SlideShare a Scribd company logo
AT HOME IOT
CONNECTION
Setting up a SOHO
system
Introduction
IoT is very prevalent today and
connecting all the parts of that
system securely is paramount!
Either in industry or at home.
This Photo by Unknown Author is licensed under CC BY-SA-NC
Contents
System type Connection Testing the
connections
Subnetting and testing
the connection
Security
System
The system that we will discuss will be
a home system. This can consist of
something as simple as a computer and
TV, or as complicated as an entire smart
home. The system we will discuss will
include 3 laptops, 1 gaming system, and
a home security system.
Connections
Since we will have 3 distinct types of devices, we will
need a way to allow each one to access the internet
separately.
There are a few ways to do this. We can add a separate
connection for each through our ISP. We can create a
guest network using the current router. We can add a
separate router for each connection. Lastly there is
software that can do this for us.
Connection
Since this will be a small
network, we really don’t need
the expense of an extra router
or even software to help us.
The best idea would be to
create a guest network using
the present router which is
simply done.
Subnetting
In this case we will not need subnetting.
Unfortunately, we can not use subnetting as it was
meant to be used with an at home router. We would
need an enterprise router. The idea of subnetting is
to use a subnet mask (255.255.255.0/24) and
change it to (255.255.255.128/25) that way we can
create two subnets from the first number of the last
octet. From there we could create 2 subnets on that
mask and then we could break down to another
subnet for the third.
TESTING THE
CONNECTIONS
Once we finally get the setting established
its time to test the connections.
Pinging the
address
Once the addresses have been set
we need to test the connection.
One of the best ways to test this is
to use ping command. This will let
us know if the connection is good
or not.
Security
Some simple yet effective things we can do to
secure our system are
1. Change the default password on everything!
2. Use dynamic addressing where possible.
3. Use WPA2-PSK and AES encryption where you
can.
Challenges and Take aways
Some of the bigger challenges for me would be using the sub -netting
and setting up the security. The main issue is to make some
mistakes so that I can learn. I must dig into these issues to truly
understand them. When dealing with a job that can be somewhat
problematic. I can do it I just need to be able to make mistakes in
order to learn. There aint nothing to it but to do it, over and over
again.

More Related Content

What's hot

Debian general presentation
Debian general presentationDebian general presentation
Debian general presentation
Ding Zhou
 
intelligent ambulance with automatic traffic control
intelligent ambulance with automatic traffic controlintelligent ambulance with automatic traffic control
intelligent ambulance with automatic traffic control
ksmk1006
 
Fallas Comunes De La Computadora
Fallas Comunes De La ComputadoraFallas Comunes De La Computadora
Fallas Comunes De La Computadora
guest195224
 
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
Nitin Balakrishnan
 
Report
ReportReport
Home automation system using arduino with android
Home automation system using arduino with androidHome automation system using arduino with android
Home automation system using arduino with android
rahul takalkar
 
Tipos de instalacion de los sistemas operativos
Tipos de instalacion de los sistemas operativosTipos de instalacion de los sistemas operativos
Tipos de instalacion de los sistemas operativos
WarriorOfTheWorth
 
Manual de controladores
Manual de controladoresManual de controladores
Manual de controladores
Uriel Rios Vanegas
 
Windows 8
Windows 8Windows 8
Windows 8
Steven Velasquez
 
Jenkins.pdf
Jenkins.pdfJenkins.pdf
Jenkins Tutorial.pdf
Jenkins Tutorial.pdfJenkins Tutorial.pdf
Jenkins Tutorial.pdf
devtestervicky
 
Smart Lock
Smart LockSmart Lock
Smart Lock
Ashik Ask
 
Jenkins
JenkinsJenkins
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptxSMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
Maulana Abul Kalam Azad University of Technology
 
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
What is Jenkins | Jenkins Tutorial for Beginners | EdurekaWhat is Jenkins | Jenkins Tutorial for Beginners | Edureka
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
Edureka!
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server Administration
Avinash Kumar
 
PPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptxPPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptx
abhisheksinghcompute
 
PASSWORD DOOR LOCK SYSTEM.pptx
PASSWORD DOOR LOCK SYSTEM.pptxPASSWORD DOOR LOCK SYSTEM.pptx
PASSWORD DOOR LOCK SYSTEM.pptx
sonalshitole
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
Simplilearn
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
Shivnaresh Likhar
 

What's hot (20)

Debian general presentation
Debian general presentationDebian general presentation
Debian general presentation
 
intelligent ambulance with automatic traffic control
intelligent ambulance with automatic traffic controlintelligent ambulance with automatic traffic control
intelligent ambulance with automatic traffic control
 
Fallas Comunes De La Computadora
Fallas Comunes De La ComputadoraFallas Comunes De La Computadora
Fallas Comunes De La Computadora
 
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
 
Report
ReportReport
Report
 
Home automation system using arduino with android
Home automation system using arduino with androidHome automation system using arduino with android
Home automation system using arduino with android
 
Tipos de instalacion de los sistemas operativos
Tipos de instalacion de los sistemas operativosTipos de instalacion de los sistemas operativos
Tipos de instalacion de los sistemas operativos
 
Manual de controladores
Manual de controladoresManual de controladores
Manual de controladores
 
Windows 8
Windows 8Windows 8
Windows 8
 
Jenkins.pdf
Jenkins.pdfJenkins.pdf
Jenkins.pdf
 
Jenkins Tutorial.pdf
Jenkins Tutorial.pdfJenkins Tutorial.pdf
Jenkins Tutorial.pdf
 
Smart Lock
Smart LockSmart Lock
Smart Lock
 
Jenkins
JenkinsJenkins
Jenkins
 
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptxSMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
 
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
What is Jenkins | Jenkins Tutorial for Beginners | EdurekaWhat is Jenkins | Jenkins Tutorial for Beginners | Edureka
What is Jenkins | Jenkins Tutorial for Beginners | Edureka
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server Administration
 
PPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptxPPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptx
 
PASSWORD DOOR LOCK SYSTEM.pptx
PASSWORD DOOR LOCK SYSTEM.pptxPASSWORD DOOR LOCK SYSTEM.pptx
PASSWORD DOOR LOCK SYSTEM.pptx
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 

Similar to Newt191 final project

Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
Kumar Gaurav
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
anchalsinghdm
 
Final ProjectFinal Project Details Description Given a spec.docx
Final ProjectFinal Project Details Description  Given a spec.docxFinal ProjectFinal Project Details Description  Given a spec.docx
Final ProjectFinal Project Details Description Given a spec.docx
AKHIL969626
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
NowrinJahanSiam
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
danhaley45372
 
Campaign of networking in csit association of Nepal
Campaign of networking in csit association of NepalCampaign of networking in csit association of Nepal
Campaign of networking in csit association of Nepal
Suraj Katwal
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice Assistant
Tezpur University
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
Project report
Project reportProject report
Project report
NowrinJahanSiam
 
Project report
Project reportProject report
Project report
NowrinJahanSiam
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Chapter9
Chapter9Chapter9
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
Universitas Pembangunan Panca Budi
 
Muo network-manual
Muo network-manualMuo network-manual
Muo network-manual
MohanKumar Palanichamy
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
prashant0001
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
Bakht Khan
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative Technology
Abdullah Al Mamun
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
 
Multinetworking
MultinetworkingMultinetworking
Multinetworking
Sumit Agarwal
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
Amazon Web Services
 

Similar to Newt191 final project (20)

Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
 
Final ProjectFinal Project Details Description Given a spec.docx
Final ProjectFinal Project Details Description  Given a spec.docxFinal ProjectFinal Project Details Description  Given a spec.docx
Final ProjectFinal Project Details Description Given a spec.docx
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
 
Campaign of networking in csit association of Nepal
Campaign of networking in csit association of NepalCampaign of networking in csit association of Nepal
Campaign of networking in csit association of Nepal
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice Assistant
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Project report
Project reportProject report
Project report
 
Project report
Project reportProject report
Project report
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Chapter9
Chapter9Chapter9
Chapter9
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
 
Muo network-manual
Muo network-manualMuo network-manual
Muo network-manual
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative Technology
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Multinetworking
MultinetworkingMultinetworking
Multinetworking
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 

Recently uploaded

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 

Recently uploaded (20)

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 

Newt191 final project

  • 2. Introduction IoT is very prevalent today and connecting all the parts of that system securely is paramount! Either in industry or at home. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 3. Contents System type Connection Testing the connections Subnetting and testing the connection Security
  • 4. System The system that we will discuss will be a home system. This can consist of something as simple as a computer and TV, or as complicated as an entire smart home. The system we will discuss will include 3 laptops, 1 gaming system, and a home security system.
  • 5. Connections Since we will have 3 distinct types of devices, we will need a way to allow each one to access the internet separately. There are a few ways to do this. We can add a separate connection for each through our ISP. We can create a guest network using the current router. We can add a separate router for each connection. Lastly there is software that can do this for us.
  • 6. Connection Since this will be a small network, we really don’t need the expense of an extra router or even software to help us. The best idea would be to create a guest network using the present router which is simply done.
  • 7. Subnetting In this case we will not need subnetting. Unfortunately, we can not use subnetting as it was meant to be used with an at home router. We would need an enterprise router. The idea of subnetting is to use a subnet mask (255.255.255.0/24) and change it to (255.255.255.128/25) that way we can create two subnets from the first number of the last octet. From there we could create 2 subnets on that mask and then we could break down to another subnet for the third.
  • 8. TESTING THE CONNECTIONS Once we finally get the setting established its time to test the connections.
  • 9. Pinging the address Once the addresses have been set we need to test the connection. One of the best ways to test this is to use ping command. This will let us know if the connection is good or not.
  • 10. Security Some simple yet effective things we can do to secure our system are 1. Change the default password on everything! 2. Use dynamic addressing where possible. 3. Use WPA2-PSK and AES encryption where you can.
  • 11. Challenges and Take aways Some of the bigger challenges for me would be using the sub -netting and setting up the security. The main issue is to make some mistakes so that I can learn. I must dig into these issues to truly understand them. When dealing with a job that can be somewhat problematic. I can do it I just need to be able to make mistakes in order to learn. There aint nothing to it but to do it, over and over again.