Reference no: EM132444931
BN303 Wireless Networks and Security - Melbourne Institute of Technology
Assessment - Secured design of wireless LAN
Purpose of the assessment - The purpose of the assignment is to design a secured wireless LAN. Students will be able to complete the following ULOs:
d. Apply wireless network security techniques in the context of ethical implications;
e. Design and implement secure enterprise wireless networks.
Assignment Description:
Design and implementation of wireless LAN for a small campus
Requirements
Design the network as specified in the above scenario from scratch. You have to submit a group report and specify each group member's contribution on the front page. You should address the following tasks in your report:
For this assignment, you need to complete the following tasks:
• Design the wireless network of campus A according to given specification in the given case study (Diagrams can be designed using MS Visio or any other available network design software (including Cisco Packet Tracer)).
• Establish network security by using WAP or WAP2.
• List the security requirements for the wired network and wireless network of campus A stated in the case study (consider the different security requirements for Internal vs DMZ).
• Provide an 802.1x authentication mechanism required a wireless network according to the wired network of the Report. Furthermore, the network security management mechanism for further solutions should be based on the existing security scheme.
• Configure the necessary WLAN and WLAN security in a simulated network environment (attach pieces of evidencewith screenshots or otherwise).
All group members:
Write the report with detail steps that explains all the solutions and implement theIEEE802.11x security demonstration using WAP or WAP2 (in the demonstration you need to consider how the user connect to the WLAN through the access point). Also, give the plan to extend the network for more users using multiple access points.
Write a report that includes the following sections: an abstract, introduction that contains a brief history, network components etc., proposed solution along with the figure, demonstration of implementations on simulated environments, your future recommendations, and conclusions.
Attachment:- Secured design of wireless LAN.rar