IT4170 WIRELESS NETWORK UNIT 1 - UNIT 5

Question # 00770122 Posted By: spqr Updated on: 07/14/2020 03:05 AM Due on: 07/15/2020
Subject Astronomy Topic Astronomical Techniques Tutorials:
Question
Dot Image

Wireless Networks

 

WLAN Infrastructure Proposal

 

The course project takes a problem-based, case-based approach to learning the course material by putting you in the role of a consultant, who will provide solutions to a fictitious customer. This approach is intended to provide experiential instruction in the course material. You will submit pieces of the project throughout the duration of the course. You will then receive feedback and use it to update your designs for the final project submission.

The project is broken down into unit components. You will receive feedback on each component and use it to update your designs for the final project submission. This feedback will include evaluation of how well you have articulated a design that is clearly and directly tied to business needs and user requirements.

In this project, you will use the IEEE Standard 802.11 to create a wireless infrastructure for the company described in the scenario below. The emphasis in this course is on designing a wireless architecture based on business needs and user requirements, rather than on the characteristics of the employable technology. Throughout the course, you will be evaluated on how well you have articulated the architecture to clearly and directly tie to business needs and user requirements.

Scenario

You are a consultant with the medium-sized IT services company, Geekorologist, Inc., who has a range of corporate clients. They serve a range of different customers, mostly in the private sector. They often hire consultants on a short-term basis to fulfill small projects, and you find yourself in just that position. The student is a for-hire consultant that is routinely contacted by Geekorologist, Inc. to complete Cisco networking projects. Geekorologist's clients range in size from small to large businesses.

In this course, you have been summoned for this new assignment by the project manager, and your mentor, Pat Lobos.

Die-namatics Corp., a local medium-sized tool and die manufacturing company, needs a fully functioning Cisco wireless network for their facility of 500 employees. You will work with your colleagues at Geekorologist to understand and implement the necessary project objectives, while interacting with Die-namatics employees on-site. Throughout the course, you will receive the information and opportunities necessary to complete a number of lab tasks and project components.

You will have a number of individuals that you will work with on this project. Through the interactive scenarios, you will be able to gather a great deal of information from these individuals, including business and user requirements.

Here is a list of the individuals that you will interact with throughout the course:

    • Consultant (played by you). You have been assigned to the project by Pat, one of Geekorologist's project managers, to participate in building a WLAN proposal for local, medium-sized client Die-namatics Corp. Once proposed, you must build the network, develop a security proposal, and implement both the security and device administration using browser and Cisco WCS-based options as opposed to direct connect options.
    • Pat Lobos. Project manager and your mentor. She gives you the assignment and helps you think through certain situations.
    • Frank. Geekorologist network specialist. Frank has been a Geekorologist employee for a long time, and is very good with the company processes. He is efficient and stoic, but often sticks to things as they are, which means he may recommend courses of action that are not ideal, especially if certain needs break with Geekorologist convention.
    • Sue Ki. Chief Executive Officer of Die-namatics. She started the company after a childhood fascination with plastic model building. She is a smart leader with good instincts for the hard-fought tool and die industry. She wants a new wireless network to empower the future of her business, and will bargain for the best at the lowest cost.
    • Gunther. Tool and die designer. Gunther is one of the top designers, and he is pretty eccentric. As a power user at the company, he has tough needs, so he may get in the way when it comes to security measures he perceives as robbing his capability.
    • Nitin. Line manager. Nitin keeps the operation flowing smoothly, and he will make sure it stays that way. He also wants to make sure his top-of-the-line toolsets make use of their vaunted internet capability to improve the business. Nitin is a key stakeholder you must win over.
    • Maria. Die-namatics IT administrator. Maria is experienced with pretty much everything but networking. She is concerned about the Cisco wireless network serving her users well.

 

 

 

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to current APA style and formatting.
    • Number of resources: A minimum of five resources required.
    • Length of paper: 6–10 pages.
    • Font and font size: Arial, 10 point.

 

 

 

UNIT 1 DISCUSSION 1

Write Your Discussion Post: The Working Benefits of Wireless

In this scenario, used in Unit 1–3 discussions, the Students of Capella (SoC) is a well-known consultant company based in Minneapolis, Minnesota. They are currently holding seminars describing the benefits of wireless technologies for potential clients around the United States. As part of these seminars, they have asked some of their previous customers to participate by explaining benefits that their organizations have experienced from recent wireless deployments. Play the role of a previous customer. You can use either your current work environment or the course project for this hypothetical organization. Assume that your organization has already deployed a wireless infrastructure and describe the following:

  • Briefly describe your organization.
  • Identify at least three benefits that you have witnessed as a result of your organization's recent wireless deployment.

 

 

UNIT 1 ASSIGNMENT 1

Project - WLAN Infrastructure Proposal Scope

You must have a solid understanding of your IT project as you prepare for it. This is done by gathering facts about the company and identifying project needs.

  • Research this topic and include at least three references from articles, books, or Web sites to support your paper.
  • Assume that the facility is up and running with everything you need to install and configure the network devices.

 

Your goal is to develop an initial scope document and proposal for deploying a WLAN infrastructure. You are to describe your current organization and environment, and to identify the process, benefits, and risks for deploying virtualization within that environment. Each of the project organizations presents their own challenges. As part of this redesign, you are asked to evaluate the existing infrastructure and make any and all improvements you believe are appropriate to improve the cost and efficiency of managing the network.

Now that you have an understanding of the project and the company's needs, complete the following for this project component:

  • Describe your organization in detail. Include information relative to its size, location, and background information.
  • Identify the main business problems and requirements. Include information relative to organizational user, organizational systems, and network requirements.
  • Develop the work breakdown structure and project phases that should be addressed
  • Identify and describe decision makers, stakeholders, and those individuals included in the requirements analysis and information gathering phases of a virtual infrastructure deployment project.
  • Describe the business and IT constraints and risks involved in deploying a Cisco-based WLAN infrastructure, and identify strategies for mitigating these risks.

 

Make sure that your paper is professionally written, free of errors, and that APA formatting is applied throughout.

Resources

APA Style and Format.

 

 

 

 

 

 

 

UNIT 2 DISCUSSION 1

Effective RF Communication

John is a SoC consultant who has recently been hired by a large organization to deploy a wireless infrastructure. Early in the project he decides to survey the environment, looking for potential risks and points of failure for his RF infrastructure. He looks for and analyzes potential impairments—those things that could impede the capability of the radio wave to reach its destination.

What type of things should John be looking for and considering as he surveys the environment? Identify at least two tangible or intangible impairments that could impede the capability of the radio wave to reach its destination.

 

UNIT 2 ASSIGNMENT 1

Project - WLAN Physical Design

For this assignment, you are to use the reading materials and any additional resources you find helpful to provide a design for your physical Cisco-based WLAN infrastructure. You are required to provide a written description and a diagram that describes your physical topology.

To prepare and gather requirements for the WLAN physical design, do the following:

  • Complete the required reading material.
  • Research this topic and include at least three references from articles, books, or Web sites to support your paper.
  • Assume that the facility is up and running with everything you need to install and configure the network devices.

 

Your completed physical design plan should include the following:

  • Design a WLAN physical topology that is appropriate for your specific organization. Your discussion and design should correlate with the organization description that you provided last week.
  • Create a WLAN diagram that displays a site plan from a physical design perspective. Include design components relative to topology, device selection, and placement choices.
  • Write an analysis of your WLAN infrastructure design, providing appropriate rationale for the chosen topology and device placement.
  • Place RF components in the diagram and discuss the role that RF system components play in the overall communication of the WLAN infrastructure.
  • Describe the signal transmission choices for your wireless environments and include information relevant to the type of modulation that you plan to use. The decision to use either spectrum or multiplexing should be supported.
  • Describe appropriate device and infrastructure configuration activities that contributed to finding an appropriate solution for the WLAN physical design.
  • Describe appropriate device and infrastructure configuration troubleshooting activities that aided in designing an appropriate solution for the WLAN physical design.

 

Make sure that your paper is professionally written, free of errors, and that APA formatting is applied throughout.

Once complete, submit your plan to the assignment area.

Resources

APA Style and Format.

 

Project - WLAN Physical Design Scoring Guide

CRITERIA

NON-PERFORMANCE

BASIC

PROFICIENT

DISTINGUISHED

Design a physical topology that is appropriate for a chosen organization.
14%

Fails to design a physical topology that is appropriate for a chosen organization.

Designs a partial physical topology that is somewhat appropriate for a chosen organization.

Designs a physical topology that is appropriate for a chosen organization.

Designs a physical topology that represents the organization and shows explicit relationships between IT decisions and business need.

Analyze appropriately a physical infrastructure for a WLAN infrastructure.
14%

Fails to analyze appropriately a physical infrastructure for a WLAN infrastructure.

Somewhat appropriately analyzes a WLAN infrastructure.

Analyzes appropriately a physical infrastructure for a WLAN infrastructure.

Analyzes appropriately a WLAN infrastructure, providing insightful rationale for the chosen topology and device placement which displays a superior understanding of hardware infrastructure design.

Design an appropriate RF component topology.
14%

Does not design an appropriate RF component topology.

Designs a somewhat appropriate RF component topology and lists, but does not describe, the role that RF system components play in the overall communication of the WLAN infrastructure.

Designs an appropriate RF component topology and discusses the role that RF system components play in the overall communication of the WLAN infrastructure.

Designs an ideal RF component topology for an infrastructure and thoroughly discusses the role that RF system components play in the overall communication of the WLAN infrastructure, showing superior insight into RF technology.

Describe an appropriate signal transmission strategy for an infrastructure.
14%

Does not describe an appropriate signal transmission strategy for an infrastructure.

Lists a somewhat appropriate signal transmission strategy for an infrastructure.

Describes the signal transmission strategy for an infrastructure.

Describes in detail an ideal signal transmission strategy for an infrastructure and shows a superior understanding of signal transmission and the benefits of different modes of transmission.

Describe appropriate device and infrastructure configuration activities that contributed to finding a solution for a WLAN physical design.
14%

Does not describe appropriate device and infrastructure configuration activities that contributed to finding a solution for a WLAN physical design.

Lists, but does not describe, device configuration activities, and does not explain the role that these activities play in finding a solution for a WLAN physical design, or the explanation is not appropriate.

Describes appropriate device and infrastructure configuration activities that contributed to finding a solution for a WLAN physical design.

Describes with great insight the device configuration activities, and the explanation shows superior understanding of the impact that these activities have on building a WLAN physical infrastructure.

Describe appropriate device configuration troubleshooting activities.
15%

Does not describe appropriate device configuration troubleshooting activities or explain the role that these activities played in developing a WLAN physical design.

Lists, but does not describe, device configuration troubleshooting activities, does not explain the role that these activities play in developing a WLAN physical design, or the explanation is not appropriate.

Appropriately describes device configuration troubleshooting activities and explains the role that these activities played in developing a WLAN physical design.

Describes with great insight the device configuration troubleshooting activities, and the explanation shows superior understanding of the impact of these activities on building a WLAN physical infrastructure.

Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
15%

Does not follow APA style and formatting guidelines for resources and citations and fails to create a document that is clearly written and generally free of grammatical errors.

Either follows APA style and formatting guidelines for resources and citations or creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written, well organized, and completely free of grammatical errors.

 

 

 

UNIT 3 DISCUSSION 1

Implications of Wireless

Now that John from SoC has identified potential risks and points of failures for his RF infrastructure, he carefully considers the other implications involved in his wireless infrastructure deployment. After surveying his environment, he feels confident in his plan. He has identified all of the areas in which he expects to have high signal interference and low coverage; and using his understanding of the range and performance of his wireless network, he has put together a solid strategy for handling these troubled areas.

Before moving forward in the project, John comes to you for advice. He wants to ensure that he has considered all of the potential implications of his wireless deployment, and so he asks, "Aside from those related to range and interference, what other implications should I consider and plan for?"

How do you respond?

 

UNIT 3 ASSIGNMENT 1

Project - Wireless Risk Mitigation Plan

For this assignment, you are to use the reading materials and any additional resources you find helpful to design a secure infrastructure for your wireless risk mitigation plan. You are required to provide a written description of your strategies.

In preparation for your wireless risk mitigation plan:

  • Complete the required reading material.
  • Research this topic and include at least three references from articles, books, or Web sites to support your paper.
  • Assume that the facility is up and running with everything you need to install and configure the network devices.

 

Your completed plan should include the following:

  • Design a wireless risk mitigation plan that is appropriate for your chosen organization. Your discussion and design should correlate with the organization description that you provided last week.
  • Compare and contrast performance and range considerations for a wireless deployment plan.
  • Create a plan for preventing and mitigating performance issues for your organization's wireless deployment.
  • Create a strategy for preventing and mitigating range issues for your organization's wireless deployment.
  • Identify channel setting considerations. Include a strategy for analyzing the multilevel facilitates found within your organization.
  • Identify at least two areas of your organization where you expect it to be difficult to obtain or maintain wireless coverage and discuss your strategy for improving coverage in these areas.
  • Identify at least two areas of your organization where you expect to have radio signal interference and describe your strategy for improving signal in these areas.
  • Describe appropriate device and infrastructure configuration activities that contributed to risk mitigation.

 

Make sure that your paper is professionally written, free of errors, and that APA formatting is applied throughout.

Once complete, submit your plan to the assignment area.

Resources

APA Style and Format.

 

 

Project - Wireless Risk Mitigation Plan Scoring Guide

CRITERIA

NON-PERFORMANCE

BASIC

PROFICIENT

DISTINGUISHED

Design a wireless risk mitigation plan that is appropriate for a chosen organization.
14%

Does not design a wireless risk mitigation plan that is appropriate for a chosen organization.

Designs a partial wireless risk mitigation plan that is somewhat appropriate for a chosen organization.

Designs a wireless risk mitigation plan that is appropriate for a chosen organization.

Designs a wireless risk mitigation plan that represents the organization and shows explicit relationships between IT decisions and business need.

Compare appropriate performance and range considerations for a wireless deployment plan.
14%

Does not compare appropriate performance and range considerations for a wireless deployment plan.

Compares, somewhat appropriately and accurately, performance and range considerations for a wireless deployment plan.

Compares appropriate performance and range considerations for a wireless deployment plan.

Compares, appropriately and in great detail, performance and range considerations for a wireless deployment plan.

Create an appropriate plan for preventing and mitigating performance and range issues for an organization's wireless deployment.
14%

Does not create an appropriate plan for preventing and mitigating performance and range issues for an organization's wireless deployment.

Creates a somewhat appropriate or partial plan for preventing and mitigating performance and range issues for an organization's wireless deployment.

Creates an appropriate plan for preventing and mitigating performance and range issues for an organization's wireless deployment.

Creates an ideal plan for preventing and mitigating performance and range issues for an organization's wireless deployment, showing a superior understanding of strategies for effectively handling performance and range implications.

Describe appropriate channel setting, including an effective strategy for analyzing the multilevel facilities found within an organization.
14%

Does not describe appropriate channel setting, including an effective strategy for analyzing the multilevel facilities found within an organization.

Lists somewhat appropriate channel setting, including a somewhat effective strategy for analyzing the multilevel facilities found within an organization; or provides a strategy that is not complete.

Describes appropriate channel setting, including an effective strategy for analyzing the multilevel facilities found within an organization.

Describes channel setting in detail, including an ideal strategy for analyzing the multilevel facilities found within an organization, displaying superior knowledge.

Design an appropriate strategy for improving coverage in areas of an organization where wireless coverage is difficult to obtain or maintain.
14%

Does not design an appropriate strategy for improving coverage in areas of an organization where wireless coverage is difficult to obtain or maintain.

Identifies a somewhat appropriate strategy for improving coverage in areas of an organization where wireless coverage is difficult to obtain or maintain.

Identifies an appropriate strategy for improving coverage in areas of an organization where wireless coverage is difficult to obtain or maintain.

Identifies appropriately a significant number of the areas of an organization that are difficult to obtain or maintain wireless coverage, and then designs an ideal strategy for improving coverage in these areas, showing superior insight into coverage loss risks and mitigation.

Describe appropriate device and infrastructure configuration activities that contributed to risk mitigation.
15%

Does not describe appropriate device and infrastructure configuration activities that contributed to risk mitigation.

Lists, but does not describe, device configuration activities, does not explain the role that these activities play in finding a solution to risk mitigation in an environment, or the explanation is not effective.

Describes appropriate device and infrastructure configuration activities that contributed to finding a solution to risk mitigation in an environment.

Describes with great insight the device configuration activities, and the explanation shows superior understanding of the impact that these activities have on risk mitigation in a wireless infrastructure.

Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
15%

Does not follow APA style and formatting guidelines for resources and citations and does not create a document that is clearly written and generally free of grammatical errors.

Either follows APA style and formatting guidelines for resources and citations or creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written, well organized, and completely free of grammatical errors.

 

 

UNIT 4 DISCUSSION 1

Wireless Connectivity Issues

Fran works for the help desk at the Department for Happy Heath Systems, an enterprise organization consisting of four hospitals and ten clinics. He receives a help call from Joan, a doctor who works at one of the hospitals. Joan complains that she is having connection issues with the main patient record application installed on her company-issued laptop. She explains that her connectivity is very slow and sometimes she loses the network connection altogether. After some experimentation, Fran discovers that the delays most often occur when Joan uses the company-wide patient record application, and that the delay worsens whenever she tries to download patient x-rays from the online database.

What are the next steps Fran should take to troubleshoot this problem? How would the troubleshooting steps be different if Fran had found that the issue only occurs in certain areas of the hospital? How do you suggest Fran solve the problem?

 

UNIT 4 ASSIGNMENT 1

Project - Maintenance and Monitoring Plan

For this assignment, you are to use the reading materials and any additional resources you find helpful to provide a maintenance and monitoring plan for a WLAN infrastructure. You are to provide a written description of your plan.

In preparation of your maintenance and monitoring plan, do the following:

  • Complete the required reading material.
  • Using the library or Internet, find at least three references that will support your expanded design.
  • Assume the facility is up and running with everything you need to install and configure the network devices.

 

Your completed plan should include the following:

  • Design a maintenance and monitoring strategy that is appropriate for your chosen organization. Your discussion and design should correlate with the organization description that you provided last week.
  • Develop a monitoring strategy for your organization relevant to monitoring performance, access points, and the overall WLAN configuration
  • Create a maintenance strategy for your organization relevant to finding, preventing, and fixing network issues and trouble areas.
  • Identify appropriate engineering and configuration concerns that are in an effective maintenance strategy relevant to managing, monitoring, and controlling WLAN expansions, upgrades, and increases.
  • Create a configuration management plan for your organization relevant to managing, monitoring, and controlling hardware and software changes on the network.
  • Describe appropriate device and infrastructure configuration activities that contributed to finding an appropriate solution for maintaining and monitoring a network.
  • Describe appropriate device configuration troubleshooting activities.

 

Make sure that your paper is professionally written, free of errors, and that APA formatting is applied throughout.

Once complete, submit your plan to the assignment area.

Resources

APA Style and Format.

 

 

Project - Maintenance and Monitoring Plan Scoring Guide

CRITERIA

NON-PERFORMANCE

BASIC

PROFICIENT

DISTINGUISHED

Design a maintenance and monitoring strategy that is appropriate for a chosen organization.
12%

Does not design a maintenance and monitoring strategy that is appropriate for a chosen organization.

Designs a partial maintenance and monitoring strategy that is somewhat appropriate for a chosen organization.

Designs a maintenance and monitoring strategy that is appropriate for a chosen organization.

Designs a detailed maintenance and monitoring strategy that is ideal for a chosen organization, displaying superior insight.

Develop a monitoring strategy for an organization.
12%

Does not develop a monitoring strategy for an organization.

Develops a somewhat effective monitoring strategy for an organization.

Develops a monitoring strategy for an organization.

Develops an ideal monitoring strategy for an organization that identifies a significant number of techniques for monitoring performance, access points, and the overall WLAN configuration most effective for the organization.

Create a maintenance strategy for an organization
12%

Does not create a maintenance strategy for an organization.

Creates a somewhat effective maintenance strategy for an organization.

Creates a maintenance strategy for an organization.

Creates an ideal maintenance strategy for an organization that identifies a significant number of techniques for finding, preventing, and fixing network issues and trouble areas most effective for the organization.

Identify appropriate management engineering and configuration strategies for managing, monitoring, and controlling WLAN expansions, upgrades, and increases.
12%

Does not identify appropriate management, engineering and configuration strategy for an organization that identifies techniques for managing, monitoring, and controlling WLAN expansions, upgrades, and increases.

Identifies a somewhat effective management engineering and configuration strategy for an organization that identifies a few techniques for managing, monitoring, and controlling WLAN expansions, upgrades, and increases.

Identifies appropriate management engineering and configuration strategy for an organization that identifies techniques for managing, monitoring, and controlling WLAN expansions, upgrades, and increases.

Identifies an ideal management engineering and configuration strategy for an organization that identifies a significant number of techniques for managing, monitoring, and controlling WLAN expansions, upgrades, and increases most effective for the organization.

Create an appropriate configuration management strategy for an organization that identifies techniques for managing, monitoring, and controlling hardware and software changes on the network.
13%

Does not create an appropriate configuration management strategy for an organization that identifies techniques for managing, monitoring, and controlling hardware and software changes on the network.

Creates a somewhat effective configuration management strategy for an organization that identifies a few techniques for managing, monitoring, and controlling hardware and software changes on the network.

Creates an appropriate configuration management strategy for an organization that identifies techniques for managing, monitoring, and controlling hardware and software changes on the network.

Creates an ideal configuration management strategy for an organization that identifies a significant number of techniques for managing, monitoring, and controlling hardware and software changes on the network most effective for an organization.

Describe appropriate device and infrastructure configuration activities that contributed to finding a solution for maintaining and monitoring a network.
13%

Does not describe appropriate device and infrastructure configuration activities that contributed to finding a solution for maintaining and monitoring a network.

Lists, but does not describe, device configuration activities; does not explain the role that these activities play in finding a solution for maintaining and monitoring a network, or the explanation is not effective.

Describes appropriate device and infrastructure configuration activities that contributed to finding a solution for maintaining and monitoring a network.

Describes with great insight the device configuration activities and the explanation shows superior understanding of the impact that these activities have on maintaining and monitoring a wireless infrastructure.

Describe appropriate device configuration troubleshooting activities.
13%

Does not describe appropriate device configuration troubleshooting activities.

Lists, but does not describe, device configuration troubleshooting activities.

Describes appropriate device configuration troubleshooting activities.

Describes with great insight the device configuration troubleshooting activities, and the explanation shows superior understanding of the impact of these activities on maintaining and monitoring a wireless infrastructure.

Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
13%

Does not follow APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors.

Either follows APA style and formatting guidelines for resources and citations or creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written, well organized, and completely free of grammatical errors.

 

 

UNIT 5 DISCUSSION 1

Reflection

Discuss your experience in this course.

 

UNIT 5 ASSIGNMENT 1

Project - WLAN Security Plan

For this assignment, you are to use the reading materials and any additional resources you find helpful to design a security infrastructure for your WLAN. You are required to provide a written description and a diagram that describes your security strategies and topology.

In preparation for your security deployment plan:

  • Complete the required reading material.
  • Research this topic and include at least three references from articles, books, or Web sites to support your paper.
  • Assume that the facility is up and running with everything you need to install and configure the network devices.

 

Your completed plan should include the following:

  • Design a security deployment strategy that is appropriate for your specific organization. Your discussion and design should correlate with the organization description that you provided last week.
  • Create a diagram that displays a site plan from a security deployment perspective; include changes relative to topology and hardware placement.
  • Write an analysis of your security infrastructure design, providing appropriate rationale for the chosen topology and hardware selection.
  • Describe the security strategies that you plan to implement for RF shielding, rogue access point detection, data encryption, and authentication.
  • Write an analysis of your security strategies, providing appropriate rationale for your chosen shielding, detection, data encryption, and authentication measures.
  • Design a security policy for deploying your wireless infrastructure, and identify the steps necessary to maintain the security and authenticity of your environment.

 

Make sure that your paper is professionally written, free of errors, and that APA formatting is applied throughout.

Once complete, submit your plan to the assignment area.

Resources

APA Style and Format.

 

 

Project - WLAN Security Plan Scoring Guide

CRITERIA

NON-PERFORMANCE

BASIC

PROFICIENT

DISTINGUISHED

Design a security deployment strategy that is appropriate for a specific organization.
16%

Does not design a security deployment strategy that is appropriate for a specific organization.

Designs a partial security deployment strategy that is somewhat appropriate for a specific organization.

Designs a security deployment strategy that is appropriate for a specific organization.

Designs an ideal security deployment strategy that is most effective for a specific organization.

Analyze appropriately a WLAN security infrastructure.
16%

Does not analyze appropriately a WLAN security infrastructure .

Analyzes somewhat appropriately a WLAN security infrastructure.

Analyzes appropriately a WLAN security infrastructure.

Analyzes appropriately, and in great detail, a WLAN security infrastructure, providing supportive rationale for the chosen topology and device placement showing superior insight.

Describe the security strategies that address the implementation of RF Shielding, rogue access point detection, data encryption, and authentication.
17%

Does not describe the security strategies that address the implementation of RF shielding, rogue access point detection, data encryption, and authentication.

Lists somewhat effective security strategies that address the implementation of a few security techniques such as RF shielding, rogue access point detection, data encryption, and authentication.

Describes the security strategies that address the implementation of RF shielding, rogue access point detection, data encryption, and authentication.

Describes in great detail the security strategies that address the effective implementation of RF shielding, rogue access point detection, data encryption, and authentication, showing superior insight.

Analyze security strategies, providing appropriate rationale for shielding, detection, data encryption, and authentication measures.
17%

Does not analyze security strategies or provide appropriate rationale for shielding, detection, data encryption, and authentication measures.

Analyzes security strategies, providing somewhat appropriate rationale for a few techniques such as shielding, detection, data encryption, and authentication measures.

Analyzes security strategies providing appropriate rationale for shielding, detection, data encryption, and authentication measures.

Analyzes appropriately and in great detail security strategies, providing most effective rationale for shielding, detection, data encryption, and authentication measures, showing superior insight.

Design an appropriate security policy for a wireless infrastructure
17%

Does not design an appropriate security policy for a wireless infrastructure.

Designs a somewhat appropriate partial security policy for a wireless infrastructure.

Designs an appropriate security policy for a wireless infrastructure.

Designs an ideal security policy for a wireless infrastructure most effective for the organization.

Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
17%

Does not follow APA style and formatting guidelines for resources and citations, and fails to create a document that is clearly written and generally free of grammatical errors.

Either follows APA style and formatting guidelines for resources and citations, or creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations, and creates a document that is clearly written and generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations, and creates a document that is clearly written, well organized, and completely free of grammatical errors.

 

 

UNIT 5 ASSIGNMENT 2

Wireless Infrastructure Proposal

For this assignment, your goal is to compile all of your previous assignments into one final wireless infrastructure proposal. Your WLAN security plan is to be included as part of this final proposal.

Using the reading materials and any additional resources you find helpful, update your assignments based on your instructor feedback, and then finalize your proposal.

Each of the project organizations presents its own challenges. As part of this redesign, you are asked to evaluate the existing infrastructure and make any and all improvements you believe are appropriate to improve the cost and efficiency of managing the network.

To prepare for this assignment, do the following:

  • Complete the WLAN Security Plan.
  • Review all previous work, completing necessary revisions based on your instructor's feedback.
  • Remove all conceptual definitions from previous assignments to ensure that the final document reflects a professional proposal.

 

Your Wireless Infrastructure Proposal should include the following:

  • Create a project scope document that details appropriate business requirements, IT goals, and project parameters for the given scenario.
  • Create a WLAN physical design that is accurately represented by design diagrams and a written analysis that is comprehensive and appropriately meets the organization needs.
  • Design a plan for risk mitigation that accurately represents business needs using a detailed written analysis.
  • Design a maintenance and monitoring strategy that accurately represents business needs using a detailed written analysis.
  • Design a WLAN security strategy that is accurately represented using a written analysis that is comprehensive and appropriately meets the organization needs.
  • Describe appropriate device and infrastructure configuration activities that contributed to an appropriate solution for this the final wireless infrastructure plan.
  • Describe appropriate device and infrastructure configuration troubleshooting activities that aided in offering an appropriate solution for the final wireless infrastructure plan.
  • Describe appropriate device and infrastructure configuration activities that were required to offer an appropriate solution for the organizations LAN/WAN Deployment problem.

 

Make sure that your paper is professionally written, structured, and free of errors and that APA formatting is applied throughout.

When complete, submit your document in the assignment area.

Resources

APA Style and Format.

 

 

 

 

Dot Image
Tutorials for this Question
  1. Tutorial # 00769518 Posted By: spqr Posted on: 07/14/2020 03:06 AM
    Puchased By: 2
    Tutorial Preview
    The solution of IT4170 WIRELESS NETWORK UNIT 1 - UNIT 5...
    Attachments
    Solution-00769518.zip (102 KB)

Great! We have found the solution of this question!

Whatsapp Lisa