Implementation of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132118616 , Length: word count:2200

Design and implementation of secure enterprise wireless network

Purpose of the assessment  (with ULO Mapping)

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications.

The assignment covers the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications.

The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing BosonNetsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

Reference no: EM132118616

Questions Cloud

Is it integrated with the company business strategy : What is the current human resources strategy for your company? Is it integrated with the company’s business strategy?
Draw a neat and well-labeled graph : John has income of $200 each month to spend on day passes to the gym (x) and food (y). Assume both of these goods are continuously divisible.
Write an algorithm for pseudo random number generator : Question - Write an algorithm for pseudo random number generator
Describe in which circumstances in your professional life : Describe in which circumstances in your professional life where you utilized your potential:
Implementation of secure enterprise wireless network : Explore the ethical implications in the design and implementation of a secure enterprise wireless network - Design a secure enterprise wireless network
Performance appraisal and competency systems add value : How formal performance appraisal and competency systems add value (or otherwise) to the process of identfying learning needs?
Develop nausea and vomiting holiday parties : Suppose at random 35% of school children develop nausea and vomiting following holiday parties and that you conduct a study to examine this phenomenon
Why health care professionals should have a firm : She wants you to prepare a 3-4-page Code of Ethics document that will also include a one page personal and professional code of conduct.
Potential employee as well as to current employees : Describe three trends in human resource management. discuss its implication to a prospective, potential employee as well as to current employees

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the process of data delivery

Use the concept of ethernet frames, the osi model, and the NIC's functionality to formulate your answer.

  Functional architecture for network monitoring configuration

The functional role of network monitoring by various areas in this week. You are also familiar with the pieces of information that are gathered and collected for the purpose of providing information on the network activity. Illustrate the function..

  Define the type of packet filters

Define the type of packet filters that you might build to capture traffic destined to you six critical Web servers?

  What rfc gives the protocol and specifications a news server

List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Describe the status of botnets in the world

BotLab is a platform at the University of Washington that continually monitors and analyzes the behavior of spam-oriented botnets.

  Consider an http client that wishes to retrieve a web

consider an http client that wants to retrieve a web document at a given url. the ip address of the http server is

  Fault tolerance for communicating between the floors

fault tolerance for communicating between the floors

  Determine mean time to spend frame to another station

Determine the mean time to spend frame of 1000 bits to another station, measured from beginning of transmission to end of reception? Suppose propagation speed of 100 m/μs.

  Explain relationship between cell sizes and channel reuse

Explain the relationship between cell sizes and channel reuse in cellular networks? How Host A determines whether Host B is on Net 1 or Net 2?

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  What encryption standard does the address use

Examine the contents of this publication and describe the algorithm discussed. How strong is it? How does it encrypt plaintext?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd