BN303 Wireless Networks And Security

Hello, this question is here because we've worked on this and other similar assignments. If you don't know the answer, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

We got you covered for the whole semester.


Record WLAN access points in public areas (e.g. shopping centre, public place etc.).

Your choice.

Get technical information on three different locations that have at least 10 APs.

You can use the WLAN sniffing tool to detect and report on your WLAN activity.

Include these items in your report

You will find tables for each location that contain all technical information about WLAN setup.

b. Screenshots (as evidence) and detailed explanation to report the working mechanism (the steps by step process).

c. Explain (evaluation of) the technique used to secure and/or manage WLAN.

Discuss dual band and it’s benefits

Security implications

There are other aspects such as special network and multiple SSIDs.


For vulnerability testing, the WLAN interface is captured at a public spot near the home.

Acrylic Wi-Fi Home version can be used to analyze the wireless network and identify any potential risks.

You can also use other tools to analyze the wireless network in public.

You can analyze the signal quality, RSSI, channel, standards used and maximum speed using this tool.

The sniffer can also determine the strength of the signal and the quality of the network. It helps generate statistics of the network.

The sniffer is able to create an access point list and a statistic about the wireless network.

The sniffing tool also provides information about the coverage area and can determine the spectrum for choosing the best network connection.

The network sniffing tool can also be used to analyze signal quality and area coverage.

The Acrylic Wi-Fi tool allows you to find out the number of channels that the wireless access point provides. It can also be used to analyze performance of the wireless network.

An analysis of the wireless network near the house is made and a penetration test on the network is conducted to determine the vulnerability and risk.

The network sniffer can be used to check the version of WPS and WPA encryption used on the access points.

To identify the transmission capacity and bandwidth available to the network, it is necessary to segment the wireless signal’s coverage area.

This is how the tool works, including the sniffing of the network.

Information About The Wireless Network

Specific criteria are needed to plan the Wireless system. These include testing of system execution and flag scope. Pilot testing is also required.

Wi Fi signals can be produced using remote access focuses. To test the scope of the flag, a flagmeter is used. It quantifies the flag values required to cover the territory.

For testing the utility of the remote arrangement, it is necessary to dissect the business. Additionally, the security strategy used for the advancement and maintenance of the system are examined [2].

The strategy is composed of the blueprint and the conventions that were used for the development of the remote system.

The 802.11 standard is used in the current system. WPA/AES Convention is followed for security of the entrance point [6].

It is essential to evaluate the security of the system, as well as the accessibility point.

The Wi Fi access point needs to be broken down using wire shark.

The latency timeout and limit parameters have not been set [9].

To increase security, the entry point must be secured. In addition, the unutilized administration conventions should be disabled.

The system’s SSID is shown as its name. The system can be broken up to keep it safe from any pernicious system.

The current system was developed following the customer-to-customer method of transmission. Remote stations are connected to the system through the entrance point.

Customer correspondence is controlled using unique system correspondence conventions. Key security patches are also required.

Tests with the Sniffing Tool

Acrylic Wi-Fi home is used for sniffing remote systems near the home network. A underlying testing of the system is done to determine the state of dormancy.

It can be used to create a system score. The points of interest for transmission capacity, dormancy and jitter as well as security of the system are also available.

The report examines the limitations of remote systems. It also discusses possible hazard moderation methods that could be used to improve the security of remote systems.

In the report, the report examines different encryption systems that can connect and discusses the best practices an association can employ to advance the remote system.

For analyzing vulnerability and area coverage, the channels are analyzed by the network.

You can find the technical information regarding the channels at 2.4 Ghz and see it above.

An analysis of the current network also revealed the operating frequency.

The figure below shows the 5 Ghz channels of access points within the range of the wireless networks. This is used to identify vulnerabilities.

These channels are useful in locating the strongest access points.

Recommendation for Increasing the Security of WLAN

Wireless intrusion detection programs are required to prevent intruders from accessing internal network components or secure the network.

Tables For The Location

Below is a table for each location.

Data Rate

The Range


Distance between the base station and the nearest town 100m to 35km

0.009 – 0.014

900 MHz

0.384 to 2

IEEE 802.11a

50 meter

2.4 & 5.

Ultra wideband

10 Meter

IEEE 802.11b

100 Meter

10 Meter

Infrared IrDA

1.5-2.5 m


2.4 GHz

Home RF

50 meter

Network testing is done with the Wizard Net rank. It analyzes the bandwidth, latency (jitter), ping loss, and security of the network.

The Acrylic Wi-Fi Network Traffic Sniper can capture network packets that can be used to analyse the attack and be used later as evidence to report against it.

In this case, an attacker attempts to gain access to university content via a network. The network packets are captured and used to trace the source.

An Acrylic Wi Fi network traffic sniffer captures a frame. It can be further analysed to find the source address and destination address of the network.

Analyzing data packets allows you to find the arrival time and the epoch of data packets.

C. An explanation of the technique used to secure and manage

Discussion on the Dual Bands, and Its Advantage

Dual band wireless networks support communication in two different frequencies.

Two frequencies are supported: 2.4 Ghz, and 5 Ghz.

It can cover a larger area than the single-band with strong network signal strength. This allows for faster transmission of data packets within the network.

It is possible for remote system differences to arise. This can be due in large part to the small switch that utilizes single band.

Establishing the double-band correspondence direct in remote systems increases system speed.

Security Implication

An analysis of the current network environment is done to determine how security can be applied.

The unknown users cannot gain remote access to the network. It is necessary to disable the ARP protocol to reduce risk.

For security purposes, an encryption algorithm and strong password is needed. This will prevent hacker access to the network.

Other Aspects

Distribution of a remote system scope overview- The system manager has the responsibility to map the area of wireless network by inspecting the entrance point, SSID and other relevant information.

For security issues in the system, the system guide can be used to examine and manage the system.

Access Point Security Setup: Access Point security must be improved. All entrance signs must be secured in order to protect the point.

It is necessary to produce the gauge security setup and to reinforce it in case of emergency.

For increased security at the entrance point, it is necessary to re-design the standard settings.

Keep a record of every remote device in the system. This is necessary to ensure that the stock is maintained and that the approval of each gadget is reported to expand the range of errands.

Instructing clients about the different hazard of remote access- Clients using remote access points should be instructed about the variables that affect data security.

Inattention to clients can cause a bad arrangement to fail.

Audit at a standard interim of times – Logs should be checked at a general time interval to ensure that they are truthful and complete.

Any deviations from the standard in the system should be recognized and researched to improve the productivity of the system.

Andrews J.G. Zhang X. Durgin G.D. and Gupta A.K. (2016)

Are we nearing the fundamental limits to wireless network densification.

IEEE Communications Magazine 54(10), pages.184-190

Sharma, V., and Asrodia P.

Network monitoring and analysis using the packet sniffing method.

International Journal of Engineering Trends and Technology (IJETT), 4(5).

De Judicibus D. Leopardi, S. Modeo, L., and Pergola N. Toshiba Global Commerce Solutions Holdings Corporation.

Method and system for secure transactions over wireless networks.

Falk, R. and Kohlmayer F. Siemens Enterprise Communications Gmbh & Co. KG, 2013. Method and arrangement for providing a mesh wireless network.

Girdhar P. and Malik V. (2016).

A Study on Detecting Packets Using Sniffing.

Journal of Network Communications and Emerging Technologies. www.

Hu, W.H. Wang C. and Bagherzadeh N., 2015.

An analysis and design of a mesh wireless network-on chip.

The Journal of Supercomputing 71(8) pp.2830–2846

Zareen F., 2014.

Comparison analysis of wireless network audits with open source tools (Doctoral dissertation), BRAC University.

Liang C. and Yu F.R. (2015)

Wireless network virtualization: Some research questions and challenges.

IEEE Communications Surveys & Tutorials (17(1)), pp.358–380.

Ortiz (J.H.

Mobile ad-hoc networks: Current status and future trends.

CRC Press.

Cooperative adaptive cruise controlling: Network-aware analysis and prediction of string stability.

IEEE Transactions on Intelligent Transportation Systems. 15(4). pp. 1527-1537.

W. Stallings; Tahiliani M.P.

Vol. 6: Cryptography and network Security Principles and Practice (Vol.

Swapna B.T., Eryilmaz A., and Shroff N.B. (2013)

Throughput-delay analysis on random linear network code for wireless broadcasting.

IEEE Transactions on Information Theory. 59(10). pp.6328-6341.

If you don't know the answer to this question, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

You can trust us with any of your assignments. We got you covered for the whole semester. We dedicate one writer to do all your assignments

Leave a Reply

Your email address will not be published. Required fields are marked *