HTTP/S: HTTP stands for Hypertext Transfer Protocol, which is the protocol used for transmitting data over the web. HTTPS is a secure version of HTTP that uses SSL/TLS encryption to protect data in transit.
POP3: POP3 stands for Post Office Protocol version 3, which is a protocol used for retrieving email from a mail server. It downloads the email from the server to the local device, and typically deletes the email from the server once it has been downloaded.
IMAP: IMAP stands for Internet Message Access Protocol, which is a protocol used for retrieving email from a mail server. Unlike POP3, IMAP leaves the email on the server and allows multiple devices to access and manage the email.
SMTP: SMTP stands for Simple Mail Transfer Protocol, which is the protocol used for sending email over the internet. It is used to send email from a mail client to a mail server, and from one mail server to another.
Devices
Modem: A modem is a device that is used to connect a computer or other network device to the internet. It converts digital signals from the device into analog signals that can be transmitted over a phone or cable line, and vice versa.
Router: A router is a device that is used to connect multiple devices to a network and route traffic between them. It can be used to connect devices on a local network to the internet, and can also be used to create separate networks within a larger network.
Switch: A switch is a device that is used to connect multiple devices on a local network. It is used to forward data packets between devices on the same network, and can help to reduce network congestion and improve network performance.
Access point: An access point is a device that is used to provide wireless connectivity to devices on a network. It allows devices]to connect to a wireless network, and can be used to extend the range of a wireless network.
Firewall: A firewall is a device or software program that is used to protect a network from unauthorized access. It monitors incoming and outgoing network traffic and blocks traffic that does not meet
2.8 Given a scenario, install, configure and
secure a basic wireless network.
Step-by-step guide to installing, configuring, and securing a basic wireless network using the above:
a. 802.11a/b/g/n/ac
1. Determine which standard(s) your wireless devices support (e.g. 802.11n, 802.11ac, etc.).
2. Select a wireless router that supports your desired standard(s).
3. Connect your wireless router to your modem using an Ethernet cable.
4. Connect your computer to your wireless router using an Ethernet cable or the default wireless network.
5. Log in to your wireless router's administration page using the default username and password.
6. Configure your wireless router's settings, such as the SSID (network name), security type, and password.
7. Choose a secure password that is at least 8 characters long and includes upper and lower case letters, numbers, and special characters.
8. Select the encryption type you want to use (e.g. WPA2, WPA, WEP).
9. Save your settings and restart your router.
10. Connect your wireless devices to your new wireless network.
b. Best practices
1. Change the default SSID to something unique and difficult to guess.
2. Change the default password for your wireless router to a strong and unique password.
3. Enable encryption on your wireless network to protect your data from unauthorized access.
4. Use the WPA2 encryption protocol, as it is the most secure option available.
5. Consider setting up a captive portal for guest access, which requires users to log in before accessing the Internet.
6. Keep your wireless router's firmware up to date to ensure it has the latest security patches and bug fixes.
7. Disable remote administration on your wireless router to prevent unauthorized access.
8. Use MAC address filtering to only allow known devices to connect to your wireless network.
9. Place your wireless router in a central location to minimize interference and attenuation factors.
10. Use a strong password for your wireless network to prevent unauthorized access.
