Witam mam taka prace domowa do zrobienia i szukam osob które mogły by sie tego podjac. Ponizej przedstawiam opis tej pracy w jezyku angielskim:
Cała tresc pracy i kryteria prześle osobom zainteresowanym na adres mailowy.
Mysle ze wielkosc pracy moze wahac sie około 1500 słow w razie potrzeby moze byc wiecej.
Section 1 Design a WLAN based system
In this section, students are supplied with a complex floor plan, the results of a site noise survey and a list of business requirements. Students will be required to design a solution, specify the required equipments, provide a series of design diagrams, and present in report format.
Guidelines of the design process:
Step 1 Data collection
This project starts with collecting user requirements, especially the required bandwidth and its distribution. Please consider the following questions:
&#8226; What are the needs of the end users?
&#8226; What applications will be used over the WLAN and by whom?
&#8226; What bandwidth do these applications require?
Step 2 Coverage and throughput
A good Wireless LAN design will allow users to access it from anywhere within these two buildings, i.e., there is no blind spots within the coverage. It is also desirable to spread the traffic/load among different APs as evenly as possible. The following questions should be answered.
&#8226; How are you going to provide wireless coverage for both buildings?
&#8226; How will the bandwidth/throughput requirements be achieved with the chosen AP configuration?
&#8226; Cell size
&#8226; Specific technologies, such as [url removed, login to view], [url removed, login to view], or [url removed, login to view]
Please note that a diagram or sketch of the coverage area is required within this section.
Step 3 Mobility
When dealing with WLANs, the demands of mobile users must be considered:
&#8226; The users need seamless layer 2 roaming within these two buildings.
&#8226; What kind of design can be used in the topology to accomplish this objective?
Step 4 Power Consumption
What kind of power settings will be used on the wireless clients to conserve power when they need to be mobile and roam about the facility?
Step 5 Interference
The following steps must be taken when dealing with potential interference to the WLAN:
&#8226; Identify the typical sources of RF interference for an office environment that this WLAN is being designed for.
&#8226; Provide possible options or solutions to each type of interferences.
Step 6 Security issues
Your design of WLAN should meet the security requirements by (1) providing Internet Access for visitors and guests, but denying them accessing the internal network; and (2) sales databases and accounts can only be accessed by authorized staff.
Step7 Internet Access and Network Servers
You need to provide required network servers (DNS server, DHCP server, E-mail server, Radius server, etc.) to allow this WLAN to function as well as Internet Access.
Section 2 Evaluation
After you complete your initial design, the proposed network needs to be evaluated against four criteria: availability, scalability, manageability and compatibility.
&#8226; Briefly explain the meaning each criterion;
&#8226; Discuss how your design has met each of them.
Section 3 Deployment of WLAN with enterprise-level security
To secure a WLAN, both encryption and authentication are needed. Simply fixing the problem of weak encryption found in WEP is not enough. Wireless networks must authenticate both users and devices, especially for an enterprise WLAN.
In this section, you are required to complete a project by adding security to the WLAN using the skills that you have gained from the tutorials.
Step1 Setup a testing network. Access point has to be either Aironet 1200 or Aironet 1300.
You need to update the above network diagram with the following information:
1. You need to decide IP addresses for Access Point, DHCP server, and Radius server, also indicate DHCP IP address pool for Laptop PC and wired PC.
2. Type of cables used in the above diagram, including a console connection with Access Point for the purpose of configuration.
Step2 Secure AP as a stand-alone device
In this step, discuss what measurements need to be taken to secure the access to AP as a stand-alone device.
You need to configure the Access Point with the measurements of your choice and provide documentation of configuration file of a secured AP.
Step3 Implement enterprise WLAN Authentication
3.1. Configure PSK using WEP key on AP and client.
3.2. Configure WPA2 with EAP (at least LEAP with Local RADIUS Authentication).
3.3. Discuss how you are going to extend the security to the secondary building.
3.4. Comparing methods in 3.1 and 3.2, discuss why method in 3.2 is more secure than method 3.1.
3.5. Provide documentation of output of AP as in 3.1 and 3.2.
Flemming Interior Decoration Ltd.
OPERATIONAL REQUIREMENT FOR A
WIRELESS LOCAL AREA NETWORK
1 Background to this Operational Requirement
Flemming Interior Decoration Ltd (FID) is an established company which is about to move into a new purpose-built building. The Managing Director has recently attended a business conference on the advantages of Wireless Networks in the work place. As a result, he has decided that the flexibility offered by wireless LAN will give FID a significant advantage over the competition. Therefore FID wishes to procure a fully Wireless based Local Area Network.
The WLAN will form a central part of the FID\'s Information Technology strategy for the next couple of years. FID&#8217;s current network will not be transferred to the new building.
The WLAN components and infrastructure should adhere to national and international wireless communications standards.
2. Topology and layout
A scale plan of FID&#8217;s new building is shown in appendix B. The plan shows a main and secondary building, both of which are at the moment of single story construction. The plan in appendix C shows the results of a noise survey, there is significant over spill from two other wireless networks on channels 6 and 11. At the moment FID has 30 employees all of whom require wireless access from their laptop computers.
1 All staff must be able to connect to the network from anywhere within the two buildings. Please assume that it is not feasible to extend the cable from the main building to the secondary (small) building.
2 All computers should be networked so that internal and external Email can be supported.
3 ALL staff must have both Internet Access and the access to internal network.
4 Guests and visitors will be provided only Internet Access from conference room, and they will not be allowed to access the internal network.
5 Sales databases and accounts can only be accessed by authorized staff (see next page.)
6 All servers required (including DNS server, DHCP server, E-mail server, Radius server, etc.) to allow the network to function need to be provided.
4. Staff Primary Location/Function
Office Number of staff Applications
Managing Director 1 Office, Sales Database, Accounts
Personal Assistant 1 Office
Sales & Marketing 2 + (2 part-time) Office, Sales Database
Accounting & Payroll 4 Office, Accounts
Data Processing 1 Office, Sales Database
Security 3 only 1 at any time Office
IT Support 2 Office
Human Resources 2 Office
Customer Services 1 Office, Sales Database
Mail Room 1 Office
Reception 1 Office
Agent Operations 2 + (1 part-time) Office, Sales Database Operations 2 Office, Sales Database
Dispatch 2 Office, Sales Database
Maintenance 3 Office