BN303 Wireless Networks and Security Assignment

Assignment Help Computer Network Security
Reference no: EM132639854

BN303 Wireless Networks and Security - Melbourne Institute of Technology

Assessment - Secured design of wireless LAN

Learning Outcome 1: Explain wireless communication protocols;

Learning Outcome 2: Utilise standards-based technologies used in various networks;

Learning Outcome 3: Apply wireless network security techniques in the context of ethical implications;

Learning Outcome 4: Design and implement secure enterprise wireless networks.

Design and implementation of wireless network for an enterprise.

Wireless networks are useful but prone to many security attacks. In order to secure wireless network but to retain its accessibility, mobility and connectivity, the network engineers must take care in designing and implementation of a wireless network.

The intent of network engineer is to extend the internet services from wired network using multiple access points in many carefully selected locations. One of the resolutions for wireless network security is to encrypt data and provide intelligent authentications - that is to segregate between the internal users to the external guest users. You can find a set of tools such as WAP or WAP2 that can help you to protect the wireless in such a way. In particular for authentication, the recommended solution is IEEE802.11x that provide authentication for devices trying to connect through wireless LANs.

The main objective in this assignment is to design and implement IEEE 802.1X standard for security over wireless LAN authentications for a campus with any a large number of students and staff (staff with more services available on authentication and authorizations).

In designing your network, consider the following:
• How can you secure your network from potential attacks? Are WPA or WPA2 sufficient for all future attacks? Consider the network design with devices that support 802.1X
• Design IEEE 802.11x network using Protection-Capable Management Frames.
• You need to deploy a secure 802.1X serve 2,000 students and 200 staff at a campus (consider using DMZ).
• Deploy a solution that supports all business and security requirements (on a simulated environment).

Requirements

Design and implement the network for the above scenario. You need to submit a group report with clear statement of individual group member's contribution on the front page.

In this report, you need to include:

• Design the wireless network of campus according to the given specification (the diagrams can be on Paint or other simple drawing platforms such as draw.io)
• Incorporate the network security using either WAP or WAP2.
• Present the security requirements for wired network and wireless network of campus given there are two groups of users - students (acting as guests) and staff (acting as internal users).
• Implement the designed network on a network simulator satisfying both business and security requirements (students with guest Internet access while staff having access to the Internal Data (consider DMS)) - you may need to clear on authentication and authorizations.
• Test and troubleshoot if any incompliance.
• Report the final working version of your network on a network simulator (e.g. Cisco Packet Tracer or other tools (including GNS3)).

Present the report with steps that explain all the solutions and implement the IEEE802.11x security demonstration using WAP or WAP2 (in the demonstration you need to consider how to user connect to the WLAN through the access point). Provide a plan to extend the network for more users if required.

Write a report that includes the following sections: abstract, introduction that contains brief history, network components etc, proposed solution along with figure, demonstration of your implementation and testing, and your future recommendations.

Attachment:- Wireless Networks and Security.rar

Reference no: EM132639854

Questions Cloud

Calculate profit as a percent of sales revenue for product : Using the plantwide approach, calculate the profit for each product. Also calculate profit as a percent of sales revenue for each product
Describe gdp and activities or purchases : Describe GDP and list 2 activities or purchases that will not count toward GDP in 2019 and explain why they will not count.
Is there an accounting rule against this practice : Do you agree or disagree with the manager's decision of when to ship goods to customers and record the revenue? Is there accounting rule against this practice
Determine the reimbursement from the centers for medicare : Using the most common office visit, CPT code 99214, determine the reimbursement from the Centers for Medicare and Medicaid Services.
BN303 Wireless Networks and Security Assignment : BN303 Wireless Networks and Security Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service
Explain the key characteristics of nonprofit hospitals : The board of directors of your for-profit hospital has been approached by a nonprofit hospital to consider a joint venture to take over their business resulting
Analyse the economic challenges zambia : Imagine you are a permanent secretary at the Ministry of Finance in Zambia. Analyse the economic challenges Zambia is experiencing.
Why does biotech inc allocate cafeteria costs to department : Biotech, Inc., recently began providing cafeteria services to its employees. Why does Biotech, Inc., allocate cafeteria costs to departments?
Determine the gross profit that McArthur-Douglas recognize : Determine the gross profit that McArthur-Douglas should recognize in both 2013 and 2014 using the percentage-of-completion method

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd