Most networks have similar components, including modems, routers, and devices, but networks have to be designed to meet the specific needs of the users it serves. Some networks may be relatively open to users for casual use such as checking email and surfing the Web. Others may need heightened security or greater bandwidth to support bandwidth-hogging activities like supporting multiple users in video conferencing or multiplayer games. The decisions a network administrator makes to design and configure a network are influenced by how it will be used and by whom.
It's finally time for you to design and configure your network! You've been using different networks most of your life and during this module you've been working through the nitty-gritty details of how they work. Now you get to make the decisions about how to set up a network. You may want to consider networks for different types of users and how their needs may influence your decisions. Or you may want to look at different settings for networks, like a secure LAN for the Help Desk versus a more open network in a cafeteria or commons space where students meet less formally. How might these or other settings impact your network design?
Given a user scenario, design and configure a wireless network that best meets the needs of the users and justify your decisions.
Install and configure a SOHO network, including configuring a DSL or cable modem and configuring or adjusting wireless settings. See Activity 9-4: Installing and Configuring SOHO Networks in The Official CompTIA A+ Core 1 & Core 2 Instructor Guide and its associated links to emulators for detailed steps for one scenario for completing the task. Consider beginning by having the students create at least a rough site diagram that identifies all devices and justify placement of access points, perhaps by completing a site survey. They should also configure or adjust firewall settings, including setting up a personal firewall on a (Windows) device. If possible, connect at least one IoT device to the network.
Install and Configure SOHO Networks
SOHO (Small Office Home Office) Network
Wi-Fi Protected Setup (WPS)
Radio Power Levels
Wi-Fi Security Protocols
Wi-Fi Authentication
SOHO Security Issues
Quality of Service (QoS)
See also
Configure SOHO Network Security
Firewall
Network Address Translation (NAT)
Demilitarized Zone (DMZ)
Universal Plug-and-Play (UPnP)
Install and Configure IoT Devices
Internet of Things (IoT) and examples of IoT devices
IoT Wireless and Networking Technologies
IoT Device Configuration
Digital Assistant or Virtual Assistant
Monday
Review problem: Install and Configure SOHO Networks
Discussion Activity 9-3
Team meetings to review and confirm project plan and goals
Tuesday
Small group and independent exploration of resources: Activity 9-4: Installing and Configuring SOHO Networks
Contribute to team project
Wednesday
Hands-on exploration: Review Activity 9-4
If time allows: Activity 9-5: Installing and Configuring SOHO Networks
Team progress check with supervisor (using project plan)
Thursday
Hands-on exploration: Activity 9-5
Install and Configure IoT Devices and Activity 9-9
Contribute to team project
Friday
Teams share networks and artifacts with others
Online post-assessment
With the focus of the week being designing and configuring a network—either simulated or actual—much of the week should be set aside for this activity. Students may draw upon information from the previous topics in the module. Students can complete the activity independently using an emulator or may want to work in teams if enough hardware, cabling, and devices are available for their use. The size of the teams, perhaps even including the whole class, may be dependent upon available supplies. Experienced student teams may be able to complete both activities.
Firewalls and browser configurations are not Core 1 objectives but can be addressed if students have some experience in network configuration or maintenance already. Students should spend some time reviewing concepts related to network security as well as exploring types of networking for IoT devices and connecting at least one IoT device to their network, or perhaps a network from another team.
The Official CompTIA A+ Core 1 & Core 2 Instructor Guide for Exams 220-1001 and 220-1002
CompTIA also offers videos for purchase through their website or on ITPro.TV.
Professor Messer at ProfessorMesser.com and YouTube offers numerous free videos of various lengths for many of the topics for the CompTIA 220-1001 A+ Exam. They are easy to understand, narrated videos with visuals. If you are teaching a CompTIA course, the site notes "You're welcome to use them as much as you'd like, provided you embed the videos with the associated YouTube link or link directly to my site. Please click the "Contact Us" link at the top of our web page and let me know how you're using them."
Entry Level I.T. Training from Technology Gee
PowerCert Animated Videos on YouTube
ITProTV (may include promotions for ITProTV courses)
Articles and Other Resources:
Cloudflare, a global networking company, provides a wealth of information on topics related to networks in it's Learning Center. Consider these and explore others
Tutorials from Cisco:
How to set up a web server
How to set up a server for a small or mid-sized business from Avast, an online security company
Set up your very own Web server! Detailed, step-by-step directions from CalcProgramme1 for instructables circuits. Also downloadable in PDF.
How to File and Printer Sharing
How to Build a Fileserver on wikiHow
Install a New File Server as a Content Server from Microsoft
How to Set Up a Shared Network Printer in Windows 7, 8, or 10 by Walter Glenn for How-To Geek
How to Share a Printer in Windows 10. Article with screen capture images by Andre Da Costa for groovypost
Share your network printer in Windows 10 from Microsoft
Internet Security appliances and software
Educational Targets Hit by Rising Cyberattacks in 2021 by Louis Columbus on VentureBeat
Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): What is the Difference? By Lauren Abshire for US Cybersecurity Magazine
Network Intrusion: How to Detect and Prevent It by Isabell Gaylord for US Cybersecurity Magazine
What is an Intrusion Detection System? Short article from Palo Alto Networks with summary table
What is Unified Threat Management (UTM)? Detailed description of UTM components from cybersecurity company Fortinet. Some product promotion at the end of the article.
Find Proxy Settings on Your Computer (for Local Testing Parameters). Directions for Windows, OSX, and Linux from BrowserStack, a software testing platform
How to Create a Proxy Server (2001) for Windows and OSX by Jessie Richardson for alphr
How to Set Up a Proxy Server on Your PC, Mac, or Web Browser. Directions for multiple browsers and versions from Avast
What is a Proxy Server? Detailed description of various types of proxy servers from cybersecurity company Fortinet. Some product promotion at the end of the article.