Ask Computer Network & Security Expert

You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have being moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes a student-accessible wireless environment. You have gotten numerous complaints about call quality. Complaints have included the following:

• It has being intermittent and very hard to track down the issue

.• The trouble report states that the call quality is poor and that calls are breaking up.

• It was also stated that the overall network performance is very bad, and it started a few months ago but it is progressively getting worse.

• It takes a long time to access any files or the Internet. About 2 months ago, you implemented a network monitoring solution. You decided to check the logs as a result of a call you received from your CIO. The president of the college was on an important phone call and was not able to communicate as a result of the call quality. A review of your performance monitor logs revealed an enormous amount of traffic on the network. This excess network traffic was generated from the wireless LAN. Network traffic was destined for P2P (peer-topeer) Web sites for movie and music downloads. The logs further reveal very high traffic volume when the students, staff, and faculty were off campus. You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported this finding to the CIO, and she needs a resolution. Deliverable:

• Research and identify an enterprise wireless access control solution.

• Based on your research, write a report of 2-3 pages for your boss on your solution.

• Discuss authentication methods and encryption. Grading Criteria :Students should include the following:

• They should discuss any solution of their choosing. One such solution could be a company's unified wireless solution, which requires that all wireless access points be registered with a wireless controller. The wireless controller will then pass off registration requests to a radius server that leverages LDAP for authenticating against an access database (the same database that the students will use to access their resources on or off campus).

• With this implementation, the services set identifier (SSID) could be broadcast. However, access to wireless services would only be granted to those who provided a valid username and password that would be required before traffic is allowed to pass through to the Internet. Wireless encryption including, but not limited to, Extensible Authentication Protocol (EAP), Protect Extensible Authentication Protocol (PEAP), or Challenge Handshake Authentication Protocol (CHAP), among various other options, can be implemented to protect communication between the access point (AP) and the wireless devices.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9779230

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As