Questionhome wireless network and securitymethodology-

Assignment Help Computer Engineering
Reference no: EM13348284

Question

Home wireless network and security

Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home. Optionally, you can use sniffer like wire shark or your choice to analyze communication traffic- you are required to back up your findings with supporting evidence.

Guidelines-

1. If the last two digit number of your student ID is less than 9, then suppose the number of devices have to to be connected would be the SUM of your last two digits of your student ID PLUS 80; or if your two digit number is larger than nine, ADD 30 to your last 2 digit number would be total number of devices need to be connected; plan your home wireless network with security in mind and explain your rational behind your design;

2. Outline process you approach network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;

3. What is your router or AccessPoint manufacture's default settings like subnet, gateway address, and default admin account password? How are you going to modify them?

4. Per Internet Protocol stack, layer by layer, elaborate security measures you will like to implement to protect your wireless network and why, as in, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to determine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;

5. Roles of DHCP, NAT, DNS, or previous protocols; including any protocol control based firewall; evaluation of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction.

Reference no: EM13348284

Questions Cloud

Question1 write code for following-a compare s2 to s1b : question1. write code for following-a. compare s2 to s1b. select the fifth in s2c. converts s1 to a new string
Question 1richard traveled from new orleans to new york for : question 1richard traveled from new orleans to new york for both vacation and business. he spent 4 days conducting
Questionassume a client host m wants to obtain secure : questionassume a client host m wants to obtain secure connections with a web server n. they use the certificate
Questiongeneral mills nyse gis is a large distributor and : questiongeneral mills nyse gis is a large distributor and manufacturer of package consumer food products. benoit
Questionhome wireless network and securitymethodology- : questionhome wireless network and securitymethodology- review topics covered in lecture hours from textbook reference
Question in each of the given scenarios evaluate in regards : question in each of the given scenarios evaluate in regards to the exchange with xaas amount realized bas loss or gain
Questionday of the yearassume that a year has 365 days : questionday of the yearassume that a year has 365 days write a class named dayofyear that gets an integer representing
Questionthere are eight cars in every team called chevy and : questionthere are eight cars in every team called chevy and ford. one car from each team races its opponent on drag
Questionillustrate a memory map for a system with a memory : questionillustrate a memory map for a system with a memory capability of 512mb. each memory location in system is 8

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd