List and justify particular applications and protocols

Assignment Help Computer Engineering
Reference no: EM133714038

Homework: Information Systems- Implementation of Authentication Process

Learning Objectives and Outcomes

1) Design and document a secure wireless local area network (WLAN) authentication process.

Task

Other than the Internet, probably no aspect of technology will have more impact on the classroom than the wireless local area network (WLAN), which may soon become as indispensable to the educational mission as chalkboards and textbooks. In the 21st century, technological literacy will be a primary determinant of whether a student succeeds or fails later in life. The ability to access and work with a wide range of information technology (IT) applications will be critical to ensuring this literacy. The benefits of a pervasive wireless fidelity (Wi-Fi) deployment in primary and secondary education include:

1) Infrastructure Flexibility: School districts' learning technology needs can be as unpredictable as class sizes. A WLAN can be quickly rolled out virtually anywhere, without the need for extensive retrofitting of existing infrastructure.

2) Speed: Classroom productivity is measured in terms of how much can be taught in a short period. Students can access a WLAN-enabled learning environment in a matter of seconds, without special connections, transmission control protocol/Internet protocol (TCP/IP) changes, or a tangle of cables. Teachers can focus on teaching and students can focus on learning.

3) Resource Mobility: A WLAN allows technology-learning tools such as laptops to be moved to wherever students are, rather than vice-versa. This makes the concentration of mobile computing resources possible in a single classroom while maximizing hardware utilization and a return on the investment.

Deploying WLAN in the classroom can bring enormous benefits, but there are some unique challenges to this environment. For a start, school IT staff is often stretched thin by the support demands of large numbers of users, so the WLAN solution cannot require time-intensive configuration and administration. Schools also pose wireless coverage challenges because of the conflict between their sprawling layouts and the need to provide connectivity to multiple users in the confined area of a classroom. In addition, given the uncertainties of the school budget process, WLAN deployment costs must be kept low, leveraging existing infrastructure where possible, and offering advantages in terms of scale and price.

After reading the given information on the requirements of a school's WLAN, your task for this homework is to prepare a professional report. The report should focus on the following:

1) Identify the potential user groups and users of WLAN in a school environment.

2) Assess the WLAN for probable risks in a school environment.

3) Specify security requirements by user class or type.

4) Mock-up a simplified data classification plan.

5) List and justify particular applications and protocols that should be allowed on the WLAN.

6) Determine whether personal digital assistants (PDAs) should be allowed to access the WLAN.

Reference no: EM133714038

Questions Cloud

What are the main significant differences between hospitals : What are the main significant differences between teaching and non-teaching hospitals and Compare the following information between teaching and non-teaching
Analyze the marian apparitions at fatima in 1917 : Hello, can you help me analyze how can scholars approach the topic of the Marian apparitions at Fatima in 1917.
Discuss alternatives to the for-profit business model : Share if you feel this is good, bad, inevitable, or something that should be dismantled. Discuss alternatives to the for-profit business model.
What was attempted was passed with the social security act : Ultimately, some of what was attempted was passed with the Social Security Act, Medicare, Medicaid, CHIPs, and a host of other programs.
List and justify particular applications and protocols : Mock-up a simplified data classification plan. List and justify particular applications and protocols that should be allowed on the WLAN.
What models mean to the student in their leadership journey : This assignment is meant to compare and contrast the models and reflect on what these models mean to the student in their leadership journey.
Which a vpn is a better remote access solution than radius : Identify a situation in which RADIUS is better remote access solution than VPN. Identify situation in which VPN is a better remote access solution than RADIUS.
Develop a plan to deploy public key infrastructure : Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
How do integrate forgiveness-reconciliation into our lives : How do we integrate forgiveness and reconciliation into our lives? Provide at least 3 practical examples of what this might look like.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd