Design of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132136968

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network

Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

  • Apply and evaluate wireless network security techniques in consideration of ethical implications;
  • Design and implement secure enterprise wireless networks.

Assignment Description -

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing Boson Netsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Section to be included in the report -

Introduction - Outline of the report ( in 3-4 sentences)

Report Layout - Report layout, style and language

Explore ethical implications - Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network

Design secure enterprise wireless network - Design a secure enterprise wireless network, employing Boson Netsim.

Analyse secure enterprise wireless network - Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

Implement secure enterprise wireless network - Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

Testing - Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Demonstration - Demonstration in Week 11 during the Lab.

Conclusion - Write summary of the report.

Reference style - Follow IEEE reference style.

Verified Expert

The solution file is prepared in ms word which discussed about the ethical implication to design and implement of wireless LAN network, design secure wireless network in network tool, secure wireless network using WAP2 and RADIUS network can analysis using WPA2 and RADIUS server in term of Integrity, Availability, Confidentiality, Authentication and Authorization, implement secure enterprise wireless network using WPA2 and RADIUS server and finally test the simulate wireless LAN network to check authentication, de-association , association and ping each terminal on the wireless LAN network. The solution has 2600 words around and references are included as per APA format.

Reference no: EM132136968

Questions Cloud

What is the percent of lumber : What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier
What are the main things to remember about elasticity : What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
Find the market demand curve for pears : a. Find the market demand curve for pears if these three guys are the only individuals in the market.
What is the firm supply curve : What is the firm's supply curve? What is market supply? What is equilibrium price? Equilibrium quantity? How much will each firm produce?
Design of secure enterprise wireless network : MN603 Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network, Melbourne Institute of Technology Australia
If all countries eliminated all barriers to immigration : If all countries eliminated all barriers to immigration, would global economic growth increase? Why or why not?
What would be your recommendation : What price should he charge per ticket? (Note: Use the arc elasticity formula.) Is this a good strategy? What would be your recommendation?
How many comittees are possible : The States of California, Arizona, New Mexico, Utah, and Nevada each send a team of 6 delegates to the Sounth Western States annual conference.
Shifting the demand curve to the righta : Describe five changes in the vaiables that will cause demand for a product to increase, shifting the demand curve to the right?

Reviews

urv2136968

10/29/2018 9:14:32 PM

Thank you very much for taking the time out to assist me with completing this assignment within a timely manner. I will apply to this service again in the future. I am really impressed with the hard work. good points good elaboration. Thanks

len2136968

10/10/2018 4:22:19 AM

Word limit 2000 – 2500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2136968

10/10/2018 4:22:13 AM

Introduction - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Report Layout - Exceptional report layout, style and language used. Explore ethical implications - Finding is clearly linked and well justified. Design secure enterprise wireless network - Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements. Analyse secure enterprise wireless network - Excellent analysis included WPA2 and RADIUS and covered all aspects.

len2136968

10/10/2018 4:22:07 AM

Implement secure enterprise wireless network - All elements are present and very well integrated. Testing - Testing was successful between client and AP. All required snapshots attached. Demonstration - Logic is clear and easy to follow with strong arguments. Conclusion - Logic is clear and easy to follow with strong arguments. Reference style - Clear styles with excellent source of references.

Write a Review

Computer Networking Questions & Answers

  Ip address allocation plan for key network device

CSC00240 – Data communication and Networks - IP address allocation plan for each network/sub-network including network address, subnet mask, broadcast address

  What command enables a dhcp relay on a cisco router

What are the port numbers for the DHCP protocol? List 11 top level domains.

  Define the term ftp

If an evolutionary algorithm is a general-purpose search and optimization technique, it can be applied to determine suitable network architectures and weight.

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  Different professional networking opportunities

Identify and provide a rationale for the opportunities you plan on pursuing for this course. Describe how you will approach the opportunity.

  1what are your objectives with the penetration of the

1.what are your objectives with the penetration of the market?2.assess the strengthsweaknesses and opportunitiesthreats

  Compute the throughput for file transfer

Host A wishes to send the large file to Host B. Path from Host A to Host B has three links, of rates R1=10 Mbps, R2=500 kbps, and R3=750 Kbps. (1Kbit=210bit) Suppose no other traffic in network, determine the throughput for file transfer?

  Determine the hop count for router-two to subnet b

A distance vector protocol typically uses what as the metric?

  Create diagram for proposed network topology

Use Microsoft Visio 2007 to create diagram for proposed network topology. Write down the proposal for research group explaining why that design would best meet their requirements.

  Provide the network diagrams

list the assumptions made. - Note: The assumptions are not the requirements that are provided in the task. They are the additional requirements that you need for your design.

  Discuss about the client server and distributed computing

Explain why you chose the advantage and challenge that you did, and provide one (1) real-world example of each environment.

  Define the ethernet interface

Using the netstat Program Time Required: 10 minutes Objective: Use the netstat program to view network interface and IP protocol status and statistics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd