TEESSIDE UNIVERSITY
SCHOOL OF COMPUTING
ICA SPECIFICATION
Module Title: Networks and Systems Administration |
Module Leader: Biju ISSAC |
Module Code: COM2057 | |
Assignment Title: Design of a Secure Campus Wireless Network |
Deadline Date: 27/07/2018 |
Deadline Time: 23:59 | |
Submission Method: Online (through Blackboard) & Hard Copy to SCA |
Central Assignments Office (Middlesbrough Tower M2.08) Notes (if it is relevant):
• All work (including CDs etc) needs to be secured in a plastic envelope or a folder and clearly marked with
the student name, number and module title.
• An Assignment Front Sheet should be fully completed before the work is submitted.
Online Submission Notes:
• Please follow carefully the instructions given on the Assignment Specification
• When an extension has been granted, a fully completed and signed Extension form must be
submitted to the SCM Reception.
FULL DETAILS OF THE ASSIGNMENT ARE ATTACHED
INCLUDING MARKING & GRADING CRITERIA
Teesside University School of Computing
– 2 –
COM2057 Networks and Systems Administration ICA 1
Design of a Secure Campus Wireless Network
NOTE: This ICA counts toward 30% of your overall marks.
Teesside University School of Computing
– 3 –
This question involves designing a secure wireless campus network for York St John University,
UK as shown in the *campus map shown. Write a report with the appropriate details (1500 words
max, but flexible). You can assume that a Wired LAN with servers, clients, switches, router and
Internet connection is fully in place in the campus. NOTE: Please answer the questions based on
the marks allocated to it. *The link: https://ift.tt/2AxAcHg
1. You need to analyze the campus plan and the networking scenario well (say, by assuming the
building dimensions, the structure, the number of floors etc). Assumptions on dimensions are
acceptable, as long as they are reasonable. You can use Google map, if needed. HINTS: A table
of buildings with symmetrical dimensions (e.g. Build Name – 100 m x 40 m; with say scale 1
cm = 25 m) and possible area covered can be listed. (5 marks)
2. Your design should cover the campus with as much wireless access as possible with a
reasonable cost. All the buildings should be networked. How do you extend the wireless access
to these 22 buildings? Include the details in your design. HINTS: Discuss your network plan
with possible number of access points and their possible placement. Show the position of
Access Points on the campus map (as a dot and a thin circle around it, with different channels
color coded), showing the radio coverage overlaps (say 15 to 20%). Remember an access point
can cover around 30 to 40 meters well. (10 marks)
3. Draw the detailed network diagram of your recommended solution, with different
views/segments of network connections in different buildings. Come out with a detailed
design solution that is a secure wireless network. Do support your design with reasons and
justifications. HINTS: You need to show the detailed plan of only one floor of any building. In
this figure you can show how the access points are connected to a switch on the LAN (with say
some portion of the network), along with any other installations like Wireless Amplifiers (or
range extenders which has pros and cons), EAP RADIUS authentication server etc. You can
show that for at least 5 buildings, though not all of them. (10 marks)
4. With the design you are proposing, what could be the possible security attacks? Since various
other parking lots can be around these buildings, do you foresee any problems? Come out with
all possible attacks on a wireless network. HINTS: Look into war-driving/parking lot attack
and spoofing attacks. Focus more on attacks on wireless networks (WiFi), and not general
network attacks. Use NetSpot Free edition (https://ift.tt/2mrK3TN) or
Vistumbler (https://ift.tt/1OJfHRW) in the lab or your home to get the screen shot of
wireless access points and comment on what can be seen. Use Microsoft Network Monitor or
Wireshark to capture packets in lab and use screen shots and comments to support your
answer (10 marks).
5. Briefly explain on the countermeasures against the security attacks that you explained in the
previous question. Your design should include such solutions. Justify the use of security
technologies that you propose. HINTS: Briefly explain technologies like WPA, WPA2,
TKIP/CCMP, AES, RADIUS authentication, VPN (for external connection) etc. (5 marks)
6. Show the detailed cost of implementing your wireless solution, in a table format. HINTS:
Research on the costs of access points, switches, antennas, cables, authentication server if any
etc. (5 marks)
Teesside University School of Computing
– 4 –
7. Show all references used in the report, using appropriate referencing. HINTS: Harvard
referencing can be used and make sure the format is fully followed. (5 marks)
Marking/grading criteria
Marking Criteria |
90%-100% • Exceptional work with presentation of a very high standard for the logical design and the report • There is coherence of ideas and demonstration of a thorough knowledge and understanding of network infrastructure, security etc. supported by wide reading with very effective use of source material and accurate referencing. Optional: Discussion on ethical and legal issues in relation to security. |
80%-89% • Outstanding work with presentation of a very high standard for the logical design and the report • There is of ideas and demonstration of a thorough knowledge and understanding of network infrastructure, security etc. supported by wide reading with effective use of source material and accurate referencing. Optional: Discussion on ethical and legal issues in relation to security. |
70%-79% • Extremely good work with presentation of a high standard for the logical design and the report • There is coherence of ideas and demonstration of thorough knowledge and understanding of network infrastructure, security etc. supported by reading with use of source material and accurate referencing. Optional: Discussion on ethical and legal issues in relation to security. |
60%-69% • The work is well presented and coherently structured for the logical design and the report • There is evidence of a sound knowledge and understanding of network infrastructure, security etc. Most material used has been referenced / acknowledged. Optional: Discussion on ethical and legal issues in relation to security. |
50%-59% • Presentation is acceptable but with some errors • There is knowledge and understanding of network infrastructure, security etc.. Some use of relevant source material. Optional: Discussion on ethical and legal issues in relation to security. |
Teesside University School of Computing
– 5 –
40%-49% • Presentation is acceptable but attention to structure and style is required. The content is relevant but largely descriptive • There is evidence of a reasonable level of knowledge and understanding but there is limited use of source material to support the design. Optional: Discussion on ethical and legal issues in relation to security. |
30%-39% – Fail • The work is poorly structured and presented • Some material is irrelevant. Content is based largely on taught elements with very little evidence of reading around the topic |
29% and below – Fail • The work is very poorly structured and presented. Much material is irrelevant • Content is based almost entirely on taught elements with very little evidence of any purposeful reading around the topic |
The post All work (including CDs etc) needs to be secured in a plastic envelope or a folder appeared first on My Assignment Tutor.
-
- Assignment status: Resolved by our Writing Team
- Source@PrimeWritersBay.com
Comments
Post a Comment