Design of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132124127

Design and implementation of secure enterprise wireless network

Purpose of the assessment  (with ULO Mapping)

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications.

The assignment covers the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications.

The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing BosonNetsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

Verified Expert

The given work is above writing report on the secure wireless network. for that wireless network setup was configured in boson netsim. also all the security protocol, and security parameter was discussed in the report for setting up secured wireless network.

Reference no: EM132124127

Questions Cloud

Implementation and associated testing for outlined system : Based on the specified use case, you are required to provide an implementation and associated testing for the outlined system
How the poem connects to the characteristics of the period : In a PowerPoint, your oral presentation should include biographical information about the author, a summary of the major points, a reading of the poem.
Consider how facebook may be used by organization : Social networking sites are fast becoming corporate resources. Consider how Facebook may be used by an organization.
Discuss what organizing tactics were utilized : Pick one of the stories (Backyard, Kodak, IAF, etc.) that Alinsky discusses in the reading and/or film. Discuss what organizing tactics were utilized.
Design of secure enterprise wireless network : Apply and evaluate wireless network security techniques in consideration of ethical implications - Design and implement secure enterprise wireless networks
What were the high-level tasks or scope of the project : What were the mission and objectives of the project? What were the high-level tasks or scope of the project?
What are the business information system requirements : What it would accomplish for the business organization. Who are the stakeholders in the proposed business information system.
Discuss about food in all the others countries : You are taking a trip around the world! Choose 3 to 5 countries from around the world. (At least one from each other major continent.
Determine the proportion of american : A market researcher wishes to determine the proportion of American women who shop online. The results must be accurate at the 90% level of confidence

Reviews

urv2124127

10/27/2018 4:46:39 AM

I have received the assessment even before the given deadline. I hope that the solution is perfect as it seems after first look. I must say that there is no issues of price when you ask expertsmind. Just submit your task with all the relevant information and forget about the quality what else a student require more. Service is always great as usual. thanks

urv2124127

10/27/2018 4:45:44 AM

Testing Testing was successful between client and AP. All required snapshots attached Testing was successful between client and AP. Some snapshots attached Testing was successful between client and AP. Few required snapshots attached Testing was partially successful between client and AP. All required snapshots attached Testing was not successful. Demonstration Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Demonstration is confused and disjointed Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

urv2124127

10/27/2018 4:44:43 AM

Design secure enterprise wireless network Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements Demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s Demonstrate d good ability to think critically and present a good design considering all the requirements. Demonstrated ability to think critically and present a design Did not demonstrate ability to think critically and present a design. Analyse secure enterprise wireless network Excellent analysis included WPA2 and RADIUS and covered all aspects. Good analysis included WPA2 and RADIUS and covered some aspects. Good analysis included WPA2 and RADIUS Some analysis provided and included WPA2 and RADIUS Lacking analysis of WPA2 and RADIUS. Implement secure enterprise wireless network All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.

urv2124127

10/27/2018 4:42:08 AM

Demonstration Demonstration in Week 11 during the Lab. Conclusion Write summary of the report Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout Exceptional report layout, style and language used Very good report layout, style and Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used.Explore ethical implications Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

urv2124127

10/27/2018 4:40:00 AM

Design secure enterprise wireless network Design a secure enterprise wireless network, employing Boson Netsim. Analyse secure enterprise wireless network Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization Implement secure enterprise wireless network Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. Testing Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de- association, and pinging each other’s terminals on the same network

urv2124127

10/27/2018 4:39:07 AM

Submission Guidelines The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking criteria:Introduction: Outline of the report ( in 3-4 sentences) Report Layout: Report layout, style and language Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network

len2124127

9/27/2018 2:23:31 AM

draw network in netsim and ping the network and all content mention in word document .please make sure you cover every section and all question. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de- association, and pinging each other’s terminals on the same network

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd