Use of a WLAN Tools in an enterprise setting

Assignment Help Computer Networking
Reference no: EM132927441 , Length: 1500 Words

BN303 Wireless Network & Security - Melbourne Institute of Technology

Assessment - Use of a WLAN Tools in an enterprise setting

LO 1: Provide in-depth descriptions of wireless architecture and security vulnerabilities.
LO 2: Conduct research and gain knowledge about different sniffing tools
LO 3: Solve complex problems in secure wireless network designs.
LO 4: Help enterprises to maintain and implement a secure wireless network.

Assignment Description

This assignment include two tasks:

Task one: (research)

Students are required to choose four WLAN sniffing tools and write a maximum of 200 words about each tool to highlight:
- How tools work
o Level of complexity
- Included features
- Differences from other tools
- Advantages and disadvantages
- screen shots (one for each tool)
o install demo versions then take screen shots - online screen shots will not be considered

Task two:

Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public place, home network etc. of your choice).
2. Gather technical information about wireless network at three different locations with minimum of 5 APs for each location.
3. Test the WLAN sniffing tool and report your observation and recommend how to
secure and/or manage WLAN. Your report should include:
a. Screenshots (as an evidence) and detail explanation to report working mechanism (the step by step process) of the identified technique.
b. Explain the use (evaluation) of the technique to secure and/or manage WLAN.
o Discuss dual bands and its advantages
o Security implications

4. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs.

Attachment:- Wireless Network.rar

Reference no: EM132927441

Questions Cloud

How do deal with the accusations : Which were part of the battle they were involved in," Hitz said. The question for the CIA officer in the field was, how do you deal with those accusations?
How much is this investment worth at the end of year four : You are able reinvest these cash flows at 3.62 percent, compounded annually. How much is this investment worth at the end of year four
What follows is a closer look at the hitz report : What follows is a closer look at the Hitz report, drawing on interviews with Frederick Hitz and others interviewed for FRONTLINE's "Drug Wars" series.
Job description at red lobster : Red Lobster operates over 670 casual-dining seafood restaurants in the US and Canada, employing more than 63,000 people. When Red Lobster developed a new busine
Use of a WLAN Tools in an enterprise setting : Provide in-depth descriptions of wireless architecture and security vulnerabilities and Use of a WLAN Tools in an enterprise setting
Design a survey for setting pay for welders : How would you design a survey for setting pay for welders? How would you design a survey for setting pay for financial managers? Do the issues differ?
How criminological theory might be used : How criminological theory might be used to analyze the criminal event or type of crime you selected. Identify the criminological theory and the criminal event
Measure the satisfaction level of participants : A group of employees attended a training program. After the program, the HR Manager wanted to measure the satisfaction of participants on the training program.
What role does the victim play in the sentencing process : What role, if any, does the victim play in the sentencing process? Analyze whether the impact of the crime on the victim should be a consideration

Reviews

Write a Review

Computer Networking Questions & Answers

  How duplex link are actually implemented in the netml system

This is how duplex links are actually implemented in the NetML system, so, just make sure the links are duplex in Netml.

  Differences between versions of windows server

Develop a report on the differences between the various versions of Windows 2003 Server - Web Edition, Standard Edition, Enterprise Edition, Datacenter Edition

  Discuss at least one application supported by blockchain

MN504 Networked Application Management - develop skills of analysing critically, and problem solving in regard to Networked Application Management

  Define throughput in regards to wireless network

Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

  What are all the protocol steps that take place

What are all the protocol steps that take place, starting from powering on your PC to getting the web page? Assume there is nothing in our DNS or browser caches when you power on your PC

  What types of servers to support the business

What type, topology and cabling of the enterprise LAN and what types of server(s) to support the business?

  List all the five nonproprietary internet applications and

q1. list five nonproprietary internet applications and the application-layer protocols that they use.q2. what

  Provide the main steps that you would use to troubleshoot

Provide the main steps that you would use to troubleshoot each of these issues and determine the tools that you would require to complete your troubleshooting. Provide a rationale to support your response.

  Build the network and verify connectivity

Network device, such as a Cisco router, assigns a public address to host devices inside a private network. The main reason to use NATisto reduce the number

  Develop a proposed computer system

ICT703 - Network Technology and Management - University of the Sunshine Coast - develop a proposed computer system for each of the specific uses,

  Research the available cloud computing services

Research the available cloud computing services offering infrastructure services. How each company provides security services.

  Develope a comprehensive network improvement plan document

For the assignments in this course, you will be developing a comprehensive Network Improvement Plan document. Your first task in this process will be to select an organization to use as the basis of your plan.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd