The document provides instructions for configuring various network devices and settings, including:
1. Configuring client device system settings according to manufacturer instructions and user preferences.
2. Configuring a local area network (LAN) according to manufacturer instructions and network design, including settings like the LAN IP address and subnet mask.
3. Configuring a wide area network (WAN) according to manufacturer instructions and network design, including settings for the WAN connection type, IP address, subnet mask, and default gateway.
4. Configuring wireless settings according to manufacturer instructions, network design, and user preferences, including conducting tests to ensure proper wireless network coverage, performance, security, and roaming.
Case study on Pamplona National High School Local Area NetworkJude Rainer
The document proposes a centralized local area network for Pamplona National High School to address issues with their current computer network. It would include installing a server with services like DHCP, DNS, FTP, proxy, and web server to provide shared resources and improve security and management. A budget of 300,000 pesos is proposed to cover equipment, installation, and salaries for a system administrator and assistant to manage the new network over five years.
This document provides an introduction to network concepts for a training module on setting up computer networks. It defines key terms like client, server, media, network adapter, and protocols. It also explains different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), storage area networks (SANs), and virtual private networks (VPNs). The goal is to give trainees background knowledge needed to understand network installation and configuration activities covered later in the module.
This internship document outlines an internship program at Worldlink, Nepal's largest internet service provider. The objectives are to understand Worldlink's network structure, deal with technical issues, and gain practical work experience. Key responsibilities include monitoring networks, troubleshooting client issues, and configuring devices. The intern will work with various internal systems like e-billing, ticketing, and fiber installation tools. The conclusion states the internship provided valuable practical experience implementing classroom knowledge in a real work environment.
This document contains the resume of Gnaneshwar Bunni. He is seeking a job as a network administrator with the goal of developing his technical skills. He has over 5 years of experience as a network administrator and systems administrator for various companies. He has skills in networking, security, desktop support, and systems administration. He holds certifications in ITILv3 and CPTS and training in CCNA.
The document provides information on the Information Technology - Network Specialist associate degree program at WITC. The 2-year program trains students to perform network design, installation, administration, and support. Students learn skills through courses affiliated with Cisco, CompTIA, Microsoft and VMware. The program includes pathways to IT certifications and bachelor's degrees. Graduates have a high employment rate, with most working in related fields and earning average salaries around $35,000.
Enterprise networking course work under NCC EducationMd. Mahbub Alam
The document outlines submission requirements for students, including attaching a statement confirming the work as their own and acknowledging assessment standards. Students must provide identification details and ensure assignments are submitted before the due date. Plagiarism is prohibited under the program's academic dishonesty policy.
This document describes an internship report submitted by Pradip Sapkota to fulfill the requirements for a Bachelor's degree in Computer Science from Tribhuvan University in Nepal. The internship was conducted at Lumbini Net Pvt Ltd from April to July 2015 under the supervision of Mr. Binod Kumar Adhikari. During the internship, Pradip assisted with tasks like wireless network configuration, router setup, and other activities to support Lumbini Net's internet service offerings. The report documents the work done and lessons learned from the experience.
CSS NC II Module : Set-up Computer NetworksEric Talamisan
The document discusses setting up computer networks, including defining a network as a collection of connected computers and equipment. It describes the three basic types of networks - local area networks within a building, metropolitan area networks spanning a city, and wide area networks distributing information over thousands of miles. The key hardware components are identified as network interface cards that connect computers to the network via cables.
Case study on Pamplona National High School Local Area NetworkJude Rainer
The document proposes a centralized local area network for Pamplona National High School to address issues with their current computer network. It would include installing a server with services like DHCP, DNS, FTP, proxy, and web server to provide shared resources and improve security and management. A budget of 300,000 pesos is proposed to cover equipment, installation, and salaries for a system administrator and assistant to manage the new network over five years.
This document provides an introduction to network concepts for a training module on setting up computer networks. It defines key terms like client, server, media, network adapter, and protocols. It also explains different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), storage area networks (SANs), and virtual private networks (VPNs). The goal is to give trainees background knowledge needed to understand network installation and configuration activities covered later in the module.
This internship document outlines an internship program at Worldlink, Nepal's largest internet service provider. The objectives are to understand Worldlink's network structure, deal with technical issues, and gain practical work experience. Key responsibilities include monitoring networks, troubleshooting client issues, and configuring devices. The intern will work with various internal systems like e-billing, ticketing, and fiber installation tools. The conclusion states the internship provided valuable practical experience implementing classroom knowledge in a real work environment.
This document contains the resume of Gnaneshwar Bunni. He is seeking a job as a network administrator with the goal of developing his technical skills. He has over 5 years of experience as a network administrator and systems administrator for various companies. He has skills in networking, security, desktop support, and systems administration. He holds certifications in ITILv3 and CPTS and training in CCNA.
The document provides information on the Information Technology - Network Specialist associate degree program at WITC. The 2-year program trains students to perform network design, installation, administration, and support. Students learn skills through courses affiliated with Cisco, CompTIA, Microsoft and VMware. The program includes pathways to IT certifications and bachelor's degrees. Graduates have a high employment rate, with most working in related fields and earning average salaries around $35,000.
Enterprise networking course work under NCC EducationMd. Mahbub Alam
The document outlines submission requirements for students, including attaching a statement confirming the work as their own and acknowledging assessment standards. Students must provide identification details and ensure assignments are submitted before the due date. Plagiarism is prohibited under the program's academic dishonesty policy.
This document describes an internship report submitted by Pradip Sapkota to fulfill the requirements for a Bachelor's degree in Computer Science from Tribhuvan University in Nepal. The internship was conducted at Lumbini Net Pvt Ltd from April to July 2015 under the supervision of Mr. Binod Kumar Adhikari. During the internship, Pradip assisted with tasks like wireless network configuration, router setup, and other activities to support Lumbini Net's internet service offerings. The report documents the work done and lessons learned from the experience.
CSS NC II Module : Set-up Computer NetworksEric Talamisan
The document discusses setting up computer networks, including defining a network as a collection of connected computers and equipment. It describes the three basic types of networks - local area networks within a building, metropolitan area networks spanning a city, and wide area networks distributing information over thousands of miles. The key hardware components are identified as network interface cards that connect computers to the network via cables.
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
Mpho Maluleke is seeking an IT Support Technician, Service Desk Agent, or Network Engineer position. He holds a National Diploma in IT Support Services from Tshwane University of Technology. His experience includes IT support, hardware installation, network administration, and troubleshooting technical issues. He has knowledge of Windows servers, SQL Server, VPNs, LAN/WAN setup, and supporting users.
It essentials pc hardware and software overviewAhmed Sultan
The document provides an overview of the IT Essentials: PC Hardware and Software course, which teaches students practical knowledge of how computers work and helps prepare them for CompTIA A+ certification. The course is divided into two parts covering fundamentals and advanced topics related to hardware, software, networking, security and troubleshooting. It utilizes virtual learning tools and Cisco Packet Tracer activities to provide hands-on experience for students pursuing careers in IT.
This document provides a two-page report on considering Frame Relay as a connectivity option between the Pittsburgh and Cleveland offices. It compares Frame Relay to other WAN technologies like ATM and dedicated leased lines. Frame Relay is presented as a cost-effective option that provides connectivity through virtual circuits while only paying for the bandwidth used. Other options are discussed but Frame Relay is ultimately recommended as the best fit for the needs of this project.
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
The document describes experiments conducted using Cisco Packet Tracer software to simulate and test different computer network topologies. It includes 15 experiments covering topics like connecting devices using hubs and switches, implementing bus, star, ring, tree and hybrid topologies, creating local and wireless networks, and connecting multiple networks using routers. Each experiment lists the aim, steps to set up the topology, and provides a brief explanation of the networking concepts tested.
The document outlines the plans for a project to set up three new computer labs for the Corona Norco Unified School District. It includes details on team members, objectives, scope, requirements, schedules, risks, budgets, and acceptance criteria. The project aims to provide students and teachers with email, software, printing, and internet access through a secure network infrastructure.
9.5+ years of IT professional experience in telecom domain.
Working on Agile Methodology.
Worked on OSS/BSS applications. Experience in ordering domain.
Good knowledge in Order Management Syetem.
Posses B1 Visa which is valid till July 2022.
Travelled to US on B1 for 3 months.
Attained good experience in Functional, Integration, Regression testing.
Good knowledge in web service testing. Have tools tools like SOAP UI, POSTMAN.
Hands on experience on Tool like Toad ,BUSTESTER.
Attained good experience in writing Test Cases / Scenarios / Automating using QTP.
3 years experience in Automation ( QTP ) in developing framework & writing scripts.
Have automated 2 web based application and 1 desktop application using QTP/UFT and VB script.
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
The document provides instructions for a lab activity to create and implement a security policy. The lab is divided into five parts:
1. Create a basic security policy using Cisco's Security Policy Builder tool and customize it for the example company.
2. Configure basic settings on routers and switches like hostnames, passwords, and routing.
3. Secure the routers by configuring authentication, access controls, firewalls, logging, and time synchronization.
4. Secure the switches by configuring similar security features.
5. Configure a router for remote access VPN.
The overall goal is to take a generic security policy created in Part 1 and implement the network device configuration guidelines from it on the physical
IRJET- Electronic Notice Board Remotely Operated using Android PhoneIRJET Journal
This document describes a remotely operated electronic notice board system using an Android phone. The system uses a Raspberry Pi connected to an LCD display as a server. An Android client app allows authorized users to send text messages over WiFi to the Raspberry Pi server from any location. When a message is received, the Raspberry Pi retrieves it from a MySQL database and displays it on the LCD notice board in real-time without human intervention, providing a wireless solution to automatically update notices remotely.
Ricky Dagum has over 7 years of experience in IT and security systems. He has worked as a computer instructor, systems administrator, and commissioning engineer. As a commissioning engineer, he has overseen security system installations for various projects including hospitals, office buildings, and schools. His responsibilities have included network design, server configuration, camera installation, access control programming, and training end users. He aims to be a solution-oriented team leader and brings experience in a variety of industries.
This document is a resume for Manish Maurya seeking a position as a Windows Desktop Administrator. It summarizes his skills and over 5 years of experience in information technology with a focus on Windows system administration. He has administered Windows 7, 8.1, 10, Windows Server 2003, 2008 and 2012. His technical skills include OS installation, hardware troubleshooting, networking, and security. He has experience working with various companies as a Windows administrator.
The document provides a career profile and work experience summary for an IT professional with 5 years of experience in technical support, infrastructure management, and end user support. Their most recent role was as an L2 Desktop Management engineer for Wipro from 2014 to 2016 where they responded to IT incidents and requests, troubleshot issues, and ensured tasks were completed on time. Prior experience includes roles as a technical support engineer and helpdesk engineer providing IT support services. They have qualifications and certifications in IT support areas like Windows administration, networking, and ITIL processes.
This document discusses the advantages and disadvantages of e-commerce security. It begins by defining e-commerce security as protecting e-commerce assets from unauthorized access, modification, or deletion according to the CIA model of information security. While e-commerce provides benefits, the growth in its use also increases potential for security exploits and white collar crimes. Some key advantages discussed include flexibility of online payments and convenience for customers. However, fraud is a major risk that companies spend billions to mitigate. The document recommends several security best practices like using antivirus software, shopping at secure websites, using strong unique passwords, and reviewing orders carefully to reduce risks of e-commerce.
IRJET- Online Programming Assessment and Evaluation Platform in Education SystemIRJET Journal
The document describes an online programming assessment and evaluation platform for educational institutions. It proposes developing a system that allows HODs to assign batches to faculty, who can then create programming assignments and assessments with test cases. Students would access the system to complete assignments, which would be automatically compiled and evaluated. The system would provide performance feedback to students and reduce the effort of manual evaluation. It would be built with an Angular front-end and Spring Boot APIs backend, with compilation handled in the cloud. A chatbot is also proposed to help students with doubts. The system aims to make programming assessment more efficient and accessible while improving students' coding skills.
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
This document proposes a smart mobile attendance system using Bluetooth technology. It aims to simplify and streamline the attendance monitoring process. The system uses Bluetooth on mobile phones and an app to mark attendance and track employees within a company premises. It identifies Bluetooth and databases as tools to efficiently store and retrieve employee and student records for evaluation purposes. The proposed framework generates a one-time password for added security and prevents proxy attendance. It discusses using this system for university student attendance, making the process quicker, more secure, and fully digital while eliminating forgery risks compared to traditional manual attendance marking.
The document provides information on configuring client device systems, which involves setting default preferences for devices connected to a network. It discusses configuring time and date, computer name, network drivers, and installing software applications. Specific steps are outlined for configuring client devices in Windows 7, 8, and 10 by setting the time and date, computer name, installing network drivers, and necessary software applications like MS Office and antivirus, in accordance with manufacturer instructions and user preferences.
Seon O Kim is an experienced IT professional seeking a new position. He has over 5 years of experience in IT support roles including hardware and software installation, troubleshooting, network administration, and desktop support. He has a wide range of technical skills and certifications including CompTIA A+, Network+, Security+, and Microsoft certifications. Currently he works as a Help Desk Engineer for Freddie Mac where he performs various duties including user support, hardware and software maintenance, and ticket management. Previously he held a field support role providing Tier III support to over 10,000 military and civilian personnel at the Pentagon. He is proficient with Windows, Active Directory, and networking protocols and hardware.
Vinay Singh has over 8 years of experience in manual testing in the telecom industry, specializing in testing packet core and IMS nodes. He has worked on projects involving LTE testing, device validation, regression testing, and root cause analysis. His responsibilities include writing and executing test cases, analyzing logs, troubleshooting issues, and preparing daily reports.
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 5 of 10
This Webinar focuses on Controlling Ports and Network Devices
• Ports and Protocols
• Network Mappers
• Protocol Attacks
• Use of Firewalls
• Identifying Network Boundaries
• NIST 800 framework and CIS
• Switches and Routers
• Routing Protocols
• Switch Security
• Hardening the Network
• Good Network Administration
• Internet Control Message Protocol
• Anti-spoofing and logging
• Configuring a secure network perimeter
• Secure IOS-based Routers using automated features
• Securing Desktops, Notebooks, Servers and Mobile Devices
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
Mpho Maluleke is seeking an IT Support Technician, Service Desk Agent, or Network Engineer position. He holds a National Diploma in IT Support Services from Tshwane University of Technology. His experience includes IT support, hardware installation, network administration, and troubleshooting technical issues. He has knowledge of Windows servers, SQL Server, VPNs, LAN/WAN setup, and supporting users.
It essentials pc hardware and software overviewAhmed Sultan
The document provides an overview of the IT Essentials: PC Hardware and Software course, which teaches students practical knowledge of how computers work and helps prepare them for CompTIA A+ certification. The course is divided into two parts covering fundamentals and advanced topics related to hardware, software, networking, security and troubleshooting. It utilizes virtual learning tools and Cisco Packet Tracer activities to provide hands-on experience for students pursuing careers in IT.
This document provides a two-page report on considering Frame Relay as a connectivity option between the Pittsburgh and Cleveland offices. It compares Frame Relay to other WAN technologies like ATM and dedicated leased lines. Frame Relay is presented as a cost-effective option that provides connectivity through virtual circuits while only paying for the bandwidth used. Other options are discussed but Frame Relay is ultimately recommended as the best fit for the needs of this project.
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
The document describes experiments conducted using Cisco Packet Tracer software to simulate and test different computer network topologies. It includes 15 experiments covering topics like connecting devices using hubs and switches, implementing bus, star, ring, tree and hybrid topologies, creating local and wireless networks, and connecting multiple networks using routers. Each experiment lists the aim, steps to set up the topology, and provides a brief explanation of the networking concepts tested.
The document outlines the plans for a project to set up three new computer labs for the Corona Norco Unified School District. It includes details on team members, objectives, scope, requirements, schedules, risks, budgets, and acceptance criteria. The project aims to provide students and teachers with email, software, printing, and internet access through a secure network infrastructure.
9.5+ years of IT professional experience in telecom domain.
Working on Agile Methodology.
Worked on OSS/BSS applications. Experience in ordering domain.
Good knowledge in Order Management Syetem.
Posses B1 Visa which is valid till July 2022.
Travelled to US on B1 for 3 months.
Attained good experience in Functional, Integration, Regression testing.
Good knowledge in web service testing. Have tools tools like SOAP UI, POSTMAN.
Hands on experience on Tool like Toad ,BUSTESTER.
Attained good experience in writing Test Cases / Scenarios / Automating using QTP.
3 years experience in Automation ( QTP ) in developing framework & writing scripts.
Have automated 2 web based application and 1 desktop application using QTP/UFT and VB script.
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
The document provides instructions for a lab activity to create and implement a security policy. The lab is divided into five parts:
1. Create a basic security policy using Cisco's Security Policy Builder tool and customize it for the example company.
2. Configure basic settings on routers and switches like hostnames, passwords, and routing.
3. Secure the routers by configuring authentication, access controls, firewalls, logging, and time synchronization.
4. Secure the switches by configuring similar security features.
5. Configure a router for remote access VPN.
The overall goal is to take a generic security policy created in Part 1 and implement the network device configuration guidelines from it on the physical
IRJET- Electronic Notice Board Remotely Operated using Android PhoneIRJET Journal
This document describes a remotely operated electronic notice board system using an Android phone. The system uses a Raspberry Pi connected to an LCD display as a server. An Android client app allows authorized users to send text messages over WiFi to the Raspberry Pi server from any location. When a message is received, the Raspberry Pi retrieves it from a MySQL database and displays it on the LCD notice board in real-time without human intervention, providing a wireless solution to automatically update notices remotely.
Ricky Dagum has over 7 years of experience in IT and security systems. He has worked as a computer instructor, systems administrator, and commissioning engineer. As a commissioning engineer, he has overseen security system installations for various projects including hospitals, office buildings, and schools. His responsibilities have included network design, server configuration, camera installation, access control programming, and training end users. He aims to be a solution-oriented team leader and brings experience in a variety of industries.
This document is a resume for Manish Maurya seeking a position as a Windows Desktop Administrator. It summarizes his skills and over 5 years of experience in information technology with a focus on Windows system administration. He has administered Windows 7, 8.1, 10, Windows Server 2003, 2008 and 2012. His technical skills include OS installation, hardware troubleshooting, networking, and security. He has experience working with various companies as a Windows administrator.
The document provides a career profile and work experience summary for an IT professional with 5 years of experience in technical support, infrastructure management, and end user support. Their most recent role was as an L2 Desktop Management engineer for Wipro from 2014 to 2016 where they responded to IT incidents and requests, troubleshot issues, and ensured tasks were completed on time. Prior experience includes roles as a technical support engineer and helpdesk engineer providing IT support services. They have qualifications and certifications in IT support areas like Windows administration, networking, and ITIL processes.
This document discusses the advantages and disadvantages of e-commerce security. It begins by defining e-commerce security as protecting e-commerce assets from unauthorized access, modification, or deletion according to the CIA model of information security. While e-commerce provides benefits, the growth in its use also increases potential for security exploits and white collar crimes. Some key advantages discussed include flexibility of online payments and convenience for customers. However, fraud is a major risk that companies spend billions to mitigate. The document recommends several security best practices like using antivirus software, shopping at secure websites, using strong unique passwords, and reviewing orders carefully to reduce risks of e-commerce.
IRJET- Online Programming Assessment and Evaluation Platform in Education SystemIRJET Journal
The document describes an online programming assessment and evaluation platform for educational institutions. It proposes developing a system that allows HODs to assign batches to faculty, who can then create programming assignments and assessments with test cases. Students would access the system to complete assignments, which would be automatically compiled and evaluated. The system would provide performance feedback to students and reduce the effort of manual evaluation. It would be built with an Angular front-end and Spring Boot APIs backend, with compilation handled in the cloud. A chatbot is also proposed to help students with doubts. The system aims to make programming assessment more efficient and accessible while improving students' coding skills.
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
This document proposes a smart mobile attendance system using Bluetooth technology. It aims to simplify and streamline the attendance monitoring process. The system uses Bluetooth on mobile phones and an app to mark attendance and track employees within a company premises. It identifies Bluetooth and databases as tools to efficiently store and retrieve employee and student records for evaluation purposes. The proposed framework generates a one-time password for added security and prevents proxy attendance. It discusses using this system for university student attendance, making the process quicker, more secure, and fully digital while eliminating forgery risks compared to traditional manual attendance marking.
The document provides information on configuring client device systems, which involves setting default preferences for devices connected to a network. It discusses configuring time and date, computer name, network drivers, and installing software applications. Specific steps are outlined for configuring client devices in Windows 7, 8, and 10 by setting the time and date, computer name, installing network drivers, and necessary software applications like MS Office and antivirus, in accordance with manufacturer instructions and user preferences.
Seon O Kim is an experienced IT professional seeking a new position. He has over 5 years of experience in IT support roles including hardware and software installation, troubleshooting, network administration, and desktop support. He has a wide range of technical skills and certifications including CompTIA A+, Network+, Security+, and Microsoft certifications. Currently he works as a Help Desk Engineer for Freddie Mac where he performs various duties including user support, hardware and software maintenance, and ticket management. Previously he held a field support role providing Tier III support to over 10,000 military and civilian personnel at the Pentagon. He is proficient with Windows, Active Directory, and networking protocols and hardware.
Vinay Singh has over 8 years of experience in manual testing in the telecom industry, specializing in testing packet core and IMS nodes. He has worked on projects involving LTE testing, device validation, regression testing, and root cause analysis. His responsibilities include writing and executing test cases, analyzing logs, troubleshooting issues, and preparing daily reports.
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 5 of 10
This Webinar focuses on Controlling Ports and Network Devices
• Ports and Protocols
• Network Mappers
• Protocol Attacks
• Use of Firewalls
• Identifying Network Boundaries
• NIST 800 framework and CIS
• Switches and Routers
• Routing Protocols
• Switch Security
• Hardening the Network
• Good Network Administration
• Internet Control Message Protocol
• Anti-spoofing and logging
• Configuring a secure network perimeter
• Secure IOS-based Routers using automated features
• Securing Desktops, Notebooks, Servers and Mobile Devices
Similar to CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf (20)
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
CSS_G 10_Quarter 2_LAS 2 - Allan Montenegro_edited.pdf
1. i | P a g e
10
Technology and Livelihood
Education
Activity Sheet
Quarter 2 – LO 3: Set Router /
WiFi / Wireless Access Point /
Repeater Configuration
(Network Connectivity Testing, Device System Settings
Configuration, LAN Port Configuration and WAN Port
Configuration)
REGION VI – WESTERN VISAYAS
2. ii | P a g e
Development Team of English Activity Sheet
Writer : Allan B. Montenegro
Content/Language Validator: Edward E. Baña
Layout Artist:
Schools Division Quality Assurance Team:
Schubert Anthony C. Sialongo
Edward E. Baña
Allan B. Montenegto
Michelle P. Jordan
Division of Antique Management Team:
Felisa B. Beriong, CESO VI
Corazon C. Tingson
Gaudencio C. Riego, PhD
Schubert Anthony C. Sialongo
Edward E. Baña
Regional Management Team
Ma. Gemma M. Ledesma,
Dr. Josilyn S. Solana,
Dr. Elena P. Gonzaga,
Mr. Donald T. Genine,
(Learning Area EPS)
TLE Grade 10/12
Activity Sheet No. 2
First Edition, 2020
Published in the Philippines
By the Department of Education
Region 6 – Western Visayas
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
This Learning Activity Sheet is developed by DepEd Region 6 – Western
Visayas.
ALL RIGHTS RESERVED. No part of this learning resource may be
reproduced or transmitted in any form or by any means electronic or mechanical
without written permission from the DepEd Regional Office 6 – Western Visayas.
3. iii | P a g e
Introductory Message
Welcome to Computer System Servicing NC II Grade 10/12
The Learning Activity Sheet is a product of the collaborative efforts of the
Schools Division of Antique and DepEd Regional Office VI - Western Visayas through
the Curriculum and Learning Management Division (CLMD). This is developed to
guide the learning facilitators (teachers, parents and responsible adults) in helping the
learners meet the standards set by the K to 12 Basic Education Curriculum.
The Learning Activity Sheet is self-directed instructional materials aimed to
guide the learners in accomplishing activities at their own pace and time using the
contextualized resources in the community. This will also assist the learners in
acquiring the lifelong learning skills, knowledge and attitudes for productivity and
employment.
For learning facilitator:
The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning Competency
(MELC) with minimal or no face-to-face encounter between you and learner. This will
be made available to the learners with the references/links to ease the independent
learning.
For the learner:
The Computer System Servicing NC II Activity Sheet is developed to help
you continue learning even if you are not in school. This learning material provides
you with meaningful and engaging activities for independent learning. Being an active
learner, carefully read and understand the instructions then perform the activities and
answer the assessments. This will be returned to your facilitator on the agreed
schedule.
4. 1 | P a g e
Learning Activity Sheets (LAS)
(For Technology and Livelihood Education)
Name of Learner: _____________________ Grade and Section: ________________
Date: ________________
COMPUTER SYSTEM SERVICING NC II ACTIVITY SHEET
Network Connectivity Testing, Device System Settings
Configuration, LAN Port Configuration and WAN Port
Configuration
I. Learning Competency with Code
TLE_IACSS9-12SUCN-If-j-IIa-e-35
✓ Configure client device systems settings in accordance with manufacturer’s
instructions and end user preference
✓ Configure LAN in accordance with manufacturer’s instructions and network design
✓ Configure WAN in accordance with manufacturer’s instructions and network
design
✓ Configure wireless settings in accordance with manufacturer’s instructions,
network design and end-user preferences
II. Background Information for Learners
Wireless networking is both pervasive and getting more complicated behind the
scenes. For end users, Wi-Fi is the invisible network resource that they connect
to. For wireless network administrators -- who design, deploy and support the
wireless LAN -- the Wi-Fi network is a fairly complicated beast with many
moving pieces that are part of the bigger networking environment.
Because of the use of radio waves, it is important to fully test a wireless LAN
(WLAN) before letting users start using it. Be certain to perform testing after
installing a WLAN to ensure that the WLAN system satisfies requirements. In
some cases, during operations and maintenance, it might be necessary to
perform testing when troubleshooting problems.
III. Accompanying DepEd Textbook and Educational Sites (With Possible
Materials for experiments/activities)
James T. Geier. Designing and Deploying 802.11n Wireless Networks, Cisco Press networking
technology series, Networking Technology Series;
https://www.a2hosting.com/kb/getting-started-guide/internet-and-networking/troubleshooting-
network-connectivity-with-ping-and-traceroute
https://checkmybroadbandspeed.online/how-to-read-understand-ping-results/
https://www.tp-link.com/ph/support/faq/78/
https://searchnetworking.techtarget.com/tip/Wireless-network-troubleshooting-Connectivity
5. 2 | P a g e
IV. Activity Proper
1. NETWORK CONNECTIVITY TESTING
Many scenarios require you to test things locally on your computer using the command
line. For example, if you are trying to test the connection between your computer and a
remote host, a web-based tool cannot provide this information. It only tests the
connection from its own server to the remote host.
The exact steps to use the ping tools from the command line depend on your
computer's operating system. The basic ping test is one of the easiest things you can
do to verify connectivity between your computer and a remote host. This test is easy to
run from the command line.
Using ping test on Microsoft Windows
1. On your keyboard press Windows Key + R, type CMD the Enter key
2. On command line window type ping + google.com or any domain that you want
to test. Or ping + 192.168.0.10 or any IP address of a device that you want to
test.
Example:
Interpret the output from ping:
If the remote host is active and
configured to respond to ping
requests, responses appear.
Alternatively, if the remote host is
down, or not configured to respond
to ping requests, you do not see any
response.
▪ Reply from: By default, windows will send four ping messages (one on each line)
and then shows you the outcome of each of the four messages.
▪ Bytes: Each ping message request is 32 bytes in size. This is a default setting.
▪ Time: This shows the round trip amount of time in milliseconds (8ms =
0.008seconds). Round trip is the time from when the ping message was sent and
how long it took before the reply came back.
C:>ping google.com
6. 3 | P a g e
▪ TTL (Time-to-Live): The TTL value represents the maximum number of IP routers
that the packet can go through before being thrown away. Currently each router
that the packet travels/hops through will decrement the TTL field by exactly one.
Windows default TTL is 64 therefore if you ping a device on your local home
wireless/network then the ping will not cross any routers and the TTL should remain
at the default. As you can see from the google.com ping example (above) the TTL
went down to 113 so the packet had to hop across a few routers before it got to
google.com.
▪ Request Timeout: The destination IP/hostname or website did not respond. They
could be due to a number of reasons such as; the device does not exist, is not
powered on or is configure not to reply to ping requests. You can create a rule in
windows firewall to stop you PC/Laptop from replying to Pings. Some websites or
online resources do this via a commercial firewall so that hacker cannot target their
systems. If a device does not respond to ping then a hack may pressure that the IP
address / hostname they are pinging does not exist and they may move on till they
find something that does so that they can then start targeting attacks to that IP
address.
WIRELESS LAN TESTING
It is important to conduct wireless LAN (WLAN) testing to ensure your system meets security
and performance requirements. Since there are various factors at play when it comes to
WLAN testing, careful planning and documentation of a WLAN test are as important as
the testing itself.
Wireless LAN Testing Considerations
✓ Signal coverage testing: Signal coverage testing determines where client
devices are able to satisfy coverage requirements. This testing may be part of
performing a WLAN site survey or done after the network is installed to
determine the as-installed signal coverage.
✓ Performance testing: Performance testing determines whether the WLAN can
satisfy user needs for using specific applications over the WLAN.
✓ In-motion testing: In-motion testing determines whether users can continue to
make use of applications while roaming throughout the coverage areas,
especially when the roaming requires handoffs between access points.
✓ Security vulnerability testing: Security vulnerability testing ensures that the
WLAN implements required security mechanisms and offers sufficient protection
to unauthorized access and passive monitoring.
✓ Acceptance/verification testing: After installing a WLAN, it is important to run a
series of acceptance/verification tests to ensure that the WLAN satisfies all
requirements. This is especially important if the organization is having a
contractor install the WLAN.
✓ Simulation testing: In some cases, such as when implementing a very large
WLAN, it may be beneficial to simulate the behavior of the WLAN before actually
installing it. This can provide helpful feedback when designing the system,
especially if the WLAN will have critical performance requirements.
✓ Prototype testing: Prototype testing involves implementing an individual
function of the WLAN that is not well understood before deploying the complete
system. For example, an organization may not be very familiar with 802.1X
7. 4 | P a g e
authentication systems and may benefit by implementing the 802.1X
authentication in a lab environment with a limited number of test client devices.
✓ Pilot testing: Before installing the WLAN across the entire organization, which
may include numerous buildings and different applications, it is strongly
advisable to install the system in a limited number of facilities (ideally one) and
make that one work effectively first. After you work out all the problems, you can
install the WLAN at the remaining location without the need for extensive rework
because the problems will likely have been solved during the pilot testing.
DEVICE SYSTEM SETTINGS CONFIGURATION
Important: Please note that all network devices are different and as such may require
different configuration steps. This document contains a step-by-step process for
configuring TP-Link wireless device. If you have a new, in-the-box TP-Link device, this
guide is for you.
Please connect a computer to TP-Link router by cable or through wireless network. It’s
recommended to
configure it by a wired
connection.
Log into the router’s
web-based utility
To get some help,
please refer to your
previous topic
on “How to log into
the web-based
Utility (Management
Page) of TP-Link wireless router”.
When you login for tplink WiFi Device, you can easily manage some
wireless settings for your devices. Using “System Tools”
configurations for tplink router devices, you can manage some
advance settings like time settings, diagnostics, firmware upgrade,
factory default, backup and restore, reboot, password and system log
settings for tplink router devices.
TIME Settings
This page allows you to set the time manually or to configure automatic time
synchronization. The Router can automatically update the time from an NTP
server via the Internet.
8. 5 | P a g e
Time Zone - Select your local time zone from this
pull-down list.
To set time manually:
1. Select your local time zone.
2. Enter the Date.
3. Enter the Time.
4. Click Save.
For automatic time synchronization:
1. Enter the address or domain of the NTP
Server 1 or NTP Server 2.
2. Click the Get GMT button to get GMT
from the Internet.
To set up daylight saving:
1. Select the Enable Daylight
Saving checkbox to enable daylight
saving function.
2. Select the correct Start time and End time of daylight saving range.
3. Click Save.
Diagnostic
The diagnostic tools (Ping and
Traceroute) allow you to check the
connections of your network components.
• Ping - This diagnostic tool troubleshoots
connectivity, reachability, and name
resolution to a given host or gateway by
using the Internet Control Message
Protocol (ICMP) protocol's mandatory
Echo Request datagram to elicit an
ICMP Echo Response from a host or
gateway.
• Traceroute - This diagnostic tool
determines the path taken to a given
host by sending Internet Control
Message Protocol (ICMP) Echo Request messages with varying Time to Live (TTL) values to
the destination
Firmware Upgrade - To upgrade the device's firmware.
Firmware Version - Displays the current firmware version.
Hardware Version - Displays the current hardware version. The hardware version of the
upgrade file must accord with the current hardware version.
Factory Defaults
Click the Restore button to reset all configuration settings to their default values.
Note: All changed settings will be lost when defaults are restored.
Backup & Restore
Click the Backup button to save all configuration settings to your local computer as a file.
Reboot
Click the Reboot button to reboot the device. Some settings of the device will take effect
only after rebooting.
9. 6 | P a g e
Password
It is strongly recommended that you change the factory default user name and password
of the device. All users who try to access the device's web-based utility will be prompted
for the device's user name and password.
System Log
Log Type - By selecting the log type, only logs of this type will be shown.
Log Level - By selecting the log level, only logs of this level will be shown.
Refresh - Refresh the page to show the latest log list.
Clear Log - All the logs will be deleted from the device permanently, not just from the page.
Save Log - Click to save all the logs in a txt file.
Log Settings - Click to set the logs in the screen.
• Save Locally - If Save Locally is selected, events will be recorded in the local
memory.
• Minimum Level - Select the Minimum level in the drop-down list, for the Minimum
Level, all logged events above or equal to the selected level will
be displayed.
• Save Remotely - If Save Remotely is selected, events will be sent to the specified
IP address and UDP port of the remote system log server.
Statistics Help - The Statistics page shows the network traffic of each PC on the LAN, including
total traffic and the value of the last Packets Statistic interval in seconds.
LOCAL AREA NETWORK (LAN) PORT CONFIGURATION
Configuring the IP parameters of Local Area Network (LAN) port.
• MAC Address - The physical address of the LAN ports, as seen from the LAN.
The value cannot be changed.
• IP Address - Enter the IP address of your Device in dotted-decimal notation
(factory default - 192.168.0.1).
• Subnet Mask - An address code that determines the size of the network. Usually
it is 255.255.255.0.
Note:
1. If you change the IP address, you must use the new IP address to login to the Device.
10. 7 | P a g e
2. If the new LAN IP address you set is not in the same subnet with the previous one, the IP
Address pool in the DHCP server will be configured automatically, but the Virtual Server
and DMZ Host will not take effect until they are re-configured
WIDE AREA NETWORK (WAN) PORT CONFIGURATION
WAN Connection Type:
✓ If your ISP is running a DHCP server, select the Dynamic IP option.
✓ If your ISP provides a static or fixed IP Address, Subnet Mask, Gateway and
DNS setting, select the Static IP option.
✓ If your ISP provides a PPPoE connection, select PPPoE option.
✓ If your ISP provides BigPond Cable (or Heart Beat Signal) connection,
please select BigPond Cable option.
✓ If your ISP provides L2TP connection, please select L2TP option.
✓ If your ISP provides PPTP connection, please select PPTP option.
If you don't know how to choose the appropriate connection type, click the Detect button
to allow the Router to automatically search your Internet connection for servers and
protocols. The connection type will be reported when an active Internet service is
successfully detected by the Router. This report is for your reference only. To make sure
the connection type your ISP provides, please refer to the ISP. The various types of
Internet connections that the Router can detect are as follows:
o PPPoE - Connections which use PPPoE that requires a user name and password.
o Dynamic IP - Connections which use dynamic IP address assignment.
o Static IP - Connections which use static IP address assignment.
IP Address - The IP address assigned by your ISP dynamically.
Subnet Mask - The subnet mask assigned by your ISP dynamically.
Default Gateway - The default gateway assigned dynamically by your ISP.
Click the Renew button to renew the IP parameters from your ISP.
Static IP Setting
Connection Type
Options
11. 8 | P a g e
Click the Release button to release the IP parameters from your ISP.
MTU Size (in bytes) - The normal MTU (Maximum Transmission Unit) value for most Ethernet
networks is 1500 Bytes. For some ISPs you need to modify the MTU. But this is
rarely required, and should not be done unless you are sure it is necessary for your
ISP connection.
If your ISP gives you one or two DNS IP addresses, select Set DNS server manually and enter
the DNS Server and Secondary DNS Server into the correct fields. Otherwise,
the DNS servers will be assigned from ISP dynamically.
Primary DNS - Enter the DNS IP address in dotted-decimal notation provided by your ISP.
Secondary DNS - Enter another DNS IP address in dotted-decimal notation provided by your
ISP.
Note: If you get Address not found error when you access a Web site, it is likely that your DNS
servers are set up improperly. You should contact your ISP to get DNS server
addresses.
Host Name - This option specifies the Host Name of the Router.
Get IP with Unicast - A few ISPs' DHCP servers do not support the broadcast applications. If
you can't get the IP Address normally, you can choose Unicast. (You generally
need not to check this option).
Click the Save button to save your settings.
2. Exercises / Activities
2.1 Multiple Choice. Encircle the correct answer from the given choices below.
1) What is the correct sequence in opening command line or DOS interface so
that you can run a network connectivity testing tool?
a. Press Ctrl key + R, type CMD then press enter key
b. Press Windows key + E, type CMD then press enter key
c. Press Windows key + R, type CALC then press enter key
d. Press Windows Key + R, type CMD then press enter key
2) The correct syntax for ping tool command is _________.
a. c:>ping google
b. c:>ping yahoo
c. c:>ping 10.10.10.2
d. c:>none of the above
3) Testing that determines where client devices are able to satisfy coverage
requirements is __________.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
4) It is strongly advisable to install the system in a limited number of facilities and make
that one work effectively first.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
5) Determines whether users can continue to make use of applications while moving
throughout the coverage areas.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
6) This can provide helpful feedback when designing the system, especially if the WLAN
will have critical performance requirements
12. 9 | P a g e
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
7) Which part of system tools allows you to check the connections of your network
components.
a. Factory Defaults c. Diagnostic
b. Back-up and Restore d. Firmware upgrade
8) Which type of WAN Connection that requires a username and password?
a. Dynamic IP c. Static IP
b. PPPoE d. L2TP
9) The diagnostic tool which troubleshoots connectivity, reachability and name resolution
to a given host or gateway by using the Internet Control Message Protocol (ICMP)
protocol's mandatory Echo Request datagram to elicit an ICMP Echo Response from a
host or gateway.
a. Traceroute c. ipconfig
b. NSLookup d. ping
10) An address code that determines the size of the network.
a. Subnet Mask c. MAC Address
b. IP Address d. None of the above.
2.2 Using your Mobile Phone or Computer (if available), open the browser (Mozilla
Firefox or google chrome) and open the link provided. Watch the YouTube video of
configuring LAN and WAN ports of a wireless device.
http://bit.do/csslanwan
2.3 Using the same procedure as in 2.2 open the link provided below and practice
configuring LAN and WAN of a wireless device.
http://bit.do/cssrouteremulator
1. Guide Questions
a. Based on activities 2.2 and 2.3, differentiate LAN port configuration from
WAN port configuration.
b. Network connectivity testing is one of the important things to consider in
network design implementation.
i. What is the name of network connectivity testing tool previously
discussed?
ii. Which portion of a router / network device can this tool also be found?
13. 10 | P a g e
iii. What if the result of connectivity testing is 100% Loss? Explain.
2.5 Scoring Rubric
Needs
Improvement
3Pt
Approaching
standards
5Pts
Good
7Pts
Excellent
10Pts
Ideas and
Content
There is no
clear or
specific
explanation
in answer to
the question.
You put
thought into
this, but
there is no
real evidence
of learning.
More specific
information
is needed or
you need to
follow the
directions
more closely.
What you are writing
about is clear. You
answered the question.
Some support may be
lacking, or your
sentences may be a bit
awkward. Overall, a
decent job.
What you are writing
about is clear and
well-expressed,
including specific
examples to
demonstrate what
you learned. Well
done!
Use of
terms
No terms
from the
lesson are
used.
Only one
term from
the lesson is
used in the
answer. Try
for a few
more, next
time.
Your answer included
several terms from the
lesson, demonstrating
adequate understanding
of the material.
Your answer
included all the
terms from the
lesson that applied
to the question
asked. All terms are
fully defined and
used in the proper
context.
Sentence
Fluency
Sentences
are
incomplete or
too long. It
makes
reading them
difficult.
Some
sentences
are complete
and easy to
understand.
Others
require some
work.
Sentences are complete
and able to be
understood.
Sentences are
complete and they
connect to one
another easily when
they are read out
loud. Your writing
'flows.'
Conventions
Few end
marks or
capital
letters.
Answers
contain
numerous
spelling or
structural
errors.
Mistakes
using end
marks or
capitals as
well as
spelling
mistakes
make the
writing hard
to read.
Use of punctuation
marks and capitals, as
well as spelling, is mostly
correct. Few errors exist
in your answer.
No punctuation or
structural mistakes.
No spelling errors.
Your writing shows
full awareness of the
rules of English use.
14. 11 | P a g e
2. Reflection
Latency and ping are often used interchangeably, although they are subtly
different. While ping refers to the signal sent from the device to the server,
latency is the time it takes for the ping to return to the device. The unit used to
measure latency is milliseconds or ms.
In online gaming, lag is a noticeable delay (latency) between the action
of players (input) and the reaction of the server supporting the game( like LoL,
ML, Dota 2), which has to be sent back to the client.
In your personal use of computer or mobile phones while connecting to the
internet or playing online games, did you experience high latency or Lag? (You
may use a separate sheet of paper for your answer.
What do you think are the causes of that lag?
What did you do?
You are allowed to express your answer in English, Filipino or Mother Tongue.
3. Answer Key
Multiple
Choice
1.
d
2.
c
3.
b
4.
d
5.
a
6.
c
7.
c
8.
b
9.
d
10.
a