Proposal
by Stan Chen
1. 2. Literature Review
1.1. 2.1 Introduction
1.1.1. WEP
1.1.2. ACLs
1.1.3. 802.11 Authentication
1.1.4. SSID
1.2. 2.2 VoIP
1.2.1. WEP Encryption
1.2.2. WEP Data Integrity
1.2.3. ACLs
1.2.4. Shared key Authenticaion
1.2.5. SSID
1.3. 2.3 IPv6
1.3.1. Place Edge Firewall
1.3.2. Employ VPN
1.3.3. Turn on WEP
1.3.4. Alternatives to VPN - SSH & IPSec
1.3.5. Key Management
1.3.6. Place Client Firewall
1.3.7. Reduce Power
1.3.8. Test your security
1.3.9. EAP
1.4. 2.4 IPSec
2. 4. Bibliography
3. 1. Introduction
3.1. 1.1 Research Problrems
3.2. 1.2 Aims and Objectives
3.3. 1.3 Research Background
3.4. 1.4 Significance of Study
3.5. 1.5 Limitations of Study
4. 3. Research Methodology
4.1. 3.1 Approach
4.2. 3.2 Implementation
4.2.1. Building Test Scenario
4.2.2. Participants
4.2.3. Data Garthering
4.2.4. Data Analysing