Skip to main content

All work (including CDs etc) needs to be secured in a plastic envelope or a folder

TEESSIDE UNIVERSITY
SCHOOL OF COMPUTING
ICA SPECIFICATION

Module Title:
Networks and Systems Administration
Module Leader: Biju ISSAC
Module Code: COM2057
Assignment Title:
Design of a Secure Campus Wireless Network
Deadline Date: 27/07/2018
Deadline Time: 23:59
Submission Method: Online (through
Blackboard)
& Hard Copy to SCA

Central Assignments Office (Middlesbrough Tower M2.08) Notes (if it is relevant):
• All work (including CDs etc) needs to be secured in a plastic envelope or a folder and clearly marked with
the student name, number and module title.
• An Assignment Front Sheet should be fully completed before the work is submitted.
Online Submission Notes:
• Please follow carefully the instructions given on the Assignment Specification
• When an extension has been granted, a fully completed and signed Extension form must be
submitted to the SCM Reception.
FULL DETAILS OF THE ASSIGNMENT ARE ATTACHED
INCLUDING MARKING & GRADING CRITERIA

Teesside University School of Computing
– 2 –
COM2057 Networks and Systems Administration ICA 1
Design of a Secure Campus Wireless Network
NOTE: This ICA counts toward 30% of your overall marks.
Teesside University School of Computing
– 3 –
This question involves designing a secure wireless campus network for York St John University,
UK as shown in the *campus map shown. Write a report with the appropriate details (1500 words
max, but flexible). You can assume that a Wired LAN with servers, clients, switches, router and
Internet connection is fully in place in the campus. NOTE: Please answer the questions based on
the marks allocated to it. *The link:
https://ift.tt/2AxAcHg
1. You need to analyze the campus plan and the networking scenario well (say, by assuming the
building dimensions, the structure, the number of floors etc). Assumptions on dimensions are
acceptable, as long as they are reasonable. You can use Google map, if needed. HINTS: A table
of buildings with symmetrical dimensions (e.g. Build Name – 100 m x 40 m; with say scale 1
cm = 25 m) and possible area covered can be listed. (5 marks)
2. Your design should cover the campus with as much wireless access as possible with a
reasonable cost. All the buildings should be networked. How do you extend the wireless access
to these 22 buildings? Include the details in your design. HINTS: Discuss your network plan
with possible number of access points and their possible placement. Show the position of
Access Points on the campus map (as a dot and a thin circle around it, with different channels
color coded), showing the radio coverage overlaps (say 15 to 20%). Remember an access point
can cover around 30 to 40 meters well. (10 marks)
3. Draw the detailed network diagram of your recommended solution, with different
views/segments of network connections in different buildings. Come out with a detailed
design solution that is a secure wireless network. Do support your design with reasons and
justifications. HINTS: You need to show the detailed plan of only one floor of any building. In
this figure you can show how the access points are connected to a switch on the LAN (with say
some portion of the network), along with any other installations like Wireless Amplifiers (or
range extenders which has pros and cons), EAP RADIUS authentication server etc. You can
show that for at least 5 buildings, though not all of them. (10 marks)
4. With the design you are proposing, what could be the possible security attacks? Since various
other parking lots can be around these buildings, do you foresee any problems? Come out with
all possible attacks on a wireless network. HINTS: Look into war-driving/parking lot attack
and spoofing attacks. Focus more on attacks on wireless networks (WiFi), and not general
network attacks. Use NetSpot Free edition (https://ift.tt/2mrK3TN) or
Vistumbler (https://ift.tt/1OJfHRW) in the lab or your home to get the screen shot of
wireless access points and comment on what can be seen. Use Microsoft Network Monitor or
Wireshark to capture packets in lab and use screen shots and comments to support your
answer (10 marks).
5. Briefly explain on the countermeasures against the security attacks that you explained in the
previous question. Your design should include such solutions. Justify the use of security
technologies that you propose. HINTS: Briefly explain technologies like WPA, WPA2,
TKIP/CCMP, AES, RADIUS authentication, VPN (for external connection) etc. (5 marks)
6. Show the detailed cost of implementing your wireless solution, in a table format. HINTS:
Research on the costs of access points, switches, antennas, cables, authentication server if any
etc. (5 marks)

Teesside University School of Computing
– 4 –
7. Show all references used in the report, using appropriate referencing. HINTS: Harvard
referencing can be used and make sure the format is fully followed. (5 marks)
Marking/grading criteria

Marking Criteria
90%-100%
Exceptional work with presentation of a very high standard for the logical design and
the report
There is coherence of ideas and demonstration of a thorough knowledge and
understanding of network infrastructure, security etc. supported by wide reading
with very effective use of source material and accurate referencing. Optional:
Discussion on ethical and legal issues in relation to security.
80%-89%
Outstanding work with presentation of a very high standard for the logical design
and the report
There is of ideas and demonstration of a thorough knowledge and understanding
of network infrastructure, security etc. supported by wide reading with effective use
of source material and accurate referencing. Optional: Discussion on ethical and legal
issues in relation to security.
70%-79%
Extremely good work with presentation of a high standard for the logical design
and the report
There is coherence of ideas and demonstration of thorough knowledge and
understanding of network infrastructure, security etc. supported by reading with use
of source material and accurate referencing. Optional: Discussion on ethical and legal
issues in relation to security.
60%-69%
The work is well presented and coherently structured for the logical design and
the report
There is evidence of a sound knowledge and understanding of network
infrastructure, security etc. Most material used has been referenced /
acknowledged. Optional: Discussion on ethical and legal issues in relation to security.
50%-59%
Presentation is acceptable but with some errors
There is knowledge and understanding of network infrastructure, security etc.. Some
use of relevant source material. Optional: Discussion on ethical and legal issues in
relation to security.

Teesside University School of Computing
– 5 –

40%-49%
Presentation is acceptable but attention to structure and style is required. The
content is relevant but largely descriptive
There is evidence of a reasonable level of knowledge and understanding but there is
limited use of source material to support the design. Optional: Discussion on ethical
and legal issues in relation to security.
30%-39% – Fail
The work is poorly structured and presented
Some material is irrelevant. Content is based largely on taught elements with very
little evidence of reading around the topic
29% and below – Fail
The work is very poorly structured and presented. Much material is irrelevant
Content is based almost entirely on taught elements with very little evidence of any
purposeful reading around the topic

 

The post All work (including CDs etc) needs to be secured in a plastic envelope or a folder appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH