Assignment Description: Design and implementation of wireless LAN for a small campus with necessary tools and techniques to evaluate the secure wireless connection. Wireless networks are difficult to...

1 answer below »

Assignment Description:


Design and implementation of wireless LAN for a small campus with necessary tools and techniques to evaluate the secure wireless connection.


Wireless networks are difficult to manage and secure due to diverse nature of components and open availability of standards compared to wire network. Nowadays, there are number of security practices expected to illustrate why there is a need to implement security tools in WLAN under different attacks. Organizations common practice is to use online interactions with customers and share company related information (may be public and private) in wireless LAN. There are high possibilities that unauthorized users may be received access of the network within the range of the network. The organization needs to prevent the outsider’s access by encrypting the transactions and network ID.


We want to install the WLAN services in a small campus with a limited user. It is necessary to analyse the surrounding environment of the campus to check the possibility of all attack from unauthorized users. Internal area can be grouped to provide wired access to staff members or administrative officers in the campus for faster speed with high security. In order to facilitate internet access to students in different classrooms, library, and/or cafeteria, we may implement WLAN devices with high features or existing may be extended in coverage area.


We propose to extend the internet services from wired network using multiple access points in different locations. There is high concern about the data speed between the wired network and wireless network. Usually, the wired network is connected by high-speed co-axial cable or Fiber optic cable. Our concern is to fulfil of higher data rate requirement by wireless network with the high level of authentication. You can find a set of tools such as WPA or WPA2 used for providing high quality network security. The tools help you to protect the network with high-speed data transmission and large coverage area.


To address these issues, we wantedto discover different types IEEE802.11a/b/g/n wireless networks within range in real time.The tools need to provide information about the network like name, SSID, security strength, source type and basic address of network. The most important thing is the security measurements in wireless networks are different in comparison of wired network. The security ensures the authentication of users in WLAN and the users on the wired network. We recommended doing it by deploying IEEE802.11x authentication that provide authentication for devices trying to connect with other devices on LANs or wireless LANs.


The main objective in this assignment is to implement IEEE 802.1X standard for security over wired or wireless LAN authentications for a campus with any number of users.


Best practices for deploying 802.1X should start with a well thought out plan that includes, but is not limited to, the following considerations:


 Give your proposed WLAN design for the campus. How can you secure your designed network from all kind of attack using WPA or WPA2 technique? Consider the network design with devices that support 802.1X


Prepared by: Md Zahangir Alam Moderated by: Dr.Sanjeeb Shrestha May, 2019




  •  Give a single and unified solution IEEE 802.11x network using Protection-capable Management Frames that uses the existing security mechanisms rather than creating new security scheme.




  •  You need to deploy a secure 802.1X of any suitable (may be Cisco and Xirrus) wireless network to serve 3,000 users of University A. Keep in mind that their challenges are to find a solution that best eased their deployment, devices authentication and troubleshooting tools, and supported their diverse mix of user devices and multi-vendor network equipment. After careful evaluation, you observed that AAA/NAC platform support multi-vendor environments. Deploy a solution that supports all existing infrastructure, and works in multi-vendor environments. For user configuration support, use a solution that supports multiple operating systems such as Windows, Mac OS, and Linux.


    Requirements


    Design the network as specified in the above scenario from scratch. You have to submit a group report and specify each individual group member’s contribution on the front page. You should address the following tasks in your report:


    For this assignment, you need to complete the following tasks:






  •  Design the wireless network of campus A according to given specification in the given case study (Diagrams can be designed using MS Visio or any other available network design software).




  •  Establish the network security by using WPA or WPA2.




  •  List the security requirements for wired network and wireless network of campus A stated in


    the case study.




  •  Provide 802.1x authentication mechanism required wireless network according to the wired


    network of the Report. Furthermore, the network security management mechanism for further solutions should be based on the existing security scheme.


    All group members:
    Write the report with detail steps that explains all the solutions and implement theIEEE802.11x security demonstration using WPA or WPA2 (in the demonstration you need to consider how to user connect to the WLAN through the access point). Also, give the plan to extend the network for more users using multiple access points.


    Write a report that includes the following sections: abstract, introduction that contains brief history, network components etc, proposed solution along with figure, your future recommendations, and conclusions.




Prepared by: Md Zahangir Alam Moderated by: Dr.Sanjeeb Shrestha May, 2019


Marking criteria:


Marks are allocated as indicated on each question, taking the following aspects into account:


Note: The marking criteria varies for each assignment



















































Section to be included in the report



Description of the section



Marks



Abstract



Aims and objectives of this report



5



Introduction



History of WLAN, network components, and outline of report.



10



Analyse



Analyse the problem of providing security of the above campus network using WPA or WPA2



10



Design



Create a design part of the proposed solution with suitable diagram



10



Evaluation/justification



Evaluate your proposed solutions and write justification of your evaluation



5



Conclusion



Briefly summarized the outcomes of the work using 2/3 sentences.



5



Reference style



Follow IEEE reference style



5




Total



50



Marking Rubric for Assignment #2: Total Marks 50 Note: The marking rubrics varies for each assignment






























































Grade Mark



HD 40-50



DI 35-44



CR 30-34



P 25-29



Fail




Excellent



Very Good



Good



Satisfactory



Unsatisfactory



Abstract /5



Clearly written the goal of the work



Soundly written the goal of the work



Usually written the goals



Briefly presented the goals



Did not mention the goal



Introduction /10



All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated



Topics are relevant and soundly analysed.



Generally relevant and analysed.



Some relevance and briefly presented.



This is not relevant to the assignment topic.



Analyse /10



Logic is clear with strong arguments



Consistency logical and convincing



Mostly consistent logical and convincing



Adequate cohesion and conviction



Argument is not clearly stated



Design /10



All elements are present with required diagram.



Components present cohesively



Components present and mostly well integrated



Most components present



Poor proposed design.



Evaluate/justific ation


/5



Excellent comparison is made throughout this section.Outstandin g execution is made



Evaluate very good way



Good effort to evaluate but limited comparison



Little bit effort for comparison through web search.



Poor attempt to justify



Prepared by: Md Zahangir Alam Moderated by: Dr.Sanjeeb Shrestha May, 2019






















Conclusion /5



Summarized the concept logically with strong arguments



Consistency logical and convincing



Good presentation of the summary



Moderate summary of the work.



Failed to summarize the work.



Reference style /5



Excellent reference style according to IEEE and most are relevant and recent



Good reference according to IEEE but some are old



Adequate reference most are old



Mix of reference style and old



Error in the reference style according of IEE and majority are irrelevant.


Answered Same DayMay 23, 2021

Answer To: Assignment Description: Design and implementation of wireless LAN for a small campus with necessary...

Dr answered on May 26 2021
136 Votes
Abstract
The aim of this project to design the secured Wireless LAN to the campus to enable the campus users to access the electronic resources and Internet by use of the mobile computing device such as tablet pc. Smart phones, MacBook etc. The aim is fulfilled by defining the objectives related to network design and c
onsideration of the security enforcement by use of the wireless encryption protocols and wifi protected access configuration setup as per the IEEE 802.1x standards with the wireless devices. Campus wired network should not be secured by the methodologies used to secure the wireless network of campus. In this report the design and implementation of wireless and wire network infrastructure to the campus along with the implementation of WPA and WPA2 security as per the IEEE 802.11/b/g/n are completed. All the steps to design the network and configure the WPA and WPA2 securities are considered and derailed.
Project Introduction
In 1969, first wireless local area network was professionally developed by the Hawaii university. In 1971, the wireless network was taken as operational network. The commercial use of wireless local area network was started from year 1988 and now it is very common to the institutions and university to provide flexible and scalable local area network environment to students, staffs and faculties in the campuses. The development of wireless local area network brought the attention to IEEE to standardize the wireless local area network devices and protocols for the better short distance shared computing through the wireless local area network [1[.
Wired local area network and wireless local area network coexist together and this type heterogeneous local area network is considered as the better information system for computing and information sharing.
Wireless local area network is more susceptible to the security vulnerabilities and risks of security attacks. These issues of security attacks are more prevalent with the wireless local area network. IEEE 802.1x standard specified the different types of security measures and control to the security threats associated with the wireless network. These security frameworks for wireless local are Wireless Encryption Protocol (WEP), Wifi Protected Access (WPA), WPA2 etc. These all security specifications are standardized under the given specification of IEEE 802.1x.
A wireless local area network design requires the backbone wired network to provide the backbone such as Internet, Server services to the wireless local area network users within the boundary of 100 meter diameter [2]. To design wireless local area network, wireless router or access point is required to be configured and setup with the wired network.
A wireless local area network works under the Industrial, Scientific and Medical (ISM) band. This ISM band either operates with 2.4 GHz band or 4.8 Ghz band. These frequency bands are free and no licensing is required.
WPA and Security Analysis
IEEE 802.1x specification provides the security standards and the protocols to provide the security of wireless local area network. WPA and its advanced version WPA2 are the main security standards for authentication...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here