Preston Chapman Profile Picture

Preston Chapman

University of Advancing Technology Logo

Network Engineering Objectives

  1. Analyze personal and organizational requirements and design an appropriate networking architecture.
  2. Develop cloud solutions emphasizing the benefits of remote infrastructure.
  3. Identify networking misconfigurations and determine solutions to achieve optimal performance
  4. Demonstrate enterprise network administration through access controls, group policy, remote deployment, and backup recovery.
  5. Create networking solutions that incorporate traditional networking, IoT, and mobile devices.
  6. Demonstrate security principles within networking solutions based on industry standards.

Analyze personal and organizational requirements and design an appropriate networking architecture.

Objective 1

Logical and Physical Topologies | NTW275

In this assignment we were tasked with changing a logical network map to a physical network map, and a physical map to a logical map. For each of these we had to account for different IP addresses, devices, VLANs, subnetting, and room placement. We had to take into consideration of the company that we are design the maps for, to understand the layout, requirements, devices, cables and more.

Each of these diagrams needed to have multiple computers, servers, networking, and even smart devices. Every device needed to be represented, ladled, and organized, showing either where they are located, or the logical groups of the devices. I wanted to have these documented look organized and professional, while keeping the knowledge requirement low, so anyone regardless of experience should be able to understand it to some extent.

Physical Map

Workstation 1
192.168.10.10
Workstation 1...
Workstation 2
192.168.10.11
Workstation 2...
Workstation 3
192.168.10.12
Workstation 3...
Workstation 4
192.168.10.13
Workstation 4...
Workstation 5
192.168.10.14
Workstation 5...
Workstation 6
192.168.10.15
Workstation 6...
File Server - 192.168.20.20
File Server -...
AD Server - 192.168.20.30
AD Server - 1...
Dev Server - 192.168.20.40
Dev Server -...
Switch
Switch
Router
192.168.1.1
Router...
Firewall
192.168.1.2
Firewall...
Switch
Switch
192.168.30.30
192.168.30.30
Wireless AP
192.168.30.10
Wireless AP...
Smart TV
Smart TV
Smart Light
Smart...
Smart Light
Smart...
Smart Light
Smart...
192.168.30.20
192.168.30.20
Smart Light
Smart...
Web Server 2
200.1.1.30
Web Server 2...
Mail Server
200.1.1.31
Mail Server...
Web Server 1
200.1.1.20
Web Server 1...
Switch
Switch
Switch
Switch
Text is not SVG - cannot display
Router
192.168.1.1
Router...
VLAN 10
VLAN 10
VLAN 30
VLAN 30
VLAN 20
VLAN 20
VLAN 50
VLAN 50
VLAN 40
VLAN 40
Layer 3 Switch
192.168.1.2
Layer 3 Switch...
IT Switch: 192.168.100.1
IT Workstation: 192.168.100.154
File Server: 192.168.100.10
Backup Server: 192.168.100.12
IT Switch: 192.168.100.1IT Work...
Office Switch: 192.168.50.1
Workstation 1: 192.168.50.10
Workstation 2: 192.168.50.11
Workstation 3: 192.168.50.12
Printer: 192.168.50.123
Office Switch: 192.168.50.1Work...
Dev Switch: 192.168.40.1
Dev Server: 192.168.40.12
Dev Workstation: 192.168.40.123
Dev Switch: 192.168.40.1Dev Ser...
Wireless Router: 192.168.80.2
Smart TV: 192.168.80.10
Wireless Router: 192.168.80.2...
Corporate Switch: 192.168.122.1
Laptop: 192.168.122.10
Receptionist Computer: 192.168.122.11
Corporate Switch: 192.168.122.1...
Text is not SVG - cannot display

When designing the physical map I had to understand where reach room would be, and how they would be accessed. Also understanding how to keep critical devices secure, and having user devices accessible.

Previous

Please enable JS for this element to work

Next

Organizational Network Design | NTW275

In this assignment we where told to find a company on Indeed, in this case I chose Infosys, and based on the job requirements, we needed to come up with a design for their network. There were three core points that I wanted to focus on with this design, those being Remote Workers, Cloud Computing and Segmentation. Infosys was originated in India, and has locations in Arizona, Texas, Mexico and Canada. Because of this I need to make sure no matter where an employee is, they will be able to do their work. This leads into cloud computing, as based on my research Infosys tends to use Azure, while having public accessible servers, virtual machines, virtual networks, and app hosting. Lastly I designed the network around the Cisco Tetration (CSW), this way there is proper subletting on the network.

Devices
DevicePriceUsage
Cisco ASA 5515-X Firewall Edition$142.41 x 2 *Firewall with multiple network ports, used on the employee network, and after the modem.
Cisco Business 145AC Wi-Fi Access Point$63.37 x2Supports wireless and 2-3 LAN ports, used for the Guest Network, and the Employee network.
Cisco Catalyst 1200-48P-4G$815.93Larger switch with 48 ports, use mainly for the Upper Switch in the Employee Network
Cisco Catalyst 1200-8T-D$156.23Lower Switch for the IT network with 8 ports
HP Z4 G4 Workstation$418.56 *Workstation for employees

* Price Based on Refurbished Listings

Services
ServicePriceUsage
Open VPN / TailscaleFree - Monthly Tiers VPN For Remote Access, either for encrypting all traffic or just traffic for the cluster devices
Azure Networking$0.01 /GB *Allow for networking between virtual devices, such as routers, switches, VPN, and machines
AKS$0.10/cluster/hourAllow for developer tools such as node, app development, API, and SLA
NGINX plus$2,500/year**Host HTTP/HTTPS, email, and other web services
CSW SaaS$3/month***AI based network manager to improve security against attacks

* Price Varies on Tiers and services

** Price is for cloud hosted service

*** Pricing is not public

WFH Employee







WFH Employee...
Employee Network





















Employee Network...
Guest Wi-Fi







Guest Wi-Fi...
Azure











Azure...
192.168.100.x
192.168.100.x
Firewall
Firewall
Main Router
192.168.0.1
Main Rou...
Modem
Modem
192.168.1.x
192.168.1.x
Virtual Firewall
Virtua...
Virtual Switch
Virtua...
VLAN 10
VLAN 10
IT Switch
IT Switch
VLAN 30
VLAN 30
Home Network
Home Network
VPN Tunnel
VPN Tunn...
Upper Switch
Upper Swi...
Virtual Router
Virtu...
VPN Tunnel
VPN Tunn...
Text is not SVG - cannot display

Develop cloud solutions emphasizing the benefits of remote infrastructure.

Objective 2

AWS Cloud Architecture | NTS336

Amazon Web Services (AWS) provides all-in-one experience for your company when working in the cloud. With services ranging from access control, storage, security, virtual machines, and more, it can be an excellent opportunity for companies. During this assignment I went over a multitude of different services that AWS provides, and explain how each one is used and is important. This document went over the following services:

  • Architecture
  • IAM
  • EC2
  • S3
  • RDS
  • DynamoDB
  • VPC Networking
  • Security
  • Lambda
  • CloudWatch
  • CloudFormation
  • High Availability
  • Scaling
  • DevOps
  • Deployment
  • Advanced Management

Identify networking misconfigurations and determine solutions to achieve optimal performance

Objective 3

Final Project 2.0 (Documentation) | NTW216

This was a group project with: Keven Baquerizo; Giani Saldana; Rashalee Thompson

Roles: Team Leader and Configuration Manager

During the entirety of this class we where setting up a Windows Server, we had to configure services such as Active Directory, Samba, Devices, Users, and troubleshoot issues that our professor did to our servers. For this objective I will be going over specific troubleshooting tasks.

No Internet (26)

On this day we discovered that our account was missing from the sign in screen, this was one of the tasks that we had to resolve. We first went to the other user section, and inputted the username and password for our account, logging us in. Next we noticed that the computer was not connected to internet, when going to the ethernet settings in windows it showed that the adapter was disabled. By going to 'Control Panel\Network and Internet\Network Connections' we could then enable the adapter, resolving both of the issues we had.

System Sate Backup (16)

In this case we where tasked with setting up a system backup. Before we did this we had added a secondary drive, meant for backups, then we configured this drive using 'Windows Server Backup' and 'Local Backup'

Demonstrate enterprise network administration through access controls, group policy, remote deployment, and backup recovery.

Objective 4

Final Project 2.0 (Documentation) | NTW216

This was a group project with: Keven Baquerizo; Giani Saldana; Rashalee Thompson

Roles: Team Leader and Configuration Manager

During the entirety of this class we where setting up a Windows Server, we had to configure services such as Active Directory, Samba, Devices, Users, and troubleshoot issues that our professor did to our servers. For this objective I will be going over specific administrative tasks.

Active Directory (56)

Active directory is a critical part of Windows Server, this works by having a domain, and then adding users to this domain. Each user can be assigned to a group, or have permission set directly. These permissions could be things like elevated privileges, configuration settings, password resets, and more. Active Directory works in tandem with Group Polices, with these two making the baseline of Access Controls.

Group Policy Management (54)

Just like Active Directory, Group Policy allow for in depth and advance permissions with Active Directory. With these policies you can create templates, and even automation. The polices we changed where regarding the windows security, specifically auditing, this is just one of the many things you can control using Group Polices.

Shares (28)

Windows Server is able to host shares, this allows users to open and view files remotely, either wirelessly on the same network, or with a VPN. Windows Shares is native to all windows versions, including home, and they work excellently with Active Directory and Group Policies.

System Sate Backup (16)

In this case we where tasked with setting up a system backup. Before we did this we had added a secondary drive, meant for backups, then we configured this drive using 'Windows Server Backup' and 'Local Backup'

Create networking solutions that incorporate traditional networking, IoT, and mobile devices.

Objective 5

IoT Device Security Analysis Report | NTW233

This was a group project with: Keven Baquerizo

During this class we did in depth research over an IoT device "KSIZPE LED Strip Light", we analyzed the mobile application, and did a hardware analysis of the device to determine how secure it is. We looked into the issues regarding to the connection from the phone to the device, as anyone could control it with no authentication. We also looked into the security risks of the app itself, and looked into the issues with the hardware. In addition to all of these we looked at multiple documents, including the FCC report of the device.

Logical and Physical Topologies | NTW275

In this assignment we were tasked with changing a logical network map to a physical network map, and a physical map to a logical map. For each of these we had to account for different IP addresses, devices, VLANs, subnetting, and room placement. We had to take into consideration of the company that we are design the maps for, to understand the layout, requirements, devices, cables and more.

For this specific objective these maps had to include IoT devices, this meant I had to consider the many security risks that come with adding IoT to your network. In both of these diagrams they are heavily segmented, so that if any of them where to get comprised, the rest of the network would not be at risk.

Physical Map

Workstation 1
192.168.10.10
Workstation 1...
Workstation 2
192.168.10.11
Workstation 2...
Workstation 3
192.168.10.12
Workstation 3...
Workstation 4
192.168.10.13
Workstation 4...
Workstation 5
192.168.10.14
Workstation 5...
Workstation 6
192.168.10.15
Workstation 6...
File Server - 192.168.20.20
File Server -...
AD Server - 192.168.20.30
AD Server - 1...
Dev Server - 192.168.20.40
Dev Server -...
Switch
Switch
Router
192.168.1.1
Router...
Firewall
192.168.1.2
Firewall...
Switch
Switch
192.168.30.30
192.168.30.30
Wireless AP
192.168.30.10
Wireless AP...
Smart TV
Smart TV
Smart Light
Smart...
Smart Light
Smart...
Smart Light
Smart...
192.168.30.20
192.168.30.20
Smart Light
Smart...
Web Server 2
200.1.1.30
Web Server 2...
Mail Server
200.1.1.31
Mail Server...
Web Server 1
200.1.1.20
Web Server 1...
Switch
Switch
Switch
Switch
Text is not SVG - cannot display
Router
192.168.1.1
Router...
VLAN 10
VLAN 10
VLAN 30
VLAN 30
VLAN 20
VLAN 20
VLAN 50
VLAN 50
VLAN 40
VLAN 40
Layer 3 Switch
192.168.1.2
Layer 3 Switch...
IT Switch: 192.168.100.1
IT Workstation: 192.168.100.154
File Server: 192.168.100.10
Backup Server: 192.168.100.12
IT Switch: 192.168.100.1IT Work...
Office Switch: 192.168.50.1
Workstation 1: 192.168.50.10
Workstation 2: 192.168.50.11
Workstation 3: 192.168.50.12
Printer: 192.168.50.123
Office Switch: 192.168.50.1Work...
Dev Switch: 192.168.40.1
Dev Server: 192.168.40.12
Dev Workstation: 192.168.40.123
Dev Switch: 192.168.40.1Dev Ser...
Wireless Router: 192.168.80.2
Smart TV: 192.168.80.10
Wireless Router: 192.168.80.2...
Corporate Switch: 192.168.122.1
Laptop: 192.168.122.10
Receptionist Computer: 192.168.122.11
Corporate Switch: 192.168.122.1...
Text is not SVG - cannot display

When designing the physical map I had to understand where reach room would be, and how they would be accessed. Also understanding how to keep critical devices secure, and having user devices accessible.

Previous

Please enable JS for this element to work

Next

Demonstrate security principles within networking solutions based on industry standards.

Objective 6

Foobar Controller Mobile

This is a mobile app for the existing software Foobar2000, that will allow you to control your desktop music player, remotely using your phone, tablet, or other smart device. The goal is to provide a great user interface (UI) and user experience (UX), while still maintaining the abundant number of features that foobar2000 offers. The features would include Playlist, Library, Playback Queue, Album Art, LocalLibrary, Lightweight, Customizable, and more. Although foobar2000 is a great freeware application, it is on the older side, but it still has updates to this date, it is also highly customizable with skins and plugins. The goal is to use an open-sourced plugin called “Beefweb”which allows for communication over HTTP to control Foobar2000remotely. I will not be creating the music player (Foobar2000) or theAPI (Beefweb), I will be creating a mobile app that uses Beefweb to control Foobar, while having an easy-to-use UI.

Since this is a mobile application made for Android, we are able to do a security analysis on the app, using MobSF we can validate the security of the application, and apply industry standards and security principles.

In addition to the MobSF report, the application uses HTTP to handle traffic, although it does not use HTTPS, this is because of limitations with the API. However, the application is meant to only be used locally, and if needed remotely, it works with a VPN. Lastly, the application has multiple validation steps, including ESLint and Dependabot.

GoatDroid | NTW233

In this assignment we were tasked with reverse engineering an IoT application, instead of working with our existing device we were tasked with using Goat Droid. This report gives us information regarding the application, such as warnings about Logging being used, JS enabled in Webview, and more. This information can be critical to understanding the security of your application, or of an application you are using.