What is home wireless network and security

Assignment Help Computer Engineering
Reference no: EM132228

Question

Home wireless network and security

Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home. Optionally, you can use sniffer like wire shark or your choice to analyze communication traffic- you are required to back up your findings with supporting evidence.

Guidelines-

1. If the last two digit number of your student ID is less than 9, then suppose the number of devices have to to be connected would be the SUM of your last two digits of your student ID PLUS 80; or if your two digit number is larger than nine, ADD 30 to your last 2 digit number would be total number of devices need to be connected; plan your home wireless network with security in mind and explain your rational behind your design;

2. Outline process you approach network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;

3. What is your router or AccessPoint manufacture's default settings like subnet, gateway address, and default admin account password? How are you going to modify them?

4. Per Internet Protocol stack, layer by layer, elaborate security measures you will like to implement to protect your wireless network and why, as in, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to determine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;

5. Roles of DHCP, NAT, DNS, or previous protocols; including any protocol control based firewall; evaluation of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction.

Reference no: EM132228

Questions Cloud

How to write basic structure of an exception handler : How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item
Determine sarahs deductible transportation expense : Determine Sarah's deductible transportation expense, using the actual expense method.
What will be formula of digital certificate of the server : Point out what will be the formula of digital certificate of the server N. we denote the public and private keys of server N as K+ ,N KN, and public or private keys of CA are denoted as K+ CA KCA.
Evaluate the value of one share of gis stock : Evaluate the value of one share of GIS stock using Dividends Valuation Approach.
What is home wireless network and security : What is home wireless network and security Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home.
Evaluate incorporation plan : Except the stock sale is an integral part of the incorporation plan
How to write a class named dayofyear that gets an integer : How to write a class named DayOfYear that gets an integer Day 2 would be January 2 Day 32 would be February 1 Day 365 would be December 31
How many cars in every team called chevy and ford : How many cars in every team called Chevy and Ford There are eight cars in every team called Chevy and Ford. One car from each team races its opponent on drag strip.
How to illustrate a memory map for a system : Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

  Type of data standard

What type of data standard are we dealing with in each scenario (metadata, spatial or attribute)? You work for Town of Ancaster prior to an amalgamation of New City of Hamilton. Your main responsibility was to retain Town's single line road network f..

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  Write a research report on design of a cisco router

Systems research and investigate novel ideas and applications.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Which references source page fault with lru page replacement

Which references source a page fault with LRU page replacement policy? Illustrate your intermediate working in table below with three columns.

  Write a program that mimics a flop-turn-river of poker game

Write down a program that mimics a flop-turn-river of a poker game. I must have three buttons titled Deal, Shuffle and Start Over.

  Designing a solution to the problem

Designing a solution to the problem and implementing the design using principles of correct syntax

  Design a dedicated datapath

Design a dedicated datapath

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd