...Network Extension Platoon February WIN-T Exercise (JNN/STT/HCLOS) Subject of Instruction: * Provide Internet Connectivity, Data/Voice over IP. & Video Services * Configure Line Of Sight Services (HCLOS) Instructors: SPC Woolls / SPC Poirier Assist- SGT Diaz Duration 8 hrs. References: Student Guide. Student Handout. WIN-T-INC1-STT-O&M-SG-A02 WIN-T-INC1-SHLTR-O&M-Vol2 Cisco SWITCH & ROUTER CONFIGURATION CISCO CALL MANAGER (CCM) & SYSTEM CONFIGURATION TM-11-5895-1868-13&P. TM-11-5820-1162-13&P. TM-11-5820-1163-23&P. TM 11-5820-1183-13 TM- 9-6615-641-10. Resources needed: JNN/STT/HCLOS M1097-HMMWV x2 10kw Gen. & 5kw Gen. Subject of Instruction: (BCPN/STT/HCLOS) * Provide Internet Connectivity, Voice over IP. & Video Services * Configure Line Of Sight Services (HCLOS) Instructors: SGT Williams / SPC Dzurayev Assist- SGT Diaz Duration 8 hrs. References: OPERATOR’S, UNIT AND DIRECT SUPPORT MAINTENANCE MANUAL Student Guide. Student Handout. ACUS/HCLOS/31P CISCO CALL MANAGER (CCM) Cisco SWITCH & ROUTER CONFIGURATION WIN-T-INC1-STT-O&M-SG-A02 WIN-T-INC1-BNCPN-SG-Vol1 * WIN-T-INC1-BNCPN-SG-Vol2 TM-11-5895-1868-13&P. TM-11-5820-1162-13&P. TM 11-5820-1163-13 &13-1 TM 11-5820-1183-23P TM- 9-6615-641-10. Resources needed: BCPN/STT/HCLOS Power Strips & Extension Cables Power Distribution Box M400, M200, M60, M40, M46 and Universal...
Words: 263 - Pages: 2
...give some basic instructions to determine how many VLANs a department would typically need. Finally, contact information will be provided for any additional questions you might have. Use of this information will be used to determine a department's VLAN needs. If VLANs are well thought out in advance, the need to readdress devices and modify VLAN configurations more than once will not become an issue. This will save everyone involved a great deal of effort and minimize the amount of changes that will be needed. What is a VLAN? Virtual LANs can be viewed as a group of devices on different LAN segments which can communicate with each other as if they were all on the same physical LAN segment. Switches using VLANs create the same division of the network into separate domains but do not have the latency problems of a router. Switches are also a more cost-effective solution. By now you are probably wondering why someone would go to all this work to end up with what appears to be the same network as the original one. In many instances, LANs have been grouped with physical location being the primary concern. VLANs are built with traffic patterns in mind. Using VLANs, we are able to group these devices into a single domain. This allows us to confine broadcast traffic for this workgroup to just those devices that need to see it, and reduce traffic to the rest of the network. There is an increased connection speed due to the elimination of latency from router connections. An...
Words: 791 - Pages: 4
...Instructions: Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions: * Where does the countermeasure belong in the seven domains of a typical IT infrastructure? * What CIA functions does the countermeasure provide? Provide your answers in the table below. Network Security Applications and Countermeasures | Domains | CIA Function | Ethical hacker | * Workstation domain | Availability | Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity | Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality | Failover server | * WAN domain * LAN-to-WAN domain | Availability | Automatic updates | * Workstation domain | Availability | Cryptography | * LAN-to-WAN domain | Confidentiality | Data backups | * System/Application domain | Availability | Logon rights | * LAN domain | Integrity | Computer cluster | * Workstation domain | Integrity | Firewalls | * LAN domain | Confidentiality | Proxies | * LAN-to-WAN domain | IntegrityConfidentiality | Antivirus scanners | * Workstation domain | Confidentiality | As a reminder, the seven domains of a typical IT infrastructure include the following domains: * User domain: Actual users * Workstation domain: Workstations, laptops, and end-point devices...
Words: 296 - Pages: 2
...Instructions: Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions: ▪ Where does the countermeasure belong in the seven domains of a typical IT infrastructure? ▪ What CIA functions does the countermeasure provide? Provide your answers in the table below. |Network Security Applications and Countermeasures |Domains |CIA Function | |Ethical hacker |User |Integrity | |Intrusion detection system/intrusion prevention system |LAN-to-WAN |Integrity | |(IDS/IPS) |Workstation | | |Access controls |Workstation |Confidentiality and integrity | | |LAN | | | |LAN-to-WAN | | | |WAN | ...
Words: 278 - Pages: 2
...how to operate the craft. So I would be perfect to create an instruction manual for operating a 34ft Patrol Craft. More likely you have no clue what a 34ft SeaArk Patrol Craft is or what one might look like. Which makes it even more of a fun challenge to me on explaining all the details about the craft. I can first tell you about all the capabilities of the craft, then get more into how you start it and actually operate the craft. There are some technical words I would have to explain like some of the positions for example on the craft. Coxswain for instances, is the person that is completely in charge of the craft and its safety and the safety of the crew that is on board. It might seem like as you’re reading this that I might not be able to instruct you on how to operate this craft. I will be able to put the instruction manual into words that a person that has never been on a boat will be able to understand. I promise that if I can teach/train some of the most brand new sailors to the navy to operate the craft. Then I know for a fact by the time you’re done reading my instruction manual, you’ll be able to walk onto a 34ft SeaArk and go to work. I mean if the United States Navy trusts in me to teach/train junior personnel to operate these 15 million dollar patrol crafts, I think I more than qualify to write an instructor manual for it. So I ask you to entrust in me as well and let me make this instruction manual for you....
Words: 362 - Pages: 2
...them to perform in an orderly manner and helps them to have the correct items for homework. Again, the lining up keeps the children on task and performing as expected Transition Between Areas: This routine is important because it is a time when students may be tempted to act out and cause distraction and noise. As a routine, the steps of listening to the instruction, being given jobs and then explained the task or assignment. The teacher’s instruction builds on all the routines of keeping order and having less chaos in the classroom. The children know what is expected and can expect consistency and learn it as a daily routine. Distribution of Materials: The teacher gathers the students together around her. She assigns "jobs" to the students. These jobs are different each day for the students. The "supplier" is instructed on what items to retrieve for their groups. This keeps each group on task and synced in time for the assignment given. Field Trip: As in the beginning and end of day routines, the students line up. They line up inside in order for them to stay together and calm. When the teacher gives the instruction the students then walk to the boarding area in line and in orderly...
Words: 459 - Pages: 2
...execution is dependent on the addressing mode of the instructions. The addressing mode specifies a rule for interpreting or modifying the address field of the instruction before the operand is actually referenced. Computers use addressing mode techniques for the purpose of accommodating one or both of the following provisions: 1 Addressing Modes Computers use addressing mode techniques for the purpose of accommodating one or both of the following provisions: 1. 2. to give programming versatility to the user by providing such facilities as pointers to memory, counters for loop control, indexing of data and program relocation. To reduce the number of bits in the addressing field of the instruction. 2 Addressing Modes Immediate Direct Indirect Register Register Indirect Displacement (Indexed) Stack 3 Immediate Addressing Operand is part of instruction Operand = address field e.g. ADD 5 Add 5 to contents of accumulator 5 is operand No memory reference to fetch data Fast Limited range 4 Immediate Addressing Diagram Instruction Opcode Operand 5 Direct Addressing Address field contains address of operand Effective address (EA) = address field (A) e.g. ADD A Add contents of cell A to accumulator Look in memory at address A for operand Single memory reference to access data No additional calculations to work out effective address Limited address space 6 Direct Addressing Diagram Instruction Opcode Address A Memory Operand 7 Indirect...
Words: 595 - Pages: 3
...Task 1—Verify Connectivity and Configuration in Dallas router #1. What CLI command does produce the output below? ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- #2. Complete the table below based on the dynamic routes displayed in the routing table above. Routing protocol | Destination Network | Metric | Outbound Interface | | | | | | | | | | | | | #3. Write the CLI command to verify connectivity from the ISP Router to 1. Dallas Server: ------------------------------------------------- 2. Dallas Host: ------------------------------------------------- 3. Chicago Server: ------------------------------------------------- 4. Chicago Host: ------------------------------------------------- Task 3—Deny Upper TCP ports from suspicious hosts to Dallas Server Port scan packets and other malicious activities have been detected by an Instruction Detection System (IDS) deployed in Dallas LAN. They are upper TCP port packets arriving to Dallas Server from the Attack PC. #4. Your task as a network administrator is to configure an ACL in Dallas Router to prevent malicious packets entering Dallas LAN. These packets are from the Attack PC with TCP port numbers greater than 255 can. At the same time, the ACL should allow any other traffic to enter Dallas LAN...
Words: 329 - Pages: 2
...Wireless Router Configuration- Gateway Configuration Cisco Linksys Products (http://homesupport.cisco.com/en-us/wireless/lbc/WRT54G) Model # WRT54G Firmware : v1.4 – v 4.20. Barry Rodricks Outline Introduction. Configuring the Router as a Gateway. References Introduction What is a default Gateway ? A default gateway is the device that passes traffic from the local subnet to devices on other subnets. The default gateway often connects a local network to the Internet, although internal gateways for local networks also exist. In simple words the Gateway (normally associated with a router ) is an entry and an exit point for network traffic. A depiction below shows a SOHO and how the wireless router acts as a gateway for all the devices connected. In big enterprises, the device playing the part of a gateway could also act as a proxy server and a firewall. In most cases the gateway is a router, which use headers and forwarding tables to determine where packets are sent. Configuring the Router as a Gateway Login to the router’s web interface (refer to router guide) , and click on the “Setup Tab” and proceed to the “Advanced Routing option” Use the instructions as given below : If the Router is directly connected to the DSL/Cable modem, select the default option of Gateway. In this example , we will attempt to configure the router as a gateway . Our assumption would be that the customer only has one wireless router connecting to the Cable/DSL...
Words: 304 - Pages: 2
...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software...
Words: 2230 - Pages: 9
...For X = 0011 1111, show the result of the following independent operations (i.e. each instruction occurs with X starting at the value above): a) Shift-right ____ ____ b) Circular Shift-right ____ ____ c) Shift-left ____ ____ d) Circular Shift-left ____ ____ e) Arithmetic Shift-left ____ ____ f) Arithmetic Shift-right ____ ____ 3. (12 points) a) Convert the following formula from postfix (Reverse Polish Notation) to infix: AB*CD/+ b) Convert the following formula from infix to postfix (Reverse Polish Notation): A + B * C + D / E * F Note that the result of part b) can be used in problem 7 In the problems 4 through 7 write code that performs the computation: X = A + B * C + D / E * F using CPUs that have the following instruction formats. You may only use registers A through F, plus X and T. Registers A through F may not be changed, i.e. their values are fixed. Register T may be used as a temporary register, and Register X must contain the final answer. 4. (12 points) Three-operand instructions 5. (12 points) Two-operand instructions 6. (12 points) One-operand instructions 7. (12 points) Stack instructions See...
Words: 457 - Pages: 2
...is said to be all those activities which are designed to encourage the subordinates to work effectively and efficiently. According to Human, “Directing consists of process or technique by which instruction can be issued and operations can be carried out as originally planned” Therefore, Directing is the function of guiding, inspiring, overseeing and instructing people towards accomplishment of organizational goals. | Direction has got following characteristics: 1. Pervasive Function - Directing is required at all levels of organization. Every manager provides guidance and inspiration to his subordinates. 2. Continuous Activity - Direction is a continuous activity as it continuous throughout the life of organization. 3. Human Factor - Directing function is related to subordinates and therefore it is related to human factor. Since human factor is complex and behaviour is unpredictable, direction function becomes important. 4. Creative Activity - Direction function helps in converting plans into performance. Without this function, people become inactive and physical resources are meaningless. 5. Executive Function - Direction function is carried out by all managers and executives at all levels throughout the working of an enterprise, a subordinate receives instructions from his superior only. 6. Delegate Function -...
Words: 324 - Pages: 2
...CH11 Instruction Sets: Addressing Modes and Formats Software and Hardware interface Addressing Modes • • • • • • • Immediate Direct Indirect Register Register Indirect Displacement (Indexed) Stack • • • • Addressing Pentium and PowerPC Addressing Modes Instruction Formats Pentium and PowerPC Instruction Formats TECH Computer Science CH10 Immediate Addressing Immediate Addressing Diagram • Operand is part of instruction • Operand = address field • e.g. ADD 5 Add 5 to contents of accumulator 5 is operand Instruction Opcode Operand • No memory reference to fetch data • Fast • Limited range Direct Addressing • Address field contains address of operand • Effective address (EA) = address field (A) • e.g. ADD A Add contents of cell A to accumulator Look in memory at address A for operand • Single memory reference to access data Direct Addressing Diagram Instruction Opcode Address A Memory • No additional calculations to work out effective address • Limited address space Operand Indirect Addressing (1) • Memory cell pointed to by address field contains the address of (pointer to) the operand • EA = (A) Look in A, find address (A) and look there for operand • e.g. ADD (A) Add contents of cell pointed to by contents of A to accumulator Indirect Addressing (2) • Large address space • 2n where n = word length • May be nested, multilevel, cascaded e.g. EA = (((A))) f Draw the diagram yourself • Multiple memory accesses to find...
Words: 592 - Pages: 3
...FREE ONLINE RESEARCH PAPERS Navigation Sign In Create Account Forgotten Password About Us Subscription Cancelation SIWES Project in Computer Science CHAPTER 1 INTRODUCTION 1.1 Overview of SIWES SIWES refers to the employment of students nearing under-graduation in firms or organizations, which operate on activities related to the respective student’s major subjects. The course, CSC 3299 as offered in Ajayi Crowther University is a compulsory subject offered by every computer science student in the 2nd semester of the third academic year with the objective of enabling students to come into contact with real life applications regarding the knowledge and skills gained in both theoretical and practical courses of the university. The core courses of Computer Science offered by ACU are both theory and laboratory practical -based and aid in providing a theoretical concept or ‘base’ to the students so that they are equipped with sufficient knowledge for joining the work force after completion of under-graduation. SIWES on the other hand helps the students familiarize themselves with the experience of being employed in their field and effectively learning and applying the knowledge required by carrying out their activities in the offices and fields. 1.2 Objectives of SIWES The general objectives if SIWES are outlined as follows: Helping students break free from the theoretical world of textbooks and class courses and leap into...
Words: 4317 - Pages: 18
...of protection are strategically located throughout the network and the layers are under unified strategy for protecting the entire network and the various components of the network, including individual network segments, infrastructure devices, network services, endpoints, and applications (Oppenheimer, 2011). SAFE architecture is comprised of the following major modules: core, data center, campus, management, WAN Edge, Internet Edge, branches, extranet, partner site, E-Commerce, teleworkers, and Cisco SensorBase. Each module is discussed as it stands alone and how it integrates with other modules which allows you to pick the module that best apply to your environment. Unlike most security whitepapers, SAFE provides a step-by-step instructions, screenshots, and configuration examples throughout. In fact, it includes just about every configuration...
Words: 974 - Pages: 4