks 14.2 (2008): 171-182. ABI/INFORM Global. ProQuest. 12 May. 2008

Venkatesh Obanaik, Lillykutty Jacob, AL Ananda. "Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks. " Computer Networks 50.13 (2006): 2225.

ABI/INFORM Global. ProQuest. 22 May. 2008

Bruce Potter. "Wireless vulnerability assessment. " Network Security 2005.6 (2005): 14-15. ABI/INFORM Global. ProQuest. 20 May. 2008
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Information Technology: Telemedicine Solutions Offered
Words: 9778 Length: 36 Document Type: Research Proposal

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

Information Technology Portfolio Project Humana
Words: 2919 Length: 9 Document Type: Thesis

The first time that they attempted to build this system they did not follow the life cycle plan and the system ended up failing. Developing a new claims payment system that will talk to and be user friendly with the customer service management system would help to speed up efficiency and enhance quality of all departments within the organization. This streamlining would help the company as a whole to

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Information Technology Internal Administrative Tasks
Words: 1280 Length: 4 Document Type: Research Paper

They do not have to employ medical coders, they can submit insurance claims electronically, and they can assess a patient's eligibility in an instant. This saves time and money, and it makes the operation more efficient, so investing in billing and insurance software is a good investment for just about any hospital. Internally, the it department manages the software and the server, but the actual administration of the software takes

Information Technology IT Security Implementation
Words: 3195 Length: 10 Document Type: Term Paper

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now