16
Devry NETW 360 Entire Course-Latest 2015 (All Discussions All ilabs All Project And Only Week 2 Quiz And No Final) IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-NETW-360-Entire-Course-Latest-2015- 124908587.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At [email protected] Question week 1) Given an RF cable with a certain length, signal loss/attenuation in the cable increases with frequency. d) Given a RF cable and a signal frequency, signal loss/attenuation in the cable increases with distance. Use the calculator in the Loss in a Coaxial Cable at 2.45 GHz section to complete the following steps: 1. Next to Choose type of cable, select LMR 400. This is a TMS cable that supports both 2.4 GHz and 5 GHz RF signals. 100 feet of such cable used on the 2.5 GHz range decreases the signal strength by about 6.76 dB (that is, 6.76 dB signal loss per 100 feet). 2. Click in the Length (meter) box and type 30.48 (100 feet = 30.48 meters). Click m? dB. What is the loss at this length? _____ 3. Click in the Length (meter) box and type 60.92 (200 feet = 30.48 meters). Click m? dB. What is the loss at this length? _____ 4. When the cable length doubles, how does the loss change approximately? _____ Task 3: Antenna gain calculations Antennas are often used to increase the power output of a transmitter. Antennas achieve this by focusing the existing power in a specific direction. Notice that the amount of power provided to the antenna from the transmitter does not change; the signal gain created by antennas is a passive gain.

Devry NETW 360 Entire Course-Latest 2015

Embed Size (px)

DESCRIPTION

Devry NETW 360 Entire Course-Latest 2015

Citation preview

Page 1: Devry NETW 360 Entire Course-Latest 2015

Devry NETW 360 Entire Course-Latest 2015

(All Discussions All ilabs All Project And Only Week 2 Quiz And No Final)

  IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load

http://www.hwspeed.com/Devry-NETW-360-Entire-Course-Latest-2015-124908587.htm?categoryId=-1

IF You Face Any Problem Then E Mail Us At [email protected]

Questionweek 1) Given an RF cable with a certain length, signal loss/attenuation in the cable increases with frequency.

d) Given a RF cable and a signal frequency, signal loss/attenuation in the cable increases with distance.

Use the calculator in the Loss in a Coaxial Cable at 2.45 GHz section to complete the following steps:1. Next to Choose type of cable, select LMR 400. This is a TMS cable that supports both 2.4 GHz and 5 GHz RF signals. 100 feet of such cable used on the 2.5 GHz range decreases the signal strength by about 6.76 dB (that is, 6.76 dB signal loss per 100 feet). 

2. Click in the Length (meter) box and type 30.48 (100 feet = 30.48 meters). Click m?dB. What is the loss at this length? _____

 

3. Click in the Length (meter) box and type 60.92 (200 feet = 30.48 meters). Click m?dB. What is the loss at this length? _____

 

4. When the cable length doubles, how does the loss change approximately? _____

 

Task 3: Antenna gain calculationsAntennas are often used to increase the power output of a transmitter. Antennas achieve this by focusing the existing power in a specific direction. Notice that the amount of power provided to the antenna from the transmitter does not change; the signal gain created by antennas is a passive gain.

Antenna gain in dBi or dBd is a parameter that describes the directionality characteristic of an antenna. Given a particular type of antenna, the higher the antenna gain, the more directional the antenna is, and the more focused the existing power is in a specific direction.

Parabolic or dish antennas are an example of highly directional antennas. Due to their relatively high antenna gain, dish antennas are typically used for point-to-point transmission links. The antenna gain of a parabolic antenna is directly related to the diameter of a dish antenna’s reflector and the signal frequency.

Use the calculator in the Antenna section to complete the following steps:1. Next to frequency band, select 2.41–2.48 GHz.

Page 2: Devry NETW 360 Entire Course-Latest 2015

2. Next to antenna diameter in meters, type 0.1 (0.1 meters = 3.9 inches). This is an optional antenna that could be added to an access point (AP).

3. Click D ? dB. What is the maximum theoretical antenna gain? _____

 

4. Next to frequency band, select 5.15–5.85 GHz.

5. Next to antenna diameter in meters, type 0.1 (0.1 meters = 3.9 inches)

6. Click D ? dB. What is the maximum theoretical antenna gain? _____

 

7. Given the same sized reflector, which signals, high-frequency or low-frequency, can be more efficiently focused by parabolic antennas (i.e., result in a higher antenna gain)?

Answer:

 

 

8. Next to frequency band, select 5.15–5.85 GHz.

9. Next to antenna diameter in meters, type 0.2 (0.1 meters = 7.8 inches)

10. Click D ? dB. What is the maximum theoretical antenna gain? _____

 

11. Given the same signal frequency, which dish antennas, large-sized or small-sized, are more efficient at focusing the signal (i.e., result in a higher antenna gain)?

Answer:

 

 

Task 4: Free space loss calculationsFree space path loss (FSPL) is the amount of signal loss/attenuation caused by signal dispersion over a distance. As does the light emitted from a flash light, RF signals spread out and weaken when propagating from an antenna. Notice that FSPL occurs regardless of the obstacles that cause reflection, diffraction, etc.; this is indicated by the “free space” phrase in its name.

Use the calculator in the Free space loss section to complete the following steps:1. Next to frequency band, select 2.41–2.48 GHz.

2. Next to kilometers, type 0.1 (100 meters = 0.1 kilometers).

3. Click dB ? km. What is the free space path loss in dB? _____

Page 3: Devry NETW 360 Entire Course-Latest 2015

 

4. Change the frequency band to 5.15–5.85 GHz.

5. Next to kilometers, type 0.1 (100 meters = 0.1 kilometers).

6. Click dB ? km. What is the free space path loss in dB? _____

 

7. How does the free space path loss for 802.11a (operating on the 5 GHz band) compare with 802.11g (operating on the 2.4 GHz band)?

Answer:

Answer:

 

NETW360 Week 2 iLab: RF Behavior CalculationsDate:Student’s Name:Professor’s Name: 

Task 1: Power calculationsUse the calculator in the Power section to complete the following steps:1. On the lower UNII-1 band (i.e., 5.150–5.250 GHz with 100 MHz channels), the maximum output power of the intentional radiator (IR) allowed by the FCC is 50 mW. The IR is also referred to as a wireless transmitter.

 

Click in the watts box and type 0.05 (50 mW = 0.05 watts). What is the dBm of 50 mW?

 

__________

 

2. On the middle UNII-1 band (i.e., 5.250–5.350 GHz with 100 MHz channels), the maximum output power of the intentional radiator (IR) allowed by the FCC is 250 mW.

 

Click in the watts box and type 0.25 (250 mW = 0.25 watts). What is the dBm of 250 mW?

__________

 

3. On the upper UNII-1 band (i.e., 5.725–5.825 GHz with 100 MHz channels), the maximum output power of the intentional radiator (IR) allowed by the FCC is 800 mW.

Page 4: Devry NETW 360 Entire Course-Latest 2015

 

Click in the watts box and type the given power level in watts. What is the dBm of 800 mW?

 

__________

 

Scroll down to the Receive Sensitivity section. Review the information regarding receive sensitivity.4. The receive sensitivity of a LinksysWUSB600N wireless network adaptor at 54 Mbps is -70 dBm. Click in the dBm box and type -70. What are the watts of -70 dBm?

 

__________

 

5. The receive sensitivity of a LinksysWUSB300N wireless network adaptor at 54 Mbps is -68 dBm. Click in the dBm box and type -68. What are the watts of -68 dBm?

 

__________

6. If you have to choose between these adaptors based on their receive sensitivity at the bit rate of 54 Mbps, which adaptor will potentially perform better in achieving the desired bit rate?

 

__________

 

Task 2: Cable loss calculationsUse the calculator in the Loss in a Coaxial Cable at 2.45 GHz section to complete the following steps:1. Next to Choose type of cable, select LMR 400. This is a TMS cable that supports both 2.4 GHz and 5 GHz RF signals. 100 feet of such cable used on the 2.5 GHz range decreases the signal strength by about 6.76 dB (that is, 6.76 dB signal loss per 100 feet). 

2. Click in the Length (meter) box and type 30.48 (100 feet = 30.48 meters). Click m?dB. What is the loss at this length? __________

 

3. Click in the Length (meter) box and type 60.92 (200 feet = 30.48 meters). Click m?dB. What is the loss at this length? __________

 

4. When the cable length doubles, how does the loss change, approximately? __________

Page 5: Devry NETW 360 Entire Course-Latest 2015

 

Task 3: Antenna gain calculationsUse the calculator in the Antenna section to complete the following steps:1. Next to frequency band, select 2.41–2.48 GHz.

2. Next to antenna diameter in meters, type 0.1 (0.1 meters = 3.9 inches). This is an optional antenna that could be added to an access point (AP).

3. Click D? dB. What is the maximum theoretical antenna gain? __________

 

4. Next to frequency band, select 5.15–5.85 GHz.

5. Next to antenna diameter in meters, type 0.1 (0.1 meters = 3.9 inches)

6. Click D? dB. What is the maximum theoretical antenna gain? __________

 

7. Given the same sized reflector, which signals, high-frequency or low-frequency, can be more efficiently focused by parabolic antennas (i.e., result in a higher antenna gain)?

 _

 

8. Next to frequency band, select 5.15–5.85 GHz.

9. Next to antenna diameter in meters, type 0.2 (0.1 meters = 7.8 inch

 

week 3

NETW360 Week 3 iLab: Observing RF ActivitiesWireless signals are invisible to the human eye. To observe these signals, tools such as a spectrum analyzer are required. Displaying wireless signal strength with respect to its frequency, a spectrum analyzer typically captures activities in a pre-defined range of frequencies. It is often used for layer 1 site survey in WLAN monitoring and planning.

In this lab, students learn how to use a spectrum analyzer to identify potential RF interferences on a wireless LAN. Notice that the analyzer operates on the 2.4 GHz and 5 GHz bands; students will observe RF activities across the 11 WLAN channels of the 2.4 GHz band.

 

Task 1: TutorialReview Tutorial: Using Spectrum Analyzer Wi-Spy located in Appendix A.1. Name the three default views of Chanalyzer 3.4 that display RF activities from different perspectives.

 ____________________________________

Page 6: Devry NETW 360 Entire Course-Latest 2015

 2. Explain what hardware and software are required in this iLab to capture and visualize RF activities.____________________________________ 

9. In the Chanalyzer window, open the second capture file: Capture3.wsr. Let the recording run for at least 5 minutes, and answer the following questions in your lab report. 

10. Click on the vertical SIGNATURES tab on the right of the Chanalyzer window. Scroll down the list, and compare the signatures to the pattern shown in the Topographic View window. What device most likely generated the RF activities across channels 8 and 9 in the capture file?

 ________________________________________

 11. Click on the vertical INSPECTOR tab on the right of the Chanalyzer window. Move the cursor over the center frequency of the RF pattern in the Topographic View window. Double-click the mouse in any of the three views to generate a vertical referencing line. Double-click again to remove it. What frequency (not channel!) is being used by this device?

________________________________________

12. In the Chanalyzer window, open the fourth capture file: Capture4.wsr.Let the recording run for a few seconds, and answer the following questions in your lab report. 

13. Click on the vertical SIGNATURES tab on the right of the Chanalyzer window. Scroll down the list, and compare the signatures to the pattern shown in the Topographic View window. What device most likely generated the RF activities around channel 6 in the capture file?

 _______________________________________

 14. Wait until the capture file stops running. Click on the vertical INSPECTOR tab on the right of the Chanalyzer window. Switch on both the Max and Average formats in the Planar View window. Move the cursor over to the center frequency (i.e., channel 6) of the RF pattern in the Topographic View window. What are the maximum signal strength and average signal strength in dBm recorded in this capture, respectively?

 _________________________________________

 

15. In the Chanalyzer window, click File and Exit to close the program.

 

Appendix A 

Tutorial: Using the Spectrum Analyzer Wi-Spy 

The hardware used to capture and record the activities on the 2.4 GHz band in this lab is a USB-based spectrum analyzer: Wi-Spy from Metageek (www.metageek.net). 

The device itself looks like this:

Page 7: Devry NETW 360 Entire Course-Latest 2015

 

As demonstrated in the following diagram, Chanalyzer is the program that displays what is captured by Wi-Spy and helps visualize the RF activities.

 

Observing data (required in this iLab) 

The red line at the bottom of the diagram indicates the time line of a data capture. In this particular case, the capture has lasted for 29 seconds.

 

d in this iLab to capture and visualize RF activities.  

week 4

  

NETW360 Week 4 iLab: Observing 802.11 FramesDate:Student’s Name:Professor’s Name: 

Task 2: Beacon Frames2. Record the basic information of the beacon frame below in the lab report document. Afterwards, shrink the header by clicking the – sign to its left.

 

Type/Subtype of the frame: Source MAC address:

 

Destination MAC address:

 

3. Next expand the radiotap header by clicking the + sign to its left. Record the radio information of the beacon frame below in the lab report document. Afterwards, shrink the header by clicking the – sign to its left. 

Data rate: Channel frequency:

 

Channel tyPe:

 

Page 8: Devry NETW 360 Entire Course-Latest 2015

4. Next expand the IEEE 802.11 wireless LAN management frame section. Expand both the fixed parameters and tagged parameterssubsections. Provide the following information in the lab report document. Afterwards, shrink the header by clicking the – sign to its left. 

Beacon Interval: SSID:

 

Supported Rates:

 

5. What type of address, unicast, multicast, or broadcast is a beacon frame’s destination MAC address? Why?

 

6. What’s the significance of increasing and decreasing the beacon interval, respectively, on a WLAN?

 

Task 3: Probe Frames3. Expand the IEEE 802.11 probe request header by clicking the + sign to its left. Record the following information in the lab report. Afterwards, shrink the header by clicking the – sign to its left.

 

Type/Subtype: Destination MAC address:

Source MAC Address:

 

4. Expand the IEEE 802.11 wireless LAN management frame header by clicking the + sign to its left. Record the following information in the lab report.

 

SSID: Supported Rates:

 

Extended Supported Rates:

 

6. Expand the IEEE 802.11 probe request header by clicking the + sign to its left. Record the following information in the lab report. Afterwards, shrink the header by clicking the – sign to its left.

 

Page 9: Devry NETW 360 Entire Course-Latest 2015

Type/Subtype: Destination MAC address:

 

Source MAC Address:

 

7. Expand the IEEE 802.11 wireless LAN management frame header by clicking the + sign to its left. Record the following information in the lab report.

 

SSID: Supported Rates:

 

Extended Supported Rates:

 

8. Is the destination address of the probe response frame the same as the source address of the previous probe request frame?

 

9. When a wireless client is looking for an access point or network, what frame(s) are involved in the passive scanning process? What frame(s) are involved in the active scanning process?

 

Task 4: Authentication and Association Frames3. Expand the IEEE 802.11 authentication and 802.11 wireless LAN management headers. Record the following information in the lab report. If needed, shrink the headers by clicking the – sign to their left.

 

Type/Subtype: Authentication algorithm:

 

Authentication SEQ: Status code:

 

5. Expand the IEEE 802.11 authentication and 802.11 wireless LAN management headers. Record the following information in the lab report. If needed, shrink the headers by clicking the – sign to their left.

 

Type/Subtype: Authentication algorithm:

 

Page 10: Devry NETW 360 Entire Course-Latest 2015

Authentication SEQ: Status code:

 

8. Expand the IEEE 802.11 association request and 802.11 wireless LAN management headers. Record the following information in the lab report. If needed, shrink the headers by clicking the – sign to their left.

 

Type/Subtype: SSID:

10. Expand the IEEE 802.11 association request and 802.11 wireless LAN management headers. Record the following information in the lab report. If needed, shrink the headers by clicking the – sign to their left.

 

Type/Subtype: Status code:

 

Association ID:

 

week 5

 

 NETWNETW360 Week 6 iLabEvaluating Security-Related WLAN ProblemsIn this lab, three scenarios are presented as examples of how WLAN security is addressed from different aspects: signal spillage, security standards, and rogue access points. Students are expected to fully understand each scenario, correctly identify the problem(s), and sufficiently justify their recommendations.

Scenario I: Signal SpillageSignal spillage refers to the reach of Wi-Fi signals that is beyond the perimeter of an intended coverage area. Signals spilling outside the perimeter could be received and potentially be interpreted by outsiders. Given the reciprocal nature of antennas, a high-gain directional antenna can also be used to “amplify” weak Wi-Fi signals on the edge of the perimeter. Although the signal coverage area and physical boundary of a location may not be matched perfectly, signal spillage should be limited to reduce security risks.

 

Refer to the site survey diagram below. The Wi-Fi signal coverage area overlays with the second-floor physical layout of a campus building. The coverage area is color-coded with the descending signal strength from green, light green, yellow, to orange.

1. Compare the physical boundary of the building to the signal coverage area. Name a couple of locations where the incidents of signal spillage occur (e.g., the northwest corner)?

 

Page 11: Devry NETW 360 Entire Course-Latest 2015

2. Assume the external antennas being used are all omni-directional with an antenna gain of 2.14 dBi. Given all other conditions remain the same, how would relocating some of the access points to a different part of the floor help reduce the amount of signal spilling outside of the building?

 

3. Given all other conditions remain the same, how would replacing some of these antennas help reduce the amount of signal spilling outside of the building? What type of antennas would you recommend?

 

4. Given all other conditions remain the same, how would adjusting the power level of some access points help reduce the amount of signal spilling outside the building? What undesirable outcome, from the signal coverage perspective, will likely be caused by such isolated adjustments?

 

5. Research a couple of other methods that could help reduce signal spilling outside of a building.

  

Scenario II: WLAN Security StandardsIn addition to securing the perimeter of a network, encrypting the information itself has always been an important component of the security paradigm. This works well for data applications on a WLAN, as you will realize after evaluating Scenario II.

 

On a Voice over Wi-Fi (VoWiFi) network, however, encryption could pose a negative impact, such as choppy voice and echo problems, on delay-sensitive voice traffic. This is mainly due to 1) the extra encryption/decryption latency and 2) the overhead to Wi-Fi frames (e.g., extra 8 bytes from the WEP/RC4 encryption, extra 20 bytes from the WPA/RC4 encryption, and extra 16 bytes from the WPA2/AES encryption). Encryption, when being applied to real-time traffic, needs to be carefully considered.

 

Assume that the “Monitor” WLAN as shown below is assigned to a sales department. On a daily basis, sales data, including the credit card/check payment details, are transmitted on the network.

 

 1. Refer to the diagram above. Is the network, as well as the information transmitted on the network, protected from eavesdropping?

  

2. Among the typical security standards, such as WEP, WPA personal, WPA enterprise, WPA2 personal, and WPA2 enterprise, which one is best suited for the intended use of the “Monitor” network as described in this scenario?

 

3. Justify your recommendation in the previous question.

Page 12: Devry NETW 360 Entire Course-Latest 2015

 

Scenario III: Rogue Access PointsMany wireless attacks, for example, man-in-the-middle and Denial-of-Service (DoS), start with a rogue access point. Enterprise WLAN controllers typically have the built-in capability of identifying and even quarantining access points that are not under its management. At times, a WLAN professional is also expected to physically locate and remove the rogue device.

 

The process of locating a rogue device requires a WLAN tool that measures the received signal strength from the targeted device. An external directional antenna, as compared to the typical omni-directional antennas, could speed up the process by zeroing in the direction of the targeted device.

 

Refer to the outcome of a recent wireless network sweep as shown below. As part of the security policy, all SSIDs used on this office network should start with “NETW”.

 

  1. Refer to the screenshot. What’s the name of the identified rogue access point?

 

2. Given the inSSIDer software installed on a laptop, how would one go about physically locating this rogue access point?

 

NETW360 Week 6 iLabEvaluating Security-Related WLAN Problems 

Date:Student’s Name:Professor’s Name: 

Scenario I: Signal Spillage1. Compare the physical boundary of the building to the signal coverage area. Name a couple of locations where the incidents of signal spillage occur (e.g., the northwest corner)?

  

Task 2: Monitoring Signal StrengthThe amplitude of a wireless signal measured by WLAN and site survey tools is referred to as received signal strength indication (RSSI). Higher RSSI values are often associated with higher data rates and fewer retransmissions. RSSI is typically used by vendors for purposes such as roaming handoff and data rate switching. It could also be used, during a site survey, to mark the coverage boundary of an access point. For instance, Cisco recommends the minimum RSSI of -67 dBm for voice applications.

 

Page 13: Devry NETW 360 Entire Course-Latest 2015

Notice that RSSI is an indicator of relative signal strength; it could be mapped to the actual signal strength based on each vendor’s specifications. Different vendors’ tools most likely provide different RSSI values in the same environment. Therefore, RSSI values from different vendors should not be directly compared to each other.

 

ksys” access point shown below and answer the following questions.

  

a) What’s the Signal strength of this access point when the screenshot was taken?b) What’s the Link Score? 

3. At the same location, position the laptop with inSSIDer installed on top of the computer table.

 

Refer to the detailed information about the “linksys” access point shown below and answer the following questions.

 

  a) What’s the Signal strength of this access point when the screenshot was taken?b) What’s the Link Score?c) What could be the reason that the signal strength is higher, although the distance between the access point and the wireless client (with inSSDIer installed) has not changed?

  

4. The laptop with the insider software installed is moved further away from the “linksys” access point into a different room across the hall.

 

Refer to the detailed information about the “linksys” access point shown below and answer the following questions.

 

a) What’s the Signal strength of this access point when the screenshot was taken? 

b) What’s the Link Score? 

week 7 

NETW360 Week 7 iLabTroubleshooting Common WLAN ProblemsFour WLAN troubleshooting scenarios are presented in this lab. Students are expected to practice a typical troubleshooting process: understanding the problem, identifying possible causes, verifying the causes, and recommending solutions.

 

Page 14: Devry NETW 360 Entire Course-Latest 2015

 

 

Scenario III 

Scenario IV 

NETW360 Week 7 iLab