$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

BN303 Wireless Network And Security Enterprise

tag 0 Download7 Pages / 1,702 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: BN303
  • University: Victoria University
  • Country: Australia


a.Design secure WLAN and utilize techniques to mitigate possible attacks.
b.Solve complex problem in secure wireless network designs.
c.Design floor plan with actual coverage wireless range.
d.implement security and authentication system. search and compare between WLAN ( MLAN) links types.



This report explain the design and implementation of network of AIT Company that plans to move to Sydney. The company that plans to build two mid-size campuses in the city. The two campuses are 2km away from each other. Each of the campuses have different dimensions. The first campus contains three blocks of IT, physics and Chemistry colleges. While on the other hand the second campus has three blocks for administration. These report explains how wireless network will be implemented in the network. The flow plans and the position of each network equipment is drawn and explained in this report in each block of the building.

Project scope & requirements

The AIT campus has two buildings, the first campus that holds the college of IT, Physics, Chemistry, and the Library. While the other campus has three buildings that hold administrative offices, Business College and also the Library. The organization needs to set up a correspondence channel for information and data sharing among the college and the users to be able to access and converse with each other through wireless network(Administrative offices can use both wired communication and wireless that's the use of access point that will be set on designated areas for proper coverage).

Wireless access is required in each department [1]. Given different perspectives, for example, Business College or some other field, the system must almost certainly acclimate to changing traffic hindrance and support the system consistency and have the capacity to interface independent segments without cautious arranging and structure. We are going to concentrate on the huge issues that are confronted while arranging and planning an internetwork foundation.

Network design and justification 

On configuring the network, there four stages that ought to be secured for a total and fruitful system .

  • Configuring the fast cable in the LAN network
  • Settting the WAN network mainly among network devices this are the routers.
  • Dynamic Routing Protocol by passing on packets through various routers and a channel given the goal of the framework in the present condition.
  • Verifying our network.

The approach that will preferably be used in this type of topology is the top-down approach. The main goal that is attained by starting at the application layer perspective in the same line is that, the firm might interconnect with the partner to enable communication on the platform. This approach doesn't begin in the technical element of communication. This approach is focused on improving majorly the business goal of the firm and its technical goals

network access control list (ACL) is a security layer for your VPC that goes about as a firewall that concentrated on overseeing and controlling information traffic all through at least one subnets.

  • Each subnet in should have  a network ACL. On the off chance that you don't expressly relate a subnet with a system ACL, the subnet is designed with the accessible ACL [2].
  • Various subnets can be related with given ACL in a system

ACL will by and large be connected in numerous reasons, for example, in the conveying join that will be utilized in separating directing updates. It can likewise be utilized in sifting information traffic on the interface or even in a dialler rundown to distinguish the fascinating traffic. At long last, it very well may be connected in the arrangement based steering that will be used in settling on various choice of the switch and some other practical reason.


Vpn and its usefulness on the network

A virtual private network prolongs a private network over an open network and empowers clients to share and get data and information over a given shared or public network as though their specialized gadgets as devices are connected to a private network. It was essentially created to permit remote client access to branch workplaces to safely get to applications among others. To guarantee wellbeing, information goes through secure passages, and VPN clients must utilize validation strategies, including passwords to access the network.

VPN server.

In a network, there is dependably a plan issue that may emerge, for example, picking the most ideal channel between the sender and the collector when more than one course is found and accessible for bundle exchange. Another example is the rate of sending and accepting that must be flawless and coordinate. In the event that at any possibility the rate of sending is too high which overwhelms the rate in which the beneficiary gets it and devours the parcels, at that point it prompts information misfortune and clog of information traffic. Stream control can be utilized in such a case. The sender and beneficiary recognizable proof should be made feasible for every one of the layers. Tending to of each can make it simpler for them to convey. Another serious issue is the greatest size of information that can be sent and got one at a given time. This prompts the need of division at the sender and gathering at the beneficiary. Not to overlook information exchange manages, the convention decides the quantity of channels required and needs to be utilized.

For a solitary WAN network type, it utilizes a Layer 2 convention to embody a parcel while it passes on the WAN connection. For an appropriate embodiment, the layer 2 type must be utilized in every switch sequential interface and must be arranged [3].

Given an Example, when a beneficiary makes a telephone call, the dialled number is utilized to set switches in the exchange along the way of the call so that there is a constant circuit from the guest to the called party. On account of the changing activity used to set up the circuit, the phone framework is known as a circuit-exchanged system. On the off chance that the phones are supplanted with modems, the exchanged circuit can convey PC information.

  1. IP Address Design & Network Topology




















































































Devices prices and quantities


Price of the piece in US dollars ($)

NO of devices

T. Amount









Access Point




Machines (pc)






















  1. Describe the required tools to test the WLAN network security.


This determines the speed test and signal strength. It’s a super convenient way to look up for the Aps and monitoring the device signal and power. It’s a free tool to be used with the administrator. It can show the detailed summary of the Aps and their signal strength, channels and the type of encryption that is used (WEP/WPA/WP2). 

  1. Compare 128-bit WEP and 64-bit WEP and explain if one provides a better security solution than the other?

128-bit WEP consists of 26 hexadecimal digits which simply blocks other malicious users from accessing the wireless network that is laid. The other 64 bit consist of 10 hexadecimal digits. 128-bit encryption is much stronger than the 64 since it provides many authorizations of security and that of security to the client. 

  1. Describe the MAC spoofing and its effect on the wireless network, and describe how to protect against Spoofing and Unauthorized Attacks

This is the ability to change production line appointed media get to control Mac deliver to a given system interface on a communication device. By the use of packet filtering that is used to inspect the amount of data traffic in the network, it's helpful because it has the capability to filter out and the capability to block with conflict vendors address.

  1. How to secure the data sent between the two campuses if the internet will be used to provide the connectivity between the two campuses?

In the network system, it tends to be utilized to execute specifically the kind of rationale that can give the section access of even deny certain information bundle to go through the system interface. Given, for example, a firewall that fundamentally looks at the information traffic going through a piece of a system and settle on choices on what and what not to release it through the system layer [4].

Following the network design, the best-needed path for efficient data packet transportation is the first Campus. This is because the switch port is not configured to multiple functions hence making it more reliable and efficient in the performance of the network.

The traffic flow basically focuses on many issues such as id threats, identity access, Id vulnerability, and design for security among others. Issues such and exploiting passwords and poor configurations is one that leads to the fall out of a network set up which leads to the intrusion of many eavesdroppers to the network [5]. The more the information one has is easier and attracts successful attackers.


In conclusion, we can say that the system can meet the distinctive criteria required for arranging the structure and design of the network gadgets in the locale. The firm can actualize arrangement on the college for information transmission and data sharing will be fruitful and secure for end to end communication.



[1] A, Jain., V, Pardikar., and S.R., Pratihast., Tracing based solution for ubiquitous connectivity of mobile nodes for NDN: A RA Kite. In Computing, Communication and Networking Technologies (ICCCNT), 2017 8th International Conference on (pp. 1-7). IEEE, July , 2017.

[2] G , Robertson., L.P, Haines., R, Sanche and W., Biffart Positive change through computer networking. Teaching Exceptional Children, 29(6), p.22, 2009.

[3] L.A, Mandarano. Social network analysis of social capital in collaborative planning. Society and natural resources, 22(3), pp.245-260, 2009.

[4] J ,Millard. and W. Owens, UNIFIEDMARKET Inc. Method and system for a network-based securities marketplace. U.S. Patent Application 09/814,987, 2010.

[5] J.D, Wegner, R, Rockell and, C. Brandon,. IP addressing and subnetting including IPv6. Syngress Media, 2010.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Wireless Network And Security Enterprise. Retrieved from

"Wireless Network And Security Enterprise." My Assignment Help, 2020,

My Assignment Help (2020) Wireless Network And Security Enterprise [Online]. Available from:
[Accessed 10 July 2020].

My Assignment Help. 'Wireless Network And Security Enterprise' (My Assignment Help, 2020) <> accessed 10 July 2020.

My Assignment Help. Wireless Network And Security Enterprise [Internet]. My Assignment Help. 2020 [cited 10 July 2020]. Available from:

At, we understand that when students get stuck with tough assignments, they look for affordable services. To assist students with complex assignments, we have built a team of skilled cheap essay writers. has become one stop solution for all students who often look for answers related to their search similar to do my essay at the cheap rate or who can write my essay at affordable prices. Students prefer hiring us as we have the best provisions to render services related to do my essay online at a reasonable rate.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie)   Binary Format of Given Address is,         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Great work from expert! All good just missing one 1 reference, feedback and get it within a few hours.


User Id: 254651 - 10 Jul 2020


student rating student rating student rating student rating student rating

Amazing work, thank you very much I have achieved amazing results. Thank you for your hard work


User Id: 261191 - 10 Jul 2020


student rating student rating student rating student rating student rating

Really good work on the code. It ran perfectly and there were no mistakes in the code. All of the instructions were followed and there were no syntax errors at all.


User Id: 457776 - 10 Jul 2020


student rating student rating student rating student rating student rating

very clear answers, full of information. The doctor was very happy with the answers. Thank you.


User Id: 391476 - 10 Jul 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?