Design of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132136968

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network

Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

  • Apply and evaluate wireless network security techniques in consideration of ethical implications;
  • Design and implement secure enterprise wireless networks.

Assignment Description -

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing Boson Netsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Section to be included in the report -

Introduction - Outline of the report ( in 3-4 sentences)

Report Layout - Report layout, style and language

Explore ethical implications - Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network

Design secure enterprise wireless network - Design a secure enterprise wireless network, employing Boson Netsim.

Analyse secure enterprise wireless network - Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

Implement secure enterprise wireless network - Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

Testing - Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Demonstration - Demonstration in Week 11 during the Lab.

Conclusion - Write summary of the report.

Reference style - Follow IEEE reference style.

Verified Expert

The solution file is prepared in ms word which discussed about the ethical implication to design and implement of wireless LAN network, design secure wireless network in network tool, secure wireless network using WAP2 and RADIUS network can analysis using WPA2 and RADIUS server in term of Integrity, Availability, Confidentiality, Authentication and Authorization, implement secure enterprise wireless network using WPA2 and RADIUS server and finally test the simulate wireless LAN network to check authentication, de-association , association and ping each terminal on the wireless LAN network. The solution has 2600 words around and references are included as per APA format.

Reference no: EM132136968

Present a proposal for internet solution for a college

Present a proposal for an Internet/Intranet solution for a college. The college is especially interested in the promised efficiency gains to be found from new ways of workin

Network management in organisations

Network Management in Organisations - develop skills in research, critical analysis an academic writing of high standard. In this assignment students

What is the client process

COIT20261 Network Routing and Switching -  What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF - Identify the destination port number.

How does the cloud affect enterprise computing

Your draw on a range of sources, and to establish your understanding of the historical context of the question. You carried out the exercise as assigned, or carefully explai

Develop personal implications for your growth

The social and technical features required in information networks to support effective collaboration - Your draw on a range of sources, and to establish your understanding of

Compare the unshielded twisted pair and coaxial cable

Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages ass

Explain risk management strategies in cloud computing

CISP 698- Risk Management Strategies in Cloud Computing; Information and Data. The content must be written from general to specific, from topic breadth to topic depth, or from

Determine general security architecture for the company

Determine general security architecture for the company. Develop a list of 12specific security policies that could be applied. Write specific details along with the rationale

Reviews

urv2136968

10/29/2018 9:14:32 PM

Thank you very much for taking the time out to assist me with completing this assignment within a timely manner. I will apply to this service again in the future. I am really impressed with the hard work. good points good elaboration. Thanks

len2136968

10/10/2018 4:22:19 AM

Word limit 2000 – 2500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2136968

10/10/2018 4:22:13 AM

Introduction - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Report Layout - Exceptional report layout, style and language used. Explore ethical implications - Finding is clearly linked and well justified. Design secure enterprise wireless network - Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements. Analyse secure enterprise wireless network - Excellent analysis included WPA2 and RADIUS and covered all aspects.

len2136968

10/10/2018 4:22:07 AM

Implement secure enterprise wireless network - All elements are present and very well integrated. Testing - Testing was successful between client and AP. All required snapshots attached. Demonstration - Logic is clear and easy to follow with strong arguments. Conclusion - Logic is clear and easy to follow with strong arguments. Reference style - Clear styles with excellent source of references.

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd