...LAB 1 EXPLORING THE WINDOWS SERVER 2008 INTERFACE THIS LAB CONTAINS THE FOLLOWING PROJECTS AND ACTIVITIES: |PROJECT 1.1 |Modifying Basic Server Settings | |Project 1.2 |Configuring TCP/IP Settings | |Project 1.3 |Configuring a Second Windows Server 2008 Computer (optional) | |Project 1.4 |Configuring a Windows Server 2008 Server Core Computer (optional) | |Lab Review Questions | | |Lab Challenge 1.1 |Verifying Active Directory SRV Records | Before You Begin Lab 1 assumes that setup has been completed as specified in the setup document and that your computer has connectivity to other lab computers and the Internet. To perform all projects in Lab 1, you will need: • Two (2) full installations of Windows Server 2008 • One (1) Server Core installation of Windows Server 2008 For subsequent labs, optional projects are provided that involve a second server running the full GUI version of Windows Server 2008 to be configured as a Read-Only Domain Controller and a third...
Words: 3284 - Pages: 14
...LAB 1 EXPLORING THE WINDOWS SERVER 2008 INTERFACE THIS LAB CONTAINS THE FOLLOWING PROJECTS AND ACTIVITIES: |PROJECT 1.1 |Modifying Basic Server Settings | |Project 1.2 |Configuring TCP/IP Settings | |Project 1.3 |Configuring a Second Windows Server 2008 Computer (optional) | |Project 1.4 |Configuring a Windows Server 2008 Server Core Computer (optional) | |Lab Review Questions | | |Lab Challenge 1.1 |Verifying Active Directory SRV Records | Before You Begin Lab 1 assumes that setup has been completed as specified in the setup document and that your computer has connectivity to other lab computers and the Internet. To perform all projects in Lab 1, you will need: • Two (2) full installations of Windows Server 2008 • One (1) Server Core installation of Windows Server 2008 For subsequent labs, optional projects are provided that involve a second server running the full GUI version of Windows Server 2008 to be configured as a Read-Only Domain Controller and a third...
Words: 3284 - Pages: 14
........................................................................ 1 Goals and Objectives .......................................................................................................... 8 Project Timeline ................................................................................................................. 15 Project Development ......................................................................................................... 19 R eferences ........................................................................................................................ 23 Appendix 1: Competency Matrix ....................................................................................... 24 Appendix 2: Installing Microsoft Windows Server 2008 ................................................... 26 Appendix 3: Conf iguring Domain Controller using DCPROMO ....................................... 36 Appendix 4: Installing Dynamic Host Configuration Protocol (DHCP) ............................ 49 Appendix 5: Inst alling Microsoft Windows Deployment Services .................................... 56 Appendix 6: Configuring Microsoft Windows Deployment Services ................................ 60 Appendix 7: Imaging client machine ................................................................................. 67 Page 1 Capstone Report Summary (Introduction) My Capstone Project is about Microsoft Windows Deployment Services (WDS). W DS is a service...
Words: 9702 - Pages: 39
...GROUP 2 PROJECT PART 1: DESIGNING A NETWORK PART 2: TYPES OF EQUIPMENT PART 3: PROTOCOL CHOICES PART 4: COMPANY PHONE SYSTEM PART 5: SECURITY PROPOSAL Project scenario: ABC Company with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, and Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. The main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo. Corporate Headquarters are in San Francisco. The remaining offices are sales offices. Consider the company to operate on a 24x7 basis, because it is global. To meet the goals of this scenario, Group 2, made up of the members below, have been assigned the following tasks in designing a network structure for this project: 1. Sean Dillon: Project Manager, Contributor; Editor Parts 1, 2, 3, 4 and 5; Submitter. 2. Denzel Chatman: Project Contributor; Section 3. Parts 1, 2, 3, 4 and 5. 3. Christopher Foster: Project Contributor; Section 1-A. Part 1; Part 2; Part 3; Part 4; Part 5. 4. William Collado Cancel: Project Contributor; Section 1-E. Part 1; Part 2; Part 3; Part 4; Part 5; Microsoft Project Editor. 5. Alex Graves: Project Contributor; Section 1-B. Part 1; Part 2; Part 3; Part 4; Part 5. 6. Mark Fortune: Project Contributor; Section 1-C. Part 1; Part...
Words: 10833 - Pages: 44
...La Jolla. The two other locations are in Del Mar and Encinitas. They have an OC 1 SONET using a T3 dedicated line connecting all three stores. This requires a fiber optic physical connection between stores since a T3 is equivalent to 28 T1 lines. This dedicated network is leased from the ISP and is guaranteed a continuous uninterrupted connection. This type of connection allows for a total of about 44736 Kbps and has 672 channels. KFF is using a 25Mbps connection to the internet. All three KFF locations are using a linear bus topology using 100base T Ethernet, which means that Ethernet is used and allows for data transfer rates of up to 100Mbps. The file server, workstations and all equipment previously mentioned are connected to a linear cable. This type of LAN network has disadvantages that outweigh the advantages. One major disadvantage is that the entire network is disabled if there is a break in the main cable, and locating the break can prove to be difficult. Another disadvantage is that the more devices are added, the less efficient it becomes. This outdated design broadcasts data which uses up important bandwidth that can be used for better purposes. The conversion from this topology to a WLAN will benefit KFF on several levels. The addition of wireless technology is a cost-friendly alternative for KFF. It will be less vulnerable to complete outages due to line breaks. If there is a network issue, it will be much easier to isolate. In some cases, issues can even be resolved...
Words: 1984 - Pages: 8
...Capstone Greenway Bank Project Presented by: CISSA Amed Aplicano, Ivan Armendariz, Chris Christopher, Steven Smedley, Samuel Holman Table of Content 1. Table of content…………………………………………………………………………..……1 2. Project Charter………………………………………………………………………………....2-11 3. Change Management Plan…………………………………………………………………12-15 4. Change Management Procedure……………………………………………………….16 5. Project Schedule and Gantt Chart………………………………………………………17 6. Network Activity Diagram………………………………………………………………….18-20 7. Work Breakdown Structure……………………………………………………………….21 8. WBS Dictionary………………………………………………………………………………….22-24 9. Network Logical Diagram………………………………………………………………......25-26 10. Network Physical Diagram………………………………………………………………….27 11. Server Configuration…………………………………………………………………………..28-30 12. Active Directory Schema…………………………………………………………………….31 13. Client Configuration……………………………………………………………………………32-33 14. Infrastructure Configuration……………………………………………………………….34 15. Budget/Bill of materials……………………………………………………………………….35-37 16. Quality Plan…………………………………………………………………………………………38-40 17. Risk Management Plan………………………………………………………………………..41-48 18. Meeting Minutes…………………………………………………………………………………49-66 19. Final presentation slides……………………………………………………………………..67-77 20. Progress report………………………………………………………………………………….78- 1 NT2799.U1.HO4 Greenway Bank: Project ______________________________________________________________________________ Greenway Bank Project NSA Capstone Project Charter __________...
Words: 12136 - Pages: 49
...I Project Title Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network Project Description NEUST-Gabaldon Campus (Formerly Sabani Estate Agricultural College) established their computer laboratory on 2011 which help the students of College and High School for their computer subjects (Office Productivity). Since then, the computer laboratory has its computer administrator in presence of Mr. Jefrain M. Padre, although there was computer network architecture in the campus there were times that the computer had some troubles including the System Unit and its operating system. So, the researchers decided to make a proposal entitled “Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network”. The proposed project used virtualization for it was essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Using an Ncomputing M300 (thin-client) series connection of network it was possible for the entire project. Thoroughly, the entire project covered up network of computer using this device (Ncomputing M300 series) to connect through a server in a series type of network. Also, using a server with a high specification it will then try to run at least one programming language that can be used by the Bachelor of Science in Information Technology students of Gabaldon Campus. Project Goals/Objectives Project Goal: ...
Words: 8853 - Pages: 36
...Unit 1: Introduction to the Capstone Project Recommended Activities for This Unit Instructor Functions|Student Tasks| • Discuss the course structure layout. • Present an overview of the capstonecase study or Request for Proposal (RFP).|Discuss the capstone project or Request for Proposal (RFP) to identify the following: o Objectives and scope o Requirements and specifications o The resources, such as human, time, funds, space, and tools, required to deliver the product o Tasks o Deliverables o Milestones• Identify major milestones and individual tasks.| • Explain how to launch and configure Microsoft Office Project 2003.|Explore Microsoft Office Project 2003.| • Discuss project planning and management using Microsoft Office Project 2003 and relate the software to the capstone project. o Define the basic terminology of project management. o Explain the project management life cycle. o Explain project management knowledge areas.|Define project management terminology and apply the terminology to the capstone project.| • Organize project teams. o Define team member roles and responsibilities.|Select teams.• Define team member roles and responsibilities.• Elect peers to fill appropriate roles.| Network Development Capstone Project Unit 1 Instructor Functions|Student Tasks| • Identify the key components of the capstone project. o Discuss the key requirements for the successful completion of the project. See Appendix...
Words: 2321 - Pages: 10
...1 PROJECT CHARTER & SCOPE |Project Name: | |True Blue Tech | |Date: | |1/19/2013 | | | |PURPOSE | | | |The purpose of this project is to update the old and very outdated software and equipment this is both physical and logical. We will do this by | |upgrading it to new and up to date equipment as well as software. All the existing data will be backed up and transferred to the new computer | |system. The upgrades will also provide a resolution to the data storage and management for all five...
Words: 842 - Pages: 4
...Installation, Services Verfication, troubleshooting, POTs_Splitter/ POE module and FAQ WT-Engg.-CPE-IX380 Contents Contents 2 1.0 Document Control Information 4 2.0 Purpose & Scope 5 3.0 General Information 7 Safety Precautions 7 Cleaning and Maintaining 7 4.0 Device Physical Appearance 8 Appearance 8 Parts Supplied 8 LED Indicator 8 Working Condition 9 Technical Parameters 9 Ports 10 5.0 Physical Connectivity of IX380 11 Application Structure 11 Hardware Installation 11 Connect to LAN 11 Connect to Phone 12 Connect Power Adapter 12 Power on MODEM 12 6.0 Configuration of IX380 13 TCP IP Installation 13 TCP IP Configuration 13 Checking 14 Check LAN Connection 14 Cancel Proxy Server in Browser 15 Others 15 7.0 Preliminary Actions 16 Login 16 Status 18 Connection Status 18 WiMAX Information 20 About My Modem 22 Setup 23 IP Configuration 23 DHCP Clients 23 DHCP Binding 24 WLAN 24 Basic Settings 24 Security 25 MAC Filter 27 Advanced Settings 28 Advanced 28 Routing Setup 28 SNTP Client Configuration 29 DDNS Setup 29 DNS Configuration 30 IGMP Configuration 31 Security 32 Port Forwarding 32 Port Trigger 33 DMZ 35 ACL 36 VPN Client 38 Tools 39 System Commands 39 Ping 40 User Management 40 System Log 41 VAS Code 42 Troubleshooting...
Words: 5052 - Pages: 21
...software 1.30 and forward Doc. No: 309-002 Rev 1.02 Foreword: The purpose of this document is to describe how to install, set-up, and configure Neets central control. Included in this manual is also a description on how to use the software. This program can be downloaded from Neets.dk. The document is split into 3 sections: 1. Hardware configuration. 2. Software setup. 3. End-user manual. COPYRIGHT - All information contained in this Manual is the intellectual property of and copyrighted material of Neets. All rights are reserved. You may not allow any third party access to content, information or data in this manual without Neets’ express written consent and you may only use such information for the care and operation of Neets Control. Questions, AFTER reading this manual may be addressed to your local dealer or: Neets Torvet 4 8700 Horsens Denmark by E-Mail: Support@Neets.dk Or you may use our contact form at www.neets.dk Page 1 of 17 Doc. no: 309-002 Rev 1.02 Revision list: Author : Date Description Pages TSA : 27-07-06 SDV : 03-10-06 SVL : 23-06-08 First release Spelling error Header in the document has been change. Remove information regarding the lockup of panels Added the description of the renaming functions. Added description of the relabeling Updated the description of the settings options. All 1.00 5,7,8,9,10,13,15,16 1.01 All 1.02 Doc. no: 309-002 Rev 1.02 Doc ver SW ver 1.00 1.00 1.1.0 ...
Words: 2253 - Pages: 10
...Program: BSIT Student Email: Four Digit Assessment/Project Code: CPW1 Mentor Name: Laura Creamer / Les Vance For Revisions Only Indicate Previous Grader: Submissions received with an altered, incomplete or missing cover sheet will be returned for resubmission. Submit to: Western Governors University Attn.: Assessment Delivery Department 4001 South 700 East, Suite 700 Salt Lake City, Utah 84107-2533 Capstone Project Cover Sheet Capstone Project Title: Small Business Network Upgrade Student Name: Degree Program: BSIT Mentor Name: Laura Creamer / Les Vance Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Report Summary (Introduction) ................................................................................................... 1 Goals and Objectives..................................................................................................................................... 6 Project Timeline (Appendix 2)..................................................................................................................... 11 Project Development .................................................................................................................................. 13 References .................................................................................................................................................. 17 Appendix 1: Competency Matrix .................................
Words: 6682 - Pages: 27
...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...
Words: 18577 - Pages: 75
...1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...
Words: 1931 - Pages: 8
...Unit 1 Individual Project: TCP/IP Instructor: Michael Pry Robert Long American Intercontinental University Abstract In this brief I will attempt to explain the usage of the TCP/IP protocol so that the user may better understand the functions of this protocol. I will also provide the pertainate information for the configuration of the TCP/IP protocol to you system this will include the setting for this configuration. One of the most popular network protocols in use today is TCP/IP, (Transmission Control Protocol / Internet Protocol) which is the basic transmission language or protocol of the internet. This may also be utilized as a communications protocol in a private network as well, such as intranet or extranet. If you utilize a set up with direct access to the internet your computer is given a copy of the TCP / IP program as well as every other computer that you deal with (messages for example) or for information they to have a copy of TCP / IP. So let us address TCP/IP for a minute, TCP/IP is a two layer program, the higher of the two layers is the Transmission Control Protocol which manages the assembling of the message or file into a smaller packet. These are transmitted over the internet and received by a TCP layer which reconstructs the packet into the original message. The lower layer IP (Internet Protocol) deals with the address part of each packet so that it is routed to the proper destination. Every gateway computer on this network will check the...
Words: 1097 - Pages: 5