Network Review for SEC 6040: Web and Data Security
Verified
Added on  2023/06/03
|5
|753
|488
AI Summary
This review assignment covers identifying routers and switches, assigning IP addresses, identifying additional devices, and wireless network details for SEC 6040: Web and Data Security course at Wilmington University College of Technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
WILMINGTON UNIVERSITY COLLEGE OF TECHNOLOGY SEC 6040: Web and Data Security Week 1 – Review Assignment Network Review Pts: 100 pts 1)Using the diagram provided please identify the routers and the switches? (10 points) Device ImageNameFunctionality RouterA router is a networking device whose functionality is to route packets from one to another. The redirects the packets as per the routing table configuration. SwitchA switch is a networking device that expands the operability of a network. That is to say, it provides more ports for the computing devices to connect to the network. (Todd, 2016) 2)Please Assign IP addressing to each of the devices shown. If a device is meant to be a DHCP client, then indicate as such. For each system, please include the subnet mask and gateway for each system. If a system does not have a gateway address, indicate by not applicable. (Add additional rows as needed) (50 points) Subnet X SystemInterfaceIP AddressSubnet MaskGateway Address InternetEt0200.200.167.2255.255.255.252NA Lower RouterS0/0/0200.200.167.1255.255.255.252NA S0/0/1172.16.168.1255.255.255.252NA G0/0172.16.170.1255.255.255.0NA Upper RouterS0/0/1172.16.168.2255.255.255.252NA G0/0172.16.169.1255.255.255.0NA Device in Subnet ANIC172.16.169.2255.255.255.0172.16.169.1 Device in Subnet BNIC172.16.170.2255.255.255.0172.16.170.1 Device in Subnet CNIC172.16.171.2255.255.255.0172.16.171.1 Network Admin SystemNIC172.16.172.2255.255.255.0172.16.172.1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Explanations and assumptions Assumptions i.We assume that our public IP as provided by ISP is 200.200.167.2/2. ii.We assume that our private IP is 172.16.168.0/24. iii.We assume that system admin system is in a different VLAN iv.We assume that ISP router is represented inform of a cloud. v.We assume that the router, switch and cloud interfaces are connected as image below Explanations Given the IP address of 172.16.168.0/24 we had to come up with five subnets. Four of the subnets are treated equally in terms of number of address hosts (254 valid hosts) except for the subnet that is between the upper and lower router whose address host has only 2 hosts.
3)Identify what additional devices are needed (but not necessarily shown) for the basic functioning of a network. For each additional device that is identified please provide the necessary network information. This does not include – User file server, printers, scanners, etc. (15 points) i.Firewall Firewall hardware system is necessary to filter incoming and outgoing traffic. This offers security to our network making it less vulnerable to cyber-attacks. The firewall will be positioned between our lower router and the ISP router represented as cloud. When the firewall is included, our new addressing table will look as below: Subnet X SystemInterfaceIP AddressSubnet MaskGateway Address InternetEt0200.200.167.2255.255.255.252NA FirewallFe0/0200.200.167.1255.255.255.252NA Fe0/1172.16.173.1255.255.255.252NA Lower RouterS0/0/0172.16.173.2255.255.255.252NA S0/0/1172.16.168.1255.255.255.252NA G0/0172.16.170.1255.255.255.0NA Upper RouterS0/0/1172.16.168.2255.255.255.252NA G0/0172.16.169.1255.255.255.0NA Device in Subnet ANIC172.16.169.2255.255.255.0172.16.169.1 Device in Subnet BNIC172.16.170.2255.255.255.0172.16.170.1 Device in Subnet CNIC172.16.171.2255.255.255.0172.16.171.1 Network Admin SystemNIC172.16.172.2255.255.255.0172.16.172.1 (Academy, 2014) Network topology will look as below:
4)For the wireless portion of the network, identify additional details required for its proper functionality. (25 points) Wireless Access point requires the following details to work properly: i.SSID: this is the Wi-Fi network name. The network name will used to identify your network to the users. This name should be any unique name but easily identifiable with your organization. ii.Security: the wireless network portion requires security setting that will authenticate users and the security will encrypt their data. This will control access to the network and will specify level of privacy for information send over the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References Academy, C. N. (2014).Routing and Switching Essentials Companion Guide: Rout Swit Esse Comp Guid. Indiana Polis: Cisco Press. Todd, L. (2016).CCNA Routing and Switching Complete Review Guide: Exam 100-105.Hoboken: John Wiley & Sons.