Stotz_Lab9

docx

School

Frostburg State University *

*We aren’t endorsed by this school

Course

241

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by MasterFangLark38

Report
Aidan Stotz Online Kelley. LAB 9 – NETWORKS (45 POINTS) Objectives: Define basic networking terminology Identify the components of a communication system List the steps to setup and configure a secure local area network SECTION I: SETTING UP A HOME WI-FI NETWORK – 20 POINTS (2 POINTS EACH) Read the article How to Set Up Your Home Wi-Fi Network and answer the following questions. You will see several links in the article that will take you to other pages that will explain terms more thoroughly. If one of the steps in the article has a link, click on it to get more information to answer the question. Some pages have helpful short videos. 1. Before you begin setting up a home Wi-Fi network, what are the things you need? You need a wirless router and modem. 2. What is Wi-Fi protected Setup (WPS) and why should it be disabled? WPS is Wi-Fi-Protected-Setup and it should be disabled because it is a security risk. 3. What is the best location for the wireless router? The best location for the wireless router is in a central location which is free from obstructions that could cause wireless interference. 4. How do you connect the router to the modem? You connect the router to the modem through a connection of an ethernet cable. 5. What is an Ethernet cable? An ethernet cable is a common network cable that connects devices to one another. 6. What is the difference between a Category 5 and a Category 6 Ethernet cable? The difference between a Cat 5 and a Cat 6 are that Cat 5 is the fifth generation of ethernet cables with a small number of limited abilities compared to the Cat 6 which has more ability’s and also is backwards compatible with Cat 5. 7. What is the first thing you do after logging into the router? The first thing to do after logging into a router is to change the default username and the password of the administrator login. 8. Explain the difference between WPA2, WPA, and WEP encryption. The differences between all three types of encryptions are that WPA2 and WPA is much more secure compared to WEP. Yet WPA2 is the second generation for WPA which is slightly more secure than WPA. 9. What is the Service Set Identifier (SSID) and how do devices use it? A SSID is the primary name associated with wireless local networks. Devices use this as the name of the network. 10. After the router and network is configured, how does a device connect to it? A device connects through it wirelessly where the device shows nearby networks. SECTION II. USE THE COMMAND LINE TO VIEW NETWORK STATUS AND CONNECTIONS – 17 POINTS See the instructions below to open the Command Prompt (PC) app or the Terminal window (Mac) Revised Spring 2022 Page | 1
PC Users – open the Command Prompt app and select “Run as administrator”. Your screen should look like this: Mac Users – Open a Terminal Window: Finder Applications Expand Utilities Terminal. Your screen should look like this: A. PING A DOMAIN NAME – 1 POINTS Ping is the command used to see if a device with an IP address is available. Use the ping command to find the IP address for AT&T. Type: ping att.com and press Enter (If you are using the Mac terminal window, press Ctrl+ c, if necessary, to stop the command once you’ve gotten a few responses.) 1. What is the IP address of att.com? 144.160.155.43 B. PING AN IP ADDRESS – 2 POINTS Now try pinging the IP address 31.13.71.36. Note you can ping either the IP address, or the Domain Name URL address. Notice the time it takes for the round-trip ping, in milliseconds. 1. Resize your Command Prompt or Terminal window show that it shows both pings and paste a screenshot below. ( Resize to the width of the margin. ) Close the Command Prompt or Terminal window. C. LOOKUP AN IP ADDRESS – 2 POINTS Go to WhatIsMyIPAddress.com and in the “Get IP Details” box, enter the IP address you entered in #B above. 1. Whose IP address is it? Facebook D. PING LOOPBACK IP ADDRESS – 2 POINTS Revised Spring 2022 Page | 2
127.0.0.1 is a special IP address called the loopback address. (Go to this article to learn more about how the loopback IP address is used). If you were unable to access the network, you can ping this address to make sure that your system is working properly. That will help you determine if the problem is with your computer or somewhere else on the network. 1. Using the instructions at the beginning of this section on Page 1, open a Command Prompt (PC) or Terminal (Mac) window. Type ping 127.0.0.1 and press Enter . Again, if you are using Mac, use CTRL+C to interrupt the responses. Notice the round-trip ping time because it is pinging itself. Insert the screenshot below. ( Resize your screenshot to fit the width of the margin ) E. IPCONFIG (PC) | IFCONFIG (MAC) – 4 POINTS Internet Protocol Configuration (ipconfig on a PC and ifconfig on a Mac) will display basic networking information on a computer and is often used as a network troubleshooting command. The PC command gives much more information than the Mac command so you will have additional steps if you have a MAC 1. Open a Command Prompt or Terminal window and type ipconfig /all (PC) or ifconfig -a (Mac) – Note: you must add a space after ipconfig and ifconfig. Then press Enter. Look for the network adapter that lists the Connection-specific DNS Suffix (PC) or the entry that shows “status: active” (Mac) and snip a copy of the screen that shows the details of that connection and paste it below. NOTE: please do not submit a screenshot of the entire screen – just snip the part of the screen that lists the Connection- specific DNS Suffix (PC) or “status:active” (Mac) ( Resize your screenshot to fit the width of the margin ) 1. What is your IPv4 (PC) or inet (Mac) address? inet6 fe80 2. What is your Default Gateway (router) address? (Mac users will need to go through System Preferences. Click Network, choose the network connection you're using, then click Advanced . Click the TCP/IP tab and locate the IP address next to Router .) Answer 192.168.1.1 3. What is your MAC Address? This will be under Physical Address (PC) and Mac users will click on the Hardware tab of the Network window (see #3 above) f8:ff:c2:23:e1:47 F. HOSTNAME – 2 POINTS Hostname : this command tells you the host name of your computer. Type hostname and press Enter Revised Spring 2022 Page | 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1. What is your host name? fios-router.home G. TRACERT (WINDOWS) | TRACEROUTE (MAC) – 4 POINTS Tracert (Windows) and traceroute (Mac) : this command traces the path from one networked node to another, identifying all intermediate hops (gateways) along the way. Use one of these commands to find the path to an IP address. Be patient, this can take a few minutes. For Windows type: tracert google.com and press enter For Mac, type: traceroute google.com and press Enter 1. What is the site IP address? 192.168.1.1 2. How many hops did it take? (Note: the command numbers each hop; disregard the notice that says “over a maximum of 30 hops” as that just tells you the maximum it will run.) 8 hops 3. Use tracert to find the path to your gateway device. You will need the IP address of your gateway(router) from Section I. Type tracert gateway (replacing the word “gateway” with the IP address of your default gateway (PC) or router (Mac) from section E, #3 above) How may hops did it take? 17 hops 4. Why do you think it took this number of hops? Because the hops must go through networks to reach my device. SECTION III: SAMPLE WIRELESS NETWORK – 8 POINTS Examine the screen capture below. They are the settings for the wireless network as AACC. Revised Spring 2022 Page | 4
Use this information to answer the questions in this section. 1. What is the service set identifier (SSID) for this network (1 point) AACC Wireless ? 2. Would another computer connecting to this wireless network use the same SSID? Explain. (2 points) Yes because that is what is associated as its name of the network and will show that way on all devices. 3. Look at the AACC Wireless Network Properties dialog box above. Which wireless encryption method would be best for the secured school network? Explain why. (Note: this question is asking what the most secure option is.) (1 points) WPA2- Enterprise because it is the most secure of the three and is made for large amounts of users as schools. 4. Let’s say that the college decided that it would make the AACC Wireless network require a password, such as a MyAACC login. What implications does that have for the user that might want to have access to the network? (2 points) You will need to sign in to use the wifi network. 5. The AACC Wireless network is an open connection requiring no password to join. What implications does that have for the user? (2 points) Is a security risk since it cannot track whos on the network and whom may be stealing or mining information. SUBMISSION INSTRUCTIONS 1. Make sure you have entered your name and section number at the top of the document. 2. Save the document as LastName_Lab9.docx , replacing LastName with YOUR last name. Revised Spring 2022 Page | 5
3. Submit the assignment to the Lab 9 dropbox in Canvas by the due date. Revised Spring 2022 Page | 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help