You are on page 1of 14
POUT SHNnilx MALAYSIA ELECTRICAL ENGINEERING DEPARTMENT ACADEMIC SESSION: DECEMBER 2020 DEC30023 - COMPUTER NETWORKING FUNDAMENTAL PRACTICAL WORK 4: WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) PRACTICAL WORK DATE: LECTURER’S NAME: GROUP NO.: TOTAL STUDENT ID & NAME: MARKS (100%) 1. 2. 3. DATE SUBMIT: DATE RETURN: PW4 - WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) COURSE LEARNING OUTCOMES (CLO): CLO2 —_: Construct a simple LAN or WLAN in accordance to IEEE or TIA/EIA- 568-A/B wiring standard and network troubleshooting using network simulation tool. (P4, PLO) PLOS _: Apply appropriate techniques, resources, and modern engineering and IT tools to well-defined engineering problems, with an awareness of the limitations. (DK6) CLO3 : Demonstrate awareness of the norm practice of professional bodies such as IEEE or TIA/EIA-568-/VB during practical work session. (A3, PLO8) PLos Understand and commit to professional ethics and responsibilities and norms of technician practice. OBJECTIVES: Upon completion the lab session, students should be able to: a, Use packet tracer software to design a wireless network connection b. Use packet tracer software to configure wireless access point. c. Apply security on wireless LAN using Linksys wireless router by using: ‘* Change Default Value * Limited Access on a Wireless LAN — MAC Address Filtering * Authentication and Encryption on a Wireless LAN * Traffic Filtering on a Wireless LAN THEORY The Linksys Wireless Router create a home Wi Fi network to which can connect to computers, printers, game consoles and other Wi Fi devices. With transfer rates of up to 300 + 300Mbps, this router can download files and access websites at rapid speeds. Using four antennas, the Linksys £2500 router sends out a widespread signal that establishes communication with the devices throughout your home. WEP, WPA, WPA? and a wireless MAC filter help this router keep your home network secure. Five ports give you the space needed to connect wired devices to the home router. EQUIPMENT / TOOLS a. Computer with Packet Tracer software PW4 - WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) PROCEDURE PART A Step 4: Create a logical network diagram with 3 laptops, 2 pc and a wireless LINKSYS -WRT300N Wireless Router. a, Draw the wireless network as shown in the topology. b. Rename the device exactly as picture shown. Step 2: Put LINKSYS-WMP300N module for all laptops and desktop. Adding Modules: Drag the module to an available slot on the device. Removing Modules: Drag the module from the device to the module list. a. Click Laptop KUMAR >> Physical tab. b. Shut down the laptop. Click button off as shown below. = ¢. Click and drag Linksys-WPC300N to the empty slot behind router as shown below. d._ Do the same step for Laptop ALI, Laptop HASSAN, PC AISYAH and PC ASMAH. e, Configure IP address for all Laptop and desktop according to below table. PW4- WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) peal IP Address Subnet Mask Wiroloss Router0 192.168.0.1 255.255.255.0 Laptop KUMAR 192.168.0.2 255,255.255.0 Laptop HASSAN 192.168.0.3 255.255.265.0 | Laptop ALI 192.168.04 255.255.255.0 PCASMAH | 192.168.0.5 256.255.255.0 PC AISYAH 192.168.0.6 255.255.255.0 Step 3: Verify default connectivity to LINKSYS router. a. From Laptop KUMAR ping router Linksys WRT300N b. Click Laptop KUMAR >> Desktop >> Command Prompt >> type ping 192.168.0.1 c. Print screen the result. Do the same for Laptop ALI, Laptop HASSAN, PC AISYAH and PC ASMAH e. Print screen all the result. PW4 - WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) PART B. ‘Step 4: Configure security for LINKSYS router — Change default name for SSID. a. Click the Wireless tab. The Basic Wireless Settings tab is selected by default. b. Network Mode is selected to Mixed by default. Network Name (SSID); ac Band | wide chan ‘auto =) Standard chanel; (P= 24426 Ssi0 Groadcest: @ Enabled O Disabled ¢. Click on the Radio Band drop-down menu and there are four options which is Mixed, Wireless-A only, Wireless-N only and disable. “ Fora wireless network that can use 802.116, g, orn client devices, the default is Mixed. Mixed allows the Wide Channel option to be chosen and gives the best performance. Leave the default of Mixed selected. d. The Network Name (SSID) is the name of your wireless network shared among all devices on your network. It must be identical for all devices in the wireless network, It is case-sensitive and must not be more than 32 characters, 4 PW WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) Change the SSID from the Default to a unique name (suggestion: Your name). Record the name you have chosen: ©. The AP is now configured for a wireless network with the name (SSID) that you gave it. It is important to write down this information before starting attaching any PCs to the wireless network. Save your settings before going to the next screen. TASK 2 : Configure security for Linksys router - Change default name for SSID. | Network Name (SSi0):(ZURATTCREARAT ——] adi Bands auto E ide channel wta = Standard Channel: [1= B43GHEE Ty SSID Broadcast; @ Enabled © picabled ‘Step 5: Configure security for LINKSYS router - Limited access on a wireless LAN (MAC Address Filtering). a. Choose the Wireless MAG Filter tab on the Wireless screen. b. MAC address filtering allows only selected wireless olient MAC addresses to have access to your network. ¢. Select radio bution to Enable. d. Select the radio button to Permit PCs listed below to access the wireless network. Click the Wireless Client List button to display a list of all wireless client computers on your network, e. Keyin LAPTOP ALI and PC ASMAH and PC AISYAH mac address only in the list. f. Save your settings before exiting the screen. PW4- WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) TASK 3 : Configure security for Linksys router - Limited access on a wireless LAN (MAC address filtering) Step 6: Configure security for LINKSYS router - Encryption and Authentication. a. Choose the Wireless Security tab on the Wireless screen. b. This router supports five (5) types of security mode settings: + WEP * WPA Personal + WPA Enterprise + WPA2 Personal + WPA2 Enterprise ©, Select WPA2 Personal Security Mode. Choose AES. e. Enter your password on Passphrase. Write down your password: 2 f. Save your settings before going to the next soreen. TASK 4 : Configure security for Linksys router - Encryption and Authentication PW4 - WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) Step 7: Configure traffic filtering on a wireless LAN — Blocked Applications. a. In tab Access Restrictions is set to enabled by default. This tab is specialized for blocked certain application for examples block or allow internet access during selected day and hours, blocked certain PCs, block website using URL Address and block website by keyword. b. Change your setting to the same as below picture. Add some protocol that can be blocked by router. | c. Click on the Save Settings button. PW4 - WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) TASK 5 : Configure traffic filtering on a wireless LAN - Blocked applications. Step 8: Connect all devices to wireless router a. Open properties PC ASMAH. b. Click PC ASMAH >> PC Wireless. The Linksys show Adapter is Inactive. Physical Config Desktop Software/Servces ©. Click Connect tab. It will show the SSID name that you have configured earlier. ‘és eta ate ines neers. sere i oe ata ok {tees bt Tew me tras host ana soe we to ‘un Toco al etd lke Consett an Mic Adtess coo1.cEe 3505 H Notebook Adapter | PW4-- WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) d. Enter password that has been configured. Linksys" WPA2-Personal Needed for Connection ‘hs wees eter as WPA2fesoa ented Yo comet a Dis newer er he eued| ‘soprano se Sprott dng aon Than ch Conta Paton MRD 2c) Pesto wet sect meta sey or ‘sting wre rat, sesso] Pesenora mestwedey mates wOd.curctos ‘mica (tet ©. The Linksys show Adapter is Active. fete at ae es rT ah erwin ts {Seah tn es oann Bateman ed Secs eek. | Oy GGT ve comet Wt non ee Eomctbns 2uiche wecsoon jf f. Do the same for Laptop ALI, Laptop HASSAN, PC AISYAH and PC ASMAH. PW4- WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) Step 9: Verify connectivity to LINKSYS router after setting have been changed. a, From Laptop KUMAR send packet to Linksys WRT30ON. b. Click Envelope on the right side. c, Click Laptop KUMAR and Wireless Router. d. Do the same for Laptop ALI, Laptop HASSAN, PC AISYAH and PC ASMAH. e. Print screen the result, TASK 6 : Verify connectivity to Linksys router after setting have been changed “ty jo fe cna = ae) Ssh ‘eu tm st aoe SS Sows eon rennioaes ie aa kt a PW4- WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) RESULT DISCUSSION CONCLUSION PRACTICAL SKILL ASSESSMENT (PLOSIP4/CLS3a, 3c/CLO2) COURSE DEC30023 COMPUTER NETWORKING FUNDAMENTALS. EXPERIMENTNO, 4 EXPERIMENT TITLE: WIRELESS TECHNOLOGY & BASIC SECURITY (PACKET TRACER) DATE LECTURER'S NAME NAME REGISTRATION NO. CLASS IGROUP Marks [Competency | Deseription ‘Student can understand and follow all instruction and task has been completed & | Suetenine ‘successfully without any assistance. a | Highly ‘Student can understand and follow all instruction and complete all tasks assigned Competent 3 | Competent Student hes been completed task successfully after being assisted. 2 | NotYet Student can understand and follow the instruction but completes only some of the Competent tasks with alittle error. 1 | NotAchieves | Havre tfctisto completo ho ack and tty bang ssid compiae he tank Task | Skill Aspect Marks Obtain 1. | TASK 1 : Verify default connectivity to Linksys router : Ping result for all devices 15 2 TASK 2 : Configure security for Linksys router : Change default name for SSID. 1s 3, | TASKS: Configure security for Linksys router : Limited access on a wireless LAN is (MAC address filtering) 4. | TASK 4 : Configure security for Linksys router : Encryption and Authentication oS, 5. | TASK 5 : Configure traffic filtering on a wireless LAN : Blocked applications i 6. | TASK 6 : Verify connectivity to Linksys router after setting have been changed 1s 7. PRACTICE OF SAFETY 8 8, | HOUSEKEEPING 18 9. | RESULT (Submited result / Print screen) 110 TOTAL 780 TOTAL 7400 GENERIC SKILL ASSESSMENT (PLOB/A3/CLSS/CLO3) CLO3: Demonstrate awareness of the norm practice of professional bodies such as IEEE or TIA/EIA 568, ‘NB during practical work session. Score Description Attribute | Sub-Attibute 8 1 2 3 4 5 3 Does not | Perform | Perform | Perform | Perform pertorn assigned | assigned | assigned _| assigned assigned | tasks within | tasks within | tasks within | tasks beyond tasks within | by the scope | by the scope | by the the scope of| bythe scope | of work with | ofwork and | scope of | work anc cof work even | close moots work and | beyond with close | supervision | expectation | exceeds —_| expectation supervision expectation Has @ Has ales [Has a Has a good | Has a wall disharmoniou | harmonious | satisfactory | relationship | acknowledged relationship | relationship | relationship | with co- | relationship. with co- | withco- | with co | workers and | with co- Work | workers and_| workers and | workers and | within, workers and Relation | within, within, within institution, — | within, institution, | insttution, | institution, | work groups | institution, work groups | work groups | work groups | and work groups ‘and and and community | and community | community | commurity | when at | community when at work | when at | when at work | work when at work Ethics work, Praciice | Practice less | Practice good | Practice | Always and inappropriate | appropriate | working | good practice Professi | Work working | working | culture such | working | excellent Ethics culture such | cuture such | es good | culture such | working onatism as bad as moral, asgood | culture such behavior, no | inconsistent | timeliness es. | moral, 1s good punctuality | behavior, | well as being | timeliness] moral, aswellas | ess efficient, | aswellas | timeliness as notbeing | punctuality | productive | being well as being efficient, | aswellas | and ethical at | efficient, | efficient, productive | being less | work in productive | productive and ethical at | efficient, | general andethical | and ethical at workin all | productive at work in work in all stations | and ethical most situations at work in situations many situations Pariorm a Performa | Performa | Perform — | task with | Aways ask wi berform a task task with lack | task win | SEW | trust pares | integrity | oftrust. | limited trust, | 200° honesty, | pin ust honesty, | nonesty, "| MUS —| snceniy an | Ronee sincerity and | sincerity and | HOPES | transparent | meen ant L wanspareney | rarsparency | toneporaney | St | any atuaton Tora | 20

You might also like