Wireless Network Security Design for a University Campus: BN303 Report

Verified

Added on  2025/05/03

|14
|2284
|327
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ACS - BN303
WIRELESS NETWORKS AND SECURITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Abstract.......................................................................................................................................................3
Introduction.................................................................................................................................................3
Analyze........................................................................................................................................................6
Design..........................................................................................................................................................6
Evaluate/ Justification...............................................................................................................................11
Conclusion.................................................................................................................................................12
Reference..................................................................................................................................................12
Figure 1 Access Point...................................................................................................................................5
Figure 2 Router............................................................................................................................................5
Figure 3 Repeaters.......................................................................................................................................6
Figure 4 Unified Cisco WLAN Design............................................................................................................9
Figure 5 Secure WLAN Architecture Diagram Design................................................................................10
Figure 6 Campus WLAN network design....................................................................................................11
Figure 7Network Detection.......................................................................................................................12
Document Page
Abstract
Aims and objectives
WLAN also called wireless local area network is a method for distribution of network wirelessly for two
or more than devices which can use high-level sophisticated radio waves. It allows the wireless network
coverage area to the user by which a user can connect with the network during mobilizing in home or
offices. WLAN term is confusing because of the Wi-Fi trademark. Since it is not a technical term but it’s a
superset of standard IEEE802.11. Moreover, every Wi-Fi devices can’t be certified by alliance
certification.
Since the implementation of the wireless local area network in any work culture would be beneficial but
it should be installed with high-level security including WPA and WPA2. So the installation of WLAN
network and services would also be beneficial for the university campus. So the aim of this coursework
is to design and implement a wireless network for a small campus with all required tools and skill sets.
There are several types of network breach incident happens, so the objective behind the development
of a WLAN network for purpose of evaluation of the security of WLAN network within a small campus
with the use of the excessive amount of tools and techniques. There is another objective for having a
WLAN network for the campus is authorizing only the campus student and staffs with specific
credentials to minimize possibilities of any type of unauthorized access in the campus network. It should
be secure for the internal workforce and students by offering them a wireless network in the classroom,
library, and cafeteria or anywhere on the campus.
Document Page
Introduction
History
Professor Norman Abramson was the one who developed the first wireless networked computer
communication program and named it alone. It becomes operational after 1970 and combined seven
computers with the same network which are deployed on a different island to test and communicate
with a central computer that was located in Oahu Island. Initially, it was only for the places where
cabling or wiring was difficult as an alternative. But because of regular innovative processes, it becomes
true when it actually replace the traditional way by using a standard version called 802.11 and in 2009
802.11n has been added to the 802.11 to work on both 2.4 and 5 Gigahertz bandwidth with the rate of
transferring of data 600Mbit. [1]
Wireless Local Area Network Components
A Wireless LAN network consists of several types of component like traditional Ethernet Wired local area
networks. Moreover, the protocol for WLAN and Wired LAN is similar but the biggest merit occupy by
WLAN is, it does not require any support of wire.
User Device- The users commonly use the WLAN network area with the support of laptops,
mobile, PDA and etc. Use of PCs for the connectivity with wireless local area network is
beneficial due to less need of wiring. However, laptops and PDAs come with the integration of
LAN connectivity due to their portable nature. The other devices which could be used by users
are scanner, patient health monitoring equipment often use WLAN.
Radio NICs- Radio NICs is a major part of a WLAN network that is being used within a computer
or laptop to provide a wireless connection to the user. It is also termed as radio and implements
as standard 802.11. This radio card implement is necessary because it makes uses of standard
which compatible with the LAN. There are several forms of radio card like ISA, mini-PCI and etc.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Access Point- It contains a radio card which is capable to communicate with the device installed
at the user side. The software creates an access communication bridge by incorporating WLAN
and distribution side.
Figure 1 Access Point
Routers- By the name specified, it is used for transferring the packets in between various
networks. The destination for the packet has been decided by the router with the help of best
next link. A WLAN router provides built-in access interoperability functions which combine
several Ethernet networks with one single wireless network and typically it connects four ports
namely 802.11 access point or often parallel to 802.11.
Figure 2 Router
Repeaters-Access points often play a significant role in providing coverage area in a maximum
number of WLAN installation. It is a way to enhance the capability of the wireless local area
network in comparison to adding several access points.
Document Page
Figure 3 Repeaters
Antennae- Antenna in wireless network area works as omnidirectional with less gain of
transmission. All the other components of WLAN come together with omnidirectional antennae.
[2]
Outline of the report
Purpose with the installation of WLAN
Installation of wireless local area network for small sized campus
Capability to monitor possible attacks
Restrict unauthorized access
Only for student and campus workforce like the staff.
Range of WLAN should be on campus only.
With the installation of wireless network connectivity, they also wanted to address the issue of data-
transmission speed. They also wanted to implement a different type of network range on real time with
identification number and name. For identification of a network, they also propose some set of
techniques like the use of the name, SSID, security strength and the base address of concern network.
As per requirement, it is needed to develop with a secure 802.1X based network which either Cisco or it
could be Xirrus to serve more than 3000 users of the university. [3]
Analyze
Analyze the problem of providing security of the above campus network using WPA or WPA2
It totally depends on college administration to offer a network with or without having security
credentials. But one thing remembers if a network even has any type of security like WPA or WPA2 an
attacker can make a breach into the campus network. There is no way to secure the network on that
time even the admin tried to verify the network.
It is clear that WAP is not so secure. WPA concludes TKIP called temporal key integrity protocol. Fewer
than two environments WPA operate, first one is pre-sharing of keys called PSK and other is Enterprise.
Document Page
In practical enterprise level, WPA mode installation is not so the easy task in comparison to PSK.
Another security concern is with WPA2. It has been introduced as a replica of WPA and recognized as
best security providing terminology. Using of WPA2 offers two types of authentication modes called Pre-
Shared Keys and Enterprise. Using Michael algorithm it offers WPA2 that uses counter mode CBC MAC
protocol. [4]
Design
Create a design part of the proposed solution with suitable diagram
To design a Cisco-based suitable diagram for the university as per requirement requires some special
equipment. In the UK education division, there are three resellers of Cisco equipment.
Cisco Unified Wireless LAN
Wireless local area network in the enterprise has great significance and is the most effective mode of
connection. The Cisco unified WLAN network is a combination of wired and wireless network solution
which could be able to address network security, deployment along with management. To develop a
Cisco unified WLAN network it is required to make use of best elements of wire and wireless networks
to offer a secure and scalable network to the university within minimized cost. The following elements
of wire and wireless network have been used to design the below-given architecture design for a unified
connection.
Client/user Device
The users commonly use WLAN network using laptops, mobile, PDA and etc. Use of PCs for the
connectivity with wireless local area network is beneficial due to less need of wiring.
Radio
The radio card implementation is necessary because it makes uses of standard which compatible with
the LAN. There are several forms of radio card like ISA, mini-PCI and etc. Radio NICs is a major part of a
WLAN network that is being used within a computer or laptop to provide a wireless connection to the
user. It is also termed as radio and implements as standard 802.11.
Radio Card/Access Point
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
It contains a radio card which is capable to communicate with the device installed at the user side. The
software creates an access communication bridge by incorporating WLAN and distribution side.
802.11
By the name specified, it is used for transferring the packets in between various networks. The
destination for the packet has been decided by the router with the help of best next link. A WLAN router
provides built-in access interoperability functions which combine several Ethernet networks with one
single wireless network and typically it connects four ports namely 802.11 access point or often parallel
to 802.11.
Repeaters
Access points often play a significant role in providing coverage area in a maximum number of WLAN
installation. It is a way to enhance the capability of the wireless local area network in comparison to
adding several access points.
Antennae
Antenna in wireless network area works as omnidirectional with less gain of transmission. All the other
components of WLAN come together with omnidirectional antennae.
Document Page
Figure 4 Unified Cisco WLAN Design
The above-designed WLAN has the same level of security, reliability, and scalability including
management that has been used by the university earlier called wired LAN. Using of LAN controllers,
access points and management allow for high-level security with reduced capital costs.
Secure Wireless Design of WLAN
The secured wireless WLAN network concluded security components for WLAN and networks. The
security of Unified designed offers WLAN security and this security used with other Cisco security
components of networks to build a highly secured complete solution. Use of 802.11 standard access
Document Page
points in the Cisco design provides a mechanism to tunnel user’s traffic to WLAN network security
measures. A single centralized block of service has been applied for security services within a network
like NAC and firewall. To protect the network there is additional protection in the network has been
incorporated along with securing mobile users.
Figure 5 Secure WLAN Architecture Diagram Design
Campus WLAN Architecture design
The below architecture design has been developed is just more than the basic routers and design.
Means hierarchies like name, network SSID, security and the base address of the other network could be
easily tracked. To design the current model architecture an 802.11 access point has been used and using
the antennae will help to enlarge the network coverage area in campus with detailed security for
students and staff members of colleges.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 6 Campus WLAN network design
Identification of network using the proposed design to accumulate and restrict nonformal network flow
could be identifying like this. [5]
Document Page
Figure 7Network Detection
Evaluate/ Justification
The design process of WLAN secured network splits into three steps and in each step, a special type of
design has been modeled to understand the core working functionality and to visualize how a user
either student or staff will get a secure network with strong WPA2-PSK security. Using this security for
the colleges is much secured than others. Use of 802.11 standard access point allows interconnecting
several computers or mobile devices in parallel and router allow to send data packets to other
destination with the help of special links. Now for campus “A” a complete WLAN has been designed
according to specification with special network security using both WPA and WPA2. All security concerns
like the restriction of unauthorized user have been implemented as per requirement. Now a user has to
enter user id and password to make access in campus network when he/she is in the classroom,
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]