SlideShare a Scribd company logo
1 of 17
LANs
Taylor Guinn, Kristen Landino, Julie
Young, Kyron Staley, Ana Pasada
WEP
• A security code system for Wi-Fi networks
which allows devices to gather on a local
network
• Exists to distribute encoded information with
other devices in the network while hiding the
content from outsiders
• Mostly used in a home setting
WPA
• A security code system for Wi-Fi
• Upgraded version of WEP
• Provides stronger encryption with the help of
TKIP and AES
• Exists to distribute encoded information with
the other devices in the network but has a
stronger encryption than WEP, making it
harder for hackers to hack
• Mostly used in homes
WPA-PSK
• Simplified, but stronger version of WPA
• A passphrase is set and with the help is TKIP it
changes at a certain time interval
• Makes it harder to hackers to break into a
network
• Used in Home Networks
TKIP
• Designed to provide a more secure encryption
than WEP by adding more code at the
beginning and end of the encryption
• Don’t have to get a hardware upgrade like AES
• Exists because WEP was notoriously weak
• Used for homes and office-like settings
AES
• Designed to get rid of flaws of the TKIP
encryption
• Has government approval because it is so secure
• Must have a hardware upgrade for it to be
implemented unlike TKIP
• Exists because it’s the strongest encryption code
which offers the highest level of security
• Used for government settings but can be
implemented in homes
Plato’s House
Common Items to all Scenarios
• Connect a Wireless Router to Internet Point
– Configure the router:
• Plug in the router
• Connect it to a computer
• Configure
• Access router setup utility
• Create a new router password
• Enter SSID (service set identifier)
• Activate wired equivalent privacy (WEP), WiFi protected
access (WPA), or pre shared key (PSK) and create an
encryption key
• Connect an internet access device
Scenario 1 (Wireless Option)
• Wire and install an Access Point to provide
coverage to Computer B and Xbox
– Configure Access Point with the same SSID and
security as the wireless router.
– Configure Access Point with a different
communications channel or automatic so there isn’t
interference with the wireless router.
– Install a wireless NIC in computer B.
– Configure Computer A, B and Xbox to connect to the
wireless network.
– All will have access and the ability to manage ports
and traffic separately.
Scenario 2 (Wired)
• Install a wired NIC in Computer A.
• Have the house wired for CAT5 wiring to all
places Internet access is needed. The wiring will
terminate at the Internet access point ether in a
patch panel or directly to the router.
• Configure Computer A, B, and Xbox for DHCP
addressing, so no additional configuration
needed to access the Internet.
• This would most likely be the most expensive but
most stable and secure option.
Scenario 3 (Wireless Ad-Hoc)
• Install Wireless NIC in Computer B.
• Configure Computer A to connect to wireless
router, and share it’s internet connection.
• Configure Computer B to connect to Computer A
to connect to the Internet and to share it’s
internet connection.
• Configure Xbox to connect to the Internet via
Computer B’s shared Internet connection.
• This configuration is the most complicated,
unreliable, but the least expensive.
Scenario 4 (Hybrid)
• Scenarios 1,2, and 3 show three different methods of
connecting Plato’s mansion to the Internet and providing
access to Computer A, B, and the Xbox, however none
illustrate a “real world” example of a typical home
connection.
• Most homes will have a combination of wired and wireless.
Probably the least expensive and most logical wiring
method would be to relocate the wireless router to a more
central location to province coverage to the whole house,
or use an access point to add coverage.
• Any other devices such as app based TV’s, internet
appliances would be wired directly to the router.
• Bother wired and wireless would be used.
Fin.

More Related Content

What's hot (18)

ESPNow Again..
ESPNow Again..ESPNow Again..
ESPNow Again..
 
Networking
NetworkingNetworking
Networking
 
Name HUB BRIDE ROUTER SWITCH MODEM
Name   HUB BRIDE ROUTER SWITCH MODEMName   HUB BRIDE ROUTER SWITCH MODEM
Name HUB BRIDE ROUTER SWITCH MODEM
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Elements of the LAN
Elements of the LANElements of the LAN
Elements of the LAN
 
Cafe Latte
Cafe LatteCafe Latte
Cafe Latte
 
Smart home control system
Smart home control systemSmart home control system
Smart home control system
 
Bluetooth LE & iBeacons by Javier Chávarri (NSBarcelona)
Bluetooth LE & iBeacons by Javier Chávarri (NSBarcelona)Bluetooth LE & iBeacons by Javier Chávarri (NSBarcelona)
Bluetooth LE & iBeacons by Javier Chávarri (NSBarcelona)
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Vp ns
Vp nsVp ns
Vp ns
 
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike BeardmoreLoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Meeting-Room-Alert-System
Meeting-Room-Alert-SystemMeeting-Room-Alert-System
Meeting-Room-Alert-System
 
Wireless v2
Wireless v2Wireless v2
Wireless v2
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 

Similar to CSCI 1100 Group 1 project 1

Networks la ns and design
Networks la ns and designNetworks la ns and design
Networks la ns and designsbmiller87
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Networking basics
Networking basicsNetworking basics
Networking basicsRyan Jones
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Setia Juli Irzal Ismail
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesMichael Smith
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxReyEvangelista2
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6Waqas Ahmed Nawaz
 
TYPICAL ELEMENTS IN A LAN
TYPICAL ELEMENTS IN A LANTYPICAL ELEMENTS IN A LAN
TYPICAL ELEMENTS IN A LANaitanabustinza
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1Amanda2345
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
 

Similar to CSCI 1100 Group 1 project 1 (20)

Networks la ns and design
Networks la ns and designNetworks la ns and design
Networks la ns and design
 
12 ict.pptx
12 ict.pptx12 ict.pptx
12 ict.pptx
 
Network setup
Network setupNetwork setup
Network setup
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Defcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over PowerlinesDefcon 2011 - Penetration Testing Over Powerlines
Defcon 2011 - Penetration Testing Over Powerlines
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptx
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
NCompass Live: WiFi In the Library
NCompass Live: WiFi In the LibraryNCompass Live: WiFi In the Library
NCompass Live: WiFi In the Library
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
 
TYPICAL ELEMENTS IN A LAN
TYPICAL ELEMENTS IN A LANTYPICAL ELEMENTS IN A LAN
TYPICAL ELEMENTS IN A LAN
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

CSCI 1100 Group 1 project 1

  • 1. LANs Taylor Guinn, Kristen Landino, Julie Young, Kyron Staley, Ana Pasada
  • 2. WEP • A security code system for Wi-Fi networks which allows devices to gather on a local network • Exists to distribute encoded information with other devices in the network while hiding the content from outsiders • Mostly used in a home setting
  • 3. WPA • A security code system for Wi-Fi • Upgraded version of WEP • Provides stronger encryption with the help of TKIP and AES • Exists to distribute encoded information with the other devices in the network but has a stronger encryption than WEP, making it harder for hackers to hack • Mostly used in homes
  • 4. WPA-PSK • Simplified, but stronger version of WPA • A passphrase is set and with the help is TKIP it changes at a certain time interval • Makes it harder to hackers to break into a network • Used in Home Networks
  • 5. TKIP • Designed to provide a more secure encryption than WEP by adding more code at the beginning and end of the encryption • Don’t have to get a hardware upgrade like AES • Exists because WEP was notoriously weak • Used for homes and office-like settings
  • 6. AES • Designed to get rid of flaws of the TKIP encryption • Has government approval because it is so secure • Must have a hardware upgrade for it to be implemented unlike TKIP • Exists because it’s the strongest encryption code which offers the highest level of security • Used for government settings but can be implemented in homes
  • 8. Common Items to all Scenarios • Connect a Wireless Router to Internet Point – Configure the router: • Plug in the router • Connect it to a computer • Configure • Access router setup utility • Create a new router password • Enter SSID (service set identifier) • Activate wired equivalent privacy (WEP), WiFi protected access (WPA), or pre shared key (PSK) and create an encryption key • Connect an internet access device
  • 9. Scenario 1 (Wireless Option) • Wire and install an Access Point to provide coverage to Computer B and Xbox – Configure Access Point with the same SSID and security as the wireless router. – Configure Access Point with a different communications channel or automatic so there isn’t interference with the wireless router. – Install a wireless NIC in computer B. – Configure Computer A, B and Xbox to connect to the wireless network. – All will have access and the ability to manage ports and traffic separately.
  • 10.
  • 11. Scenario 2 (Wired) • Install a wired NIC in Computer A. • Have the house wired for CAT5 wiring to all places Internet access is needed. The wiring will terminate at the Internet access point ether in a patch panel or directly to the router. • Configure Computer A, B, and Xbox for DHCP addressing, so no additional configuration needed to access the Internet. • This would most likely be the most expensive but most stable and secure option.
  • 12.
  • 13. Scenario 3 (Wireless Ad-Hoc) • Install Wireless NIC in Computer B. • Configure Computer A to connect to wireless router, and share it’s internet connection. • Configure Computer B to connect to Computer A to connect to the Internet and to share it’s internet connection. • Configure Xbox to connect to the Internet via Computer B’s shared Internet connection. • This configuration is the most complicated, unreliable, but the least expensive.
  • 14.
  • 15. Scenario 4 (Hybrid) • Scenarios 1,2, and 3 show three different methods of connecting Plato’s mansion to the Internet and providing access to Computer A, B, and the Xbox, however none illustrate a “real world” example of a typical home connection. • Most homes will have a combination of wired and wireless. Probably the least expensive and most logical wiring method would be to relocate the wireless router to a more central location to province coverage to the whole house, or use an access point to add coverage. • Any other devices such as app based TV’s, internet appliances would be wired directly to the router. • Bother wired and wireless would be used.
  • 16.
  • 17. Fin.