Review topics covered in lecture hours


Methodology: Review topics covered in lecture hours, from textbook, reference books plus online research, to conduct a comprehensive study about wireless network security implementation at home. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic: you are required to back up your findings with supporting evidence.
Guidelines:
1. if the last 2 digit number of your student ID is less than 9, then assume the number of devices need to be connected would be the SUM of your last 2 digits of your student ID PLUS 80; or if your 2 digit number is larger than 9, ADD 30 to your last 2 digit number would be the total number of devices need to be connected; design your home wireless network with security in mind and explain your rational behind your design;
2. Outline the process you approach the network design, identify netmask, number of usable IP address; IP address range, subnet and broadcast address for each subnet;
3. What are your router/AccessPoint manufacture's default settings like subnet, gateway address, default admin account password? How are you going to modfiy them?
4. Per Internet Protocol stack, layer by layer, elaborate security measures you would like to implement to protect your wireless network and why, for example, enable access control per MAC addresses filtering and constant firmware update at link layer; briefly explain what is stealth mode, what is TCP/UDP port scan, how to dtermine an invalid source/destination IP address, what are packet flood (SYN/ICMP/other) and how to protect your network from such attacks;
5. Roles of DHCP, NAT, DNS, or other protocols; including any protocol control based firewall; comparison of password encryption protocols such as WEP, WPA/WPA2, et al; conduct your online research to see what you can do to secure your wireless network at physical layer beyond physical access restriction;
Submission: Write a project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above questions accordingly.
Notes: a). It is acceptable to conduct your research and quote journal articles with supporting evidence but you SHOULD indicate the author(s) of your source, title, publisher and date, along with page numbers.
b). NO content from BLOGS, Forums, or from your classmates are acceptable!!
c). ** ABSOLUTELY ZERO TOLERANCE to PLAGIARISM !!!
d). There will be a LATE PENALTY, 5 points for every 2 hours and NO later than 12 hours !
e). email yur project report to me ONLY.
If any question or issue about this project assignment, please raise them during the Q&A session in the lecture meeting.  

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Review topics covered in lecture hours
Reference No:- TGS086889

Expected delivery within 24 Hours