Assignment title: Information
MN603 Wireless Network & Security
Assignment 1
Total Marks: 100 (20% overall weightage for the Unit)
Assignment 1 is Individual Assignment
Due Date:
Sunday 8th May'16, by 11.55 pm (Week 7) in the specified
folder on Moodle. Submission must be in MS Word format.
Assignment Overview – By Dr Vinod Mirchandani
There are 2 Parts in this Assignment. You need to do both the Parts.
Part I – Report Writing based on Research of a suitable Wireless Network Testing tool for
one of the following Scenarios. [ 50 Marks]
Your lecturer will allocate one of the scenarios for you. Use the allocated scenario and
identify a tool suitable for the selected scenario by doing a minor research online specific
for that scenario. Confirm with your Lecturer that no other peer student has already
selected that tool. Note: There may be multiple tools suitable for the scenarios below; you
should use the most suitable tool for the selected scenario. However, in case of a large class
size the same scenario may be selected by other students but they must use a tool different
from other students for the scenario. Prepare a technical report according to the
specification below. You report should include the following:
1. Test the tool and report one technique (such as WLAN discovery, penetration
testing, vulnerability assessment, etc) to secure and/or manage WLAN in an
enterprise setting. your report should:
a. categorize the tool (WLAN Analysis OR Exploitation OR Stress Testing
tools) and the technique (WLAN discovery, penetration testing, vulnerability
assessment, etc)
b. include screenshots (as an evidence that you actually implemented the
technique) and detailed explanation in the report about the working
mechanism (the step by step process ) of the identified technique.
c. explain the use (evaluation) of this techniques to secure and/or manage
WLAN.
2. Submit a two (2) minute video along with audio to demonstrate your
implementation (the Lecturer must be able to recognize you in the video). Your
video file format must be compatible with video playing software available in
MIT labs. Failure to submit the video (using Moodle submission link) will result
a failing grade.
Plagiarism- IMPORTANT TO READ THE INFORMATION BELOW
All used sources must be properly acknowledged with references and citations in IEEE format, if
you did not create it. Quotations and paraphrasing are allowed but the sources must be
acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism
is failure for the assignment. The act of given your assignment to another student is classified as a
plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as
you have not contributed to the report.
WLAN Scenarios
Scenario 1:
You are to create a small Wireless LAN for your office in a building in which there are
several other offices that may have WLANs. Your mission is to identify a tool to avoid cochannel and overlapping interference by WLAN discovery to locate any neighboring wireless
networks and if they may impact your own WLAN.
Scenario 2:
You are hired as a consultant to place a WiFi network for which you need to carry out wifi
scanning, to notify you of all the nearest and closest Access points AP'Ss, as well as identify
if the networks are 802.11/a, 802.11/b, 802.11/g. Also, its main features should include AP
information (SSID, MAC Address) and signal quality chart.
Scenario 3:
You are travelling on a business trip and are staying in a hotel. But the hotel allows you only
one WiFi connection. As a result you need to create a hotspot on your laptop in order to let
the rest of your devices connect to the hotel's WLAN. You need to use a software tool that
has features that need to be set up in order to have a hotspot such as the, name of the spot,
password of the connection etc.
Scenario 4:
As a WiFi consultant you have to set up a WLAN for an enterprise that requires you to use a
tool that can do the following tasks such as discovering Wi-Fi networks, Troubleshooting the
connectivity issues of WiFi, Verifying Wi-Fi coverage, Managing a laptop's Wi-Fi
connection and Detecting rogue APs.
Scenario 5:
You are a Road warrior (salesman) frequently travelling around the world. You need a free
sniffing tool which helps you to locate available wireless hot spots anywhere in the world and
it should provide a technique of automatically connecting to available wireless hotspots
wherever you travel. It may also offer a feature to locate your friends wherever they are and
chat with online friends.
Scenario 6:
As a security analyst you need to have a Linux based tool for use in testing and discovering
flaws in one's own network with the aim of fixing the flaws detected.
Scenario 7
As a security analyst you need to have tool that gives detailed information about the
surrounding WiFi networks such as SSID, the kind of network security used etc but it should
also be able to provide information on surrounding WPANs such as Bluetooth. It should also
be used on Mac OS.
Scenario 8
You need to have a tool that will provide detailed information about networks and its security
measures to make sure that the network will be kept secure. It should also give you give
information about the signal to noise ratio which is important to process and get access to the
network. It should also help you to find out your WiFi extent range.
Scenario 9
You are installing a WiFi network for which you need a network discovery tool that gathers
information about nearby wireless access points in real time. It should also have features
such as: Generates reports in Adobe PDF format that include the list of access points and
their properties, Powerful and innovative logging and recording capability. reviewing
recorded data a snap. Support for multiple installed wireless adapters installed- option to
select the adapter that you need.
Part II Critical Thinking Questions Based on the Following Case Study [50 Marks]
A Case Study created by Dr Vinod Mirchandani:
Your friend Steve has recently leased a large space for a cafeteria in Sydney CBD. Although
Steve has often used 802.11 Wireless LAN (WLAN) but he neither has any idea about how
WLAN works nor any technical knowledge about it.
The shop space that Steve has leased is in a building where there are several offices as well as
other restaurants that also use 802.11 WLANs. Steve knows from experience that these days
many cafeterias and restaurants offer free high bandwidth WLAN connectivity to their
customers. As such, Steve is thinking of doing the same. He knows that you are enrolled in
MN603 and are a good student so he wants to seek your help in creating a WLAN inside his
cafeteria. You agree to help Steve out.
You visit Steve's cafeteria shop to find out what all infrastructure it has and its surroundings.
The shop is scheduled to open for business in one week's time. Also, you visit it at a time
when other businesses and offices in the neighborhood are functioning.
When you arrive at Steve's cafeteria you find that it is a large room with a lot of sharp edges
and metallic decorations. Furthermore, in front of the cafeteria there is an open space with
trees having leafs and flag poles. Steve wants to place a few chairs and tables so that some of
his customers can sit outdoors and enjoy the food and coffees.
You also notice that the cafeteria space that Steve has leased used to be an Internet café
where wired access to Internet and other services was provided. Also, you find that the ports
for connection to the Ethernet wired infrastructure are still available.
Outdoors, you find that Telstra's pay phone booth has been converted by Telstra to provide
hotspot Wireless LAN services to the customers. It is marketed under the name Telstra Air.
But you are not sure about its range.
The cafeteria space of Steve is served by a phone companies twisted pair wire connection to
which Steve has connected his phone. He has heard that Fibre optic based National
Broadband Network (NBN) is also available in that area.
As Steve's cafeteria is likely to be visited by many business customers who may be
concerned about security so you have to also consider providing secure wireless access as an
option.
In order to help your friend Steve with setting up of WLAN system in the above scenario you
need to answer ALL the following questions:
1) What additional investigation you will need to do so as to provide an efficient
wireless LAN network in Steve's cafeteria.
[5 Marks]
2) The wired network offers a higher speed than a wireless network. In your opinion,
what are the reasons for this?
[10 Marks]
3) (i) How would you address the issue of providing Wireless LAN access in front of the
cafeteria that has trees with leafs that can affect RF propagation.
[5 Marks]
(ii) How would you utilize the information given for Steve's cafeteria in the selection
of a 802.11 WLAN type.
[5 Marks]
4) (i) In your opinion, why can't the same security measures of a wired network be used
in a wireless network.
[6 Marks]
(ii) What do you think are the differences between a hotspot access and a WLAN
access in an office space.
[4 Marks]
5) (i) To provide a wireless coverage throughout Steve's cafeteria what sort of wireless
LAN topology and wireless LAN hardware you plan to use. Explain and justify your
choice.
[10 Marks]
(ii) Draw a rough sketch of the WLAN system that you have planned. Make sure all the
key connections and devices are shown clearly.
[5 Marks]
Due Date & Submission
The report containing both Parts 1 and II is due in Week 7 by the date and time specified at
the top of this Assignment 1 document.
By the due date, you must submit on Moodle:
1. Name your file with your student name and student number.
2. The report will be automatically checked by Turnitin embedded on moodle. By
submitting on MOODLE you agree that the work is yours unless properly cited.
3. A 2 minute video with audio to demonstrate your implementation for Part 1.
Your face should be included in the video (the Lecturer must be able to recognize
you in the video). Failure to submit the video (using Moodle submission link) will
result a failing grade.
Late submission of assignments will be penalised as follows:
• For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day.
• For assignments more than 5 days late, a penalty of 100% will apply.
Your submission must be compatible with the software (MS Word) in MIT, Computer
Laboratories/Classrooms.
Extensions: Under normal circumstances extensions will not be granted. In case of extenuating
circumstances—such as illness—a Special Consideration form, accompanied by supporting
documentation, must be received before 3 working days from the due date. If granted, an extension
will be only granted only by the time period stated on the documentation; that is, if the illness medical
certificate was for one day, an extension will be granted for one day only. Accordingly the student
must submit within that time limit.
Penalties may apply for late submission without an approved extension.
Penalties: Academic misconduct such as cheating and plagiarism incur penalties ranging from a
zero result to program exclusion.
Marking aspects for Part 1:
Marks are allocated as indicated on each question, taking the following aspects into account:
Aspects (Part 1) Description
Evaluation Explain the use of the technique
Explanation Description/explain how to use the technique
Report structure Proper structure, presentation, satisfactory writing
Reference style (IEEE) Proper referencing
Video along with audio
demonstration Successful video demonstration to support submitted report.
NO Plagiarism
No Copying from another student, OR from internet source/textbook,
OR from other sources without proper acknowledgement. If in doubt
consult with your Lecturer immediately.
Marking Rubric for Exercise Answers- Part 1
Grade
Mark
HD
80%+
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
< 50%
Excellent Very Good Good Satisfactory Unsatisfactory
Evaluation
/10
Logic is clear and easy
to follow with strong
arguments
Consistency logical
and convincing
Mostly consistent
and convincing
Adequate cohesion
and conviction
Argument is
confused and
disjointed
Sophistication and
effectivity
/10
The presented solution
demonstrated an
extreme degree of
sophistication and
effectivity to secure
and/or manage WLAN
The presented solution
demonstrated a high
degree of
sophistication and
effectivity to secure
and/or manage WLAN
The presented
solution
demonstrated an
average degree of
sophistication and
effectivity to
secure and/or
manage WLAN
The presented solution
demonstrated a low
degree of
sophistication and
effectivity to secure
and/or manage WLAN
The presented
solution
demonstrated a poor
degree of
sophistication and
effectivity to secure
and/or manage
WLAN.
Explanation
/10
All elements are
present and well
integrated.
Components present
with good cohesion
Components
present and
mostly well
integrated
Most components
present
Lacks structure.
Reference style
/5
Clear styles with
excellent source of
references.
Clear referencing/
style
Generally good
referencing/style
Unclear
referencing/style
Lacks consistency
with many errors
Report structure
and report
presentation
/10
Proper writing.
Professionally
presented
Properly written, with
some minor
deficiencies
Mostly good, but
some structure or
presentation
problems
Acceptable
presentation
Poor structure,
careless presentation
Video with
audio of
Demonstration
/5
Successful
completion and
well
understanding of
the content.
Successful
completion and
understanding of
the content.
Partially
completed and
partial
understanding
of the content.
Partially
completed and did
not understand the
content.
Not completed
and did not
understand the
content.