Assessment Details and Submission Guidelines Trimester T3 2020 Unit Code NTW202 Unit Title Mobile Network Assessment Type Group Assignment 2 Assessment Title Designing a wireless mobile LAN Weight 40%...

1 answer below »
Networking assignment


Assessment Details and Submission Guidelines Trimester T3 2020 Unit Code NTW202 Unit Title Mobile Network Assessment Type Group Assignment 2 Assessment Title Designing a wireless mobile LAN Weight 40% Total Marks 100 Word limit 1500 words Due Date Report Submission: Week 11, 30/05/2021 11:59PM ; Demonstration: Week 12, 06/06/2021 9:30PM ; Late submission  Late report submission penalty may be applied (5% per late day) Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Assignment Description IT network is the backbone of any business as many services are provided over the network infrastructure. This infrastructure connects all its computers and related devices together, allowing staff to work more efficiently within the organization. Designing a Network requires planning. A company’s IT infrastructure must go through this phase before final implementation. This involves evaluating and understanding how all the elements of the network link together (from routers, switches, APs and servers to desktops, laptops, and printers) to achieve a high performance network. Wireless communication technology can have a significant impact on business allowing senders and recipients to access information while on the move. Hence customers, clients and employees require expect network access and service from different places of the company. There has been considerable interest lately for all businesses to set up mobile computing workplaces for their employees and also mobile computing for other functions of the business from distributors, suppliers and service providers. This assessment requires students to design a secure enterprise wireless network using Packet Tracer for a very large campus that has a building on a big land. The students should develop a WLAN using APs and a tower that enables users outside the building to communicate with the users inside. The students are required to submit a report, which includes: 1. Analyse the requirements i.e., network hardware/software and QoS to make sure the following criteria is met: a) Confidentiality b) Integrity c) Availability d) Authentication e) Authorization 2. Explore the wireless network architecture based on the requirements. 3. Discuss and analyse the security issues and the countermeasure(s) that you have designed. The tutor will need to form the groups of maximum 5 students. The students in each group should be from the same lab. Marking criteria: Section to be included in the report Description of the section Marks Abstract Summarize the project and the outcome 5 Introduction Introduction to enterprise wireless network and the challenges 5 Requirement analysis Analyse the requirements i.e., network hardware/software and QoS to make sure the following criteria is met: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 15 Network Architecture Design, Analysis, justification of an enterprise WLAN 20 Security Issues Discuss and analyse the security issues and the countermeasure that you have designed 10 Testing Test and prove a successful of connectivity between users and the associated security. 10 Conclusion Write summary of the report highlighting the positive and negative points 5 Reference style Follow IEEE reference style and format 5 Appendix You need to upload the packet tracer file (.pka) 5 Report Layout Report layout, style and writing 5 Demonstration Demonstration in Week 12 during the Lab. 15 Total 100 Marking Rubric for Assignment #2: Total Marks 100 Grade Mark HD 80-100 DI 70-79 CR 60-69 P 50-59 Fail<50 excellent very good good satisfactory unsatisfacto ry abstract /5 accurately plus concisely conveys the project topic, methods and outcomes accurately conveys the project topic, methods and outcomes accurately conveys the project topic, methods accurately conveys the project topic unsatisfactor ily or unclearly conveys the project topic introduction /5 all topics are pertinent and covered in depth. ability topics are relevant and generally relevant and analysed. some relevance and briefly presented. this is not relevant to the to think critically and source material is demonstrated soundly analysed. assignment topic. requirement analysis /15 excellent analysis of the requirement good analysis of the requireme nt fair analysis of the requirement poor analysis of the requirement unable analysis of the requirement network architecture /20 demonstrated excellent ability to think critically and present an exceptional design considering all the requirements demonstr ated good ability to think critically and present an exception al design considerin g all the requireme nts demonstrate d good ability to think critically and present a good design considering all the requirement s. demonstrate d ability to think critically and present a design did not demonstrate ability to think critically and present a design. security issues /10 excellent analysis of security issues and proposing very strong countermeasur es good analysis of security issues and proposing very strong counterm easures some analysis of security issues and proposing very strong countermeas ures poor analysis of security issues and proposing very strong countermeas ures lacking analysis of wpa, wpa2 and radius. testing /10 testing was successful between client and ap. all required snapshots attached testing was successful between client and ap. some snapshots attached testing was successful between client and ap. few required snapshots attached testing was partially successful between client and ap. all required snapshots attached testing was not successful. conclusion /5 logic is clear and easy to follow with strong arguments consisten cy logical and convincin g mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed reference style /5 clear styles with excellent source of references. clear referencin g style generally good referencing style sometimes clear referencing style lacks consistency with many errors appendix /5 the pka file is attached and demonstrated the pka file is not attached but demonstrated the pka file is not attached and not demonstrate d report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. demonstrati on /15 logic is clear and easy to follow with strong arguments. team members show a strong knowledge about the design consisten cy logical and convincin g. team members show a good knowledg e about the design mostly consistent logical and convincing. team members show a limited knowledge about the design adequate cohesion and conviction. team members show a poor knowledge about the design demonstrati on is confused and disjointed. lack of knowledge about the design excellent="" very="" good="" good="" satisfactory="" unsatisfacto="" ry="" abstract="" 5="" accurately="" plus="" concisely="" conveys="" the="" project="" topic,="" methods="" and="" outcomes="" accurately="" conveys="" the="" project="" topic,="" methods="" and="" outcomes="" accurately="" conveys="" the="" project="" topic,="" methods="" accurately="" conveys="" the="" project="" topic="" unsatisfactor="" ily="" or="" unclearly="" conveys="" the="" project="" topic="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" topics="" are="" relevant="" and="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" soundly="" analysed.="" assignment="" topic.="" requirement="" analysis="" 15="" excellent="" analysis="" of="" the="" requirement="" good="" analysis="" of="" the="" requireme="" nt="" fair="" analysis="" of="" the="" requirement="" poor="" analysis="" of="" the="" requirement="" unable="" analysis="" of="" the="" requirement="" network="" architecture="" 20="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirements="" demonstr="" ated="" good="" ability="" to="" think="" critically="" and="" present="" an="" exception="" al="" design="" considerin="" g="" all="" the="" requireme="" nts="" demonstrate="" d="" good="" ability="" to="" think="" critically="" and="" present="" a="" good="" design="" considering="" all="" the="" requirement="" s.="" demonstrate="" d="" ability="" to="" think="" critically="" and="" present="" a="" design="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" present="" a="" design.="" security="" issues="" 10="" excellent="" analysis="" of="" security="" issues="" and="" proposing="" very="" strong="" countermeasur="" es="" good="" analysis="" of="" security="" issues="" and="" proposing="" very="" strong="" counterm="" easures="" some="" analysis="" of="" security="" issues="" and="" proposing="" very="" strong="" countermeas="" ures="" poor="" analysis="" of="" security="" issues="" and="" proposing="" very="" strong="" countermeas="" ures="" lacking="" analysis="" of="" wpa,="" wpa2="" and="" radius.="" testing="" 10="" testing="" was="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" some="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" few="" required="" snapshots="" attached="" testing="" was="" partially="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" not="" successful.="" conclusion="" 5="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consisten="" cy="" logical="" and="" convincin="" g="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencin="" g="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="" errors="" appendix="" 5="" the="" pka="" file="" is="" attached="" and="" demonstrated="" the="" pka="" file="" is="" not="" attached="" but="" demonstrated="" the="" pka="" file="" is="" not="" attached="" and="" not="" demonstrate="" d="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" demonstrati="" on="" 15="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments.="" team="" members="" show="" a="" strong="" knowledge="" about="" the="" design="" consisten="" cy="" logical="" and="" convincin="" g.="" team="" members="" show="" a="" good="" knowledg="" e="" about="" the="" design="" mostly="" consistent="" logical="" and="" convincing.="" team="" members="" show="" a="" limited="" knowledge="" about="" the="" design="" adequate="" cohesion="" and="" conviction.="" team="" members="" show="" a="" poor="" knowledge="" about="" the="" design="" demonstrati="" on="" is="" confused="" and="" disjointed.="" lack="" of="" knowledge="" about="" the="">
Answered 1 days AfterMay 28, 2021NTW202

Answer To: Assessment Details and Submission Guidelines Trimester T3 2020 Unit Code NTW202 Unit Title Mobile...

Kshitij answered on May 30 2021
142 Votes
Summarize the project and the outcome -
Delivering WLAN configuration to enterprise network so that anyone can access in NIC range. Near about every activity possible to perform through internet wireline or wireless medium. As compare with wireline 802.3 Ethernet VLAN; wireless 802.11 Wireless LAN
medium most flexible, becoming more popular in terms of public places because of collision avoidance, ease to install. WLAN regulated by local authority.
Logical Diagram shows WLAN to give access within license and unlicenced band, BSS, ESS and Ad-Hoc connections to PCs, Laptops, Wireless Printers, Smart device, Phones, Tablets those present in NIC range of Access points. Configuration of remote access devices with proper hashing, encryption, authentication algorithm and methods such as MD5, WEP, WPA. Assigned password key and SSID.
Introduction to enterprise wireless network and the challenges
WLAN have potential to lead troublemaking challenges in lands of communications. While providing necessary flexibility as well as protocol management. Sharing the infrastructure among multiple applications. At present WLAN has been used in many sectors such as corporate, education, finance, healthcare, public use. Most challenges in terms of wireless threats, security factors are Unauthorised access, Broadcasted SSIDs, spoofed MAC address.
Challenges are Increasing user mobility and aided services like heath care, educations, social networking, flexibility in workspace like work from home, faster response to customer need, increasing demand for collaboration with aided domain like essential required items such as food on demand. Wireless networks are much types of attacks broadly categorised into two-part Cryptographic attacks like access control, Integrity Availability and Non-Cryptographic attacks like Unauthorised, data replay, Denial of service. One of the attacks like Bluetooth jacket. Wifi jammer can shut down wireless services. Need to hide SSIDs never set default SSIDs. Using weak encryption such as WEP used. Always use WPA2-PSK, WPA encryption – TKIP+AES, use WRS3 channel1/channel6.
Network hardware/software and QoS to make sure the following criteria is met:
WLAN have two band types – License band like Radio service stations and unlicenced band like cell phone, tablets. WLAN can use in Ad-Hoc or IBSS (Independent Basic Service Set), ESS (Extended Service set). Standards - 802.11ac, 802.11n, Channel’s selection happens like this fashion. Access point have two modes – Autonomous are self-sufficient and standalone. Offering one or more standalone basic service sets. Light weight – can support several different topologies, depending on where compassion wireless LAN are located. AP and WLC join by logical pair CAPWAP tunnel that extend through the wired network infrastructure. Control and data traffic are transported across the tunnel.
Any services following parameters are very impartment those can easy broken, if necessary, steps will not take....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here