Question

In: Computer Science

Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...

Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.

Solutions

Expert Solution

The 802.11 wireless networks (Wi-Fi) is one of the best networks. As of it is easy and fast deployment and installation.

There are two modes in which Wireless Network operates:

a) Infrastructure mode:
In this operation mode, each wireless client connects directly to a central device called Access Point.

b) Ad-hoc mode:
In this operation mode, each wireless client connects directly with each other. There is no central device managing the connections, meaning that each wireless client talks to each other freely.

Currently the IEEE 802.11i is the most used security standard released, that is used to protect wireless networks. In case of not using 802.11i standard in wireless network, other security measures like VPN, IPSec, etc can be used.

Some of the suggestions for security measures:

  • The access control list : Access control secures the network by filtering out unknown users and requires a list of authorized client’s MAC addresses to be loaded in the Access Point. Only those registered MAC addresses will be able to communicate with the Access Point, and will drop any communication that come from others not registered MAC addresses.
  • WEP (Wireless Equivalent Policy) uses encryption to protect the data.
  • WPA (Wi-Fi Protected Access): Using a unique password for connection to network.

I would suggest using Access control: Registering all the devices which should be connected to network, would ease the given task.


Related Solutions

Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.   Part II:     18.  a) What is the main problem with IPv4 that IPv6 was created to solve?            b) How does IPv6 solve this problem?    19.  a) What has been holding back the adoption of IPv6?           b) What is pushing IPv6 adoption now?
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology...
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology present for a company?
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall or ceiling. For one option, select a device that can receive its power by PoE from the network cable run to the device. For the other option, select a device that requires an electrical cable to the device as well as a network cable.
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6. (a) What is the probability that the...
Give 2 page summary on Wi Fi (wireless networking technology) and show diagrams to illustrate interaction...
Give 2 page summary on Wi Fi (wireless networking technology) and show diagrams to illustrate interaction of devices within constructed network.
You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT