Hire Experienced Online Tutors To Get Best and Affordable Secured Design of Wireless LAN Assignment Help Service!!

Home   Course  
Previous << || >> Next

BN303 Wireless Networks and Security Assignment - Secured Design of Wireless LAN, Melbourne Institute of Technology, Australia

Purpose - The purpose of the assignment is to design a secured wireless LAN. Students will be able to complete the following ULOs:

  • Apply wireless network security techniques in the context of ethical implications;
  • Design and implement secure enterprise wireless networks.

Assignment Description: Design and implementation of wireless LAN for a small campus with necessary tools and techniques to evaluate the secure wireless connection.

ARE YOU LOOKING FOR RELIABLE SECURED DESIGN OF WIRELESS LAN ASSIGNMENT HELP SERVICES? EXPERTSMINDS.COM IS RIGHT CHOICE AS YOUR STUDY PARTNER!

Tasks - Design the wireless network of campus A according to given specification in the given case study. Establish the network security by using WPA or WPA2. List the security requirements for wired network and wireless network of campus A stated in the case study. Provide 802.1x authentication mechanism required wireless network according to the wired network of the Report.

Answer - Wireless network and security "Secured design of wireless LAN"

Abstract

Though most of the business and university are dependent on the use of interconnected network. If there is more number of users in network then that can be a reason of network attack because attackers get inside the network and make harm to data and database. Every company has different set of requirements and according to that they should plan the network design. WLAN network requirements should be gathered completely before deploying the set up. As of now current demand is to establish wired and wireless network in a university where it has more than 3000 users at a time. To make secure and safe environment for all there is need to use proper security mechanism.

Introduction

Security and privacy of data is the major requirement for wired and wireless network. But there is need to focus on correct devices so that it can broadcast only secure connection to all. Router and modem devices when connected in repeating mode then it can broadcast secure direction. However, due to wide range of requirement and university campus is large there is need of enterprise class router which can be used to set up high end wired and wireless connection.

Analyse

Hardware requirement

It is very important to analyze hardware and software requirements so that it will be easy to connect the devices.

Networking device- Cisco enterprise class router

Repeater- it can be used to repeat the existing network with the help of supported devices.

Access point- It can be used to broadcast the same wireless network to more range and capabilities.

Fibre optic cable- it can be used to set up LAN connection so that high speed can be transferred to the devices. When devices are connected through LAN connectivity then they can even share files and folders in offline mode too. In case any problem occurs in online connectivity then users can shared data internally with the help of these LAN connections. (Mitchell, "How Can You Secure a Wi-Fi Network with WPA2?")

DSL and ADSL connection

It is the internet input which is required to be given in networking devices so that only wired or wireless internet connection can be broadcasted from the networking devices.

Mounting device- it can be used to support mounting of the networking devices with the help of stand and other features like that. Stand and other items are very necessary to hand the devices on wall so that further issue can be resolved.

SAVE YOUR HIGHER GRADE WITH ACQUIRING SECURED DESIGN OF WIRELESS LAN ASSIGNMENT HELP & QUALITY HOMEWORK WRITING SERVICES OF EXPERTSMINDS.COM!

Software requirements

Router software so that it can be used for configuration

WPA2 and WPA security mechanism

Mac Address

IP table allocation

Design

Secured Design of Wireless LAN Assignment.png

In the above network university network is connected with two other routers and further same network has been extended with the help of access point. Wireless router can be used to connect devices however, configuration of devices will be done to secure the network with wireless mechanism. More than 3000 users can be connected with the above network. When we use wireless network is extended then that can be used to connect with mobility devices available in network.

There are several factors to be considered while designing and deploying wireless network. However most of the devices provide typical range for the devices they manufacture. Based on the type of antenna used it provide efficiency of the signal and user can make selection based on this. However based on the type of antenna used in devices ranges of the networking devices can be selected. Though there is need to consider all obstacles too because like furniture, ceilings, interference from machinery, power lines, and other electronic equipment's available in the network. ("Wireless security protocols: The difference between WEP, WPA, WPA2") Transmission and reception of the signal is also very important because when signal bounce off the objects that can be problem in maintaining adequate signal strength. Another important factor is that when devices does not support maximum speed and more number of users connected at a time then that is also a problem for effective speed. Installation and deployment should be done based on the success of strength and antenna signal. When there is peak time in amplitude and modulation then packets can be transferred in enhanced speed however in case of polarization no matter it is vertical or horizontal there can be disturbance in transferring of packets.("Understanding 802.1X Authentication", Arubanetworks.com").However there are special software for wireless radios and it maintain different signal level. But if antenna is placed in poor location then that can also be a problem for connectivity. Thus we have discussed how WLAN set up should be done and what are the care to be taken while installing device to create wireless connectivity in multiple devices at a time.

DO YOU WANT TO EXCEL IN SECURED DESIGN OF WIRELESS LAN ASSIGNMENT? HIRE TRUSTED TUTORS FROM EXPERTSMINDS AND ACHIEVE SUCCESS!

WIFI protected access layer 2 is the type of security which can be used to protected wireless network so that speed in wireless can be enhanced in secure environment. It is one of the replacement of less protected security WEP and upgrade of the WPA technology. However, WPA 2 security is in use after 2006 in every certified hardware and it works on the basis of 802.11i encryption methodology. This type of security can be used in small region as well as in wide region too. Apart from this there are many other type of security features which can be enabled in these networking devices to make it more secure. When WPA2 security will be enabled with strongest and high security features then they can be connected with the traffic and can see the details of the traffic however, they cannot do changes in the available data. One of the most important feature of this set up is that automatic IP configuration can be enabled in these devices. DHCP mode once enabled can provide IP address automatically to the connecting devices.

Evaluation

WPA and WPA 2 security is one of the security protocol which can be used to secure wireless connection. It helps users to create SSID and password and that can be used to connect to the network. However, user are required to choose alphanumeric character for password. If user make alphanumeric character as password then that is hard to break. WEP security is also one of the common method of security but that is not much secure as WPA and WPA2. It comprises of only numbers as password and that is easy to hack. ("L. C. Miller, "Wireless Security Protocols: WEP, WPA, and WPA2 - dummies")

Once hackers can enter into the network then they can obtain information stored in that server. No matter how fast the wired speed is wireless speed always used to be low than wired. To enhance speed in wireless one can use repeater or access point connected to that network so that wireless network can be expanded to more range. Any networking devices has some limitation and range and if users are connected more than its capacity then the device will behave inappropriately. When there is more number of devices than connectivity then there can be increase in traffic. When there is increase in traffic then it can be a problem for the security of server and storage. Virtualization of network is very important so that if there is distance in location of the devices then that can be connected with the help of remote connection.

EXPERTSMINDS.COM ACCEPTS INSTANT AND SHORT DEADLINES ORDER FOR SECURED DESIGN OF WIRELESS LAN ASSIGNMENT - ORDER TODAY FOR EXCELLENCE!

802.1x authentication mechanism

It has three main variants available in the network. Users who want to authenticate is known as suppliant. Server which performs authentication is known as RADIUS server and it is known as authentication server. The devices available in network between wireless access points is known as the authenticator. These three terms combinable makes the importance of authentication mechanism of 802.1X. It is generally used to provide full access to the users who are requesting to get authentication for the connectivity of network. ( J. FITZPATRICK, "The Difference Between WEP, WPA, and WPA2 Wi-Fi Passwords", How-To Geek) NETGEAR prosafe layer 2 is the authentication mechanism has all these authentication mechanism and that can be used in conjunction with CISCO enterprise class router to broadcast network such that it can support maximum number of users at a time.

Conclusion

While concluding this report we have discussed about the design of wireless network further we have applied wireless mechanism in this. WPA 2 authentication protocol can be used to secure the network. We have further discussed the network design for the required set up. In the given network design we have discussed how devices can be connected in the network. Further we have discussed about the detailed elaboration of network design to understand the requirement of extensive users.

NEVER LOSE YOUR CHANCE TO EXCEL IN SECURED DESIGN OF WIRELESS LAN ASSIGNMENT - HIRE BEST QUALITY TUTOR FOR ASSIGNMENT HELP!

Access our Melbourne Institute of Technology, Australia Assignment Help Services for its related units such as:-

  • BN301 Industry-Based Project Assignment Help
  • BN302 Wide Area Networks Assignment Help
  • BN305 Virtual Private Networks Assignment Help
  • BN314 System Architecture Assignment Help
  • BN315 Enterprise Architecture Assignment Help
  • BN201 Professional Issues of IT Assignment Help
  • BN202 Internetworking Technologies Assignment Help
  • BN203 Network Security Assignment Help
  • BN204 Database Technologies Assignment Help
  • BN205 Project Management Assignment Help
  • BN206 System Administration Assignment Help
  • BN207 Local Area Networks Assignment Help
  • BN208 Networked Applications Assignment Help
  • BN209 Software Engineering Assignment Help
Tag This :- WPS20AMN2305NW Secured Design of Wireless LAN Assignment Help

get assignment Quote

Assignment Samples

    Reflection Paper Assignment Help

    reflection paper assignment help - What did you find out about yourself? How will you use this information to help you in the future?

Get Academic Excellence with Best Skilled Tutor! Order Assignment Now! Submit Assignment