Retrieved from https://studentshare.org/education/1403592-scenario-analysis-report
https://studentshare.org/education/1403592-scenario-analysis-report.
For educational institutions, teaching and learning technology should consider the students and courses or curriculum and the enhancements for the effective delivery, progress monitoring, and advancements in education, supposed to be found in infrastructures. Mobile and digital technology owned by the learning population have become the means to access information. This situation demands certain requirements from the ICT infrastructure within the campus.
The server room must provide for networking in terms of wireless access points (WAP). It should have a multilayered switch (MLS) router that creates the network and then connects the networks, links computers to the world wide web or internet and allows authorized end users to share a connection.
Part of the more recent technology for the proper maintenance of services and data is “Cloud Computing”, or the means to backup data in times of disaster, including maintenance of communications. At the same time, the server itself goes under repairs and maintenance to recover. However, sensitive information can be exposed to loss of privacy with “Cloud Computing”. Thus, having a primary server and a backup server for such data (which should never be compromised) will likewise be important so that only the not-so-sensitive services and information can be served by “Cloud Computing” in times of disaster.
Infrastructure will have to include two storage options. One can be managed with the help of third party maintenance. This is usually the provider of the “Cloud Computing” platform. The other storage will require direct management of the backup database, operating system, and applications. These would be the fireproof, waterproof, and very durable set of hard drives. In universities wherein students can bring and use their own IT device, the Wireless Local Area Network (WLAN) must implement a policy-enabled security system otherwise known as a firewall. Administrators should have security software enforcing the policies and procedures for using the IT facilities of the university. This can be made possible with a background script that monitors compliance.