NETW191+Final.Project.Bradley

pptx

School

DeVry University, Chicago *

*We aren’t endorsed by this school

Course

191

Subject

Computer Science

Date

Feb 20, 2024

Type

pptx

Pages

14

Uploaded by ChancellorFang10858

Report
NETW191 FINAL PROJECT RASHAAD BRADLEY
INTRODUCTION Over the past 8 weeks, I’ve been completing specific tasks, those task include: Assigning an IPv4 address to the SOHO Router virtual machine. Testing the connectivity among two computers and SOHO router. Using a class C network to divide its block of IP addresses into subnets then configuring two loopback interfaces on the SOHO router. Using Microsoft Visio to create a network diagram that depicts the interconnection of the computer 1 VM, computer 2 VM and the SOHO router VM. Exploring and researching router configurations that could be used to add protection to a SOHO wireless network.
MODULE 2: IPV4 ADDRESSING This screenshot shows the terminal window that shows the default gateway IP address.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
MODULE 2: IPV4 ADDRESSING This screenshot shows the interfaces page, that shows the new IPv4 address on the LAN interface.
MODULE 3: CONNECTIVITY TEST COMPUTER 1 VM COMPUTER 2 VM These 2 screenshots depict the IPv4 address of the Computer 1 VM and Computer 2 VM.
MODULE 3: CONNECTIVITY TEST COMPUTER 1 VM COMPUTER 2 VM These 2 screenshots depict the connectivity tests between the Computer 1 VM and the other two devices and the connectivity between the Computer 2 VM and the other two devices
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
MODULE 4: IP SUBNETTING & LOOPBACK INTERFACES This screenshot shows both Loopback1 and Loopback2 interfaces and their correct IPv4 addresses.
MODULE 4: IP SUBNETTING & LOOPBACK INTERFACES This screenshot should show two successful ping tests from the Computer1 VM to the Loopback1 and Loopback2 interfaces.
MODULE 5: MICROSOFT VISIO NETWORK DIAGRAM The diagram I created illustrates the interconnection of the Computer 1 VM, the Computer 2 VM and the SOHO Router VM along with proper addressing and labeling.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
MODULE 6: SOHO WIRELESS NETWORK SECURITY 1. What are the factory default username and password of a TP-Link router? Why is it important to change the default username and password of a SOHO router? Answer: The factory default username and password are “admin”. It’s important to change the default username and password because, keeping it as the default anybody would be able to access your router. 2. To protect a SOHO wireless network with a small number of devices, which address management method provides more control, configuring the device IP addresses manually (static IP) or using a DHCP server (dynamic IP)? Why? Answer: The address management method that provides more control, configuring the device IP address manually is a Static IP address. I say this because, it requires manual configurations and allows network devices to retain the same IP address all the time. 3. What does MAC filtering do? If needed, when would you use deny filtering rules and when would you use allow filtering rules? What happens to devices that want to connect, if the “Allow the stations specified by any enabled entries in the list to access” function is enabled but there are no entries in the list? Answer:
MODULE 6: SOHO WIRELESS NETWORK SECURITY 1. What wireless security settings are displayed on the Wireless Security page? Which one is recommended by the vendor? Why? Answer: WEP, WPA, WPA2 and WPA3. The one recommended by the vendor is WPA/WPA2 because, WPA utilizes the TKIP and it also uses the AES algorithm. 2. Among the configurations you explored in this module, which one is a true security function? Why? Answer: I want to say that the true security function in this module was the Wi-Fi Security Configuration because, of the AES encryption method. 3. What would you do to protect your wireless network at home? Why? Answer: In order to protect my wireless network at home I would change all default settings to customized ones that I created myself. Make sure my passwords aren’t easy enough for someone to figure out.
CAREER SKILLS Learned the structural hardware necessary to connect and support hosts and network devices. How to troubleshoot common addressing and network problems by using common command-line utilities. How to set up, manage, secure and troubleshoot local wireless networks. How to correct some common transmission problems. How to manage vulnerabilities through effective security policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
CHALLENGES I had difficulties filling out the graph in module 4, I kept having the wrong subnets and it took me a while to figure out that it wasn’t as difficult as I was making it seem. I also struggled with making the network maps in Visio, since it was something new to me, I used the wrong network.
CONCLUSION This project was a great learning experience and although I faced a few challenges, there were none that I couldn’t overcome. The skills, troubleshooting and knowledge I’ve gained in this course, will be irreplaceable and beneficial, not only in my future career but my personal life as well.