Latest Activity In Study Groups

Join Your Study Groups

VU Past Papers, MCQs and More

We non-commercial site working hard since 2009 to facilitate learning Read More. We can't keep up without your support. Donate.

CS315 Network Security Assignment No 03 Fall 2020 Solution & Discussion Due Date: 28-01-2021

CS315 Network Security Assignment No 03 Fall 2020 Solution & Discussion Due Date: 28-01-2021

Assignment No. 03

Semester: Fall 2020

CS315: Network Security

Total Marks: 15

Due Date: 28 Jan 2021


Please read the following instructions carefully before submitting assignment:

You need to use MS word document to prepare and submit the assignment on VU-LMS.

It should be clear that your assignment will not get any credit if:

§  The assignment is submitted after due date.

§  The assignment is not in the required format (doc or docx).

§  The submitted assignment does not open or file is corrupt.

§  Assignment is copied (partial or full) from any source (websites, forums, students, etc).



To enhance the learning capabilities of the students about:

§  Basics of Wireless LAN

§  Distribution System

§  Wireless LAN security

§  IEEE 802.11i Services

§  Multipurpose Internet Mail Extension (MIME) header fields





Question No.1

Suppose a university wants to establish a Wireless Local Area Network (WLAN) for faculty members of its three departments i.e. English, Computer Science (CS) and Law. For this, the university wants to install one Access Point in each department’s faculty office which is situated in three separate blocks / buildings within the premises of the university’s main building. All the access points will be connected to a Wireless Distribution System (WDS) which will be further connected to an Internet Gateway. The WLAN will enable the faculty members to connect their laptops, tablets and mobile phones in the network to gain the Wi-Fi Internet and network resource sharing services even while moving from one department to another. In order to prevent from any un-authorized access to WLAN, the university management wants a smooth running and a well secured network.

After carefully analyzing the above given scenario and considering yourself as Computer Network Security Specialist, you are required to give the answers of the questions in the perspective of IEEE 802.11 Standard for WLAN as given in the following table:




How many Basic Service Sets exist in the proposed WLAN?


How many Extended Service Sets are there in the proposed WLAN?


Which layer of IEEE 802.11 protocol stack will be responsible for controlling the access to the transmission media?


Which layer IEEE 802.11 protocol stack will define the characteristics /specifications of access points?


Which service will be responsible for traversing the MAC protocol data unit in event of communication between two stations of English and Law departments?


If a faculty member of Computer Science (CS) department moves with his tablet from CS to English Department then what kind of transition will happen?


If a faculty member of Law department tries to connect his mobile phone with the wireless network while sitting in faculty office of the same department then which service will create initial association between mobile phone and the Access point installed in the department?


Unlike the wired network, the wireless networks are considered more prone to unauthorized access. In your opinion, which security service defined by IEEE 802.11i will control the network access in the university and will ensure that only the authorized users i.e. the faculty members will be able to connect their systems/devices with the network?  


Name the improved security algorithm for IEEE 802.11i which can provide security to the university’s wireless network equal to wired network.


Mention the service defined by IEEE 802.11i to provide the security at the message level, so that the message sent by a faculty member to another could not be altered in between.



Question No.2

Following table contains the list of Multipurpose Internet Mail Extension (MIME) header fields along with their descriptions. However, all the descriptions are mismatched to their corresponding header fields. You are required to read the descriptions carefully then match and write the correct corresponding field in the “Correct Field Arrangement” column in the following table:


S. No

Field Name


Correct Field Arrangement



It provides useful information of an object with the body that is not readable.





This indicates that the message conforms to RFCs 2045 and 2046.



Content ID

It is used to identify the type and subtype of data in the body of a message.




It is used to identify MIME entities uniquely in multiple contexts.



Mime Version

It indicates the type of transformation that has been used to represent the body of the message in a way that is acceptable for mail transport.






Best of Luck!

Views: 98

Replies to This Discussion

Share the Assignment Questions & Discuss Here.... 

Stay touched with this discussion, Solution idea will be uploaded as soon as possible in replies here before the due date.


Looking For Something? Search Below

Top Trends 

1 memon


Latest Activity

© 2022   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service