List and justify particular applications and protocols

Assignment Help Computer Engineering
Reference no: EM133714038

Homework: Information Systems- Implementation of Authentication Process

Learning Objectives and Outcomes

1) Design and document a secure wireless local area network (WLAN) authentication process.

Task

Other than the Internet, probably no aspect of technology will have more impact on the classroom than the wireless local area network (WLAN), which may soon become as indispensable to the educational mission as chalkboards and textbooks. In the 21st century, technological literacy will be a primary determinant of whether a student succeeds or fails later in life. The ability to access and work with a wide range of information technology (IT) applications will be critical to ensuring this literacy. The benefits of a pervasive wireless fidelity (Wi-Fi) deployment in primary and secondary education include:

1) Infrastructure Flexibility: School districts' learning technology needs can be as unpredictable as class sizes. A WLAN can be quickly rolled out virtually anywhere, without the need for extensive retrofitting of existing infrastructure.

2) Speed: Classroom productivity is measured in terms of how much can be taught in a short period. Students can access a WLAN-enabled learning environment in a matter of seconds, without special connections, transmission control protocol/Internet protocol (TCP/IP) changes, or a tangle of cables. Teachers can focus on teaching and students can focus on learning.

3) Resource Mobility: A WLAN allows technology-learning tools such as laptops to be moved to wherever students are, rather than vice-versa. This makes the concentration of mobile computing resources possible in a single classroom while maximizing hardware utilization and a return on the investment.

Deploying WLAN in the classroom can bring enormous benefits, but there are some unique challenges to this environment. For a start, school IT staff is often stretched thin by the support demands of large numbers of users, so the WLAN solution cannot require time-intensive configuration and administration. Schools also pose wireless coverage challenges because of the conflict between their sprawling layouts and the need to provide connectivity to multiple users in the confined area of a classroom. In addition, given the uncertainties of the school budget process, WLAN deployment costs must be kept low, leveraging existing infrastructure where possible, and offering advantages in terms of scale and price.

After reading the given information on the requirements of a school's WLAN, your task for this homework is to prepare a professional report. The report should focus on the following:

1) Identify the potential user groups and users of WLAN in a school environment.

2) Assess the WLAN for probable risks in a school environment.

3) Specify security requirements by user class or type.

4) Mock-up a simplified data classification plan.

5) List and justify particular applications and protocols that should be allowed on the WLAN.

6) Determine whether personal digital assistants (PDAs) should be allowed to access the WLAN.

Reference no: EM133714038

Questions Cloud

What are the main significant differences between hospitals : What are the main significant differences between teaching and non-teaching hospitals and Compare the following information between teaching and non-teaching
Analyze the marian apparitions at fatima in 1917 : Hello, can you help me analyze how can scholars approach the topic of the Marian apparitions at Fatima in 1917.
Discuss alternatives to the for-profit business model : Share if you feel this is good, bad, inevitable, or something that should be dismantled. Discuss alternatives to the for-profit business model.
What was attempted was passed with the social security act : Ultimately, some of what was attempted was passed with the Social Security Act, Medicare, Medicaid, CHIPs, and a host of other programs.
List and justify particular applications and protocols : Mock-up a simplified data classification plan. List and justify particular applications and protocols that should be allowed on the WLAN.
What models mean to the student in their leadership journey : This assignment is meant to compare and contrast the models and reflect on what these models mean to the student in their leadership journey.
Which a vpn is a better remote access solution than radius : Identify a situation in which RADIUS is better remote access solution than VPN. Identify situation in which VPN is a better remote access solution than RADIUS.
Develop a plan to deploy public key infrastructure : Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
How do integrate forgiveness-reconciliation into our lives : How do we integrate forgiveness and reconciliation into our lives? Provide at least 3 practical examples of what this might look like.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How can an attacker find the three keys with effort

How can an attacker find the three keys with effort in the order of 2112 instead of 2168? Describe the attack in detail.

  What should be the speedup of floating point operation

What should be the speedup of floating point operation in our design of the next CPU to achieve a desired overall system speedup.

  What is the temperature of the fin

Quadratic elements are used to approximate the temperature distribution in a straight fin. The nodal temperatures and their corresponding positions.

  Find the probability of vaccination among the people

CS 120 Harward Institute of Management & Technology find the probability of vaccination among the people with Covid-19 infection

  Design a dfa which accept all the string over

Design a dfa which accept all the string over a and b ending with ab or ba

  What are the possible ways in which an organisation can be

COIT20262-Advanced Network Security-Central Queensland University-Australia-What are the possible ways in which an organisation can be infected?

  How might you automate inspection at the assembly station

How might you automate inspection at the assembly station or the assembly setup itself to insure proper assembly?

  Write a script called activity that iterates through content

Write a script called activity that iterates through the contents of your working directory and display the regular file names.

  A description of the design of your solution

In this project, you are asked to solve the readers and writers problem by using the clientserver model and a kind of communication facility.

  What is the difference between management and leadership

What is the difference between management and leadership? Assume you have two "hypothetical personalities ", Person A is to represent the leader of SAPPS.

  Calculate the factorial of a non-negative integer

Calculates the factorial of a non-negative integer, that is, the product of * all integers between 1 and the given integer, inclusive.

  Examine elements of computer system performance

Benchmark testing to measure system performance. In your discussion, include how the overall purpose of the computer system is a determining factor

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd