Design the wireless network

Assignment Help Computer Networking
Reference no: EM131832837 , Length: word count:1500

Assessment Title: Analysis and Design of a Secured Wireless LAN

The purpose of this assignment is to analysis and design of a Secured Wireless LAN covering the following ULOs:

a. Analyse practical alternatives for how to build, protect and manage WPAN, WLAN.

b. Design a secure WLAN and utilise techniques to mitigate possible attacks.

c. Solve complex problems in secure wireless network designs.

d. Contribute and cooperate with teams for implementing a secure wireless network.

Assignment Description: 802.1x based Wireless network for authentication and authorisation at Vancouver State University (VSU), Canada.

The 4000 students and 400 faculty and staff at Vancouver State University (VSU) live and learn in one of the most beautiful places on earth i.e. Vancouver, BC in Canada. What is not always so pretty, especially for the university's small IT team, is the deployment of new campus-wide technology projects. Our IT team constantly assesses the latest technology to help protect the campus network and its 4,400 users. With the goal of continuously improving network security, we sought to add greater authentication and authorization to campus resources through the deployment of 802.1X access control. The challenge was finding the right solutions to best facilitate ease of deployment and limit disruption of service to our users. A key driver for this security upgrade was the fact that VSU's open wireless network could easily be accessed by anyone on or near the campus. Our CTO, John O'conor, challenged the IT team to find a solution that worked with our existing infrastructure and was cost effective.

The idea was to terminate the evil wishes of any potential hackers. In addition to the obvious hazards of having anyone and any machine connect to the network, another big issue was being able to capture important information about the wireless users accessing the campus network. Previously, the team had no way of knowing who was on the network, or how the network was being utilized. For example, it is important to identify users who might be doing something inappropriate using network resources. All VSU, Vancouver students are required to sign an honor code of conduct. If someone violates a conduct policy, such as downloading inappropriate material, the IT team needed a way to identify the student as required by the Honor Code Office. With no way to identify users, reporting violators was next to impossible. To address these issues, the team wanted to first secure the wireless network, with the long term goal being to authenticate users on the wired network as well. They decided the best way to do this was to deploy 802.1X authentication, which is the IEEE Standard for port based Network Access Control. This would provide a more secure authentication mechanism for approved users and devices attempting to connect to the network. Since VSU-Vancouver's network is made up of a mixture of 240 access points from Cisco and Xirrus, a key best practice for the 802.1X capability to function properly was to select a new authentication solution that worked in this multi-vendor environment.

The objective of this assignment is to implement 802.1 x authentication for VSU's wireless network.

Best practices for deploying 802.1X should start with a well thought out plan that includes, but is not limited to, the following considerations:

• Do your wireless and wired networking devices support 802.1X?

• Will you have the ability of using your existing identity stores?

• The AAA/NAC platform should support multi-vendor environments. The solution should include a way to easily configure 802.1X variables in a variety of user devices (Windows, Mac OS, Linux) Creating and testing policies should be easy to use and streamline processes The AAA/NAC platform should support a variety of user and device authentication methods Visibility and troubleshooting tools should be included The AAA/NAC platform should provide guest access management and multiple sponsor roles Find a vendor that shares in your goals.

Requirements -

Design the network as specified in the above scenario from scratch. You have to submit a report .You should address the following tasks in your report:

• Design the wireless network of VSU according to given specification in the given case study (In this design you will plan a design for the network and frame that using software with configuration details. Diagrams can be designed using MS Visio or any other available network design software).

• Detail all the security requirements for wireless network of VSU-Vancouver stated in the case study.

• Expand further on 802.1x authentication mechanism required wireless network of VSU Report, step by step procedure of implementing 802.1x for VSU wireless network.

• Discuss ethical implication on VSU secured Wireless LAN design.

Demonstrate the implementation of 802.1x . The implementation should be appropriate for VSU wireless network. (For demo only you can just use one access point so that a client can connect to the wireless network using 802.x).

Write a report that includes the following sections: executive summary, introduction, plan of your implementation along with figures, your recommendations and conclusions.

Reference no: EM131832837

Questions Cloud

What is the probability that a specified urn : If 10 distinguishable balls are distributed among 4 urns in such a way that all arrangements are equally likely, what is the probability that (i) a specified.
What is the current size of s : Suppose an initially empty stack S has performed a total of 25 push operations, 12 top operations and 10 pop operations. What is the current size of S?
Why do employment protection laws have negative effects : In France, why do employment protection laws tend to have negative effects on the young, already unemployed, and minority workers?
How many machines would it take to test out : What about all 10-atom molecules: How many years would it take for one machine to test all of these compounds at one per minute?
Design the wireless network : Analysis and Design of a Secured Wireless LAN - Design the wireless network of VSU according to given specification in the given case study
What is the probability that both will be fresh : What is the conditional probability that both will be fresh, given that at least 1 of them is fresh?
Write a recursive algorithm whose parameters are integers : Write a recursive T(n lg n) algorithm whose parameters are three integers x, n, and p, and which computes the remainder when x n is divided by p.
When the given events happen : When the following events happen, does the unemployment rate rise, fall, or stay the same?
What is the probability that a student who is a cigarette : What is the probability that a student who is a cigarette smoker is a man? A woman?

Reviews

len1832837

1/25/2018 6:32:50 AM

Australian student, 1500 words, rest as per the guidelines. Reference Style: IEEE. The objective of this assignment is to implement 802.1 x authentication for VSU’s wireless network. Design the network as specified in the above scenario from scratch. Write a report that includes the following sections: executive summary, introduction, plan of your implementation along with figures, your recommendations and conclusions. Evaluate your proposed solution and write justification of your evaluation along with ethical implication. Follow IEEE reference style.

Write a Review

Computer Networking Questions & Answers

  Discussion about networking a small business

Assume you have been employed as a consultant to suggest a retailing corporation about ways in which it can use networking technology to enhance its business.

  How do you recommend upgrading this network

How do you recommend upgrading this network and what interconnecting devices will you use, and what benefit will you get from using these devices?

  System analyst and design-business process-functional model

Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships wit..

  Discuss common input or output technologies

Discuss common input or output technologies

  Explain at least one major advantage of private networks

Explain at least one major advantage of private networks and the impact it creates for a communication technology organization.

  Read the case study and develop your it support strategy

ISCG6412IT Help Desk Design a job description for the Help desk operators and develop a code of ethics that they will need to abide by.

  Design and explain a protocol

Design and explain a protocol (with diagrammatical illustration) to allow the mobile user to purchase a drink based on his/her fingerprint related data already downloaded from the server of the user's service provider to his/her mobile phone

  Recognizing the malicious activity

What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities.

  What purpose does a firewall play in an organization

What are some things we need to evaluate when protecting our network? What purpose does a firewall play in an organization

  Ipsec gives security at network layer

If IPSec gives security at network layer, why is it that security mechanisms are still require at layers above IP?

  Describe and explain denial of service

Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks

  Develop an implementation plan for cloud deployment

Develop an implementation plan for cloud deployment of the passenger reservation system. You must address the following specific deliverables for the cloud-based passenger reservation system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd