Design the wireless network

Assignment Help Computer Networking
Reference no: EM131832837 , Length: word count:1500

Assessment Title: Analysis and Design of a Secured Wireless LAN

The purpose of this assignment is to analysis and design of a Secured Wireless LAN covering the following ULOs:

a. Analyse practical alternatives for how to build, protect and manage WPAN, WLAN.

b. Design a secure WLAN and utilise techniques to mitigate possible attacks.

c. Solve complex problems in secure wireless network designs.

d. Contribute and cooperate with teams for implementing a secure wireless network.

Assignment Description: 802.1x based Wireless network for authentication and authorisation at Vancouver State University (VSU), Canada.

The 4000 students and 400 faculty and staff at Vancouver State University (VSU) live and learn in one of the most beautiful places on earth i.e. Vancouver, BC in Canada. What is not always so pretty, especially for the university's small IT team, is the deployment of new campus-wide technology projects. Our IT team constantly assesses the latest technology to help protect the campus network and its 4,400 users. With the goal of continuously improving network security, we sought to add greater authentication and authorization to campus resources through the deployment of 802.1X access control. The challenge was finding the right solutions to best facilitate ease of deployment and limit disruption of service to our users. A key driver for this security upgrade was the fact that VSU's open wireless network could easily be accessed by anyone on or near the campus. Our CTO, John O'conor, challenged the IT team to find a solution that worked with our existing infrastructure and was cost effective.

The idea was to terminate the evil wishes of any potential hackers. In addition to the obvious hazards of having anyone and any machine connect to the network, another big issue was being able to capture important information about the wireless users accessing the campus network. Previously, the team had no way of knowing who was on the network, or how the network was being utilized. For example, it is important to identify users who might be doing something inappropriate using network resources. All VSU, Vancouver students are required to sign an honor code of conduct. If someone violates a conduct policy, such as downloading inappropriate material, the IT team needed a way to identify the student as required by the Honor Code Office. With no way to identify users, reporting violators was next to impossible. To address these issues, the team wanted to first secure the wireless network, with the long term goal being to authenticate users on the wired network as well. They decided the best way to do this was to deploy 802.1X authentication, which is the IEEE Standard for port based Network Access Control. This would provide a more secure authentication mechanism for approved users and devices attempting to connect to the network. Since VSU-Vancouver's network is made up of a mixture of 240 access points from Cisco and Xirrus, a key best practice for the 802.1X capability to function properly was to select a new authentication solution that worked in this multi-vendor environment.

The objective of this assignment is to implement 802.1 x authentication for VSU's wireless network.

Best practices for deploying 802.1X should start with a well thought out plan that includes, but is not limited to, the following considerations:

• Do your wireless and wired networking devices support 802.1X?

• Will you have the ability of using your existing identity stores?

• The AAA/NAC platform should support multi-vendor environments. The solution should include a way to easily configure 802.1X variables in a variety of user devices (Windows, Mac OS, Linux) Creating and testing policies should be easy to use and streamline processes The AAA/NAC platform should support a variety of user and device authentication methods Visibility and troubleshooting tools should be included The AAA/NAC platform should provide guest access management and multiple sponsor roles Find a vendor that shares in your goals.

Requirements -

Design the network as specified in the above scenario from scratch. You have to submit a report .You should address the following tasks in your report:

• Design the wireless network of VSU according to given specification in the given case study (In this design you will plan a design for the network and frame that using software with configuration details. Diagrams can be designed using MS Visio or any other available network design software).

• Detail all the security requirements for wireless network of VSU-Vancouver stated in the case study.

• Expand further on 802.1x authentication mechanism required wireless network of VSU Report, step by step procedure of implementing 802.1x for VSU wireless network.

• Discuss ethical implication on VSU secured Wireless LAN design.

Demonstrate the implementation of 802.1x . The implementation should be appropriate for VSU wireless network. (For demo only you can just use one access point so that a client can connect to the wireless network using 802.x).

Write a report that includes the following sections: executive summary, introduction, plan of your implementation along with figures, your recommendations and conclusions.

Reference no: EM131832837

Questions Cloud

What is the probability that a specified urn : If 10 distinguishable balls are distributed among 4 urns in such a way that all arrangements are equally likely, what is the probability that (i) a specified.
What is the current size of s : Suppose an initially empty stack S has performed a total of 25 push operations, 12 top operations and 10 pop operations. What is the current size of S?
Why do employment protection laws have negative effects : In France, why do employment protection laws tend to have negative effects on the young, already unemployed, and minority workers?
How many machines would it take to test out : What about all 10-atom molecules: How many years would it take for one machine to test all of these compounds at one per minute?
Design the wireless network : Analysis and Design of a Secured Wireless LAN - Design the wireless network of VSU according to given specification in the given case study
What is the probability that both will be fresh : What is the conditional probability that both will be fresh, given that at least 1 of them is fresh?
Write a recursive algorithm whose parameters are integers : Write a recursive T(n lg n) algorithm whose parameters are three integers x, n, and p, and which computes the remainder when x n is divided by p.
When the given events happen : When the following events happen, does the unemployment rate rise, fall, or stay the same?
What is the probability that a student who is a cigarette : What is the probability that a student who is a cigarette smoker is a man? A woman?

Reviews

len1832837

1/25/2018 6:32:50 AM

Australian student, 1500 words, rest as per the guidelines. Reference Style: IEEE. The objective of this assignment is to implement 802.1 x authentication for VSU’s wireless network. Design the network as specified in the above scenario from scratch. Write a report that includes the following sections: executive summary, introduction, plan of your implementation along with figures, your recommendations and conclusions. Evaluate your proposed solution and write justification of your evaluation along with ethical implication. Follow IEEE reference style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd