Notes Quiz Css
Notes Quiz Css
PROCEDURE
S
TEST PROCEDURES
Atest procedure is a set of steps to
guide you through what needs to be done
to thoroughly test the installation. It is
designed to help you work more
effectively and to make sure you test
everything that needs testing.
TEST PROCEDURES
• STEPS:
• 1.PLUG THE LAN
CABLE TO BOTH OF
THE COMPUTERS.
• 2.FOR COMPUTER 1,
RIGHT CLICK THE
NETWORK ICON, THEN
CLICK “OPEN
NETWORK AND
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 3. CLICK “CHANGE
ADAPTOR OPTIONS”,
THEN CLICK
“ETHERNET” AND GO
TO “PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 4. UNCHECK THE BOX
“INTERNET PROTOCOL
VERSION 6 (TCP/IPV6)”,
THEN CLICK“INTERNET
PROTOCOL VERSION 4
(TCP/IPV4)” AND CLICK
“PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 5. IN “PROPERTIES”, CLICK
“USE THE FOLLOWING IP
ADDRESS:”
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 6. INPUT THE FOLLOWING THEN CLICK
“OK”.
• IP ADDRESS: 192.168.1.1
• SUBNET MASK: 255.255.255.0
• DEFAULT GATEWAY: 192.168.1.2
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 7. IN NETWORK AND
INTERNET SETTINGS, CLICK
“SHARING OPTIONS”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 8. CHANGE YOUR SHARING
SETTINGS. (YOU CAN COPY
THE SETTINGS BELOW)
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 9. IN PC 2, DO THE SAME STEPS THAT YOU DID TO PC 1 EXCEPT FOR
THE IP ADDRESS AND DEFAULT GATEWAY.
• FOR PC 2:
• IP ADDRESS: 192.168.1.2
• DEFAULT GATEWAY: 192.168.1.1
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 10. CREATE A FOLDER IN PC
1 OR PC 2 THEN RIGHT
CLICK THE FOLDER AND
SELECT “PROPERTIES”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 11. GO TO “SHARING”
TAB, THEN CLICK
“SHARE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 12. CHOOSE WHO CAN
ACCESS TO YOUR FOLDER
OR FILE, THEN CLICK
“ADD”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 13. CHOOSE THE
PERMISSION LEVEL YOU
WOULD LIKE THE ADDED
COMPUTER TO HAVE.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 14. CHOOSE THE PERMISSION
LEVEL YOU WOULD LIKE THE
ADDED COMPUTER TO HAVE,
THEN CLICK “SHARE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 15. CLICK “DONE”.
PEER-TO-PEER
NETWORK
(FILE SHARING)
• STEPS:
• 16. CHECK THE OTHER PC IF
THE FILE OR FOLDER WAS
SUCCESSFULLY SHARED.
CLIENT-
SERVER
CLIENT-SERVER
Node 4 Node 5
BUS TOPOLOGY
Advantages Disadvantages
Requires less cable length Difficult to identify the
problem if the entire network
shuts down
Suited for temporary network Limited Cable Length
Node failures does not affect Entire network shuts down if
others there is a break in the main
cable
RING TOPOLOGY
RING
topology
Node 1
Node 5 Node 2
Node 4 Node 3
RING topology
Advantages Disadvantages
Easy to manage. Due to the Uni-directional Ring, a
data packet (token) must have to
pass through all the nodes.
In this data flows in one direction It is slower in performance as
which reduces the chance of packet compared to the bus topology
collisions.
All nodes with equal access If one workstation shuts down, it
affects whole network or if a node
goes down entire network goes
down.
STAR TOPOLOGY
STAR
TOPOLOGY Node 1
Node 5 Node 2
HUB
Node 4 Node 3
STAR
TOPOLOGY
Advantages Disadvantages
No disruptions to the network Too much dependency on
when connecting or removing central device has its own
devices. drawbacks. If it fails whole
network goes down.
Easy to install and wire. Requires more cable than a
linear bus .
Centralized administration. Increased cost due to
switch/hub.
TREE
TOPOLOGY
TREE
HUB 1
TOPOLOGY
HUB 2
Node 1 Node 2
Node 3
Node 4
Node 5 Node 6
HUB 3
Node 7
Node 8
TREE
Scalable TOPOLOGY
Advantages Disadvantages
Central hub fails, network
fails
Easier maintenance and fault Heavily cabled
finding
The other nodes in a network are not Costly
affected, if one of their nodes get
damaged or not working
Node 4 Node 3
TWO TYPES OF MESH
TOPOLOGY
In a full mesh topology, every
computer in the network has a
In a partially-connected mesh topology, at
least two of the computers in the network
connection to each of the other have connections to multiple other
computers in that network. The computers in that network. It is an
number of connections in this inexpensive way to implement redundancy
network can be calculated using the in a network. If one of the primary
following formula (n is the number computers or connections in the network
of computers in the network): fails, the rest of the network continues to
n(n-1)/2 operate normally.
MESH
TOPOLOGY
Advantages Disadvantages
Fault tolerant Issues with broadcasting
messages
Star Topology
TWO TYPES OF HYBRID
TOPOLOGY
A star-ring hybrid topology is a
combination of the star topology
and ring topology. Star topologies
are connected through a ring
topology, regardless of amount.
Split large networks into small Resides on Layer 2 of the OSI model
segments, decreasing the number OSI Model Layers
of users sharing the same network 7 Application 6 Presentation
resources and bandwidth. 5 Session 4 Transport 3 Network
2 Data Link 1 Physical
Resides on Layer 2 of the OSI model Transparent to protocols and to higher level
OSI Model Layers devices like routers.
7 Application 6 Presentation Forward data depending on the Hardware
5 Session 4 Transport 3 Network (MAC) address, not the Network address (IP).
2 Data Link 1 Physical
REPEATER
ETHERNET HARDWARE
REPEATER
Resides on Layer 3 of the OSI model Routers are the only one of these
OSI Model Layers four devices that will allow you to
7 Application 6 Presentation share a single IP address among
5 Session 4 Transport 3 Network multiple network clients.
2 Data Link 1 Physical
Additional Network Hardware Devices
Network Interface Cards (NICs)
∙ Puts the data into packets and transmits
packet onto the network.
∙ May be wired or wireless.
Gateway
∙ Connects networks with different protocols like
TCP/IP network and IPX/SPX networks.
∙ Routers and Gateways often refer to the same
device.
Proxy server
∙ Isolates internal network computers from the internet.
∙ The user first access the proxy server and the proxy
server accesses the internet and retrieves the requested
web page or document. The user then gets a copy of that
page from the proxy server.
References:
https://www.camas.wednet.edu/chs/tech/computer_tech/info/routers_hubs_bridges.htm
https://sourcedaddy.com/networking/ethernet-hardware.html
https://stevessmarthomeguide.com/networking-components/
http://www.jsu.edu/depart/psychology/sebac/fac-sch/internet/hardware-h.shtml
https://www.tutorialspoint.com/Basic-Network-Hardware
Ethernet Switches
ETHERNET
SWITCHES
• An Ethernet switch serves as a central station for connecting laptops, printers, and other wired
devices. To connect to the Internet, the switch is also connected to the router and modem. Wi-Fi
is Ethernet's cable counterpart.
•While stand-alone Ethernet switches can have up to 48 ports, the Ethernet switch in a wireless
router typically has just four ports. Wi-Fi and wireless router are two terms that can be used
interchangeably.
ETHERNET SWITCHES
Modular
Switches
MODULAR SWITCHES
Modular switches allow you to
install extension modules if
required, allowing you
versatility as your network's
needs shift. Expansion
modules for firewalls, wireless
networking, and network
monitoring are examples of
application-specific expansion
modules. They can also enable
the inclusion of external
interfaces, power supplies, or
cooling fans. This move gives
you the most versatility, but at
a higher cost.
Types Of Switches
Fixed-Configuration Switches
FIXED-CONFIGURATION
SWITCHES
Fixed-configuration switches
have a fixed number of ports
and are normally not
expandable, allowing them
less costly in the long run.
Unmanaged switches, smart
switches, and regulated
switches are also example of
fixed-configuration switches.
Types Of Switches
Smart Switches
SMART SWITCHES
Smart switches have some
management and
segmentation, quality of
operation, and security
features, making them a less
expensive alternative to
modular switches. They are,
however, not as scalable as
managed switches. This
switches are usually installed
at the edge of a big network,
as the infrastructure for
smaller networks, or for
networks of low complexity.
Types Of Switches
Managed
Switches
MANAGED SWITCHES
Managed switches are created
to enhance the most
comprehensive range of
features to provide the best
application experience, the
highest levels of protection,
the most detailed network
access and maintenance, and
the greatest scalability among
fixed-configuration switches.
As a result, controlled
switches are typically used as
aggregation/access switches in
very big networks or as central
switches in smaller networks.
Types Of Switches
Unmanaged Switches
UNMANAGED SWITCHES
Usually, unmanaged switches
are used to have simple
networking. They're
programmed to be plug-and-
play, with no setup needed.
When only simple switching
and connectivity are needed,
unmanaged switches are the
most powerful. They are
commonly used in home
networks or where only a few
ports are needed, such as at a
desk, in a lab, or in a
conference room.
Managed
Modular
Fixed-Configuration
Unmanaged
Smart
ETHERNET
CABLE
An Ethernet cable is
something that connects your
electronic device (computer,
smartphone, game console,
etc.) to a network, allowing
you to access the internet and
communicate with shared
network services.
ETHERNET
CABLE TYPES
•Most Ethernet cables are designed to
connect a computer to a router or switch.
Ethernet cables come in a range of types that
are defined by the Electronic Industries
Association and Telecommunications
Industry Association.
This is the most common kind of twisted pair Ethernet cable, and it is made up
of four pairs of copper wires. High speeds of up to 100 Mbps (megabit per
second) are possible with fifth generation twisted pair Ethernet technology.
CAT6 CABLES
This cable is the sixth generation of twisted pair Ethernet cabling, and it is
made up of four pairs of copper wires, much like the CAT 5e category.Cat6, on
the other hand, uses all four pairs of copper wire and can reach speeds of up to
1 Gbps (gigabit per second), which is double the speed of CAT 5e cables.
References:
https://simple.wikipedia.org/wiki/Ethernet
https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/networking/understanding-the-different-types-of-network-switches.html#~types-of-
switches
https://www.youtube.com/watch?v=WJ_UD3R7s2I
https://www.pcmag.com/encyclopedia/term/ethernet-switch
https://www.comms-express.com/blog/ethernet-cables-explained-all-you-need-to-
know/#:~:text=Cat5e%20Cables,per%20second)%20to%20be%20achieved.
https://www.firefold.com/blogs/news/what-is-an-ethernet-cable
Network Firewall
NETWORK FIREWALL
What is Firewall
A firewall is a critical part of any system’s security
infrastructure It’s a network security device that monitors
incoming and outgoing network traffic and permits or
blocks data packets based on a set of security rules. It also
guards traffic at a computer’s entry point, called ports,
which is where information is exchanged with external
devices.
When properly configured, a firewall allows users to
access any of the resources they need while
simultaneously keeping out unwanted users, hackers,
viruses, worms or other malicious programs trying to
access the protected network.
HARDWARE & SOFTWARE
FIREWALLS
Hardware firewalls
• These firewalls are released either as standalone products
for corporate use, or more often, as a built-in component
of a router or other networking device.
• Hardware firewalls will almost always come with a
minimum of four network ports that allow connections to
multiple systems.
Software firewalls
• These are installed on a computer, or provided by an OS
or network device manufacturer.
• They can be customized, and provide a smaller level of
control over functions and protection features.
• A software firewall can protect a system from standard
control and access attempts, but have trouble with more
sophisticated network breaches.
TYPES OF NETWORK
FIREWALL
1. Packet-filtering firewalls 2. Next-generation
It’s the most common type of firewall
firewalls (NGFW)
Examine packets and prohibit them from NGFW combine traditional
passing through if they don’t match an firewall technology with
established security rule set additional functionality, such as
encrypted traffic inspection,
Checks the packet’s source and destination IP intrusion prevention systems, anti-
addresses. virus, and more
Divided into two categories
Stateful- remember information about Includes deep packet inspection
previously passed packets and are (DPI).
considered much more secure.
Stateless- examine packets Application awareness and control
independently of one another and lack to see and block risky apps
context, making them easy targets for
hackers
TYPES OF NETWORK
FIREWALL
3. Proxy firewalls 4. Network address
filter network traffic at the application level
translation (NAT)
firewalls
It acts an intermediary between two end
systems NAT allow multiple devices with
independent network addresses to
Monitor traffic for layer 7 protocols such as connect to the internet using a
HTTP and FTP, and use both stateful and single IP address, keeping
deep packet inspection to detect malicious individual IP addresses hidden.
traffic.
Also acts as an intermediary
between a group of computers and
outside traffic.
TYPES OF NETWORK
FIREWALL
5. Stateful multilayer 6. Unified threat
Inspection (SMLI) management
firewalls (UTM)
Filter packets at the network, transport, and Combines, in a loosely coupled
application layers, comparing them against way, the functions of a stateful
known trusted packets. inspection firewall with intrusion
prevention and antivirus
Like NGFW firewalls, SMLI also examine
the entire packet and only allow them to pass UTMs focus on simplicity and
if they pass each layer individually. ease of use.
How to Allow Programs through the
Windows 7 Firewall
1. Choose Start→Control Panel→System and 2. Select the check box(es) for the program(s)
Security→Allow a Program through Windows you want to allow through the firewall.
Firewall. Allowed Programs dialog box 3. Use the check boxes to indicate the kind of
network that has to be running for the
program to get through. Click OK to accept
the settings.
Why Network Firewalls
are Important
Muir, N. C. (n.d.). How to Allow Programs Through the Windows 7 Firewall? Retrieved April 16, 2021, from
https://www.dummies.com/computers/operating-systems/windows-7/how-to-allow-programs-through-the-windows-7-firewall/
What is a firewall? (2021, February 02). Retrieved April 15, 2021, from
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
What is a firewall? (2021, March 10). Retrieved April 15, 2021, from https://www.forcepoint.com/cyber-edu/firewall
Why is a firewall important? - it questions. (2017, March 03). Retrieved April 16, 2021, from https://www.getsouthern.com/it-
questions/why-is-a-firewall-important/
Virus and malware was ejected
0 threat remain
THANK YOU
Server
Server
A server is a computer or system that provides
resources, data, services, or programs to other
computers, known as clients, over a network. In
theory, whenever computers share resources with
client machines they are considered servers. There
are many types of servers, including web servers,
mail servers, and virtual servers.
HOW A SERVER WORKS
To function as a server, a device must be When a client requires data or
configured to listen to requests from functionality from a server, it sends a
clients on a network connection. This request over the network. The server
functionality can exist as part of the receives this request and responds with
operating system as an installed the appropriate information. This is the
application, role, or a combination of the request and response model of client-
two. For example, Microsoft’s Windows server networking, also known as the
Server operating system provides the call and response model. A server will
functionality to listen to and respond to often perform numerous additional tasks
client requests. Additionally installed as part of a single request and response,
roles or services increase which kinds of including verifying the identity of the
client requests the server can respond to. requestor, ensuring that the client has
In another example, an Apache web permission to access the data or
server responds to Internet browser resources requested, and properly
requests via an additional application, formatting or returning the required
Apache, installed on top of an operating response in an expected way.
system.
Types of Server
https://www.paessler.com/it-explained/server
https://www.printerland.co.uk/blog/how-does-a-print-server-work/
https://www.google.com/amp/s/www.itpro.co.uk/strategy/29643/what-is-an-application-serv
er%3famp
https://www.google.com/amp/s/whatis.techtarget.com/definition/Web-server%3famp=1
https://www.sciencedirect.com/topics/computer-science/database-server
https://www.netstandard.com/virtual-servers-work
https://www.pcmag.com/encyclopedia/term/proxy-server