Capstone Final 1
Capstone Final 1
Introduction
1
high computer laboratory using a LAN and
wireless bridge. This will allow for easier
communication between the principal's office
and the computer laboratory, for facilitating
administrative tasks and improving the overall
efficiency of the school.
2
basic introduction of Local Area Networks
(LANs). The author does not provide a detailed
discussion of this section since it is not the
scope of the paper and also because a detailed
description could have taken a highly
technical nature. Secondly, the paper deals
with the application of LANs in libraries with
some examples from the applications in
developed countries. Finally, the barriers
which we, the developing countries, encounter
in the application of LANs in our libraries
are outlined. Although Local Area Networks
have been in existence for some time, their
use is fairly recent in the field of
libraries. The initiative steps were taken by
the American and British libraries. By taking
their applications as examples, we can make an
attempt to adopt this interesting technology
in our libraries too. The following sections
will describe how LANs can be used in a
library environment. LANs can be utilized in
the library for educational purposes too.
Aston University has made plans for two types
of services. (Brindley, 1987). They were going
to provide an on-line database advisory with
trained staff for users engaged in a remote
database search and secondly, they were having
plans to run tutorial classes in on-line
3
searching simultaneously in different
locations. In this manner their users will
have a better understanding of the electronic
media with which they have to interact in the
library. Staff time and money will be saved by
providing training for a larger group of
students simultaneously. Computer conferencing
which uses several remote computers attached
to a network to conduct a conference without
the actual gathering of participants to a
single venue, is another application of LANs
which could provide a sophisticated service
for the future library users. The LAN
installation in the Department of Information,
University of Strathclyde has been employed to
carry out an experiment on computer
conferencing and the author asserts that,
despite the ergonomic and technical problems,
computer conferencing and electronic journal
production have considerable potential and
appeal (Baird, 1987).
4
interconnects locally managed. For example,
here I have taken two IP from different
network. First IP is 192.168.1.100 from
192.168.1.0 network and another IP
192.168.2.100 from 192.168.2.0 network. Now
these I cannot ping each other using hub or
switch because they belong to two different
networks.
Connecting Local Area Network (LAN) using
Router:
5
Research on Application of Wireless Bridge
Technology in the Smart Grid January 2022
6
Implementation of Local Area Network (LAN) &
Build a Secure LAN System for BAEC Head
Quarter
7
and received. LAN is only one type of computer
network. LAN define is Data Com System
allowing a number of independent devices to
communicate directly with each other, within a
moderately sized geographic area over a
physical communications channel of moderate
data rates. Fiber-optic communication is a
method of transmitting information from one
place to another by sending pulses of infrared
light through an optical fiber. The light is a
form of carrier wave that is modulated to
carry information. Fiber is preferred over
electrical cabling when high bandwidth, long
distance, or immunity to electromagnetic
interference is required. This type of
communication can transmit voice, video, and
telemetry through local area networks or
across long distances. Optical fiber is used
by many telecommunications companies to
transmit telephone signals, Internet
communication, and cable television signals.
Researchers at Bell Labs have reached a record
bandwidth distance product of over 100 petabit
× kilometers per second using fiber optic
communication. Communication between remote
parties can be achieved through a process
called Networking, involving the connection of
computers, media and networking devices. When
8
we talk about networks, we need to keep in
mind three concepts, distributed processing,
network criteria and network structure. The
purpose of this Network is to design a Local
Area Network (LAN) for a BAEC (Bangladesh
Atomic Energy Commission) Head Quarter and
implement security measures to protect network
resources and system services. To do so, we
will deal with the physical and logical design
of a LAN. The goal of this Network is to
examine of the Local Area Network set up for a
BAEC HQ and build a secure LAN system.
Implementation of Local Area Network (LAN) &
Build a Secure LAN System for BAEC Head
Quarter DOI:
9
technology. This paper presents an algorithm
to improve the Primary Signal 5G (or PS5G)
sensing at 60 GHz in WLANIoT-5G (or Wireless
Local Area Network for IoT-5G). To achieve
that, we aim at investigating and assessing
the sensing performances of the PS5G from the
Access Point of WLANIoT-5G (or APWLANIoT-5G)
by the Secondary User IoT-5G (or SUIoT-5G) in
a congested environment using a simple energy
detector (or SED) algorithm and a simple
recursive estimator (or SRE). In addition, the
SUIoT-5G is regarded as a mobile user in
WLANIoT-5G by employing the Gauss-Markov
Random Mobility Model (or GMRMM). Through
various scenario simulations, the performances
and the robustness of the proposed algorithm
are proved.
10
measurement system to monitor the bridge
health condition in real-time, which achieves
wireless connectivity for communication.
Meanwhile, a self-sustained power supply is
designed based on a solar photovoltaic (PV)
system, removing the conventional power cables
or the frequent battery replacement operation,
which reduces the installation and maintenance
cost and enables a long-term 24 hours ×7 days
uninterrupted operation. The detailed power
supply design procedure is provided, including
the selection of the solar panel and battery,
as well as the design of the dc-dc converter
for the constant-current (CC) and constant-
voltage (CV) charging of a lithium battery.
Experiments validate the effectiveness of the
developed wireless bridge deformation
monitoring system and the designed power
supply. It is shown that without using the PV
system, the bridge deformation monitoring
system can last for 24 days, which helps the
system to survive extreme weather conditions.
With the help of the PV system, the battery is
always maintained at a fully charged
condition, validating the self-sustainability
of the designed power supply.
11
According to Li Hui (University of
Lousiana at Lafayette)`Traditional bridge
monitoring systems often require wired
connections between sensors, a data
acquisition system, and data center. The use
of extension wires, conduits, and other costly
accessories can dramatically increase the
total cost of bridge monitoring. With the
development of wireless technologies and the
notable cost benefits, many researchers have
been integrating wireless networks into bridge
monitoring system. In this study, a wireless
bridge monitoring system has been developed
based on the Sub-1 GHz network. The main
functional components of this system include
sensors, wireless nodes, and gateway and data
center. Wireless nodes can convert analog
signals obtained from the sensors to digital
signals, then transmit the collected data to
the gateway using the Sub-1 GHz network. The
gateway receives and sorts data from different
wireless nodes and then forwards these data to
the data center wirelessly. All collected data
are processed in the data center using the
data processing software developed in this
study. In order to validate the performance of
the wireless system developed in this study, a
steel girder bridge was monitored in the field
12
during the concrete deck construction. The
field results were also compared with the
theoretical values obtained from finite
element models to ensure the accuracy and
reliability of the wireless system. The
results indicate that the wireless bridge
monitoring system developed in this study is
effective and affordable. The Sub-1 GHz
network can be a better solution for bridges
with complicated site conditions because of
the extended data transmission distance.
Although the power consumption can be
controlled by using low-power consumption
components, including the power control in
software design can also dramatically reduce
the system’s power consumption.
13
signals to reach far clients also wireless
bridge, is used where we want to bridge two
different networks (two diff APs). Leggs
(2019) stated that, A LAN to LAN is called a
Bridge Network. "A network bridge joins two
otherwise separate computer networks to enable
communication between them and allow them to
work as a single network. Bridges are used
with local area networks to extend their reach
to cover larger physical areas than the LAN
can otherwise reach. In the same research that
conducted by Walker (2004), what you are
describing is a "wireless bridge". A wireless
bridge device connects to your Wi-Fi network,
and then allows wired devices to connect to
the bridge. Since the wireless bridge device
is acting as a client, it should not have its
own SSID. Some wireless routers have a
"wireless bridge" mode so that you don't need
a separate type of device.
14
network into segments. Each segment represents
a unique collision domain, so the number of
clashes on the network is reduced. Each clash
domain has its own unique bandwidth. Thus, a
bridge can improve the overall performance of
the data link layer or the OSI open system
interconnection model. From multiple network
segments, a network bridge creates a single
aggregate network. There exists both wired and
wireless bridging. If one or more segments of
a bridged network are wireless, then the
contrivance is known as a wireless bridge.
McCullough 2019 said that a bridge allows
separate networks to connect, like Wi-Fi to
Ethernet or Wi-Fi to Bluetooth, etc. Wireless
Bridging: Essential for Business Wi-Fi
Networks Homekit offers tado, which looks like
a Bluetooth manual valve for a radiator. I
think I would stick with something approved
for Homekit how does tado work with Apple
Homekit? I think they use Bluetooth Low Energy
because that way there isn't a need for wired
power for Wi-Fi at the valve (just 2 AA
batteries). Thus, the need for their Wi-Fi to
Bluetooth Bridge.
15
Design of Wireless Computer Network
Infrastructure in Implementation of
Kemendikbud Distributed Information Systems in
Singingi Kuantan Islamic University
16
In carrying out the process of analyzing and
designing Sister's computer network
infrastructure using the Network Development
Life Cycle (NDLC) Method. Lecturers and
several stakeholders at the Kuantan Singingi
Islamic University psd Sister in developing
Computer Network Infrastructure are very
supportive of integrating all existing
buildings in the UNIKS environment for the
purposes of Lecturer Certification carried out
at the Ministry of Education and Culture
SISTER.
17
also discussed. Keywords Local Area Network
(LAN) IEEE 802 standards Carrier Sense
Multiple Access with Collision Avoidance
(CSMA/CA) Medium access control (MAC)
18
infrastructure, making them a cost-effective
solution for network expansion. They also
provide greater flexibility and mobility
compared to wired networks, as devices can be
connected to the bridge wirelessly (Yadav et
al., 2020).
19
119(18), 2325-2332. However, there are some
potential drawbacks to using a wireless
bridge. One of the main concerns is security,
as wireless signals can be intercepted or
hacked. Proper security measures should be
implemented to protect the networks and data
being transmitted (Sathyanarayanan et al.,
2018).
20
effectiveness of P2P sharing in benefiting
both prosumers and the grid has been
demonstrated in many studies and pilot
projects.
21
Deep Reinforcement Learning-Based Channel
Allocation for Wireless LANs With Graph
Convolutional Networks
22
be repeatedly observed in WLAN channel
allocation problems, the duplication of
experiences must be avoided. The simulation
results demonstrate that the proposed method
enables the allocation of channels in densely
deployed WLANs such that the system throughput
increases. Moreover, improved channel
allocation, compared to other existing
methods, is achieved in terms of the system
throughput. Furthermore, compared to the
immediate reward maximization method, the
proposed method successfully achieves greater
reward channel allocation or realizes the
optimal channel allocation while reducing the
number of changes.
23
group of devices. The established solution
utilizes assignment of the server and client
role to devices in the set. The server deploys
temporary network so the user device can
access it and enter necessary information
about network to connect to. Communication
mechanisms within customer's network for
device set have been also considered. Using
proposed models, customer can control device
set, send and receive data (particular case
for audio data is considered), update firmware
and resources of devices directly from his/her
own device via specially designed software. We
have used set of ESP8266 boards and NodeMCU
firmware to implement and test the developed
model. The developed prototype system is able
to receive configuration of the user network,
receive audio data from client device and play
audio. This proof-of-concept system can be
further extended for the new functionality.
24
quickly became the standard technology for
connecting computers, smartphones, and tablets
to the Internet. This chapter looks at this
system, which was standardized by the
Institute of Electrical and Electronics
Engineers in the 802.11 specification. It
describes the fundamentals of the technology,
which have changed little since the beginning.
The chapter describes the evolutionary steps
that were taken over time to increase
transmission speeds. One of the main
applications of a WLAN network is access to a
local network and the Internet. For this
purpose, the infrastructure basic service set
mode is much more suitable than the previously
described ad hoc mode. Another WLAN mode is
wireless bridging, sometimes also referred to
as a wireless distribution system.
25
latest version of the wireless LAN (WLAN)
standard that is currently being adopted, and
it promises to deliver very high throughput
(VHT), operating at the 5 GHz band. In this
paper, we report on an implementation of
802.11ac wireless LAN for residential scenario
based on the 802.11ax task group scenario
document. We evaluate the 802.11ac protocol
performance under different operating
conditions. Key features such as modulation
coding set (MCS), frame aggregation, and
multiple-input multiple-output (MIMO) were
investigated. We also evaluate the average
throughput, delay, jitter, optimum range for
good put, and effect of station (STA) density
per access point (AP) in a network. ns-3, an
open source network simulator with features
supporting 802.11ac, was used to perform the
simulation. Results obtained indicate that
very high data rates are achievable. The
highest data rate, the best mean delay, and
mean jitter are possible under combined
features of 802.11ac (MIMO and A-MPDU).
14CITATIONS14 total citations on Dimensions.
26
Wireless LAN Performance Enhancement Using
Double Deep Q-Networks
27
the TRAIN procedure for the proposed
algorithm. The final phase begins after the
training, defined by a time duration specified
by the user. Now, the agent is fully trained,
and no updates will be no longer received. Now
the CW is updated via the OPTIMIZE process of
DCWO. We have selected total network
throughput, instantaneous network throughput,
fairness index, and cumulative reward, and
compared our proposed scheme DCWO with the
Centralized Contention window Optimization
with DRL (CCOD). Simulation results show that
DCWO with Double Deep Q-Networks (DDQN)
performs better than CCOD with (i) Deep
Deterministic Policy Gradient (DDPG) and (ii)
Deep Q-Network (DQN). More specifically, DCWO
with DDQN gives on average 28% and 23% higher
network throughput than CCOD in static and
dynamic scenarios. Whereas in terms of
instantaneous network throughput DCWO gives
around 10% better results than the CCOD. DCWO
achieves almost near to optimal fairness in
static scenarios and better than DQN and DDPG
with CCOD in dynamic scenarios. Similarly,
while the cumulative reward achieved by DCWO
is almost the same with CCOD with DDPG, the
uptrend of DCWO is still encouraging.
28
Pre-computer Lab Monitoring System
29
Comparative performance evaluation of computer
network cables for Local Area Network (LAN)
30
is the set of rules governing the flow of
information among the connected workstation.
The speed at which data are transmitted is
dependent on the type of cable used. This
analysis measures the performance speed of
these cables by considering their file sizes
as well as their download time. The file size
was measured in bytes and the time measured in
seconds. Different speeds were obtained for
coaxial cable, unshielded twisted pair cable
and the optical fibre cable. This was achieved
by connecting each of the cables to the
internet via a network switch and then to a
computer system. The timing for download
sessions was taken for file sizes of different
volume and quality of each of the cable size.
The plaintext, unshielded twisted pair cable
was faster than that of optical fiber cable
and much faster than that of coaxial cable.
Also, for heavy files, such as stationary
pictures and videos, optical fiber cable is
much faster than unshielded pair cable and
coaxial cable. From these, it is therefore
seen that optical fiber cable is most
preferable for a Local Area Network compared
to the other two cables.
31
Related Studies
32
workstation computers, 2 printers, RJ45,
Unshielded Twisted Pair (UTP) cables. All the
data, transaction and information in the
branch will go from the workstations through
the bridge antenna and the bridge antenna will
pass the data to the other bridge antenna of
the other office of Novo Cabanatuan and Novo
Guimba. The network designers' goal is to
create a network design that will connect the
Novo Cabanatuan and Novo Guimba. To help the
clients to easily have a transaction to the
office near them are some of the goals of this
capstone project.
33
Enterprise Resource Plan using Wireless bridge
connection at the Rizal Municipal Hall and
Barangay General Luna
34
administrators of Aliaga in Nueva Ecija
because they have determined that there is a
need for the enterprise to build a network
design to maximize the use of their computer
units. This project which is designing a Local
Area Network and Bridge Network in the
Municipal Hall will have emerged as one of the
most effective means of communication among
the personnel of the Municipal Hall in Aliaga,
Nueva Ecija and the residents of the most
farfetched barangays. This project will
install a server for local file sharing
between computers in the different offices.
The proponents used the Network development
Life Cycle (NDIC) as the guide in creating
this capstone project. They followed the six
phases of NDIC and came up with a reliable
network design. The network design 1s consists
of 3 computers units, 1 server, 3 printers, 3
routers, 4 bridge antennas and 50m UTP cable,
1 box of RJ45.
35
Conceptual Framework
Feedback
36
Luis Natonal High School (JOLNHS) of Sagaba,
Sto. Domingo is connected using Local Area
Network and Wireless Bridge and the outcome
will be quick data transmission, work with
software programs, complete assignments,
creating word documents and share files.
1.1 analysis;
1.2 design;
1.3 simulation prototyping;
1.4 implementation;
1.5 monitoring; and
1.6 management?
37
Scope and Delimitations
38
Figure 2 shows, the School of Julia Ortiz
Luis National High School (JOLNHS) in Sagaba,
Sto. Domingo, Nueva Ecija.
39
Figure 4 shows, the image of the
Principal’s Office of Julia Ortiz Luis
National High School (JOLNHS) in Sagaba, Sto.
Domingo, Nueva Ecija.
40
Principal’s Secretary. This will benefit the
principal’s secretary to save time and
increase productivity.
Definition of terms
41
the latest wireless technology, such as
printers, wired computers, TVs, Blu-ray Disc™
players, game consoles, and even network-
attached storage wireless.
CHAPTER II
42
METHODOLOGY
Research Design
43
Project Locale
44
Figure 6. Senior High Computer Laboratory
45
This figure is the Principal’s Office,
which will serve as the computer laboratory
internet connection. The researchers will
connect the principal’s office and computer
laboratory using a wireless bridge. The
Principal’s Office is located at the opposite
building of the computer laboratory.
Research Respondents
46
including network configurations and
connectivity.
47
Data Collection
Research Instruments
Planning
48
Maintenance Analysis
Figure 8. Network Development Life Cycle
Planning Phase
49
Figure 9: Interview with the Principal of
Julia Ortiz Luis National High School (JOLNHS)
Analysis Phase
Design Phase
50
Figure 10. Physical Network Design
Simulation Phase
51
This is an essential phase where network
designers create a virtual or test
environments to model and validate the network
design. This helps to identify potential
issues and ensures that the network will
perform as expected.
Implementation Phase
52
energy, and teamwork in creating their
questionnaire. A combination of appropriate
questions adapted from previous studies and
original questions developed by the network
designers were used to produce the survey.
After giving the participants a chance to
answer, the network designers collected the
survey forms the following working day.
According to the frequency of items checked by
the participants, the data collected from this
research instrument were added up and computed
for interpretation.
Data Analysis
53
Disagree
CHAPTER III
54
monitoring, and ongoing maintenance, each with
its own set of tasks and goals. This lifecycle
framework helps organizations build and manage
their networks efficiently and adapt to
changing requirements over time.
1. Planning
55
1.2 Analysis
56
Physical Layout
57
Logical Layout
58
List of Specification
DEVICE SPECIFICATION
Desktop Computer -Dell 3000 i3847-
5847BK Desktop
Computer
3.2 GHz Intel Core
i5-4460 CPU
8GB 1600MHz DDR3 RAM
1TB 7200 rpm Hard
Drive
Integrated Intel HD
Graphics
SuperMulti DVD Burner
802.11b/g/n Wi-Fi
Bluetooth 4.0
Integrated 5.1 Audio
8-in-1 Reader
2 x USB 3.0, 6 x USB
2.0 Ports
Windows 7 Pro (64 -
bit)
59
Table 3. Switch Specifications
DEVICE SPECIFICATION
Switch D-Link 16-Port Gigabit
Unmanaged Desktop
Switch
1000Base-T Interface 16
Auto MDI/MDIX
32 Gbps switching
capacity
23.81 Mpps Max Packet
Forwarding Rate
280 x 125 x 44m
Dimension
Weight 1.023 kg
0-40C storage
temperature
0%-95% RH storage
humidity
10.07W Maximum Power
Consumption
Power Input 100-240V AC
Packet Buffer Size
512Kbytes
fan less.
60
Table 4. Unshielded Twisted Pair (UTP Cable)
Specification
DEVICE SPECIFICATION
UTP Cable Cat5e with
bandwidth of
100MHz
Speed 1000Mbps
1GBASE-T 1Gigabit
Ethernet
Copper wire with 4
twisted pairs
61
Table 5. RJ45 Specifications
DEVICE SPECIFICATION
RJ45 Connector Type- RJ45
Cable type- Ethernet
Compatible devices-
personal computer
Color- UTP-Cat 6-
Transparent Brand -
cable creation
62
DEVICE SPECIFICATION
Router TP-Link Archer AX10
comes equipped with
latest wireless
technology, Wi-Fi 6, for
faster speeds, greater
capacity and reduced
network congestion.2.6
Next-Gen 1.5 Gbps Speeds-
Archer AX10 dual-band
router reaches fast
speeds up to 1.5
Gbps( 1201 Mbps on 5 GHz
band and 300 Mbps on 2.4
GHz band)1 connect more
devices than ever before
–Wi-Fi 6 technology
simultaneously
communicates more data to
more devices using OFDMA
and MU-MIMO while
reducing lag. 3.5 Triple-
Core Processing-The 1.5
GHz tri-core processor
ensures communications
between your router and
all connected devices are
smooth and buffer-free.
More reliable Coverage-
Achieve the strongest,
most reliable Wi-Fi
coverage with Archer AX10
as it focuses signal
strength to your devices
using Beamforming
technology and 4
antennas.
63
switched computer networks. It is placed at
the senior high computer laboratory in Julia
Ortiz Luis National High School (JOLNHS).
DEVICE SPECIFICATION
Power Over Ethernet POE Power Over
Ethernet
Output overcurrent
Protect (single
circuit):500Ma
Overvoltage Protect:
Input Voltage gt;240V
AC Under voltage
Recovery Point: Input
Voltage lt; 100V AC
Temperature Protect:
gt; 100C
DEVICE SPECIFICATION
Wireless Bridge Dimensions 358 x 271.95
x 272.5 mm (14.09 x
64
10.71 x 10.73")
Weight Without Mount:
800 g (1.76 lb)
Weight With Mount: 980
g (2.16 lb)
Power Supply 24V, 0.3A
Gigabit PoE Adapter
(Included)
Max. Power Consumption
7W
Power Method Passive
PoE (Pairs 4, 5+; 7, 8
Return)
Supported Voltage Range
24V ± 10%
Gain 23 dBi
Networking Interface
(1) 10/100/1000
Ethernet Port
Processor Specs MIPS
74Kc
Memory 64 MB DDR2
LEDs Power, Ethernet
Channel Sizes PtP Mode
PtMP Mode
10/20/30/40/50/60/80
MHz 10/20/30/40 MHz
Enclosure
Characteristics
Reflector (SGCC 0.6T) /
Plastic: PC
65
Table 9. Total Expenses of Used Equipment
66
UTP cable (2,450), 100 pieces of RJ45 (1,000),
two routers (4,940), two wireless bridge
(7,480), and two PoEs (1,060) with the total
amount of 627,600.
1.4 Simulation
67
1.5 Implementation
68
Set up and Configuration
69
Step 3. Access the antenna through browser.
70
Step 5. After selecting the country and
language, create a username and password then
click save.
71
Step 7. After changing the device name, go to
the network and change the IP address.
72
Step 9. In advance setting off the EIRP Limit,
save changes in order to save all the
configuration.
73
Step 10. After saving the changes, reload or
go to new window to check if the new IP
antenna is accessible.
74
Step 12: In point B only On the PTP mode, max the
power out and change the Wpa2 Pre-shared key then
click the select in the SSID to find point A
75
Step 14: After Selecting the Point A SSID scroll
down to find the advance, Off EMP limit the after
that click the Save changes
76
and load of new modifications and
developments.
ITEMS WM VERBAL
INTERPRETA
TION
The proposed network design 3.8 Strongly
meets my functional Agree
requirements.
I find the network design easy 3.7 Strongly
to use and understand. Agree
The network design provides 3.8 Strongly
satisfactory performance in Agree
terms of speed and
responsiveness.
The proposed network design 3.7 Strongly
can easily accommodate growth Agree
in terms of users and data.
I believe the network design 3.7 Strongly
will be reliable and available Agree
when needed.
I am confident that the 3.7 Strongly
network design prioritizes Agree
security of my data and
information.
The network design respects my 3.7 Strongly
privacy and data protection Agree
concerns.
The proposed network design is 3.7 Strongly
compatible with my existing Agree
devices and systems.
The network can seamlessly 3.8 Strongly
communicate with other systems Agree
or networks I use.
I trust that adequate user 3.7 Strongly
support will be available if Agree
issues arise with the network.
The provided training and 3.6 Strongly
77
documentation are helpful in Agree
understanding how to use the
network.
I feel encouraged to provide 3.5 Strongly
feedback about my experience Agree
using the network.
The network design allows me 3.3 Strongly
to customize certain aspects Agree
to suit my preferences.
I believe the network design 3.9 Strongly
offers good value for the cost Agree
it incurs.
I perceive that user input was 3.8 Strongly
considered during the design Agree
process of the network.
CHAPTER IV
78
This chapter presents the summary,
conclusion and recommendation of the capstone
project.
Summary
79
Conclusion
80
most which is the ICT students of Julia Ortiz
Luis National High School (JOLNHS).
Recommendations
81
1. The monitoring and maintenance of the
network should be handled by an IT
network designer for it to run smoothly.
82
APPENDICES
References
83
8.In book: Fundamentals of Computer Networks
(pp.37-49) Matthew N. O. Sadiku and Cajetan M.
Akujuobi – Local Area Network (LAN)
9.Hess, S.(2019) Wireless Bridges: How They
Work and How to Set Them Up Digital Trends
10.How to Set Up a Wireless Bridge. Lifewire.
Retrieved – Chua J, (2019)
84
16.Sunday Abbayomi Ojumu,Anthony Alaomaka,
Peter Oritsetimeyin Tim, George Egega (June
2022).-Comparative performance evaluation of
computer network cables for Local Area Network
(LAN)
85
ZpYZx3xLPTBwfle2TgWrvY3FcZr9dxitKzL7sPQEqnFFex
fo_wWP6dfwY
23.https://connectedpapers.com/?
fbclid=IwAR2WETnGiO4PmX55TmeK4vWCnQ80zWlfteD44
oFgN2V14QRfXMSN07sC3bU_aem_Ab5dODI4Tmq1kqkj09I
4pWsQkT1abzzn8FvoyPVN6HIHYsubiPgAVotjQSF6FnQif
jo
24.https://www.studocu.com/row/document/air-
university/computer-networks/computer-
networks-lab-4-lan-cabling-and-connection-to-
router/25440274?
fbclid=IwAR0fNIiKzd6ndtxm5TsKVGSwo3uaUQcWk9C3U
S3hqstxtOMfiyWM25nxLgU_aem_Ab6t92MbM9ZWrR-
EOz1zzMpahUBtgoTg9YKowGzk2hXpI9yomIVIHvU1hYvZw
B9cLU8
25.http://web.simmons.edu/~chen/nit/
NIT'92/349-wij.htm?
fbclid=IwAR13M3a_3eY0GUonmFOYY5O1GUBcJw5tEIqFO
R4dhfLxvJWBuLEw8vF5BSs_aem_Ab6i3fMZUqAeTGOsuDB
W88qXDbkwD5tzUvtT_0aJL1t-wX-xH3yQBdZ_
86
Appendix A
Table 1. Assessing the level of acceptability
of the proposed Network Plan by end-user
87
network
design will
be reliable
and available
when needed.
I am
confident
that the
network
design
prioritizes
security of
my data and
information.
The network
design
respects my
privacy and
data
protection
concerns.
The proposed
network
design is
compatible
with my
existing
devices and
systems.
The network
can
seamlessly
communicate
with other
systems or
networks I
use.
I trust that
adequate user
support will
be available
if issues
88
arise with
the network.
The provided
training and
documentation
are helpful
in
understanding
how to use
the network.
I feel
encouraged to
provide
feedback
about my
experience
using the
network.
The network
design allows
me to
customize
certain
aspects to
suit my
preferences.
I believe the
network
design offers
good value
for the cost
it incurs.
I perceive
that user
input was
considered
during the
design
process of
the network.
89
Republic of the Philippines
NUEVA ECIJA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Cabanatuan City, Nueva Ecija, Philippines
ISO 9001:2015 CERTIFIED
Appendix B
Aug 14, 2023
Rosalie B. Sison
Instructor
College of Information and Communications Technology
This University
Dear Ma’am:
Greetings of Peace!
The IT Capstone Project and Research is a culminating project as part of the requirements
for the degree, Bachelor of Science in Information Technology. The undersigned are fourth-
year BSIT students enrolled in the IT-CAP02: Capstone Project and Research 1 during the 1 st
Semester of Academic Year 2023-2024.
In line with this, may the undersigned ask for your approval to become their Capstone and
Research Project adviser for the study entitled Connecting Network Infrastructure of
Julia Ortiz Luis National High School of Sto. Domingo, Nueva Ecija using Local Area
Network and Wireless Bridge. Your expertise in the field and guidance will truly contribute
to the success of this academic endeavor.
The undersigned are looking forward for your kind approval and acceptance. Thank you.
Sincerely,
Regine F. Colorado
Judy-Ann E. Gaspar
Student-Researchers
Noted:
ROSALIE B. SISON
Capstone Project and Research Instructor/NST Program Chairperson/ Adviser
90