Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Methodology: Review topics covered in lecture hours, from textbook, reference books plus online research, to conduct a comprehensive study about wireless network security implementation at home. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic: you are required to back up your findings with supporting evidence.
Guidelines:
1. if the last 2 digit number of your student ID is less than 9, then assume the number of devices need to be connected would be the SUM of your last 2 digits of your student ID PLUS 80; or if your 2 digit number is larger than 9, ADD 30 to your last 2 digit number would be the total number of devices need to be connected; design your home wireless network with security in mind and describe your rational behind your design;
2. Outline the process you approach the network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;
3. What are your router/AccessPoint manufacture's default settings like subnet, gateway address, default admin account password? How are you going to modfiy them?
4. Per Internet Protocol stack, layer by layer, elaborate security measures you would like to implement to protect your wireless network and why, for ex, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly describe what is stealth mode, what is TCP/UDP port scan, how to dtermine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;
5. Roles of DHCP, NAT, DNS, or other protocols; including any protocol control based firewall; comparison of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction;
Submission: prepare a project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above problems accordingly.
Notes: a). It is acceptable to conduct your research and quote journal articles with supporting evidence but you SHOULD indicate the author(s) of your source, title, publisher and date, along with page numbers.
b). NO content from BLOGS, Forums, or from your classmates are acceptable!!
c). ** ABSOLUTELY ZERO TOLERANCE to PLAGIARISM !!!
d). There will be a LATE PENALTY, 5 points for every 2 hours and NO later than 12 hours !
e). email yur project report to me ONLY.
If any problem or issue about this project assignment, please raise them during the Q&A session in the lecture meeting.  

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M986889

Have any Question?


Related Questions in Computer Engineering

A small library keeps a roster of who will be at the desk

A small library keeps a roster of who will be at the desk each day. They have a database table as shown below. Week Start___Mon___Tue____Wed_____Thur____Fri 17/10/2011 -- Jane -- Sue -- George -- Sue -- Jane 24/10/2011 - ...

Questions 1 what are the four parts of the administrative

Questions: 1. What are the four parts of the administrative simplification requirements of HIPAA? 2. Name three factors used to determine whether you need to comply with HIPAA. 3. What are the three categories of entitie ...

Ellen is an anthropologist who has been working at olduvai

Ellen is an anthropologist who has been working at Olduvai Gorge in Tanzania for the past six months. She has been conducting research on the Internet. She finds a Web site with an article that proposes a revolutionary t ...

Write a program to ask the user to eithernbspselect 1 to

Write a program to ask the user to either  Select 1 to print the digits in an integer reversely  Select 2 to print the characters in a string reversely using a switch case, your program will either 1- call the recursive ...

Please discuss the followingas demand increased for these

Please discuss the following: As demand increased for these mortgage backed securities, lenders reacted by relaxing their approval standards to increase production. No longer were "all" borrowers required to document the ...

Q1 state whether the following is true or false and why1

Q1. State whether the following is true or false and why: (1) Monopolists can charge whatever price they want and maximize profit since they are price makers.  T/F: Why? (2) A firm that has a monopoly on a certain good m ...

You often read in the newspapers that the fed has just

You often read in the newspapers that the Fed has just lowered the discount rate. Does this signal that the Fed is moving toward a more expansionary monetary policy? Why or why not?

When we look at the ease to enter the different market

When we look at the ease to enter the different market structure, there is no doubt that 'monopoly' is the hardest. Why? -- There is only ONE firm that has established 'economies of scale' with the production of their go ...

Using the following dataa sex- 7 males 1 female height-

Using the following data, A.) (Sex)- 7 males, 1 female. (Height)- 72,67,72,64,66,68,68,70. (Left or right handed)- 7 right handed, 1 left handed. Let's assume our class is truly representative of the population at large. ...

Shading and illuminating algorithmsa explain in your own

Shading and illuminating algorithms. a) Explain, in your own words, how the Phong illumination model works and what its strong and weak features are. b) Compare flat and Gouraud shading algorithms.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As