Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Setting up a wireless network

Check the attachments below. Having read the articles below, "Myths and Truths of Wireless Security" and "Setting up a wireless network"(link provided), create an appropriate network map diagram of YOUR home network. You may refer to Textbook, Data Communications and Networking by White(author) for diagrams.

1. Show wired and wireless connections.

2. Indicate the CAT x (i.e., CAT 5, CAT 5e, CAT 6, etc) cable in use and the wireless speed of your wireless router and all of your wireless computers and other devices that are in use (i.e., 802.11b, g, a, n, ac, etc).

3. Indicate what devices are being used to connect, for example motherboard, USB, network interface card, Bluetooth, etc.

4. Include all peripherals, iPods, tablets and phones (show all IP Addresses).

5. If you have your TV hooked up to the Internet (Smart TV) then show that as well.

6. Describe where your main firewalls are (both hardware-based and software-based).

7. Do NOT show the status of your ports.

8. Show the IP addresses for all of your connected computers/devices/peripherals, except for your router's public IP address.

9. Do NOT show MAC addresses.

The paper will consist of the diagram plus an explanation pages

LINK below for Setting up home network

http://windows.microsoft.com/en-us/windows/setting-wireless-network#1TC=windows-7

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91824142

Have any Question?


Related Questions in Computer Engineering

Question individual project - submit to the unit 3 ip

Question: Individual Project - Submit to the Unit 3 IP Area This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual dro ...

Given a list of numbers l a value x is said to be a

Given a list of numbers L, a value x is said to be a majority value if the value of over half the elements in L is x; in other words, if L has n elements and nx is the number of elements in L with value x, then x is a ma ...

Suppose that we have a block cipher and want to use it as a

Suppose that we have a block cipher and want to use it as a hash function. Let X be a specified constant and let M be a message consisting of a single block, where the block size is the size of the key in the block ciphe ...

Task 1implement a queue on a char array do not use queue

Task 1 Implement a Queue on a char [] array. Do not use ::Queue:: class from the STD library for this example. The user will input a string and the program will return the string with each letter in the string duplicated ...

Wildhorse inc has outstanding bonds that will mature in six

Wildhorse, Inc., has outstanding bonds that will mature in six years and pay an 8 percent coupon semiannually. If you paid $1,009.52 today and your required rate of return was 7.0 percent.  (Round intermediate calculatio ...

Question advanced microprocessors amp labdirect addressing

Question: Advanced Microprocessors & Lab Direct Addressing and Initializing the Stack Directions: Please answer BOTH of the questions. About 50-75 words per question. Plagiarism will be disputed, so please be 100% origin ...

Task design a smart system facilitated by internet of

Task: Design a smart system facilitated by Internet of Everything. Topic: Smart Homes for The Elderly 1. Develop Operational Concept A. Vision What is the problem, deficiencies or opportunities? State how the need(s) for ...

Explain that our ability to secure each computers stored

Explain that our ability to secure each computers stored information is now influenced by the security on each computer to which it is connected

Describe the role of an ethical hacker and describe what

Describe the role of an ethical hacker and describe what you can do legally as an ethical hacker

Suppose you are a manager in the it department for the

Suppose you are a manager in the IT department for the government of a corrupt dictator, who has a collection of computers that need to be connected together to create a communication network for his spies. You are given ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As