Design of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132136968

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network

Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

  • Apply and evaluate wireless network security techniques in consideration of ethical implications;
  • Design and implement secure enterprise wireless networks.

Assignment Description -

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing Boson Netsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Section to be included in the report -

Introduction - Outline of the report ( in 3-4 sentences)

Report Layout - Report layout, style and language

Explore ethical implications - Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network

Design secure enterprise wireless network - Design a secure enterprise wireless network, employing Boson Netsim.

Analyse secure enterprise wireless network - Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

Implement secure enterprise wireless network - Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

Testing - Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Demonstration - Demonstration in Week 11 during the Lab.

Conclusion - Write summary of the report.

Reference style - Follow IEEE reference style.

Verified Expert

The solution file is prepared in ms word which discussed about the ethical implication to design and implement of wireless LAN network, design secure wireless network in network tool, secure wireless network using WAP2 and RADIUS network can analysis using WPA2 and RADIUS server in term of Integrity, Availability, Confidentiality, Authentication and Authorization, implement secure enterprise wireless network using WPA2 and RADIUS server and finally test the simulate wireless LAN network to check authentication, de-association , association and ping each terminal on the wireless LAN network. The solution has 2600 words around and references are included as per APA format.

Reference no: EM132136968

Questions Cloud

What is the percent of lumber : What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier
What are the main things to remember about elasticity : What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
Find the market demand curve for pears : a. Find the market demand curve for pears if these three guys are the only individuals in the market.
What is the firm supply curve : What is the firm's supply curve? What is market supply? What is equilibrium price? Equilibrium quantity? How much will each firm produce?
Design of secure enterprise wireless network : MN603 Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network, Melbourne Institute of Technology Australia
If all countries eliminated all barriers to immigration : If all countries eliminated all barriers to immigration, would global economic growth increase? Why or why not?
What would be your recommendation : What price should he charge per ticket? (Note: Use the arc elasticity formula.) Is this a good strategy? What would be your recommendation?
How many comittees are possible : The States of California, Arizona, New Mexico, Utah, and Nevada each send a team of 6 delegates to the Sounth Western States annual conference.
Shifting the demand curve to the righta : Describe five changes in the vaiables that will cause demand for a product to increase, shifting the demand curve to the right?

Reviews

urv2136968

10/29/2018 9:14:32 PM

Thank you very much for taking the time out to assist me with completing this assignment within a timely manner. I will apply to this service again in the future. I am really impressed with the hard work. good points good elaboration. Thanks

len2136968

10/10/2018 4:22:19 AM

Word limit 2000 – 2500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2136968

10/10/2018 4:22:13 AM

Introduction - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Report Layout - Exceptional report layout, style and language used. Explore ethical implications - Finding is clearly linked and well justified. Design secure enterprise wireless network - Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements. Analyse secure enterprise wireless network - Excellent analysis included WPA2 and RADIUS and covered all aspects.

len2136968

10/10/2018 4:22:07 AM

Implement secure enterprise wireless network - All elements are present and very well integrated. Testing - Testing was successful between client and AP. All required snapshots attached. Demonstration - Logic is clear and easy to follow with strong arguments. Conclusion - Logic is clear and easy to follow with strong arguments. Reference style - Clear styles with excellent source of references.

Write a Review

Computer Networking Questions & Answers

  Describe the impact that each standards organization

The networking field, to include wireless networking, defines many standards to govern network and wireless network operations.

  Investigate the history of the csiro wifi patent which was

investigate the history of the csiro wifi patent which was recently up-held in courts in the united states. this patent

  Find the rfc which defines ftp protocol

Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..

  Explain five steps to reduce network costs

Are there any additional steps that are not on this list? Which of these do you feel have the largest impact on a given network project?

  Explain the possible reductions of human capital

Determine the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies. Create a diagram through the use of Microsoft Visio or an open source alternative.

  Xplain the basic components and media of network systems

Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.

  Modern network applications and management

MN504 - Networked Application Management - you need to critically discuss the metrics that are related to performance of such applications

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Theories of human factors as related to network design

What kinds of questions would you ask to better understand their environment and each group of users - assessment plan of the applications for performance

  Develop a presentation replacing the token ring network

Cover the reasons why you want to make the change and the benefits to be gained by it, the equipment needed to make the change, and the general steps involved in executing the switchover to an exclusively Ethernet network topology.

  Network design proposal for bank

Design a pre-sales proposal for network setup in a university - Identify the hardware components required to setup the network for the Bank

  Project on information communication technology

A project on Information Communication Technology(I.C.T). Want to know that what is internet? and how it works?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd