Question

You work as a network administrator for a college located in your local city. Next door...

You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have been moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes a student-accessible wireless environment. You have gotten numerous complaints about call quality. Complaints have included the following: It has been intermittent and very hard to track down the issue. The trouble report states that the call quality is poor and that calls are breaking up. It was also stated that the overall network performance is very bad, and it started a few months ago but is progressively getting worse. It takes a long time to access any files or the Internet. About 2 months ago, you implemented a network monitoring solution. You decided to check the logs as a result of a call you received from your CIO. The president of the college was on an important phone call and was not able to communicate as a result of the call quality. A review of your performance monitor logs revealed an enormous amount of traffic on the network. This excess network traffic was generated from the wireless LAN. Network traffic was destined for P2P (peer-to-peer) Web sites for movie and music downloads. The logs further reveal very high traffic volume when the students, staff, and faculty were off campus. You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported this finding to the CIO, and she needs a resolution.

Assignment Deliverable Research and identify an enterprise wireless access control solution.

Based on your research, write a report of 1–2 pages for your boss on your solution to the above stated issues

. Explain how security mechanisms were employed.

Homework Answers

Answer #1

The performance monitor logs revealed a huge amount of traffic on the existing network and with time, its worsening. The primary and foremost reason has been the movement of many residents in the area over the last few months. Also, unauthorized access to the network is adding to the woes. Its the need of the hour that an enterprise wireless access control solution be put on the shelf which curbs unauthorized network access and improves connectivity, speed and performance.

A Network Access control solution will support network visibility and access management through policy enforcement on different devices (Mobiles, Tablets, PCs) and the users of the corporate networks (People on campus). There is an upward growth of devices accessing the Campus network and most of those are not secure, thus compromising the network security. Its very important to have the tools which provide access control and compliance capabilities required to strengthen the network security infrastructure. A NAC system can deny access to devices which are non-compliant to the defined policy. When configured, it can also give restricted access to users, thus keeping insecure nodes from affecting the network.

Explaining the NAC on policy terms, the device requesting access to the Campus' wireless network will not be permitted to access anything unless it complies with a defined policy which will also include anti-virus protection level. This will not allow users to access web resources which are not secured, thus ensuring network security and also blocking many sites for downloads, thus reducing load on server.
However, some high-profile people on the campus (say, the Dean) can be provided complete access, if needed. The configuration can be done and the access will be given as per the profile of the person.

Some Security Mechanisms with which we can achieve the desired results :

1. Encryption of traffic using 802.1X protocols (These provide an authentication mechanism to user devices wishing to connect to a Wireless network)
2. The network access to be controlled based on user, device and application roles
3. Defining a policy not abiding by which, a person can't access the network

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You close your office door and take a few minutes to breathe. Your meeting with David...
You close your office door and take a few minutes to breathe. Your meeting with David could have been a disaster in a dozen different ways. Instead, it actually went well. By emphasizing your shared passion for innovation you managed to establish a safe foundation for an open discussion. You expressed your concerns about David’s lack of reliability and together you outlined a plan for improvement. Although he wasn’t happy, David didn’t dissolve into one of his famous fits, and...
YOU have graduated from Deakin and have joined a major financial advice firm in the city....
YOU have graduated from Deakin and have joined a major financial advice firm in the city. The boutique firm is known for its famous clients, many of whom are celebrities and their respective family and friends. As a young graduate you went through a difficult selection criterion to successfully fill a very sought-after and competitive position as an adviser. Don Richardson is the executive and top senior adviser at the firm and takes time to personally mentor and train new...
The Harborside Inn, located on the New England coast, is a 125-room luxury hotel. The inn's...
The Harborside Inn, located on the New England coast, is a 125-room luxury hotel. The inn's guests are predominantly upper middle class in that the going rate is about $100 per day per person. The hotel grounds include 30 acres of lawns and gardens. Their nine-hole golf course winds its way around a picturesque trout pond. The hotel grounds were meticulously cared for and yet efforts at cultivating beauty could not match the natural beauty which was so much a...
Plagiarism Certification Tests for Undergraduate College Students and Advanced High School Students These tests are intended...
Plagiarism Certification Tests for Undergraduate College Students and Advanced High School Students These tests are intended for undergraduate students in college or those under 18 years of age. Read these directions carefully! The below test includes 10 questions, randomly selected from a large inventory. Most questions will be different each time you take the test, You must answer at least 9 out of 10 questions correctly to receive your Certificate. You have 40 minutes to complete each test, and you...
Case 46: Sleeping on the Job: A Managerial Challenge Marty is an African American nurse who...
Case 46: Sleeping on the Job: A Managerial Challenge Marty is an African American nurse who has worked in a major university hospital for over six years evaluating patients’ rehabilitation needs. She used to have an autonomous job making patient visits in area city hospitals; however, two years ago her role in the hospital changed, and she is now working Monday through Friday in an office. Three years ago Marty’s mother was diagnosed with dementia and is now dependent in...
In February 2012, the Pepsi Next product was launched into the US market. This case study...
In February 2012, the Pepsi Next product was launched into the US market. This case study provides students with an interesting insight into PepsiCo’s new product process and some of the challenging decisions that they faced along the way. Pepsi Next Case Study Introduction Pepsi Next was launched by PepsiCo into the US market in February 2012, and has since been rolled out to various international markets (for instance, it was launched in Australia in September 2012). The new product...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
Pandora is the Internet’s most successful subscription radio service. As of June 2013, it had over...
Pandora is the Internet’s most successful subscription radio service. As of June 2013, it had over 200 million registered users (140 million of which access the service via a mobile device) and over 70 million active listeners. Pandora now accounts for more than 70% of all Internet radio listening hours and a 7% share of total U.S. radio listening (both traditional and Internet). At Pandora, users select a genre of music based on a favorite musician, and a computer algorithm...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic from reading their paper? 2-How does the topic relate to you and your current or past job? 3-Critique the paper in terms of the organization and quality.1- Employee Stress and how it has an Adverse Effect on a Company This paper explores employee stress and how it has an adverse effect on a company, its employees and the organization. Job stress can have a...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From the April 2004 Issue Save Share 8.95 In 1991, Progressive Insurance, an automobile insurer based in Mayfield Village, Ohio, had approximately $1.3 billion in sales. By 2002, that figure had grown to $9.5 billion. What fashionable strategies did Progressive employ to achieve sevenfold growth in just over a decade? Was it positioned in a high-growth industry? Hardly. Auto insurance is a mature, 100-year-old industry...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT