Implementation of Authentication Process
IMPLEMENTATION OF AUTHENTICATION PROCESS 5
Implementationof Authentication Process
Implementationof Authentication Process
The technological world is one of the fastest growing fields andamong the most important in modern life. The Internet has been animportant aspect of technology in since its invention. Traditionally,wired connections were used to connect different computers and othertechnological devices. However, there have been advancements in thenetworking field that have facilitated the introduction of theWireless Local Area Network (WLAN). It enables different devices tobe connected wirelessly in a certain area. The user only needs tohave a device with the suitable protocols and applications that allowwireless connection. This makes WLAN highly suitable for use in theclassroom environment.
Potential User Groups of WLAN in a School
WLAN can be used by various users in aschool set up. Any stakeholder who has a device that is capable ofconnection with the wireless network can be given access. Theadministration may use it as a tool of supervision and oversight ofall activities taking place in the school. The students may also usetechnological gadgets provided by the school to connect to thenetwork for research purpose and confirmation of personal informationstored by the administration (Wu,Lee, Lai, Lee & Chung, 2012).Moreover, every staff member can store and update personalinformation related to their activities in the school using wirelessconnections to the network. All the users should have a networkaccount through which they can log into the network to carry outtheir activities.
Security Requirements
A suitable authentication system should be put in placewhereby every user should own an account that has a password and username that is not similar to anyone else’s. Upon logging into theaccount, the user may make changes, and the system should requestidentification details again. Any material to be sent or received inthe network should also undergo authorization (Roy, Shoshan, Fish&Yadid-Pecht, 2013).
Probable WLAN Risks in a School Environment
There may be certain risks that occurafter the introduction of WLAN. These include intrusion of privacy byaccessing data belonging to another user, which can be addressed byusing passwords unique for every user. There is also the loss of dataand difficulties in maintaining congested networks (Roy et al.,2013). This can be solved by the introduction of a systemadministrator into the network. Easy maintenance can also be ensuredby use of domain naming system where a group of devices, for example,in a single class are given a single IP address
Data Classification Plan
Portals may be created for different users through whichthey can store their information and progress of daily activities.Students should have a portal that is distinct from the staff nad theadministration. Access to one`s portal should be through a uniquepassword and username. This ensures privacy and security of data. Theadministration should be able to keep track of the number of studentsand staff in the network and have a detailed report on the progressof each stakeholder`s activities. The students` data stored in thenetwork should include personal information, financial information,health status, and disabilities and academic information (Singh &Singh, 2014).
Applications and Protocols on the WLAN
The students should only access applications that arerelated to academic research. Besides, protocols should be put inplace to block any access to other areas. Teachers and other staffmembers may have access to any applications in the network and be ina position to supervise the students’ academic progress (Chang,2016). The students may also be allowed access to restricted areas atspecific hours. For instance, in the evening and during weekends,they may be allowed access to entertainment sites using their device,but during the weekdays which are mainly the learning hours, accessto such sites may be restricted.
Use of PDAs
Personal digital assistants ought to beallowed to connect to the network. It would be easier for each userto have a portable device for accessing the network anywhere in theschool. This would ensure easy connections for all the users in theschool, especially teachers and students.
Conclusion
Wireless Local Area Networks should be adopted in learningenvironments because they ensure efficient connectivity andcommunication.They also facilitate teaching and research for thestudents. There may be a few risks that may rise with theintroduction of WLAN, but in the long-run, the benefits outshinethem. It is evident that technology will continue to advance and itis only logical that everyone tries to accommodate the developments.The wireless networks allow flexibility since the existinginfrastructure does not have to be replaced to accommodate it.Wireless connections are also faster than the wired ones and allowmobility since portable devices can be connected to the network. Itis, therefore, a beneficial advancement that should be adopted at allcost.
References
Chang,J. F. (2016). Businessprocess management systems: Strategy and implementation.CRC
Press.
Roy, S. D.,Li, X., Shoshan, Y., Fish, A., & Yadid-Pecht, O. (2013). Hardwareimplementation
ofa digital watermarking system for video authentication. IEEETransactions On Circuits And Systems For Video Technology, 23(2),289-301.
Singh, M., &Singh, S. (2012). Design and implementation of multi-tierauthentication scheme in
cloud. InternationalJournal of Computer Science Issues, 9(5),181-187.
Wu,Z. Y., Lee, Y. C., Lai, F., Lee, H. C., & Chung, Y. (2012). Asecure authentication scheme for telecare medicine informationsystems. Journalof Medical Systems, 36(3),1529-1535.
No related posts.