KF7031 Wireless Networks and Security Assignment

Assignment Help Computer Networking
Reference no: EM132553042

KF7031 Wireless Networks and Security Assignment - Northumbria University, UK

Learning Outcomes -

Be able to describe, explain critically and analyse wireless data communication technology along with associated security issues.

Be able to analyse and model wireless behaviour using appropriate mathematics.

Critically analyse enterprise requirements for wireless systems.

Critically analyse 802.11 protocol information.

Make critical decisions about designing secure wireless networks.

Understand the global nature of WLAN standards and design.

Question 1 -

a) Critically analyse the impact of Reflection in evaluating the performance of legacy 802.11 a/b/g WLAN technologies.

b) Explain how scattering occurs in RF signals. What is the result of scattering on the quality and strength received signal?

c) What is Multipath in RF transmission? Analyse the effects of multipath propagation in WLANs.

Question 2 -

a) Assume you are working as a Network Engineer and your task is to estimate the feasibility of a 5 km link between two buildings, with one access point and one client radio. The access point is connected to an antenna with 10 dBi gain, with a transmitting power of 20 dBm and a receive sensitivity of -89 dBm. The client is connected to an antenna with 14 dBi gain, with a transmitting power of 15 dBm and a receive sensitivity of -82 dBm. The cables in both systems are short, with a loss of 2dB at each side at the 2.4 GHz frequency of operation.

b) What recommendation you would make to improve the link margin for the system deployed in part a above?

Question 3 -

a) You have been assigned to perform a wireless site survey of CIS Building at Northumbria University. You are expected to make a recommendation to improve the quality and coverage of wireless networks throughout the building. Describe the key steps you would consider conducting the survey. The building consists of Computer Laboratories and large lecture theaters. What factors you need to consider when producing the survey outputs to make the design recommendations?

b) In a role as Network Design Engineer, which factors would you consider when choosing an antenna. List and briefly explain at least four).

Question 4 -

a) Assume that you have a wireless channel with a bandwidth has a of roughly 100MHz. We would like to transmit information at a bit rate of 500Mbps. Is a signal-to-noise ratio of 30dB enough to reliably transmit this much information? Why or why not?

b) Briefly explain the concept of Voltage Wave Standing Ration (VSWR). What are the effects of VSWR on a wireless system?

Question 5 -

a) Wireless transmission suffer from the "Hidden Node" problem. With the help of a diagram explain the hidden node problem.

b) Give 2 possible causes of wireless nodes experiencing the hidden terminal problem.

c) Would CSMA/CD which was designed for wired Ethernet LAN work for LAN and why?

d) How does the CSMA/CA use the control packets to overcome the problem hidden node in wireless LANs?

Question 6 -

a) In IEEE 802.11 DCF, various mechanisms are introduced to reduce collisions, however, these mechanisms also provide the vulnerability for denial of service (DoS) attacks. Critically analyse how 802.11 medium contention can be compromised by a DoS attack?

b) Assume that you are working as a Network Engineer that has hired you to look after wireless local area networks. You are assigned a task to ensure each WLAN user is properly authenticated. The existing network infrastructure is only configurable with three options: a) open system authentication with WEP, b) shared key authentication, and c) 802.1X/EAP authentication. Which one these authentication methods is most secure. Justify your answer.

c) You learned in lectures that WEP implementation uses an initialization vector (IV). Explain the purpose of IV in WEP. Critically analyse the vulnerability posed using IV in WEP.

d) Assume Bob is using RC4 Cipher to send encrypted messages to Alice. Bob sends an encrypted message to let her know the time for the next meeting. Bob wishes to meet Alice at 13:15 hrs. Assume that this time could be written by a string of 4 numbers (ignore the :), where each number is represented by 3 bits. If the key is [1 2 3 4], using a state vector of size 8, find out the encrypted message. Show the process for each iteration.

Question 7 -

Nme and critically explain at least five (05) security mechanisms that are important for wireless communications.

Attachment:- Wireless Networks and Security Assignment Files.rar

Reference no: EM132553042

Questions Cloud

SITXMGT002 Establish and conduct business relationships : SITXMGT002 Establish and conduct business relationships Assignment Help and Solution, Mastery Institute Australia - Assessment Writing Service
Overall humoral immunity to pathogens : Antibodies come in many different isotypes in which they differ in structure, distribution in the body, and their effector mechanisms.
Lots of naïve cd4 and cd8 t cells : The body produces lots and lots of naïve CD4 and CD8 T cells that spend most of their time circulating the body doing nothing but each having the potential
Find what was the standard materials quantity per unit : Crede Manufacturing Company uses a standard, Find what was the standard materials quantity per unit? (Round answer to 2 decimal places, e.g. 5.17.)
KF7031 Wireless Networks and Security Assignment : KF7031 Wireless Networks and Security Assignment Help and Solution - Northumbria University - Assessment Writing Service - What is Multipath in RF transmission
Calculate the unit cost of each of the three speedboat model : Calculate the unit cost of each of the three speedboat models using the proposed activity-based costing system of allocating overhead.
Determining the type of mutation : If you don't have a partner use this sequence to answer #1: TACTAACTATTATAGGCCGTATGGATC Have your partner introduce a point mutation
Urinary tract infections : What are the three ways in which urinary tract infections may be acquired? What are the primary and secondary antibody responses to an immunogenic response.
Pathways of antigen processing : The Major Histocompatibility Complex presents antigens to T cells; explain the different pathways of antigen processing and presentation

Reviews

len2553042

6/23/2020 3:51:21 AM

HI, Is there any writer who can help me on open book exam on wireless networks and security time limit 10 hrs exam 7 questions? Real exam will have problems too After releasing the exam it should be completed within 10 hrs so i need delivery within 8hrs so please ask writers and let me know. Real exam resembles like the sample paper. Please find attached sample paper. The exam is open book u can refer any resource but needed to submit within 10 hrs after the release. The exam will have some problems too. Please refer sample paper once. The exam answers should be submitted within 12 hrs after the release. all the course material and related information for the test. Please refer sample paper once and module handbook.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd