Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Digital Communications and Networking

Defense Of A Small Network, Isabella Adkins Jan 2023

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Leveraging Ansible To Locate Network Devices, Elijah Hadden Jan 2023

Leveraging Ansible To Locate Network Devices, Elijah Hadden

Williams Honors College, Honors Research Projects

This report demonstrates the collection of Layer 2 and Layer 3 network device information using Ansible and explains the limitations identified performing such a procedure. Maintaining dynamic documentation of network information using automation would benefit network security with improvements to attack surface visibility and cyberattack incident response time. After the procedure was conducted, it was determined that Ansible alone is incapable of producing the intended information base due to the way it handles numerical variables. This report identifies limitations in Ansible’s ability to manipulate large quantities of network information and necessitates further discussion regarding what Ansible can and should be …


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Creature Care, Alexander Weber Jan 2020

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …


Home Networking With Enterprise Equipment, Alex Lowers Jan 2016

Home Networking With Enterprise Equipment, Alex Lowers

Williams Honors College, Honors Research Projects

This project tested various wired and wireless topologies and benchmarked download speeds and quality for various types of media. For music, topology had a negligible impact. High quality video streams were impacted by latency introduced in the wireless topologies. Likewise, video game streaming, especially games of high graphical fidelity, were negatively impacted when streamed over a wireless network. For all types of media, a fully wired topology is recommended.


Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson Jan 2015

Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson

Williams Honors College, Honors Research Projects

This research project explores the operation of the IS-IS routing protocol, as well as DHCP and DNS services provided by a Raspberry Pi computer. IS-IS is a routing protocol that is commonly ignored in most training and certification programs, because it is most frequently used by service providers. However, IS-IS solutions are also deployed in some large enterprise networks, making experience with the protocol a valuable skill.

In order to gain a deeper understanding of the routing domains, route propagation, and general operation of IS-IS, additional services were implemented in this project. A Raspberry Pi computer was used as an …