Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question

Home wireless network and security

Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home. Optionally, you can use sniffer like wire shark or your choice to analyze communication traffic- you are required to back up your findings with supporting evidence.

Guidelines-

1. If the last two digit number of your student ID is less than 9, then suppose the number of devices have to to be connected would be the SUM of your last two digits of your student ID PLUS 80; or if your two digit number is larger than nine, ADD 30 to your last 2 digit number would be total number of devices need to be connected; plan your home wireless network with security in mind and explain your rational behind your design;

2. Outline process you approach network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;

3. What is your router or AccessPoint manufacture's default settings like subnet, gateway address, and default admin account password? How are you going to modify them?

4. Per Internet Protocol stack, layer by layer, elaborate security measures you will like to implement to protect your wireless network and why, as in, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to determine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;

5. Roles of DHCP, NAT, DNS, or previous protocols; including any protocol control based firewall; evaluation of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9132649

Have any Question?


Related Questions in Computer Engineering

Design a automatic room climate control system with

Design a automatic room climate control system with contextual model, state transition diagram.

Question include the following items in your paper and

Question: Include the following items in your paper and formal presentation: • A description of the Performance Check and Proficiency Testing targeted for improvement • An As-Is flow chart of the Performance Check and Pr ...

Poblem 1 a firms production function c is given by c q

Problem 1. A firm's production function C is given by C (q) = 0:5q 2+2q 1 2 +18, where q is the level of output. (i) Calculate marginal costs (ii) If all fixed costs are sunk, and the minimum price at which this firm wil ...

Sectools - top 125 network security toolssnort websitenmap

SecTools - Top 125 Network Security Tools SNORT website Nmap website Lynx website (for a text browser) Wget website Teleport Pro website Research one of the tools listed in the chapter or linked above. Discuss its releva ...

There are several different vdi technologies and many

There are several different VDI technologies and many different VDI providers. For this discussion select, one VDI software provider offering a Centralized VDI approach and another provider offering Hosted VDI. Compare t ...

Short answer1 what must be installed or prepared to utilize

Short answer: 1. What must be installed or prepared to utilize Windows Remote Management (WinRM) on a Windows Server 2012 R2? 2. What is the PowerShell command to check the status of Windows Remote Management (WinRM)? 3. ...

Question summary using an organization of your

Question: Summary: Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-r ...

This subject is computer architecture organizationdraw a

This subject is computer Architecture organization Draw a flowchart showing the steps for a CPU program that uses programmed I/O to send a string consisting of 10 characters to a printer connected through a UART interfac ...

The following few machines are given informal

The following few machines are given informal descriptions. Decide whether they are of CISC or of RISC design, and provide a short description of why. a) Machine A has over 300 instructions, many of which are executed at ...

What are the minimum and maximum values in decimal if an

What are the minimum and maximum values (in decimal) if an 8-bit binary number is given unsigned and two's complement formats?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As