Lesson 5 INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS
Lesson 5 INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!
1
What’s In
What’s New
Network testing is, in the end, making sure that your network configuration works as
designed. Network testing is very similar to software testing, with one exception: in contrast to
software testing, network testing often has to happen in a production environment, after the
configuration change was made. In fact, it is sometimes very difficult, or almost impossible, to
model a complex system like a large enterprise network, or the Internet itself, in a lab
environment. Thus, network testing is a MUST-HAVE step in the network implementation
process.
What is It
In general, testing is finding out how well something works. For human beings, testing
tells what level of knowledge or skill has been acquired. In computer hardware and software
development, testing is used at key checkpoints in the overall process to determine whether
objectives are being met. For example, in software development, product objectives are
sometimes tested by product user representatives. When the design is complete, coding
follows and when finished, this is then tested at the unit or module level by each programmer;
at the component level by the group of programmers involved; and at the system level when
all components are combined together. At early or late stages, a product or service may also
be tested for usability.
Safety Precautions
Occupational Health and Safety (OHS) Policy – An Information and Communication
technology (ICT) student should know how to behave when working in the computer
laboratory, and to accomplish task safely. Safety practices should be learned early and always
adheres in working with any electrical and electronic device, including personal computers
and its peripherals. This is for your protection as well as to the people working with you, and
for the devices that you are using.
Occupational Health and Safety (OHS) Policy is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks. Health and
safety procedure is the responsibility of all persons in the computer and technology industries.
2
You must identify the hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
Procedure
Accident Reports
Forms are used to give specific details with regards to accidents that happened in the
laboratory during experiments.
Accident reports contain the following details:
3
Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked
or seriously injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove jewelries when working inside any computer-related equipment.
Be sure not to pour water on electronic components.
You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished: You must
verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional:
If this part of the output does not show a valid IP address, you need to check that your
IP configuration is set correctly and that your DHCP server is working.
4
Writing a Technical Report on Test Conducted
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following format for a
technical report for your recently conducted test.
Recommended Equipment
A computer with at least Windows XP Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
Step 1
1. Disconnect the Ethernet patch cable from your computer.
2. A red “X” appears over the “Local Area Connection” icon.
5
3. Hover over the “Wireless Network Connection” icon in the tray.
6
9. A successful ping indicates that there is a connection between the computer and the default
gateway.
Step 2
Step 3
7
What I Have Learned
Directions. Write TRUE if the statement is correct and FALSE if the statement is wrong.
Summative Assessment
I. Directions. Choose the letter of the best answer. Write your answer on a separate sheet of
paper.
1. An investigation conducted to provide stakeholders with information about the quality of
the product or service under test.
a. Network Testing b. OHS c. both a and b d. none of these
2. Electronic Components should not be exposed to .
a. Power supply b. Water c. both a and b d. none of these
3. Things to remove when working inside computer-related equipment.
a. Safety Googles b. Rubber shoes c. both a and b d. none of these
4. These components should only be removed when the computer is turned off.
a. Expansion Cards b. Keyboard and mouse c. both a and b d. none of these
5. These components works only when supplied with power source.
a. Casing b. Electronics c. both a and b d. none of these
6. A planned system of working to prevent illness and injury where you work by recognizing
and identifying hazards and risks.
a. OHS b. SHO c. both a and b d. none of these
7. These should be identified as part of Occupational Health and Safety procedure.
a. dangers b. hazards c. both a and b d. none of these
8. Used to give specific details with regards to accidents that happened in the laboratory
during experiments.
a. Forms b. Flyers c. both a and b d. none of these
9. Any document that records the procedure adopted and results obtained from a scientific
or technical activity or investigation.
a. Incident Report b. Accident Report c. both a and b d. none of these
10. Indicates that there is a connection between the computer and the default gateway.
a. Router b. NIC Card c. both a and b d. none of these
11. The first step in network testing after connecting physical components.
a. Check Network Config b. Verify Log in c. both a and b d. none of these
12. This command will spit out numerous lines of information.
8
II. Directions. Write TRUE if the underlined word makes the statement correct and if not,
Write the right term that makes it accurate.
9
References:
Abrams, M. D., et al., "The NBS network measurement system," IEEE Trans. on Commun.
COM-25, (Oct 1977), 1189--1198.
Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”,
Fast Software Encryption, Cambridge Security Workshop Proceedings (December
1993), Springer-Verlag,
1994.
Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso and Frank Piessens,
“Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network
Discovery Mechanisms”, ACM Asia Conference on Computer and Communications
Security, May 2016.
Lixia Zhang, “A New Architecture for Packet Switching Network Protocols”, PhD Thesis,
Massachusetts Institute of Technology, 1989.
10