Question

In: Computer Science

Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...

Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.

 

Part II: 

   18.  a) What is the main problem with IPv4 that IPv6 was created to solve?

           b) How does IPv6 solve this problem?

   19.  a) What has been holding back the adoption of IPv6?

          b) What is pushing IPv6 adoption now?

Solutions

Expert Solution

Part I -answer

Security Policy for 802.11 Wi-fi in a wireless network

At present, Wi-Fi becomes the common method of communication and internet access in office, homes, colleges, universities, and another environment. Wi-Fi performs the cellular-based communication in lower costs with high performance. Wi-Fi is actually a wireless Local Area Network [LAN] defined by the Institute of Electrical and Electronics Engineers [IEEE] 802.11 standards. A 500-employee company has a wireless network and 47 wireless access points. It is providing a communication service using 802.11 Wi-Fi. The company should have to develop a security policy regarding the secure use of the Wi-Fi facility within a wireless network. Here are points of the policy which should be followed by every employee.

  • All wireless access points in a wireless network must be registered and approved by the network. It is necessary to activate 802.11 encryption for providing security to the data from unauthorized access. These access points need high protection.
  • Strong passwords must be used to access the network. All wireless access points and routers also set up with strong passwords including the characters, numbers, and special symbols. The length of the password should be 8 to 16 characters.
  • All passwords must be kept in a document or secure file cabinet. It should be changed regularly to manage and secure the passwords.
  • A wireless network should have to certified Wi-Fi devices which are configured with the latest security features.

Part II -answers

18. (a) IPv4 has been developed in 1981. The size of IPv4 IP address is 32-bits and can support 4 billion IP addresses. At present, more than 7 billion people have their own computers and more that 6 billion people accessing mobile phones. Providing IP address to each person using IPv4 is impossible so IPv6 developed. Network Address Translation [NAT] is another problem associated with IPv4 which uses multiple private IP addresses in one IP. It is causing overloading of NAT which results in the breaking of few applications.

18. (b) IPv6 is developed in 1995 and able to support the billion of IP addresses. The size of the IPv6 address is 128 bits which can provide address space to billion of IP addresses. It uses logical aggregation scheme for providing address space. It has the facility to automatically configure and reconfigure the network. It uses fixed header lengths which can store the additional information.

19. (a) There are various reasons such as expensive cost, compatibility issues, and lack of security in NAT which is causing the holding back the adoption of IPv6. Translation of IPv6 from the IPv4 requires expensive hardware to replace the core routers of IPv4. The existing network is also not compatible with the IPv6. Due to this, the adoption of IPv6 is taking time.

19. (b) Nowadays, the Internet becomes a necessity for everyone and Internet Protocol [IP] is the core element of this. The limitation of IPv4 is enforcing the companies to use the IPv6 to provide fast internet services to everyone.


Related Solutions

Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall or ceiling. For one option, select a device that can receive its power by PoE from the network cable run to the device. For the other option, select a device that requires an electrical cable to the device as well as a network cable.
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6. (a) What is the probability that the...
Give 2 page summary on Wi Fi (wireless networking technology) and show diagrams to illustrate interaction...
Give 2 page summary on Wi Fi (wireless networking technology) and show diagrams to illustrate interaction of devices within constructed network.
You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network...
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network that appears correlated with a border Network slow down. The network team is unable to capture traffic, but logs from Network Services are available. No users have authenticated recently there was a guest networks captive portal DDoS mitigation systems are not alerting DNS resolver logs show some very long domain names Which of the following is the best step for security analysis to take...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT