Discuss authentication methods and encryption

Assignment Help Operation Management
Reference no: EM131110092

Performance Management & Monitoring

Required 2-3 pages.

You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have being moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes a student-accessible wireless environment.

You have gotten numerous complaints about call quality. Complaints have included the following:

• It has being intermittent and very hard to track down the issue.
• The trouble report states that the call quality is poor and that calls are breaking up.
• It was also stated that the overall network performance is very bad, and it started a few months ago but it is progressively getting worse.
• It takes a long time to access any files or the Internet.

About 2 months ago, you implemented a network monitoring solution. You decided to check the logs as a result of a call you received from your CIO. The president of the college was on an important phone call and was not able to communicate as a result of the call quality. A review of your performance monitor logs revealed an enormous amount of traffic on the network. This excess network traffic was generated from the wireless LAN. Network traffic was destined for P2P (peer-to-peer) Web sites for movie and music downloads. The logs further reveal very high traffic volume when the students, staff, and faculty were off campus. You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported this finding to the CIO, and she needs a resolution.

Deliverable

• Research and identify an enterprise wireless access control solution.

• Based on your research, write a report of 2-3 pages for your boss on your solution.

• Discuss authentication methods and encryption.

Reference no: EM131110092

Questions Cloud

Determine why the court ruled differently : Read the Birger v. Tuner case and the Liebman v. Rosenthal case and determine why the court ruled differently when it has been stipulated that both contracts were based on illegalities
Find the straight value of stanco manufacturing’s bond : The theoretical value of each warrant is $12.50. The interest rate on an equal-risk straight bond is currently 13%. a. Find the straight value of Stanco Manufacturing’s bond. b. Calculate the implied price of all warrants attached to Stanco’s bond. c..
How might these rulings affect the value of contracts : Which decision do you believe contains the most accurate interpretation of the law pertaining to contracts of adhesion? If you are a business owner, how might these rulings affect the value of contracts
Indiana jones corporation enters into a 6 year lease : Prepare Indiana Jones' January 1, 2011, journal entries assuming an interest rate of 10%.
Discuss authentication methods and encryption : You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported thi..
Why does the mirror image rule still apply : Why does the Mirror Image rule still apply in certain business scenarios? Why has the UCC largely discarded the mirror image rule, while it still persists in various parts of the common law
Calculate the implied price of each warrant for each : Calculate the implied price of each warrant for each of the bonds shown in the followingtable.
Identify the potential sources of conflict among managers : As the new Vice President of Operations for a chain of movie theaters, you have identified a high level of conflict among the managers of individual theaters about which theater has priority to show first-run films, which managers have more influe..
How is a proof by induction similar to conditional linear : How is a proof by induction similar to conditional linear recursion?

Reviews

Write a Review

Operation Management Questions & Answers

  Define how to improve group productivity in the organization

In Week One, you will choose a generic organization (manufacturing plant, hospital, etc.). Assume that you are a hired consultant for this organization. You have been asked by the president of the organization to prepare a background paper on th..

  Discuss possible product liability theories that would apply

In early 2010,Toyota issued a recall for over 8,000,000 vehicles because there were increasing complaints about a sudden unintended acceleration (SUA) issue. Discuss the possible product liability theories that would apply. If the floor mats were get..

  Professional development through real-life applications

Professional development through real-life applications and use of spreadsheet modelling and research methodology and practice.

  Why a salesperson must constantly look for new prospects

why a salesperson must constantly look for new prospects are to replace customers lost over time and to

  Discuss the actions virtual team leader

Reducing Virtual Team Failure Discuss the actions a virtual team leader can take to reduce the possibility of team failure.

  Panel interview versus and individual interview

What are the advantages/disadvantages of a panel interview versus and individual interview? If you were the staffing director which one would you prefer to use? Why. If you were the one being interviewed which one would you prefer?

  Various stakeholders-what are their different interests

Describe the process that you plan to use to conduct research, identify findings, and develop the Comprehensive Project on "Hotel Escargot" scena The Boys and Girls Club (BGC) is a national non-profit organization geared to provide America’s youth wi..

  The utilization rate and the efciency rate of the system

During peak demand, an airline check-in with two desks and a single waiting line receives one customer every 1.5 minutes on average, with standard deviation of 0.4 minutes. Service times are 2.5 minutes on average, with standard deviation of 0.9 minu..

  What is market commonality and resource similarity

What is market commonality? What is resource similarity? What does it mean to say that these concepts are the building blocks for a competitor analysis? What factors affect the likelihood that a firm will take competitive action?

  What methods would you use to collect the information

What methods would you use to collect the information? What recommendations would you offer to the firm to ensure that managers still receive future training?

  Five-phase model or the punctuated equilibrium model

Reflect upon the projects completed in your CLC team. Analyze the development of the team in terms of the five-phase model or the punctuated equilibrium model. Choose the model that does the best job of explaining how your team evolved. Provide speci..

  Certain remodelling work on the building

Ace contracted with Jones to do certain remodelling work on the building owned by Jones. Jones supplied the specifications for the work. The contract price was $70,000. After the work was completed, Jones was dissatisfied and had Clay, an expert, com..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd