Design of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132136968

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network

Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

  • Apply and evaluate wireless network security techniques in consideration of ethical implications;
  • Design and implement secure enterprise wireless networks.

Assignment Description -

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing Boson Netsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Section to be included in the report -

Introduction - Outline of the report ( in 3-4 sentences)

Report Layout - Report layout, style and language

Explore ethical implications - Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network

Design secure enterprise wireless network - Design a secure enterprise wireless network, employing Boson Netsim.

Analyse secure enterprise wireless network - Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

Implement secure enterprise wireless network - Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

Testing - Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network.

Demonstration - Demonstration in Week 11 during the Lab.

Conclusion - Write summary of the report.

Reference style - Follow IEEE reference style.

Verified Expert

The solution file is prepared in ms word which discussed about the ethical implication to design and implement of wireless LAN network, design secure wireless network in network tool, secure wireless network using WAP2 and RADIUS network can analysis using WPA2 and RADIUS server in term of Integrity, Availability, Confidentiality, Authentication and Authorization, implement secure enterprise wireless network using WPA2 and RADIUS server and finally test the simulate wireless LAN network to check authentication, de-association , association and ping each terminal on the wireless LAN network. The solution has 2600 words around and references are included as per APA format.

Reference no: EM132136968

Questions Cloud

What is the percent of lumber : What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier
What are the main things to remember about elasticity : What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
Find the market demand curve for pears : a. Find the market demand curve for pears if these three guys are the only individuals in the market.
What is the firm supply curve : What is the firm's supply curve? What is market supply? What is equilibrium price? Equilibrium quantity? How much will each firm produce?
Design of secure enterprise wireless network : MN603 Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network, Melbourne Institute of Technology Australia
If all countries eliminated all barriers to immigration : If all countries eliminated all barriers to immigration, would global economic growth increase? Why or why not?
What would be your recommendation : What price should he charge per ticket? (Note: Use the arc elasticity formula.) Is this a good strategy? What would be your recommendation?
How many comittees are possible : The States of California, Arizona, New Mexico, Utah, and Nevada each send a team of 6 delegates to the Sounth Western States annual conference.
Shifting the demand curve to the righta : Describe five changes in the vaiables that will cause demand for a product to increase, shifting the demand curve to the right?

Reviews

urv2136968

10/29/2018 9:14:32 PM

Thank you very much for taking the time out to assist me with completing this assignment within a timely manner. I will apply to this service again in the future. I am really impressed with the hard work. good points good elaboration. Thanks

len2136968

10/10/2018 4:22:19 AM

Word limit 2000 – 2500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2136968

10/10/2018 4:22:13 AM

Introduction - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Report Layout - Exceptional report layout, style and language used. Explore ethical implications - Finding is clearly linked and well justified. Design secure enterprise wireless network - Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements. Analyse secure enterprise wireless network - Excellent analysis included WPA2 and RADIUS and covered all aspects.

len2136968

10/10/2018 4:22:07 AM

Implement secure enterprise wireless network - All elements are present and very well integrated. Testing - Testing was successful between client and AP. All required snapshots attached. Demonstration - Logic is clear and easy to follow with strong arguments. Conclusion - Logic is clear and easy to follow with strong arguments. Reference style - Clear styles with excellent source of references.

Write a Review

Computer Networking Questions & Answers

  What is a service level agreement

What are SNMP and RMON? What is a traffic analysis and when is it useful?- What is a service level agreement?- How do device latency and memory affect performance?

  Design a wireless network for your home network

Define the termcomputer-based information systems. In your definition, discuss three types of information systems, the audience or level of management served by each, and how the systems benefit the organization.

  What are the different types of cloud services

What are the different types of cloud services? What are the benefits and drawbacks of opting for a cloud service solution over an in-house IT solution?

  Which of the given is a cisco ios feature which can collect

question which of the following is a cisco ios feature that can collect timestamps of traffic sent between a particular

  Identify all the circuits and network hardware

Analyse user network requirements and describe and analyse the current network - You will need to identify all the circuits (cabling) and network hardware of the existing network(s) and explain their function, performance, capacity, etc.

  Describe three advantages of moving your corporate e-mail

1.describe three advantages of moving your corporate e-mail to the cloud. what are three risks involved in moving to

  Your manager has assigned you and two other engineers to do

you work for a university that has over 3500 students on campus. the you supports about 600 staff and faculty that are

  Assignment on subnetting

The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

  Project on networking service request

Resources: Service requests SR-lf-003, SR-ht-011, and SR-kf-015; and the Lafluer Trading Company, Huffman Trucking, and Kudler Fine Foods Virtual Organizations. Review this entire document. Choose one of the SR-lf-003, SR-ht-011, or SR-kf-015 serv..

  Determine and list the ip address ranges

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and wil..

  How do i control urlconnection uses the post or get method

What is a port? How do I control whether URLConnection uses the POST or GET method when sending data to an HTTP server?

  Contents of a register specified in the instruction

In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd