CS4445 Jiangsu University of Technology Wireless Network Policy Paper

User Generated

1056306758_

Computer Science

CS4445

Jiangsu University of Technology

Description

Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with one access point. This is not a trivial task. Do not just jot down a few notes. Make it a one-page document for people in your firm to read, not something for your teacher to read.


1. Do the following: • Download Wireshark. • Start Wireshark. • Turn on Wireshark capture. •Type a URL in your browser window (not Wikipedia.org). •After a few seconds, stop the capture. • Answer the following questions:

1a.What URL did you use? What was the IP address of the webserver?

1b.Find the frame in which your PC sent the SYN packet. List the source and destination IP address, the source and destination port numbers, and the header checksum.

1c.Select the SYN/ACK packet. List the source and destination IP address, the source and destination port numbers, and the header checksum.

1d.Select the packet that acknowledges the SYN/ACK segment. List the source and destination IP address, the source and destination port numbers, and the header checksum.

2. Change the options so that only packets you send are recorded. Do a capture. Click on the window containing Wireshark and hit Alt-Enter. This captures the window to your clipboard. Paste it into your homework.


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Last Name 1
Your Name
Instructor Name
Course Number
Date

Question 1: Wireless Network Policy
To ensure information security firstly Ethernet network jerks should be disabled to ensure
the physical security of the network peripherals. However wireless devices such as laptops may
still link with nearby APs. This thus necessitates for network policy is meant to secure the
network, protecting the database that contains the user credentials. This thus calls for the
incorporation of cryptographic security to offer protection between the wireless hosts as the
wireless access points. This may, therefore, necessitates the inclusion of an initial identification
and authent...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags