Compare the performance of various wireless networks

Assignment Help Computer Network Security
Reference no: EM131808128 , Length: word count:1500

Wireless Networks & Security Assignment - Use of a WLAN Tools in an enterprise setting

Purpose of the assessment -

  • Utilise standards-based technologies used in various networks.
  • Test and compare the performance of various wireless networks.

Description of the Assignment

This assignment requires you to perform the analysis on a real large-scale wireless network. To fulfill the assignment tasks, you will collect data on access points and evaluate security situations. We recommend to use the WLAN sniffing tools (e.g., Netspot, Acrylic, Android app etc.), however you will have the choice to choose one of the best suitable tools. Data collection must include technology used, deployed network types, channels, data rates and interference with other networks, security protocols etc. A technical report is to be prepared according to the specification below. Your report should include the following:

1. Record WLAN access points at a public place (such as at a shopping centre, public place, home network etc. of your choice).

2. Gather technical information about wireless networks at three different locations with minimum 10 APs for each location.

3. Test the WLAN sniffing tool and report your observation and recommend how to secure and/or manage WLAN. Your report should include:

a. Tables for each location containing all technical details about WLAN setup from your findings.

b. Screenshots (as an evidence) and detail explanation to report working mechanism (the step by step process) of the identified technique.

c. Explain the use (evaluation) of the technique to secure and/or manage WLAN.

i. Discuss dual bands and its advantages

ii. Security implications

iii. Others aspect such as special network, multiple SSIDs and vendors etc.

4. Submit a one (1) minute video along with audio to demonstrate your implementation.

Reference no: EM131808128

Questions Cloud

What are the social benefit : (a) What are the social benefit, social cost, and net social benefit of the project in market 1?
Explain what is an important challenge facing management : Explain what is an important challenge facing management of health care organizations today, and how would you go about addressing it?
Prepare a statement of stockholders equity : For the period July 1 to December 31, 2018, prepare a statement of stockholders' equity. All account balances on July 1 were zero.
Best strategy for prisoner b : a. If prisoner A confesses, what would be the best strategy for prisoner B?
Compare the performance of various wireless networks : BN303 Wireless Networks & Security Assignment - Use of a WLAN Tools in an enterprise setting. Test and compare the performance of various wireless networks
What is the type of unemployment : What is the type of unemployment that suitable for this case? Cyclical, frictional, or structural unemployment?
What tone will you use to convey your message : What research/sources will you use to obtain information about the audience? What tone will you use to convey your message?
What is a set and when are two sets equal : What is a Set? Give an example When are two sets equal? Give an example of two equal sets What is the empty set? Give an example
Divide the remainder of the partnership income : They divide the remainder of the partnership income in a ratio of 3:2. If partnership net income

Reviews

len1808128

1/10/2018 7:56:20 AM

Australian student, total 1500 words, rest need everything as per the guidelines. I don't need 4th point (video). Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade.

len1808128

1/10/2018 7:56:14 AM

Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len1808128

1/10/2018 7:56:09 AM

Logic is clear and easy to follow with strong arguments. The presented solution demonstrated an extreme degree of sophistication and effectiveness to secure and/or manage WLAN. All elements are present and well integrated. Clear styles with excellent source of references. Proper writing. Professionally presented. Successful completion and well understanding of the outcome.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd