We write, we don’t plagiarise! Every answer is different no matter how many orders we get for the same assignment. Your answer will be 100% plagiarism-free, custom written, unique and different from every other student.
I agree to receive phone calls from you at night in case of emergency
Please share your assignment brief and supporting material (if any) via email here at: [email protected] after completing this order process.
No Plagiarism Guarantee - 100% Custom Written
Pilot project for implementation of wireless access network in albert school
You are the technical consultant to the Education department of NSW that currently has 200 schools under its administration. Most of the schools are of similar type and requirements for example: have around 500 students per school, 50 staff, online education programs, video conferencing facility between staff members across different campuses.
Many of the schools do not have adequate wireless coverage Consider one such school in the NSW school system called Albert school that the NSW Education department wants to use it as a pilot project to provide cost effective wireless access.
In Albert school currently there is no provision for wireless access to the campus network and Internet. The students and staff have made repeated demands to the school principal to have wireless access to the Albert school network and Internet. As the school often gets visitors and parents so this will also allow them to gain access to the wireless network by using their own laptop Đoŵputer. The sĐhool’s priŶĐipal also is eager to have a wireless network that should provide support for visitors and secure access to resources for the staff.
You have been assigned to help Albert school to have a wireless network and being a pilot project you will be making use of the experience that you will gain from it in other NSW schools as well. Some of the challenges that you face are with respect to the cost, security, vendor selection, implementation and performance.
One of the security issue faced by the school is that signal transmitted by the access point (AP) could also be transmitted outside the school building. This could then be used by hackers to gain access to the school internal network and resources. Another issue that may arise in the event of poor security measures is that the visitors to the school could access the resources of the staff. Rogue APs is also a concern to the school principal as well as the type of content accessed. The principal also wants the details of the studeŶt;sͿ ǁho ǀiolate the sĐhool’s poliĐies ǁith regards the usage policy to be immediately logged so that after auditing action can be taken against the offending student(s). Some of the studeŶts also use USB ŵoďile ďroadďaŶd ŵodeŵ to ďLJpass the sĐhool’s Ŷetǁork aĐĐess control and content access policies. This may pose as a security risk as well.
The IT team of the Education department has recommended you to use the RADIUS server for authentication purposes in the school. The school principal wants you to create an experimental testbed to demonstrate its usefulness to him and the school staff.
You are also faced with the challenge of the architecture that you need to have for Albert school i.e. whether to have it distributed or centralised. Cost of the overall network including maintenance needs should be kept as low as possible because of the budgetry constraints of the Education department.
Apart from the RADIUS server demonstration you have to make several recommendations to the school for all aspects of the network.
Note: You also need to undertake a serious literature research on tools, security equipment required and any issues that may arise.
You should address the following tasks in your report. You are required to perform detailed literature review on hardware/software, security and other issues.
Group member one:
Explain the different ways by which you could keep the costs low for the Albert school wireless network
Explain the ways by which you could meet the security requirements of the school including preventing visitors from accessing the internal netǁork of the sĐhool’s staff.
How would you restrict the range of the wireless signal so that it does not appear outside the school building? What are the advantages and disadvantages of your methods?
Group member two:
Create and discuss the experimental setup for the RADIUS server authentication in the above case study with the help of figures.
What type of architecture would you choose – Centralised or Distributed? Justify your answer.
What type of tools would you use for implantation of the wireless network? Justify their selection.
Group member three:
What reĐoŵŵeŶdatioŶs LJou ǁould ŵake to the sĐhool’s priŶĐipal iŶ proǀidiŶg Đost effeĐtiǀe coverage, antenna type, number of APs, minimising network drops, allocation of frequencies of the APs, signal measurement.
Write a report that includes the following sections: executive summary, introduction, work of Group members 1 and 2, plan of your implementation along with figure, your recommendations and conclusions.
Assessment
Components
Description of the section
Marks
Allocated
Report
Presentation
Presentation of report including table of contents, figures,
references, the minutes and other appendices
10
Assumption,
equipment and cost
List all the assumptions made, list all the hardware and
their cost. The assumptions are not the requirements that are provided in the assignment. They are the additional requirements that you need for your design.
Security
Requirements
Identify all required security requirements and justify those
using logical arguments.
The network infrastructure
Description & diagrams showing the network (wired and wireless)
20
Justification of
security requirements
Implementation
steps or clarity of test bed setup details
Implementation Steps and the implementation is very well
suited to your designed network.
Demonstration in
simulation setting or practical setting
The implementation is very well suited to your designed
network.
Poor writing
Inadequate structure, careless & untidy presentation
-5
Plagiarism
Type of plagiarism
- Copy from other student
- Copy from internet source/textbook
- Copy from other sources
-80
Marking Components and Criteria: Marking Components:
Marking Criteria:
HD
80-100%
DI
70-79%
CR
60-69%
P
50-59%
Fail
/10
Table of contents with appropriate section numbers, figures, references and other appendices
Table of contents with appropriate section numbers, figures, references
Table of contents with section numbers, figures, references
Table of contents and referenc es
No proper table of contents, figures, references
Assumption, equipment and cost
List all the assumptions made, list all the hardware and their cost
List most of the assumptions made, list most of the hardware and their cost
List some of the assumptions made, list some of the hardware and their cost
List few of the assumpti ons made,
list few of the hardware and their cost
Did not list most of the assumptions made, Did not list most of hardware
Detail all the security requirements for wireless and wired network
of the medical centre stated in the case study.
Detail most of the security requirements for wireless and wired network of the medical centre stated in the case study.
Detail some security requirements for wireless and wired network of the medical centre stated in the case study.
Detail very few security requirem ents for wireless and
wired network of the medical centre stated in the case study.
Did not detail most of the security requirement s for
wireless and
some of the security requirement for wired network of the medical centre
stated in the case study.
/20
The diagram included all system components and interconnecting the devices, with proper labelling of network equipment.
The diagram included most system components and interconnecting the devices, with proper labelling of network equipment.
The diagram included system components and interconnecting the devices, with proper labelling of network equipment.
The diagram included all system
compone
nts with proper labelling of
The diagram did not include important system components
.
network equipme nt.
Describe and justify your design
Detailed descriptions and very well supported arguments.
Detailed descriptions and well supported arguments.
Detailed descriptions and supported arguments.
Detailed descripti ons and some supporti ng argumen ts.
Some descriptions only.
Implementation steps or clarity of test bed setup details
Detailed descriptions and complete steps.
Some detail descriptions and complete steps.
Brief descriptions and complete steps.
Very brief descripti ons and complete steps.
Incomplete steps.
Demonstration in simulation setting or practical setting
The implementation is very well suited to your designed network.
The implementation is well suited to your designed network.
The implementation is suited to your designed network.
The impleme ntation is suited to your designed network.
The implementa tion is
suited to
your designed network..