Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being described. Write your answer in a clean sheet of paper.Ā
CABLESĀ
AcrossĀ
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacketĀ
5. used to connect two devices directly 6. cable that has two or four pairs of wiresĀ
7. the standard cable used for almost all purposesĀ
DownĀ
1. cable that has a very thin coreĀ
2. cable that has a thicker coreĀ
4. used for telephone communications and Ethernet networksĀ
5. copper-cored cableĀ
Objective: To apply the concepts of computer system and network configuration in a simulated environment. Participants will plan, design, and implement a network for a small business, considering hardware selection, security measures, and scalability.
Computers or laptops with internet access
Network simulation software (such as Cisco Packet Tracer or GNS3) or actual physical devices (routers, switches, and cables)
Network design tools (pen and paper or software like Microsoft Visio or Lucidchart for creating network diagrams)
Access to basic software (operating systems, web browsers)
Step 1: Requirements Gathering and Network Design (Planning Phase)
Scenario:
You are tasked with designing and configuring a network for a small office that has 20 employees. The office requires the following:
Internet access for all devices
File sharing capabilities between computers
Wireless connectivity for employees' laptops and mobile devices
Printing services via shared printers
A secure environment to protect sensitive data
Design the Network:
Draw the network topology diagram for the office, considering the following:
Number of devices and their types (e.g., computers, printers, wireless devices)
Network devices required (routers, switches, wireless access points)
Type of cables needed (Ethernet cables for wired connections, and Wi-Fi for wireless)
IP addressing scheme (decide whether to use static or dynamic IP addresses)
Consider network security (e.g., Wi-Fi encryption standards, firewall settings)
Deliverable:
A detailed network topology diagram that illustrates the design and connections between network devices.
Step 2: Selecting and Configuring Hardware (Implementation Phase)
Hardware Selection:
Choose the required hardware for the network. For the simulation:
Select routers, switches, and wireless access points based on the network size and required features.
Choose a router with sufficient bandwidth for handling the internet and internal traffic.
Ensure you have enough network cables for wired connections.
Simulating the Configuration:
In a network simulation tool (e.g., Cisco Packet Tracer), configure the following:
Set up the router with internet access and internal network.
Configure switches to allow communication between wired devices.
Set up a wireless access point with security settings (e.g., WPA3 encryption).
Configure IP addressing (DHCP or static IP addresses for all devices).
Deliverable:
A working network simulation with all devices properly configured and connected.
Step 3: Security Configuration (Security Measures)
Security Setup:
Apply security measures to ensure the network is protected:
Enable firewall settings on the router to block unwanted traffic.
Configure strong Wi-Fi encryption (WPA3).
Set up user access controls and passwords for shared resources.
Secure sensitive data through file-sharing permissions.
Deliverable:
A list of security configurations applied, including firewall settings, Wi-Fi security, and user access control.
Step 4: Testing and Troubleshooting (Verification Phase)
Test Network Connectivity:
Use the ping command or network diagnostic tools to test connectivity between devices.
Verify that each device can access the internet and other devices on the network.
Test the file-sharing capabilities between two or more computers.
Troubleshooting:
If any device fails to connect, troubleshoot the network by checking cables, IP settings, and firewall configurations.
Simulate potential issues like incorrect IP addresses, disconnected cables, or security settings that block access.
Deliverable:
A report detailing the network testing results and any troubleshooting steps taken.
Step 5: Reflection and Reporting
Reflection:
Write a short report summarizing the network configuration process, the decisions made during the design phase, the security measures implemented, and any challenges faced during the testing and troubleshooting phases.
Reflect on how the network setup can be scaled in the future as the business grows.
Presentation:
Present your network design and configuration to the class or group. Explain your choices for hardware, IP addressing, security, and any challenges you overcame during the implementation.
Deliverable:
A final report and presentation that showcases your network design, security configurations, and testing results.