MN603 Wireless Networks And Security

MN603 Wireless Networks And Security

Free Samples

MN603 Wireless Networks And Security

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MN603 Wireless Networks And Security

1 Download8 Pages / 1,952 Words

Course Code: MN603
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia


The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

Apply and evaluate wireless network security techniques in consideration of ethical implications;
Design and implement secure enterprise wireless networks.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who
wishesto be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator. This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

Design a secure enterprise wireless network, employing Boson Netsim.
Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:
Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.
Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for different phases of authentication, association, de-association, and pinging each other’s terminals on the same network

Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network
Design secure enterprise wireless network
Design a secure enterprise wireless network, employing Boson Netsim.
Analyse secure enterprise wireless network
Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:


Primary objective of this project is to make a protected endeavour wireless network, as it is the basic requirement for the current network engineering. This network is utilized to help the cell phones and provides high network availability. The enterprise network security is the insurance of a network that associates with the frameworks, centralized servers, and the devices such as the cell phones and tablets inside the endeavour. The organizations, colleges, governments, and different other areas utilizes the job of the networks to help in interfacing data with their clients and individuals. As the network develops in size, many-sided quality, security concerns likewise increases. Utilizing the dynamic WIDS and WIPS empowers arrangement of overseers to make and implement wireless security, by checking, identifying, and relieving the potential dangers. Both, WIDS and WIPS will identify and naturally detach the unapproved devices. WIDS provides the capacity to naturally screen and distinguish the nearness of any unapproved, bad access points, whereas the WIPS conveys the counter measures for recognizing the dangers. Some regular dangers regulated by WIPS are, maverick access, misconfigured passages, customer misassociation, unapproved affiliation, man-in-the-middle attacks, unprepared networks, Media Access Control, honeypot and desirable twin attacks, and denial of-services assaults.
This task utilizes the two servers namely, RADIUS server and WPA2 Server. These two server are utilized to deliver safe wireless network. The WPA2 incorporates the utilized wireless verification of client’s tasks interactions for arrangement administrations. The RADIUS server designs the procedure of two accesses that are utilized for data encryption. The client’s working arrangement is related to designing the procedure encryption and settings of IEEE802.1x. At last, it associates safe working wireless network. The utilization of WPA2 and RADIUS server is utilized for developing protected wireless network for the enterprise. Then, the business wireless plan for the protected tasks are worked on, by utilizing Boson Netsim. At that point, differentiate and actualize the safe working of the wireless network. Finally, test the developed network, by utilizing the ping network present on the Boson Netsim. All the above mentioned aspects will be broken down and exhibited in detail.
Ethical Implications
Moral issue on the remote system realization can come to everybody for accommodation and has less than ideal setup. The remote system accessibility of various moral issues are like, insurance of security for the brisk consuming, and the majority of the points to design the destiny of predictable remote system on the world. The primary issue is, access to the territory of individual sifting information. Let us consider the issues of the region security of the customer or the zone of a section. With everything taken into account, breaking to passages is used to go with things like, get to the Adult locales or to fill contamination in the system, to take the monetary adjustments of the money taking and the experience of hacking [1].  This gives the dynamic encryption of the abnormal state security given for various key encryptions like, shared key authentication, open system authentication and unified confirmation. In Shared key Authentication, the check get to, is done by the response to a test with the entry which is known as test and response. In Open system Authentication, the procedure SSID is used for Authentication if the SSID is known, access can be surrendered. In Unified confirmation, a server is used for the approval if the centre point is affirmed then nobody can get to the system.
Secure Enterprise Wireless Network Design
The Secure Enterprise Wireless network’s design is illustrated below.
The creation of the enterprise security network that interfaces the structures, unified servers, and contraptions like mobile phones and tablets inside an undertaking is represented. Organizations, schools, governments, and diverse components use tasks of the systems to help interface their customers’ information to the connected people. As systems developed in size are multifaceted in nature, the security concerns are high. Such as the wired systems, which have solid security devices. For instance, firewalls, intrusion detection system, content channels and antivirus and against malware area program remote systems give remote access that can be defenceless against access [2]. Since they may don’t have indistinct securities from the wired systems, the remote systems and devices can respect the accumulation of assaults expected to the big businesses which must be organized. An entrance to the aggressors an undertaking system through the remote access to coordinate pernicious activities including packet sniffing, secret key stealing, and man-in-the-middle assaults. These assaults could postpone the direct methodology, or even harm the working structure. Consider these additional acknowledged methods to help guard the tasks of the Wi-Fi systems:

Send WIDS and a remote interruption counteractive action organize (WIPS) on each system.
Guarantee existing equipment is free from vulnerabilities.
Utilize existing tools that can be securely masterminded [3].
Guarantee all apparatus meets (FIPS) 140-2 for encryption and consistence.
Guarantee consistence with the most current National Institute of Standards and Technology.
Set up the multifaceted affirmation for accessing your system. In case this isn’t possible, consider other secure methods which suggests a single shared mystery word, for instance, Active Directory advantage approval or an elective technique to make multifaceted affirmation into your system.
Utilize Extensible Authentication Protocol-Transport Layer Security support based procedures to stay the entire affirmation trade and correspondence.
Utilize Counter Mode Cipher Block Chaining Message Authentication Code Protocol, a type of AES encryption used by the Wireless Application Protocol 2. In case possible, use more incredible encryption progressions that conforms to FIPS 140-2 as they are created and embraced.
Actualize a guest Wi-Fi mastermind that is separate from the standard compose. Use switches with various SSIDs or attract distinctive remote detachment features to ensure that legitimate information isn’t available to guest mastermind development or by interfacing with various remote separation features.

Analysis of Secure Enterprise Wireless Network
Verification and Authorization
The business wireless system development task is proposed of WPA endeavour standard, which is generally called as WAP-802.IX. It is used as an authenticator of the supplicant and for server approval. The supplicant is a client contraption that is responsible for making sales to the WLAN, by offering accreditations to the authenticator. The enterprise access to the authenticator is a typically interface with the server confirmation, through RADIUS or IAS realized tradition, to affirm the approval of the client. The assault includes deriding the targeted system and gives better banner than the client in genuine section, with a particular true objective to play out a Man-In-The-Middle assault among the clients and the system establishment. Directly the TLS tunnel is adequately secure and isn’t easily attackable [4].
The basic strategies for the data and the certification uncovered to the customer of unapproved encoding sums transmitting to essentially indistinct between the transmit wired system of the course encryption data is irrelevant without the approval. As, it could be an unapproved customer on the system themselves gives the key of the data that is disentangle [5].
The wireless system however indicates the air bundles of the data are caught, viably by vindictive of changed customers. The systems are highly unprotected against the attacks of data. In any case, that the best approach used is the wired systems present strategies of the parcels.
The wired system expected the attacker related to the system, by one means or another, before dispatching such a trap is physically connected wireless systems, an antivirus inside the system limits the entry of the trap. For example, strike.
Implementation of Secure Enterprise Wireless Network
The implementation of secure enterprise wireless network consists of the following aspects.
To expand system security, automated software updates must be empowered in every single PC and system devices. Typically, the firmware and working frameworks consequently introduce the imperative updates [6].
Make use of a firewall that could keep the hackers away from accessing the users’ system. Firewall controls and channels all the system correspondences. Actualizing other venture security arrangements alongside the firewalls can separate systems, to keep certain information stream [7].
Your PCs can get infected from spam, USBs, CDs and by the documents downloaded from the Internet. As there are various new viruses that are introduced each day, thus antivirus software must be refreshed occasionally. Antivirus helps to recognize the virus and in some cases it evacuates the virus too. As indicated by the experience of big business organize security organization experts; there are various types of antivirus available in the market.
Utilize IDS-IPS. IDS, IPS provides organize security benefits that empowers the interruption identification and interruption counteractive actions. IDS/IPS proactively recognizes the complex activity [8]. VLAN is a technique for making free sensible systems inside the PC’s set up. The PC system can have different virtual systems. VLAN is one of the critical venture set up security arrangements that has gaps in system gatherings of clients in a genuine physical system, into legitimate fragmented systems.
An entrance control rundown or ACL is used for executing the legitimate security. ACL is one of the venture established security arrangement that can help to decide the fitting access consents for the system assets. ACL channels arranges the activity and just permits the organize movement in some conditions.
Actualize the network security solutions, for example, IPsec (Internet Protocol Security) for encryption. IPsec is an arrangement of conventions that are utilized for secure interchanges at the system layer and at the vehicle layer such as both TCP and UDP. IPsec helps in verification and encryption of information bundles [9].
Introduce RADIUS, TFTP servers relying upon the business prerequisites with the other venture established security administrations and arrangements. Empower the logs server, which will empower you to record all the system movements.
The objective of this project is successfully makes the protected working wireless network, as it is the basic requirement for the current network engineering. This network is utilized to help the cell phones and provides high network availability. As the networks develop in size and various many-sided quality and security concerns relatively increases. It is believed that utilizing the dynamic WIDS and WIPS empowers arrangement of overseers to make and implement wireless security, by checking, identifying, and relieving the potential dangers. It is further noted that RADIUS and WPA2 Servers are used for this task, for safe wireless network. It is mainly associated to provide safe working wireless network. At last, the developed network is tested with the help of ping network present on the Boson Netsim.
[1]”Securing Enterprise Wireless Networks | US-CERT”,, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[2]”Wireless Security: How to Deploy WPA2-Enterprise”,, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[3]”Enterprise wireless LAN security: 802.11 and seamless wireless roaming”, SearchNetworking, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[4]”Securing Your Wireless Network”, Consumer Information, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[5]”Deploying WPA2-Enterprise Wi-Fi Security in Small Businesses”, TechGenix, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[6]E. Geier, “5 Ways to Secure Wi-Fi Networks”, Network World, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[7]”How to implement network security in enterprise network?”, Information Security Newspaper, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[8]”Wireless Networks Security Privacy And Ethical Issues Computer Science Essay”, UKEssays, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[9]J. Geier, “Wireless LAN Implications, Problems, and Solutions > Security Vulnerabilities”,, 2018. [Online]. Available: [Accessed: 02- Oct- 2018].
[10]Y. Xiao, X. Shen and D. Du, Wireless network security. New York: Springer, 2011.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 8 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Wireless Networks And Security. Retrieved from

“Wireless Networks And Security.” My Assignment Help, 2021,

My Assignment Help (2021) Wireless Networks And Security [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Wireless Networks And Security’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Wireless Networks And Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.


Password: possesses a talented team of assignment help tutors, who work round the clock to provide comfort to students, who wonder ‘can someone assignment writing services at a cheap price’. With, students don’t need to waste their time in searching ‘help me with my assignment’, instead, they can convey their requirements and receive needed help with assignment writing. Our popular servicers include math assignment help, accounting assignment help, marketing assignment help, etc.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

Powered by

× WhatsApp Us