Monday, April 18, 2016

WDP - Foodelicious Bakeshop

I Car For You

FOODELICIOUS BAKESHOP!

Order Form


Shopping Address
Name:
Address
Email Address:
District:
Contact Number:
Delivery: Delivery Pick Up

Pastries To Order

Item Quantity Price
Cookies
Cupcakes

WDP - I Car For You

I Car For You

I CAR FOR YOU!

Registration Form
Username: Password
Email Address:
Contact Number:
Car:
Color: Red Blue Green Black Silver
Inquirie: Inquirie Test Drive Pick Up
Comment

Sunday, April 17, 2016

Module 2 Part 2 Exercise 18-4-2016

Computer Network

  • LAN
LAN stands for Local Area Network, is a group of computers which belongs to the same organisation, and are linked within a small geographic area using a network, and often the same technology - usually ethernet.
  • WAN
WAN (Wide Area Network) connects multiple LANs to one another over great geographical distances any network whose communications link cross metropolitan, regional, or national boundaries). The most well-known WAN is the Internet
  • MAN
MAN, Metropolitan Area Network connects multiple geographically nearby LANs to one another (usually over an area of up to dozen kilometers) at high speeds. In this sense, MAN connects two remote nodes, making them able to communicate as if they were part of the same local area network. Simply, MAN covers an area larger than LAN but smaller than that of WAN e.g. city. Best example of MAN is the cable television network available in many cities.
  • SAN
 SAN stands for Storage Area Network, System Area Network, Server Area Network or Small Area Network. Storage Area Network connects servers to data storage devices through a technology like Fibre Channel
  • VPN
Virtual Private Network, is a network that is constructed by using public wires - usually the internet - to connect to a private network (such a s a company's internal network).

Intranet vs Extranet

Intranet
An intranet is a set of Internet services (for example a web server) inside a local network, i.e. only accessible from workstations of a local network, or rather a set of well-defined networks that are invisible (or inaccessible) from the outside. It involves the use of Internet client-server standards (using TCP/IP) protocols such as, for example, the use of Web browsers (HTTP protocol-based client) and Web servers (HTTP protocol), to create an information system inside of an organization or enterprise.

Extranet
An extranet is an extension of the information system of the company to its partners located outside of the network.

Access to the extranet must be secured to the extent that the same provides access to the information system for persons located outside of the enterprise.


Intranet/extranet system

Bandwidth

When referring to a data connection, bandwidth or communication speed is the total maximum transfer rate of a network cable or device.

Networking Models

Network model defines a set of network layers and how they interect. There are several different network models mainly:

OSI vs TCP/IP

  • TCP/IP
This model is sometimes called the DOD model since it was designed for the department of defense It is also called the internet model because TCP/IP is the protocol used on the internet.

  • OSI
The International Standards Organization (ISO) has defined a standard called the Open Systems Interconnection (OSI) reference model. This is a seven layer architecture listed in the next section.


Reference:
  • http://ccm.net/contents/266-types-of-networks#lan
  • http://www.enggpedia.com/computer-engineering-encyclopedia/dictionary/computer-networks/1620-network-types-types-of-networks-examples-a-definitions
  • http://www.webopedia.com/TERM/V/VPN.html
  • http://ccm.net/contents/219-intranet-and-extranet
  • http://www.computerhope.com/jargon/b/bandwidt.htm
  • http://www.comptechdoc.org/independent/networking/protocol/protmodels.html

Wednesday, April 13, 2016

CN – Lab Exercise 2

Step 1 Establish and verify connectivity to the Internet
This ensures the computer has an IP address.




Step 2 Access the command prompt
Use the Start menu to open the Command Prompt window. Press Start, type Run then type cmd which stands as Command Prompt




Step 3 ping the IP address of another computer
In the window, type ping, a space, and the IP address of a computer recorded in the previous lab.




Ping uses the ICMP echo request and echo reply feature to test physical connectivity. Since ping reports on four attempts, it gives an indication of the reliability of the connection. Look over the results and verify that the ping was successful. Is the ping successful? Yes.
If not, perform appropriate troubleshooting. 
If a second networked computer is available, try to ping the IP address of the second machine.
Note the results.




Step 4 ping the IP address of the default gateway
Try to ping the IP address of the default gateway if one was listed in the last exercise. If the ping is successful, it means there is physical connectivity to the router on the local network and probably the rest of the world.




Step 5 ping the IP address of a DHCP or DNS servers
Try to ping the IP address of any DHCP and/or DNS servers listed in the last exercise.

If this works for both server and they are not in the network, what does this indicate?
The 2 are not in the same network but have the same DNS Server.

Was the ping successful? Yes.
If not, perform appropriate troubleshooting.


Step 6 ping the Loopback IP address of this computer
Type the following command: ping 127.0.0.1 
The 127.0.0.0 network is reserved for loopback testing. If the ping is successful, then TCP/IP is  properly installed and functioning on this computer.
Was the ping successful? Yes

If not, perform appropriate troubleshooting.


Step 7 ping the hostname of another computer

Try to ping the hostname of the computer that was recorded in the previous lab. 

If the ping is successful, it means the computer was able to resolve the host name to an IP address. Without name resolution, the ping would have failed because TCP/IP only understands valid IP addresses, not names.
If the ping was successful, it means that connectivity and discovery of IP addresses can be done with only a hostname. In fact, this is how many early networks communicated. If successful, then ping a hostname also shows that there is probably a WINS server working on the network. WINS servers or a local “lmhosts” file resolve computer host names to IP addresses. If the ping fails, then chances are there is no NetBIOS name to IP addresses resolution running.

Step 8 ping the Google web site
Type the following command: ping www.google.com




The first output line shows the Fully Qualified Domain Name (FQDN) followed by the IP address. A
Domain Name Service (DNS) server somewhere in the network was able to resolve the name to an IP address. DNS servers resolve domain names, not hostnames, to IP addresses. 

Without this name resolution, the ping would have failed because TCP/IP only understands valid IP addresses. It would not be possible to use the web browser without this name resolution.

With DNS, connectivity to computers on the Internet can be verified using a familiar web address, or domain name, without having to know the actual IP address. If the nearest DNS server does not know the IP address, the server asks a DNS server higher in the Internet structure. 

Step 9 ping the Microsoft web site
Type the following command: ping www.microsoft.com


Notice that the DNS server was able to resolve the name to an IP address, but there is no response.
Some Microsoft routers are configured to ignore ping requests. This is a frequently implemented security measure.
ping some other domain names and record the results. For example, ping www.msn.de

Ping www.facebook.com

ping www.tumblr.com

ping www.amazon.com

Step 10 Trace the route to the Yahoo web site
Type tracert www.yahoo.com and press Enter.

Tracert is TCP/IP abbreviation for trace route. The preceding figure shows the successful result when running tracert.
Each router represents a point where one network connects to another network and the packet was forwarded through.

Step 11 Trace other IP addresses or domain names
Try tracert on other domain names or IP addresses and record the results. An example is
tracert www.msn.de. 


tracert www.Amazon.com
tracert  www.yahoo.com

Step 12 Trace a local host name or IP address
Try using the tracert command with a local host name or IP address. It should not take long because the trace does not pass through any routers



Reflection 

If the above steps are successful and ping or tracert can verify connectivity with an Internet Web site, what does this indicate about the computer configuration and about routers between the computer and the web site? What, if anything, is the default gateway doing?

As shown, all ping and tracert was successful,and this proves that the IP Configurations are correct and then cable are properly connected to enable internet access. Ping is used to ensure proper internet connection between a web server and a computer, where the DNS configuration need to establish a successfull connection. Tracert is used to indicate the path that packets take from a computer to the internet - when accessing a website. With tracert, administrators can also monitor any problems within a network from a router that are not functioning properly .The purpose of a default gateway is to help local networks to connect to the internet.

References:
http://hnda-farah.blogspot.com/2016/04/cn-lab-exercise-2.html (for Reflection)

Tuesday, April 12, 2016

WDP Ex4 - Tables Are Complicated

Table Are Complicated
Tables Are Complicated
Mohammadbishr Hafiy
22 13 November 1993
HafiyXXX@gmail.com +673 XXXXXXX
HND Class A
A male Scorpio.

WDP Ex3 - Tables and Span

Table Time
Name Age
Khairun 19
Zura 19
Hafiy 17

Famous Monster by Birth Year
Famous Monsters Birth Year
King Kong 1993
Dracula 1897
Bride of Frankenstein 1935

Divide and Conquer

Spantastic

This text is black, except for the word red!

My favourite font is Impact!

Monday, April 11, 2016

WDP Ex2

Lists

List of my favourite things

  1. Raindrops on roses
  2. Whiskers on kitten
  3. Brigh copper kettles
  4. Worm woolen mittens

List of things I find just OK

  1. White chocolate
  2. Khairun Akandi
  3. My wallet right now.

Most annoying TV celebraties

  • Song Jongki
  • Kim JongKook
  • Meghan Trainor
  • The Kardashians
  • Miley Cyrus

Top Three things i can do today

  • Think about the possible problems I can cause to someone.
  • Watch the problems i created take place.
  • Worry about the victims future.

Description List

Coffee
- black hot drink
Milk
- White cold drink

Nested List

  1. Dad's Interests
    • football
    • knitting
  2. Mom's interests
    • hating football
    • skydiving
List inside a list, not nested list.
  • Favourite boys' name
    1. Ryan
    2. Mohammad
    3. Azim
  • Favourite Girls' name
    1. Aqilah
    2. Siti Sarah
    3. Melissa

First font Size change

Some texts for your to make tiny!
Some texts for you to make normal size!
Some texts for you to make super big!

Changing the colors!

Big               Heading

A giant bear & a little duck were friends.
But the bear got hungry and ate the duck.
  1. This item is big Arial
  2. This item is medium verdana
  3. This item is small impact

Set background color

Favourite Footbal Teams &frac34

  1. The Hawthorn Football Club
  2. San Francisco 49 ers
  3. Barcelona FC