What is home wireless network and security

Assignment Help Computer Engineering
Reference no: EM132228

Question

Home wireless network and security

Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home. Optionally, you can use sniffer like wire shark or your choice to analyze communication traffic- you are required to back up your findings with supporting evidence.

Guidelines-

1. If the last two digit number of your student ID is less than 9, then suppose the number of devices have to to be connected would be the SUM of your last two digits of your student ID PLUS 80; or if your two digit number is larger than nine, ADD 30 to your last 2 digit number would be total number of devices need to be connected; plan your home wireless network with security in mind and explain your rational behind your design;

2. Outline process you approach network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;

3. What is your router or AccessPoint manufacture's default settings like subnet, gateway address, and default admin account password? How are you going to modify them?

4. Per Internet Protocol stack, layer by layer, elaborate security measures you will like to implement to protect your wireless network and why, as in, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to determine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;

5. Roles of DHCP, NAT, DNS, or previous protocols; including any protocol control based firewall; evaluation of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction.

Reference no: EM132228

Questions Cloud

How to write basic structure of an exception handler : How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item
Determine sarahs deductible transportation expense : Determine Sarah's deductible transportation expense, using the actual expense method.
What will be formula of digital certificate of the server : Point out what will be the formula of digital certificate of the server N. we denote the public and private keys of server N as K+ ,N KN, and public or private keys of CA are denoted as K+ CA KCA.
Evaluate the value of one share of gis stock : Evaluate the value of one share of GIS stock using Dividends Valuation Approach.
What is home wireless network and security : What is home wireless network and security Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home.
Evaluate incorporation plan : Except the stock sale is an integral part of the incorporation plan
How to write a class named dayofyear that gets an integer : How to write a class named DayOfYear that gets an integer Day 2 would be January 2 Day 32 would be February 1 Day 365 would be December 31
How many cars in every team called chevy and ford : How many cars in every team called Chevy and Ford There are eight cars in every team called Chevy and Ford. One car from each team races its opponent on drag strip.
How to illustrate a memory map for a system : Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to illustrate a memory map for a system

Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

  Prepare a use case diagram

Prepare a Use Case Diagram based on the given problem description.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  How to write a class named dayofyear that gets an integer

How to write a class named DayOfYear that gets an integer Day 2 would be January 2 Day 32 would be February 1 Day 365 would be December 31

  Library management system

Prepare a module which can exhibit the Library Management System

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Bourne shell and design suitable functions

Bourne shell and design suitable functions

  Explain the reason for the project development

Two members of your project development team are differing about relative significance of training and documentation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd