Implementation of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132118616 , Length: word count:2200

Design and implementation of secure enterprise wireless network

Purpose of the assessment  (with ULO Mapping)

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications.

The assignment covers the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications.

The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing BosonNetsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

Reference no: EM132118616

Questions Cloud

Is it integrated with the company business strategy : What is the current human resources strategy for your company? Is it integrated with the company’s business strategy?
Draw a neat and well-labeled graph : John has income of $200 each month to spend on day passes to the gym (x) and food (y). Assume both of these goods are continuously divisible.
Write an algorithm for pseudo random number generator : Question - Write an algorithm for pseudo random number generator
Describe in which circumstances in your professional life : Describe in which circumstances in your professional life where you utilized your potential:
Implementation of secure enterprise wireless network : Explore the ethical implications in the design and implementation of a secure enterprise wireless network - Design a secure enterprise wireless network
Performance appraisal and competency systems add value : How formal performance appraisal and competency systems add value (or otherwise) to the process of identfying learning needs?
Develop nausea and vomiting holiday parties : Suppose at random 35% of school children develop nausea and vomiting following holiday parties and that you conduct a study to examine this phenomenon
Why health care professionals should have a firm : She wants you to prepare a 3-4-page Code of Ethics document that will also include a one page personal and professional code of conduct.
Potential employee as well as to current employees : Describe three trends in human resource management. discuss its implication to a prospective, potential employee as well as to current employees

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Case studysource wwwsunnych author silvia hagen company

case studysource www.sunny.ch author silvia hagen company sunny connection ag staubergasse 9 8124 maur switzerland

  Spanning tree protocol

Its primary purpose is to determine the configuration of devices and to allow different network-layer protocols to learn about each other. Using deductive reasoning, provide three (3) examples that demonstrate the value of CDP when troubleshooting..

  Explain why tcp implements a three-way handshake

In addition, explain why TCP implements a 3-way handshake for connection establishment. Is 2-way insufficient? Does 4-way add more reliability? Make sure to use your own graphic illustration to support your input

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Explain the hardware you will purchase or build

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection.

  Develop a proposal for the management team

As one of your first tasks, you have been asked to develop a proposal for the management team. These members have varying backgrounds and sometimes limited knowledge of IT services.

  Difference between tcp and udp

List the primary differences between the TCP and UDP. Would you recommend UDP or TCP for the voice over IP phone call? Justify your choice.

  What benefits are derived from the using a common network

What benefits are derived from the using a common network for all onboard systems. Comment on the security concern. Why was an FAA Special Condition issued? How was the concern addressed.

  What is the link utilization if an saw protocol

a) What is the link utilization if an SAW protocol is used and you assume no bit errors (i.e., lost packets or lost ACKs never occur)?

  Explain what happens at each layer of the osi model

Explain the layers of the OSI Model and how data flows through the model. Explain what happens at each layer of the OSI Model.

  Implement a crude version of remote procedure call

You are required to implement a crude version of Remote Procedure Call. Normally this would require some degree of compiler support. However, we will simplify the interface so that the basic RPC is there, and it is only a matter of syntactic sugar..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd