Design the wireless network of vsu

Assignment Help Computer Network Security
Reference no: EM131497420 , Length: 2500 words

Analysis and Design of a Secured Wireless LAN

Design a secure WLAN and utilise techniques to mitigate possible attacks.

Install, configure, and maintain secure WLAN Controllers (WLCs) and Bluetooth devices for an organization.

Solve complex problems in secure wireless network designs.

Provide descriptions of wireless router configuration and implementation

Assignment Description:

802.1x based Wireless network for authentication and authorisation at Vancouver State University (VSU), Canada.

The 4000 students and 400 faculty and staff at Vancouver State University (VSU) live and learn in one of the most beautiful places on earth i.e.Vancouver, BC in Canada. What is not always so pretty, especially for the university's small IT team, is the deployment of new campus-wide technology projects.

Our IT team constantly assesses the latest technology to help protect the campus network and its 4,400 users. With the goal of continuously improving network security, we sought to add greater authentication and authorization to campus resources through the deployment of 802.1X access control. The challenge was finding the right solutions to best facilitate ease of deployment and limit disruption of service to our users.

A key driver for this security upgrade was the fact that VSU's open wireless network could easily be accessed by anyone on or near the campus. Our CTO, John O'conor, challenged the IT team to find a solution that worked with our existing infrastructure and was cost effective.

The idea was to terminate the evil wishes of any potential hackers.

In addition to the obvious hazards of having anyone and any machine connect to the network, another big issue was being able to capture important information about the wireless users accessing the campus network. Previously, the team had no way of knowing who was on the network, or how the network was being utilized. For example, it is important to identify users who might be doing something inappropriate using network resources. All VSU, Vancouver students are required to sign an honor code of conduct. If someone violates a conduct policy, such as downloading inappropriate material, the IT team needed a way to identify the student as required by the Honor Code Office. With no way to identify users, reporting violators was next to impossible.

To address these issues, the team wanted to first secure the wireless network, with the longterm goal being to authenticate users on the wired network as well. They decided the best way to do this was to deploy 802.1X authentication, which is the IEEE Standard for portbased Network Access Control. This would provide a more secure authentication mechanism for approved users and devices attempting to connect to the network.

Since VSU-Vancouver's network is made up of a mixture of 240 access points from Cisco and Xirrus, a key best practice for the 802.1X capability to function properly was to select a new authentication solution that worked in this multi-vendor environment.

The objective of this assignment is to implement 802.1 x authentication for VSU's wireless network.

Best practices for deploying 802.1X should start with a well thought out plan that includes, but is not limited to, the following considerations:
- Do your wireless and wired networking devices support 802.1X?
- Will you have the ability to use your existing identity stores?
- The AAA/NAC platform should support multi-vendor environments The solution should include a way to easily configure 802.1X variables in a variety of user devices (Windows, Mac OS, Linux) Creating and testing policies should be easy to use and streamline processes The AAA/NAC platform should support a variety of user and device authentication methods Visibility and troubleshooting tools should be included The AAA/NAC platform should provide guest access management and multiple sponsor roles Find a vendor that shares in your goals

Requirements

Design the network as specified in the above scenario from scratch. You have to submit a group report and specify each individual group member's contribution on the front page. You should address the following tasks in your report:

For this assignment, you need to complete the following tasks:

- Design the wireless network of VSU according to given specification in the given case study (In this design you will plan a design for the network and frame that using software with configuration details. Diagrams can be designed using MS Visio or any other available network design software).
- Detail all the security requirements for wireless network of VSU-Vancouver stated in the case study.
- Expand further on 802.1x authentication mechanism required wireless network of VSU Report, step by step procedure of implementing 802.1x for VSU wireless network.

All group members:

Use the prepared report and implement 802.1x for demonstration. The implementation should be appropriate for VSU wireless network. (For demo only you can just use one access point so that a client can connect to the wireless network using 802.x).

Write a report that includes the following sections: executive summary, introduction, work of Group members 1 and 2, plan of your implementation along with figure, your recommendations and conclusions.

Verified Expert

The solution file is prepared in ms word which discussed on case study of VSU to implement the IEEE 802.1x to authenticate the network. and also explained about the authentication , requirements and role of 802.1x and solution provide the network diagram for VSU and recommendation and conclusion. The references are included as per APA format. The word count of the solution is 2666 words.

Reference no: EM131497420

Questions Cloud

What strategy have you selected : Describe in pseudo-code a two potential parallel implementations for this algorithm: What strategy have you selected? What other options you could use?
List the marketing mix variables : Define and give an example of, goodwill and intangibles.
How do analytic techniques used in business apply to sports : How do analytic techniques used in business apply to sports? Where are there gaps? What are interesting research problems in sports analytics?
Explain benefits of before-and-after product positioning map : What transaction links a projected income statement with a projected balance sheet?
Design the wireless network of vsu : BN303 - Wireless Network Security - Design the wireless network of VSU according to given specification in the given case study
Explain the manner in which the chosen phase would change : Select one phase of the Database Life Cycle, and Explain the manner in which the chosen phase would change based on the size of the organization.
What are convertible bonds : With regard to financial ratios, what is an indirect benefit of increasing Treasury Stock during the last fiscal quarter of a year?
Identify changes that should be made to the backup procedure : Identify the changes that should be made to the backup procedures in order to address the problem with the server backups.
How their products and services are positioned : Purpose: Organizations continually monitor how their products and services are positioned relative to competitors. This information is especially useful.

Reviews

inf1497420

6/20/2017 5:59:46 AM

This is an extraordinary writer and beyond professional, he completed my paper before the due date and amid the procedure inside brief time was noting the majority of my inquiries and concerns.

len1497420

5/16/2017 3:37:37 AM

Grade Mark HD 40-50 Excellent Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Identification /10 Demonstrated excellent ability to think critically and sourced reference material appropriately Analyse /10 Logic is clear and easy to follow with strong arguments Design /10 All elements are present and very well integrated. Evaluate/justification /5 Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made

len1497420

5/16/2017 3:37:08 AM

Please do consider referencing format and plagiarism specially mentioned by lecturer. Please go through marking criteria that is in the end part of the attached file and make it according to that. Thanks. The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 5 Identification Identify 2 important issues 10 Analyse Analyse above identified issues 10 Design Write design part of the proposed solution 10 Evaluate/justification Evaluate your proposed solutions and write justification of your evaluation 5 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 50

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd