You are on page 1of 6

CIS 231 Wireless Router Lab Report

(Rename the document to CIS231 Router Lab LastName1, LastName2, LastName3 where each group
members last name is given)
Team Name _________________________________
There should be three people in your group, each managing a different device. Decide which of you will
take on each of these roles:

Role #1: This person is responsible for configuring the router using a personal computer (referred
to as Computer #1 in the steps below).

Role #2: This person will connect a personal computer (referred to as Computer #2 in the steps
below) wirelessly to the network. There should not be ANY Ethernet cables connected to this
computer.

Role #3: This person will connect a mobile device wirelessly to the network.

Team Members and Role:


1. Dustin Cee - Mobile
2.

Jade Chang - Notetaker

3.

Scott Lutrell Computer #2

4. Jonathan Tang Computer #1

Questions are listed below. Please place your answer immediately below each question.
1. Why is it critical that the router be on and connected to the computer used to set it up before you
turn the computer on? (hint from where does the computer get its IP address?) No print screen
required.
The IP address is assigned by the router, thus the computer cannot have an IP address
without being connected to the router.
2. What does the administrative password protect? Include a screen print of the administrator.
It protects the network gateway to the router.

3. What SSID did your group use? What does an SSID tell you? Include a screen print of the Channel
and SSID screen.

We used the name jonjaddussco. SSID tells the name of the network.

4. Where do the names of available wireless networks come from? How do you know from examining the
list of names of available wireless networks whether or not a network is open or uses encryption?
Include a screen print of the results of Scan for Wireless Networks from computer #2.
They are broadcast from the routers. When hovering over each network, a box will appear that
tells whether the connection is secured or unsecured.
5. When might it be preferable to connect to the Internet using a Wi-Fi connection rather than a cellular
connection on your mobile device? No screen print required.
When downloading large files as to not reach a mobile data cap.

The IP and MAC addresses for your devices:


Device
Computer #1
Computer #2
Mobile

IPv4 Address
10.110.121.247
10.110.111.80
10.110.115.86

MAC Address
f4:6d:04:31:13:46
4c:eb:42:2e:34:6b
cc:3a:61:0e:4d:00

6. Enter the information from the IPv4 and MAC address table above in your lab report. Why should you
look for Computer 1s IP address under the Ethernet Adapter Local Area Connection, and Computer
2s IP address under the Wireless LAN Network Connection section of the ipconfig results? No
screen print required.
Computer 1 is connected directly through the Ethernet and is getting its IP address directly from the
router and computer 2 is connected wirelessly.
7. In Attached Devices which devices are associated with the IP addresses listed?
192.168.2.2 Jon PC (Computer 1)
192.168.2.3 android device
192.168.2.4 Scott PC (Computer 2)
192.168.2.5 JadeSurface (tablet)
8. Is anyone else connected to your network? (How do you know?) Include a screen print of the DHCP
Client List showing what computers are connected to your network.
Yes, both computers, a tablet and an android phone are connected. It is listed in the Attached

Devices setting.
9. Once you disconnect computer #2 and your mobile device from your wireless network, open a web
browser and visit a web site such as google.com. Do you have Internet connectivity? If so, to which
network are you connected? If not, why did you lose connectivity? Include a screen print of the
updated DHCP Client List.

There is no internet connectivity for computer 2. The mobile phone has connection due to the carrier.

10. How do networks that dont broadcast their SSIDs appear in the Connect to a Network dialog box?
No screen print required.
They dont appear, or if they were connected to before they appear as Hidden Network.
11. Consider a network that doesnt have encryption and also doesnt broadcast its SSID. Do those two
things make your network more secure or less secure? (explain) No screen print required.
Not using encryption makes it less secure, however not broadcasting the SSID makes it more secure.
12. What does adding WPA2 encryption do for your network? Include a screen print of the Wireless
Security screen shown directly above.
It adds a password and makes it harder for the password to be hacked.

13. Name three different steps you took to secure your network so far. No print screen required.
Hidden the network, added a WP2 encryption and changed the administrative password.
14. Can you add encryption without using a passphrase? No print screen required.
Yes, through Mac address filtering
15. Why would you want to add this level of security (MAC address filtering) to your network? (please
explain) No print screen required.

It only allows devices that have their MAC addresses entered to use the router, thus only allowing that
one device on.
16. How can you configure computer #2 to remove or forget the name of the network you created in this
exercise? (Write the steps to accomplish this on computer #2.) Take a screenshot showing the names
that appear on the list of Wi-Fi networks stored on computer #2. Where did they come from?
In the control panel under Network and Internet and Manage Wireless Networks in the Network
Sharing Center it is possible to view and manage all wireless networks. From there you can delete the
network.

17. How can you configure your mobile device to remove or forget the name of the network you created
in this exercise? (Write the steps to accomplish this on your mobile device.) Take a screenshot
showing the names that appear on the list of Wi-Fi networks stored on your mobile device. Where did

they come from?


Enter wifi tab, press down on the network name and click Forget Network. They are the wireless
networks that are currently broadcasting.
18. What is the name of the shared file found in the CIS231 folder on the USB? Include a screen print of
Computer screen.

Kool & The Gang - Celebration

19. What could you use this Network Storage for on your network at home? No print screen required.
Storing drivers for shared devices such as printers or sharing files.
(Each group member should answer the last two questions individually with their name on their
answer in the report.)
20. What part of this lab exercise gave your group the most trouble and why? No print screen required.
Jade Creating a password
Jonathan Updating the DHCP Client list
Dustin Finding the IP address on the phone
Scott Connecting to the hidden network
21. What did you learn from this exercise? No print screen required.
Jade -How to set up a router and encrypt the wireless.
Jonathan How to implement MAC address filtering
Dustin How to configure a router in depth
Scott Network encryption

You might also like