Use of a WLAN Tools in an enterprise setting. its networking security assignment and need someone who is expert in network security.thanks

This assignment requires you to perform the analysis on a real large-scale wireless network.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

To fulfill the assignment tasks, you will collect data on access points and evaluate security

situations. We recommend to use the WLAN sniffing tools (e.g., Netspot, Acrylic, Android app

etc.

), however you will have the choice to choose one of the best suitable tools. Data

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

collection must include technology used, deployed network types, channels, data rates and

interference with other networks, security protocols etc. A technical report is to be prepared

according to the specification below. Your report should include the following:

1. Record WLAN access points at a public place (such as at a shopping centre, public

place, home network etc. of your choice).

2. Gather technical information about wireless networks at three different locations

with minimum 10 APs for each location.

3. Test the WLAN sniffing tool and report your observation and recommend how to

secure and/or manage

WLAN.

Your report should include:

a. Tables for each location containing all technical details about WLAN setup

from your findings.

b. Screenshots (as an evidence) and detail explanation to report working

mechanism (the step by step process) of the identified technique.

c. Explain the use (evaluation) of the technique to secure and/or manage

WLAN.

i. Discuss dual bands and its advantages

ii. Security implications

iii. Others aspect such as special network, multiple SSIDs and vendors

etc.

Prepared by: Dr Frank Jiang Moderated by: Dr Imran Ali Jokhio December, 2017

Assessment Details and Submission Guidelines

Trimester T3 2017

Unit Code BN303

Unit Title Wireless Networks & Security

Assessment Type Type A Individual Submissio

n

Assessment Title Use of a WLAN Tools in an enterprise setting

Purpose of the
assessment (with
ULO Mapping)

b. Utilise standards-based technologies used in various networks.
c. Test and compare the performance of various wireless networks.

Weight 20%

Total Marks 60

Word limit 1500

Due Date Week 8 Sunday 11:55pm i.e. 14th of January 2018

Submission
Guidelines

 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.

 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.

 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.

Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment

Academic
Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness

of

the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.

http://www.mit.edu.au/about

http://www.mit.edu.au/about

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure

BN303 Wireless Networks and Security Assignment 1 Page 2 of 4

Prepared by: Dr Frank Jiang Moderated by: Dr Imran Ali Jokhio December, 2017

Description of the Assignment

This assignment requires you to perform the analysis on a real large-scale wireless network.
To fulfill the assignment tasks, you will collect data on access points and evaluate security
situations. We recommend to use the WLAN sniffing tools (e.g., Netspot, Acrylic, Android app
etc.), however you will have the choice to choose one of the best suitable tools. Data
collection must include technology used, deployed network types, channels, data rates

and

interference with other networks, security protocols etc. A technical report is to be prepared
according to the specification below. Your report should include the following:

1. Record WLAN access points at a public place (such as at a shopping centre, public

place, home network etc. of your choice).
2. Gather technical information about wireless networks at three different locations

with minimum 10 APs for each location.
3. Test the WLAN sniffing tool and report your observation and recommend how to

secure and/or manage WLAN. Your report should include:
a. Tables for each location containing all technical details about WLAN setup

from your findings.
b. Screenshots (as an evidence) and detail explanation to report working

mechanism (the step by step process) of the identified technique.
c. Explain the use (evaluation) of the technique

to secure

and/or

manage

WLAN.
i. Discuss dual bands and its advantages

ii. Security implications
iii. Others aspect such as special network, multiple SSIDs and vendors

etc.

4. Submit a one (1) minute video along with audio to demonstrate your
implementation (the tutor must be able to recognize you in the video). Your video
file format must be compatible with video playing software available in MIT labs.
Failure to submit the video (using Moodle submission link) will result a failing
grade.

BN303 Wireless Networks and Security Assignment 1 Page 3 of 4

Prepared by: Dr Frank Jiang Moderated by: Dr Imran Ali Jokhio December, 2017

Marking aspects:

Marks are allocated as indicated on each question, taking the following aspects into
account:

Criteria Description Marks

Evaluation Explain the use of the
technique

10

Sophisticati

o

n and

effectiveness

Sophistication and
effectiveness

to secure

and/or

manage

WLAN

10

Explanation Description/explain how to
use the technique

10

Report structure Inadequate

structure,

careless presentation, poor
writing

5

Reference style (IEEE) Proper referencing if
required

5

Video along with audio
Demonstration

Successful video
demonstration to support
submitted report.

20

Marking Rubric for Exercise Answers

Grade
Mark

HD
80%+

D
70%-79%

CR
60%-69%

P
50%-59%

Fail
< 50%

Excellent Very Good Good Satisfactory Unsatisfactory

Evaluation

/10

Logic is clear

and easy to

follow with

strong

arguments

Consistency

logical and

convincing

Mostly

consistent

and
convincing

Adequate

cohesion and

conviction

Argument is

confused and

disjointed

Sophisticati
on and

effectivenes

s

/10

The

presented

solution

demonstrated

an extreme

degree of

sophistication

and
effectiveness
to secure

The presented

solution
demonstrated

a high degree

of
sophistication
and
effectiveness
to secure

The

presented
solution

demonstrat

ed an

average

degree of

sophisticati

on and
The
presented
solution

demonstrate

d a low

degree of

sophisticatio

n and
effectiveness
The presented
solution
demonstrated

a poor degree

of
sophistication
and
effectiveness
to secure

BN303 Wireless Networks and Security Assignment 1 Page 4 of 4

Prepared by: Dr Frank Jiang Moderated by: Dr Imran Ali Jokhio December, 2017

and/or

manage WLAN
and/or
manage WLAN
effectivenes

s to secure

and/or
manage
WLAN
to secure
and/or
manage
WLAN
and/or
manage

WLAN.

Explanation

/10

All elements

are present

and

well

integrated.

Components

present with

good cohesion

Component

s present

and mostly

well

integrated

Most

components

present

Lacks

structure.

Reference

s

tyle

/5

Clear styles

with excellent

source of

references.

Clear

referencing/

style

Generally

good

referencing

/style

Unclear

referencing/s

tyle
Lacks

consistency

with many

errors

Report

structure

and report

presentatio

n
/5

Proper writing.

Professionally

presented

Properly

written, with

some minor

deficiencies

Mostly

good, but

some

structure or

presentatio

n problems

Acceptable

presentation

Poor

structure,

careless

presentation

Video of
Demonstrat
ion
/20

Successful
completion
and well
understanding
of the
outcome.

Successful
completion
and
understanding
of the
outcome.

Partially
completed
and
partially
understandi
ng of the
outcome.

Partially
completed
and did not
understandin
g of the
outcome.

Not completed
and did not
understanding
of the
outcome.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER