SlideShare a Scribd company logo
Term Paper: Wireless
Security
Plan
Due Week 10 and worth 150 points
This assignment consists of two (3) sections: a written Wireless
Security
Plan, a graphically depicted Wireless Network Architecture, and
a Wireless Project Implementation Plan created through the use
of MS Project.
You must submit the three (3) sections as separate files for the
completion of this assignment.
Label each file name according to the section of the assignment
it is written for.
The use of specific software has been suggested; however,
equivalents including but not limited to OpenOffice and Dia are
also permitted. If equivalent tools are used, files must be saved
and submitted for grading using extensions that are readable by
their equivalent Microsoft Windows edition. Assignment
submissions that fail to follow this request may result in a
reduced grade.
Any network or information system deployment must be
carefully and thoroughly planned and implemented. Failures to
thoroughly plan the implementation of wireless networks have
led to many project failures due to lack of support, technical
issues, and security issues. During this course, you have
covered many wireless support topics, technical considerations
and issues, and security considerations and issues.
Section 1: Wireless
Security
Plan
Required Format (MS Word File)
Write a six to eight (6-8) page wireless
security
plan for an education institution with a single campus but with
multiple buildings on that campus.
The wireless deployment plan must include, but is not limited
to, the following items:
i.
Wireless
Security
Plan Overview
ii.
Purpose and Scope
iii.
Wireless Network Equipment and Devices
iv.
Wireless Network Device Configuration
v.
Wireless Client Configuration and Access
vi.
Wireless Network Staffing, Training, and Support Requirements
vii.
Wireless Network Security Requirements
viii.
Terms and Definitions
Use at least four (4) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Section 1 of your assignment must follow these formatting
requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Section 2: Wireless Network Architecture
Required Format (MS Visio or equivalent)
Use Microsoft Visio or an open source alternative, such as Dia
to develop a network architecture diagram depicting the
wireless networking equipment, security devices, and
architecture for the corporate wireless network.
Section 3: Wireless Project Implementation Plan
Required Format (MS Project or equivalent)
Use MS Project or an Open Source alternative, such as Open
Project to develop a project plan depicting the project tasks,
task durations, predecessors, and resources needed to implement
the wireless network.
The specific course learning outcomes associated with this
assignment are:
•
Analyze the network protocols and security mechanisms in
wireless networks.
•
Evaluate the application of Wireless LANs, MANs, and PANs.
•
Develop a wireless deployment plan to address and solve a
proposed business problem.
•
Use technology and information resources to research issues in
wireless networks
•
Write clearly and concisely about wireless computing topics
using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 150
Term Paper: Wireless Deployment Plan
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Section 1: Wireless Deployment Plan (MS Word File)
1ai. Write a
security
plan for an education institution which includes a wireless
deployment plan overview.
Weight: 5%
Did not submit or incompletely wrote a
security
plan for an education institution which included a wireless
deployment plan overview.
Partially
wrote a
security
plan for an education institution which included a wireless
deployment plan overview.
Satisfactorily
wrote a
security
plan for an education institution which included a wireless
deployment plan overview.
Thoroughly
wrote a
security
plan for an education institution which included a wireless
deployment plan overview.
1aii. Write a
security
plan for an education institution which includes the purpose and
scope.
Weight: 5%
Did not submit or incompletely
wrote a
security
plan for an education institution which included the purpose and
scope.
Partially
wrote a
security
plan for an education institution which included the purpose and
scope.
Satisfactorily
wrote a
security
plan for an education institution which included the purpose and
scope.
Thoroughly
wrote a
security
plan for an education institution which included the purpose and
scope.
1aiii. Write a
security
plan for an education institution which includes the wireless
network equipment and devices.
Weight: 5%
Did not submit or incompletely
wrote a
security
plan for an education institution which included the wireless
network equipment and devices.
Partially
wrote a
security
plan for an education institution which included the wireless
network equipment and devices.
Satisfactorily
wrote a
security
plan for an education institution which included the wireless
network equipment and devices.
Thoroughly
wrote a
security
plan for an education institution which included the wireless
network equipment and devices.
1aiv. Write a
security
plan for an education institution which includes
the wireless network device configuration.
Weight: 5%
Did not submit or incompletely wrote a
security
plan for an education institution which included the wireless
network device configuration.
Partially
wrote a
security
plan for an education institution which included the wireless
network device configuration.
Satisfactorily
wrote a
security
plan for an education institution which included the wireless
network device configuration.
Thoroughly
wrote a
security
plan for an education institution which included the wireless
network device configuration.
1av. Write a deployment plan for an education institution which
includes
the wireless client configuration and access.
Weight: 5%
Did not submit or incompletely wrote a deployment plan for an
education institution which included the wireless client
configuration and access.
Partially
wrote a deployment plan for an education institution which
included the wireless client configuration and access.
Satisfactorily
wrote a deployment plan for an education institution which
included the wireless client configuration and access.
Thoroughly
wrote a deployment plan for an education institution which
included the wireless client configuration and access.
1avi. Write a
security
plan for an education institution which includes
the wireless network staffing, training, and support
requirements.
Weight: 5%
Did not submit or incompletely
wrote a
security
plan for an education institution which included the wireless
network staffing, training, and support requirements.
Partially
wrote a
security
plan for an education institution which included the wireless
network staffing, training, and support requirements.
Satisfactorily
wrote a
security
plan for an education institution which included the wireless
network staffing, training, and support requirements.
Thoroughly
wrote a
security
plan for an education institution which included the wireless
network staffing, training, and support requirements.
1avii. Write a plan for an education institution which includes
the wireless network security requirements.
Weight: 5%
Did not submit or incompletely
wrote a plan for an education institution which included the
wireless network security requirements.
Partially
wrote a plan for an education institution which included the
wireless network security requirements.
Satisfactorily
wrote a plan for an education institution which included the
wireless network security requirements.
Thoroughly
wrote a plan for an education institution which included the
wireless network security requirements.
1aviii. Write a plan for an education institution which includes
the terms and definitions.
Weight: 5%
Did not submit or incompletely
wrote a plan for an education institution which included the
terms and definitions.
Partially
wrote a plan for an education institution which included the
terms and definitions.
Satisfactorily
wrote a plan for an education institution which included the
terms and definitions.
Thoroughly
wrote a plan for an education institution which included the
terms and definitions.
1b. 4 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
Section 2: Wireless Network Architecture (MS Visio or
equivalent)
2. Develop a network architecture diagram depicting the
wireless networking equipment, security devices, and
architecture for the corporate wireless network using Microsoft
Visio or an open source alternative, such as Dia.
Weight: 25%
Did not submit or incompletely developed a network
architecture diagram depicting the wireless networking
equipment, security devices, and architecture for the corporate
wireless network using Microsoft Visio or an open source
alternative, such as Dia.
Partially developed a network architecture diagram depicting
the wireless networking equipment, security devices, and
architecture for the corporate wireless network using Microsoft
Visio or an open source alternative, such as Dia.
Satisfactorily developed a network architecture diagram
depicting the wireless networking equipment, security devices,
and architecture for the corporate wireless network using
Microsoft Visio or an open source alternative, such as Dia.
Thoroughly developed a network architecture diagram depicting
the wireless networking equipment, security devices, and
architecture for the corporate wireless network using Microsoft
Visio or an open source alternative, such as Dia.
Section 3: Wireless Project Implementation Plan (MS Project or
equivalent)
3. Develop a project plan depicting the project tasks, task
durations, predecessors, and resources needed to implement the
wireless network using MS Project or an Open Source
alternative, such as Open Project.
Weight: 20%
Did not submit or incompletely
developed a project plan depicting the project tasks, task
durations, predecessors, and resources needed to implement the
wireless network using MS Project or an Open Source
alternative, such as Open Project.
Partially developed a project plan depicting the project tasks,
task durations, predecessors, and resources needed to implement
the wireless network using MS Project or an Open Source
alternative, such as Open Project.
Satisfactorily developed a project plan depicting the project
tasks, task durations, predecessors, and resources needed to
implement the wireless network using MS Project or an Open
Source alternative, such as Open Project.
Thoroughly developed a project plan depicting the project tasks,
task durations, predecessors, and resources needed to implement
the wireless network using MS Project or an Open Source
alternative, such as Open Project.
4. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx

Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan new
Isabeedd
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
bfingarjcmc
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
dannies7qbuggie
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
dannies7qbuggie
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
starkeykellye
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
rosemariebrayshaw
 
CIS 513 Entire Course NEW
CIS 513 Entire Course NEWCIS 513 Entire Course NEW
CIS 513 Entire Course NEW
shyamuopfive
 
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
avengersendgame208
 
It 241 it241
It 241 it241It 241 it241
It 241 it241
GOODCourseHelp
 
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
aaronabrahhaam
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
astonrenna
 
Term Paper Students’ Self-Service Website for Mobile Devices.docx
Term Paper Students’ Self-Service Website for Mobile Devices.docxTerm Paper Students’ Self-Service Website for Mobile Devices.docx
Term Paper Students’ Self-Service Website for Mobile Devices.docx
jonghollingberry
 
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docx
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docxTerm Paper Students’ Self-Service Website for Mobile DevicesDue.docx
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docx
mattinsonjanel
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
woodruffeloisa
 
Click the link above to submit your assignment.Students, ple.docx
Click the link above to submit your assignment.Students, ple.docxClick the link above to submit your assignment.Students, ple.docx
Click the link above to submit your assignment.Students, ple.docx
clarebernice
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
carlibradley31429
 
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
infinityend3
 
Strayer cis-505-week-10-term-paper-networking
Strayer cis-505-week-10-term-paper-networkingStrayer cis-505-week-10-term-paper-networking
Strayer cis-505-week-10-term-paper-networking
avengersendgame208
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
sagarlesley
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 

Similar to Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx (20)

Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan new
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
CIS 513 Entire Course NEW
CIS 513 Entire Course NEWCIS 513 Entire Course NEW
CIS 513 Entire Course NEW
 
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
Stayer cis-513-week-7-case-study-2-security-in-bluetooth-and-other-mobile-dev...
 
It 241 it241
It 241 it241It 241 it241
It 241 it241
 
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile dev...
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Term Paper Students’ Self-Service Website for Mobile Devices.docx
Term Paper Students’ Self-Service Website for Mobile Devices.docxTerm Paper Students’ Self-Service Website for Mobile Devices.docx
Term Paper Students’ Self-Service Website for Mobile Devices.docx
 
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docx
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docxTerm Paper Students’ Self-Service Website for Mobile DevicesDue.docx
Term Paper Students’ Self-Service Website for Mobile DevicesDue.docx
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Click the link above to submit your assignment.Students, ple.docx
Click the link above to submit your assignment.Students, ple.docxClick the link above to submit your assignment.Students, ple.docx
Click the link above to submit your assignment.Students, ple.docx
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
 
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
 
Strayer cis-505-week-10-term-paper-networking
Strayer cis-505-week-10-term-paper-networkingStrayer cis-505-week-10-term-paper-networking
Strayer cis-505-week-10-term-paper-networking
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 

More from jonghollingberry

The annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docxThe annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docx
jonghollingberry
 
The Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docxThe Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docx
jonghollingberry
 
The American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docxThe American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docx
jonghollingberry
 
The American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docxThe American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docx
jonghollingberry
 
The aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docxThe aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docx
jonghollingberry
 
The 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docxThe 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docx
jonghollingberry
 
The AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docxThe AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docx
jonghollingberry
 
The accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docxThe accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docx
jonghollingberry
 
The 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docxThe 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docx
jonghollingberry
 
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docxThe Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
jonghollingberry
 
The 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docxThe 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docx
jonghollingberry
 
thats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docxthats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docx
jonghollingberry
 
The 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docxThe 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docx
jonghollingberry
 
The 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docxThe 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docx
jonghollingberry
 
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docxThe (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
jonghollingberry
 
Thats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docxThats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docx
jonghollingberry
 
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docxTextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
jonghollingberry
 
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docxTerrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
jonghollingberry
 
Test the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docxTest the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docx
jonghollingberry
 
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docxTerms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
jonghollingberry
 

More from jonghollingberry (20)

The annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docxThe annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docx
 
The Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docxThe Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docx
 
The American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docxThe American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docx
 
The American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docxThe American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docx
 
The aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docxThe aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docx
 
The 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docxThe 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docx
 
The AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docxThe AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docx
 
The accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docxThe accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docx
 
The 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docxThe 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docx
 
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docxThe Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
 
The 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docxThe 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docx
 
thats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docxthats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docx
 
The 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docxThe 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docx
 
The 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docxThe 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docx
 
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docxThe (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
 
Thats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docxThats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docx
 
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docxTextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
 
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docxTerrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
 
Test the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docxTest the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docx
 
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docxTerms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx

  • 1. Term Paper: Wireless Security Plan Due Week 10 and worth 150 points This assignment consists of two (3) sections: a written Wireless Security Plan, a graphically depicted Wireless Network Architecture, and a Wireless Project Implementation Plan created through the use of MS Project. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. The use of specific software has been suggested; however, equivalents including but not limited to OpenOffice and Dia are also permitted. If equivalent tools are used, files must be saved and submitted for grading using extensions that are readable by their equivalent Microsoft Windows edition. Assignment submissions that fail to follow this request may result in a reduced grade. Any network or information system deployment must be carefully and thoroughly planned and implemented. Failures to thoroughly plan the implementation of wireless networks have led to many project failures due to lack of support, technical issues, and security issues. During this course, you have covered many wireless support topics, technical considerations and issues, and security considerations and issues. Section 1: Wireless
  • 2. Security Plan Required Format (MS Word File) Write a six to eight (6-8) page wireless security plan for an education institution with a single campus but with multiple buildings on that campus. The wireless deployment plan must include, but is not limited to, the following items: i. Wireless Security Plan Overview ii. Purpose and Scope iii. Wireless Network Equipment and Devices iv. Wireless Network Device Configuration
  • 3. v. Wireless Client Configuration and Access vi. Wireless Network Staffing, Training, and Support Requirements vii. Wireless Network Security Requirements viii. Terms and Definitions Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Section 1 of your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Section 2: Wireless Network Architecture
  • 4. Required Format (MS Visio or equivalent) Use Microsoft Visio or an open source alternative, such as Dia to develop a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network. Section 3: Wireless Project Implementation Plan Required Format (MS Project or equivalent) Use MS Project or an Open Source alternative, such as Open Project to develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network. The specific course learning outcomes associated with this assignment are: • Analyze the network protocols and security mechanisms in wireless networks. • Evaluate the application of Wireless LANs, MANs, and PANs. • Develop a wireless deployment plan to address and solve a proposed business problem. • Use technology and information resources to research issues in wireless networks • Write clearly and concisely about wireless computing topics using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 150 Term Paper: Wireless Deployment Plan Criteria Unacceptable Below 70% F
  • 5. Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A Section 1: Wireless Deployment Plan (MS Word File) 1ai. Write a security plan for an education institution which includes a wireless deployment plan overview. Weight: 5% Did not submit or incompletely wrote a security plan for an education institution which included a wireless deployment plan overview. Partially wrote a security plan for an education institution which included a wireless deployment plan overview. Satisfactorily wrote a security plan for an education institution which included a wireless deployment plan overview. Thoroughly wrote a
  • 6. security plan for an education institution which included a wireless deployment plan overview. 1aii. Write a security plan for an education institution which includes the purpose and scope. Weight: 5% Did not submit or incompletely wrote a security plan for an education institution which included the purpose and scope. Partially wrote a security plan for an education institution which included the purpose and scope. Satisfactorily wrote a security plan for an education institution which included the purpose and scope. Thoroughly wrote a security
  • 7. plan for an education institution which included the purpose and scope. 1aiii. Write a security plan for an education institution which includes the wireless network equipment and devices. Weight: 5% Did not submit or incompletely wrote a security plan for an education institution which included the wireless network equipment and devices. Partially wrote a security plan for an education institution which included the wireless network equipment and devices. Satisfactorily wrote a security plan for an education institution which included the wireless network equipment and devices. Thoroughly wrote a security
  • 8. plan for an education institution which included the wireless network equipment and devices. 1aiv. Write a security plan for an education institution which includes the wireless network device configuration. Weight: 5% Did not submit or incompletely wrote a security plan for an education institution which included the wireless network device configuration. Partially wrote a security plan for an education institution which included the wireless network device configuration. Satisfactorily wrote a security plan for an education institution which included the wireless network device configuration. Thoroughly wrote a security plan for an education institution which included the wireless network device configuration.
  • 9. 1av. Write a deployment plan for an education institution which includes the wireless client configuration and access. Weight: 5% Did not submit or incompletely wrote a deployment plan for an education institution which included the wireless client configuration and access. Partially wrote a deployment plan for an education institution which included the wireless client configuration and access. Satisfactorily wrote a deployment plan for an education institution which included the wireless client configuration and access. Thoroughly wrote a deployment plan for an education institution which included the wireless client configuration and access. 1avi. Write a security plan for an education institution which includes the wireless network staffing, training, and support requirements. Weight: 5% Did not submit or incompletely wrote a security plan for an education institution which included the wireless network staffing, training, and support requirements.
  • 10. Partially wrote a security plan for an education institution which included the wireless network staffing, training, and support requirements. Satisfactorily wrote a security plan for an education institution which included the wireless network staffing, training, and support requirements. Thoroughly wrote a security plan for an education institution which included the wireless network staffing, training, and support requirements. 1avii. Write a plan for an education institution which includes the wireless network security requirements. Weight: 5% Did not submit or incompletely wrote a plan for an education institution which included the wireless network security requirements. Partially wrote a plan for an education institution which included the wireless network security requirements. Satisfactorily wrote a plan for an education institution which included the
  • 11. wireless network security requirements. Thoroughly wrote a plan for an education institution which included the wireless network security requirements. 1aviii. Write a plan for an education institution which includes the terms and definitions. Weight: 5% Did not submit or incompletely wrote a plan for an education institution which included the terms and definitions. Partially wrote a plan for an education institution which included the terms and definitions. Satisfactorily wrote a plan for an education institution which included the terms and definitions. Thoroughly wrote a plan for an education institution which included the terms and definitions. 1b. 4 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. Section 2: Wireless Network Architecture (MS Visio or equivalent)
  • 12. 2. Develop a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network using Microsoft Visio or an open source alternative, such as Dia. Weight: 25% Did not submit or incompletely developed a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network using Microsoft Visio or an open source alternative, such as Dia. Partially developed a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network using Microsoft Visio or an open source alternative, such as Dia. Satisfactorily developed a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network using Microsoft Visio or an open source alternative, such as Dia. Thoroughly developed a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network using Microsoft Visio or an open source alternative, such as Dia. Section 3: Wireless Project Implementation Plan (MS Project or equivalent) 3. Develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network using MS Project or an Open Source alternative, such as Open Project. Weight: 20% Did not submit or incompletely developed a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network using MS Project or an Open Source alternative, such as Open Project. Partially developed a project plan depicting the project tasks,
  • 13. task durations, predecessors, and resources needed to implement the wireless network using MS Project or an Open Source alternative, such as Open Project. Satisfactorily developed a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network using MS Project or an Open Source alternative, such as Open Project. Thoroughly developed a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network using MS Project or an Open Source alternative, such as Open Project. 4. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present