Demonstrate the main challenges in protecting sensor network

Assignment Help Computer Network Security
Reference no: EM133748175 , Length: word count:5000

Computer Networks and Security

Assessment: Network simulation

Assessment Objective
This assessment enables you to comprehend the fundamental concept of network design and acquire the skills necessary to develop both logical and physical network designs.
The simulation of a Local Area Network (LAN) using Packet Tracer enables you to comprehend the network architecture and acquire the necessary skills to successfully set up a LAN.
Assessment Details:
TechHub is a global IT company primarily based in the USA. Recently, the company has decided to enter the Australian market. TechHub plans to establish three branches in Sydney, Melbourne, and Brisbane with the following network configurations:

Sydney (three-story structure):
NET-A will accommodate up to 600 employees.
Melbourne (two-story structure):
NET-B will accommodate up to 300 employees.
Brisbane (one-story structure):
NET-C will accommodate up to 100 employees.

Each department will have its own server. It is essential that employees can communicate and access data from various servers across the three locations. You are tasked with designing a local area network (LAN) for the three branches. Additionally, all branches should be interconnected, requiring the integration of wide area network (WAN) access into the LAN design.

The network will include a data center. Furthermore, employees will bring their own mobile devices to work (e.g., laptops, smartphones, tablets). Wireless communication facilities (Wi-Fi access points) will be provided for employees to access necessary information such as work email, required documents, and the Internet.

Requirements

You have been hired as an IT Administrator in the IT department and tasked with analyzing, designing, configuring, and simulating the new network for the Sydney, Melbourne, and Brisbane branches. The requirements for this assignment are divided into two parts: network design and network simulation.

Network Design Tasks

Task 1: Develop a logical design for the Sydney branch network using the Cisco hierarchical model. You need to demonstrate the network design process for each layer, considering the number of employees in each branch, and use private IP addresses only in your design.

Task 2: Design the network's physical architecture based on the logical architecture completed in Task 1. Your design should consider the building structure and the number of levels. You need to address the following:

Designing clients and servers
Designing circuits
Network design tools.

Task 3: Briefly describe how you will minimise interference from Wi-Fi access points (APs) on separate floors.

Simulation

You have been asked to use the Packet Tracer for the network shown in Figure 1 for the simulation task. Simulate and test the your design and configured network using the ping command for both local delivery (devices within the same network) and remote delivery (devices within separate networks).
You can use the lecture notes or VLSM to subnet the networks.

Task Specifications

Prepare a report to provide the details configuration for the network for the TechHub company. In this task, you will complete the required information by designing and configuring the networks in Figure-1. In your design, you have to use private IP address only and considered the number of devices required in each branch. To optimise your grade in this section, address the following points:

List all assumptions and their explanation.
Display each calculation for the number of subnets, IP addresses, valid hosts, gateways, and subnet mask for Tables 1, 2, 3, and 4.

Assessment 2: System vulnerabilities and mitigation

Assessment Details:

A sensor network, often referred to as a wireless sensor network (WSN), consists of spatially distributed and interconnected sensor nodes designed to monitor and record environmental conditions, collect data, and transmit it to a central location for processing and analysis. Sensor networks have a wide range of applications across various fields due to their ability to collect, transmit, and analyse data from the physical environment. However, the security and vulnerability challenges in sensor networks are critical concerns due to the sensitive nature of the data they handle and their deployment in often unsecured environments.

In recent years, there has been a growing focus on the risks associated with using simple sensor devices in services that collect and store sensitive information. To enhance the resilience of sensor networks against cyber-attacks, security considerations should be integrated right from the design stage of new products. In this assessment, you will need to discuss the following:

Identify and discuss three security vulnerabilities specific to sensor networks.
Explain the working mechanism of two types of attacks against sensor networks.
Demonstrate two techniques or security tools that can be used to mitigate/prevent the attacks identified in point (2).
The objective of computer security is to protect the Integrity, Confidentiality, and Availability (CIA) of information on the devices that store, manipulate, and transmit the information. Analyse the attack methods identified in point (2) and the security tools identified in point
(3) against the CIA triad.
Demonstrate the main challenges in protecting sensor networks.

The importance of cryptography has increased over time, making it a key defence in securing data from threat actors. Select one type of cryptographic algorithm that has been developed or proposed to protect sensor networks and explain its working techniques and features.

In your report, support your discussion with references from recent conferences and articles published within the last four years.

In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-3, and ULO-4.

 

Reference no: EM133748175

Questions Cloud

Which is expected to exceed the normal range in this patient : A preschool aged child is attending a comprehensive physical examination appointment. Which is expected to exceed the normal range in this patient?
Which agents are considered hazardous : Which agents are considered hazardous, risks of improper disposal, and how to properly dispose of hazardous medications and materials.
What you would do to enforce ethical decision making : Explain what it is, how important it is, and what you would do as an administrator to enforce ethical decision making within the clinic?
Identify two other determinants impacting population health : Identify at least two other determinants impacting population health in a specific community. Identify three or more determinants impacting population health.
Demonstrate the main challenges in protecting sensor network : System vulnerabilities and mitigation - Demonstrate the main challenges in protecting sensor networks and Explain the working mechanism of two types of attacks
Develop a logical design for the sydney branch network : ICT5250 Computer Networks and Security - comprehend the fundamental concept of network design and acquire the skills necessary to develop both logical
Which criminalizes the desecration of the american flag : which criminalizes the desecration of the American flag. Arizona Revised Statutes, Sec.13-1105, which makes first degree murder a class 1 felony.
What is crucial for effective communication in court : In the context of forensic testimony, what is crucial for effective communication in court?
Why is the milwaukee victim-witness project important : What is meant by the "second insult" to crime victims? Give examples. Why is the Milwaukee Victim/Witness Project important?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd