What is home wireless network and security

Assignment Help Computer Engineering
Reference no: EM132228

Question

Home wireless network and security

Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home. Optionally, you can use sniffer like wire shark or your choice to analyze communication traffic- you are required to back up your findings with supporting evidence.

Guidelines-

1. If the last two digit number of your student ID is less than 9, then suppose the number of devices have to to be connected would be the SUM of your last two digits of your student ID PLUS 80; or if your two digit number is larger than nine, ADD 30 to your last 2 digit number would be total number of devices need to be connected; plan your home wireless network with security in mind and explain your rational behind your design;

2. Outline process you approach network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;

3. What is your router or AccessPoint manufacture's default settings like subnet, gateway address, and default admin account password? How are you going to modify them?

4. Per Internet Protocol stack, layer by layer, elaborate security measures you will like to implement to protect your wireless network and why, as in, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to determine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;

5. Roles of DHCP, NAT, DNS, or previous protocols; including any protocol control based firewall; evaluation of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction.

Reference no: EM132228

Questions Cloud

How to write basic structure of an exception handler : How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item
Determine sarahs deductible transportation expense : Determine Sarah's deductible transportation expense, using the actual expense method.
What will be formula of digital certificate of the server : Point out what will be the formula of digital certificate of the server N. we denote the public and private keys of server N as K+ ,N KN, and public or private keys of CA are denoted as K+ CA KCA.
Evaluate the value of one share of gis stock : Evaluate the value of one share of GIS stock using Dividends Valuation Approach.
What is home wireless network and security : What is home wireless network and security Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home.
Evaluate incorporation plan : Except the stock sale is an integral part of the incorporation plan
How to write a class named dayofyear that gets an integer : How to write a class named DayOfYear that gets an integer Day 2 would be January 2 Day 32 would be February 1 Day 365 would be December 31
How many cars in every team called chevy and ford : How many cars in every team called Chevy and Ford There are eight cars in every team called Chevy and Ford. One car from each team races its opponent on drag strip.
How to illustrate a memory map for a system : Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd