Secure wireless local area network authentication process

Assignment Help Basic Computer Science
Reference no: EM132421928

Implementation of Authentication Process

Learning Objectives and Outcomes

Design and document a secure wireless local area network (WLAN) authentication process.

Assignment Requirements

Other than the Internet, probably no aspect of technology will have more impact on the classroom than the wireless local area network (WLAN), which may soon become as indispensable to the educational mission as chalkboards and textbooks. In the 21st century, technological literacy will be a primary determinant of whether a student succeeds or fails later in life. The ability to access and work with a wide range of information technology (IT) applications will be critical to ensuring this literacy. The benefits of a pervasive wireless fidelity (Wi-Fi) deployment in primary and secondary education include:

Infrastructure Flexibility: School districts' learning technology needs can be as unpredictable as class sizes. A WLAN can be quickly rolled out virtually anywhere, without the need for extensive retrofitting of existing infrastructure.

Speed: Classroom productivity is measured in terms of how much can be taught in a short period of time. Students can access a WLAN-enabled learning environment in a matter of seconds, without special connections, transmission control protocol/Internet protocol (TCP/IP) changes, or a tangle of cables. Teachers can focus on teaching and students can focus on learning.

Resource Mobility: A WLAN allows technology-learning tools such as laptops to be moved to wherever students are, rather than vice-versa. This makes the concentration of mobile computing resources possible in a single classroom while maximizing hardware utilization and a return on the investment.

Deploying WLAN in the classroom can bring enormous benefits, but there are some unique challenges to this environment. For a start, school IT staff is often stretched thin by the support demands of a large number of users, so the WLAN solution cannot require time-intensive configuration and administration. Schools also pose wireless coverage challenges because of the conflict between their sprawling layouts and the need to provide connectivity to multiple users in the confined area of a classroom. In addition, given the uncertainties of the school budget process, WLAN deployment costs must be kept low, leveraging existing infrastructure where possible, and offering advantages in terms of scale and price.

After reading the given information on the requirements of a school's WLAN, your task for this assignment is to prepare a professional report. The report should focus on the following:

Identify the potential user groups and users of WLAN in a school environment.

Assess the WLAN for probable risks in a school environment.

Specify security requirements by user class or type.

Mock-up a simplified data classification plan.

List and justify particular applications and protocols that should be allowed on the WLAN.

Determine whether personal digital assistants (PDAs) should be allowed to access the WLAN.

Reference no: EM132421928

Questions Cloud

About the leader life-career and accomplishments : Please post a commentary about the leader's life, career, and accomplishments.
Calculate costs for all the three alternatives : Calculate costs for all the three alternatives and Which is the least costly method of financing to the firm?
Discuss the short-term investment vehicles : Discuss the short-term investment vehicles that investors can take up in order to boost their working capital.
What is this companys value proposition-case study : Who are this company's customers? Be as specific as possible. Is it mass market, niche market, segmented, diversified, or multi-sided?
Secure wireless local area network authentication process : Assess the WLAN for probable risks in a school environment. Mock-up a simplified data classification plan.
Compute value of the firm after leverage-auto heating corp : Auto Heating Corp. has expected earnings before interest and taxes (EBIT) of $100,000, an unlevered cost of capital of 15 percent
What will be the net present value of the project : a) If the company decides to drill immediately, what will be the net present value (NPV) of the project?
What is the additional tax on interest income : The XYZ INC reported $50 million of taxable income. It's federal tax rate was 21% (ignore any possible state corporation taxes).
What is importance of regular expressions in data analytics : What is the importance of regular expressions in data analytics? Also, discuss the differences between the types of regular expressions.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Number using the babylonian method

Using C++ language, how to write a function name bsqrt that will compute the square root of a number using the Babylonian method.

  Writes the limericks out to a file

How do you make a python function which accepts one string parameter of two limericks in one variable, writes the limericks out to a file and returns the count

  Policy-making and subsequent implementation

"Policy-making and its subsequent implementation are necessary to deal with societal problems."

  Create a powerpoint presentation to present the findings

Create a PowerPoint presentation to present the findings of your research to the widget company that has hired you as a consultant. Use five or more slides that detail the recommendations you are making to the company executives.

  Charge of training in a petroleum company

Consider this scenario. You are the human resources manager in charge of training in a petroleum company. You have been asked to design and develop a comprehensive new training system which will be used to ensure those employees who use templat..

  Hormone replacement therapy

When women go through menopause, the production of hormones in their bodies changes. The hormonal changes can cause a variety of symptoms

  Why is design for testing so important

How is software design different from software coding? what is the dependency inversion principle? Why is design for testing so important?

  Draw a uml diagram for storing a played game of chess

Draw a UML diagram for storing a played game of chess in a database. You may look at http://www.chessgames.com for an application similar to what you are designing. State clearly any assumptions you make in your UML diagram. A sample of assumption..

  Algorithm that will convert a general multiway tree

Design and implement an algorithm that will convert a general multiway tree (each node may have more than two successors) to the corresponding ordered binary tree.

  How many different poker hands are possible

A poker hand consists of 5 cards dealt from a deck of 52 cards. How many different poker hands are possible?

  The relationship between users and roles in databases

The relationship between users and roles in databases. Explain why we use roles rather than simply assigning rights and privileges to each individual user

  Asciidoc to pdf and html5 using asciidoctor

Converting an AsciiDoc to PDF and HTML5 using Asciidoctor with the Asciidoctor Gradle plugin. SO I changed the CSS in the code it only updated in the pdf not the HTML5 looking for some help from the experts out there to see if you can help me get ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd