Wireless Networks and Security BN303Professional Engineering ManagementPossibility

FIND A SOLUTION AT Academic Writers Bay

Prepared by: Dr Tony Jan Moderated by: Dr. Sanjeeb Shrestha Sept 2020
Assessment Details and Submission Guidelines
Trimester
T2 2020
Unit Code
BN303
Unit Title
Wireless Networks and Security
Assessment Author
Dr Tony Jan
Assessment Type
Group Submission – Assignment 2, T2 2020
Assessment Title
Secured design of wireless LAN
Unit Learning
Outcomes covered in
this assessment
Students will be able to complete the following ULOs:
a. Explain wireless communication protocols;
b. Utilise standards-based technologies used in various networks;
d. Apply wireless network security techniques in the context of ethical
implications;
e. Design and implement secure enterprise wireless networks.
Weight
30% of total assessment
Total Marks
50
Word limit
Minimum 1500 – Maximum 2000
Due Date
29/09/2020
Submission
Guidelines
● All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
● The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2 cm margins on all four sides of your page with
appropriate section headings.
● Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using APA or IEEE
referencing style for School of Business and School of Information
Technology and Engineering respectively.
Extension
 If an extension of time to submit work is required, a Special
Consideration Application must be submitted directly to the School’s
Administration Officer, in Melbourne on Level 6 or in Sydney on Level
7. You must submit this application three working days prior to the due
date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
● Academic Misconduct is a serious offence. Depending on the
seriousness of the case, penalties can vary from a written warning or
zero marks to exclusion from the course or rescinding the degree.
Students should make themselves familiar with the full policy and
procedure available at: http://www.mit.edu.au/about-mit/institute
publications/policies-procedures-and
guidelines/AcademicintegrityPolicyAndProcedure.
For further information, please refer to the Academic Integrity Section
in your Unit Description.
Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha Sept, 2020
Assignment Description:
Design and implementation of wireless network for an enterprise.
Wireless networks are useful but prone to many security attacks. In order to secure wireless network
but to retain its accessibility, mobility and connectivity, the network engineers must take care in
designing and implementation of a wireless network.
The intent of network engineer is to extend the internet services from wired network using multiple
access points in many carefully selected locations. One of the resolutions for wireless network
security is to encrypt data and provide intelligent authentications – that is to segregate between the
internal users to the external guest users. You can find a set of tools such as WAP or WAP2 that can
help you to protect the wireless in such a way. In particular, for authentication, the recommended
solution is IEEE802.11x that provide authentication for devices trying to connect through wireless
LANs.
The main objective in this assignment is to design and implement IEEE 802.1X standard for security
over wireless LAN authentications for a campus with any a large number of students and staff (staff
with more services available on authentication and authorizations).
In designing your network, consider the following:
● How can you secure your network from potential attacks? Are WPA or WPA2 sufficient for all
future attacks? Consider the network design with devices that support 802.1X
● Design IEEE 802.11x network using Protection-Capable Management Frames.
● You need to deploy a secure 802.1X serve 2,000 students and 200 staff at a campus (consider
using DMZ).
● Deploy a solution that supports all business and security requirements (on a simulated
environment).
Requirements
Design and implement the network for the above scenario. You need to submit a group report with
clear statement of individual group member’s contribution on the front page.
In this report, you need to include:
● Design the wireless network of campus according to the given specification (the diagrams can
be on Paint or other simple drawing platforms such as draw.io)
● Incorporate the network security using either WAP or WAP2.
● Present the security requirements for wired network and wireless network of campus given
there are two groups of users – students (acting as guests) and staff (acting as internal users).
● Implement the designed network on a network simulator satisfying both business and
security requirements (students with guest Internet access while staff having access to the
Internal Data (consider DMS)) – you may need to clear on authentication and authorizations.
● Test and troubleshoot if any incompliance.
● Report the final working version of your network on a network simulator (e.g. Cisco Packet
Tracer or other tools (including GNS3)).
All group members:
Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha Sept, 2020
Present the report with steps that explain all the solutions and implement the IEEE802.11x security
demonstration using WAP or WAP2 (in the demonstration you need to consider how to user connect
to the WLAN through the access point). Provide a plan to extend the network for more users if
required.
Write a report that includes the following sections: abstract, introduction that contains brief history,
network components etc, proposed solution along with figure, demonstration of your
implementation and testing, and your future recommendations.
Marking criteria:
Marks are allocated as indicated on each question, taking the following aspects into account:
Note: The marking criteria varies for each assignment
Section to be included
in the report
Description of the section
Marks
Abstract
Aims and objectives of this report
5
Introduction
History of WLAN, network components, and outline
of report.
10
Analyse
Analyse the problem of providing security of the
above campus network using WAP or WAP2
10
Design
Create a design part of the proposed solution with
suitable diagram
10
Implementation and
testing
Evaluate your network and write justification of your
evaluation
5
Conclusion
Briefly summarized the outcomes of the work using
2/3 sentences.
5
Reference style
Follow IEEE reference style
5
Total
50
Example Marking Rubric for Assignment #: Total Marks 50
Note: The marking rubrics varies for each assignment
Grade
Mark
HD
40-50
DI
35-44
CR
30-34
P
25-29
Fail
<25
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Abstract
/5
Clearly written the
goal of the work
Soundly
written the
goal of the
work
Usually written
the goals
Briefly
presented the
goals
Did not
mention the
goal
Introduction
/10
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
relevant and
soundly
analysed.
Generally
relevant and
analysed.
Some relevance
and briefly
presented.
This is not
relevant to the
assignment
topic.
Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha Sept, 2020
Analyse
/10
Logic is clear with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
not clearly
stated
Design
/10
All elements are
present with
required diagram.
Components
present
cohesively
Components
present and
mostly well
integrated
Most
components
present
Poor proposed
design.
Implementatio
n and Testing
/5
Excellent Testing is
made throughout
this section.
Outstanding
Implementation is
made
Good
Testing is
made
throughout
this section.
Good
Implementa
tion is made
Adequate
Testing is made
throughout this
section.
Adequate
Implementatio
n is made
Minimum
Testing is made
throughout this
section.
Minimum
Implementation
is made
Poor attempts
Conclusion
/5
Summarized the
concept logically
with strong
arguments
Consistency
logical and
convincing
Good
presentation of
the summary
Moderate
summary of the
work.
Failed to
summarize the
work.
Reference style
/5
Excellent reference
style according to
IEEE and most are
relevant and
recent
Good
reference
according to
IEEE but
some are
old
Adequate
reference most
are old
Mix of
reference style
and old
Error in the
reference style
according of IEE
and majority
are irrelevant.

YOU MAY ALSO READ ...  HI6027 Business and Corporate Law
Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER