Analyse and implement a secure smart home wlan

Assignment Help Computer Networking
Reference no: EM132366083 , Length: word count:2200

Design, analyse, and implement a secure smart home WLAN and a secure enterprise WLAN.

Purpose of the assessment (with ULO Mapping)

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Smart home or home automation technology provides homeowners' security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or other networked device. This technology enables you doing things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, and much more.

This assignment aims to simulate a smart home using IoT technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WLAN that enables the users to control the things through wireless technology. The users should also be able to control the things when they are outside home (remote access). This means the WLAN should be connected to a global network that enables the users to have control on devices when they are at work. Hence, there is another WLAN at work that is connected to the global network. Note, you need to make sure that the WLANs are secure.

This assignment requires the students to design, analyse, and implement a smart home, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of WLANs.

2. Design, analysis, and implementation of a smart home WLAN and an enterprise WLAN where the following aspects of security should be considered:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

3. Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work. You need to take a snapshot for each step of testing followed by the explanation.

4. Demonstration in Week 11 during the Lab.

The tutor will assign the groups, maximum number of students in a group is 4 and the students in each group should be from the same lab.

Reference no: EM132366083

Questions Cloud

What is the current value of this stock to you : The firm last paid a dividend of $4.22. If you require a rate of return of 20 percent, what is the current value of this stock to you?
Objections do leaders face from stakeholders : What types of obstacles/objections do leaders face from stakeholders when implementing change within an organization?
Do you think that nonprofit leadership considers : Do you think that Nonprofit Leadership considers its mission in all of it decisions? Why or why not?
What is strategy and why is it important : What is strategy and why is it important. Please provide examples of organizations that demonstrate successful strategy.
Analyse and implement a secure smart home wlan : Design, analyse, and implement a secure smart home WLAN and a secure enterprise WLAN - Explore the ethical implications in the design and implementation of WLAN
Report advising board on how proposal should be accounted : ACC701 - Financial Accounting - King's Own Institute - Apply the technical knowledge of relevant accounting standards to financial reporting settings
What are the tensions for patagonia around dwr : What are the tensions for Patagonia around DWR and who are the stakeholders associated with each of these tensions?
Describe the leaders use of the leadership style : Describe in detail the situation, needed tasks, leader actions and results Case Incident 1 : Sharing is Performing
Why do you think political savviness is often underdeveloped : Those who understand it succeed if not survive. Why do you think political savviness is often an underdeveloped skill by a lot of leaders?

Reviews

len2366083

9/5/2019 1:01:24 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Appendix /5 The PKA file is attached and demonstrated The PKA file is not attached but demonstrated Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Demonstration /15 Logic is clear and easy to follow with strong arguments Consistency logical and convincing

len2366083

9/5/2019 1:01:15 AM

Grade Mark HD 80-100 Excellent Abstract /5 Accurately PLUS concisely conveys the project topic, methods and outcomes Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Explore ethical Finding is clearly implications linked and well /10 justified Design, Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements analysis, and implementati on of both home and enterprise WLAN /15 Design, Excellent analysis included WPA, WPA2 and RADIUS and covered all aspects. analysis, and implementati on of security in both home and enterprise WLAN /15 Testing /15 Testing was successful between client and AP. All required snapshots attached Conclusion /5 Logic is clear and easy to follow with strong arguments

len2366083

9/5/2019 1:01:06 AM

Design, analysis, and implementation of security in both smart home and enterprise WLANs Design, Analysis, and implementation of both smart home and enterprise wireless networks, considering the following aspects: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 15 Testing Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work. You need to take a snapshot for each step of testing followed by the explanation. 15 Conclusion Write summary of the report highlighting the positive and negative points 5 Reference style Follow IEEE reference style and format 5 Appendix You need to upload the packet tracer file (.pka) 5 Report Layout Report layout, style and language 5 Demonstration Demonstration in Week 11 during the Lab. 15 Total 100

len2366083

9/5/2019 1:00:59 AM

Section to be included in the report Description of the section Marks Abstract Summarize the objective of the project and the outcome 5 Introduction Introduction of smart home and security challenges 5 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network 10 Design, analysis, and implementation of smart home and enterprise WLANs Design, Analysis, and implementation of a smart home and enterprise WLAN 15

len2366083

9/5/2019 1:00:51 AM

need clear report also need online tutorial to demonstrate this assignement in the class Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd