This document provides instructions for setting up a network connection by installing a Network Interface Card (NIC) and connecting devices with Ethernet cables. It is meant for students learning about computer networks. The document explains how to insert a NIC into an expansion slot and install the proper drivers. It also describes how to crimp Ethernet cables by stripping them, arranging the wire order, cutting the wires at an angle, inserting them into connectors, and using a tester to check continuity. The goal is to teach students how to install a NIC, crimp straight cables to connect devices through a hub, and test that the network connection is configured correctly.
This document provides instructions for setting up network facilities, including installing a network interface card, crimping and testing straight and crossed Ethernet cables, and installing NIC drivers. It is intended for students taking an ICT elective course and includes step-by-step guides, requirements, and assessments.
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
This document provides a learning module on computer security. It discusses topics like antivirus software, anti-spyware, cryptography, and data backup. The module is intended for ICT students and others interested in learning about computer security. It explains security threats like viruses and spyware, and teaches methods to identify and address these threats, including using antivirus and anti-spyware software to scan for and remove infections. It also covers cryptography techniques for securing communications and the importance of regularly backing up files to external storage devices to prevent data loss.
Learning area 3_-_computer_networks_and_communicationsSaktis Kesavan
This document provides instructions for setting up a network connection by installing a Network Interface Card (NIC) and crimping cables. It is intended for students learning about computer networks. The document explains how to insert a NIC into an expansion slot and install the proper drivers. It also describes how to crimp both ends of a straight cable by inserting wires into RJ45 connectors according to the 568B standard wiring schematic and then testing the cable for continuity. Completing these tasks will allow students to install a NIC, crimp cables, and set up a basic network.
Psychology powe point adolescence and adulthoodMrTimBradley
Here are the 5 stages of grief according to Kubler-Ross:
1. Denial - This is a temporary defense for the individual. It helps to cushion the initial shock of grieving or facing a difficult change.
2. Anger - As the denial starts to fade, feelings of anger, resentment, and even envy often emerge. Individuals may be angry with themselves, God, or even the deceased.
3. Bargaining - In this stage, individuals try to negotiate to avoid or postpone the inevitable change or loss. They often bargain in vain to try to prolong the life or relationship.
4. Depression - Feelings of sadness, regret, despair and loneliness sink in as the loss
This document provides an overview of the foundations and early influences that shaped the development of psychology. It discusses key figures like Wundt, James, Freud, and Skinner who established schools of thought in structuralism, functionalism, psychoanalysis, and behaviorism. The document also outlines the major perspectives that currently characterize the field, including psychodynamic, behavioral, cognitive, humanistic, biological, evolutionary, sociocultural, and biopsychosocial approaches. Each perspective focuses on different aspects of behavior and mental processes, from unconscious desires to learning and environment to biology and culture.
This document provides an overview of key concepts in early childhood development psychology. It discusses the roles of nature and nurture in child development and covers topics like reflexes, critical periods, attachment theory, parenting styles, cognitive development theories from Piaget and Kohlberg, and more. The document is a study guide for an exam on early childhood psychology with vocabulary definitions, summaries of theories and studies, discussion questions, and activities to help students learn and apply the concepts.
This document provides an overview of the first unit in a sociology course. It includes information about the first day of class procedures and an outline of topics to be covered in Unit 1. The unit will focus on examining social life, the development of sociology, modern sociological perspectives, and conducting sociological research. Students will learn about the origins of sociology, the three major theoretical perspectives (functionalism, conflict theory, and symbolic interactionism), and how sociological research follows the scientific method and ethical guidelines.
This document provides an overview of the expectations and content for a psychology unit on foundations and research. It outlines the following key points:
1. The first section discusses course expectations like attendance, procedures, and syllabus.
2. Unit 1 will cover the discipline of psychology, its foundations and perspectives, modern perspectives, and conducting psychological research. It will require students to define key concepts and describe perspectives, research methods, and ethics.
3. The document then provides details on specific concepts, vocabulary, activities, and assignments that will be covered for each topic. This includes outlining perspectives, designing experiments, identifying variables, and analyzing ethical issues.
4. Research methods are a core focus. Students are
This document provides instructions for setting up network facilities, including installing a network interface card, crimping and testing straight and crossed Ethernet cables, and installing NIC drivers. It is intended for students taking an ICT elective course and includes step-by-step guides, requirements, and assessments.
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
This document provides a learning module on computer security. It discusses topics like antivirus software, anti-spyware, cryptography, and data backup. The module is intended for ICT students and others interested in learning about computer security. It explains security threats like viruses and spyware, and teaches methods to identify and address these threats, including using antivirus and anti-spyware software to scan for and remove infections. It also covers cryptography techniques for securing communications and the importance of regularly backing up files to external storage devices to prevent data loss.
Learning area 3_-_computer_networks_and_communicationsSaktis Kesavan
This document provides instructions for setting up a network connection by installing a Network Interface Card (NIC) and crimping cables. It is intended for students learning about computer networks. The document explains how to insert a NIC into an expansion slot and install the proper drivers. It also describes how to crimp both ends of a straight cable by inserting wires into RJ45 connectors according to the 568B standard wiring schematic and then testing the cable for continuity. Completing these tasks will allow students to install a NIC, crimp cables, and set up a basic network.
Psychology powe point adolescence and adulthoodMrTimBradley
Here are the 5 stages of grief according to Kubler-Ross:
1. Denial - This is a temporary defense for the individual. It helps to cushion the initial shock of grieving or facing a difficult change.
2. Anger - As the denial starts to fade, feelings of anger, resentment, and even envy often emerge. Individuals may be angry with themselves, God, or even the deceased.
3. Bargaining - In this stage, individuals try to negotiate to avoid or postpone the inevitable change or loss. They often bargain in vain to try to prolong the life or relationship.
4. Depression - Feelings of sadness, regret, despair and loneliness sink in as the loss
This document provides an overview of the foundations and early influences that shaped the development of psychology. It discusses key figures like Wundt, James, Freud, and Skinner who established schools of thought in structuralism, functionalism, psychoanalysis, and behaviorism. The document also outlines the major perspectives that currently characterize the field, including psychodynamic, behavioral, cognitive, humanistic, biological, evolutionary, sociocultural, and biopsychosocial approaches. Each perspective focuses on different aspects of behavior and mental processes, from unconscious desires to learning and environment to biology and culture.
This document provides an overview of key concepts in early childhood development psychology. It discusses the roles of nature and nurture in child development and covers topics like reflexes, critical periods, attachment theory, parenting styles, cognitive development theories from Piaget and Kohlberg, and more. The document is a study guide for an exam on early childhood psychology with vocabulary definitions, summaries of theories and studies, discussion questions, and activities to help students learn and apply the concepts.
This document provides an overview of the first unit in a sociology course. It includes information about the first day of class procedures and an outline of topics to be covered in Unit 1. The unit will focus on examining social life, the development of sociology, modern sociological perspectives, and conducting sociological research. Students will learn about the origins of sociology, the three major theoretical perspectives (functionalism, conflict theory, and symbolic interactionism), and how sociological research follows the scientific method and ethical guidelines.
This document provides an overview of the expectations and content for a psychology unit on foundations and research. It outlines the following key points:
1. The first section discusses course expectations like attendance, procedures, and syllabus.
2. Unit 1 will cover the discipline of psychology, its foundations and perspectives, modern perspectives, and conducting psychological research. It will require students to define key concepts and describe perspectives, research methods, and ethics.
3. The document then provides details on specific concepts, vocabulary, activities, and assignments that will be covered for each topic. This includes outlining perspectives, designing experiments, identifying variables, and analyzing ethical issues.
4. Research methods are a core focus. Students are
This document provides an overview of the brain and biological psychology. It begins with an introduction to the major parts of the brain including structures like the cerebrum, cerebellum, hypothalamus, and amygdala. Later lessons discuss the lobes of the cerebral cortex, split brain research, neurons, and neurotransmitters. It also distinguishes between the nervous and endocrine systems. The document aims to explain how biological processes and systems impact human behavior.
This document provides an overview of the first unit of a sociology course. It includes:
- An introduction to examining social life, including defining sociology and differentiating it from other social sciences.
- An outline of the development of sociology from the 17th-19th centuries in Europe in response to industrialization and other social changes. Key early theorists who contributed to the field are identified.
- An introduction to the three major theoretical perspectives in sociology - functionalism, conflict theory, and symbolic interactionism - and how they differ in their levels of analysis.
- An overview of how sociological research is conducted scientifically, using methods like surveys, observation, and experiments while following ethical standards
Social psychology is the study of how individuals are influenced and affected by groups. It focuses on how social forces like groups, social roles, and norms impact human behavior and cognition. Some key findings include that the presence of others can both positively and negatively influence performance, and that people frequently conform to group norms and opinions even if they conflict with their own views. Individuals are also susceptible to persuasion techniques due to factors like authority, reciprocity, commitment, social proof, and likability of the source.
This document outlines a psychology unit plan on Carl Jung and gender, including lessons on personality testing, archetypes, the individuation process, and how gender affects behavior. Students will learn Jungian concepts, take online personality tests, analyze stories and media through a Jungian lens, and discuss topics like gender roles, stereotypes, and differences. The goal is for students to understand psychodynamic theories, personality assessment techniques, self-concept, and how archetypes and gender influence perceptions and behavior.
Sociology Unit 3 Individual within SocietyMrTimBradley
This document provides an overview of Unit 3 in a sociology course, which examines how society shapes the individual. The unit covers theories of personality development, socialization agents, adolescence and dating, social control and deviance, work, and adult development stages. Students are expected to understand and apply concepts related to these topics, such as nature versus nurture, socialization theories, dating patterns, deviance perspectives, changes in the workforce, and Levinson's adult development stages.
Societies progress from hunter-gatherer and pastoral societies in preindustrial times, to agricultural societies where animals are used for farming and surpluses support larger, permanent settlements. Industrialization shifts the focus to manufactured goods in factories, dividing labor into specialized tasks and bringing people into cities for work. Currently, postindustrial societies focus on service and information industries as technology continues to change the nature of work.
Sociology Unit 4 Social Institutions Power PointMrTimBradley
The document provides an outline for a sociology unit on social institutions. It begins by covering the topic of family, defining family and describing family functions like socialization and reproduction. It discusses changing family patterns in the US like dual-earner families. It then moves to the topic of education, explaining sociological perspectives on how education affects social values and norms. It provides context on religious definitions and the functions of religion before concluding with an introduction to the topic of the economy.
This document provides an overview of Unit 5 in a sociology course, which examines how social stratification, gender, age, race, and ethnicity contribute to social inequality. It outlines topics that will be covered such as social stratification systems, poverty, race/ethnicity, gender, age, and examines related concepts like discrimination, prejudice, and minority group treatment. Students are expected to understand how these various factors shape social structure and influence human interaction and opportunities.
This document provides an overview of key concepts related to memory, cognition, and language. It discusses the main components of memory including encoding, storage and retrieval. It also explains different memory systems like sensory memory, short-term memory and long-term memory. For cognition, it defines concepts and prototypes, and discusses problem solving techniques like algorithms and heuristics. It also covers biases and errors in judgment. For language, it defines key linguistic elements and outlines theories of language acquisition from infancy through childhood.
Human children are able to learn through observation alone without direct reinforcement or punishment, while chimpanzees require direct experience (reinforcement or punishment) to learn.
This document provides an overview of the nervous system, brain structures and functions, neurotransmitters, and brain imaging techniques relevant to biopsychology. It defines key terms like the central nervous system, somatic nervous system, autonomic nervous system, sympathetic and parasympathetic divisions. Structures of the brain like the cerebrum, cerebellum, hypothalamus, amygdala and their functions are described. The roles of neurotransmitters such as dopamine, serotonin, acetylcholine and endorphins are explained. Different brain imaging techniques including EEG, PET, CT, MRI and fMRI are also introduced.
Psychology Memory and Learning Power PointMrTimBradley
This document provides an overview of memory and learning concepts. It discusses the three stages of memory (encoding, storage, and retrieval). It describes the different types of memory like sensory memory, short-term memory, and long-term memory. It also discusses how learning occurs through classical and operant conditioning, and how cognitive factors like latent learning, cognitive maps, insight, learned helplessness, and observational learning impact the learning process. Key terms and concepts related to memory and different types of learning are defined and explained with examples.
The document describes experiments conducted using Cisco Packet Tracer software to simulate and test different computer network topologies. It includes 15 experiments covering topics like connecting devices using hubs and switches, implementing bus, star, ring, tree and hybrid topologies, creating local and wireless networks, and connecting multiple networks using routers. Each experiment lists the aim, steps to set up the topology, and provides a brief explanation of the networking concepts tested.
This document provides a network requirement analysis and plan for Affinity Living Communities. It includes an IP address table, network topology diagram, and outcomes of the designed network. The network topology was developed using Cisco Packet Tracer and includes routers, switches, wireless routers, and a firewall. The network was configured and tested to provide residents with reliable and secure internet access across multiple locations. The design is scalable but limitations include potential single point of failures and costs of future expansion.
The document provides information on setting up computer networks, including:
- The materials, tools, and equipment needed to install Ethernet cables and create a computer network include cables, connectors, a router, wireless access point, internet connection, firewall, and potentially a network server.
- Common network equipment includes Ethernet cables for wired connections, network sockets, routers to direct network traffic and provide internet access via wired or wireless connections, and wireless access points to extend the wireless network coverage provided by the router.
- Additional details are provided on selecting cables, installing network sockets, the functions of routers, and using wireless connectivity via the router's Wi-Fi capabilities.
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdfHaseebAli795005
This document provides instructions for building a simple network in Cisco Packet Tracer, including adding devices, configuring the devices with IP addresses, creating wireless access, and testing connectivity. The network consists of a PC, wireless router, cable modem, internet cloud, Cisco server, and laptop. The devices are configured, the laptop connects to the wireless network, and ping tests verify connectivity between the PC and Cisco server. Once completed, the network configuration is saved as a Packet Tracer activity file.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
An expansion card, also known as an adapter card or add-on card, is a printed circuit board that can be inserted into an expansion slot on a computer motherboard. This provides additional capabilities to the computer, such as enhanced graphics via a video or graphics card. Common types of expansion cards include network interface cards, sound cards, and video cards. To install an expansion card, one must open the computer case, find an empty expansion slot, insert the card and secure it with a screw.
manual on networking cabling with pratical guideNuhuSamaila
1. Configure the IP addresses of the client computers to be in the same subnet as the host computer sharing the internet connection. 2. Use ping and tracert commands on the client computers to test connectivity to the host and internet gateway. 3. Use ipconfig to view and confirm TCP/IP settings like IP addresses, subnet masks, and default gateways on all computers match the LAN configuration.
Students will first study basic networking commands like ping and tracert using Command Prompt to test network connectivity. They will then configure the network settings of both a host computer and client computers to share an internet connection on the LAN. The host will be configured to act as a DHCP server to automatically assign IP addresses to connected clients. Students will use networking configuration commands to set the host IP as 192.168.0.1 and enable internet connection sharing.
This document provides an overview of the brain and biological psychology. It begins with an introduction to the major parts of the brain including structures like the cerebrum, cerebellum, hypothalamus, and amygdala. Later lessons discuss the lobes of the cerebral cortex, split brain research, neurons, and neurotransmitters. It also distinguishes between the nervous and endocrine systems. The document aims to explain how biological processes and systems impact human behavior.
This document provides an overview of the first unit of a sociology course. It includes:
- An introduction to examining social life, including defining sociology and differentiating it from other social sciences.
- An outline of the development of sociology from the 17th-19th centuries in Europe in response to industrialization and other social changes. Key early theorists who contributed to the field are identified.
- An introduction to the three major theoretical perspectives in sociology - functionalism, conflict theory, and symbolic interactionism - and how they differ in their levels of analysis.
- An overview of how sociological research is conducted scientifically, using methods like surveys, observation, and experiments while following ethical standards
Social psychology is the study of how individuals are influenced and affected by groups. It focuses on how social forces like groups, social roles, and norms impact human behavior and cognition. Some key findings include that the presence of others can both positively and negatively influence performance, and that people frequently conform to group norms and opinions even if they conflict with their own views. Individuals are also susceptible to persuasion techniques due to factors like authority, reciprocity, commitment, social proof, and likability of the source.
This document outlines a psychology unit plan on Carl Jung and gender, including lessons on personality testing, archetypes, the individuation process, and how gender affects behavior. Students will learn Jungian concepts, take online personality tests, analyze stories and media through a Jungian lens, and discuss topics like gender roles, stereotypes, and differences. The goal is for students to understand psychodynamic theories, personality assessment techniques, self-concept, and how archetypes and gender influence perceptions and behavior.
Sociology Unit 3 Individual within SocietyMrTimBradley
This document provides an overview of Unit 3 in a sociology course, which examines how society shapes the individual. The unit covers theories of personality development, socialization agents, adolescence and dating, social control and deviance, work, and adult development stages. Students are expected to understand and apply concepts related to these topics, such as nature versus nurture, socialization theories, dating patterns, deviance perspectives, changes in the workforce, and Levinson's adult development stages.
Societies progress from hunter-gatherer and pastoral societies in preindustrial times, to agricultural societies where animals are used for farming and surpluses support larger, permanent settlements. Industrialization shifts the focus to manufactured goods in factories, dividing labor into specialized tasks and bringing people into cities for work. Currently, postindustrial societies focus on service and information industries as technology continues to change the nature of work.
Sociology Unit 4 Social Institutions Power PointMrTimBradley
The document provides an outline for a sociology unit on social institutions. It begins by covering the topic of family, defining family and describing family functions like socialization and reproduction. It discusses changing family patterns in the US like dual-earner families. It then moves to the topic of education, explaining sociological perspectives on how education affects social values and norms. It provides context on religious definitions and the functions of religion before concluding with an introduction to the topic of the economy.
This document provides an overview of Unit 5 in a sociology course, which examines how social stratification, gender, age, race, and ethnicity contribute to social inequality. It outlines topics that will be covered such as social stratification systems, poverty, race/ethnicity, gender, age, and examines related concepts like discrimination, prejudice, and minority group treatment. Students are expected to understand how these various factors shape social structure and influence human interaction and opportunities.
This document provides an overview of key concepts related to memory, cognition, and language. It discusses the main components of memory including encoding, storage and retrieval. It also explains different memory systems like sensory memory, short-term memory and long-term memory. For cognition, it defines concepts and prototypes, and discusses problem solving techniques like algorithms and heuristics. It also covers biases and errors in judgment. For language, it defines key linguistic elements and outlines theories of language acquisition from infancy through childhood.
Human children are able to learn through observation alone without direct reinforcement or punishment, while chimpanzees require direct experience (reinforcement or punishment) to learn.
This document provides an overview of the nervous system, brain structures and functions, neurotransmitters, and brain imaging techniques relevant to biopsychology. It defines key terms like the central nervous system, somatic nervous system, autonomic nervous system, sympathetic and parasympathetic divisions. Structures of the brain like the cerebrum, cerebellum, hypothalamus, amygdala and their functions are described. The roles of neurotransmitters such as dopamine, serotonin, acetylcholine and endorphins are explained. Different brain imaging techniques including EEG, PET, CT, MRI and fMRI are also introduced.
Psychology Memory and Learning Power PointMrTimBradley
This document provides an overview of memory and learning concepts. It discusses the three stages of memory (encoding, storage, and retrieval). It describes the different types of memory like sensory memory, short-term memory, and long-term memory. It also discusses how learning occurs through classical and operant conditioning, and how cognitive factors like latent learning, cognitive maps, insight, learned helplessness, and observational learning impact the learning process. Key terms and concepts related to memory and different types of learning are defined and explained with examples.
The document describes experiments conducted using Cisco Packet Tracer software to simulate and test different computer network topologies. It includes 15 experiments covering topics like connecting devices using hubs and switches, implementing bus, star, ring, tree and hybrid topologies, creating local and wireless networks, and connecting multiple networks using routers. Each experiment lists the aim, steps to set up the topology, and provides a brief explanation of the networking concepts tested.
This document provides a network requirement analysis and plan for Affinity Living Communities. It includes an IP address table, network topology diagram, and outcomes of the designed network. The network topology was developed using Cisco Packet Tracer and includes routers, switches, wireless routers, and a firewall. The network was configured and tested to provide residents with reliable and secure internet access across multiple locations. The design is scalable but limitations include potential single point of failures and costs of future expansion.
The document provides information on setting up computer networks, including:
- The materials, tools, and equipment needed to install Ethernet cables and create a computer network include cables, connectors, a router, wireless access point, internet connection, firewall, and potentially a network server.
- Common network equipment includes Ethernet cables for wired connections, network sockets, routers to direct network traffic and provide internet access via wired or wireless connections, and wireless access points to extend the wireless network coverage provided by the router.
- Additional details are provided on selecting cables, installing network sockets, the functions of routers, and using wireless connectivity via the router's Wi-Fi capabilities.
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdfHaseebAli795005
This document provides instructions for building a simple network in Cisco Packet Tracer, including adding devices, configuring the devices with IP addresses, creating wireless access, and testing connectivity. The network consists of a PC, wireless router, cable modem, internet cloud, Cisco server, and laptop. The devices are configured, the laptop connects to the wireless network, and ping tests verify connectivity between the PC and Cisco server. Once completed, the network configuration is saved as a Packet Tracer activity file.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
An expansion card, also known as an adapter card or add-on card, is a printed circuit board that can be inserted into an expansion slot on a computer motherboard. This provides additional capabilities to the computer, such as enhanced graphics via a video or graphics card. Common types of expansion cards include network interface cards, sound cards, and video cards. To install an expansion card, one must open the computer case, find an empty expansion slot, insert the card and secure it with a screw.
manual on networking cabling with pratical guideNuhuSamaila
1. Configure the IP addresses of the client computers to be in the same subnet as the host computer sharing the internet connection. 2. Use ping and tracert commands on the client computers to test connectivity to the host and internet gateway. 3. Use ipconfig to view and confirm TCP/IP settings like IP addresses, subnet masks, and default gateways on all computers match the LAN configuration.
Students will first study basic networking commands like ping and tracert using Command Prompt to test network connectivity. They will then configure the network settings of both a host computer and client computers to share an internet connection on the LAN. The host will be configured to act as a DHCP server to automatically assign IP addresses to connected clients. Students will use networking configuration commands to set the host IP as 192.168.0.1 and enable internet connection sharing.
Data Communications and Net-Centric computingKomalah Nair
This document provides a network proposal for an exhibition at a university campus. It includes:
1) A basic network diagram showing fiber optic cabling connecting various network devices using MT-RJ and ST connectors.
2) Descriptions of network cards, wireless receivers, and video cards to enable device connectivity.
3) Details of network equipment like routers, switches, and wireless access points.
4) Recommendation that a star topology is most suitable given its advantages like ease of adding/removing devices and fault detection.
This document outlines an internship report for an internship completed at the Advanced Vocational Training Centre (AVTC) in Limbe, Cameroon. Over the course of 8 weeks, the intern learned skills including assembling and disassembling computers, building network cables, network configuration using Cisco Packet Tracer, troubleshooting laptop issues, resetting passwords, graphic design, computer security, and database management. The internship provided beneficial work experience and mentorship. Challenges included electricity outages and limited workspace, but the intern recommends the program and suggests obtaining a generator.
The document describes a minor project report on creating a LAN network with redundancy that was completed by two students for their B-Tech degree. It outlines the background, methodology, requirements, and results of designing a network topology on GNS3 using routing protocols, VPN, NAT, firewalls, and Cisco phones to provide redundancy. The project implemented Cisco ASA, MPLS routing, and other protocols to create a secure and reliable network connecting different office locations.
This lab manual provides instructions for a Computer Network lab course. The course aims to provide hands-on networking experience. Students will experiment with networking topics like IP addressing, routing protocols, and network troubleshooting using tools like ping and traceroute. Students will also learn network modeling and simulation using software like Packet Tracer. The manual outlines 9 experiments that cover topics such as network cabling, network devices, IP configuration, basic network commands, and configuring network topologies in Packet Tracer using different routing protocols.
This lab manual provides instructions for a Computer Network lab course. The course aims to provide hands-on networking experience. Students will experiment with networking topics like IP addressing, routing protocols, and network troubleshooting using tools like ping and traceroute. Students will also learn about network modeling and simulation using software like Packet Tracer. The manual outlines 9 experiments that involve studying network devices, IP addressing, connecting computers to a LAN, networking commands, and configuring network topologies using Packet Tracer.
Dell Vostro 7570 là dòng laptop gaming được Dell thiết kế nhằm mục đích chinh phục nhóm khách hàng là game thủ nghiệp dư và chuyên nghiệp. Vì vậy, máy đặc biệt được chú trọng về yếu tố cấu hình và độ phân giải.
Nguồn: https://laptops.vn/san-pham/dell-vostro-7570/
The document provides instructions for installing and configuring the IEEE 802.11a/n Wireless Outdoor CPE. It covers preparing for installation, connecting the hardware, mounting the CPE on a pole, and configuring the device for either AP mode or CPE mode. The installation requires connecting an Ethernet cable and power adapter, attaching optional external antennas, and accessing the web interface using the default IP and credentials. Configuration involves setting wireless parameters and security settings depending on whether the CPE is used as an access point or client.
IRJET- Implementation and Simulation of Failsafe Network ArchitectureIRJET Journal
This document describes the implementation and simulation of a fail-safe network architecture using OMNeT++. It discusses ring and star topologies and proposes a hybrid StRing topology. It outlines building the network architectures in OMNeT++, including defining NED files to describe the topology, configuring ini files, declaring packages, and writing C++ programs. It provides an example of simulating a ring topology in OMNeT++ by defining the NED file to connect computers in a ring, configuring packages and ini files, and providing C++ source code for the computer modules.
The document provides information about experimenting with RJ45 and Cat6 cabling using a crimping tool. It discusses the specifications of CAT6 cable and how it is an improved standard over previous categories. It also describes how to properly crimp RJ45 connectors onto cable and defines the straight-through and crossover wiring configurations. The document further explains how to install and use Cisco Packet Tracer for network simulations.
1. (TCO A) A ___ defines the format and the order of messages exchanged between 2 or more communicating entities.
2. (TCO A) While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?
3. (TCO A) Which of the following is not true about ISO:
4. (TCO A) What are the two fundamental approaches to moving data through a network of links and
Similar to Learning area 3_-_computer_networks_and_communications (1) (20)
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Learning area 3_-_computer_networks_and_communications (1)
1.
2. 1. What is it?
This is a learning module for a specific Learning Outcome as stipulated in the
Curriculum Specifications that is :
€ 3.4 Setting Network Facilities
2. Who is it for?
This module is for students who are taking the ICT subject as their elective
and for those who are interested in ICT.
3. What can be achieved?
Upon completion of this module, you will be able to :
€ install Network Interface Card (NIC).
€ crimp and test straight cable and crossed cable.
€ configure and test network.
€ communicate and share data through network.
4. Is previous knowledge necessary?
Yes. Before using this module, you should have learnt about basic concept of
a computer network, hardware requirements and software requirements.
3. Learning Module: Computer Networks
www.ppk.kpm.my < 1 >
TOPIC: 3.4 SETTING NETWORK FACILITIES
DURATION: 12 periods
REFERENCES
A. Books:
Gary B. Shelly, Thomas J. Cashman, Misty E. Vermaat (2006), “Discovering
Computers 2006: A Gateway To Information”, Thomson Course Technology
Tamara Dean (2006), “Network + Guide to Networks”, Thomson Course Technology
B. Website addresses:
http://myschoolnet.ppk.kpm.my
http://www.lanshack.com
http://www.homenethelp.com
http://www.crossover.asp
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharing.mspx
4. Learning Module: Computer Networks
www.ppk.kpm.my < 2 >
THINGS YOU NEED TO KNOW
Table 1: 568B Wiring Schematic
Table 2: 568A Wiring Schematic
Pair Wire Pin Diagrams
White/Blue 5
White/Blue
Blue 4
White/Orange 1
White/Orange
Orange 2
White/Green 3
White/Green
Green 6
White/Brown 7
White/Brown
Brown 8
Pair Wire Pin Diagrams
White/Blue 5
White/Blue
Blue 4
White/ Green 1
White/Green
Green 2
White/Orange 3
White/Orange
Orange 6
White/Brown 7
White/Brown
Brown 8
1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8
1
2 3 4 5 6
7
8
1
2
3 4 5 6
7
8
Notes:
1. For patch cables, 568B wiring is the most common schematic.
2. There is no difference in connectivity between 568B and 568A cables. Both
wiring should work fine on any system.
3. For straight through cable, both ends use the same wiring schematics
(568B wiring schematic is recommended).
4. For a crossover cable, both ends use different wiring schematics.
5. Learning Module: Computer Networks
www.ppk.kpm.my < 3 >
THINGS YOU NEED TO HAVE
HARDWARE
Requirements Sample
1 Network Interface Card (NIC)
2 NIC driver
3 Switch / Hub
4 CAT5E cable (UTP cable)
5 RJ45 connectors
7. Learning Module: Computer Networks
www.ppk.kpm.my < 5 >
INSTALLATION OF NETWORK INTERFACE CARDS (NIC)
LEARNING OUTCOME: 3.4.1.1 Insert Network Interface Cards (NIC)
3.4.1.2 Install drivers for the NIC
DURATION: 2 periods
REQUIREMENTS: Network Interface Card (NIC)
NIC driver
Screwdriver
In this module you will learn how to install Peripheral Component Interconnect
(PCI) Network Interface Card into a personal computer (PC) and install the
driver for the card.
8. Learning Module: Computer Networks
www.ppk.kpm.my < 6 >
ACTIVITIES:
A ) INSERT NETWORK INTERFACE CARDS (NIC)
1. Turn off the PC and unplug the power cable. It is to
neutralize any static electric in PC.
2. Remove the casing of the PC.
3. Locate an empty PCI bus expansion slot in the
motherboard.
4. Remove a back panel plate that corresponds to the
expansion slot.
Back panel
plate
PCI bus expansion
slot
9. Learning Module: Computer Networks
www.ppk.kpm.my < 7 >
5. Insert the NIC into the empty PCI bus expansion slot.
Make sure the NIC is inserted properly and levelled.
6. Screw the NIC to back panel.
7. Reaffix the casing of the PC.
B) INSTALL DRIVERS FOR THE NIC
PART 1 : Check for installed NIC
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
Windows XP will automatically detect and install most network interface card
drivers, so your drivers are already installed. You can check whether the driver
has been installed or not, using the method below.
11. Learning Module: Computer Networks
www.ppk.kpm.my < 9 >
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
5. Your NIC should be listed under Connect Using. Figure 5 showing a NIC is
already installed.
Figure 5
12. Learning Module: Computer Networks
www.ppk.kpm.my < 10 >
6. If the driver is already installed, skip Part 2 and you are ready for the assessment.
7. If there is no network card listed, click Cancel and start Part 2 to install the driver
manually.
PART 2 : Install Drivers For Windows XP
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
14. Learning Module: Computer Networks
www.ppk.kpm.my < 12 >
4. Click Next to start the installation of the NIC driver (Figure 4).
Figure 4
5. A window searching for new hardware will appear (Figure 5).
Figure 5
15. Learning Module: Computer Networks
www.ppk.kpm.my < 13 >
6. Check Yes, I have already connected the hardware and click Next
(Figure 6).
Figure 6
7. Scroll down and highlight Add a new hardware device. Click Next (Figure 7).
Figure 7
16. Learning Module: Computer Networks
www.ppk.kpm.my < 14 >
8. Check Install the hardware that I manually select from a list (Advanced) and
click Next (Figure 8).
Figure 8
9. Scroll down and highlight Network adapters. Click Next. (Figure 9).
Figure 9
17. Learning Module: Computer Networks
www.ppk.kpm.my < 15 >
10. Insert the floppy disk or CD-ROM which contains the driver and click Have
Disk (Figure 10).
Figure 10
11. Click Browse (Figure 11).
Figure 11
18. Learning Module: Computer Networks
www.ppk.kpm.my < 16 >
12. A Locate File window appears (Figure 12).
Figure 12
13. In Look in pull down menu, choose a device contains the driver and click it.
Figure 13 showing CD Drive(E:) as an example.
Figure 13
19. Learning Module: Computer Networks
www.ppk.kpm.my < 17 >
14. Highlight corresponding file and click Open. Figure 14 shows winxp as an
example.
Figure 14
15. Click Next (Figure 15).
Figure 15
20. Learning Module: Computer Networks
www.ppk.kpm.my < 18 >
16. Click Finish (Figure 16).
Figure 16
17. Click Yes to restart your computer and to complete your driver installation
(Figure 17).
Figure 17
21. Learning Module: Computer Networks
www.ppk.kpm.my < 19 >
ASSESSMENT:
1. Why do we need to turn off the PC and unplug the power cable before we start
installing the network card?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2. Mark T for True statements and F for False statements.
_________ - a. NIC driver is only available in CD.
_________ - b. A back panel plate that corresponds to the expansion slot has to be
removed before inserting the NIC in your PC.
_________ - c. The common protocol used in Network that supports Internet is
TCP/IP.
_________ - d. The NIC driver should be preinstalled before inserting NIC in your
PC.
2. Explain briefly the steps to install the NIC driver in your PC.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
22. Learning Module: Computer Networks
www.ppk.kpm.my < 20 >
CABLE CRIMPING AND TESTING – STRAIGHT CABLE
LEARNING OUTCOME: 3.4.2.1 Crimp and test Untwisted Pair (UTP) cable using
straight cable technique
3.4.2.2 Exercise care and caution when crimping a cable
DURATION: 2 periods
REQUIREMENTS: CAT5E cable (3 meters)
RJ45 connectors (2 units)
Crimp tool
Cable stripper
Wire cutter
LAN cable tester
NOTE :
A cable is needed to connect a computer to a wired local area network (LAN).
There are two types of cables. The first is the “straight cable” which is used to
connect computers through a hub. The second type is the “crossed cable” for
a direct connection between two computers without using a hub. Connecting
these cables is called cable crimping. This module shows how to crimp a
straight cable using Untwisted Pair cable and RJ45 connectors.
23. Learning Module: Computer Networks
www.ppk.kpm.my < 21 >
ACTIVITIES:
1. Skin off the cable jacket approximately 3cm by using a
cable stripper.
2. Untwist each pair, and straighten each wire between
fingers.
3. Place the wires in the order of 568B schematic (refer
to Table 1 on page 3). Connect all the wires together.
4. At this point, recheck the wiring sequence with the
diagram.
5. Optional: Mark a distance of 1.5cm from the end of the
cable jacket on the wires.
6. Hold the set and sorted wires together tightly, between
the thumb, and the pointer finger.
7. Cut all the wires at 90o
angle from the cable at 1.5cm
from the end of the cable jacket by using a wire cutter.
This is a very critical step. If the wires are not cut
straight, they may not make contact with the connector
pins.
8. Conductors should be at a 90o
angle, and be 1.5cm
long, prior to insertion into the connector.
9. Insert the wires into the RJ45 connector with the pins
facing up.
24. Learning Module: Computer Networks
www.ppk.kpm.my < 22 >
10.Push moderately to assure that all wires have
reached the end of the connector. Be sure that the
cable jacket goes into the back of the connector at
0.3cm.
11.Place the connector into a crimp tool, and squeeze
hard so that the handle reaches its full swing.
12.Repeat step 1 to 11 for the other end of the cable.
13.Use a cable tester to test for proper continuity.
25. Learning Module: Computer Networks
www.ppk.kpm.my < 23 >
Assessment:
1. Table below is 568B wiring schematic for a Local Area Network.
Identify the pin numbers of W, X, Y and Z.
W X Y Z
A 1 5 2 7
B 5 1 2 7
C 2 7 1 5
D 5 1 7 2
Pair Wire Pin
White/Blue W
White/Blue
Blue 4
White/Orange X
White/Orange
Orange Y
White/Green 3
White/Green
Green 6
White/Brown Z
White/Brown
Brown 8
26. Learning Module: Computer Networks
www.ppk.kpm.my < 24 >
CABLE CRIMPING AND TESTING – CROSSED CABLE
LEARNING OUTCOME: 3.4.2.1 Crimp and test Untwisted Pair (UTP) cable using
crossed cable technique
3.4.2.2 Exercise care and caution when crimping a cable
DURATION: 2 periods
REQUIREMENTS: CAT5E cable (3 meters)
RJ45 connectors (2 units)
Crimp tool
Cable stripper
Wire cutter
LAN cable tester
NOTE :
27. Learning Module: Computer Networks
www.ppk.kpm.my < 25 >
ACTIVITIES:
1. Skin off the cable jacket approximately 3cm by using a
cable stripper.
2. Untwist each pair, and straighten each wire between
fingers.
3. Place the wires in the order of 568A schematic (refer
to Table 2 on page3). Connect all the wires together.
4. At this point, recheck the wiring sequence with the
diagram.
5. Optional: Mark a distance of 1.5cm from the end of the
cable jacket on the wires.
6. Hold the set and sorted wires together tightly, between
the thumb, and the pointer finger.
7. Cut all the wires at 90o
angle from the cable at 1.5cm
from the end of the cable jacket by using a wire cutter.
This is a very critical step. If the wires are not cut
straight, they may not make contact with the connector
pins.
8. Conductors should be at a 90o
angle, and be 1.5cm
long, prior to insertion into the connector.
9. Insert the wires into the RJ45 connector with the pins
facing up.
28. Learning Module: Computer Networks
www.ppk.kpm.my < 26 >
10.Push moderately to assure that all wires have reached
the end of the connector. Be sure that the cable jacket
goes into the back of the connector at 0.3cm.
11.Place the connector into a crimp tool, and squeeze
hard so that the handle reaches its full swing.
12.Repeat step 1 to 11 for the other end of the cable by
placing wires in the order of 568B schematic.
13.Use a cable tester to test for proper continuity.
29. Learning Module: Computer Networks
www.ppk.kpm.my < 27 >
ASSESSMENT:
1. Choose the correct pair of cabling that is used for direct connection from PC to PC.
A B C
2. What type of cable is used to connect two computers?
_________________________________________________________________
_________________________________________________________________
3. What is the requirement needed to crimp a crossed cable?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8 1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8 1
2
3 4 5 6
7
8
1
2
3 4 5 6
7
8
30. Learning Module: Computer Networks
www.ppk.kpm.my < 28 >
3.4.3 CONFIGURATION AND TESTING OF NETWORK
LEARNING OUTCOME: 3.4.3.1 Configure the workstation to join a Local Area
Network
€ Internet Protocol (IP) Address
€ Subnet Mask
€ Server name
3.4.3.2 Test the network connection.
DURATION: 4 periods
REQUIREMENTS: -
31. Learning Module: Computer Networks
www.ppk.kpm.my < 29 >
ACTIVITIES:
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
2. Click Network and Internet Connections (Figure 2).
Figure 2
32. Learning Module: Computer Networks
www.ppk.kpm.my < 30 >
3. Click Network Connections (Figure 3).
Figure 3
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
34. Learning Module: Computer Networks
www.ppk.kpm.my < 32 >
7. Check ‘Use the following IP address’. Fill in the network information for:
i. IP address
ii. Subnet Mask
iii. Default Gateway (only if available)
iv. Preferred DNS server (only if available)
Use the network information given by your teacher. Figure 7 is an example of IP
address. Click OK.
Figure 7
8. Close all windows. You must restart your computer before the settings take effect.
Given by
teacher
35. Learning Module: Computer Networks
www.ppk.kpm.my < 33 >
ASSESSMENT:
1. IP is an acronym for
______________________________________________________________
______________________________________________________________
2. If your IP is 192.168.1.28, then the default setting for the subnet mask is
______. 255. ______. ______.
3. If your network is not working, list out the possible problems.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
36. Learning Module: Computer Networks
www.ppk.kpm.my < 34 >
3.4.4 Communicating and Data Sharing
LEARNING OUTCOME: 3.4.4.1 Create a shared folder
DURATION: 2 periods
REQUIREMENTS: -
37. Learning Module: Computer Networks
www.ppk.kpm.my < 35 >
ACTIVITIES:
A ) SETTING PROPERTIES FOR DATA SHARING
1. Click Start, then go to Settings. Click Control Panel (Figure 1).
Figure 1
2. Click Network and Internet Connections (Figure 2).
Figure 2
38. Learning Module: Computer Networks
www.ppk.kpm.my < 36 >
3. Click Network Connections (Figure 3).
Figure 3
4. Highlight Local Area Connection icon. Go to File menu. Click Properties.
(Figure 4).
Figure 4
39. Learning Module: Computer Networks
www.ppk.kpm.my < 37 >
5. Check Client for Microsoft Networks and File and Printer Sharing for
Microsoft Networks. These items are checked by default (Figure 5). Click
Close.
Figure 5
6. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 6).
Figure 6
40. Learning Module: Computer Networks
www.ppk.kpm.my < 38 >
7. My Documents window appears. Highlight My Pictures folder. Go to File menu.
Click Sharing and Security (Figure 7).
Figure 7
8. Click Network Setup Wizard (Figure 8).
Figure 8
42. Learning Module: Computer Networks
www.ppk.kpm.my < 40 >
11. If the PC is not connected to a network, windows shown in Figure 11 will pop-
up. Check Ignore disconnected network hardware and click Next.
Figure 11
12. Check ‘This computer connects to the Internet through another computer
on my network or through a residential gateway’ and click Next (Figure 12).
Figure 12
43. Learning Module: Computer Networks
www.ppk.kpm.my < 41 >
13. Check ‘Determine the appropriate connections for me (Recommended)’ and
click Next (Figure 13).
Figure 13
14. Fill in:
i. Computer description
ii. Computer Name
Use the information given by your teacher. Figure 14 is an example windows and
click Next
Figure 14
Given by
teacher
45. Learning Module: Computer Networks
www.ppk.kpm.my < 43 >
17. A window configures your computer for networking will appear (Figure 17).
Figure 17
18. Check Just finish the wizard; I don’t need to run the wizard on other
computers and click Next (Figure 18).
Figure 18
47. Learning Module: Computer Networks
www.ppk.kpm.my < 45 >
B ) CREATING SHARED DRIVE
1. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 1).
Figure 1
2. My Documents window appears (Figure 2).
Figure 2
48. Learning Module: Computer Networks
www.ppk.kpm.my < 46 >
3. Click My Computer (Figure 3).
Figure 3
4. Highlight Local Disk (C:) icon. Go to File menu. Click Sharing and Security
(Figure 4).
Figure 4
49. Learning Module: Computer Networks
www.ppk.kpm.my < 47 >
5. Click If you understand the risk but still want to share the root of the drive,
click here (Figure 5).
Figure 5
6. Check Share this folder on the network and click Apply (Figure 6).
Figure 6
50. Learning Module: Computer Networks
www.ppk.kpm.my < 48 >
7. Figure 7 shows an example of a shared drive.
Figure 7
C ) ACCESSING SHARED DRIVE
1. Click Start, then go to All Programs. Next, click Accessories. Click Windows
Explorer (Figure 1).
Figure 1
51. Learning Module: Computer Networks
www.ppk.kpm.my < 49 >
2. Click My Network Places then Entire Network. Next, click Microsoft Windows
Network and finally Mshome (Figure 2). All the computers connected to the
network are shown on the right side of the window.
Figure 2
3. Click any computers listed. Figure 3 shows School Computer Lab (Pc01)
selected. Now you can access drive C: of Pc01.
Figure 3
Computers connected to
the network
52. Learning Module: Computer Networks
www.ppk.kpm.my < 50 >
ASSESSMENT:
1. Read the statement below, tick (•) if TRUE and cross (x) if FALSE.
No Statement (€) or (x)
1.
The user cannot set password protection on their shared files
or folders.
2.
We can enable file sharing and disable printer sharing at the
same time.
3.
We can allow or deny a user access to our shared files
whenever we want.
4.
To change access permissions you must be the owner, or
have been granted permission to do so by the owner.
CONGRATULATIONS !!
YOU HAVE SUCCESSFULLY COMPLETED THIS MODULE. YOU ARE NOW
ABLE TO SET NETWORK FACILITIES AND COMMUNICATE AND SHARE DATA
THROUGH THE NETWORK.