Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are the technical consultant to Albert school in Sydney that wants to provide cost effective wireless access. Albert school has two branches located in

You are the technical consultant to Albert school in Sydney that wants to provide cost effective
wireless access. Albert school has two branches located in East Sydney and West Sydney.
In Albert school currently there is no provision for wireless access to the campus network and
Internet. The students and staff have made repeated demands to the school principal to have
wireless access to the Albert school network and Internet. As the school often gets visitors and
parents so this will also allow them to gain access to the wireless network by using their own
laptop computer. The schools principal also is eager to have a wireless network that should
provide support for visitors and secure access to a wide variety of multimedia resources for the
staff.
Albert schools East Sydney branch and West Sydney branch also needs to be connected with
each other via the Internet. Both branches have three (3) different departments (Admin, Finance
and Academic Resource department) with 75 wireless PCs each. Staffs should be accessible from
any branch using appropriate networking technologies. The reliability of their file and web
servers is of high importance. East Sydney network is 10.10.128.0/20 and West Sydney network
is 20.20.128.0/20. You need to subnet and determine range of IP addresses for each department
in the 2 branches of the Albert school.
One of the security issue faced by the school is that signal transmitted by the access point (AP)
could also be transmitted outside the school building. This could then be used by hackers to gain
access to the schools internal network and resources. Another issue that may arise in the event
of poor security measures is that the visitors to the school could access the resources of the staff.
Rogue APs is also a concern to the school principal as well as the type of content accessed. The
principal also wants the details of the student(s) who violate the schools policies with regards
the usage policy to be immediately logged so that after auditing action can be taken against the
offending student(s). Some of the students also use USB mobile broadband modem to bypass the
schools network access control and content access policies. This may pose as a security risk as
well.
The IT team has recommended you to use the RADIUS (802.1x protocol) server for
authentication purposes in the school.
You are also faced with the challenge of the architecture that you need to have for Albert schools
branches. Cost of the overall network including maintenance needs should be kept as low as
possible because of the budgetry constraints of the Albert school.
Furthermore, within East Sydney branch IoT devices will be connected to the WLAN that
enables the users to control the IoT things through wireless technology. For this you will use the
IoT components offered by the Cisco Packet Tracer. The users should also be able to control the
IoT devices i.e. things when they are inside and outside home (remote access).
As a wireless network engineer your task is to prepare a report with a detailed design and
simulation (using Packet Tracer) of the network design as per the requirement for its
implementation. You are required to have the following sections in the report:
1. Introduction of the contents of the report as well as the report structure.
BN303 Wireless Networks and Security Page 3 of 5
Prepared by: Dr Vinod Mirchandani Moderated by: Dr Sanjeeb Shrestha April 2024
2. Discuss the ethical implications in the vulnerabilities of wireless network technologies.
3. Use the network addresses given in the above case study to subnet and design a secure
enterprise wireless network in both the branches of the Albert school.
4. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server,
considering the following CIAAA elements:
a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization
5. Implementation of the designed subnetworks of part 3 above to form a secure enterprise
wireless network using WPA2 and the RADIUS server.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions