Wilmington University SEC 6040: Network Devices and Addressing

Verified

Added on  2023/06/03

|5
|753
|488
Homework Assignment
AI Summary
This document presents a comprehensive solution to a network review assignment for SEC 6040: Web and Data Security at Wilmington University. The assignment focuses on identifying network devices such as routers and switches, assigning IP addresses, subnet masks, and gateway addresses to various devices within a network diagram. It also covers the identification of additional devices required for basic network functionality, including a firewall and its corresponding network configuration. Furthermore, the solution details the necessary components for a wireless network, such as SSID and security settings. The solution provides detailed explanations, assumptions, and network diagrams to illustrate the concepts and configurations. This assignment is a valuable resource for students studying network security and configuration, offering practical insights into real-world network setups.
Document Page
WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 1 – Review Assignment
Network Review
Pts: 100 pts
1) Using the diagram provided please identify the routers and the switches? (10 points)
Device Image Name Functionality
Router A router is a networking device whose
functionality is to route packets from one to
another. The redirects the packets as per the
routing table configuration.
Switch A switch is a networking device that expands the
operability of a network. That is to say, it
provides more ports for the computing devices
to connect to the network.
(Todd, 2016)
2) Please Assign IP addressing to each of the devices shown. If a device is meant to be a DHCP
client, then indicate as such. For each system, please include the subnet mask and gateway for
each system. If a system does not have a gateway address, indicate by not applicable. (Add
additional rows as needed) (50 points)
Subnet X
System Interface IP Address Subnet Mask Gateway Address
Internet Et0 200.200.167.2 255.255.255.252 NA
Lower Router S0/0/0 200.200.167.1 255.255.255.252 NA
S0/0/1 172.16.168.1 255.255.255.252 NA
G0/0 172.16.170.1 255.255.255.0 NA
Upper Router S0/0/1 172.16.168.2 255.255.255.252 NA
G0/0 172.16.169.1 255.255.255.0 NA
Device in Subnet A NIC 172.16.169.2 255.255.255.0 172.16.169.1
Device in Subnet B NIC 172.16.170.2 255.255.255.0 172.16.170.1
Device in Subnet C NIC 172.16.171.2 255.255.255.0 172.16.171.1
Network Admin System NIC 172.16.172.2 255.255.255.0 172.16.172.1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Explanations and assumptions
Assumptions
i. We assume that our public IP as provided by ISP is 200.200.167.2/2.
ii. We assume that our private IP is 172.16.168.0/24.
iii. We assume that system admin system is in a different VLAN
iv. We assume that ISP router is represented inform of a cloud.
v. We assume that the router, switch and cloud interfaces are connected as image below
Explanations
Given the IP address of 172.16.168.0/24 we had to come up with five subnets. Four of the subnets are
treated equally in terms of number of address hosts (254 valid hosts) except for the subnet that is
between the upper and lower router whose address host has only 2 hosts.
Document Page
3) Identify what additional devices are needed (but not necessarily shown) for the basic
functioning of a network. For each additional device that is identified please provide the
necessary network information. This does not include – User file server, printers, scanners, etc.
(15 points)
i. Firewall
Firewall hardware system is necessary to filter incoming and outgoing traffic. This offers security to
our network making it less vulnerable to cyber-attacks. The firewall will be positioned between our
lower router and the ISP router represented as cloud. When the firewall is included, our new
addressing table will look as below:
Subnet X
System Interface IP Address Subnet Mask Gateway Address
Internet Et0 200.200.167.2 255.255.255.252 NA
Firewall Fe0/0 200.200.167.1 255.255.255.252 NA
Fe0/1 172.16.173.1 255.255.255.252 NA
Lower Router S0/0/0 172.16.173.2 255.255.255.252 NA
S0/0/1 172.16.168.1 255.255.255.252 NA
G0/0 172.16.170.1 255.255.255.0 NA
Upper Router S0/0/1 172.16.168.2 255.255.255.252 NA
G0/0 172.16.169.1 255.255.255.0 NA
Device in Subnet A NIC 172.16.169.2 255.255.255.0 172.16.169.1
Device in Subnet B NIC 172.16.170.2 255.255.255.0 172.16.170.1
Device in Subnet C NIC 172.16.171.2 255.255.255.0 172.16.171.1
Network Admin System NIC 172.16.172.2 255.255.255.0 172.16.172.1
(Academy, 2014)
Network topology will look as below:
Document Page
4) For the wireless portion of the network, identify additional details required for its proper
functionality. (25 points)
Wireless Access point requires the following details to work properly:
i. SSID: this is the Wi-Fi network name. The network name will used to identify your network
to the users. This name should be any unique name but easily identifiable with your
organization.
ii. Security: the wireless network portion requires security setting that will authenticate users
and the security will encrypt their data. This will control access to the network and will
specify level of privacy for information send over the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Academy, C. N. (2014). Routing and Switching Essentials Companion Guide: Rout Swit Esse Comp Guid.
Indiana Polis: Cisco Press.
Todd, L. (2016). CCNA Routing and Switching Complete Review Guide: Exam 100-105. Hoboken: John
Wiley & Sons.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]