Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Wireless Network Continuing with your course project, create a 4- to 5-page Micr

ID: 3674299 • Letter: W

Question

Wireless Network

Continuing with your course project, create a 4- to 5-page Microsoft Word document in response to the following:

Plan a wireless network for the business.

Discuss the security of the wireless network and suggest the best practices for the network.

Support your responses with examples.

Cite any sources in APA format.

Below are the specifications for the organization:

Locations: Five metropolitan geographic urban location; each location has 120 users over three floors; each Floor dimensions are as follows: Length = 210 feet ft), Height = 8 Ft, and Width = 80 ft

Platforms: Multiple (Windows, Mac, Linux, and Mobile Os)

Topology: Ethernet (Copper, Fiber, and Wi-Fi)

Bandwidth: To be determine by you, the network designer, for inbound and outbound

Servers: To be determined by you, the network designer

Intranet access: IP addresses are 172.17. y.x/24, where y is each location IP segment (use any octet that you wish for each location) and x = 1 to 254

Internet access: One access using T1 Link at each location; the public IP address is 96.68.111.x, where x = 1 to 5

Remote virtual private network access for users to telecommute

Explanation / Answer

We will create a wide area network by a collection of a number of LAN'S of all the offices. Each office has a LAN which can be be created using a router and help in creating network in a single office connection multiple users in the same office to one network.Similarly all 5 offices can have their own LAN's.ALL the offices can be combines together into a single WAN by connection these LAN's(local area network).We can do this with the help of various protocols like:

Secutiy issues related to wireless networks:

The various attacks to wireless networks include:

1.Distributed denial of service attack:The main purpose of this kind of attack is usually to saturate a resource so that it is no longer available for legitimate use.The specialized software called DDS can able to block the traffic that has a legitimate content but the bad intent.

2.Man in the middle attack:In this attack the two communicating parties assume they are directly communicating with each other, but the information is being sent to a man in the middle who forwards it to the proposed recipient.This person in the middle can misuse the information and input his own code or modify it before sending it further here.

3.WEP cracking : All the attackers have to determine a WEP key and it can be done in a fraction of a second. Once the attacker determined the key, then he can get into the system.As a result of this they can monitor the traffic or can take the administrator's role and change the settings.


4.WPA cracking

The WPA is the one which uses the security mechanism is known as temporal key integrity protocol. There are ways that the experienced and determined attacker can also decrypt the incoming traffic to the computers using WPA with the TKIP. It is not a secure option anymore and make use of the WPA2 with the AES for the secure network.

Various ways to mitigate the attacks:

1.Intrusion detection systems:These detect intuders who are not authenticated users of a given network who might enter wrong password more than three times.They are detected immediately and removed instantly.

2.Training and awareness

It is considered as the most convenient and comfortable form of security. User training is considered as the least expensive and most effective mitigation techniques. It is the best way to keep the users from making mistakes that will lead to a success of the social engineering attack is educating how to handle them. It is important to know the procedures, protocols and policies for the security of a network. Or else training users give a real advantage of the relatively low cost.

3.Antivurus softwares:to remove virus over the network if detected which might be spread by an unauthenticated user.

4.Firewall:This filters the traffic and sends the traffic further if some rules are satisfied.If they are not the traffic is blocked.

5.Continous packet inspection and monitoring of traffic to and fro from the network.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote