Assignment title: Information


MN603 Wireless Network & Security Assignment 1 Total Marks: 100 (20% overall weightage for the Unit) Assignment 1 is Individual Assignment Due Date: Sunday 8th May'16, by 11.55 pm (Week 7) in the specified folder on Moodle. Submission must be in MS Word format. Assignment Overview – By Dr Vinod Mirchandani There are 2 Parts in this Assignment. You need to do both the Parts. Part I – Report Writing based on Research of a suitable Wireless Network Testing tool for one of the following Scenarios. [ 50 Marks] Your lecturer will allocate one of the scenarios for you. Use the allocated scenario and identify a tool suitable for the selected scenario by doing a minor research online specific for that scenario. Confirm with your Lecturer that no other peer student has already selected that tool. Note: There may be multiple tools suitable for the scenarios below; you should use the most suitable tool for the selected scenario. However, in case of a large class size the same scenario may be selected by other students but they must use a tool different from other students for the scenario. Prepare a technical report according to the specification below. You report should include the following: 1. Test the tool and report one technique (such as WLAN discovery, penetration testing, vulnerability assessment, etc) to secure and/or manage WLAN in an enterprise setting. your report should: a. categorize the tool (WLAN Analysis OR Exploitation OR Stress Testing tools) and the technique (WLAN discovery, penetration testing, vulnerability assessment, etc) b. include screenshots (as an evidence that you actually implemented the technique) and detailed explanation in the report about the working mechanism (the step by step process ) of the identified technique. c. explain the use (evaluation) of this techniques to secure and/or manage WLAN. 2. Submit a two (2) minute video along with audio to demonstrate your implementation (the Lecturer must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade. Plagiarism- IMPORTANT TO READ THE INFORMATION BELOW All used sources must be properly acknowledged with references and citations in IEEE format, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of given your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report. WLAN Scenarios Scenario 1: You are to create a small Wireless LAN for your office in a building in which there are several other offices that may have WLANs. Your mission is to identify a tool to avoid cochannel and overlapping interference by WLAN discovery to locate any neighboring wireless networks and if they may impact your own WLAN. Scenario 2: You are hired as a consultant to place a WiFi network for which you need to carry out wifi scanning, to notify you of all the nearest and closest Access points AP'Ss, as well as identify if the networks are 802.11/a, 802.11/b, 802.11/g. Also, its main features should include AP information (SSID, MAC Address) and signal quality chart. Scenario 3: You are travelling on a business trip and are staying in a hotel. But the hotel allows you only one WiFi connection. As a result you need to create a hotspot on your laptop in order to let the rest of your devices connect to the hotel's WLAN. You need to use a software tool that has features that need to be set up in order to have a hotspot such as the, name of the spot, password of the connection etc. Scenario 4: As a WiFi consultant you have to set up a WLAN for an enterprise that requires you to use a tool that can do the following tasks such as discovering Wi-Fi networks, Troubleshooting the connectivity issues of WiFi, Verifying Wi-Fi coverage, Managing a laptop's Wi-Fi connection and Detecting rogue APs. Scenario 5: You are a Road warrior (salesman) frequently travelling around the world. You need a free sniffing tool which helps you to locate available wireless hot spots anywhere in the world and it should provide a technique of automatically connecting to available wireless hotspots wherever you travel. It may also offer a feature to locate your friends wherever they are and chat with online friends. Scenario 6: As a security analyst you need to have a Linux based tool for use in testing and discovering flaws in one's own network with the aim of fixing the flaws detected. Scenario 7 As a security analyst you need to have tool that gives detailed information about the surrounding WiFi networks such as SSID, the kind of network security used etc but it should also be able to provide information on surrounding WPANs such as Bluetooth. It should also be used on Mac OS. Scenario 8 You need to have a tool that will provide detailed information about networks and its security measures to make sure that the network will be kept secure. It should also give you give information about the signal to noise ratio which is important to process and get access to the network. It should also help you to find out your WiFi extent range. Scenario 9 You are installing a WiFi network for which you need a network discovery tool that gathers information about nearby wireless access points in real time. It should also have features such as: Generates reports in Adobe PDF format that include the list of access points and their properties, Powerful and innovative logging and recording capability. reviewing recorded data a snap. Support for multiple installed wireless adapters installed- option to select the adapter that you need. Part II Critical Thinking Questions Based on the Following Case Study [50 Marks] A Case Study created by Dr Vinod Mirchandani: Your friend Steve has recently leased a large space for a cafeteria in Sydney CBD. Although Steve has often used 802.11 Wireless LAN (WLAN) but he neither has any idea about how WLAN works nor any technical knowledge about it. The shop space that Steve has leased is in a building where there are several offices as well as other restaurants that also use 802.11 WLANs. Steve knows from experience that these days many cafeterias and restaurants offer free high bandwidth WLAN connectivity to their customers. As such, Steve is thinking of doing the same. He knows that you are enrolled in MN603 and are a good student so he wants to seek your help in creating a WLAN inside his cafeteria. You agree to help Steve out. You visit Steve's cafeteria shop to find out what all infrastructure it has and its surroundings. The shop is scheduled to open for business in one week's time. Also, you visit it at a time when other businesses and offices in the neighborhood are functioning. When you arrive at Steve's cafeteria you find that it is a large room with a lot of sharp edges and metallic decorations. Furthermore, in front of the cafeteria there is an open space with trees having leafs and flag poles. Steve wants to place a few chairs and tables so that some of his customers can sit outdoors and enjoy the food and coffees. You also notice that the cafeteria space that Steve has leased used to be an Internet café where wired access to Internet and other services was provided. Also, you find that the ports for connection to the Ethernet wired infrastructure are still available. Outdoors, you find that Telstra's pay phone booth has been converted by Telstra to provide hotspot Wireless LAN services to the customers. It is marketed under the name Telstra Air. But you are not sure about its range. The cafeteria space of Steve is served by a phone companies twisted pair wire connection to which Steve has connected his phone. He has heard that Fibre optic based National Broadband Network (NBN) is also available in that area. As Steve's cafeteria is likely to be visited by many business customers who may be concerned about security so you have to also consider providing secure wireless access as an option. In order to help your friend Steve with setting up of WLAN system in the above scenario you need to answer ALL the following questions: 1) What additional investigation you will need to do so as to provide an efficient wireless LAN network in Steve's cafeteria. [5 Marks] 2) The wired network offers a higher speed than a wireless network. In your opinion, what are the reasons for this? [10 Marks] 3) (i) How would you address the issue of providing Wireless LAN access in front of the cafeteria that has trees with leafs that can affect RF propagation. [5 Marks] (ii) How would you utilize the information given for Steve's cafeteria in the selection of a 802.11 WLAN type. [5 Marks] 4) (i) In your opinion, why can't the same security measures of a wired network be used in a wireless network. [6 Marks] (ii) What do you think are the differences between a hotspot access and a WLAN access in an office space. [4 Marks] 5) (i) To provide a wireless coverage throughout Steve's cafeteria what sort of wireless LAN topology and wireless LAN hardware you plan to use. Explain and justify your choice. [10 Marks] (ii) Draw a rough sketch of the WLAN system that you have planned. Make sure all the key connections and devices are shown clearly. [5 Marks] Due Date & Submission The report containing both Parts 1 and II is due in Week 7 by the date and time specified at the top of this Assignment 1 document. By the due date, you must submit on Moodle: 1. Name your file with your student name and student number. 2. The report will be automatically checked by Turnitin embedded on moodle. By submitting on MOODLE you agree that the work is yours unless properly cited. 3. A 2 minute video with audio to demonstrate your implementation for Part 1. Your face should be included in the video (the Lecturer must be able to recognize you in the video). Failure to submit the video (using Moodle submission link) will result a failing grade. Late submission of assignments will be penalised as follows: • For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day. • For assignments more than 5 days late, a penalty of 100% will apply. Your submission must be compatible with the software (MS Word) in MIT, Computer Laboratories/Classrooms. Extensions: Under normal circumstances extensions will not be granted. In case of extenuating circumstances—such as illness—a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date. If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only. Accordingly the student must submit within that time limit. Penalties may apply for late submission without an approved extension. Penalties: Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion. Marking aspects for Part 1: Marks are allocated as indicated on each question, taking the following aspects into account: Aspects (Part 1) Description Evaluation Explain the use of the technique Explanation Description/explain how to use the technique Report structure Proper structure, presentation, satisfactory writing Reference style (IEEE) Proper referencing Video along with audio demonstration Successful video demonstration to support submitted report. NO Plagiarism No Copying from another student, OR from internet source/textbook, OR from other sources without proper acknowledgement. If in doubt consult with your Lecturer immediately. Marking Rubric for Exercise Answers- Part 1 Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail < 50% Excellent Very Good Good Satisfactory Unsatisfactory Evaluation /10 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent and convincing Adequate cohesion and conviction Argument is confused and disjointed Sophistication and effectivity /10 The presented solution demonstrated an extreme degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a high degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated an average degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a low degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a poor degree of sophistication and effectivity to secure and/or manage WLAN. Explanation /10 All elements are present and well integrated. Components present with good cohesion Components present and mostly well integrated Most components present Lacks structure. Reference style /5 Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors Report structure and report presentation /10 Proper writing. Professionally presented Properly written, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation Video with audio of Demonstration /5 Successful completion and well understanding of the content. Successful completion and understanding of the content. Partially completed and partial understanding of the content. Partially completed and did not understand the content. Not completed and did not understand the content.